Sample Test Data Discovery

Data Discovery

Data Discovery is a foundational component of the multi-year Data Excellence initiative, which reimagines how data is leveraged across Georgia Tech to tell compelling stories and drive decisions.

Why Data Discovery?

Through Data Discovery, we will obtain a deeper understanding of our business applications and data assets. The discovery process will include cataloging and categorizing data which will inform further expansion and refinement of enterprise data services. This enhanced knowledge positions the Institute to find more opportunities to maximize the value and utilization of data, ultimately providing additional pathways for academic and business partners to access and leverage this data to inform decisions.

Discovery Phases

Please note that many of these details are specific to IT professionals and those that self-administer their machines. 

Phase 1

  • Phase 1 Complete 30% 30%
Z

By August 31

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Z

By September 15

  • Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Z

By September 30

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

    Phase 2

    • Phase 2 Completion 5% 5%
    V

    Compliance by December 31, 2021

    Full Endpoint Compliance

    • Installation of endpoint management tools on all Institute-owned devices (workstations, laptops, and servers), including those in departments without local IT support.
    • Idle screen lock
    • Patch management
    • Host-based firewalls
    • Log management
    • Eula/Banner

    VPN Solution Transition

    Phase 2 also includes the complete transition from the Cisco AnyConnect VPN to the GlobalProtect VPN solution. While many students, faculty, and staff already use the GlobalProtect client and web-based solution, this phase ensures that all AnyConnect users completely transition to GlobalProtect. The transition dates vary based on your role at Georgia Tech and are shared below:

              • OIT System Administrators: 9/28/21
              • CSRs/IT Community: 11/2/21
              • Faculty/Staff/Employees: 12/21/21
              • Students/All Others: 5/10/22

    Inventory

    Complete inventory of Institute-owned devices due (Departments will be able to upload inventory data into a SnipeIT reporting instance)

    Knowledge Article – SnipeIT: Syncing Assets to the Roll up Instance>
    Knowledge Article – SnipeIT Inventory Rollup Process
    >
    Knowledge Article – SnipeIT – Rollup Attribute Requirement Details
    >

    Each department is expected to upload their inventory data according to the reporting schedule below. The intent of having an incremental reporting schedule is to ensure consistent progress is made by each unit before the inventory deadline of December 31, 2021. A report will be generated at the end of each reporting period and communicated to Georgia Tech Leadership to report overall inventory progress. Please note that December 31, 2021 is the deadline for Georgia Tech to have completed its first centralized asset endpoint inventory based on the USG Endpoint Audit findings and proposed Management Response.

    Reporting Schedule

                                • Period 1: 9/3 – 9/17
                                • Period 2: 9/17 – 10/1
                                • Period 3: 10/1 – 10/15
                                • Period 4: 10/15 – 10/29
                                • Period 5: 10/29 – 11/19
                                • Period 6: 11/19 – 12/1

    Phase 3

    • Phase 3 Completion 0% 0%
    V

    Compliance by July 31, 2022

    • Network-based enforcement and controlled admission will be implemented for Institute-owned devices. This restricts access to Georgia Tech’s network to Institute-owned endpoints with approved endpoint management and protection solutions installed.
    • Mechanisms will also be developed to control admission of BYOD devices accessing the GT network and application.
    • Device encryption
    • Administrative privileges
    • CASB
    • Sunsetting non-0365 mail servers