ZotDefend Cybersecurity Package Installation

These instructions are intended for Engineering administrative staff in the Dean's Office and academic departments, and for those with devices managed by Engineering IT. For faculty, researchers, and staff that manage their own devices, including research centers, see these instructions.
Only University-owned devices (including those purchased with research grants or gifts) are required to install the cybersecurity packages. Please do not enroll personal devices.

The required cybersecurity package has likely already been installed on your device in the background. Please verity compliance by following the specific instructions for your device below. If you need assistance or do not believe the security package has been installed, contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.

Windows Computers

  1. Click the up arrow in the the system tray (the area near the clock usually in the bottom-right of the screen)
  2. In the menu that opens, double click the Duo Desktop icon (white in the shape of a "D")
  3. Wait for the health check to complete
  4. If all green checks are reported, the device is compliant and no further action is required.
  5. If any red exclamations are reported, please contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.

Apple Computers

  1. In the menu bar at the top of your screen, click the Duo Desktop icon (white in the shape of a "D")
  2. Wait for the health check to complete
  3. If all green checks are reported, the device is compliant and no further action is required.
  4. If any red exclamations are reported, please contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.

Exceptions / Other Devices

The security package is only required on devices that will support it. Generally, these will be laptops, desktops, and servers. Any other exceptions will be reviewed by OIT security on a case-by-case basis, with approvals for extremely rare cases such as if it completely impedes university work from being done. Below is a non-exhaustive list of current exceptions:

  • Cell Phones
  • Tablets
  • IOT Devices
  • Networked cameras
  • Networked webcams
  • Other specialty devices