Personal Computing Devices Registration Procedure. 1. Background

Size: px
Start display at page:

Download "Personal Computing Devices Registration Procedure. 1. Background"

Transcription

1 Personal Computing Devices Registration Procedure 1. Background CGI 241 required that personal computing devices accessing and/or storing classified information be registered with ITSD and conforming to security requirements. There are different channels and applications which personal computing devices can access classified information. The common channels and applications include internal network (wired and wireless), Virtual Private Network (VPN), Outlook WebAccess (OWA), Exchange ActiveSync (for smart phones synchronizing s and calendars from Exchange) and other web-based applications. 2. Scope In general, Personal Computer Devices are computer devices purchased by individual. This includes home PCs, notebook computers and smart phones. 3. Purpose - For traceability of the devices and owner information in case of incidents - To ensure staff should take reasonable means to protect classified information in their personal computing devices - Technical enforcement of allowing only registered devices where technically feasible Registration of Personal Computing Devices V2.0 Page 1 of 11

2 4. New Device Registration - You can access the self service registration tool in the office or through internet by clicking here. If you access this from Internet you need to login using <domain\username> and password. For ex-m domain user, <domain\username> is mtrcorp\username For ex-k domain user, <domain\username> is dkcrc\username - Select New Registration (Personal Computer) or Select New Registration (Smartphone). - Fill in the following information and click Submit when complete. Type of Personal Information Required for Registration Computing Devices Personal Computer Department / Section (home PC, laptop) LAN ID Staff ID Computer name of your personal device (Help1) Computer brand and model Operating System MAC address (Help2) Antivirus software brand and version Personal Firewall Location of the computer Justification for using personal device Existing channels to access IT services (e.g. VPN, OWA) Smart Phone Department / Section LAN ID Staff ID Smartphone brand / Operating System (Help3) (You should only register ITSD supported model as other models would not be supported) IMEI (International Mobile Equipment Registration of Personal Computing Devices V2.0 Page 2 of 11

3 Identity) number (Help4) Serial No (for iphone registration) (Help5) Justification for using personal device Existing ways to access IT services (e.g. , appointment calendar etc) * No registration of personal owned USB removable device is required. Staff should request secure USB removable devices from ITSD to store classified information. Registration of Personal Computing Devices V2.0 Page 3 of 11

4 5. Change Information - When you want to change the device information, you can select Change Information / Remove Registration (Personal Computer) or Select Change Information/ Remove Registration (Smartphone). - All the registration created by you will be displayed. If you registered the devices of your boss, you should help to update the device information of your boss. - Click View Response to display the registration information. Click Edit Response to update information - Update the information and click Finish to save the change. Registration of Personal Computing Devices V2.0 Page 4 of 11

5 6. Remove Device Registration - If your device is not longer used for access corporate classified information, you can remove the device registration. - Click View Response to display the registration information. Click Edit Response to update information - To remove the registration, check Remove Device Registration. - Click Finish to save the record. Registration of Personal Computing Devices V2.0 Page 5 of 11

6 ITSD Security Requirements Staff should take reasonable means to protect classified information in your personal computing devices and conform to ITSD security controls. Devices Baseline Security Controls Desktop PC / Password protection Notebook PC Installed with antivirus software and enable LiveUpdate for virus definition updating Enable Automatic Update for security patches Installed with Personal Firewall Smart Phones Password protection Support remote wipe. This allows you to delete all information on the device remotely in case the device is lost. Enquiry For any enquiry, please contact IT Help Desk ( ) or it-helpdesk@mtr.com.hk More information can be found at the IT Help Desk Homepage of the MTR Portal in the Intranet. To access the information from Internet, please visit Registration of Personal Computing Devices V2.0 Page 6 of 11

7 Help A utility is available for you to obtain the information of your personal PC. To download the utility, please refer to the online self service registration webpage. You can also follow the steps to get the information. 1. How to get the Computer Name for Windows machines? Make sure you run these command on your own personal device and not your office desktop PC. - Go to Start and Click on Run - When Run prompt appears, type cmd and click OK - Type hostname and enter - The result is the Computer Name Or you may refer to the following links to find the information: For Windows Vista, For Windows 7, For Macintosh computers, Registration of Personal Computing Devices V2.0 Page 7 of 11

8 2. How to get the MAC Address for Windows Machines? Make sure you run these commands on your own personal device and not your office desktop PC. - Go to Start and Click on Run - When Run prompt appears, type cmd and click OK - Type ipconfig/all and enter - The Physical Address is the MAC Address If you have PCs running on non-windows Operating System, you may contact IT Help Desk for assistance. Or you may refer to the following links to find the information: For Windows Vista, For Windows 7, For Macintosh computers, MAC Address (or Airport ID) Registration of Personal Computing Devices V2.0 Page 8 of 11

9 3. Which are the ITSD supported smart phone devices? - RIM Blackberry Bold - RIM Blackberry Storm - RIM Blackberry Curve - Apple iphone 3GS - Devices running on Microsoft Windows Mobile 6 or above 4. How to get the IMEI number of my smart phone? - Under the battery of the phone - Enter *#06# on the phone s key pad - For Blackberry Storm, select Options, Status - For iphone, in the Options, About 5. How to get the Serial No. of my iphone? - The Serial No. is shown in Setting -> General -> About in your iphone Registration of Personal Computing Devices V2.0 Page 9 of 11

10 Frequently Asked Questions FAQ 1. I am using a notebook computer provided by ITSD. Do I need to register the notebook computer? No, you do not need to register computers provided by ITSD. 2. I am using a computer provided by clients in overseas. Do I need to register the computer? No, you only need to register computers owned by you. 3. There are some contractors working in my team. Should I ask them to register their personal devices now? No, only MTR staff needs to register their personal devices at this stage according to CGI I do not use my personal device to access classified information. Do I need to register the device? No, you do not need to register your personal computer device if you do not use it to access or store classified information. 5. What are purposes of the registration? Personal computing device registration is a requirement stated in CGI 241 Protection of Classified Corporation Information. The purposes are:- - To remind staff to take reasonable means to protect classified information in their personal computing devices - For traceability of the devices and owner information in case of incidents - Technical enforcement of allowing only registered devices where technically feasible 6. Is the information captured sensitive information? Will the disclosure of the information increase the risk of unauthorised access to my personal computing devices? The information requested for registration is not sensitive information. Nevertheless, all information collected will be protected and only used for the registration purposes. Disclosure of computer name and MAC (hardware) address in the registration does not increase the risk of unauthorised access to personal computing devices. In fact, computer Registration of Personal Computing Devices V2.0 Page 10 of 11

11 MAC address has been disclosed whenever the computer plugged into the data network. 7. How many devices can I register for access to the Corporation information system? There is no limit on the number of registered devices. You can remove old devices which are no longer used from the registration. Registration of Personal Computing Devices V2.0 Page 11 of 11

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

WiFi Setup for Android (Sony, Samsung,...) WiFi Setup for ios (iphone) WiFi Setup for Laptop. WiFi Setup for OS X (imac - Mac Book)

WiFi Setup for Android (Sony, Samsung,...) WiFi Setup for ios (iphone) WiFi Setup for Laptop. WiFi Setup for OS X (imac - Mac Book) WiFi Setup for Android (Sony, Samsung,...) 3 WiFi Setup for ios (iphone) 9 WiFi Setup for Laptop 13 WiFi Setup for OS X (imac - Mac Book) 19 Email Setup for Android (Sony, Samsung,...) 25 Email Setup for

More information

HOSTED EXCHANGE SETTING UP ON SMARTPHONES & TABLETS

HOSTED EXCHANGE SETTING UP ON SMARTPHONES & TABLETS HOSTED EXCHANGE - SETTING UP ON SMARTPHONES & TABLETS Skyfillers Customer Manual CONTENT Setting up Hostedt Exchange on Apple iphone... 2 Setting up Hostedt Exchange with Apple ipad... 5 Setting up Hosted

More information

Blackberry Wireless for MailStreet Setup Guide

Blackberry Wireless  for MailStreet Setup Guide Blackberry Wireless Email for MailStreet Setup Guide Revision: 11/1/03, 4/1/04 MailStreet Support Information Email: support@mailstreet.com (be sure to include your domain name and MailStreet email address)

More information

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication

More information

Banner SSL VPN User Guide

Banner SSL VPN User Guide P a g e 1 Banner SSL VPN User Guide Version By Date Changes 1.3 Jerome Casper 6-1-2016 Combined VPN/2FA documentation Guide Maintainence IT Service Desk Ongoing Table of Contents Document Control and Version

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

INSTALLING MICROSOFT OUTLOOK 2011

INSTALLING MICROSOFT OUTLOOK 2011 INSTALLING MICROSOFT OUTLOOK 2011 The purpose of this guide is to explain how to download, install, and configure Microsoft Outlook 2011. Follow the steps as detailed in this document. If you encounter

More information

User Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010

User Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010 Mobile Viewer Mobile Manager Software (MMS) User Manual The picture might differ according to the specification and model. Contents of this manual are protected under copyrights and computer program laws.

More information

Office365 & CANVAS. Quick Guide and Reference

Office365 & CANVAS. Quick Guide and Reference Office365 & CANVAS Quick Guide and Reference Office365 Office365 is a web or cloud-based subscription that can be accessed on multiple devices from anywhere with an online connection. It includes the most

More information

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios

More information

Office 365 Mobile Instructions. Setup on Apple (iphone, ipad) devices

Office 365 Mobile Instructions. Setup  on Apple (iphone, ipad) devices Office 365 Mobile Instructions Setup email on Apple (iphone, ipad) devices 1. Open Settings 2. Select Mail, Contacts, Calendars. 3. Select Add Account 4. Select Microsoft Exchange 5. Enter your email address

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Allen University Microsoft Office 365

Allen University Microsoft Office 365 Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Note: It is highly recommended that users pre enroll while at work by going to https://sss.lasd.org

Note: It is highly recommended that users pre enroll while at work by going to https://sss.lasd.org DSB Home Bureau Home Page Two Factor (Multifactor) Authentication Note: It is highly recommended that users pre enroll while at work by going to https://sss.lasd.org If you re "Two Factor (Multifactor)

More information

Using your ios Device on the BUMC 802.1x Wireless Network

Using your ios Device on the BUMC 802.1x Wireless Network Using your ios Device on the BUMC 802.1x Wireless Network Use of the VPN for connecting to BU s wireless network is no longer necessary. The easiest way to connect is via the BU 802.1x wireless network

More information

Barbara Ann Karmanos Cancer Institute. Instructions for Installing Cisco Systems VPN Client

Barbara Ann Karmanos Cancer Institute. Instructions for Installing Cisco Systems VPN Client Barbara Ann Karmanos Cancer Institute Instructions for Installing Cisco Systems VPN Client DISCLAIMER: IMPORTANT INFORMATION - PLEASE READ THIS AGREEMENT CAREFULLY BEFORE OPENING THE PACKAGE AND/OR USING

More information

Changing Your Network Password

Changing Your Network Password Mortenson Office 365 Takes 10-15 minutes Changing Your Network Password Changing your password on every device, including your desktop, laptop or desktop terminal locally and within Citrix is of utmost

More information

Where to save your work

Where to save your work Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5

More information

Two-Factor Authentication User FAQ s

Two-Factor Authentication User FAQ s Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

HOW TO ACCESS IROQUOIS ONLINE

HOW TO ACCESS IROQUOIS ONLINE HOW TO ACCESS IROQUOIS ONLINE 1. PURPOSE The purpose of this document is to provide users with best effort instructions on how to access the Iroquois OnLine (Citrix) environment from the public Internet.

More information

IT Transition FAQs. 4. If someone has Adobe Acrobat Pro, will this be affected in any way?

IT Transition FAQs. 4. If someone has Adobe Acrobat Pro, will this be affected in any way? IT Transition FAQs 1. On personal Outlook calendars, will the appointments/reminders, etc. that we currently have set up automatically be moved over to the new email/calendar in Office365? Or will we have

More information

Student Service User Guide

Student  Service User Guide Version 1.4 2017/10/04 Student Email Service User Guide CHU HAI COLLEGE OF HIGHER EDUCATION created by ITSO Version No. Date Created / Updated by Description 1.4 2017-10-04 ITSO 1 Activate Student Email

More information

Student Laptop Computer FAQs

Student Laptop Computer FAQs Gateway Technical College students often bring their own laptop, notebook or tablet computers with them to class or to aid in studying. Some Gateway academic programs are requiring that students have a

More information

Sophos Mobile Control User guide for Windows Mobile

Sophos Mobile Control User guide for Windows Mobile Sophos Mobile Control User guide for Windows Mobile Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login at the Self Service Portal... 4 3 Set up Sophos Mobile

More information

USING MICROSOFT OFFICE A GUIDE FOR USER S TRANSITIONING FROM NOVELL GROUPWISE

USING MICROSOFT OFFICE A GUIDE FOR USER S TRANSITIONING FROM NOVELL GROUPWISE U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A USING MICROSOFT OFFICE A GUIDE FOR USER S TRANSITIONING FROM NOVELL GROUPWISE JUNE 2013 U N I V E R S I T Y O F S O U T H E R N C A L I F O

More information

How to Use WOL, VPN and RDP

How to Use WOL, VPN and RDP Introduction How to Use WOL, VPN and RDP Wake On Lan (WOL) - this service allows you to power up your University work PC remotely (i.e: from home), in order to use the WOL service you will need to register

More information

ACCESSING YOUR ON A MOBILE DEVICE

ACCESSING YOUR  ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE You can access your USC e-mail on the following mobile devices: Android BlackBerry BlackBerry 10 iphone /ipod Touch /ipad

More information

Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp

Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp Connectify me works like a charm. i have it installed in my laptop and i would Windows XP does not support Virtual WiFi and hotspots

More information

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac. Username: Password: CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit dojonetworks.com/support

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

Installing Your Multifunction to Your Network for the First Time. MAXIFY MB2320 Mac OS

Installing Your Multifunction to Your Network for the First Time. MAXIFY MB2320 Mac OS Installing Your Multifunction to Your Network for the First Time MAXIFY MB2320 Mac OS 1 Preparing to Connect to the Network Network Requirements Before connecting the machine to the network, make sure

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

Academic Services. Exeter IT. Desktop Support

Academic Services. Exeter IT. Desktop Support Academic Services Exeter IT Desktop Support Document reference: Document type: Document status: Review period: DS015 Desktop Support Policy Live Six months Next review date: 23 March 2012 DS015 - - v1.8

More information

Important Information

Important Information 1 Important Information Before you sync to your mobile device, your mailbox will have had to be converted to the new Exchange 2010. Each type of device family (Apple, Blackberry, Android, Windows etc.)

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office.

This guide provides all of the information necessary to connect to MoFo resources from outside of the office. REMOTE ACCESS GUIDE Introduction This guide provides all of the information necessary to connect to MoFo resources from outside of the office. Connect Remotely from Your Firm Notebook Using VPN Connect

More information

Basic User Manual KS-60 USB WiFi Antenna

Basic User Manual KS-60 USB WiFi Antenna Basic User Manual KS-60 USB WiFi Antenna www.scoutantenne.com ed. 04-2015 1. Introduction Thank you for purchasing the Scout KS-60 USB WiFi antenna, a professional marine antenna with 100% waterproof technology

More information

User Guide. NetScaler Gateway Access

User Guide. NetScaler Gateway Access User Guide NetScaler Gateway Access Version: 1 Date: December 5, 2017 Facilitator Guide This guide has been produced by the ITS Learning Services Team. All reasonable precautions have been taken in the

More information

Symantec Endpoint Protection Installation Guide

Symantec Endpoint Protection Installation Guide Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...

More information

Individuals Authorized Access to CMS Computer Services (IACS) Request Access to a CMS Application Quick Reference Guide

Individuals Authorized Access to CMS Computer Services (IACS) Request Access to a CMS Application Quick Reference Guide Individuals Authorized Access to CMS Computer Services (IACS) Request Access to a CMS Application Quick Reference Guide This Quick Reference Guide provides step-by-step instructions to access the IACS

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

How To Install New Blackberry Os Without. Desktop Manager >>>CLICK HERE<<<

How To Install New Blackberry Os Without. Desktop Manager >>>CLICK HERE<<< How To Install New Blackberry Os Without Desktop Manager Download the latest available version of BlackBerry 10 OS to discover new Check out some of the new features and enhancements by browsing the tabs

More information

This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones.

This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Purpose Outlook App Setup for iphones and Android Job Aid This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Contents iphone Device Setup... 2 Account Setup...

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

BASICS OF PORT FORWARDING ON A ROUTER

BASICS OF PORT FORWARDING ON A ROUTER BASICS OF PORT FORWARDING ON A ROUTER FOR SECURITY DVRS 192.168.1.100 Internet Public IP Address 72.248.26.116 Private IP Address 192.168.1.1 192.168.1.150 192.168.1.200 www.nightowlsp.com Basics of Port

More information

Outlook 2013 & 2010 for Windows

Outlook 2013 & 2010 for Windows Quick Start steps you through the process of configuring Outlook (2013, 2010 & 2007 for Windows, 2011 for MAC and OWA) to synchronize with Timewatch s WhiteSpace and Time&Space resource scheduling solution.

More information

WebOutlook 2007 via Internet/Intranet User Guide

WebOutlook 2007 via Internet/Intranet User Guide WebOutlook 2007 via Internet/Intranet Juergen Brogmus 13.02.2009 1 of 22 Content 1 General 3 2 Prerequisite for WebOutlook 3 3 How to get access to your mailbox via WebOutlook 4 4 Regional Settings 6 5

More information

VPN Guide. Pre-Requisites. Before connecting to the SGUL VPN, you must ensure the following:

VPN Guide. Pre-Requisites. Before connecting to the SGUL VPN, you must ensure the following: VPN Guide This guide is for users of personal devices, when connecting from home. SGUL staff who have been issued with an SGUL owned and managed laptop should not use this guide. Pre-Requisites Before

More information

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac. CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit support.getwireless.net for

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Using the Vita Group Citrix Portal

Using the Vita Group Citrix Portal Using the Vita Group Citrix Portal Using the Portal Summary This document is will step you through using the Vita Group Citrix portal. This portal allows you to reset your password if it is expired, unlock

More information

Intune Deployment at UHN Frequently Asked Questions Updated: December Overview

Intune Deployment at UHN Frequently Asked Questions Updated: December Overview Intune Deployment at UHN Frequently Asked Questions Updated: December 2017 Overview This document has been prepared to answer frequently asked questions regarding the Microsoft application, Intune, and

More information

on Your Mobile

on Your Mobile on Your Mobile Contents Table of Contents Android... 1 iphone...2 Windows Phone... 3 Email and Mobile Content Android 1. From the Applications/Settings menu, select Email. This application may be named

More information

Getting ready to set up. Step 1. Note:

Getting ready to set up. Step 1. Note: BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up Cognizant e-mail on the native e-mail app of your ios mobile device. Note: - TruMobi

More information

My Site. Introduction

My Site. Introduction My Site Introduction My Site is a component of the portal that is available to all NB educators. It is a personalized site that provides all users with the following features: A place to save and share

More information

Imprivata ID Enrollment Instructions iphone instructions

Imprivata ID Enrollment Instructions iphone instructions Imprivata ID Enrollment Instructions iphone instructions Imprivata ID is the system EvergreenHealth uses to provide an extra layer of security in addition to username/password when logging in remotely

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Frequently Asked Questions

Frequently Asked Questions FAQs 10010410NC-RR Frequently Asked Questions Connecting Your Valet to the Internet 1 What computer operating systems does the Valet/Valet Plus support? 1 Why can t I connect my computer or device to my

More information

BlackBerry Usage Policy. Government of Newfoundland and Labrador (GNL)

BlackBerry Usage Policy. Government of Newfoundland and Labrador (GNL) Document Title: BlackBerry Usage Policy No. Of Pages Document Type: Policy 8 Scope: Government of Newfoundland and Labrador (GNL) Trim ( # ) DOC00517/2007 Revision ( # ) 12 Treasury Board Approval ( #

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Using the Secure MyApps Environment

Using the Secure MyApps Environment Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially

More information

Top Producer for BlackBerry Quick Setup

Top Producer for BlackBerry Quick Setup Top Producer for BlackBerry Quick Setup Top Producer Systems Phone Number: 1-800-830-8300 Email: support@topproducer.com Website: www.topproducer.com Trademarks Information in this document is subject

More information

Office365 & CANVAS. Quick Guide and Reference

Office365 & CANVAS. Quick Guide and Reference Office365 & CANVAS Quick Guide and Reference Office365 Office365 is a web or cloud-based subscription that can be accessed on multiple devices from anywhere with an online connection. It includes the most

More information

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7 INTRODUCTION Before installing an EWSi Portal Plus Controller on a network it is necessary to change the default IP address of the unit to one supplied by the network administrator. The following screen

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information

RoadSync Java MIDP 2.0 Manual

RoadSync Java MIDP 2.0 Manual RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System

More information

Smartphone Service Policy

Smartphone Service Policy Academic Services Exeter IT Desktop Support Smartphone Service Policy Document reference: Document type: Document status: Review period: DS015 Desktop Support Policy Live Six months Next review date: 31

More information

Quick Installation Guide DN-70495

Quick Installation Guide DN-70495 Quick Installation Guide DN-70495 LED Indicator and Button Status Description LED Indicator Description: Power: Indicate the power status WAN/LAN: Indicate the Ethernet connection status WLAN: Indicate

More information

Enrolling Devices in Duo

Enrolling Devices in Duo Enrolling Devices in Duo To use ArchPass, UGA s two-step login powered by Duo you will need to enroll a device with the Duo application. You can enroll any smartphone, mobile phone, landline phone or tablet.

More information

Access New Campus Wi-Fi Using: Apple iphone/ipad

Access New Campus Wi-Fi Using: Apple iphone/ipad Access New Campus Wi-Fi Using: Apple iphone/ipad 1. Connect to the Wi-Fi SSID named LMC WiFi Employee Reg (you connect to this SSID ONLY ONCE to register your device). 2. Once connected to the SSID, open

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.jhu.edu/networking/wireless/

More information

Laker Mail Student Tips By James Landrum

Laker Mail Student Tips By James Landrum Laker Mail Student Tips By James Landrum Lake-Sumter Community College wishes to thank James Landrum for this tip! LSCC is not responsible for the content of this student helpful tip idea. If you have

More information

ResNet Guide. For the University of Redlands. Determine Your Operating System... 2 Windows 8 / 8.1 Wireless Connection Instructions...

ResNet Guide. For the University of Redlands. Determine Your Operating System... 2 Windows 8 / 8.1 Wireless Connection Instructions... ResNet Guide For the University of Redlands Contents Determine Your Operating System... 2 Windows 8 / 8.1 Wireless Connection Instructions...4 Windows 7/ Wireless Connection Instructions... 8 Apple Lion

More information

RU-VPN GlobalProtect Installation for Mac

RU-VPN GlobalProtect Installation for Mac RU-VPN GlobalProtect Installation for Mac Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software called

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

Making the Smart Switch. A Guide to Switching from an Apple iphone to a Samsung Galaxy Smartphone

Making the Smart Switch. A Guide to Switching from an Apple iphone to a Samsung Galaxy Smartphone Making the Smart Switch A Guide to Switching from an Apple iphone to a Samsung Galaxy Smartphone White Paper: Making the Smart Switch Making the Smart Switch Smartphones are crucial to productivity both

More information

Inotera Memories Inc. SSLVPN For Personal User Manual

Inotera Memories Inc. SSLVPN For Personal User Manual Inotera Memories Inc. SSLVPN For Personal User Manual Add SSL-VPN Website in Trusted sites Run Internet Explorer, click Tools Internet Options Security Trusted sites Sites Add below sites: https://inovpn.inotera.com

More information

Fulton County Schools Instructions

Fulton County Schools  Instructions Dear SGC Member, Fulton County Schools Email Instructions Your fultonschools.org email address is ready for use! We encourage you to check your fultonschools.org email daily and remember that this email

More information

Citrix Access Firefox Browser

Citrix Access Firefox Browser Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...

More information

Deployment User Guide

Deployment User Guide Deployment User Guide Version: 010319-2 Contents STEP 1: (Windows Users Only): Determine if your PC is running the 32-bit or 64-bit version of Windows. If you are not a PC user, please proceed to step

More information

Rev. 06 Nov User Guide: Downloading and Logging into Skandocs

Rev. 06 Nov User Guide: Downloading and Logging into Skandocs Rev. 06 Nov. 2007 User Guide: Downloading and Logging into Skandocs Introduction Skandocs (Skanska Document Online Collaboration System) is a purpose-built document management & control system built by

More information

electric drive vehicle homepage dealer process 2013

electric drive vehicle homepage dealer process 2013 electric drive vehicle homepage dealer process 2013 v.05/09/2013 Tools and systems General description: > The term is used as a generic term for the website used to connect the EV (e.g. smart fortwo electric

More information

Microsoft Entourage 2008 Setup Guide

Microsoft Entourage 2008 Setup Guide Tags entourage, office, os x Edited Today at 10:57 AM by Kobayakawa, Scott T Microsoft Entourage 2008 Setup Guide CBE staff with Macintosh computers may access their email using either Outlook Web Access

More information

BlackBerry. User Guide

BlackBerry. User Guide BlackBerry User Guide Table of contents 0 BlackBerry Internet Service for new users 1 Getting started... P. 2 2 Set up your email account via smartphone... P. 3 3 Set up your email account via website

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association IMEI Database Manufacturer / Brand Owner User Guide Version 4.0 01 September 2015 Copyright Notice Copyright 2015 GSM Association GSM and the GSM logo are registered and owned by the GSM Association. Antitrust

More information

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Copyright 2018 Exostar LLC All rights reserved. 1 Version Impacts Date Owner Enterprise Access Gateway (EAG) Guide Revised June

More information

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details. Welcome to Your FCSL Student Web Portal Course Schedule Students can view and search course schedules and view class details. Online Registration Online registration allows students to register for courses

More information

GETTING STARTED: BlackBerry Enterprise (BES)

GETTING STARTED: BlackBerry Enterprise (BES) BlackBerry BES Setup / Introduction & Resource Links Page 1 of 6 GETTING STARTED: BlackBerry Enterprise (BES) Welcome to MailStreet! This PDF contains instruction for connecting your BlackBerry handheld

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/

More information

Law Network Fall 2014

Law Network Fall 2014 ACCOUNT INFORMATION Law Network Fall 2014 Initial Desktop (with Restricted Public Access) Double Click on the icon. If you need to use a USB Flash Drive, plug it in BEFORE you log in so it can be recognized.

More information

Need Help? September to May Monday Friday 8:00 a.m. - 4:30 p.m. Walk-in & Phone Monday Thursday 4:30 p.m. - 7:00 p.m. Phone Only

Need Help? September to May Monday Friday 8:00 a.m. - 4:30 p.m. Walk-in & Phone Monday Thursday 4:30 p.m. - 7:00 p.m. Phone Only Need Help? IT Help Desk Hours The IT Help Desk is available for all technical support needs. September to May Monday Friday 8:00 a.m. - 4:30 p.m. Walk-in & Phone Monday Thursday 4:30 p.m. - 7:00 p.m. Phone

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTR ODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

How To Wipe Blackberry Curve 9300 Using Desktop Manager

How To Wipe Blackberry Curve 9300 Using Desktop Manager How To Wipe Blackberry Curve 9300 Using Desktop Manager Find out how to use and troubleshoot your BlackBerry Curve 9330 smartphone Wipe Handheld Option (Hard Reset) BlackBerry Curve 9330 Smartphone All,

More information

OFFICE 365 FOR EDUCATION FOR STUDENTS AND FACULTY

OFFICE 365 FOR EDUCATION FOR STUDENTS AND FACULTY Contents Office 365 for Education... 2 What is Microsoft Office 365 for Education?... 2 When will Office 365 for Education be available?... 2 Who is eligible for the Office 365 offer?... 2 Will I have

More information

e2e Appointment Manager

e2e Appointment Manager e2e Appointment Manager What is e2e Appointment Manager? Outlook Quick Start Guide The e2e Appointment Manager provides a quick and easy way to reserve blocks of time on your calendar for meetings. Students

More information

Using Outlook Web Access (OWA) 2013

Using Outlook Web Access (OWA) 2013 Using Outlook Web Access (OWA) 2013 Logging on to OWA 2013 Open Internet Explorer. In the Address bar, type https://myowa.seattlearch.org Note: Make sure to include the s after http in the site address!

More information