BCHM IT Contact Information

Size: px
Start display at page:

Download "BCHM IT Contact Information"

Transcription

1 Welcome! Let me join my colleagues in welcoming you to the Department of Biochemistry. You are no doubt excited to get started on your chosen path here at Purdue. The documents enclosed in this packet will help speed you on your way and provide you with basic information regarding IT here at Purdue. This information is meant to be brief and useful, should you have needs outside the scope of the information contained in this packet please feel free to contact BCHM IT. BCHM IT Contact Information Joe Levell Phone Number: or Address: Hours of Operation Monday - Friday 7:00am to 4:00pm

2 Career Account Password Change Instructions The instructions below are the basics for choosing a new password. For more detail on passwords, password security, and the exact policy go to How to choose a password Passwords for University IT Resources must comply with the following standards: Passwords must contain at least 1 letter. Passwords must contain at least 1 number or punctuation mark. Passwords must be at least 8 characters long. Passwords must contain more than 4 unique characters. Passwords must not contain easily guessed words (e.g. Purdue, itap, boiler). Passwords must not contain your name or parts of your name (e.g., Bill, Julie, Bob, or Susan). New passwords must be different than the previous password (re- use of the same password will not be allowed for one (1) year).

3 CHANGING YOUR CAREER ACCOUNT PASSWORD Change your password from the SecurePurdue Page. 1. Point your Web Browser to 2. Click on the Change Your Password link. 3. Enter your current Career Account information and click login. 4. In the right hand column select Change Password 5. Follow the instructions on- screen to

4 AgIT Helpdesk Information If you need help with anything computer related or have a question please use the information provided below. You may use any of the following methods to contact AgIT for further support. AgIT Support Specialists are available from 8:00 a.m. 5:00 p.m. EST, Monday through Friday. AgIT observes all University holidays. AgIT Support off- campus: or AgIT Support on- campus AgIT at agithelp@purdue.edu Using the information above is the fastest way to get help with computers or get computer related questions answered.

5 S Drive Information The S drive is the common shared network drive for the Biochemistry department. All Faculty, Staff, and Graduate Students have access to various folders located on the S drive. Important Information about the S drive Data stored on the S drive is backed up by AgIT. If you lose a file or have a problem with data on your computer chances are it can be recovered. The S drive is accessible on both Mac s and PC s. The S drive is shared by user account. If you get an error regarding access denied or you do not have permission, you cannot access a folder or file due to your user account not having access. If you feel you should have access, but are being denied please contact AgIT. The S drive is a place for work related data and files. Do not store your personal information, data, or files on this drive. This includes personal photos, music, etc.

6 How to map the S drive on a PC (Windows XP) 1. From the Start Menu or Desktop open My Computer 2. From the menu at the top select Tools 3. Click on Map Network Drive 4. In the Drive dropdown box select S: or any letter that is available, it does not matter what you use 5. Put a checkmark in the Connect using different credentials box 6. In the Folder dropdown box type \\itsofs06.itap.purdue.edu\ag_bchm\shared 7. Make sure to place a checkmark next to Reconnect at Logon 8. When prompted for username and password enter your Career Account username information in the following format: onepurdue\your Career Account username Continue by putting in your Career Account password and then proceed to step 9 9. Put a checkmark in the Remember my credentials box and Click OK

7 How to map the S drive on a PC (Vista) 1. Open Computer 2. From the menu at the top select Tools 3. Click on Map Network Drive 4. In the Drive dropdown box select S: or any letter that is available, it does not matter what you use 5. Put a checkmark in the Connect using different credentials box 6. In the Folder dropdown box type \\itsofs06.itap.purdue.edu\ag_bchm\shared 7. Make sure to place a checkmark next to Reconnect at Logon 8. When prompted for username and password enter your Career Account username information in the following format: onepurdue\your Career Account username Continue by putting in your Career Account password and then proceed to step 9 9. Put a checkmark in the Remember my credentials box and Click OK

8 How to map the S drive on a PC (Windows 7) 1. From the Start Menu open Computer 2. From the menu at the top select Map network drive 3. In the Drive dropdown box select S: or any letter that is available, it does not matter what you use 4. Put a checkmark in the Connect using different credentials box 5. In the Folder dropdown box type \\itsofs06.itap.purdue.edu\ag_bchm\shared 6. Make sure to place a checkmark next to Reconnect at Logon 7. When prompted for username and password enter your Career Account username information in the following format: onepurdue\your Career Account username Continue by putting in your Career Account password and then proceed to step 8 8. Put a checkmark in the Remember my credentials box and Click OK

9 How to access the S drive on a Mac (OS S) For OS S From the menu bar click on GO 2. Click Connect to Server it should be at the bottom of the dropdown menu 3. Enter smb://itsofs06.itap.purdue.edu/ag_bchm/shared 4. Enter your Career Account Username and Password (Click the remember this password in my Keychain box before hitting the connect button) Access the S drive on start- up in Mac OS S Map the drive per the instructions above 2. Open System Preferences and click on Accounts 3. Select your user account 4. Select Login Items 5. Click- n- Drag the Mapped Drive Icon from the desktop to the item list 6. Make sure you click the check box next to the item you just dragged to the item list or it will not be enabled. 7. You are finished and can now close System Preferences

10 Information & Tips Graduate Students are given MyMail accounts. This type of account can be used with just about any client. Best Practices No matter how you access your at Purdue it is always beneficial to follow some basic best practices. The more items you have the slower your experience will be. Items are defined as anything inside your client. Calendar entries, sent items, contacts, unread , read , attachments etc. all count as items. Attachments should not be stored permanently in your client. While it is tempting to keep everything, you are slowing down your computer. Instead consider creating a separate folder on your hard drive to store attachments you wish to keep permanently. Use Filelocker to send attachments instead of . Filelocker is explained later in this document.

11 Web Mail access You can access your from wherever you are as long as you can connect to the Internet. Have your career account username and password ready and point your browser to the following link. This is a great page with all kinds of useful information regarding MyMail including information on how to setup MyMail for use with locally installed accounts. Learn more about the Purdue MyMail service.

12 Mobile Devices Here are some instructions on connecting your mobile device like an Apple iphone to various services like PAL2.0 and MyMail. Tips and Tutorials for MyMail access and more via smartphone. ios - Android - Purdue also offers a mobile application for your ios based device like the iphone, or ipod Touch.

13 Filelocker Filelocker allows you to share files with other people both inside and outside of Purdue. It is a temporary storage system for sharing files and data. You can access Filelocker with your career account username and password. Filelocker Benefits Share large files easily Share with large groups of people easily and limit access to certain files Share files that would normally be attached to an thereby saving space in your exchange account Share files anonymously Share files with people or groups at other universities Simple interface Access Filelocker at

14 PC Antivirus Purdue provides access to McAfee Antivirus and Anti- Spyware for PC for work and personal use. If you have an AgIT supported PC, Antivirus has been installed for you. If you have a PC that is not supported by AgIT, please go to the link below to download and install the appropriate client for your operating system. Mac Antivirus Purdue provides access to McAfee Antivirus Mac for work and personal use. Please go to the link below to download and install the appropriate client for your operating system version.

15 Security Tips Never send your account information through ; Purdue will never require you to do so. Never give your account information over the phone; Purdue will never require you to do so. If you do receive a suspicious , forward it immediately to jlevell@purdue.edu, then delete it. Don t open attachments or click on links in sent from non- trusted sources or people. Stay away from peer to peer sharing sites and software (bittorrent, KaZaa, Limewire, etc.). Try to avoid clicking on pop- up s when surfing the Internet. Close them from the taskbar in windows.

16 Working from Home or Abroad What is VPN (Virtual Private Network)? Virtual Private Networking is a method by which a user can access an organization's internal network over the Internet in a secure manner. A VPN provides users who are not on that internal network secure access to resources inside it. This is done by creating tunnels that wrap data packets destined for the internal network and then encrypting those packets to send them across the Internet. Why should I use the College of Agriculture VPN service? By using Ag's VPN service you can access resources that are only available on campus from the comfort of your own home. You can access your S: directory on your own computer, or access course materials you might not otherwise be able to access from home. Ag's VPN service can be accessed from anywhere in the world, any time of day or night.

17 Recommended Minimum Requirements VPN is very easy to setup and use, but you should be mindful that each person s experience will vary due to differences in the bandwidth with which you connect to the internet. In general the faster your Internet connection the faster and more productive your VPN experience will be. Your computers overall performance is not nearly as important as your upload/download capability. It is also helpful to remember that a wired connection is preferred to wireless when using VPN. Troubleshooting In general if you can t connect to the VPN it is due to configuration problems on your system or home network. Check that you are connected to the Internet and that your ISP is not having problems. Check to make sure that your router or broadband modem is functioning properly. Re- check all your settings on your computer. If after you have checked all the above issues and you are still having problems call the AgIT Support Line.

18 VPN Setup Instructions VPN Instructions for Windows 7 VPN Instructions for Mac OS

19 BCHMIT Personal Device Support If you decide to have BCHM IT work on your personal device for any reason please be aware of the following: BCHM IT or the Biochemistry Department is NOT responsible if something goes wrong, breaks, or does not work while working on your personal device. We will make every effort to help you out but ultimately the responsibility is yours. Thanks, Joe Levell BCHM IT

20 Department Baseline Security Policy and End User Agreement Computer security breaches and the proliferation of hostile software pose real threats to data security and system integrity. Consequently, computer security is a high priority on campus. Under Indiana law, an individual who does not maintain due diligence and allows sensitive or restricted data, such as Social Security numbers, to be compromised may be liable to legal action. This departmental baseline security policy is designed to ensure the safety of our network, data and systems. Any computers that you are responsible for are to be used and maintained in accordance with these policies. Local User Account Privileges and Responsibilities: 1. All accounts must be password protected using a strong password according to Purdue standards < A user s password must be changed periodically according to Purdue s Authentication and Authorization Policy < v_1_2.html> (currently every 120 or 30 days). Protect your password do not post it in obvious locations or give it to anyone. It is a best practice to not create guest access accounts or have an account that is set to autologin. 2. By default, all user accounts will be normal logins with standard privileges (no administrative or Power User rights). 3. Your workstation and its contents are the property of Purdue University and is provided to you for University business purposes. Do not engage in activities that could permit your workstation and the Purdue network to be compromised by computer viruses or malware. Computers, Applications and Services: 4. You may not install a server based service, or file shares (e.g. music/video shares, web server, client/server based database, file server, application server, e- mail server, etc.) on your computer unless approved by your supervisor, Biochemistry IT, and the department head. 5. Installation of Applications: a. For all applications that require a license, Purdue must own the license. No personally owned software can be installed on your workstation without the written approval of the department head. b. Biochemistry IT will install all common applications required for business purposes. 6. Biochemistry IT will order and initially setup any new computer or server. 7. Security countermeasures must be installed and maintained on your computer as defined below. Biochemistry IT will do the initial setup. You must not disable any of these security countermeasures. a. An approved software or hardware firewall must be installed and working properly on all workstations and must not be disabled. b. Ensure that automatic updates are turned on for operating system and all applications that support automatic updates. c. Virus scanning software must be installed and enabled. Anti- virus data files must be applied within 1 business day of release from the vendor. 8. Your computer will be routinely scanned and reviewed for security vulnerabilities. You will be advised of any vulnerability and will be expected to cooperate with Biochemistry IT/ITaP to remediate the identified vulnerabilities. 9. A password will be required to wake a system from sleep or the screen saver at a default timing of 15 minutes of inactivity (or less). It is a best practice to lock the screen or to log- off when the computer is unattended. Log- off at the end of the day, but keep your system on since most updates and patches are installed overnight. Network Security: 10. Non- Purdue workstations and laptops or any device not secured by Biochemistry IT are not permitted to plug into the Purdue Ethernet PICs in order to gain access to the network. Non- Purdue systems may connect using an b/g

21 wireless card to connect to the Purdue Airlink (PAL) wireless network and authenticate with the user s Purdue Career Account. Secure Data Handling Expectations: 11. You are expected to be knowledgeable and compliant with Purdue s restricted and sensitive data policies ( and applicable privacy regulations: FERPA, GLBA, and HIPAA. Certain employee roles require certification in these regulations ( 12. Restricted or sensitive data about employees, students, alumni, customers, or anyone otherwise affiliated with Purdue should only be stored on secure Purdue servers. Personal or sensitive data includes but are not limited to SSN, credit card information, and other personal identification information like PUIDs, birthdates, maiden names, etc. 13. Restricted or sensitive data may not be transmitted in messages, attachments, or messaging services unless encrypted. Use Purdue s FileLocker service to encrypt and securely transfer files to other users within or outside Purdue ( 14. Any restricted or sensitive data received via or Instant Messaging should be immediately removed from the computer and user s inbox folder on the server. 15. Data generated through reporting tools such as Cognos, Brio, or OnePurdue Initiative should be stored on secure Purdue servers and not on your local computer. 16. You may not store sensitive/restricted Purdue data on your home computer or laptops. 17. To report a security incident, contact Biochemistry IT (jlevell@purdue.edu). Exceptions and Documentation: 18. If a computer cannot comply with any item in this baseline security policy, then the exception must be documented and submitted to Biochemistry IT and the department head. Explicit written approval from the department head must have been received and on file with Biochemistry IT prior to use of the above device or computer. End User Agreement: I agree to adhere by the terms outlined in this policy and end user agreement. I understand that these terms are subject to change with notice. I understand that any violation of these restrictions may result in disciplinary action, which could include termination of employment. Date Printed Name Signature

22

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows 8 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 7, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

NUIT Tech Talk: Agenda

NUIT Tech Talk: Agenda NUIT Tech Talk: May 14, 2008 Leigh Underwood NUIT Senior Consultant Agenda Tips for Staying Secure Tips for Staying Connected Forwarding E-mail Special Instructions for Graduates Where to Go for Help Keep

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows 8, 7, XP, Mac OS X, Linux, and Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Wireless Security Access Policy and Agreement

Wireless Security Access Policy and Agreement Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)

More information

GREATER ESSEX COUNTY DISTRICT SCHOOL BOARD

GREATER ESSEX COUNTY DISTRICT SCHOOL BOARD GREATER ESSEX COUNTY DISTRICT SCHOOL BOARD REGULATION: NETWORK SECURITY AND ACCESS 1. NETWORK SECURITY AND ACCESS The purpose of this section of the Regulation is to define the standards, procedures and

More information

2017 Johns Hopkins Network Connectivity Guide

2017 Johns Hopkins Network Connectivity Guide 2017 Johns Hopkins Network Connectivity Guide ResNet, the JHU Student Residential Network, is the free high-speed wired and wireless internet network service available to students, on campus, and living

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Basic Citrix Setup Manual

Basic Citrix Setup Manual Basic Citrix Setup Manual Version 1.5 Created by Joshua Lindemann 2 P age Table of Contents Technology Services Help Desk... 4 Background... 5 Citrix Virtual Environment... 5 Wireless Access... 5 Security...

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

VDI Users Guide. Mac OS X

VDI Users Guide. Mac OS X Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to

More information

Student Staff Device Zone INSTRUCTIONS FOR LAPTOP CONFIGURATION AND CONNECTION NOTE: To access the Wolf Creek Network (Wolfnet) you must agree to abide by the provisions of the Wolf Creek Acceptable Use

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Citrix Access Firefox Browser

Citrix Access Firefox Browser Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...

More information

Destiny is the internet provider of all Br(ik buildings and student residences.

Destiny is the internet provider of all Br(ik buildings and student residences. Who is Destiny? Destiny is the internet provider of all Br(ik buildings and student residences. When you have trouble accessing the internet, please follow the guidelines in this manual and save yourself

More information

Installation guide for Choic Multi User Edition

Installation guide for Choic Multi User Edition Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)...2 1. Installation...2 Disable Apple Security...8

More information

Simon Technology Services

Simon Technology Services Simon Technology Services Student Handbook Simon Technology Services Help Desk Schlegel 404A (585) 275 4407 Support@Simon.Rochester.edu 1 Table of Contents Simon Credentials 3 Services Overview 4 Wireless

More information

Mac OS X version 10.6 and Below for Students

Mac OS X version 10.6 and Below for Students Mac OS X version 10.6 and Below for Students The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 06132017 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.jhu.edu/networking/wireless/

More information

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions). A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Advanced/Add-On Features... 5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time...

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 01242018 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY DAVIS IRVINE LOS ANGELES RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ ECONOMETRICS LABORATORY Institute of Business and Economic Research ECONOMETRICS

More information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

KSI/KAI Cyber Security Policy / Procedures For Registered Reps KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac. CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit support.getwireless.net for

More information

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

LO CompTIA A+ : (Exam ) Course Outline Sep 2018 Course Outline LO CompTIA A+ : (Exam 220902) 09 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Security Awareness Training June 2016

Security Awareness Training June 2016 Security Awareness Training June 2016 What is Information Security Awareness? The University of North Carolina at Chapel Hill protects its data network from thousands of daily intrusion attempts, but technical

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning UofM Secure Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 2/14/2018

More information

MAY-i Check User Guide Version June 2013

MAY-i Check User Guide Version June 2013 7100 Woodbine Avenue Suite 305 Markham, Ontario L3R 5J2 Canada (T) 1.888.697.7772 (F) 1.888.564.7729 sales@mayicorp.ca MAY-i Check User Guide Version 1.9.6 June 2013 Table of Contents Getting to know the

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

Wireless for Windows 7

Wireless for Windows 7 Wireless for Windows 7 The new CWSL wireless network consists of three different wireless networks CWSL Faculty-Staff - This network is for faculty and staff only. (uses WPA2-Enterprise encryption) CWSL

More information

ACN Premium Technical Support. 24/7/365 Remote Computer Support

ACN Premium Technical Support. 24/7/365 Remote Computer Support ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents... ii Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3:

More information

FPS BYOD Wireless Network

FPS BYOD Wireless Network FPS BYOD Wireless Network This document will help users connect their personally owned wireless devices to Framingham Public Schools BYOD wireless network. Visitors: If you have a visitor with a personal

More information

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless

More information

PSEG SSL VPN USER GUIDE

PSEG SSL VPN USER GUIDE PSEG SSL VPN USER GUIDE FOR NON-CORPORATE PCs (Windows 7, Vista, XP, and MAC OS X) TABLE OF CONTENTS QUICK CONNECT TO SSL VPN... 1 Connect to SSL VPN... 1 Disconnect from SSL VPN... 1 FIRST TIME USER SETUP...

More information

IT Student Helpdesk Handbook

IT Student Helpdesk Handbook IT Client Services IT Student Helpdesk Handbook.......... A commitment to ongoing support and assistance for AUT students (09) 921 9953 : help@aut.ac.nz Contents Contents... 2 Who are we?...1 Internet

More information

Start the Security Walkthrough

Start the Security Walkthrough Start the Security Walkthrough This guide will help you complete your HIPAA security risk analysis and can additionally be used for periodic review. It is based on the methodology used in PrivaPlan Stat

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU- VPN2, you will need to install and use client software

More information

REMOVE TSUWIRELESS WIRELESS NETWORK 2 CONNECTING TO TSU_SECURE WIRELESS NETWORK 7 CONNECT TO TNSTATE.EDU USING MOBILE DEVICE 11

REMOVE TSUWIRELESS WIRELESS NETWORK 2 CONNECTING TO TSU_SECURE WIRELESS NETWORK 7 CONNECT TO TNSTATE.EDU  USING MOBILE DEVICE 11 REMOVE TSUWIRELESS WIRELESS NETWORK 2 APPLE MAC OS X VERSIONS 10.5 10.8 2 MICROSOFT WINDOWS 7 (ALSO WINDOWS VISTA) 3 APPLE IPHONE/APPLE IPAD - IOS 3 ANDROID PHONES 4 WINDOWS XP 5 CONNECTING TO TSU_SECURE

More information

Setup Guide Revised: April 4, 2012 Developed by: www.discoverysoftware.com COPYRIGHT, DISCOVERY SOFTWARE LTD.: April 4, 2012: This material may not be copied or otherwise reproduced in any form, by any

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

Back to My Mac User Guide

Back to My Mac User Guide Back to My Mac User Guide This guide shows you how to use MobileMe over the Internet to access a remote Mac with Mac OS X Snow Leopard installed, a Time Capsule, or an external hard disk connected to an

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Important Things to Know... 4 Carbonite Features... 5 Setting Up and Installing... 6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription... 8 Subscription Pricing...

More information

Welcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide

Welcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide Welcome to Cogeco UltraFibre Internet UltraFibre Internet User Guide Hi there. Thanks for joining us. Welcome to your new UltraFibre Internet service from Cogeco. This User Guide is a reference tool for

More information

BYOD Programme Handbook

BYOD Programme Handbook BYOD Programme Handbook October 2018 Student & Parent Guide IT Helpdesk The IT Helpdesk is the initial point of contact for the IT Department. The IT Helpdesk is located in Mercy 2 and is open Monday

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their

More information

Contents. Windows 7 Instructions Windows 10 Instructions Android Instructions Mac OS Instructions ios Instructions...

Contents. Windows 7 Instructions Windows 10 Instructions Android Instructions Mac OS Instructions ios Instructions... The following provides instructions on how to connect to the SJCD-Secure Wireless Network from a variety of operating systems and devices. If you experience any difficulty with these instructions, please

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

Citrix Receiver & DP Storefront DUFFERIN PEEL C.D.S.B. ICT DOCUMENTATION. Volume

Citrix Receiver & DP Storefront DUFFERIN PEEL C.D.S.B. ICT DOCUMENTATION. Volume Volume 1 DUFFERIN PEEL C.D.S.B. ICT DOCUMENTATION Citrix Receiver & DP Storefront Prepared by: Kathryn Philpott/Yolanda Greco (Citrix Receiver/Storefront Windows 10) 2016 10 V 1.0 1 System Requirements

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

The purpose of this document is to help you to get started with your ipad to access Lilly resources such as , calendar, Lilly apps and more.

The purpose of this document is to help you to get started with your ipad to access Lilly resources such as  , calendar, Lilly apps and more. The purpose of this document is to help you to get started with your ipad to access Lilly resources such as email, calendar, Lilly apps and more. The setup process will take about 30 minutes to complete

More information

um Wireless Revised 8/17/18

um Wireless Revised 8/17/18 um Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website Revised 8/17/18

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva IT resources for McGill students IT User accounts First time login to Minerva McGill ID - 260123456 ( a 9 digit number) Minerva PIN - (yymmdd) Will be prompted to change the initial Minerva PIN 1 IT User

More information

Spectrum Business Cloud Backup Quick Start Guide

Spectrum Business Cloud Backup Quick Start Guide Spectrum Business Cloud Backup Quick Start Guide Table of Contents Introduction... 3 Administrator... 4 Set Up Spectrum Business Cloud Backup Admin Account... 4 Create Administrator Account... 4 Edit Administrator

More information

XFINITY Welcome Packet

XFINITY Welcome Packet XFINITY Welcome Packet Welcome! Your building comes with a fast, reliable property-wide WiFi network as well as access to our popular XFINITY TV video streaming service for university students. In the

More information

Windows Download & Installation

Windows Download & Installation BrokerMetrics / AgentMetrics Instructions for a New Installation Windows Download & Installation... 1 Macintosh Download & Installation... 6 Troubleshooting... 10 How to verify your installation... 11

More information

Cisco s AnyConnect VPN Client (version 2.4)

Cisco s AnyConnect VPN Client (version 2.4) Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private

More information

Minnesota CAREWare. Getting Ready for Minnesota CAREWare

Minnesota CAREWare. Getting Ready for Minnesota CAREWare Minnesota CAREWare Getting Ready for Minnesota CAREWare Updated July 2013 Index Getting Ready for Minnesota CAREWare... 1 User Requirements to Access Minnesota CAREWare... 1 Computer Requirements to Run

More information

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.

More information

Downloading, Installing, and Configuring Blackboard Drive

Downloading, Installing, and Configuring Blackboard Drive M06-Downloading, Installing, and Configuring Blackboard Drive Blackboard Learn: Moving Content This handout contains the exact same information as the corresponding Blackboard Learn Moving Content videos

More information

Test Operations Management System

Test Operations Management System Test Operations Management System For use by California Department of Education (CDE), Local Education Agency (LEA) ELPAC Coordinators, and ELPAC Test Examiners Copyright 2017 by Educational Testing Service.

More information

Thin Clients, Wireless Computers, Macs and Mobile Devices

Thin Clients, Wireless Computers, Macs and Mobile Devices Thin Clients, Wireless Computers, Macs and Mobile Devices Sales: 800.456.4522 Support: 800.888.8075 2016 Compulink Business Systems, Inc. All rights reserved. Thin Clients, Wireless Computers, Macs and

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

SET UP VPN FOR WINDOWS 10

SET UP VPN FOR WINDOWS 10 SET UP VPN FOR WINDOWS 10 A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure

More information

The English School Network

The English School Network The English School Network What is my NetID? Your NetID is the only username and password that is used to access computer systems at The English School. Email, workstations and WIFI all use the same user

More information

Remote Access (Supporting Document)

Remote Access (Supporting Document) Remote Access (Supporting Document) April 2007 Version Control Sheet Title: Purpose: Owner: Approved by: Remote Access (Supporting Document The advise staff of the councils policy and procedures regarding

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Guide to using Simply Web

Guide to using Simply Web Guide to using Simply Web Simply Web offers high performance access to Northumbria IT facilities from a wide range of devices which have a connection to the Internet including smartphones, tablets and

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Cmpt 101 Lab 1 - Outline

Cmpt 101 Lab 1 - Outline Cmpt 101 Lab 1 - Outline Instructions: Work through this outline completely once directed to by your Lab Instructor and fill in the Lab 1 Worksheet as indicated. Contents PART 1: GETTING STARTED... 2 PART

More information

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac. Username: Password: CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit dojonetworks.com/support

More information

Keeping Your Computer Secure Quick Reference Guide

Keeping Your Computer Secure Quick Reference Guide Keeping Your Computer Secure Quick Reference Guide Created: 3/16/2010 Page 1 of 1 Table Of Contents 1. Introduction... 3 2. Keeping Your Computer Up to Date... 4 2.1 Windows... 4 2.2 Mac... 6 3. Malware

More information

Hosted Encore 5 Desktop Installation Guide

Hosted Encore 5 Desktop Installation Guide Hosted Encore 5 Desktop Installation Guide November 18, 2015 WARNING: This Guide is for quickly configuring desktops to communicate with Cluen s hosted Encore solution. If you are installing Encore within

More information