Service | Categories | Description |
---|
Active Directory Certificate Services (AD CS) | Information Security | Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies. |
Active Directory Domain Name Service (DNS) | Infrastructure, Information Security | Provides DNS services to the ad.wsu.edu domain, including dynamic registration of domain joined systems for A and AAAA records. |
Active Directory Domain Services (AD DS) | Information Security | Stores directory data and manages communication between users and domains, including logon processes, authentication, computers, system management, and directory searches. This service includes the following sub-services: LDAP, Authentication and Authorization, DFS, DFS-R, Group Policy, NTP, Computer Domain Join, AD Integrated BitLocker, LAPS. |
Active Directory Federation Services (AD FS) | Information Security | ADFS is an identity authentication, authorization, and federation solution that provides WSU users to sign in securely and access resources. |
Central Log Monitoring, Aggregation, Analytics | Information Security | Central logging is a service that allows for searching, monitoring, and analytics of machine-generated logs via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations. |
DTS/SSIS packages | Information Security | Misc batch processing tasks |
EAB | Information Security, Business Software | Financial Data Warehouse Extraction for Webi (Legacy) |
Firewall Request | Information Security, Network Resources | Request to modify existing Firewall rules regarding perimeter access. |
Incident Response | Information Security | Incident Response Plan is a service that allows the ITS Security Operations team members to identify, respond to and report a data security concern. |
Log Source Onboarding | Information Security | This service is used to add logs to Central Log Monitoring. |
Risk Assessments | Information Security | A Risk Assessment is used to identify IT security risks associated with a system/service. A Security Assessment must be completed before requesting a Risk Assessment. |
Security Assessments | Information Security | Security Assessments evaluate the security controls of in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome. |
Security Engineering and Architecture | Information Security | Custom services built upon request. |
Splunk Access Request | Information Security |
|
SSL Certificates | Information Security | This SSL certificate service allows subscribed customers to request and obtain SSL certificates of three different types. |
SSO & Federation | Information Security | WSU ITS provides Single Sign-on (SSO) Federation services for WSU departmental IT Professionals. The supported service is cloud-provided by Okta. With this service, you can securely authenticate each person that comes to your web application, which is called a Service Provider. |
Vendor Contract Review | Information Security |
|
Vulnerability Scanning | Information Security | This service provides for the identification of vulnerabilities via vulnerability scanning, patch releases, configuration review, and compliance. |