Security-Related Resources
Security-related issues can be a serious problem. We have compiled resources below
to help you fix or prevent commonly reported issues. More resources will be added
as they become available.
How to report a malware or virus infection
Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:
- Your Name:
- Location:
- Computer Name:
- IP Address:
- Computer issues you are experiencing:
How to run a virus scan
ESET Scan Instructions:
- Open ESET Endpoint Security. Open my ESET product.
- Click Computer scan →Scan your computer.
Figure 1-1
You can pause or cancel a scan at any time by clicking Pause or Cancel to the right of the progress bar.
Figure 1-2
- Upon completion, a summary window showing the number of scanned, infected, and cleaned
objects will be displayed. To close the window, click Dismiss. To view detailed results of the Computer scanlog, click Show log.
Figure 1-3
The scan log details will appear in the Computer scan screen.
Save the log and send it to technical support:
- Right-click anywhere in the Computer scanwindow and select Export all from the context menu.
Figure 2-1
- In the Save As window, select Desktop as the save location.
- Type Computer Scan into the File name field. It is important that you use exactly
this file name for the CHS IT Security Team to process your request as quickly as
possible.
- Select Text file (*.txt) from the Save as type drop-down menu and click Save. It is
important that you send your log in the form of a text file for the CHS IT Security
Team to process your request as quickly as possible.
Figure 2-2
- Attach this file to an email to CHS IT Helpdesk. Our representatives will examine the scan log and respond as soon as possible with
the recommended steps to address your issue.
How to request a firewall exception (Desktop and Edge)
Email the CHS Helpdesk with the following information
Desktop Firewall:
- Requestors name:
- OKEY shortname:
- Is this a personal or OSU owned device:
- Computer name:
- IP Address:
- Physical location:
- Service/Application:
- Justification/reason for firewall exception:
Edge Firewall:
- Requestors Name:
- Inside IP address or Range:
- Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443)):
- Outside IP Address or Range:
- Action (Permit/Deny):
- Direction (In/Out):
- Sensitive Data (Yes/No):
- Justification/reason for firewall exception:
Please provide any additional contact information along with any technical information
you believe will help to expedite your request.
Security Tips
FTC - How to Recognize and Avoid Phishing Scams
SOPHOS - 5 things you can do today to make Zooming safer
NIST - Telework Security Basics
NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings
Security-related issues can be a serious problem. We have compiled resources below to help you fix or prevent commonly reported issues. More resources will be added as they become available.
How to report a malware or virus infection
Please call or email the CHS Helpdesk with the following information if you suspect your computer is compromised:
- Your Name:
- Location:
- Computer Name:
- IP Address:
- Computer issues you are experiencing:
How to run a virus scan
ESET Scan Instructions:
- Open ESET Endpoint Security. Open my ESET product.
- Click Computer scan →Scan your computer.
Figure 1-1
You can pause or cancel a scan at any time by clicking Pause or Cancel to the right of the progress bar.
Figure 1-2
- Upon completion, a summary window showing the number of scanned, infected, and cleaned objects will be displayed. To close the window, click Dismiss. To view detailed results of the Computer scanlog, click Show log.
Figure 1-3
The scan log details will appear in the Computer scan screen.
Save the log and send it to technical support:
- Right-click anywhere in the Computer scanwindow and select Export all from the context menu.
Figure 2-1
- In the Save As window, select Desktop as the save location.
- Type Computer Scan into the File name field. It is important that you use exactly
this file name for the CHS IT Security Team to process your request as quickly as
possible.
- Select Text file (*.txt) from the Save as type drop-down menu and click Save. It is important that you send your log in the form of a text file for the CHS IT Security Team to process your request as quickly as possible.
Figure 2-2
- Attach this file to an email to CHS IT Helpdesk. Our representatives will examine the scan log and respond as soon as possible with the recommended steps to address your issue.
How to request a firewall exception (Desktop and Edge)
Email the CHS Helpdesk with the following information
Desktop Firewall:
- Requestors name:
- OKEY shortname:
- Is this a personal or OSU owned device:
- Computer name:
- IP Address:
- Physical location:
- Service/Application:
- Justification/reason for firewall exception:
Edge Firewall:
- Requestors Name:
- Inside IP address or Range:
- Service (Example: HTTP Webserver (Port 80), HTTPS Webserver (Port 443)):
- Outside IP Address or Range:
- Action (Permit/Deny):
- Direction (In/Out):
- Sensitive Data (Yes/No):
- Justification/reason for firewall exception:
Please provide any additional contact information along with any technical information you believe will help to expedite your request.
Security Tips
FTC - How to Recognize and Avoid Phishing Scams
SOPHOS - 5 things you can do today to make Zooming safer
NIST - Telework Security Basics
NIST - Preventing Eavesdropping and Protecting Privacy on Virtual Meetings