Skip to main content

System Status: 

Minimum Standards

Find out how to comply with security standards for any device connected to the UC San Diego network.

Campus policy requires that all devices connected to the UCSD network adhere to the minimum network security standards. Devices that do not meet the standards or represent a security threat may be prevented from accessing the the campus network. The below outlines steps for meeting the most basic components of the standards, based on various perpsectives (from a computer user, remote user, system administrator, or administrative official). The complete standards are described in Network Security: Minimum Standards.

Computer user

  • Ask your desktop support person if your computer meets the minimum security standards, including:
    • Current anti-virus software
    • Active firewalls
    • Automated operating system patching
    • Automated updates for third party applications (such as Java, Adobe, Chrome, and Firefox)
    • If you don't have a desktop support person, you can obtain guidance from the IT Service Desk
  • If your computer does not meet the standards:
    • Ask your desktop support person to install the necessary software; or,
    • Get department approval to install the software yourself

Remote computer user or acting as your own system administrator

System administrator

  • Become familiar with the latest security standards
    • Review the existing Network Security Policy
    • Pay special attention to the minimum standards in Exhibit B of the policy
  • Update any noncompliant machines by installing antivirus and firewall software
  • Make sure operating systems have been updated

Administrative official

Become familiar with the dangers of network security breaches and the safeguards that UC San Diego is implementing.

  • Review the existing Network Security Policy.
  • Pay special attention to the minimum standards in Exhibit B of that policy.
  • Determine the impact on your unit.
  • Work with your department's system administrator(s) to make sure that all the computers in your area are compliant.
For more information, contact IT Services Security at
Note: this page has a friendly link that's easy to remember: