Body
Jump to:
Overview |
Applies To |
Why Devices Are Managed |
Management Tools |
Security Software |
What Happens at Setup |
Your Responsibilities |
If a Device Is Not Used |
Things to Know |
Need More Help
Overview
Understand how your university computer is managed, what tools IT uses, and what you need to do to keep your device secure and working properly.
Back to top
What This Is About
You use a university-provided computer and want to understand how it is managed. IT uses security and management tools to keep devices updated, protected, and connected to university systems.
Back to top
Applies To
- Faculty and staff using university-owned computers
- Windows, macOS, and iPad devices managed by IT
Back to top
Why Devices Are Managed
- Keep your data secure
- Ensure software stays up to date
- Provide access to university systems
- Meet campus security requirements
All devices follow university and campus security standards.
Back to top
Management Tools
macOS and iPad Devices
- Managed using Jamf
- Handles setup, updates, and security settings automatically
Windows Devices
- Managed using:
- Microsoft Endpoint Configuration Manager (MECM) – older system
- Microsoft Intune – newer, cloud-based system
- Devices are gradually moving from MECM to Intune
Back to top
Security Software
- All devices use CrowdStrike for antivirus and threat protection
- Provides real-time protection against security risks
Back to top
What Happens at Setup
- Your device is configured automatically when you sign in
- Applications and settings install in the background
- Security policies are applied automatically
You may notice updates or installations during first use.
Back to top
Your Responsibilities
- Use each assigned device at least once per month
- Connect to the internet regularly for updates
- Do not remove management or security software
- Contact IT if you notice issues with updates or access
Back to top
If a Device Is Not Used
- Devices may fall out of compliance if not used regularly
- This can result in:
- Missed updates
- Security risks
- Limited access to university systems
Back to top
Things to Know
- All university devices must be managed by IT
- Devices not enrolled in management systems are not supported
- IT may apply updates or settings automatically
- Some changes may happen in the background without notice
Back to top
Need More Help?
If you have questions about your device or how it is managed, contact the IT Partners Help Desk.
Back to top
Additional Information
- Campus Endpoint Management Documentation
- College of Education Computing Equipment Guidelines
- Email: support@education.illinois.edu
Search Criteria
- device management
- why is my computer managed
- IT controls on my computer
- Jamf Intune MECM
- university computer security
Keywords
device management, Jamf, Intune, MECM, CrowdStrike, endpoint management, university IT, managed computer, security compliance