Article Display

My computer is quarantined...what?

  • Published
  • By Tech. Sgt. Vincent A. Mouzon
  • 20th Fighter Wing Public Affairs
It's 0745, you're at work, but can't log in to your computer. It has been quarantined. You can't work. So, what should you do?

"Your first step is to contact your client service administrator," said Capt. Jason Rossi, 20th Communications Squadron operations flight commander. "Users can't restore a quarantined computer on their own. CSAs are trained and certified to restore the computer to full operation. Most patching and updating can be completed in a matter of minutes by a CSA."

Quarantine is referred to as the segregating of a computer workstation from the network.

Quarantine usually occurs from non-compliance with mandated security patches or other requirements.

"The actions we are expected to take, as users, to help secure our portion of the global information grid are extremely minor when viewed in relation to the adverse impact we could experience if we fail to comply," said Lt. Col. Brian Wilkey, 20th Communications Squadron commander. "It may be inconvenient at times, but these computers are not home PCs. They are part of a larger weapon system. The more we come to think of them this way, the more patient we will be with the required actions."

Once isolated from the network, a computer workstation must be fully compliant with all required time compliance network orders before it can be removed from quarantine and once again have full access to the network.

Users who don't follow the mandated process of logging off their computer and leaving it powered on every night will likely find it quarantined. There are steps users need to take to ensure the continued availability of their computer.

First, completely log off of your workstation every night and leave it powered on. Simply removing your common access card does not log you off, Captain Rossi said. Second, restart your computer several times per week to ensure all security patches and updates are getting fully installed. This can be done before leaving work or in the morning before logging in.

The Air Force manages the security and stability of its computer networks through network actions called time compliance network orders.
TCNOs carry the same weight of any other lawful order and must be complied with as directed or result in adverse action, the Captain said.

TCNOs are issued continuously and each has a mandatory compliance date. To ensure the security of the network, any time a computer is found to be non-compliant with all applicable orders, it can be quarantined. This is happening now and will continue to happen as needed.

Since the Shaw network is part of the larger Air Combat Command, Air Force, and Department of Defense network, any breach of security requirements at Shaw could place the larger network at risk.

The Air Force cannot allow a weak link at one base to put the rest of the Air Force or DoD at risk. In fact, they could be forced to quarantine an entire base. The mission impact would be significant from such an action. These issues have the highest level interest from our leaders, including the Chief of Staff and Secretary of the Air Force.

"If we all stop thinking of our work computers as personal we would likely be less frustrated with the actions we're directed to take by our higher headquarters directives," said Colonel Wilkey.

Remember, your first step if your computer has been quarantined is to contact your CSA at 895-2666.