Policy Effective Date August 12, 2015 Chapter Name Networking Chapter Number 6.5 Date of Last Revision August 12, 2015 Title Active Directory Administration 1.0 Purpose This policy describes Active Directory administration at Eastern Michigan University. This policy shall have standards, guidelines and procedures that impose restrictions and best practices for interacting with Active Directory. 2.0 Scope This policy shall apply to all Eastern Michigan University student, staff, faculty, and guests who interface with the Active Directory environment. 3.0 Policy Active Directory (AD) is a directory service that allows users and computers to easily interact on a network while allowing for administrators to assign and enforce security and usability policies upon the users and computers. AD is the method that allows users to log into computers using their NetID credentials on campus. It is also the authentication method used for many services and applications at the University. Administrators may use AD to enforce policies that increase the security of the computer. These policies can also be used to easily deploy new features or settings to campus such as adding printers or installing new software. Because AD is a critical infrastructure component at the University, any changes to its configuration shall be managed with care to avoid service disruption. Therefore only Active Directory Administrators (ADAs) will be permitted to make changes that affect the overall functionality of AD. 4.0 Responsibility for Implementation The Director of Network and Systems Services is responsible for implementation of this policy. 5.0 Enforcement Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate legal authority for investigation. The University reserves the right to protect its electronic resources from threats of immediate harm. This may include activities such as disconnecting an offending computer system from the campus network, terminating a running job on a computer system, or taking other action. IT Policy Form Version 3.0 Page 1 of 2 6.0 Definitions Term NetID 7.0 Revision History Description James Pringle IT Policy Committee 1st review IT Policy Committee 2nd review Approved by CIO IT Policy Definition The EMU username and password used by most EMU information systems for authentication. These credentials can be retrieved at https://account.emich.edu. Approval Date 3/10/2015 7/9/2015 8/6/2015 8/12/2015 Page 2 of 2