Configure your computers and devices securely

How to decrease risks by configuring your devices securely

Use a Supported Desktop on your desktop computer or laptop

The easiest way for you to keep your computers and devices secure is to use one of the University's Supported Desktops on your desktop computer or laptop. These are operating systems that are configured securely, will keep things up to date automatically, have security software configured and installed automatically, and any changes to configuration needed to mitigate new threats will be automatically applied. 

Your School or Unit may also have a management system for computers and devices in addition to or instead of the University's Supported Desktops; contact your local IT support for information. 

Advice on configuring BYOD or self managed devices 

You should ensure that you have configured any device you use for University work in a secure way. The responsibilities you accept by using a self-managed or BYOD device are further detailed in our page on using BYOD or self managed devices, along with advice on secure configuration.

Personal devices (not used for University work)

Even if not used for University work your personal devices are your responsibility and may be considered an easy target for threat actors, as they may perceive them to have fewer security measures in place. As well as putting you at risk a successful attack on your personal devices may give mechanisms to further attack your University account. We recommend that you follow the advice given for using BYOD or self managed devices to help protect your own personal devices.