On Guard: To Protect and Serve

On Guard Desktop and Network Security, from Power On Software, provides a solution for operating mixed system environments. First and foremost, it provides a security solution allowing users to control the environment for both Apple and Windows systems.

In addition, it provides a common user interface for the administrator; in fact, the On Guard feature set and appearance are nearly identical. It should be noted that if you are using a networked environment that contains both Windows and Macintosh computers, the administrator cannot export the On Guard settings between platforms. Windows computers must be configured with On Guard for Windows, while Macintosh computers must be configured with On Guard for Macintosh.

On Guard saves hours of support time by preventing changes to networked computers, eliminating the need to set up security on each computer. It allows me to configure one computer and save the settings to other computers on the network. Of course, it supports stand-alone systems as well.

For those of us who use Windows 2000 only, the importance of these tools may not be immediately obvious. On Guard adds to Windows 95, 98, and ME the features that make multiple users in a lab feasible, simplifying administration of a secure, reliable system.

Features

Installation for both systems is simple if one follows the instructions carefully. On the Windows side, I missed the fact that the system requirements were a minimum memory of 64MB and minimum of a 200MHz processor: While the memory was no problem in our laboratories, some of our older systems with 100MHz processors did not respond well to being overloaded.

Security

On Guard secures the system from power-up to shutdown. This is important in a laboratory of inquisitive Information Systems majors. As the administrator, I have full control of what each user has access to. For instance, I can lock out user ability to interrupt the boot sequence and aut'exec.bat files. The administrator can also replace the Windows/network login dialog box with the On Guard login dialog, which cannot be canceled.

The program allows the administrator to lock specific file types on a drive-by-drive basis. For example, I might want to give students in introductory classes complete access to tutorial files while advanced students might have more limited access. Clearly, neither should have access to the system drive.

The program's advanced security options for control down to the file and folder level allow me to control who can save files, and where. Of course, the greatest sanity-saver is that the administrator may prevent users from deleting or renaming files, folders, applications, disks, and system resources—no more "ost applications" or missing DLL files.

An unexpected benefit has been that by combining the features of On Guard, I have been able to set up configurations that allow me to give tests in the computer lab without worrying about students using electronic cheat sheets.

Configuration

The administrator can specify custom start menus, desktops, and personal folders as well as configure and control access to files and folders on the system. This is a useful feature in classes where I want to limit access to certain types of software at certain times—preventing students from surfing the Web while I am trying to talk, for instance. On Guard supports enabling and disabling of the Windows 98/95 standard policy set for greater flexibility.

Control

I cannot over emphasize the importance of the control features. As administrator who can control access to control panels, configuration files, and startup files will have fewer student-induced configuration failures. And control of what the user can launch, open, and save will mean fewer problems with viruses and unauthorized program installation. An administrator can prevent piracy by limiting what types of files can be saved to student-controlled disks, as well as direct saves and data fetches to a user's folder on the central server or to removable media.

Logging

For effective management of computer resources, On Guard tracks computer use, including user activities such as startup and shutdown, failed login attempts, idle time, and program access violations for all or specific users. In addition, On Guard's reporting capability shows who used the computer and the programs launched by the user.

Conclusions

While it would be an advantage if administrators could access portions of the profile/setup files in a mixed Apple Windows environment, On Guard is generally a good product for administration and security. It allows the inexperienced to be less paranoid. The use of building, campus, and school district licenses makes the product affordable for general use.

Featured

  • group of college students looking at large screen of data visualizations

    Scalable Cloud Strategies: Values for Higher Education

    From a massive, 23-campus cloud-and-security transformation, to a small college's "lift and shift" entry into the public cloud, Unisys Higher Education Strategist Christopher Wessells knows how higher education leverages the cloud. Here, he examines some of the values scalable cloud strategies offer our institutions.

  • stylized computer screen with a glowing portal interface, showing geometric icons and digital connections

    Ball State U Rolls Out Pathify Digital Engagement Hub

    Ball State University has launched a new MyBallState portal for its 20,000 students, 4,000 employees, and other constituents that provides personalized information and access to campus services.

  • translucent lock composed of interconnected nodes and circuits at the center

    Cloud Security Alliance: Best Practices for Securing AI Systems

    The Cloud Security Alliance (CSA), a not-for-profit organization whose mission statement is defining and raising awareness of best practices to help ensure a secure cloud computing environment, has released a new report offering guidance on securing systems that leverage large language models (LLMs) to address business challenges.

  • futuristic crystal ball with holographic data projections

    Call for Opinions: 2025 Predictions for Higher Ed IT

    How will the technology landscape in higher education change in the coming year? We're inviting our readership to weigh in with their predictions, wishes, or worries for 2025.