Policy

advertisement
Policy
Effective Date
August 12, 2015
Chapter Name
Networking
Chapter Number
6.5
Date of Last Revision
August 12, 2015
Title
Active Directory Administration
1.0 Purpose
This policy describes Active Directory administration at Eastern Michigan University. This policy shall have
standards, guidelines and procedures that impose restrictions and best practices for interacting with Active
Directory.
2.0 Scope
This policy shall apply to all Eastern Michigan University student, staff, faculty, and guests who interface with the
Active Directory environment.
3.0 Policy
Active Directory (AD) is a directory service that allows users and computers to easily interact on a network while
allowing for administrators to assign and enforce security and usability policies upon the users and computers.
AD is the method that allows users to log into computers using their NetID credentials on campus. It is also the
authentication method used for many services and applications at the University. Administrators may use AD to
enforce policies that increase the security of the computer. These policies can also be used to easily deploy new
features or settings to campus such as adding printers or installing new software.
Because AD is a critical infrastructure component at the University, any changes to its configuration shall be
managed with care to avoid service disruption. Therefore only Active Directory Administrators (ADAs) will be
permitted to make changes that affect the overall functionality of AD.
4.0 Responsibility for Implementation
The Director of Network and Systems Services is responsible for implementation of this policy.
5.0 Enforcement
Any employee found to violate federal or State of Michigan laws, EMU policies, procedures or standards of
conduct, will be subject to disciplinary action under University policy. Any student found to violate federal or State
of Michigan laws, EMU policies, procedures or standards of conduct, will be subject to disciplinary action under
EMU’s Student Code of Conduct. Any suspected violation of state or federal laws will be reported to the appropriate
legal authority for investigation.
The University reserves the right to protect its electronic resources from threats of immediate harm. This may
include activities such as disconnecting an offending computer system from the campus network, terminating a
running job on a computer system, or taking other action.
IT Policy
Form Version 3.0
Page 1 of 2
6.0 Definitions
Term
NetID
7.0 Revision History
Description
James Pringle
IT Policy Committee 1st review
IT Policy Committee 2nd review
Approved by CIO
IT Policy
Definition
The EMU username and password used by most EMU information systems for
authentication. These credentials can be retrieved at https://account.emich.edu.
Approval Date
3/10/2015
7/9/2015
8/6/2015
8/12/2015
Page 2 of 2
Download