Information Technology Services
Search Services:

ITS Service Listings

Identity and Access Management

Network ID Creation

The process for creating a User ID (NID). This could be for a student, affiliate, employee or Friend ID (FID). Third Party Access (TPA) for Parents/ Guardians uses the FID creation process.


Information Security

Active Directory Certificate Services (AD CS)

Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.

Active Directory Domain Services (AD DS)

Stores directory data and manages communication between users and domains, including logon processes, authentication, computers, system management, and directory searches. This service includes the following sub-services: LDAP, Authentication and Authorization, DFS, DFS-R, Group Policy, NTP, Computer Domain Join, AD Integrated BitLocker, LAPS.

Password Reset

Site to allow users to manage the security of their Network ID.

SSO & Federation

WSU ITS provides Single Sign-On (SSO) Federation services for WSU departmental IT professionals to securely authenticate each person that comes to their web application, known as a Service Provider. The supported service is cloud-provided by Okta.


Security Resources

Central Log Monitoring, Aggregation, Analytics

Service that allows for searching, monitoring, and analytics of machine-generated logs via a web interface and can generate graphs, reports, alerts, dashboards, and visualizations.

Firewall Request

Request to modify existing Firewall rules regarding perimeter access.

Incident Response

Service that allows the Information Security Services team members to identify, respond to, and report a data security concern.

Log Source Onboarding

Service adds logs to Central Log Monitoring.

Risk Assessments

A Risk Assessment is used to identify IT security risks associated with a system/service. A Security Assessment must be completed before requesting a Risk Assessment.

Security Assessments

Security Assessments evaluate the security controls of in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome.

Security Engineering & Architecture Consulting

Custom services built upon request.

Splunk Access Request

Request access to the Splunk service.

SSL Certificates

Service allows subscribed customers to request and obtain SSL certificates of three different types.

Vendor Contract Review

Compliance and risk review for technology contracts and services.

Vulnerability Scanning

This service provides for the identification of vulnerabilities via vulnerability scanning, patch releases, configuration review, and compliance.