Securing your computer

Last updated Feb 21, 2024

UW–‍Madison’s Endpoint Management and Security policy (Source: policy.wisc.edu) requires devices that connect with UW–‍Madison online data to be actively managed and secured.

Follow the best practices in this guide to protect yourself — and to contribute to a safer computing environment for everyone.

Important!

If you work on a computer owned by UW–‍Madison, check with your department IT administrator before installing software or reconfiguring it.

If you are a student or you access UW resources from a home or other computer, please follow the steps below.

Follow these steps for your personal devices

This is an accordion element with a series of buttons that open and close related content panels.

Get help!

The DoIT Help Desk (Source: kb.wisc.edu) can answer your questions or connect you with the right group.

Report phishing and other abuse

If you encounter a suspicious email that claims to be from UW–‍Madison and requests any personal information, do not respond to it or click any links! Instead, click on the “Report Spam” or “Report Phish” located on the top right-hand corner of your O365 email account and in the “… ” at the top of the page in the most recent version of O365.

Related Docs

More guides on cybersecurity topics (Source: it.wisc.edu)