
Incoming Student & Resident Tech Requirements Contents Introduction .................................................................................................................................................. 2 Minimum Laptop/Desktop Requirements .................................................................................................... 2 Which Version of Windows Operating System Am I Running? ................................................................. 2 Where to Purchase New Personal Devices ............................................................................................... 2 Minimum Antivirus Requirements ................................................................................................................ 3 Antivirus for Phones and Tablets .............................................................................................................. 3 Choosing an Antivirus Product .................................................................................................................. 4 Minimum Virtual Privacy Network Requirements ........................................................................................ 4 General ...................................................................................................................................................... 4 Virtual Private Network (VPN) .................................................................................................................. 4 Virtual Desktop Infrastructure (VDI) ......................................................................................................... 5 Desktop Client ....................................................................................................................................... 5 Web Client ............................................................................................................................................ 5 Encryption ..................................................................................................................................................... 5 What is Encrypting Your Personal Device? ............................................................................................... 5 Why Isn’t a Login Password Enough? ....................................................................................................... 5 Verify That Your Version of Windows Supports Encryption ..................................................................... 6 Encrypt Your Windows Device (Device Encryption) ............................................................................... 11 What Is Device Encryption? ................................................................................................................ 11 Is It Available on My Device? .............................................................................................................. 11 Take a Screenshot of Your Device ID (Windows) .................................................................................... 12 Encrypt Your Windows Device (BitLocker) .............................................................................................. 14 Take a Screenshot of Your Proof of Encryption (Windows) .................................................................... 16 Encrypt Your Apple Device ...................................................................................................................... 20 Take a Screenshot of Your Serial Number (Apple) .................................................................................. 22 Take a Screenshot of Your Proof of Encryption (Apple) ......................................................................... 23 Tufts-Approved Tools for Staying Connected ............................................................................................. 25 Zoom Recommendations ........................................................................................................................ 25 How to Log in to Your Tufts Zoom Account ............................................................................................ 25 Tufts Zoom User Guide ........................................................................................................................... 25 Zoom Help Center ................................................................................................................................... 25 Cisco Webex Recommendations ............................................................................................................. 25 Cisco Jabber Recommendations ............................................................................................................. 25 Page 1 of 25 Introduction This past year has required all of us to rely heavily on technology as we participate virtually in academic and social activities. As an incoming member of the Tufts University School of Dental Medicine (TUSDM), you will continue to engage in online academic experiences, and in addition to these online classes, you will also be expected to communicate with your classmates and instructors using Tufts-approved applications, conduits, and technology. This increasing use of technology comes with an increasing concern about security and privacy. Therefore, TUSDM requires your personal devices (laptops, tablets, phones) to meet certain security and encryption requirements, which we have outlined in the following pages. TUSDM also recommends certain verified applications/tools for connecting and communicating with peers and school representatives. Minimum Laptop/Desktop Requirements To conduct any Tufts-related business (e.g., classes, exams, email, axiUm, and other dental-related applications) your personal device must meet the following minimum specifications (see Table 1): Table 1: Minimum Laptop/Desktop Requirements Specification Minimum Recommended Operating System Mac OSX 10.14 or Windows Mac OSX 10.15 or Windows 10.1903 (64 bit) 10.1903 (64 bit) Processor Intel i5 Intel i5 Screen Size (inches) 13 15 RAM (GB) 8 16 Hard Drive Capacity (GB) 256 512 For any Windows operating system, the release date must be March 2019 as a minimum, but a release date of 2020 or later is recommended. Which Version of Windows Operating System Am I Running? If necessary, here is a link for determining which version of Windows you are currently running on your personal device: • https://support.microsoft.com/en-us/windows/which-version-of-windows-operating-system-am-i- running-628bec99-476a-2c13-5296-9dd081cdd808 Where to Purchase New Personal Devices If necessary, here are some links for purchasing new personal devices, including products from Apple, Dell, and Lenovo: Page 2 of 25 • Apple: https://www.apple.com/us_edu_53153/shop?afid=p224%7C6759139&cid=AOS-US- CAMPUS-ShopNow • Dell: http://www.dell.com/us/eep/p/?cs=2236&scat=root&link_number=17970622&isredir=true • Lenovo: https://www.microsnelaptops.com/tufts/store_main.aspx Minimum Antivirus Requirements Faculty, students, and staff must have antivirus software installed and running on their personal devices. Several antivirus options are available, for free and for purchase: • Trend Micro: Faculty, students, and staff may purchase a version of Trend Micro through the university at a discount. Instructions are located at https://access.tufts.edu/antivirus. • Other Inexpensive or Free Antivirus Options: Many of the vendors listed below offer both free and for-purchase versions of their software. We recommend downloading or purchasing these directly from the vendor’s website or through a reputable retailer, such as Amazon, Best Buy, etc. Make sure when downloading software, that the website is a trusted site like download.cnet.com, support.apple.com, or the primary vendor: ▪ Avast: www.Avast.com ▪ AVG: www.AVG.com ▪ Avira: www.Avira.com ▪ Bitdefender: www.Bitdefender.com ▪ Malwarebytes: www.malwarebytes.com ▪ McAfee: www.mcafee.com ▪ Panda: www.pandasecurity.com ▪ Sophos: www.Sophos.com ▪ Symantec Norton: www.Norton.com Never purchase or load antivirus software from a pop- up dialog box or from a link sent to you in an email (unless you just ordered it and it is the installation message). If you want that vendor’s product, always go to the original vendor site or a known distribution site. Why? Criminals often use pop-ups or emails to trick people into downloading files embedded with malicious software in order to steal credit card information through a fake purchase process. Antivirus for Phones and Tablets There are antivirus applications for phones and tablets. Always purchase these products through vendor-approved and -tested phone/tablet software sites. We recommend these websites: • iOS/Apple Devices: iTunes, Apple App Store, or www.apple.com • Android/Google Devices: Google Play Store play.google.com/store • Windows Devices: www.microsoftstore.com Page 3 of 25 Choosing an Antivirus Product Choosing an antivirus product can seem overwhelming. There are so many choices available, and not all products maintain their effectiveness. When deciding, consider aspects such as your operating system, budget, features, and ease of use. In addition to vendor sites, here are some other sites to that provide good product information: • AV Test: ▪ https://en.wikipedia.org/wiki/AV-TEST ▪ https://www.av-test.org/en/about-the-institute/ • The best antivirus software for Android: https://www.av-test.org/en/antivirus/mobile- devices/android/ • The best antivirus software for Windows Home User: https://www.av-test.org/en/antivirus/home-
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages25 Page
-
File Size-