SLAC Computer Security
Search SLAC
Repurposing Computers

While it is tempting to just give a computer to another user when you are done with it, this is not good practice--even when the user is in the same department. Without a clean install the desktop or server cannot be trusted.

Desktop Systems
To protect the prior user, the current user, and the Lab any desktop computer being passed to another person must be wiped (full/complete format of the hard drive) and rebuilt. This is normally done via the standard procedures provided by SCCS (Boot CD for Windows and Taylor for Linux/Solaris).
Servers

Similarly, any server which is going to change function must be wiped and and re-installed. There are standard server build procedures for Windows, Linux and Solaris used in SCCS.

All Other Operating Systems

The system must be rebuilt from CD/DVD if computer is passed to another user.

 

Owner: SLAC Computer Security
Last Updated: 07/22/2010
Feedback: Please send to
Computer Security Feedback