ServiceCategoriesDescription
Active Directory Certificate Services (AD CS)Information SecurityIdentity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.
Active Directory Domain Name Service (DNS)Infrastructure, Information SecurityProvides DNS services to the ad.wsu.edu domain, including dynamic registration of domain joined systems for A and AAAA records. 
Active Directory Domain Services (AD DS)Information SecurityStores directory data and manages communication between users and domains, including logon processes, authentication, computers, system management, and directory searches.  This service includes the following sub-services: LDAP, Authentication and Authorization, DFS, DFS-R, Group Policy, NTP, Computer Domain Join, AD Integrated BitLocker, LAPS.
Active Directory Federation Services (AD FS)Information SecurityADFS is an identity authentication, authorization, and federation solution that provides WSU users to sign in securely and access resources.
Central Log Monitoring, Aggregation, AnalyticsInformation SecurityCentral logging is a service that allows for searching, monitoring, and analytics of machine-generated logs via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations.
DTS/SSIS packagesInformation SecurityMisc batch processing tasks
EABInformation Security, Business SoftwareFinancial Data Warehouse Extraction for Webi (Legacy)
Firewall RequestInformation Security, Network ResourcesRequest to modify existing Firewall rules regarding perimeter access.
Incident ResponseInformation SecurityIncident Response Plan is a service that allows the ITS Security Operations team members to identify, respond to and report a data security concern.
Log Source OnboardingInformation SecurityThis service is used to add logs to Central Log Monitoring.
Risk AssessmentsInformation SecurityA Risk Assessment is used to identify IT security risks associated with a system/service. A Security Assessment must be completed before requesting a Risk Assessment. 
Security AssessmentsInformation SecuritySecurity Assessments evaluate the security controls of in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome. 
Security Engineering and ArchitectureInformation SecurityCustom services built upon request.
Splunk Access RequestInformation Security
SSL CertificatesInformation SecurityThis SSL certificate service allows subscribed customers to request and obtain SSL certificates of three different types.
SSO & FederationInformation SecurityWSU ITS provides Single Sign-on (SSO) Federation services for WSU departmental IT Professionals. The supported service is cloud-provided by Okta. With this service, you can securely authenticate each person that comes to your web application, which is called a Service Provider. 
Vendor Contract ReviewInformation Security
Vulnerability ScanningInformation SecurityThis service provides for the identification of vulnerabilities via vulnerability scanning, patch  releases, configuration review, and compliance.
  • No labels