Understand How Your Computer Is Managed

Jump to: Overview | Applies To | Why Devices Are Managed | Management Tools | Security Software | What Happens at Setup | Your Responsibilities | If a Device Is Not Used | Things to Know | Need More Help

Overview

Understand how your university computer is managed, what tools IT uses, and what you need to do to keep your device secure and working properly.

Back to top

What This Is About

You use a university-provided computer and want to understand how it is managed. IT uses security and management tools to keep devices updated, protected, and connected to university systems.

Back to top

Applies To

  • Faculty and staff using university-owned computers
  • Windows, macOS, and iPad devices managed by IT

Back to top

Why Devices Are Managed

  • Keep your data secure
  • Ensure software stays up to date
  • Provide access to university systems
  • Meet campus security requirements

All devices follow university and campus security standards.

Back to top

Management Tools

macOS and iPad Devices

  • Managed using Jamf
  • Handles setup, updates, and security settings automatically

Windows Devices

  • Managed using:
    • Microsoft Endpoint Configuration Manager (MECM) – older system
    • Microsoft Intune – newer, cloud-based system
  • Devices are gradually moving from MECM to Intune

Back to top

Security Software

  • All devices use CrowdStrike for antivirus and threat protection
  • Provides real-time protection against security risks

Back to top

What Happens at Setup

  • Your device is configured automatically when you sign in
  • Applications and settings install in the background
  • Security policies are applied automatically

You may notice updates or installations during first use.

Back to top

Your Responsibilities

  • Use each assigned device at least once per month
  • Connect to the internet regularly for updates
  • Do not remove management or security software
  • Contact IT if you notice issues with updates or access

Back to top

If a Device Is Not Used

  • Devices may fall out of compliance if not used regularly
  • This can result in:
    • Missed updates
    • Security risks
    • Limited access to university systems

Back to top

Things to Know

  • All university devices must be managed by IT
  • Devices not enrolled in management systems are not supported
  • IT may apply updates or settings automatically
  • Some changes may happen in the background without notice

Back to top

Need More Help?

If you have questions about your device or how it is managed, contact the IT Partners Help Desk.

Back to top

Additional Information

  • Campus Endpoint Management Documentation
  • College of Education Computing Equipment Guidelines
  • Email: support@education.illinois.edu

Search Criteria

  • device management
  • why is my computer managed
  • IT controls on my computer
  • Jamf Intune MECM
  • university computer security

Keywords

device management, Jamf, Intune, MECM, CrowdStrike, endpoint management, university IT, managed computer, security compliance

Was this helpful?
100% helpful - 1 review