TTUHSC IT Policies
1.4.9 INTRUSION DETECTION
The Information Technology Security Group shall monitor and audit intrusion detection
logs as part of their daily job functions. Intrusion detection logs are maintained
for a minimum period of two weeks. Anomalies will be investigated and appropriate
measures will be taken in the event of an actual threat in accordance with the incident
management procedures outlined in Policy 1.4.7, Incident Management. Compliance with this policy is the responsibility of the Information Security Officer.
Various tools provide the ability to block malicious programs on our email servers,
file servers and other computers on our network.