Threat Protection

The University of Pittsburgh relies on a layered approach to security. No single process or technology is sufficient to secure the University’s environment. Instead, we have a robust series of security controls that operate at different layers and perform different tasks. A threat that manages to circumvent one control is likely to be thwarted by a control in another layer.

Note: You can easily share this page with others by using the shortened URL pi.tt/threatprotection

Enterprise Spam and Virus Filter with Exchange Online Protection
Microsoft 365 Email–Pitt Email (Outlook)–includes integrated mail filtering that quarantines suspect messages so they do not wind up in your inbox. Microsoft brands this function as Exchange Online Protection.

Safe Links
Safe Links evaluates the links in an email message in real time to determine whether they link to safe or harmful content. All links evaluated by Safe Links will be replaced by a longer URL that begins with https://na01.safelinks.protection.outlook.com.

Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is actually two products in one. It includes Microsoft Defender, Microsoft’s antivirus solution that is included with recent versions of the Windows operating system. It also includes Defender for Endpoint, which is a cloud-based enterprise security solution that builds on Defender’s antivirus features and enhances its capabilities for managed computers.

About This Service

Key Features

  • Proactive Threat Detection: The threat protection system constantly monitors and analyzes network traffic, user behavior, and system activities to identify potential threats in real-time. This proactive approach allows for early detection and prompt response to mitigate risks and minimize the impact of security incidents.
  • Centralized Management: The threat protection system offers centralized management and monitoring capabilities, providing administrators with a comprehensive view of security across the organization. This allows for efficient management of security policies, threat response, and incident investigation.
  • Secure and protect your email inbox: Enterprise Spam and Virus Filter with Exchange Online Protection protects from unwanted mass mailings (spam),  messages with malicious payloads (viruses), and messages with links that will steal information or download malicious software (phishing).

Getting and Using This Service

How do I access this service?

How do I request this service?

Access to this service is automatically granted if you are a member of the group that has been assigned permission to use this service.

Who can use this service?

Students, Faculty, Staff

Support

How do I get help?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

Bitlocker

 
Request Help

Related Articles (9)

Information about software available on the SecureU Sharepoint site.
Links to software security tools
Electronically stored academic, administrative, and research information is a critical University resource. All University units are required to use enterprise email, web services, and network firewalls. These Enterprise Security Controls help protect University data and significantly reduce security vulnerabilities. See the Enterprise Security Controls Policy for additional information about these requirements.
Pitt IT security professionals help protect the University's computer systems by responding to compromised computers and other security incidents. Pitt IT works with departments to quickly respond to security incidents that compromise a computer or server, or result in the unauthorized disclosure of University Information.
Reporting suspected incidents promptly helps the University quickly evaluate the situation to contain the problem, ensure that other computers have not been affected, and determine if sensitive information may be at risk.
Users of telnet, rlogin, ftp, and other connectivity programs may not realize that their password and data is transmitted across the network unencrypted and can be intercepted by hackers.
University policy establishes restrictions regarding the access and use of University technology resources such as computers, computer systems, networks, services, storage, and email. Students, faculty, and staff are obligated to protect University computing systems from illegal or damaging actions, either knowingly or unknowingly.
Pitt IT Security offers University departments access to leading practices and expert guidance for ensuring network security and managing incidents. Contact us any time to discuss our offered services for proactively mitigating risks or in any instance where you think an incident has occurred.
How to use the Microsoft Baseline Security Analyzer (MBSA)

Details

Service ID: 72
Created
Wed 5/24/23 5:55 PM
Modified
Wed 2/7/24 8:19 AM