ZotDefend Cybersecurity Package Installation
The required cybersecurity package has likely already been installed on your device in the background. Please verity compliance by following the specific instructions for your device below. If you need assistance or do not believe the security package has been installed, contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.
Windows Computers
- Click the up arrow in the the system tray (the area near the clock usually in the bottom-right of the screen)
- In the menu that opens, double click the Duo Desktop icon (white in the shape of a "D")
- Wait for the health check to complete
- If all green checks are reported, the device is compliant and no further action is required.
- If any red exclamations are reported, please contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.
Apple Computers
- In the menu bar at the top of your screen, click the Duo Desktop icon (white in the shape of a "D")
- Wait for the health check to complete
- If all green checks are reported, the device is compliant and no further action is required.
- If any red exclamations are reported, please contact Engineering IT at security@eng.uci.edu for assistance. Please include dates/time you are available to meet via remote support.
Exceptions
In addition to endpoint devices that are not compatible with the required security software (i.e. unsupported operating system), exceptions can generally be considered where the software would halt university business activities (teaching, research, administration), or if there are legal or contractual obligations that would conflict with using EDR software.
Exceptions would not be granted based on user preference, concerns about privacy or sensitivity of data, or smaller impact to performance that doesn’t halt university business.
These exceptions must be documented. Please submit the exception request form if you believe your device requires an exception. Each device requires a separate submission to ensure accurate reporting. If you have many devices, compiling a list with the operating system name and version and a description of each devices use case will expedite the process.
Long term exceptions will be reviewed by OIT security on a case-by-case basis, with approvals for extremely rare cases such as if it completely impedes university work from being done. Below is a non-exhaustive list of currently exempt devices:
- Cell Phones
- Tablets
- IOT Devices
- Networked cameras
- Networked webcams
- Other specialty devices (not laptops, desktops, or servers)
- Personal devices
- Devices not on the University network