For the Organisation


The UT makes use of Quarantainenet (often shortened to QNet) to find and quarantine infections (such as viruses and worms) and other computer-related problems. This is a (partially) automated system. If someone is placed in quarantine, this can be verified via a web browser. The web browser will display a page explaining the reason of the quarantine, as well as a number of possible solutions that can be executed. Some websites will still be accessible, such as Microsoft Windows Updates and websites of virus scan vendors. Sometimes there is the possibility of using the so-called “One Strike” function. This function can be used to remove yourself from quarantine once the infection has been removed. Please note that if this is not the case, Quarantainenet will automatically place the computer in quarantine again! This time, the One Strike function will no longer be available.

For more information about the technical workings of Quarantainenet, please visit:

SURFnet and rules of conduct

The UT network is provided by SURFnet. SURFnet only offers its services to education- and research-related institutions, and not to commercial parties. However, at the request of the organisation, guests will be making use of the network for one or several days. This is covered by the exception conditions and as such does not cause any problems. SURFnet does however require that every person using the network needs to be traceable. As such, wired computers are required to register their MAC address. For laptops using the wireless network the login-data functions as a registration (the t-accounts that are given to guests).

For everyone on the network the usual rules of conduct for Internet-use apply. By simply using common sense should get you quite far (Fair Use Policy). In case of an “incident” (abuse by, for example, sending large amounts of spam or downloading illegal content) it can occur that you will be cut off (by Quarantainenet) or are reprimanded. Should this occur, the organisation functions as a contact. On request, a list of t-accounts can be provided. It is the responsibility of the organisation to give these to guests. The registration has to be performed by the organisation. If an incident occurs, the organisation can be asked to talk to the person involved about it. In case of further investigation, the organisation will be approached to provide this information.

To get an idea what the rules of conduct include, have a look at the general ICT rules of conduct, and internet rules of conduct.

Please note that not all of these are fully applicable to guests and students, but a number of basic rules can be surmised as "use common sense”.

For the guests

The University of Twente advises to provide guests with the following rules when the t-account is provided.

  • The user is a guests on the network of the University of Twente and is therefore expected to behave decently.
  • The computer is required to possess adequate security maintenance.
  • The user is responsible for the data-traffic from his/her computer.
  • If improper use is discovered, the University of Twente may rightfully deny the computer access to the network. If possible, the guest will be informed of this via a webpage that is displayed when visiting random websites.