Keeping University Devices Secure and Up to Date

To better protect university data and improve your experience, all university-owned devices are being brought under a standardized device management system. This update ensures that your device receives important security protections, automatic updates, and easier access to approved software — while keeping sign-in simple and familiar. The applied settings align with university policy on systems that handle public and internal use only data. The goal is to make your work smoother, safer, and more reliable, with minimal disruption to your day-to-day routine. Currently the program applies to newly purchased Windows PCs, Apple computers, iPhones, and iPads, with Android phones and Chromebooks coming soon.

 

Applied Settings


Device Setup and Sign-In

University-owned devices that aren’t already managed will now be connected to our system and set up with basic protections.

What this means for you: You can keep signing in the same way you always have (with your local account), or you can sign in with your university login (abc123@case.edu). The choice is yours.


Automatic Updates

Your device will automatically stay up to date with the latest security fixes and new features, including upgrades from Windows 10 to 11 (if your device can handle it). Updates cover the Windows and Apple operating systems, Microsoft Office, Teams, and Edge.

What this means for you: Updates will install automatically, but you can delay a restart if it happens at a bad time. This should cut down on disruptions and manual update headaches.


Built-In Security Protection

Your device will be connected to Microsoft’s advanced security tools, which help detect and stop cyber threats.

What this means for you: You won’t notice anything day-to-day, but if something suspicious happens, IT security will be alerted and can take action.


Basic Security Requirements

To keep data safe, devices will need things like disk encryption and antivirus protection turned on.

What this means for you: You may be asked to set a password or enable encryption, and you’ll get clear instructions if that’s the case.


Self-Service App Store

A "Company Portal" will let you install university-approved software on your own, without needing special permissions.

What this means for you: You’ll be able to quickly get the tools you need, without waiting on IT.


Automatic Screen Lock

For security, your screen will lock if you don’t use your computer for 15 minutes. This helps protect sensitive information if you step away.

What this means for you: If you’re inactive for 15 minutes, you’ll just need to sign back in when you return.


Frequently Asked Questions

On a PC, you can check by typing "About" in the Windows search box and opening the About your PC settings. If the Full device name ends with case.edu, your computer is managed by the university.

On an Apple device check for an application called "Company Portal". If that application is installed, your device is managed by the university.

To request an exception, contact the Help Desk at help@case.edu. Exceptions will only be granted in cases where management of a device interferes with a legitimate work requirement. The person responsible for the device will need to manage and document compliance with the university’s policies on handling public and internal use only data.

CWRU has purchased a block of Extended Security Updates (ESU) for devices that aren’t capable of upgrading. We’ve developed a tool that will automatically apply these updates, extending security protection for one additional year. During that time, the Directors of IT for each school or college will work with individual teams to plan for device replacement.

The university’s Acceptable Use Policy addresses expectations of privacy with university systems:

"Case Western Reserve University strives to ensure the appropriate integrity, availability, and confidentiality of information and information technology systems, given the needs of the academic and research communities for openness and publicly available information. To that end, CWRU endeavors to provide secure computing environments, where appropriate, to manage risk to an acceptable level. Users shall have no inherent expectation of privacy for information stored on and transported through CWRU information technology resources, except as provided by federal and state law and other university policy. CWRU will continue to invest in processes and resources to maintain individual privacy, but the university will not be liable for the failure of these privacy efforts. While the university does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the university's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the rendition of service."