[comp.virus] Virus Guidelines

rtravsky@CORRAL.UWyo.Edu (Richard W Travsky) (01/29/91)

Below are some draft virus guidelines we're chewing over at our site
(the University of Wyoming).  So far we've been real lucky and not had
a real problem with viruses; lately tho things have picking up. As
this list is very specific to our site, I'll stick explanatory notes
after some items.  I'm posting this for the benefit of those in
similar circumstances or to elicit comment from those who've already
been around the track a few times, as it were.  (I use "should be" and
"will be" below to distinguish between things that WILL be done no
matter what and things that should be done [but might not, matter is
still open to debate here].)

 1. Viral Software
    a. Viral scanning/cleaning software will not be used unless the
       accompanying documentation has been read by the support person
       doing the scan/cleanup.
    b. Viral scanning/cleaning software should be kept reasonably up to date.
[As stated,  we've had fairly low virus activity,  so being up to date with
the latest is not real important - yet.]
    c. More than software product should be used for cross checking purposes.
    d. After removal of a virus,  the machine/disk should be re-scanned to
       verify removal.

 2. Maintenance
[We maintenance machines owned by the University as well as those in the
student labs.]
    a. All incoming machines should be checked for infection.
    b. All returning spares will be checked for infection.
[We supply spares when possible so that the user is able to continue working.]
    c. All diagnostic disks will have write protect tabs.
    d. If software is being restored to someone's machine (like a backup,
       format,  and then a restore) the disks should be checked for infection.

 3. Installs
[We install software - like PC SAS - on users' machines.
    a. When possible,  install disks will have write protect tabs.
    b. When write protect tabs can not be used,  the install disks will be
       checked for infection upon return.
[Some software,  like dBase 4 we found,  writes to the install floppy during
installation.]
    c. User's machine should be checked for infection.
[This would take care of b .]

 4. Rentals,  Loaners
[We provide rentals and loaners upon occaision.]
    All rentals and loaned machines/software (for example, Lap Link) will be
    checked for infection upon return.

 5. Public access IT machines (Labs, OWA) with hard disks
    Machines such as these should be checked periodically for infection.
    Ideally,  some resident software (preferably a TSR) should be in place
    to help detect and prevent infection.  The question of requiring users
    to check their disks before insertion should be left open for the time
    being.

 6. User Support
    a. User Support staff should periodically check their machines for
       infection.
    b. Users bringing in disks for aid should have said disks checked;  barring
       that the machine used to help them should be checked when done.
[People often bring in disks that are hammered or the software is not working
right for some reason (bad Word Perfect printer files,  for example.)]

Richard Travsky                        Bitnet:   RTRAVSKY @ UWYO
Division of Information Technology     Internet: RTRAVSKY @ CORRAL.UWYO.EDU
University of Wyoming                  (307) 766 - 3663 / 3668