Skip to main content

Security-related issues can be a serious problem. We have compiled resources below to help you fix or prevent commonly reported issues. More resources will be added as they become available.

 

How to report a malware or virus infection

Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:

  • Your Name:
  • Location:
  • Computer Name:
  • IP Address:
  • Computer issues you are experiencing:

How to run a virus scan

ESET Scan Instructions:

  1. Open ESET Endpoint Security.  Open my ESET product.
  2. Click Computer scan →Scan your computer.

Figure 1-1

Figure 1-1

You can pause or cancel a scan at any time by clicking Pause  or Cancel  to the right of the progress bar.

Figure 1-2

Figure 1-2

  1. Upon completion, a summary window showing the number of scanned, infected, and cleaned objects will be displayed. To close the window, click Dismiss. To view detailed results of the Computer scanlog, click Show log.

Figure 1-3

Figure 1-3

The scan log details will appear in the Computer scan screen. 

 

Save the log and send it to technical support:

  1. Right-click anywhere in the Computer scanwindow and select Export all from the context menu.

Figure 2-1

Figure 2-1

  1. In the Save As window, select Desktop as the save location.
     
  2. Type Computer Scan into the File name field. It is important that you use exactly this file name for the CHS IT Security Team to process your request as quickly as possible.
     
  3. Select Text file (*.txt) from the Save as type drop-down menu and click Save. It is important that you send your log in the form of a text file for the CHS IT Security Team to process your request as quickly as possible.

Figure 2-2

Figure 2-2

  1. Attach this file to an email to CHS IT Helpdesk. Our representatives will examine the scan log and respond as soon as possible with the recommended steps to address your issue.

How to request a firewall exception (Desktop and Edge)

Email the CHS Helpdesk with the following information

Desktop Firewall:

  • Requestors name:
  • OKEY shortname:
  • Is this a personal or OSU owned device:
  • Computer name:
  • IP Address:
  • Physical location:
  • Service/Application:
  • Justification/reason for firewall exception:

Edge Firewall:

  • Requestors Name:
  • Inside IP address or Range:
  • Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443)):
  • Outside IP Address or Range:
  • Action (Permit/Deny):
  • Direction (In/Out):
  • Sensitive Data (Yes/No):
  • Justification/reason for firewall exception:

 

Please provide any additional contact information along with any technical information you believe will help to expedite your request.

 

Security Tips

FTC - Coronavirus Scams

FTC - How to Recognize and Avoid Phishing Scams

SOPHOS - 5 things you can do today to make Zooming safer 

NIST - Telework Security Basics

NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings

 

Back To Top