{"id":6123,"date":"2019-04-16T11:25:15","date_gmt":"2019-04-16T18:25:15","guid":{"rendered":"https:\/\/nau.edu\/university-policy-library\/?page_id=6123"},"modified":"2026-02-11T23:18:33","modified_gmt":"2026-02-11T23:18:33","slug":"device-configuration-management","status":"publish","type":"page","link":"https:\/\/legacy.nau.edu\/university-policy-library\/device-configuration-management\/","title":{"rendered":"Device Configuration Management"},"content":{"rendered":"<h5>Information Technology<\/h5>\n<h3>Device Configuration Management<\/h3>\n<p>Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the integrity of this data and the information systems where it is stored is an important obligation. This policy establishes baseline controls and standards for the management and maintenance of the University\u2019s Information Technology (\u201cIT\u201d) Resources in support of this crucial task. All units and University Community Members are responsible for classifying all data within their care and implementing appropriate device configuration standards to protect the data.<\/p>\n<p><strong>Policy Owner:<\/strong> Chief Information Officer<br \/>\n<strong>Responsible Office:<\/strong> Information Technology Services<br \/>\n<strong>Origination Date:<\/strong> July 24, 2019<br \/>\n<strong>Last Revised:<\/strong> February 11, 2026<br \/>\n<strong>Contact:<\/strong> Director, Information Security<\/p>\n<h4><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Device-Configuration-Management.pdf\"><strong>View the Policy<\/strong><\/a><\/h4>\n<h4><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Device-Configuration-Standards.pdf\">View the Standards<\/a><\/h4>\n<p>&nbsp;<\/p>\n<h5>Keywords:<\/h5>\n<p style=\"padding-left: 30px;\">Endpoint<br \/>\nInformation security standard<br \/>\nIT resource<br \/>\nPersonal device<br \/>\nSensitive information<br \/>\nserver<br \/>\nUniversity IT resource<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><\/p>\n<p><strong>If you have questions regarding ITS policies or services, visit the ITS <a href=\"https:\/\/in.nau.edu\/its\/\">website<\/a>, call 928-523-3335, or email <a href=\"mailto:ITS@nau.edu\">ITS@nau.edu<\/a><\/strong><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Information Technology Device Configuration Management Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the integrity of this data and the information systems where it is stored is an important obligation. This policy establishes baseline controls and standards for the management [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":3416,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ring_central_script_selection":""},"acf":[],"_links":{"self":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/6123"}],"collection":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/comments?post=6123"}],"version-history":[{"count":4,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/6123\/revisions"}],"predecessor-version":[{"id":11412,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/6123\/revisions\/11412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media\/3416"}],"wp:attachment":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media?parent=6123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}