Anti-Virus / Anti-malware Policy
This policy sets out where Anti-Virus/Anti-Malware controls are to be implemented and how they must be used. The policy also aims to set out User responsibilities to help protect against malicious software infection.
This policy applies to all University owned computers and servers that connect to the University network.
This policy does not apply to personally owned devices, which are covered by the BYOD policy.
3.1 All University owned computers and servers that are connected to the University network or otherwise using the IT facilities must run up-to-date anti-malware product that continually monitors for malicious software (viruses, Trojans, worms, etc.).
3.2 Anti-malware must be configured for on-access scanning, including the downloading or opening of files, folders on removable or remote storage, and web page scanning.
3.3 Anti-malware protection software must be configured to run regular (at least daily) scans.
3.4 Any device not capable of running Anti-Virus/Anti-Malware software must be risk assessed and approved by the Cyber Security Officer. Mitigating controls may be put in place to reduce the risk to the device.
3.5 Users must be prevented from accessing known malicious web sites either by malware protection software or through a content filtering function.
3.6 Users must not try to uninstall or disable anti-virus software. Any messages suggesting that antivirus protection has been disabled should be investigated immediately.
3.7 Aberystwyth University reserves the right to disconnect any device from the network if an infection is found or suspected. The device will be disconnected until the infection is removed and suitable preventative tools have been installed on the device.
3.8 Email attachments must be scanned by an anti-virus product before delivery.
3.9 Users must check the authenticity of attachments / software to be installed from internet sources. They must not install applications that arrive on unsolicited media.
3.10 If users suspect that a device is infected with a virus, they must report the incident to Information Services (Email: email@example.com or Tel: x2400)
4. Supporting Policies
4.1 This policy should be read in conjunction with other associated policies such as:
- BYOD Policy
- Device Management Policy
- Patch Management Policy
- Information Security Policy
- IT Regulations
- Remote Access Policy
- VPN Policy
- Software Management Policy
- Vulnerability Management Policy
This Policy is maintained by Information Services, was last reviewed in October 2022 and are due for review in October 2023