Skip to main content

Personal Firewall Guidelines


Fordham IT
Audience Faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors.
Effective Date 02/11/2011
Implementation History
Review Frequency: Triennial 
Responsible Person: Senior Director, IT Security Operations and Assurance 
Approved By: CISO
Background Information The purpose of this guideline is to ensure that appropriate measures are taken to protect IT Resources from malicious and unauthorized activity.


Firewalls are used to prevent unauthorized access to IT Resources.

IT Resources include computing, networking, communications, application, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Guidelines Statement

  • Firewall software should be installed on all IT Resources that connect to the University’s networks. 
  • For information on the University’s standard firewall software, call IT Service Desk Level 1 at 718-817-3999 or email to obtain a copy or update software.  
  • If applicable, enable your operating system’s (i.e., Windows®1, Mac OS®2) built-in firewall. 
  • Fordham no longer provides firewall software for personal devices. Users should install a firewall solution and refer to the documentation provided with their software. 

Related Policies, Procedures, and Forms

Revision History

Version Date Description
1.1 02/01/2011 Initial document
1.1.2 11/13/2019 Update to links
1.1.3 01/16/2020 Updated statement
1.1.3 02/05/2021 Updated review frequency and statement