For help with IT Security incidents or applications, please see the list below.
The University of Oklahoma supports an IT Exception process where a particular condition ("an exception") is defined as “a variance from IT Policy or Standard” that occurs after a proposed policy or standard has been released. Such instances must be documented using the IT Policy and Standards Exception Process by a Business or IT Process Owner owning the risk and approved by an authorized IT Executive (an owner of the IT Policy that governs this policy/standard).
To submit an exception, please fill out the Policy/Standard Exception Form.
Need to report a security incident?
- Using your @ou.edu email address, send an email to firstname.lastname@example.org OR
- Use our online service located here, Click on General IT Support, Fill out the form and use "Security Incident" as the subject.
Compromise Consultation / incident response - If you have been notified of an account compromise or think that your account has been compromised and you would like a consultation, email email@example.com
The Proofpoint Messaging Security Gateway is an application that provides spam, virus, and content policy infrastructure to OU’s email applications. All incoming email is inspected by the Proofpoint Messaging Security Gateway as soon as it arrives at our campus. Messages that contain a virus, spam, or inappropriate content are sent to a Quarantine area.
Through spam.ou.edu, all users have access to a personal Proofpoint online digest to view emails that have been filtered and quarantined as suspected spam messages.
To access your online digest, go to spam.ou.edu and sign in with your OUNet ID and password. For more information visit our AskIT article.
To report a phishing or spam email, please email firstname.lastname@example.org.
- Include the phish/spam message as an attachment or send email headers of the phish/spam message.
- For instructions on how to include email headers, visit our Email Headers self-help article.
For more information, please visit our Bogus Emails self-help article.
Dell Data Protection | Endpoint Security Suite Enterprise harnesses the power of an advanced threat prevention engine to prevent the execution of advanced threats in real-time on each endpoint in the organization. Free for Faculty and Staff to use on University owned devices.
- Protection and detection of previously undetectable advanced threats
- Not cloud dependent for sensitive environments
- No daily .DAT updates which eliminates the need for an "always-on" connection
- Extremely low performance impact with runtime execution to dramatically reduce overhead
To download and install, visit ITStore.ou.edu. Login with your OU NetID, and it is located under 'Free Software Downloads", then "Security and Antivirus". (It is only to be installed on University owned machines)
For questions or help with DDPE, contact email@example.com
Duo is a cloud based service that provides multi-factor authentication to applications and services. Multi-factor authentication verifies identities via a second factor, such as an application push to your Duo-registered smartphone. Duo works by exchanging encrypted keys between the client, server and secondary factor when authenticating. This prevents unauthorized persons from gaining access even if they have obtained a valid password.
It is highly recommend that sensitive and protected University data be secured by multi-factor authentication. Data that could compromise the University’s reputation, property, employees, students, or interests if stolen is a strong candidate for Duo.
For more information visit our AskIT article.