CUMC Home | Columbia University | Jobs at CUMC | Contact CUMC | Find People
     
Columbia University Medical Center logo,  Columbia University Medical Center Information Technology
For support: call extension 5-Help (212-305-4357) or email us
 
 
IT Equipment Purchases
 

Computer Set Up Checklist

Setting up a computer for use on the Medical Center campus involves connecting it to needed resources (e.g. the wired network, printers, programs and network drives) and making sure it is in compliance with all relevant security policies. We've created the checklist below to help ensure that set up goes as smoothly as possible.

Prior to computer's arrival
The following tasks should be started prior to the computer's arrival.
  1. Verify basic space requirements for the computer, including a working power outlet.
    Please contact Facilities as soon as possible if there are basic space issues that must be resolved.
  2. Data PortVerify that there is an active, usable data (network) port at the location where the computer will be used. If a another computer had successfully connected to the port recently, it should be active and ready for use.
    • IMPORTANT: If the port was previously used by a network printer, server, medical equipment or other system requiring special configuration on the wired network, please contact 5-Help as soon as possible with pertinent information. The information will be given to CORE Resources who will need to re-configure the port's connection to back end networking equipment so it can be used by a computer.
    • If a port is not active please submit the Network Port Activation form as far in advance as possible.
    • If a new data port must be installed please submit the Network Port Installation form as far in advance as possible.
  3. Register the computer to connect to the wired campus network. You must know the exact Hardware Address of the computer's network card, please ask the vendor to give this to you as soon as possible. They may not be able to provide this until the computer has shipped.
    • If the computer is completely new to the campus, submit the New IP Request form.
    • For re-used computers (any previously connected to the wired campus network) please submit the Update IP Request form to notify CORE Resources of any change in primary user, location, etc.
    The computer will not be able to connect to the wired network until the registration has been processed. For additional information see Network Use Requirements.
  4. Note all software programs, printers and external devices that will need to be set up on the new computer. Make sure you have the files and information required:
    • Software programs that are not part of a site license can require an individual license, keys and/or installation media. Other commonly used CUMC programs are listed on the Applications and Access page. Be sure to request any login accounts that the employee will need well in advance.
    • Networked printers, drives, or special connections to a server can require the network address information, printer drivers, and a login account. Please check with the owner of the resource if you don't have this information.
  5. Back up any employee data from a prior computer as needed.
    A final back up should also be done right before the new computer is installed to make sure any new or modified files are saved.
  6. Verify whether the computer will access or store confidential or sensitive data and what type of encryption may need to be used.
After the computer's arrival
The following steps can be completed after the computer has arrived.
  1. Verify receipt of all required computer components. This can include the computer, monitor, keyboard, mouse, network ("cat5") cable, power cord, surge protector; laptops may also have a docking station, monitor stand, and extra battery.
  2. Install all critical operating system updates and antivirus/antispyware program updates on the computer.
    By CUMC policy all computers must:
    • Have received all critical updates and patches for their operating systems
    • Have updated antivirus and antispyware programs running
    • Be free of viruses, trojans, and other malicious programs
  3. Install software programs as needed, including encryption. Make sure that programs have been updated with any critical security updates or patches.
  4. Restore the user's backed up data as needed.
  5. Connect to network printers, mobile devices and other hardware. Mobile and other devices must also comply with relevant CUMC policies.
  6. Remove any data and computer(s) no longer needed in compliance with secure Data Disposal policies.


| TOP |

Last updated 6/26/2013