We use Microsoft Defender to help protect university‑owned Windows, Mac, and Linux computers from security threats. Microsoft Defender is automatically installed and managed on all university‑managed devices, so your system stays protected without you needing to take any action.
Request badge access to ISS and Denver OIT managed spaces on campus. Exclusive to ISS and Denver OIT spaces only. See the campus badging or facilities offices for all other access requests.
Request a review of contracts and agreements to ensure they meet information technology security, privacy, and compliance requirements and align with university standards.
Supervisors and managers may request authorized access to institutional data for an employee when access is required for business or compliance purposes.
Digital Certificate Management provides secure issuance, renewal and revocation of digital certificates to ensure secure communications and authentication across systems and applications.
Get help understanding and managing emails that are held in quarantine to protect you from phishing, spam, and other potentially harmful messages.
Network Firewall Management is the configuration, monitoring, and maintenance of network firewalls to ensure secure and compliant controls are implemented across our network.
1Password manages the secure storage and retrieval of passwords and credentials for university IT professionals.
Departments accepting payments from credit or debit cards need to meet certain compliance requirements. Request support for payment card activities for merchants, including onboarding new merchants, completing procurement card scans, and receiving guidance to meet and maintain procurement card compliance requirements.
Submit requests for new VPN access, or get help diagnosing and resolving any problems with your VPN connection to ensure secure remote access.
Quickly report any missing or stolen university devices to ensure prompt action and security.
Request a technology risk assessment to evaluate security and compliance risks for applications, services, or research related technologies that involve university data.
Ensure timely termination of access for departing employees to maintain information security and compliance.
Vulnerability Asset and Remediation conducts regular vulnerability scans and assessments, providing actionable insights and remediation plans to address security weaknesses to university IT professionals.