Main Nav

Good morning everyone,

I am interested if any of you lock out devices from your network. For instance, if you have a device with malware, do you knock it off your network until it is cleaned? If so, what is your process, how do you accomplish this, etc.?


Mark Scott
VP of Innovation and Technology, CTO
Freed-Hardeman University | 158 E. Main St. | Henderson, TN 38340
731-989-6002 | | Twitter:

Cyber Security Awareness - FHU Online Safety
********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at


If we identify a computer that is interfering with the overall function and performance expectations for the network, yes, we do block it until it is cleaned.  We use Bradford for authentication.  We can block by the information computer registered through Bradford.