CS logo


 

Laptop Security Procedures

The following procedures correspond to Temple University's Laptop Security Guidelines. The purpose of these guidelines is to establish best practices for users who are required to use a Temple University owned laptop to conduct University business. It is the user’s responsibility to take appropriate precautions to prevent loss, theft, and/or damage to their laptop and information stored on their laptop.


Table of contents

Selecting a strong password

Changing your Windows or Macintosh Password
Configuring your screen saver to be password-protected and to activate in 25 minutes
Configuring your Power Options to prompt for password when computer resumes from standby
Installing Temple’s Symantec Endpoint Protection Software
Setting up a VPN account
Disable file sharing
Identifying an ad hoc wireless network
Displaying a shared drive
Additional Macintosh Security Configuration Settings



Selecting a strong password

The following are some tips for creating a secure password:

• Use a pass phrase, leaving out any spaces, dashes, or other special characters other than $, #, and @. For example, the phrase "I am free at eight" could become Imfree@8
.

You can also use the first letter of each word to create a pass phrase. For example, the phrase "I know what I am going to(2) do today" becomes IkwIag2dt.

• Don't use names or nicknames that someone who knows you can easily guess, such as the name of your significant other.

• Use a combination of uppercase and lowercase characters and at least one number
.

• Use at least eight characters.


Changing your Windows or Macintosh password

Windows XP and Windows Vista

Note: Once you change your password, you may not be able to reuse it.

1. Press the Ctrl, Alt, and Delete keys simultaneously.

2. Click on Change Password (Windows XP) or Change a password (Windows Vista).

3. In the Old password box, type your current password. If you don't currently have a password, leave this box empty.

4. In the New password box, type your new password.

5. In the Confirm New password box, retype your new password.

Macintosh

1. Click on the Apple menu and select System Preferences.

preferences.jpg

2. Under the System heading, click on Accounts.

3. Click on Change Password.

a) In the Old Password box, type your current password.

b) In the New Password box, type your

c) In the Verify box, type your

d) In the Password Hint box, type a hint to help you remember your password.

4. Click on Change Password.


Configuring your screen saver to be password-protected
and to activate in 25 minutes

Windows XP

1. Click on Start, point to Settings, and select Control Panel.

2. If Switch to Category View appears on the upper left portion of the screen, click on this link.

Category View

3. Click on Appearance and Themes and then click on Choose a screen saver.

WinXP-Display Properties.jpg

4. In the Wait box, select 25 or less.

5. Click on On resume, password protect.

6. Click on OK.

Windows Vista

1. Click on the Start button (Start Button). Then click on Control Panel and select Appearance and Personalization.

2. Under Personalization, click on Change screen saver.

screensaver.jpg

3. In the Wait box, select 25 or less.

4. Click on On resume, display logon screen.

5. Click on OK.

Macintosh

1. Click on the Apple menu and select System Preferences.

preferences.jpg

2. Under the Personal heading, click on Desktop & Screen Saver.

3. Drag the Start screen saver slider control to 25 or less.

screen saver.jpg

4. To exit, click on the System Preferences menu and select Quit System Preferences.


Configuring your Power Options to prompt for password when computer resumes from standby.

Windows XP

1. Click on Start, point to Settings, and select Control Panel.

2. If Switch to Category View appears on the upper left portion of the screen, click on this link.

Category View

3. Click on Performance and Maintenance and then select Power Options.

WinXP-Power Options Properties.jpg

4. Click on the Advanced tab.

5. Click on Prompt for password when computer resumes from standby.

6. Click on OK.

Windows Vista

1. Click on the Start button (Start Button). Then click on Control Panel and select Hardware and Sound.

2. Under Power Options, click on Require a password when the computer wakes.

power options.jpg

3. Click on Change settings that are currently unavailable and then click on Continue.

4. Under Password protection on wakeup, click on Require a password (recommended).

5. Click on Save settings.

Macintosh

1. Click on the Apple menu and select System Preferences.

preferences.jpg

2. Under the Personal heading, click on Security. Depending on your version of Mac OS X, one of the following windows appears:

Security window (Mac OS X Tiger)

Security window on Mac-Tiger

Security window (Mac OS X Leopard)


Security window on Mac OS-Leopard

3. Click on Require password to wake this computer from sleep or screen saver.

4. To exit, click on the System Preferences menu and select Quit System Preferences.


Installing Temple’s Symantec Endpoint Protection Software

While connected to Temple’s network on campus, go to http://antivirus.temple.edu

Then click on the link depending on whether you are using Windows XP, Windows Vista, or Macintosh OS X.

Note: Most Windows users should choose the 32-bit option.


Setting up a VPN account

Request a VPN account by filling out the Telecommunications Customer Service Order (CSO) form, located at www.temple.edu/cs/telecommunications/forms.htm.

You will receive an e-mail notification when the account is created, directing you to Temple’s download web site (http://download.temple.edu) where you can download and install the Nortel Contivity VPN Client.


Disable file sharing

Windows XP

1. Click on Start, point to Settings, and select Control Panel.

2. If Switch to Category View appears on the upper left portion of the screen, click on this link.

Category View

3. Click on Performance and Maintenance and then select Administrative Tools.

4. Double-click on Computer Management.

5. Click on the plus sign (+) next to Shared Folders and then click on Shares. The following is an example of what should appear:

Computer Management screen

The C:\WINDOWS directory should appear as an ADMIN$ share, and each hard drive should appear as a shared path, and as an IPC$ share. These are the default shares and should not be removed or modified. They are used by Microsoft to update your computer.

If other shared folders are listed, right-click on each of them and select Stop Sharing.

Windows Vista

1. Click on the Start button (Start Button). Then click on Control Panel and select System and Maintenance.

2. Click on Administrative Tools.

3. Double-click on Computer Management and click on Continue.

4. Click on the right arrow next to Shared Folders and then click on Shares. The following is an example of what should appear:

Computer Management Screen (Vista)

The C:\WINDOWS directory should appear as an ADMIN$ share, and each hard drive should appear as a shared path, and as an IPC$ share. These are the default shares and should not be removed or modified. They are used by Microsoft to update your computer.

If other shared folders are listed, right-click on each of them and select Stop Sharing.

Macintosh

1. Click on the Apple menu and select System Preferences.

preferences.jpg

2. Under Internet & Network, click on Sharing.

3. Make sure that Personal File Sharing is turned off.

4. To exit, click on the System Preferences menu and select Quit System Preferences.


Identifying an ad hoc wireless network

Windows XP

Ad hoc network Windows XP

Windows Vista

Vista Ad hoc icon

Macintosh

Ad hoc network on a Macintosh


Displaying a shared drive

Windows XP

1. While connected to Temple Active Directory, click on My Computer.

network drive.jpg

2. Click on My Network Places. Any shared drives that your computer is mapped to will appear.

my network places.jpg

3. Double-click on the shared drive icon to view the contents of the drive.

4. Drag and drop your files to the drive.

Windows Vista

1. While connected to the Temple Active Directory , click on the Start button (Start Button) and select Computer. Any shared drives that your computer is mapped to will appear.

vista mapped drive.jpg

2. Double-click on the shared drive icon to view the contents of the drive.

3. Drag and drop your files to the drive.

Macintosh

1. While connected to Temple’s network, click on the Go menu and select Connect to Server.

Connect to Server Macintosh

2. Select the address of the server containing the share drive. Then click on Connect. Any shared drives that are mounted on your computer will appear on the Desktop as a globe icon.

sharedfoldericon.jpg

3. Double-click on the shared drive icon to view the contents of the drive.

4. Drag and drop your files to the drive.


Additional Macintosh Security Configuration Settings

1. Click on the Apple menu and select System Preferences.

preferences.jpg

2. Under the Personal heading, click on Security. Depending on your version of Mac OS X, one of the following windows appears:

Security window (Mac OS X Tiger)

Security window on Mac-Tiger

Security window (Mac OS X Leopard)


Security window on Mac OS-Leopard

3. Click on the following items:

  • Disable automatic login
  • Log out after 60 minutes of inactivity
  • Use secure virtual memory

4. To exit, click on the System Preferences menu and select Quit System Preferences.

 


© Copyright 2012. Temple University.
All rights reserved.