Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
🎓 Purpose
Malicious software, including viruses, worms, trojans, and malware, can corrupt or compromise your data, steal credentials and passwords, and impact the performance of your computer systems.
👥 Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
🔖 Contents
Table of Contents | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Initial considerations
Warning |
---|
For individuals using University equipment or handling institutional data, please do not install or use products by Kaspersky Lab. |
Note |
---|
For individuals using University equipment, please do not install and/or use free tier third-party anti-virus/malware software. A suitable solution should be installed and managed for you. |
SentinelOne Project
SentinelOne is a cross-platform, next-generation anti-virus solution available to various units across the University.
Please contact your local IT group to determine if you are eligible for a SentinelOne end-point protection license.
\uD83D\uDCD8 What can I do?
Install antivirus and antimalware software (end-point protection).
Ensure theInfo |
---|
Ensure that your antivirus and antimalware software is up to date. |
Windows
Microsoft Defender (included with Windows).
Install and/or enable Microsoft Defender.
Ensure that “real-time protection” is enabled.
Contact your local IT group for additional assistance.
MacOS
XProtect (included with MacOS).
Pre-installed, enabled, and updated by default.
Contact your local IT group for additional assistance.
Linux
Various options.
Contact your local IT group for additional assistance.
Common solution(s) include:
Android, iOS
Info |
---|
Due to the nature of mobile operating systems (known as “sandboxing”), antivirus and antimalware software can have limited effectiveness. |
For mobile devices, it is particularly important to:
Install an effective ad-blocker.
Keep your mobile operating system up to date.
Do not jailbreak or root devices. Do you use pirated software or side-load software from outside of the Google Play or Apple Store.
Be careful when granting permissions to mobile apps.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️ Additional help
General
Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related articles
Filter by label (Content by label) | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|