DCM

What data is collected or stored as a result of using the DCM tool?

The DCM tool automates the application of hardware, software, Internet, network, and security settings standards. No data is collected or stored except on the local machine where the tool was run.

Are there any restrictions or caveats on installation of DCM?

The DCM tool automates the application of hardware, software, Internet, network, and security settings standards. Do not install DCM on special purpose machines. For example, machines that run or monitor lab equipment are not good candidates for DCM installs. DCM is not an end user tool.

What are the DCM Best Practices?

DCM Best Practices are a set of recommendations for establishing a reasonably high level of computer security. These recommendations do not imply that other software products or computer settings are not supported.Download the DCM best practices documents.

Can I use Internet Explorer's Password Auto Fill if I have DCM?

With Password Auto Fill, users save their password and that field is automatically filled on login. DCM is set to disable Auto Fill, but the desktop technician can circumvent this setting. Auto Fill is not a best practice, and you should discuss its use with your technical support staff. Using Auto Fill on computers that use restricted data is strongly discouraged.

Why are some DCM settings only for computers that contain restricted data?

The security settings for computers containing restricted data are more strict than the settings for most computers.

How does the DCM tool interact with BigFix?

The DCM tool automates the application of hardware, software, Internet, network, and security settings standards. DCM uses BigFix to enforce settings.

Once a machine has completed the DCM installation, it is moved into a BigFix group. For more information on BigFix, see the BigFix at Stanford page.

How do I get a list of DCM program activity and settings changes?

Look at the activity log to see a list of program activity. From the DCM App menu, choose View > Activity Logs.

How often are the DCM tool and the Best Practices document updated?

The DCM Governance Board meets quarterly to discuss how the DCM tool is being used and whether it needs updating. The Board reviews and changes the DCM Best Practices document as needed. Please contact the DCM Governance Board with suggestions or questions at dcm-governance-board@lists.stanford.edu.

What is DCM?

The Desktop Configuration Management (DCM) service helps technical support staff automatically standardize the configuration settings on all of the desktop computers in a department. The DCM tool automates the application of hardware, software, Internet, network, and security settings standards.

For more information, visit the Desktop Configuration Management web page.