This section provides technical instructions on how to configure desktops, laptops, tablets, and other devices securely to reduce the odds that a system may be compromised or sensitive data lost or stolen. Where possible, LSAIT-supported desktops, servers, and network have best practices integrated into the services. However, some solutions can not be enforced through technologies for the entire college. This information is provided for faculty and staff and their IT departments as a reference for solutions that have worked successfully elsewhere in the College and University.