Configuring Devices

Note: Enforcement of configurations for personally-managed devices will be phased in, beginning with alerts of non-compliance and grace periods to resolve detected gaps.
D1: All devices connecting to or installed on a non-guest Harvard network or authenticating to Harvard applications must be configured for secure operation, including non-default unique passwords/credentials that limit access to authorized individuals and services, proper registration of the device on the network, current and supported operating system (firmware and software), regular updates and patching of firmware and software, encrypted storage where supported, and protections against installing or running malicious software where technically feasible.

See also: Level 2, Level 3, 1, 6, 7, 8, Devices

How to Comply