Any University owned device running an End-of-Life or no longer supported Operating System (Windows, Mac OS, Linux, etc). This includes desktop and laptop computers, tablets and mobile devices, cellular devices, servers and virtual machines, and IoT devices such as security cameras, vending machines, Crestron devices, etc.
When operating systems reach their End-of-Life they cease to receive security patches and updates or support from the vendor posing a significant security risk to the device, the data stored on it, as well as other devices and data that can be reached from it.
*Since personally owned devices are not within the scope of this standard, OS fingerprinting checks for obtaining a DHCP lease will only be applied to non-residential wired subnets. University-owned EoL OS devices discovered on wireless subnets can and will be blocked manually by MAC address.
Any exceptions to this standard require approval from the Information Security Officer before they can be implemented. All exceptions will be reviewed every 12 months to ensure they are still appropriate and necessary.