Campus Security Initiative 2023/2024:
CSE information

Notes for CSE people regarding the campus security initiative beginning in Fall 2023.

This project is driven by the campus Cybersecurity Operations Group (CSOG), and they are working with CSEHelp via the Jacobs IT group (Office of Engineering Computing, oec@ucsd.edu).

tl;dr

If you're just looking for the link to the JSOE installers:  here it is (each folder contains Linux/Mac/Windows-specific instructions).  Otherwise, please read on...

Quick Summary

If you have a Mac/Windows/Linux computer with a fixed hostname on a campus network, that computer should have Qualys (vulnerability management) and Trellix (antivirus) agents installed and configured to communicate with campus-run servers that monitor the security state of overall campus computing.

OEC is providing installers (see below).  Those files should do the install such that the software will be already correctly configured once installed, with no further intervention.

This applies to most university-owned Windows, Mac, and Linux computing equipment using fixed hostnames on UCSD networks.   Those using only dynamic addressing (dhcp) or wi-fi are exempt, as is non-university-owned equipment.

The OEC-provided installers (link below) should install and properly configure the agents.   If installed correctly via the installers, you do not need to do any further configuration.  Each subfolder (Linux/Mac/Windows) has the files you'll need, along with installation instructions.

Please note that campus will be monitoring the entire relevant IP address space, looking for computers that are not running these agents.  We have not seen an official notice detailing what they will do regarding computers that are not running the agents; our guess is that it may involve network blocking, but that's just speculation at this time.  We have requested that campus make their intention clear.

Installation

Non-Routable Addresses

If your host has an address in the "non-routable" address ranges (generally, starts with "172.xxxx"), you will need to run an extra command when doing the install (as of 2023/01).  OEC is currently looking at this.

Exceptions

Other resources: