TTUHSC IT Policies
1.4.9 INTRUSION DETECTION
The Information Technology Security Group shall monitor and audit intrusion detection logs as part of their daily job functions. Intrusion detection logs are maintained for a minimum period of two weeks. Anomalies will be investigated and appropriate measures will be taken in the event of an actual threat in accordance with the incident management procedures outlined in Policy 1.4.7, Incident Management. Compliance with this policy is the responsibility of the Information Security Officer.
Various tools provide the ability to block malicious programs on our email servers, file servers and other computers on our network.