Centralized Workstation Management

Integration of AUTH Workstations into the Central Management System of the Digital Governance Unit (DGU)
  • The Centralized Workstation Management of the Digital Governance Unit (DGU) has provided departments across the University with a functional and secure desktop computing environment. Key features and benefits include:

    1. Computer Security
    • Access via the institutional user account.
    • Centrally managed antivirus and firewall on all managed workstations.
    • Ransomware protection.
    • Printer security against cyberattacks.
    • Prevention of the use of USB sticks and external storage devices.
    1. User Data Protection
    • File storage in the Digital Governance Unit (DGU)’s private cloud (for files located on Desktop and My Documents).
    • Self-service file recovery via right-click, anytime, from backups retained for 30 days or more.
    • Shared network folders for file sharing among staff.
    1. Protection Against Pirated Software
    • Centralized, automated, remote installation of software by Digital Governance Unit admins (>300 titles) or upon user/admin request.
    • User/local admin installation from the AUTh Software Repository without prior approval from the Digital Governance Unit (DGU).
    • Blocking of unapproved software installation or usage.
    1. Hardware Maintenance & Support
    • Replacement of faulty hardware (e.g., monitors, power supplies), subject to parts availability.
    • Priority support for technical requests (compared to non-managed devices).
    1. Economies of Scale
    • Mass deployment of OS, software, and Windows updates via network, without on-site technician presence.
    • Centralized printer installation and control of cost/page count per user.
    • Facilitates planning for computer procurement at department or university level.
    1. Easy Access
    • Remote access for working remotely and use of licensed software or external library resources.
    • Access to the same user profile (desktop and documents) from any centrally managed computer.
    • Option to install Windows or Dual Boot (Windows + Linux) (available only on BIOS-based desktops).
    1. Reduced Energy Consumption
      Unless specified otherwise, managed computers are configured to shut down automatically at 18:00 and 23:00 daily—only if not in use.
      More details available [here].

    The Digital Governance Unit (DGU) customizes this environment to meet the evolving needs of each unit, relieving them of the burden of desktop management. The Digital Governance Unit (DGU) centrally handles routine maintenance and upgrades to ensure the environment remains modern, secure, and user-friendly. As a result, end-user productivity increases while achieving significant economies of scale.

    By decision of the University’s Digital Governance Committee, this environment is now used by all administrative staff in Central Administration, Schools, Department Secretariats, and their libraries—on and off campus. Additionally, most academic units use this environment for shared workstations in their computer labs and libraries. It is also available to all faculty and research staff for their desktop systems.

    The environment is centrally managed by the Digital Governance Unit (DGU) in compliance with the ISO/IEC 27001:2013 information security standard. Integration of local infrastructure into Central Management ensures full compliance with current legal and regulatory frameworks on cybersecurity in public administration.

    • By decision of the AUTH Digital Governance Committee, all desktop computers used by AUTH administrative staff are mandatorily included in the service.

      Additionally, upon request to the Digital Governance Unit, other desktop or laptop computers within the University (e.g., computers in labs, teaching, or research staff) may also be included.

  • Process for Inclusion in the Central Management Service

    1. An informational meeting is conducted remotely via Zoom with the staff of the units or users who request to join the service independently.

    2. Workstations undergo a reinstallation process: each computer needs to be taken out of production for approximately 3 hours. This process includes backing up files to the Digital Governance Unit’s infrastructure and transferring existing settings and preferences to the new environment.

    3. Additional applications beyond the pre-installed ones can be installed upon a documented request. For applications being installed for the first time under Central Management, a lead time of two weeks or more from the request submission is required.
      [Software Installation Request]

    User Obligations and Security Rules

    1. The use of workstations must comply with AUTh’s Network Policy, ensuring proper and secure usage.

    2. End users of workstations are professionally responsible to their supervisors and AUTh for the correct and secure use of computers strictly for their work-related needs.

    3. Supervisors are responsible to AUTh for the proper allocation and management of computers under their jurisdiction.

    4. Files transferred by users to the central storage infrastructure must be virus-free, comply with GDPR and copyright laws, serve official needs, and must not contain duplicate backups.

    5. Users must safeguard the confidentiality of all personal passwords, access PINs, and ensure the physical security of any cryptographic devices (e.g., USB eTokens) or other means of access provided.

    6. Users must exclusively use the cryptographic devices assigned to them. Note that their use is legally binding and equivalent to a handwritten signature under EU Regulation 910/2014 (eIDAS). Sharing these devices with third parties exposes the user to serious legal risks.

    7. Users must promptly change any password whose confidentiality is compromised. The Digital Governance Unit may request password changes from users at any time.