Skip to main content

Personal Firewall Guidelines


Fordham IT
Audience Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors.
Effective Date 02/11/2011
Implementation History
Review Frequency: Every Three Years
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
Background Information The purpose of this guideline is to ensure that appropriate measures are taken to protect IT Resources from malicious and unauthorized activity.


Firewalls are used to prevent unauthorized access to IT Resources.

IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Guidelines Statement

  • Firewall software should be installed on all University IT Resources.
  • For information on the University’s standard firewall software, call IT Customer Care at 718-817-3999 or email to obtain a copy or update software.
  • If applicable, enable your operating system’s (i.e., Windows®1, Mac OS®2) built-in firewall.
  • Departments and individuals who choose to use firewall solutions other than the Fordham IT standard firewall solution should refer to the documentation provided with their software because:
    • they are responsible for maintaining and updating the software they have installed, and
    • the University may not support those products.

Related Policies, Procedures, and Forms

Revision History

Version Date Description
1.1 02/01/2011 Initial document
1.1.2 11/13/2019 Update to links
1.1.3 01/16/2020 Updated statement
1.1.3 02/05/2021 Updated review frequency.