Search12 Results

Explains the two layers of Microsoft 365 email protection at Bowdoin — Exchange Online Protection (EOP) and Microsoft Defender for Office 365. Covers how spam, phishing, malware, and suspicious links are filtered, what users will see when protection is active, and what to do if a legitimate message is blocked.
Explains what to do if you suspect your Bowdoin computer has a virus or malware. Covers CrowdStrike Falcon for faculty and staff computers, and Microsoft Defender for Endpoint plus Apple's built-in XProtect for student MacBooks. Includes steps for running a manual scan using Microsoft Defender on macOS.
Explains antivirus protection on Bowdoin-issued student MacBooks. All student MacBooks have Microsoft Defender for Endpoint installed and managed by Bowdoin IT, alongside Apple's built-in XProtect malware detection. Covers what each tool does, what data is collected, and how to run a manual scan using Microsoft Defender.
IT recommendations for antivirus software on personal (non-Bowdoin-issued) Windows and macOS computers. Windows users should rely on the built-in Microsoft Defender. macOS users are protected by Apple's built-in tools and may optionally install additional software.
The knowledge base article provides a simple guide for users on how to allow blocked apps in macOS, ensuring a smooth experience without technical complexities.
Explains CrowdStrike Falcon, the antivirus and endpoint security solution installed on all Bowdoin-issued faculty and staff computers. Covers what CrowdStrike does, how it works, what data it collects, and what faculty and staff need to do (nothing — it runs automatically).
The Bowdoin College Student Digital Excellence Commitment (DExC) Technology Agreement. Outlines student responsibilities for the use, care, and return of the college-issued Technology Kit, including policies on appropriate use, software, loss or theft, device ownership, and Mobile Device Management (MDM).
Information about what software and programs might be available to staff, faculty, and students
This policy was implemented to identify and protect against potential information security risks at the institution and to comply with regulations issued by various states.