Skip to main content

Personal Firewall Guidelines

Sponsor

Fordham IT
Audience Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors.
Effective Date 02/11/2011
Review Date 02/06/2018
Implementation History
Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
Background Information The purpose of this guideline is to ensure that appropriate measures are taken to protect IT Resources from malicious and unauthorized activity.

Definitions

Firewalls are used to prevent unauthorized access to IT Resources.

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Guidelines Statement

  • Firewall software should be installed on all IT Resources that connect to the University’s networks.
  • For information on the University’s standard firewall software, call IT Customer Care at 718-817-3999 or e-mail HelpIT@fordham.edu to obtain a copy or to update software.
  • If applicable, enable your operating system’s (i.e., Windows®1, Mac OS®2) built-in firewall.
  • Departments and individuals who choose to use firewall solutions, other than the Fordham IT standard firewall solution, should refer to the documentation provided with their software because:
    • they are responsible for maintaining and updating the software they have installed, and
    • the University may not support those products.

Related Policies, Procedures, and Forms

Revision History

Version Date Description
1.1 02/01/2011 Initial document
1.1.2 11/13/2019 Update to links