{"id":17521,"date":"2020-05-27T14:24:09","date_gmt":"2020-05-27T14:24:09","guid":{"rendered":"http:\/\/www.uwb.edu\/?p=17521"},"modified":"2025-09-03T16:52:52","modified_gmt":"2025-09-03T23:52:52","slug":"security-privacy","status":"publish","type":"page","link":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy","title":{"rendered":"Security &amp; Privacy"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Training and support for security &amp; privacy at UW Bothell<\/h2>\n\n\n\n<p>This page contains information about:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>UW NetID<\/li>\n\n\n\n<li>Secure computing<\/li>\n\n\n\n<li>Husky OnNet<\/li>\n\n\n\n<li>CrowdStrike Anti-Virus<\/li>\n\n\n\n<li>Security at UW<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">UW NetID<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/itconnect.uw.edu\/security\/uw-netids\/about-uw-netids\/#passwords\" target=\"_blank\" rel=\"noopener\">Resetting your password<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/itconnect.uw.edu\/security\/uw-netids\/about-uw-netids\/shared-uw-netids\/\" target=\"_blank\" rel=\"noopener\">Shared NetIDs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/itconnect.uw.edu\/security\/uw-netids\/about-uw-netids\/\" target=\"_blank\" rel=\"noopener\">UW NetID support<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Husky OnNet<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/itconnect.uw.edu\/connect\/uw-networks\/about-husky-onnet\/#needed\" target=\"_blank\" rel=\"noopener\">When to launch Husky OnNet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/itconnect.uw.edu\/connect\/uw-networks\/about-husky-onnet\/#support\" target=\"_blank\" rel=\"noopener\">Husky OnNet Support<\/a><\/li>\n\n\n\n<li>Note: Search for <em>BIG-IP Edge Client<\/em> to open Husky OnNet on your university computer<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Security at UW<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/it.uw.edu\/guides\/security-authentication\/overview-of-security\/security-101\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security trainings online<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Secure Computing at UW<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/itconnect.uw.edu\/security\/#securing\" target=\"_blank\" rel=\"noopener\">View the UW Security page<\/a> for more information about computer management and securing your computer.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">CrowdStrike Endpoint Detection and Response software<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>View the <a href=\"https:\/\/it.uw.edu\/uw-it\/divisions\/office-of-information-security\/crowdstrike-endpoint-detection-and-response-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowStrike Endpoint Detection and Response software page<\/a> for more information. <em>All UWB managed computers have anti-virus software already installed<\/em>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Not sure what technology solution is right for you? <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwb.az1.qualtrics.com\/jfe\/form\/SV_9YbPEYnAWJBdDzn\" target=\"_blank\" rel=\"noopener\">Contact UWB IT<\/a> to consult with you to find the right technology solution for your team.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Didn&#8217;t find what you were looking for?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"mailto:uwbit@uw.edu\">Contact UWB IT<\/a> for more troubleshooting support.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Training and support for security &amp; privacy at UW Bothell This page contains information about: UW NetID Husky OnNet Security at UW Secure Computing at UW CrowdStrike Endpoint Detection and Response software Not sure what technology solution is right for you? Didn&#8217;t find what you were looking for?<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":17523,"menu_order":7,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"_is_archived":false,"_archived_contact_email":"","footnotes":""},"class_list":["post-17521","page","type-page","status-publish","hentry"],"acf":{"related_links":{"toggle_visibility":false,"link_1":"","link_2":"","link_3":"","link_4":"","link_5":""},"highlight_box":{"toggle_visibility":false,"title":"","content":"","button":"","button_style":"angled-purple-button","button_screen_reader_text":""},"contact_type_1":{"toggle_visibility":true,"contact_title":"Information Technology","email":"uwbit@uw.edu","phone":"425.352.3456","box":"Box 358540","address_line_1":"18115 Campus Way NE","address_line_2":"Bothell, WA 98011-8246","location":""},"contact_type_2":{"toggle_visibility":false,"contact_title":"","email":"","phone":"","box":"","address_line_1":"","address_line_2":"","location":""},"social_media":{"toggle_visibility":false,"facebook_url":"","instagram_url":"","linkedin_url":"","twitter_url":"","youtube_url":""},"blog_archive_sidebar_visibility":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security &amp; Privacy - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security &amp; Privacy - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Training and support for security &amp; privacy at UW Bothell This page contains information about: UW NetID Husky OnNet Security at UW Secure Computing at UW CrowdStrike Endpoint Detection and Response software Not sure what technology solution is right for you? Didn&#8217;t find what you were looking for?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-03T23:52:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy\",\"url\":\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy\",\"name\":\"Security &amp; Privacy - Information Technology\",\"isPartOf\":{\"@id\":\"\/#website\"},\"datePublished\":\"2020-05-27T14:24:09+00:00\",\"dateModified\":\"2025-09-03T23:52:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uwb.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training and Support\",\"item\":\"https:\/\/www.uwb.edu\/it\/training-and-support\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security &amp; Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"\/#website\",\"url\":\"\/\",\"name\":\"Information Technology\",\"description\":\"Just another UW Bothell site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security &amp; Privacy - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy","og_locale":"en_US","og_type":"article","og_title":"Security &amp; Privacy - Information Technology","og_description":"Training and support for security &amp; privacy at UW Bothell This page contains information about: UW NetID Husky OnNet Security at UW Secure Computing at UW CrowdStrike Endpoint Detection and Response software Not sure what technology solution is right for you? Didn&#8217;t find what you were looking for?","og_url":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy","og_site_name":"Information Technology","article_modified_time":"2025-09-03T23:52:52+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy","url":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy","name":"Security &amp; Privacy - Information Technology","isPartOf":{"@id":"\/#website"},"datePublished":"2020-05-27T14:24:09+00:00","dateModified":"2025-09-03T23:52:52+00:00","breadcrumb":{"@id":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.uwb.edu\/it\/training-and-support\/security-privacy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uwb.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Training and Support","item":"https:\/\/www.uwb.edu\/it\/training-and-support"},{"@type":"ListItem","position":3,"name":"Security &amp; Privacy"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"Information Technology","description":"Just another UW Bothell site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/pages\/17521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/comments?post=17521"}],"version-history":[{"count":10,"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/pages\/17521\/revisions"}],"predecessor-version":[{"id":25462,"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/pages\/17521\/revisions\/25462"}],"up":[{"embeddable":true,"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/pages\/17523"}],"wp:attachment":[{"href":"https:\/\/www.uwb.edu\/it\/wp-json\/wp\/v2\/media?parent=17521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}