Antivirus software

提供: 東京大学理学系研究科wiki
2022年4月1日 (金) 09:39時点におけるShitami.junichiro (トーク | 投稿記録)による版
移動先: 案内検索

Information Technology Team > Antivirus software

日本語

1 Overview

The University of Tokyo's Guidelines for Information Ethics and Computer Use requires that all computers have appropriate anti-virus measures. Specifically, you should use antivirus software for your personal computer, but not all viruses can prevent it, so you must always be careful about security when using your computer. Viruses may be infected via USB memory, so you should also take measures for the PC not connected to the network.

Guidelines for Information Ethics and Computer Use can be found on The University of Tokyo Information Ethics Guidelines web page below.

2 Comprehensive license for Trend Micro anti-virus software

3 Anti-virus measures for Windows

For Windows 8 and later, the OS includes antivirus function. The antivirus function is enabled by default, so please use your computer without disabling it.

4 Anti-virus measures for devices that is difficult to install antivirus software

Antivirus software blocks the execution of known malicious software and prevents the damage, when the user mistakenly executes malicious software. When you use the devices where it is difficult to install antivirus software, you should prevent actions that may cause problems. Specifically, actions that may cause problems are web browsing, reading and writing emails, and editing documents with office software. For software installation and USB memory use, you can prevent problems by sanning viruses on another computer in advance.

4.1 Linux PC

  • Prevent intrusion from the outside
  • Apply security updates and use the latest version of software that is not vulnerable
  • Do not open unnecessary ports

4.2 A computer for experimental equipment that is difficult to install antivirus software

  • Do not use e-mail, web, office software, etc.
  • Use a USB memory after checking the virus on another computer in advance

4.3 Server

  • Apply security updates and use the latest version of software that is not vulnerable
  • Do not use e-mail, web, office software, etc.

4.4 Smartphone, Tablet

  • Do not get root privileges
  • Do not use apps from unknown sources