FAQ
Am I responsible for personally installing the endpoint tools on my device?
While you are responsible for ensuring your GT-owned device is secured, please work with your local IT professional(s) to assist you to accomplish this.
What are the endpoint protection and management tools and what do they do?
The endpoint protection solutions are:
Cortex XDR (Currently sunsetting FireEye) – Modern anti-virus, threat detection and response. This blocks malware using both traditional signature-based and machine learning based engines. It enables Georgia Tech’s Security Operations Center (SOC) within Cyber Security to detect, quarantine, investigate, and mitigate system threats.
Qualys – Vulnerability detection. This detects and reports software that is not patched and/or misconfigured to SOC.
The endpoint management solutions are:
SCCM/InTune – Windows endpoint and configuration management. Helps keep system parameters and software properly configured.
JAMF – Apple endpoint and configuration management. Helps keep Apple system parameters and Apple software properly configured. Allows self-service installation of many GT licensed and other software tools.
SaltStack – Endpoint and configuration management. Helps keep system parameters and local software properly configured for Windows, Mac, and Linux.
Which endpoint tools are required?
The endpoint protection solutions, Cortex XDR and Qualys, are required for all machines and the appropriate management agent is required based on the device type: SCCM/InTune for Windows, JAMF for Mac, and SaltStack for Linux.
What about GT-issued mobile phones and tablets?
GT-owned mobile devices and tablets must be enrolled in endpoint management and secured by encryption with PIN/password.
Are these tools “Big Brother spyware” that track everything I do online using my GT equipment?
No. In order to apply patches and updates, the tools are run with administrator/root/system-level privileges. Like all GT systems and networks, these will be subject to the Georgia Tech Data Privacy Policy In particular, such access is only used for legitimate business purposes (e.g. to comply with legal requirements, maintain the security of GT networks, systems, and data, to diagnose and correct problems with system software or hardware, etc.). Please review the privacy policy for further details.
Where can IT professionals find more information?
A series of knowledge base articles are shared on ServiceNow at Services.gatech.edu.