Service Summary
Information Technology Services (ITS) provides a dynamic, reliable, and secure computing environment for faculty, staff, and students to achieve their goals at George Mason. ITS requires that faculty and staff use George Mason-managed endpoint devices for their work and research. For details see Computer Standards below.
Managed systems may access software here:
> Log in to Software Center (Windows environment managed by SCCM)
> Log in to Mason Self Service (Apple environment managed by Jamf)
For additional information on how to auto-enroll in George Mason’s managed network (macOS), please contact ITS Support. Software applications, updates, and upgrades are available for managed George Mason-owned devices.
Two-Factor Authentication
Learn more about Two-Factor Authentication (2FA).
Getting This Service
How do I purchase a George Mason-managed endpoint device?
ITS has identified pre-configured endpoint device models from select manufacturers for purchase that ITS has tested with George Mason’s standard software image.
If your department has inquiries about these standards, a Desktop Consultation request form may be submitted.
ITS Approved Devices
> Update-to-date listing of approved devices
Additional Information
Computer Standards
Hardware
ITS recommends purchasing computers from the following approved vendors:
- Windows: Dell, CDW, Patriot Tech
- Apple: Apple e-commerce, CDW, Patriot Tech
See ITS-Approved Computer Hardware Standards for Faculty & Staff for preselected models that ITS can best support for all George Mason services.
Operating System
All computers must be running a supported operating system (OS) from its vendor. The OS must be patched to the latest version. Systems found not running a supported OS will be removed and blocked from accessing the George Mason network.
Software
ITS supports a wide array of business and academic software. Please visit this site for a comprehensive list of supported software and services. The following is the standard software load:
- Adobe Acrobat Reader
- Google Chrome
- Microsoft Defender
- Microsoft Office
- Microsoft OneDrive
- Mozilla Firefox
- VideoLAN VLC
- Zoom desktop app
Additional software can be installed via the Company Portal app on a Windows endpoint or Mason Self Service on a Mac endpoint. All third-party software must be updated with the latest security updates. ITS provides automatic third-party patching for the most common applications. The Architecture Standards Review Board must approve all software installed on George Mason endpoints.
Security
All George Mason endpoint computers are required to be centrally managed. This is achieved for PCs through George Mason’s Active Directory (AD) environment or JAMF for Mac systems.
ITS has developed and approved an endpoint security baseline that closely follows the NIST-800 recommendation. This baseline will automatically be applied to all managed systems through the associated management platform. To ensure systems are secure when left unattended, all systems will lock automatically after 15 minutes of inactivity from the end user.
George Mason endpoints are required to have Microsoft Defender ATP and Cisco Umbrella installed. These are installed and configured by ITS. These applications provide antivirus, firewall, and additional protection against malicious software. For additional information see Microsoft Defender.
Endpoint permissions for PCs are managed via AD groups. This includes both login permissions and administrative permissions. These are assigned by departmental IT points of contact. Permissions for Mac systems are managed on a per system basis.
Data
ITS recommends the use of OneDrive for the protection of data. Common folders can be redirected to OneDrive to simplify this process. For additional information see OneDrive (work or school).
Support
ITS provides a wide array of support through self-service, remote assistance, or from a desk side technician. ITS uses BeyondTrust Remote Access to provide remote assistance to end-users. The BeyondTrust software is only installed during an active support session and is removed upon completion. For additional information see BeyondTrust.