This page uses javascript to help render elements, if you have problems please enable javascript.
 
You are now inside the main content area
 
 
 
left col

Endpoint Management & Security

Protecting CSUF devices and data across desktops, laptops, and mobile endpoints.

right col
 
left col
right col
 
left col
right col
 
 
left col

What is Endpoint Security?

Endpoint Security refers to the protection of end-user devices (such as desktops, laptops, tablets, and smartphones) that connect to the CSUF network. These devices are often the first target for cyber threats like malware, phishing, and unauthorized access.

At CSUF, Endpoint Management & Security ensures that all university-owned and managed devices are properly configured, monitored, and protected to reduce risk and maintain compliance with CSU security policies.

Some examples of activities in Endpoint Management include:

  • Administering Configuration Settings: Setting up and maintaining the desired state for software and hardware.
  • Enforcing Endpoint Security Standards: Implementing and monitoring security protocols to protect against cyber threats.
  • Inventorying Hardware and Software: Keeping track of all devices and software within the university network.
  • Deploying Patches to Software and Operating Systems: Regularly updating software and operating systems to the latest versions.

right col
 
left col

Why Endpoint Security Matters?

Endpoint Management & Security is a cornerstone of CSUF’s cybersecurity strategy. With the increasing number of devices accessing university systems, it’s essential to ensure that all endpoints are properly configured, monitored, and protected. Each endpoint is a potential entry point for cyber threats, making their management and security a top priority. Enpoint security is needed to:

  • Protect sensitive university data
  • Prevent malware and ransomware infections
  • Ensure compliance with CSU and federal regulations
  • Support secure remote work and hybrid learning environments

 

right col
 
left col

Key Features

Key Features of CSUF’s Endpoint Management Program:

  • Automated Patch Mangement
  • Antivirus & Malware Protection
  • Device Monitoring & Compliance
  • Encryption & Data Protection
  • Secure Remote Access

 

Roles and Responsibilities

  • IT Teams: Enroll and manage devices, ensure compliance, respond to alerts.
  • Faculty, Staff & Students: Use university-approved devices, report issues, follow security best practices.
  • ISO (Information Security Office): Oversee policy enforcement, monitor threats, provide guidance and training.

 

Best Practices

Best Practices for Endpoint Security include:

  • Lock your screen when away from your device.
  • Avoid using personal devices for university work.
  • Don’t install unauthorized software.
  • Report lost or stolen devices immediately.

 

IT Help Desk Support

Faculty/Staff

Call: (657) 278-7777

Email: helpdesk@fullerton.edu

 

Students

Call: (657) 278-8888

Email: StudentITHelpdesk@fullerton.edu

 

IT Helpdesk Website

 

right col