Personal Computing Devices Registration Procedure. 1. Background
|
|
- Felicia Cummings
- 5 years ago
- Views:
Transcription
1 Personal Computing Devices Registration Procedure 1. Background CGI 241 required that personal computing devices accessing and/or storing classified information be registered with ITSD and conforming to security requirements. There are different channels and applications which personal computing devices can access classified information. The common channels and applications include internal network (wired and wireless), Virtual Private Network (VPN), Outlook WebAccess (OWA), Exchange ActiveSync (for smart phones synchronizing s and calendars from Exchange) and other web-based applications. 2. Scope In general, Personal Computer Devices are computer devices purchased by individual. This includes home PCs, notebook computers and smart phones. 3. Purpose - For traceability of the devices and owner information in case of incidents - To ensure staff should take reasonable means to protect classified information in their personal computing devices - Technical enforcement of allowing only registered devices where technically feasible Registration of Personal Computing Devices V2.0 Page 1 of 11
2 4. New Device Registration - You can access the self service registration tool in the office or through internet by clicking here. If you access this from Internet you need to login using <domain\username> and password. For ex-m domain user, <domain\username> is mtrcorp\username For ex-k domain user, <domain\username> is dkcrc\username - Select New Registration (Personal Computer) or Select New Registration (Smartphone). - Fill in the following information and click Submit when complete. Type of Personal Information Required for Registration Computing Devices Personal Computer Department / Section (home PC, laptop) LAN ID Staff ID Computer name of your personal device (Help1) Computer brand and model Operating System MAC address (Help2) Antivirus software brand and version Personal Firewall Location of the computer Justification for using personal device Existing channels to access IT services (e.g. VPN, OWA) Smart Phone Department / Section LAN ID Staff ID Smartphone brand / Operating System (Help3) (You should only register ITSD supported model as other models would not be supported) IMEI (International Mobile Equipment Registration of Personal Computing Devices V2.0 Page 2 of 11
3 Identity) number (Help4) Serial No (for iphone registration) (Help5) Justification for using personal device Existing ways to access IT services (e.g. , appointment calendar etc) * No registration of personal owned USB removable device is required. Staff should request secure USB removable devices from ITSD to store classified information. Registration of Personal Computing Devices V2.0 Page 3 of 11
4 5. Change Information - When you want to change the device information, you can select Change Information / Remove Registration (Personal Computer) or Select Change Information/ Remove Registration (Smartphone). - All the registration created by you will be displayed. If you registered the devices of your boss, you should help to update the device information of your boss. - Click View Response to display the registration information. Click Edit Response to update information - Update the information and click Finish to save the change. Registration of Personal Computing Devices V2.0 Page 4 of 11
5 6. Remove Device Registration - If your device is not longer used for access corporate classified information, you can remove the device registration. - Click View Response to display the registration information. Click Edit Response to update information - To remove the registration, check Remove Device Registration. - Click Finish to save the record. Registration of Personal Computing Devices V2.0 Page 5 of 11
6 ITSD Security Requirements Staff should take reasonable means to protect classified information in your personal computing devices and conform to ITSD security controls. Devices Baseline Security Controls Desktop PC / Password protection Notebook PC Installed with antivirus software and enable LiveUpdate for virus definition updating Enable Automatic Update for security patches Installed with Personal Firewall Smart Phones Password protection Support remote wipe. This allows you to delete all information on the device remotely in case the device is lost. Enquiry For any enquiry, please contact IT Help Desk ( ) or it-helpdesk@mtr.com.hk More information can be found at the IT Help Desk Homepage of the MTR Portal in the Intranet. To access the information from Internet, please visit Registration of Personal Computing Devices V2.0 Page 6 of 11
7 Help A utility is available for you to obtain the information of your personal PC. To download the utility, please refer to the online self service registration webpage. You can also follow the steps to get the information. 1. How to get the Computer Name for Windows machines? Make sure you run these command on your own personal device and not your office desktop PC. - Go to Start and Click on Run - When Run prompt appears, type cmd and click OK - Type hostname and enter - The result is the Computer Name Or you may refer to the following links to find the information: For Windows Vista, For Windows 7, For Macintosh computers, Registration of Personal Computing Devices V2.0 Page 7 of 11
8 2. How to get the MAC Address for Windows Machines? Make sure you run these commands on your own personal device and not your office desktop PC. - Go to Start and Click on Run - When Run prompt appears, type cmd and click OK - Type ipconfig/all and enter - The Physical Address is the MAC Address If you have PCs running on non-windows Operating System, you may contact IT Help Desk for assistance. Or you may refer to the following links to find the information: For Windows Vista, For Windows 7, For Macintosh computers, MAC Address (or Airport ID) Registration of Personal Computing Devices V2.0 Page 8 of 11
9 3. Which are the ITSD supported smart phone devices? - RIM Blackberry Bold - RIM Blackberry Storm - RIM Blackberry Curve - Apple iphone 3GS - Devices running on Microsoft Windows Mobile 6 or above 4. How to get the IMEI number of my smart phone? - Under the battery of the phone - Enter *#06# on the phone s key pad - For Blackberry Storm, select Options, Status - For iphone, in the Options, About 5. How to get the Serial No. of my iphone? - The Serial No. is shown in Setting -> General -> About in your iphone Registration of Personal Computing Devices V2.0 Page 9 of 11
10 Frequently Asked Questions FAQ 1. I am using a notebook computer provided by ITSD. Do I need to register the notebook computer? No, you do not need to register computers provided by ITSD. 2. I am using a computer provided by clients in overseas. Do I need to register the computer? No, you only need to register computers owned by you. 3. There are some contractors working in my team. Should I ask them to register their personal devices now? No, only MTR staff needs to register their personal devices at this stage according to CGI I do not use my personal device to access classified information. Do I need to register the device? No, you do not need to register your personal computer device if you do not use it to access or store classified information. 5. What are purposes of the registration? Personal computing device registration is a requirement stated in CGI 241 Protection of Classified Corporation Information. The purposes are:- - To remind staff to take reasonable means to protect classified information in their personal computing devices - For traceability of the devices and owner information in case of incidents - Technical enforcement of allowing only registered devices where technically feasible 6. Is the information captured sensitive information? Will the disclosure of the information increase the risk of unauthorised access to my personal computing devices? The information requested for registration is not sensitive information. Nevertheless, all information collected will be protected and only used for the registration purposes. Disclosure of computer name and MAC (hardware) address in the registration does not increase the risk of unauthorised access to personal computing devices. In fact, computer Registration of Personal Computing Devices V2.0 Page 10 of 11
11 MAC address has been disclosed whenever the computer plugged into the data network. 7. How many devices can I register for access to the Corporation information system? There is no limit on the number of registered devices. You can remove old devices which are no longer used from the registration. Registration of Personal Computing Devices V2.0 Page 11 of 11
Corporate Information & Computing Services. IT Services For University Staff.
Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate
More informationWiFi Setup for Android (Sony, Samsung,...) WiFi Setup for ios (iphone) WiFi Setup for Laptop. WiFi Setup for OS X (imac - Mac Book)
WiFi Setup for Android (Sony, Samsung,...) 3 WiFi Setup for ios (iphone) 9 WiFi Setup for Laptop 13 WiFi Setup for OS X (imac - Mac Book) 19 Email Setup for Android (Sony, Samsung,...) 25 Email Setup for
More informationHOSTED EXCHANGE SETTING UP ON SMARTPHONES & TABLETS
HOSTED EXCHANGE - SETTING UP ON SMARTPHONES & TABLETS Skyfillers Customer Manual CONTENT Setting up Hostedt Exchange on Apple iphone... 2 Setting up Hostedt Exchange with Apple ipad... 5 Setting up Hosted
More informationBlackberry Wireless for MailStreet Setup Guide
Blackberry Wireless Email for MailStreet Setup Guide Revision: 11/1/03, 4/1/04 MailStreet Support Information Email: support@mailstreet.com (be sure to include your domain name and MailStreet email address)
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationBanner SSL VPN User Guide
P a g e 1 Banner SSL VPN User Guide Version By Date Changes 1.3 Jerome Casper 6-1-2016 Combined VPN/2FA documentation Guide Maintainence IT Service Desk Ongoing Table of Contents Document Control and Version
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationINSTALLING MICROSOFT OUTLOOK 2011
INSTALLING MICROSOFT OUTLOOK 2011 The purpose of this guide is to explain how to download, install, and configure Microsoft Outlook 2011. Follow the steps as detailed in this document. If you encounter
More informationUser Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010
Mobile Viewer Mobile Manager Software (MMS) User Manual The picture might differ according to the specification and model. Contents of this manual are protected under copyrights and computer program laws.
More informationOffice365 & CANVAS. Quick Guide and Reference
Office365 & CANVAS Quick Guide and Reference Office365 Office365 is a web or cloud-based subscription that can be accessed on multiple devices from anywhere with an online connection. It includes the most
More informationNotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown
NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios
More informationOffice 365 Mobile Instructions. Setup on Apple (iphone, ipad) devices
Office 365 Mobile Instructions Setup email on Apple (iphone, ipad) devices 1. Open Settings 2. Select Mail, Contacts, Calendars. 3. Select Add Account 4. Select Microsoft Exchange 5. Enter your email address
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationAllen University Microsoft Office 365
Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationNote: It is highly recommended that users pre enroll while at work by going to https://sss.lasd.org
DSB Home Bureau Home Page Two Factor (Multifactor) Authentication Note: It is highly recommended that users pre enroll while at work by going to https://sss.lasd.org If you re "Two Factor (Multifactor)
More informationUsing your ios Device on the BUMC 802.1x Wireless Network
Using your ios Device on the BUMC 802.1x Wireless Network Use of the VPN for connecting to BU s wireless network is no longer necessary. The easiest way to connect is via the BU 802.1x wireless network
More informationBarbara Ann Karmanos Cancer Institute. Instructions for Installing Cisco Systems VPN Client
Barbara Ann Karmanos Cancer Institute Instructions for Installing Cisco Systems VPN Client DISCLAIMER: IMPORTANT INFORMATION - PLEASE READ THIS AGREEMENT CAREFULLY BEFORE OPENING THE PACKAGE AND/OR USING
More informationChanging Your Network Password
Mortenson Office 365 Takes 10-15 minutes Changing Your Network Password Changing your password on every device, including your desktop, laptop or desktop terminal locally and within Citrix is of utmost
More informationWhere to save your work
Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5
More informationTwo-Factor Authentication User FAQ s
Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information
More informationHOW TO ACCESS IROQUOIS ONLINE
HOW TO ACCESS IROQUOIS ONLINE 1. PURPOSE The purpose of this document is to provide users with best effort instructions on how to access the Iroquois OnLine (Citrix) environment from the public Internet.
More informationIT Transition FAQs. 4. If someone has Adobe Acrobat Pro, will this be affected in any way?
IT Transition FAQs 1. On personal Outlook calendars, will the appointments/reminders, etc. that we currently have set up automatically be moved over to the new email/calendar in Office365? Or will we have
More informationStudent Service User Guide
Version 1.4 2017/10/04 Student Email Service User Guide CHU HAI COLLEGE OF HIGHER EDUCATION created by ITSO Version No. Date Created / Updated by Description 1.4 2017-10-04 ITSO 1 Activate Student Email
More informationStudent Laptop Computer FAQs
Gateway Technical College students often bring their own laptop, notebook or tablet computers with them to class or to aid in studying. Some Gateway academic programs are requiring that students have a
More informationSophos Mobile Control User guide for Windows Mobile
Sophos Mobile Control User guide for Windows Mobile Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login at the Self Service Portal... 4 3 Set up Sophos Mobile
More informationUSING MICROSOFT OFFICE A GUIDE FOR USER S TRANSITIONING FROM NOVELL GROUPWISE
U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A USING MICROSOFT OFFICE A GUIDE FOR USER S TRANSITIONING FROM NOVELL GROUPWISE JUNE 2013 U N I V E R S I T Y O F S O U T H E R N C A L I F O
More informationHow to Use WOL, VPN and RDP
Introduction How to Use WOL, VPN and RDP Wake On Lan (WOL) - this service allows you to power up your University work PC remotely (i.e: from home), in order to use the WOL service you will need to register
More informationACCESSING YOUR ON A MOBILE DEVICE
ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE You can access your USC e-mail on the following mobile devices: Android BlackBerry BlackBerry 10 iphone /ipod Touch /ipad
More informationInstruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp
Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp Connectify me works like a charm. i have it installed in my laptop and i would Windows XP does not support Virtual WiFi and hotspots
More informationCONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.
Username: Password: CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit dojonetworks.com/support
More informationUsing the Secure MyApps Environment
Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially
More informationInstalling Your Multifunction to Your Network for the First Time. MAXIFY MB2320 Mac OS
Installing Your Multifunction to Your Network for the First Time MAXIFY MB2320 Mac OS 1 Preparing to Connect to the Network Network Requirements Before connecting the machine to the network, make sure
More informationComputing at MIT: Basics
Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing
More informationAcademic Services. Exeter IT. Desktop Support
Academic Services Exeter IT Desktop Support Document reference: Document type: Document status: Review period: DS015 Desktop Support Policy Live Six months Next review date: 23 March 2012 DS015 - - v1.8
More informationImportant Information
1 Important Information Before you sync to your mobile device, your mailbox will have had to be converted to the new Exchange 2010. Each type of device family (Apple, Blackberry, Android, Windows etc.)
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office.
REMOTE ACCESS GUIDE Introduction This guide provides all of the information necessary to connect to MoFo resources from outside of the office. Connect Remotely from Your Firm Notebook Using VPN Connect
More informationBasic User Manual KS-60 USB WiFi Antenna
Basic User Manual KS-60 USB WiFi Antenna www.scoutantenne.com ed. 04-2015 1. Introduction Thank you for purchasing the Scout KS-60 USB WiFi antenna, a professional marine antenna with 100% waterproof technology
More informationUser Guide. NetScaler Gateway Access
User Guide NetScaler Gateway Access Version: 1 Date: December 5, 2017 Facilitator Guide This guide has been produced by the ITS Learning Services Team. All reasonable precautions have been taken in the
More informationSymantec Endpoint Protection Installation Guide
Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...
More informationIndividuals Authorized Access to CMS Computer Services (IACS) Request Access to a CMS Application Quick Reference Guide
Individuals Authorized Access to CMS Computer Services (IACS) Request Access to a CMS Application Quick Reference Guide This Quick Reference Guide provides step-by-step instructions to access the IACS
More informationTable of Contents. Page 1 of 6 (Last updated 27 April 2017)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationHow To Install New Blackberry Os Without. Desktop Manager >>>CLICK HERE<<<
How To Install New Blackberry Os Without Desktop Manager Download the latest available version of BlackBerry 10 OS to discover new Check out some of the new features and enhancements by browsing the tabs
More informationThis Job Aid will assist setting up the Outlook Application for use on iphones and Android phones.
Purpose Outlook App Setup for iphones and Android Job Aid This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Contents iphone Device Setup... 2 Account Setup...
More informationInstitute of Technology, Sligo. Information Security Policy. Version 0.2
Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date
More informationBASICS OF PORT FORWARDING ON A ROUTER
BASICS OF PORT FORWARDING ON A ROUTER FOR SECURITY DVRS 192.168.1.100 Internet Public IP Address 72.248.26.116 Private IP Address 192.168.1.1 192.168.1.150 192.168.1.200 www.nightowlsp.com Basics of Port
More informationOutlook 2013 & 2010 for Windows
Quick Start steps you through the process of configuring Outlook (2013, 2010 & 2007 for Windows, 2011 for MAC and OWA) to synchronize with Timewatch s WhiteSpace and Time&Space resource scheduling solution.
More informationWebOutlook 2007 via Internet/Intranet User Guide
WebOutlook 2007 via Internet/Intranet Juergen Brogmus 13.02.2009 1 of 22 Content 1 General 3 2 Prerequisite for WebOutlook 3 3 How to get access to your mailbox via WebOutlook 4 4 Regional Settings 6 5
More informationVPN Guide. Pre-Requisites. Before connecting to the SGUL VPN, you must ensure the following:
VPN Guide This guide is for users of personal devices, when connecting from home. SGUL staff who have been issued with an SGUL owned and managed laptop should not use this guide. Pre-Requisites Before
More informationCONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.
CONTENTS 1 2 3 4 5 7 8 Getting connected Ethernet Setup Connecting a Router Logging on Configuring DHCP in Windows Configuring DHCP on a Mac Troubleshooting HELP TIP: Visit support.getwireless.net for
More informationInformation Security Policy for Associates and Contractors
Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationUsing the Vita Group Citrix Portal
Using the Vita Group Citrix Portal Using the Portal Summary This document is will step you through using the Vita Group Citrix portal. This portal allows you to reset your password if it is expired, unlock
More informationIntune Deployment at UHN Frequently Asked Questions Updated: December Overview
Intune Deployment at UHN Frequently Asked Questions Updated: December 2017 Overview This document has been prepared to answer frequently asked questions regarding the Microsoft application, Intune, and
More informationon Your Mobile
on Your Mobile Contents Table of Contents Android... 1 iphone...2 Windows Phone... 3 Email and Mobile Content Android 1. From the Applications/Settings menu, select Email. This application may be named
More informationGetting ready to set up. Step 1. Note:
BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up Cognizant e-mail on the native e-mail app of your ios mobile device. Note: - TruMobi
More informationMy Site. Introduction
My Site Introduction My Site is a component of the portal that is available to all NB educators. It is a personalized site that provides all users with the following features: A place to save and share
More informationImprivata ID Enrollment Instructions iphone instructions
Imprivata ID Enrollment Instructions iphone instructions Imprivata ID is the system EvergreenHealth uses to provide an extra layer of security in addition to username/password when logging in remotely
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationFrequently Asked Questions
FAQs 10010410NC-RR Frequently Asked Questions Connecting Your Valet to the Internet 1 What computer operating systems does the Valet/Valet Plus support? 1 Why can t I connect my computer or device to my
More informationBlackBerry Usage Policy. Government of Newfoundland and Labrador (GNL)
Document Title: BlackBerry Usage Policy No. Of Pages Document Type: Policy 8 Scope: Government of Newfoundland and Labrador (GNL) Trim ( # ) DOC00517/2007 Revision ( # ) 12 Treasury Board Approval ( #
More informationIAM Security & Privacy Policies Scott Bradner
IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement
More informationUsing the Secure MyApps Environment
Be the Difference. Using the Secure MyApps Environment Accessing UH Applications from Non-UH Devices This Job Aid is intended for UH employees who would like to remotely connect to UH applications, especially
More informationTop Producer for BlackBerry Quick Setup
Top Producer for BlackBerry Quick Setup Top Producer Systems Phone Number: 1-800-830-8300 Email: support@topproducer.com Website: www.topproducer.com Trademarks Information in this document is subject
More informationOffice365 & CANVAS. Quick Guide and Reference
Office365 & CANVAS Quick Guide and Reference Office365 Office365 is a web or cloud-based subscription that can be accessed on multiple devices from anywhere with an online connection. It includes the most
More informationAPPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7
INTRODUCTION Before installing an EWSi Portal Plus Controller on a network it is necessary to change the default IP address of the unit to one supplied by the network administrator. The following screen
More informationCONTENTS IN DETAIL INTRODUCTION
CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...
More informationRoadSync Java MIDP 2.0 Manual
RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System
More informationSmartphone Service Policy
Academic Services Exeter IT Desktop Support Smartphone Service Policy Document reference: Document type: Document status: Review period: DS015 Desktop Support Policy Live Six months Next review date: 31
More informationQuick Installation Guide DN-70495
Quick Installation Guide DN-70495 LED Indicator and Button Status Description LED Indicator Description: Power: Indicate the power status WAN/LAN: Indicate the Ethernet connection status WLAN: Indicate
More informationEnrolling Devices in Duo
Enrolling Devices in Duo To use ArchPass, UGA s two-step login powered by Duo you will need to enroll a device with the Duo application. You can enroll any smartphone, mobile phone, landline phone or tablet.
More informationAccess New Campus Wi-Fi Using: Apple iphone/ipad
Access New Campus Wi-Fi Using: Apple iphone/ipad 1. Connect to the Wi-Fi SSID named LMC WiFi Employee Reg (you connect to this SSID ONLY ONCE to register your device). 2. Once connected to the SSID, open
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.jhu.edu/networking/wireless/
More informationLaker Mail Student Tips By James Landrum
Laker Mail Student Tips By James Landrum Lake-Sumter Community College wishes to thank James Landrum for this tip! LSCC is not responsible for the content of this student helpful tip idea. If you have
More informationResNet Guide. For the University of Redlands. Determine Your Operating System... 2 Windows 8 / 8.1 Wireless Connection Instructions...
ResNet Guide For the University of Redlands Contents Determine Your Operating System... 2 Windows 8 / 8.1 Wireless Connection Instructions...4 Windows 7/ Wireless Connection Instructions... 8 Apple Lion
More informationRU-VPN GlobalProtect Installation for Mac
RU-VPN GlobalProtect Installation for Mac Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software called
More informationa. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard
Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,
More informationMaking the Smart Switch. A Guide to Switching from an Apple iphone to a Samsung Galaxy Smartphone
Making the Smart Switch A Guide to Switching from an Apple iphone to a Samsung Galaxy Smartphone White Paper: Making the Smart Switch Making the Smart Switch Smartphones are crucial to productivity both
More informationInotera Memories Inc. SSLVPN For Personal User Manual
Inotera Memories Inc. SSLVPN For Personal User Manual Add SSL-VPN Website in Trusted sites Run Internet Explorer, click Tools Internet Options Security Trusted sites Sites Add below sites: https://inovpn.inotera.com
More informationFulton County Schools Instructions
Dear SGC Member, Fulton County Schools Email Instructions Your fultonschools.org email address is ready for use! We encourage you to check your fultonschools.org email daily and remember that this email
More informationCitrix Access Firefox Browser
Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...
More informationDeployment User Guide
Deployment User Guide Version: 010319-2 Contents STEP 1: (Windows Users Only): Determine if your PC is running the 32-bit or 64-bit version of Windows. If you are not a PC user, please proceed to step
More informationRev. 06 Nov User Guide: Downloading and Logging into Skandocs
Rev. 06 Nov. 2007 User Guide: Downloading and Logging into Skandocs Introduction Skandocs (Skanska Document Online Collaboration System) is a purpose-built document management & control system built by
More informationelectric drive vehicle homepage dealer process 2013
electric drive vehicle homepage dealer process 2013 v.05/09/2013 Tools and systems General description: > The term is used as a generic term for the website used to connect the EV (e.g. smart fortwo electric
More informationMicrosoft Entourage 2008 Setup Guide
Tags entourage, office, os x Edited Today at 10:57 AM by Kobayakawa, Scott T Microsoft Entourage 2008 Setup Guide CBE staff with Macintosh computers may access their email using either Outlook Web Access
More informationBlackBerry. User Guide
BlackBerry User Guide Table of contents 0 BlackBerry Internet Service for new users 1 Getting started... P. 2 2 Set up your email account via smartphone... P. 3 3 Set up your email account via website
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationIMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association
IMEI Database Manufacturer / Brand Owner User Guide Version 4.0 01 September 2015 Copyright Notice Copyright 2015 GSM Association GSM and the GSM logo are registered and owned by the GSM Association. Antitrust
More informationEnterprise Access Gateway Management for Exostar s IAM Platform June 2018
Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Copyright 2018 Exostar LLC All rights reserved. 1 Version Impacts Date Owner Enterprise Access Gateway (EAG) Guide Revised June
More informationWelcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.
Welcome to Your FCSL Student Web Portal Course Schedule Students can view and search course schedules and view class details. Online Registration Online registration allows students to register for courses
More informationGETTING STARTED: BlackBerry Enterprise (BES)
BlackBerry BES Setup / Introduction & Resource Links Page 1 of 6 GETTING STARTED: BlackBerry Enterprise (BES) Welcome to MailStreet! This PDF contains instruction for connecting your BlackBerry handheld
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/
More informationLaw Network Fall 2014
ACCOUNT INFORMATION Law Network Fall 2014 Initial Desktop (with Restricted Public Access) Double Click on the icon. If you need to use a USB Flash Drive, plug it in BEFORE you log in so it can be recognized.
More informationNeed Help? September to May Monday Friday 8:00 a.m. - 4:30 p.m. Walk-in & Phone Monday Thursday 4:30 p.m. - 7:00 p.m. Phone Only
Need Help? IT Help Desk Hours The IT Help Desk is available for all technical support needs. September to May Monday Friday 8:00 a.m. - 4:30 p.m. Walk-in & Phone Monday Thursday 4:30 p.m. - 7:00 p.m. Phone
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTR ODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
More informationHow To Wipe Blackberry Curve 9300 Using Desktop Manager
How To Wipe Blackberry Curve 9300 Using Desktop Manager Find out how to use and troubleshoot your BlackBerry Curve 9330 smartphone Wipe Handheld Option (Hard Reset) BlackBerry Curve 9330 Smartphone All,
More informationOFFICE 365 FOR EDUCATION FOR STUDENTS AND FACULTY
Contents Office 365 for Education... 2 What is Microsoft Office 365 for Education?... 2 When will Office 365 for Education be available?... 2 Who is eligible for the Office 365 offer?... 2 Will I have
More informatione2e Appointment Manager
e2e Appointment Manager What is e2e Appointment Manager? Outlook Quick Start Guide The e2e Appointment Manager provides a quick and easy way to reserve blocks of time on your calendar for meetings. Students
More informationUsing Outlook Web Access (OWA) 2013
Using Outlook Web Access (OWA) 2013 Logging on to OWA 2013 Open Internet Explorer. In the Address bar, type https://myowa.seattlearch.org Note: Make sure to include the s after http in the site address!
More information