Issue 1 - Texas Tech University Health Sciences Center
Transcription
Issue 1 - Texas Tech University Health Sciences Center
TechTalk The official newsletter of the TTUHSC Information Technology Division Volume III, Issue I May 2008 In This Issue: Message From The CIO ................................. 1 Windows Vista Support ................................. 8 Tips - n - Tricks From The Help Desk ............ 4 NIU 2 Update .............................................. 11 The Faces Behind The Voices ......................... 5 Keeping An Eye On Security ........................ 13 techtalk Editor: Yung Ng Editorial Team: TJ Greenwood tj.greenwood@ttuhsc.edu Ken Jarrell ken.jarrell@ttuhsc.edu Carla Myers carla.myers@ttuhsc.edu Yung Ng yung.ng@ttuhsc.edu INFORMATION TECHNOLOGY (IT) DIVISION CONTACT INFORMATION AMARILLO: 1400 S. Coulter Street Amarillo, TX 79106 (806) 354-5404 helpdesk.amarillo@ttuhsc.edu EL PASO: 4800 Alberta Avenue El Paso, TX 79905 (915) 545-6800 elp.helpdesk@ttuhsc.edu www.ttuhsc.edu/elpaso/it LUBBOCK: Technology Services and Information Services 3601 4th Street - STOP 9083 Lubbock, TX 79430 (806) 743-2870 - Reception (806) 743-2875 - Help Desk ithelpdesk@ttuhsc.edu www.ttuhsc.edu/it Office of the CIO and HealthNet Education Services 3601 4th Street - STOP 7755 Lubbock, TX 79430 (806) 743-1500 - Reception (806) 743-1555 - HealthNet PERMIAN BASIN: 800 West 4th Street Odessa, TX 79763 (432) 335-5108 helpdeskodessa@ttuhsc.edu www.ttuhsc.edu/odessa/it TechTalk message from the chief information officer As you may have heard, we are currently deploying a new network to support the Institution’s needs on all of our campuses. The network upgrade will not only improve our network capabilities, it will also bring enhancements to our IT security infrastructure. There will be a number of security enhancements in the new network, but two in particular will directly impact you: • Network Access Control (NAC), • Secure Socket Layer Virtual Private Network (SSL VPN) Network Access Control (NAC) is a solution that allows us to provide appropriate access based on user identity and also to ensure that each device connected to our network has the appropriate security and compliance measures in place, such as anti-virus software and operating system software updates. When a computer initially logs onto the network, it will be checked to ensure that the proper software and security measures are in place before being allowed to access institutional information resources. Computers that don’t have the appropriate protection will be routed to a web site that will provide instructions on how to get the necessary software and updates installed on their computer. Once the appropriate protections are in place, the user will then be able to access institutional resources. Secure Socket Layer Virtual Private Network (SSL VPN) is a service that allows users to securely connect to our network from remote locations. The new VPN service will allow additional concurrent users to remotely access the TTUHSC network and eliminate the problem of multiple users at the same location (e.g. at a hotel during a conference) being able to connect to the institutional network. One other additional change is that you will be able to connect securely to the network from any computer you are using even public access computers. The secure connection is made through the web browser. User impact will require minimal training which will be available on a web page on how to use the new SSL VPN service. This will primarily impact those who travel frequently and only have access to public computers. Initially, users will be moved to the new service on a request basis. The existing VPN services will still remain active as we begin to transition TTUHSC users to the new device. Keeping mission critical, personal and protected health information secure is a major priority of the Institution and the IT Division. New security threats are constantly appearing and the IT Division is dedicated to on-going research and implementation of protective measures to insure that institutional information is kept as secure as possible. Michael T. Phillips Chief Information Officer PAGE 1 B Is For ... By Neil Stout Server Support III In mid-February, the IT Division announced a new spam firewall service from Barracuda Networks. Utilizing both hardware and software configurations, the service offers multiple layers of defense including anti-spam, anti-virus, anti-denial-of-service, and other defenses to protect the TTUHSC email system from attack. Barracuda allows the user to easily mark email as Spam or Not Spam and, in turn, aid in training the service to be more efficient in the identification of junk mail. What Is A Quarantine? Quarantining is the process of placing a suspected spam email aside into a special mailbox (known as a Quarantine) so that it does not reach your Inbox. It uses a scoring system called Bayesian scoring which determines whether or not a given email is spam or legitimate, based upon messages that have been previously identified. If a message is scored over a preset number, the Barracuda Spam Firewall marks it as spam and places it into a personal Quarantine mailbox for either deletion or review at a later date. By using this, you can effectively reduce the amount of spam that reaches your Inbox. An important distinction to be made is that Quarantining is not actually deleting the email. You may review the items that have been quarantined and choose to have the messages delivered to your Inbox or delete the message. You can do this by way of your personal Quarantine report or by going directly to the Barracuda Spam TechTalk Firewall webpage (https://spammgr. ttuhsc.edu/) and logging in using your eRaider ID. Why You May Need The Quarantine By default, the Barracuda Spam Firewall is not quarantining your email. We are blocking the highest rated spam as they come in, but are allowing the remainder of the messages to be delivered normally. However, this does not filter out many messages that receive a high score, but are still likely to be considered spam. Quarantine to reduce the amount of spam you deal with on a daily basis. This will also help secure your email as the chances are less likely for you to accidentally open an email that may contain a virus or a link to a malicious website. How To Configure The Quarantine First, go to: https://spammgr.ttuhsc. edu/ and log in by entering your eRaider username and password in the Username and Password fields then click on the Login button (Figure A). After logging in, you will see the Quarantine Inbox (Figure B). This is where all your messages that have been quarantined will be listed for viewing. If a message looks like spam, it can be deleted simply by clicking on the Delete link next to that message. Likewise, if it is a valid message that has been wrongly delivered to the Quarantine, it can be delivered to your Outlook InFigure A. Barracuda Spam Firewall login screen box by clicking the Deliver link next to the message. If you are receiving more spam than Should you wish to ensure that the usual or you are simply receiving a sender’s messages never get stuck large amount of spam, we would rec- in the Quarantine again, you can add ommend you enable your personal them to your personal Whitelist by Figure B: Quarantine Inbox See Barracuda on Page 3. PAGE 2 Barracuda (continued) clicking on the Whitelist link next to the message. To turn on your personal Quarantine, first you’ll need to click on the Preferences tab near the top of the screen. This will bring you to your Whitelist/Blacklist page, where you can add or remove email addresses of people you always or never want email from respectively. Click on the Quarantine Settings tab near the top of the page to open the Quarantine Settings page (Figure C) for basic Quarantine options. It is important to note that if you wish to change any of these options, always press Save Changes before you leave the settings page. The Enable Quarantine setting does Figure C: Quarantine Settings just as it says: enables or disables your Quarantine. When the Quarantine is enabled, any messages over a specific score (default is 6) will be delivered to the Quarantine Inbox instead of your normal Inbox. When the Quarantine is not enabled, all messages will be delivered directly to your Inbox, regardless of their score. The Notification Interval setting describes how often you wish to receive a report containing the messages currently in your Quarantine. This report will be delivered directly to your normal Inbox (unless specified otherwise in the Notification Address field) at whatever interval is selected. After you have enabled your Quarantine, set whichever notification interval suits you and click Save Changes. Your personal Quarantine is up and running! If you wish to further customize your Quarantine or other features, click on the Spam Settings tab near the top of the page to bring up the Spam Settings screen (Figure D). The Enable Spam Filtering option allows you to completely turn on or off spam filtering. It is highly recomFigure D: Spam Settings mended that you leave this option set to Yes, otherwise all messages, no matter their score, will be sent directly to your Inbox. By default, the Use System Defaults option will be set to Yes. If you find that the default scores do not work for you however, selecting No, then clicking on Save Changes will allow you to change the values for Tag (emails over this value will have “[Suspected SPAM]” put into their subjects but delivered to your Inbox), Quarantine (messages will be delivered to the Quarantine Inbox), and Block (messages are simply deleted). Take care in changing the default values for Tag, Quarantine, and Block, since putting too low of a value can cause legitimate messages to be incorrectly classified as spam or deleted completely! It is highly recommended that the Block value not be changed from its default of 9 for this reason. More information about Anti-Spam is available at http://www.ttuhsc.edu/it/helpdesk/anti-spam.aspx. For additional information or assistance, please contact your local campus IT Help Desk. TechTalk PAGE 3 tips -n- tricks from the help desk How To Connect To Your Work Computer From Home Using Remote Desktop (when both are running Windows XP) First, you will need to know your work computer name. Directions for obtaining this can be found at http://www. ttuhsc.edu/it/helpdesk/pcname.aspx and was also included in an earlier Tips-n-Tricks column from Volume 1, Issue 1 of TechTalk (http://www.ttuhsc.edu/it/newsletter/documents/techtalk_0506.pdf.) Work Computer Preparation Right-click on the My Computer icon located on the Desktop and select Properties. From the System Properties window, click on the Remote tab. Check the check box next to “Allow users to connect remotely to this computer” to enable remote desktop. (Your work computer name is also displayed here if you have not obtained it earlier). Then click on the Select Remote Users button. You should see an entry for your TTUHSC\eRaider_username listed on the Remote Desktop Users window and, having verified these settings, click OK to accept the settings and close the window. If either the check box was not checked or your TTUHSC\eRaider_ username was not listed and you do not have the permissions to modify those settings, please contact your local IT Help Desk for assistance in enabling those requirements on your work computer for Remote Desktop to work. Home Computer Setup Important: Your work computer must be turned on to be able to connect to it from home. If your internet service provider is not TTUHSC, you will need to use a TTUHSC VPN connection on your home computer for Remote Desktop to be able to connect to your work computer. (TTUHSC VPN information is located at http://www.ttuhsc.edu/ it/helpdesk/vpn). There are two ways to begin Remote Desktop. Either go to Start > All Programs > Accessories > Remote Desktop Connection or Start > All Programs > Accessories > Communications > Remote Desktop Connection. After clicking on Remote Desktop Connection, enter your work computer name in the Computer: field and then click on Options. You can modify the quality of the Remote Desktop Screen Size and Color depth to your preference under the Display tab and tweak the Performance options under the Experience tab. Do note that higher settings may result in a slower connection. Then click on Connect and, if prompted with a username/password credentials window, enter your TTUHSC\eRaider_username and password. You will then be connected to your work computer. To end your session, close the Remote Desktop Window or go to Start > Disconnect on your work computer. Note: Once you have configured and tested the Remote Desktop Options to your liking, you can click on the Save As button under the Remote Desktop Connection General tab to save a preconfigured shortcut icon to your desktop. TechTalk PAGE 4 The Faces Behind The Voices Of ... Permian Basin IT You’ve spoken to them. Now, it’s time to meet the hard working staff of the Permian Basin IT Help Desk. Brad Erwin Tremaine Butler Unit Manager Unit Manager Brad has been with the Permian Basin Health Sciences Center IT Department for five years now. Before coming to the HSC, he was self employed in the computer service business, working in the Odessa/Midland and surrounding area. All in all, Brad has been working in the IT field for the past eleven years. When not working, he enjoys playing a quick round of golf. Tremaine was born in Odessa and raised in San Antonio. However, he quickly found his way back to good old West Texas and has been with the Permian Basin IT Department for three years now. Jared is the newest member of the Permian Basin IT Department. He started working in the department as a PC/Network Support staff in September 2007. Additionally, Jared also doubles as a programmer for the department. Justin joined the Permian Basin IT Help Desk team in 2004. He is a 2002 graduate of Permian High School and is currently attending the University of Texas at the Permian Basin in pursuit of a degree in business. He has 4 years experience in PC/Network support. Jared is from Odessa and graduated from UTPB in 2007 with a double major in Computer Science and Mathematics. When not at work, Justin enjoys listening to music and playing a variety of sports including basketball and golf. TechTalk Besides watching and participating in all sports, Tremaine spends most of his free time with his three year old son. Jared Wilson Justin Stewart PC/Network Support & Programmer PC/Network Support PAGE 5 PostX Encryption By Andrew Howard - For Your Email Server Support II Email encryption is not really a topic that most people read/talk/think about on a daily basis. More people find reading tax law more stimulating and understandable than most articles written on email encryption. Hopefully, this will be slightly more interesting and enlightening. Recently the HIPAA Privacy and Security Committee updated the operating policy and procedure for the electronic transmission of Protected Health Information (PHI). The new revision means TTUHSC employees can now send Electronic PHI (EPHI) via email to nonTTUHSC domains. When the end user is sending an email that contains EPHI in the body of a message or as an attachment, the email will have to be encrypted if its final destination is outside of the TTUHSC domain. TTUHSC utilizes an email encryption solution from IronPort called an email. Figure 1 shows a simplified flow chart of the encryption process. 1. The user sends the encrypted email. 2. The message is pushed to the recipient and the recipient opens the email. Figure 1 3. The recipient authenticates and gets the message key. There are two ways to encrypt emails through the IEA - manual and automatic. To manually encrypt an email, simply add [ss] or [send secure] to the Subject line of an email that needs to be encrypted. (See Figure 2 for an example.) Once the email is sent, IronPort will detect the Subject line tag [ss] and encrypt the email. The Subject line tags [ss] and [send secure] are removed from the subject line upon encryption. So the recipient receives an email that has a Subject Line of “Medical Records” not “[ss] Medical Records”. Currently, the automatic email encryption portion of the IEA is still in Figure 2 IEA and is short for IronPort Encryption Appliance. There are four basic steps when sending an encrypted TechTalk 4. The message is decrypted and displayed. the development phase, but a brief overview of how the IEA automatiSee PostX on Page 7. PAGE 6 PostX (continued) cally encrypts email is needed. The IEA is capable of scanning emails for certain words, phrases, and number patterns. To do this, the IEA utilizes a set of lexicon files that contain the words, phrases, and number patterns that TTUHSC determines warrant encryption. These words, phrases, and number patterns are all numerically weighted and, once a certain numerical weight is reached, the email is automatically encrypted. The lexicon files the IEA uses include financial and medical words/phrases and can be updated as needed. Figure 3 Email is only encrypted if its destination is outside of the TTUHSC domain. Email sent inside the TTUHSC. EDU domain will not be encrypted. This means if a user manually encrypts an email with [ss] or [send secure] and sends it to an email address ending with TTUHSC.EDU it will not be encrypted. The email will be unencrypted with the Subject Line tag of [ss] or [send secure] still present when the recipient receives the email. When you get an encrypted email, you will get a notification email like the example shown in Figure 3. Figure 4 Once the encrypted email is received, the user simply opens the securedoc.html attachment. If it is the user’s first time opening an encrypted email, there will be a Register button that will take the user to a registration page to create a profile. (See Figure 4.) Clicking the Register button, the user is taken to a secure page (Figure 5) where they can enter their information and activate their account. Figure 5 TechTalk See PostX on Page 8. PAGE 7 PostX (continued) Once the user has registered, they can open the securedoc.html attachment again and will be taken to the following screen as shown in Figure 6. The user has to enter their password and click the Open button to read the encrypted email. The IronPort IEA is compatible with all email platforms. Not only can users receive encrypted email using AOL, Yahoo!, Gmail, Hotmail, Thunderbird, Lotus Notes, or Groupwise, but users can also send encrypted mail from TTUHSC’s Outlook Web Access page. For more information or help with encrypting your email, please contact your local IT Helpdesk or go to the Help Desk’s Email Encryption page at http://www.ttuhsc.edu/it/ helpdesk/emailencryption.aspx. Figure 6 Windows Vista Support Jeremy Freeman, Unit Manager, and Ken Jarrell, PC/Network Support III Over the past year, TTUHSC IT has received numerous questions concerning services not supported by the Windows Vista operating environment. TTUHSC is taking the approach of many universities and other institutions in organizing a carefully planned approach to the support of Windows Vista installations on institutional machines. Currently, TTUHSC uses several essential hardware and software applications not supported by Windows Vista. IT support staff have been involved in testing Windows Vista within our environment, as well as troubleshooting known problems with third-party software and peripherals. The goal is to meet certain specifications and recommendations and find solutions to issues before distributing Windows Vista to compatible TTUHSC computers. Many services offered by TTUHSC, but not supported by Windows Vista, have been addressed. However, a couple of inconvenient compatibility issues remain. Both wireless and VPN connectivity involve security measures that will be satisfied once the Network Infrastructure Upgrade, currently underway, has been completed. TTU has begun providing their employees and students the ability to purchase an upgrade copy of Windows Vista Ultimate for TTU work-at-home use, as well as, a download option for Windows Vista Enterprise through eRaider. (Windows Vista Enterprise is only for computers within the TTU campus that are connected to the TTU network.) Please be aware that until the resources and services that TTUHSC provide and the main third party vendor applications that TTUHSC support are compatible with Windows Vista, options for purchasing or downloading and the support for installations on work computers of Windows Vista will not be available to the TTUHSC community. TTUHSC IT does realize that most new, personal computer purchases come preinstalled with Windows Vista. Students, faculty, and staff using computers with Windows Vista will continue to receive the same assistance with supported services and software as those using Windows XP. If you have any questions, please feel free to contact the IT Help Desk at (806) 743-2875 or email ithelpdesk@ ttuhsc.edu. TechTalk PAGE 8 What’s New For Microsoft Office 2007 By Ken Jarrell, PC/Network Support III b Earlier last year, Microsoft released the new Office 2007 system, including updated versions of Access, Excel, Outlook, PowerPoint, Publisher and Word - all with more features and an easier to use workspace. TTUHSC IT has recently begun supporting Office 2007 as well as assisting with upgrade plans for other departments. With the added features and capabilities of Office 2007, a new of tabs that make sense for spreadsheet work including tabs for working with formulas, managing data, and reviewing. These tabs simplify accessing application features because they organize the commands in a way that corresponds directly to the tasks people perform in these applications. In addition to streamlining the document authoring experience, Office 2007 also centralizes all the things Figure 1 workspace design was created, significantly reducing the chore of fumbling through numerous menus, toolbars, and dialog boxes. The traditional menus and toolbars have been replaced by the Ribbon, a new device that presents commands organized into a set of tabs. (See Figure 1.) The tabs on the Ribbon display the commands that are most relevant for each of the task areas in the applications. For example, in Office Word 2007, the tabs group commands for activities such as inserting objects like pictures and tables, doing page layouts, working with references, doing mailings, and reviewing. The Home tab provides easy access to the most frequently used commands. Office Excel 2007 has a similar set TechTalk you can do with a document: share it, protect it, print it, publish it, and send it. The new workspace brings together the capabilities of the Microsoft Office system into a single feature on the workspace: the Microsoft Office Button. This offers two major advantages. First, it helps users find these valuable tasks. Second, it simplifies the core authoring scenarios by allowing the Figure 2 Ribbon to focus on creating great documents. (See Figure 2.) Certain sets of commands are only relevant when objects of a particular type are being edited. In past versions of Microsoft Office, these commands, usually in the form of toolbars, were difficult to find and use. In Office Excel 2007 for example, the commands for editing a chart are not relevant until a chart appears in a spreadsheet and the user is focusing on modifying it. Clicking on a chart causes a contextual tab to appear with commands used for chart editing. Contextual tabs only appear when they are needed and make it much easier to See Office 2007 on Page 10. PAGE 9 Office 2007 (continued) find and use the commands needed for the operation at hand. They also bring needed functionality to the user’s attention at the most appropriate time. (See Figure 3.) Galleries are at the heart of the redesigned applications. Galleries provide users with a set of clear results that users can simply “pick and click” to achieve the desired results from their document, spreadsheet, presentation, or database. By presenting a simple set of potential results, rather than a complex dialog box with numerous options, Galleries simplify the process of producing professional looking work. However, the traditional dialog box interfaces are still available for those wishing a greater degree of control over the result of the operation. (See Figure 4.) Figure 3 Live Preview is a new technology that shows the results of applying an editing or formatting change as the user moves the pointer over the results presented in a Gallery. This new, dynamic capability streamlines the process of laying out, editing, and formatting so users can create excellent results with less time and effort. These enhancements make up only some of the most significant updates to the Microsoft Office system in more than a decade. Soon, staff, faculty, and students of TTUHSC will be able to take advantage of these features in Microsoft Office 2007. Figure 4 TechTalk PAGE 10 Progress Update On The Network Infrastructure Upgrade 2 Project By Joe Bilbro, Managing Director Network, Systems, & Security To most TTUHSC network customers, the Network Infrastructure Upgrade 2 (NIU2) project will appear to have never happened. Other than some obscure announcements warning of outages and downtimes, the average customer using the network between the hours of 6AM and 6PM will never know that the infrastructure supporting the TTUHSC network has been completely gutted (with the exception of the existing fiber and copper cables) and replaced with new state of the art networking equipment. This is, in fact, our goal: an upgrade that is totally transparent to our customers. After a long and complex RFP process, TTUHSC signed a contract late last year with AT&T to replace our 10 year old network infrastructure with new networking equipment from Nortel Networks. Valued at $3,000,000, the upgrade will replace end of life Cisco networking gear with new ultra high speed equipment. The new equipment will be placed at each TTUHSC campuses in Amarillo, Dallas, El Paso, Lubbock, Midland, and Odessa. AT&T has partnered with Nortel to provide TTUHSC with a turn-key network upgrade. Nortel is the primary implementation contractor and is working closely with the TTUHSC networking team to design and deploy the new network. The new equipment brings improvements in redundancy, speed, management, and security to the TTUHSC network. Redundancy improvements are significant. Single Cisco core switches are being replaced with two tightly integrated, totally redundant Nortel 8600 series core switches. Each Nortel switch houses redundant power supplies, and is backed up by redundant UPSs. In the unlikely event of a switch failure, an automatic failover to the other switch will occur in less than 50 milliseconds, while maintaining all active network connections. Network speed is also significantly improved. The core network bandwidth is being upgraded to 10Gb, with edge closet speeds increasing from 1Gb to 4Gb. All office network connections currently at a speed of 10Mb will increase to 100Mb. Additionally wireless access points will be upgraded from 802.11b (11Mb) to 802.11g (54Mb). Managing a network with 15,000 connection points is not a trivial task. Sophisticated management tools must also be deployed to avoid being drowned in too much data. We have purchased Nortel’s Enterprise Switch Manager, Enterprise Network Management System, and Enterprise Policy Manager to allow our networking staff to quickly receive alerts, isolate and troubleshoot network problems, and manage and maintain hardware and software networking assets. The NIU2 RFP called for significant improvements in network security. The Nortel solution includes deployment of Secure Network Access Switches at all campuses, which will ultimately prevent infected PCs from attaching to our network. (Please see the security article on the Network Access Controls on page 13 of this issue of TechTalk for more details on this exciting technology.) Additionally Nortel Threat Protection System 2070s will be deployed to detect network threats such as viruses, trojan horses, worms, denials of service, and malware in real time. This will augment our existing Tippingpoint Intrusion Detection Systems/Intrusion Prevention Systems. See NIU 2 on Page 12. TechTalk PAGE 11 NIU 2 (continued) Before continuing further, it is important to define some of the network terms used thus far. Edge Switch – Edge switches connect PCs and printers in offices, clinics, and classrooms to the core switches. Edge switches are located in edge switch closets. Edge Switch Closet – Edge switch closets are small rooms housing networking equipment located throughout the TTUHSC campuses. A given edge switch closet usually contains many edge switches which service from 100 - 500 PCs. There are over 75 network closets in the TTUHSC network (counting regional campuses). All equipment in a given closet will be replaced in a single night. Plans are to do multiple closets every other night with equipment configuration and staging in the interleaved days. Core Switch - Core switches connect all edge switches to the main network. When a core switch is down, all edge switches attached to that core switch are down. Wireless Access Point (WAP) WAPs provide access to the network via a wireless connection. A typical WAP provides wireless network coverage to a circular area within a 150 foot radius. TTUHSC currently deploys 190+ WAPs that support 802.11A/B. They will be replaced with new Nortel WAPs that support 802.11A/B/G. The types of outages that could be expected during this upgrade process include: Lubbock Campus Core Switch Outages – These outages are the most disruptive. When the Lubbock TechTalk Core switches are down, WebCT, email, IDX, Baseline Web, and all other services hosted in Lubbock will be unavailable for ALL campuses. However, regional campuses should have network access to the Internet and to other regional campuses during Lubbock Core switch outages. These outages will, in most cases, not begin until after 7PM CDT (6PM MDT) and not last more than 10 hours. We have already completed this piece of the upgrade! Regional Campus Core Switch Outages – When the regional campus core switches are down, the regional campus network and all local regional campus resources (e.g., servers, network printers, network file shares, etc) will be unavailable. These outages will, in most cases, not begin until after 7PM local time and not last more than 10 hours. We anticipate that these after-hours outages will not last more than a week at each regional campus. Edge Switch Closet Outages – When an edge switch closet is down, any PCs and printers attached to those switches cannot access the network or any network resources (e.g., the Internet, network printers, servers, and applications like IDX, Baseline Web, TechSIS, TechFIM, WebCT, etc.) These outages will, in most cases, begin at 6PM local time and not last more than 10 hours. Wireless Outages – WAPs will be out of service whenever the edge switch the WAP is attached to is down or the WAP is being replaced. Wireless access in the area(s) serviced by a given WAP(s) will be unavailable during these times. With the good must come some bad. The bad news of this upgrade is that there will be some down times. We have already had nominal downtimes to replace the core equipment in Lubbock. The next round of upgrades will be the edge switch closets in Lubbock, scheduled to begin May 12, 2008. While edge closet upgrades may occasionally cause a PC to think it is a printer, or vice versa, we do not expect many problems from this part of the upgrade, and any problems encountered will be quickly resolved with a call to the IT Help Desk. Once all Lubbock edge closets are completed, the project will proceed according to the tentative schedule below: • El Paso (June 1st) • Odessa/Midland (mid-June) • Amarillo (July 1st), and, • Dallas (mid-July). Additional information on outages and outage dates are available on the NIU Project Calendar and After Hours Outages web page at http:// www.ttuhsc.edu/it/helpdesk/niu/. We encourage our customers, especially those who work late, to keep checking the outage web page to know when their office areas will be affected. Edge closet upgrades will start promptly at 6PM. We are very excited about our new network and our new network partner Nortel. We know that this new network will position our Institution to continue on its educational and research path to excellence for the next decade. PAGE 12 Network Access Controls (And What That Means For The User) By Lane Timmons Senior Director Security & Networking Each day at Texas Tech University Health Sciences Center, about 10,000 individual users take advantage of network resources. These users include students, faculty, staff, vendor partners, and guests of all types. Generally speaking, each of these user types needs or wants access to different resources on the network. For example, just about everyone utilizes email services and the Internet. Then students may be studying using the WebCT services while faculty and staff may be accessing and updating patient’s medical records or working with scheduling and billing. Our guests may be working to support specific computer systems on the network such as air handler control systems, electron microscopes or large printers and copiers. Unfortunately, guests (or anybody with a laptop) can bring with them undesirable and uninvited viruses or other malicious code. These computers could then work to undo our security measures from within our network and behind our main line defenses against Internet attacks. Therefore, these mobile computers place our Patient Health Information and all the other vital computerized services that we offer at risk. This is one of the primary reasons behind Network Access Control (NAC) systems. It allows the Information Technology Security team to be able to verify that computers belong on the network and that those computers are safe and following best practices and Institutional policies. In addition, NAC can prevent certain computers from attempting to access servers with no reason, such as an outside vendor’s computer attempting to access medical records servers. Since there is no need for that access, there should be no “pathway” for that computer to access the server. Therefore, any virus that a guest computer might be infected with will have no opportunity to infect or otherwise “bother” Institutional services/servers. While it is important that each authorized individual has the ability to access the systems they need in order to do their jobs, it is not important that someone working on the air conditioner units have access to the servers containing TTUHSC’s medical records. In fact, best security practices would state just the opposite is true. Network security should actively seeks to reduce unnecessary access whenever possible. That way, if the vendor/partner brings a laptop computer which is infected onto our network, that computer will have restricted access and therefore limit the potential damage to a much smaller group than “every computer on the network”. In order to enable NAC to understand which computers should have general access to the network and which ones shouldn’t, a special client must be installed on all Institutional computers. This client is known as the “Tunnel Guard” agent. The Tunnel Guard agent serves to authenticate the computer on the network. It then verifies that it has all necessary patches, antivirus software, and meets all Institutional policies concerning network security. If a computer joins the network that doesn’t have the client installed, NAC treats the new computer as a guest and provides it very restricted access to network resources. See Security on Page 14. TechTalk PAGE 13 Security (continued) The primary network resource that the guest computers will have access to is “remediation” services. The process of remediation allows the user to have access, via a special web page to instructions, help desk contact information, software, and other tools in order for their computer to become authorized to access network resources as needed to perform their job functions. This is accomplished by the temporarily unauthorized user opening a web browser, then they will be automatically redirected to TTUHSC remediation services website. Proactively, PC Support will add the Tunnel Guard agent onto the Institutional computer image that Dell pre-loads onto all computers destined for TTUHSC. Most of the desktop computers at TTUHSC will have the agent pre-installed without the users having to do anything. However, currently existing desktop computers and computers purchased by individuals, such as laptops, will need to have the agent installed. The Information Technology Division is working on several ways to do this including “pushing” the agent and remediation services. Remediation options will include a webpage with all the software and instructions needed for a user to get the agent installed and their computer added to the network. It is a fairly simple and straight forward process but, of course, the Help Desk and PC Support will be available to assist users as needed. By bringing an infected laptop from outside onto the network, the guest user unknowingly circumvents many of the defenses designed to prevent intrusion from the Internet. It’s also a tempting goal for someone who might be intentionally trying to circumvent network defenses. All the firewalls and intrusion prevention systems in the world won’t do you any good if you allow unrestricted access to your local area network. If someone can simply walk up and plug in to a network (or utilize a wireless network), and thereby circumvent all the defenses which have been prepared to prevent unwanted traffic from arriving from the Internet, that network is very much at risk. Network Access Controls prevents this situation and adds another layer of protection for any network. The point being this will stop unauthorized access to vital network resources. That is why TTUHSC is planning to deploy Network Access Controls. While NAC will certainly create some extra work for the PC Support and Help Desk groups as well as new users and people with new computers, it is very important that we take the time and effort necessary to perform the needed steps. Given the state of security and the current environment on the Internet plus all the rules and regulations governing privacy for patient health information and financial concerns, it is very important that Texas Tech University Health Sciences Center take the steps necessary to protect our valuable and private data. Network Access Controls will provide a major step forward towards a more secure network and help us to guarantee patient health information remains private. Letters To The Editor Do you have a question or a concern for the IT Division? Or do you just want to share a comment about the service you recently received? Send it to the Editor at yung.ng@ttuhsc.edu. Please note: all submissions to Letters To The Editor become the property of the IT Division and may be edited for content/length. TechTalk PAGE 14