Sorry, you need to enable JavaScript to visit this website.




Any computer that is connected to the RIT network must comply with the security standards defined by RIT's Information Security Office's. This page is designed to help you to configure your personal computer so that it is in compliance with the appropriate standards.

In order to connect your personal computer to the RIT network...

Anti-virus software must be installed, enabled, and up to date
McAfee-Antivirus software is provided free for all members of the RIT community. Instructions for downloading and installing the software can be found here.

All OS and application security patches must be up-to-date
To make this process easier we recommend that you enable automatic updates on your system. Microsoft's Windows automatic update page contains information on enabling automatic updates for Windows. The Updating your software page on Apple's support site explains how to enable automatic updates in OS X.

Memory protection (hardware and/or software) must be enabled
Data Execution Prevention must be enabled in Windows. This can be done by opening the System panel in the Control Panel, then selecting Advanced, then Performance Options, then the Data Execution Prevention tab. Select "Turn on DEP for all programs and services," and click OK.

A personal personal firewall must be installed and enabled
We recommend the basic ZoneAlarm firewall for Windows users. It is available through Check Point Software Technologies and is free for personal use. The Information Security Office provides a handout on using firewalls and demonstrations that show you how to enable the Windows XP firewall and manage ZoneAlarm alerts. Resnet provides instructions on how to configure built-in firewalls for Windows and other operating systems

Anti-malware software must be installed, enabled, and up-to-date
We recommend that you install Spybot Search and Destroy AND one of Spyware Blaster, Ad-Aware, or Windows Defender. Instructions for downloading and installing Spybot Search and Destroy can be found here. You can find demos that show how to install some of this software here.