IT Services for Students and Information Security at Aalto University (AALTO SCHOOL OF BUSINESS)
|
|
- Erika Heath
- 8 years ago
- Views:
Transcription
1 Jaakko Salonen Development Manager / Aalto IT IT Services for Students and Information Security at Aalto University (AALTO SCHOOL OF BUSINESS) Aalto IT Orientation Autumn 2013 (Töölö) 1
2 Feedback from students AYY KY S S S S S Student Community TOKYO S S Account Manager for Students Customer Services/ Service Desk Aalto IT Orientation Autumn 2013 (Töölö) 2
3 IT Services for Students Computer classrooms (Windows 7) Home directory Campus wifi Home use licenses for certain pieces of software Print service provided by Aalto IT and Unigrafia Aalto Inside, Into, Student Wiki, Blog Service IT Service Desk Aalto IT Orientation Autumn 2013 (Töölö) 3
4 Aalto Inside and Into Communication channels for the whole Aalto University mainly for staff all studying information All the information on this presentantion and a lot more! Aalto IT Orientation Autumn 2013 (Töölö) 4
5 Computer classrooms Several computer classrooms in several buildings Over 350 PCs in public use (Töölö) Your account also works at Otaniemi and Arabia Different applications depending on the classroom, more info at Aalto Inside All workstations have basic software (Windows 7, MS Office, Firefox, etc.) Scanner in Kesko-Sali (A505) All night open Computer labs Main building C-250 Arkadia till 02:00 AM Keycard needed Aalto IT Orientation Autumn 2013 (Töölö) 5
6 Microsoft Exchange based with 3 GB of space with any browser anywhere Microsoft Outlook at Aalto workstations You can use Microsoft Outlook, Mozilla Thunderbird, etc. (IMAP) Instructions to configure at Aalto Inside Uses same password as other services Spam filtering, Junk folder Aalto IT Orientation Autumn 2013 (Töölö) 6
7 Home directory Home directory automatically visible as Z: drive when you log on to a Windows (or Linux/Mac) workstation in a classroom Directory quota 5 GB Also accessible remotely via SSH+SFTP on a Linux server (e.g. kosh.org.aalto.fi and lyta.aalto.fi) Aalto IT Orientation Autumn 2013 (Töölö) 7
8 Print service provided by Aalto IT and Unigrafia Classroom BW printers Currently no print quota, but it may be turned on (previous quota was 250 pages/month) Professional print jobs etc. provided by Unigrafia, costs money, details available at Aalto Inside Out of toner / printer jammed? send to servicedesk@aalto.fi visit the information desk at the specific building Aalto IT Orientation Autumn 2013 (Töölö) 8
9 Campus Wifi Two networks: Aalto Open and eduroam Aalto Open: Unsecured network! Free to use without passwords, just connect and browse Traffic itself is not encrypted! eduroam: pan-european network of wifi networks, secure You can use any eduroam network in Europe Traffic encrypted Needs configuration, check Aalto Inside for instructions Most services allowed, SMTP blocked Terms of Use for wireless network Printing not possible Over 40 Access Points at the campus, notify IT if there is lack of coverage Aalto IT Orientation Autumn 2013 (Töölö) 9
10 Home use licenses Download.aalto.fi Antivirus software, SSH Tectia Client, Comsol, SPSS, etc May only be used while studying at Aalto! Accessible from home as well Microsoft products for Aalto students Check Aalto Inside for information about Microsoft DreamSpark Aalto IT Orientation Autumn 2013 (Töölö) 10
11 Student Wiki, Blog Service Studentwiki.aalto.fi Wiki for students Create your own workspaces for collaboration, sharing information, etc. Control who gets to edit, read, administrate Wiki.aalto.fi Primarily for staff, students cannot create spaces Blogs.aalto.fi Start writing your own blog Follow other blogs and comment Aalto IT Orientation Autumn 2013 (Töölö) 11
12 User Account and password One Aalto password for all your needs ( , workstations, wifi,...) Password policy Minimum 10 characters password maximum lifetime 6 months password minimum lifetime 24 hours Complexity: must have 3 of ABC, abc, 012,! # % Äöå are allowed, but may cause problems password history (24) Aalto IT Orientation Autumn 2013 (Töölö) 12
13 Password Security Never tell anyone your password IT Services personnel will never want or need your password Your account is personal, not for sharing Try to remember If you have to write it down, hide it and keep it away from your username Phishing If you get an from anywhere asking for your password, do not reply Instructions on reporting phishing attempts in Inside If you forget: password.aalto.fi (with banking credentials or HST card) come to IT Service Desk with your ID. Must be done in person. Change all your passwords regularly and also when you suspect it s no longer secret More information about good passwords in Inside. Aalto IT Orientation Autumn 2013 (Töölö) 13
14 Account Security Do not use the same password in other services! inherently suspicious: do not trust the Sender field or attachments Check your URL when entering passwords Always lock your workstation when stepping out Take care of the security of your own PC as well USB memory sticks Easy to lose or break Viruses Aalto IT Orientation Autumn 2013 (Töölö) 14
15 Account Security (cont d) Respect other users privacy Other people s , files, passwords, sessions Personal data (e.g. addresses, student numbers) not to be distributed Confidential research/business data You are responsible for the activity on your account Commercial, political, sectarian activity forbidden per Usage Policy Exception: student union activity We back-up most of the data, but you have the ultimate responsibility Second, private address convenient You will lose your university address upon leaving/graduation Secondary address easier to throw away Use common sense More policies and instructions: Aalto IT Orientation Autumn 2013 (Töölö) 15
16 IT Service Desk First point of contact for all issues Possible problems elevated to proper address by IT Service Desk IT Service Desk visiting address: Basement of the main building, Room A022 Tel Opening times Every day: Aalto Inside and Into Aalto IT Orientation Autumn 2013 (Töölö) 16
17 Questions? Aalto IT Orientation Autumn 2013 (Töölö) 17
Short introduction to Aalto University IT environment 2014-08-25 Mikkeli Campus
Short introduction to Aalto University IT environment 2014-08-25 Mikkeli Campus IT SERVICES Personnel IT System Administrator, Mr. Sauli Hänninen - office #303, mobile +358 400 522 527 IT Support person,
More informationUser guide Business Internet e-mail features
User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features
More informationBusiness Internet Email service from Bell User Guide
Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office
More informationForefront Spam Filtering
Forefront Spam Filtering What s Happening? W&L s incoming e-mail filtering system has switched from Digitar to Microsoft ForeFront as of about 6:00 a.m. on Tuesday, August 14. How Will This Affect You?
More informationGETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
More informationIntroduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information
More informationINSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with
More informationCryptshare for Outlook User Guide
Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationINSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along
More informationAccessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
More informationIntroduction to Email. Jan 24 th 2010
Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user
More informationCustomer Control Panel Manual
Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...
More informationIT@DUSON. IT Service Desk
IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all
More informationTUT IT services www.tut.fi/pop > STUDY INFO > IT Services
TUT IT services www.tut.fi/pop > STUDY INFO > IT Services TUT IT Helpdesk The single point of contact for all your IT-related questions When you contact the IT Helpdesk by email, please include the following
More information1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationNEVER guess an e-mail address. Your mail will nearly always go to the wrong person.
16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal
More informationCOMPUTER SERVICES FOR STUDENTS
COMPUTER SERVICES FOR STUDENTS IT Administration Services/ Helpdesk University of Oulu Jorma Heikka, Janne Lindqvist 2012 IT Administration Services... 1 What s free and what s not!... 1 User account and
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationCommon Student Computing Environment
Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building
More informationDIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:
DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationHow To Connect To the WIT Wi-Fi Using Eduroam CAT Tools
How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools Introduction To connect to the Internet in WIT with your laptop or phone, you need to have a current student login or a current staff login with
More informationJMA Domain Instructions/Policies
JMA Domain Instructions/Policies Login (for faculty and students): If you have used one of our labs before (you have a JMA account), your username is the same. If you have not been in the lab before, your
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationTIPS IN PREVENTING INFORMATION LEAKAGE
TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How
More informationPlesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
More informationSTUDENT S INFORMATION SECURITY GUIDE
STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationBasic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationFrequently Asked Questions The next section includes FAQs to help you to access and use your student email account.
Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk
More informationIntroduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationSecurity considerations are denoted by a lock icon.
About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of
More informationComputer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven
More informationConnecting to the University Wireless Network
Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded
More informationLaw College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
More informationHOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/
WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for
More informationBarracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
More informationNETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
More informationOverview of Registered Envelopes. Registered Envelope Notification Message
Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.
More informationQuarantine Network for Specialised Equipment.
Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected
More informationSetting up a Mac on the CU network
School of Medicine IT Office Setting up a Mac on the CU network v1.3 JAM 23/12/13 This document explains how to setup a Mac on the Cardiff University network, access useful resources and configure native
More informationPlesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
More informationQuick Start Guide. Your New Email Account
Quick Start Guide Your New Email Account http://www.names.co.uk/support/ Table of Contents Adding a new email account... 3 Adding a new email address... 5 Adding a mail group... 6 How to check your emails...
More informationBasic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationParallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
More informationInformation Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
More informationEmail Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
More informationHow to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox
How to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox Why would you want to use Outlook Express? If you have Microsoft Outlook installed on your PC you should use it, with
More informationIT Resources at NCSU. ISE s 2 minute guide to NCSU s IT resources. www.ise.ncsu.edu
IT Resources at NCSU ISE s 2 minute guide to NCSU s IT resources Support @ NCSU ISEHELP (isehelp@ncsu.edu) ISE s IT Group (Justin and Robert) ITECS (eoshelp@ncsu.edu) College of Engineering IT OIT (help@ncsu.edu)
More informationWhat browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
More informationFile Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
More informationGetting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment
Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationIf you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
More informationComputing Facilities Orientation September, 2017
Computing Facilities Orientation September, 2017 Introductions Steve Miley Director of IT Brad Hill Manager of Desktop Support Geoff Jewel Help Desk Manager First, a few questions Most common food dropped
More informationWeb Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
More informationhttps://mail.wheelock.edu
The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document
More informationEmail User Guide. Contents. Information Systems and Technology Dawson College v 1.3, 15 November 2013
Information Systems and Technology Dawson College v 1.3, 15 November 2013 Contents 1 Overview... 2 2 Access... 2 2.1 Outlook... 2 2.2 Outlook Web Access (OWA)... 3 2.3 Outlook for Mac... 4 2.4 Other email
More informationUH Mail Server Retirement
University Information Technology UH Mail Server Retirement Technology Services and Support Davis, Ivey S!" Table of Contents The University of Houston s Mail.Uh.edu Server Retirement... 2 Introduction...
More informationEmail Start to Finish: Set up a New Account or Use Your Own
Better Technology, Onsite and Personal Connecting NIOGA s Communities www.btopexpress.org [Type www.nioga.org Email Start to Finish: Set up a New Account or Use Your Own Overview: Set up a free email account
More informationHosted Email Managed by Email Specialists
Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance
More informationUsing Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
More informationMailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
More informationGood Practice use of Outlook, Thunderbird and HORDE Webmail
Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail mdisupport@midwestdatainc.com.
More informationConnecting to the Remote Desktop Service
Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
More informationYale Secure File Transfer User Guide
Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's
More informationUCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106
UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationFuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide
Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account
More informationFirewall, Mail and File server solution
Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationSecurity Awareness. ITS Security Training. Fall 2015
Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data
More informationBlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8
BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationComputer and Information Security End User Questionnaire
Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/
More informationPatented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
More informationNew Employee Technology Orientation
New Employee Technology Orientation Policies Division of Information Technology Services Policies IT@Sam has several policies with which you should familiarize yourself. Those policies can be found online
More informationReliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
More informationConfiguring an Android device to access Staff Wi-Fi and Email.
Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important
More informationPersona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15
Persona Backup and OS Migration for insync Private Cloud 5.5 June 16, 15 Copyright Notice Copyright 2007-2015 Druva Inc. All Rights Reserved. Any technical documentation that is made available by Druva
More informationParallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
More informationUSER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
More informationOffice of Information Technology Resources Handbook for NSC Employees
NEVADA STATE COLLEGE Office of Information Technology Resources Handbook for NSC Employees Becoming Familiar with NSC s IT Resources and Policies Office of Information Technology Summer 2012 Table of Contents
More informationGuide to Enterprise Vault - Email Archiving
Guide to Enterprise Vault - Email Archiving Version V1.0/2009 This document contains commercially sensitive information and is therefore restricted to University of Melbourne Staff that have operational
More informationVCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.
What is VCL? VCL (Virtual Computer Lab) is a service running on servers in IIT s datacenter that enables users to schedule and connect to virtual desktops running specific academic software applications
More informationONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationCitrus Valley Health Partners. Web Outlook User Guide. Table of Contents
Citrus Valley Health Partners Web Outlook User Guide Table of Contents Getting Started Page Access to Web Outlook... 1 Log in Instructions... 1 Basic Navigation... 1 The Menu Bar... 1 The Reading Pane...
More informationINTRODUCTION TO VIRTUAL DESKTOP BINGHAMTON UNIVERSITY
INTRODUCTION TO VIRTUAL DESKTOP AT BINGHAMTON UNIVERSITY ACCESS MATLAB, PRO ENGINEER, SPSS, STATA, VIRTUALLY! Presently Virtual Desktop can be accessed via your personal computer, laptop or from home Available
More informationPersona Backup & OS Migration
Persona Backup & OS Migration insync 5.4 Druva Software Table of Contents About this document... 3 Persona backup... 4 About persona backup... 4 Use of persona backup... 4 Availability... 5 Supported system
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationUser manual VU-Mail Webmail Outlook Web App februari 2010
VU University Amsterdam University Centre IT User manual VU-Mail Webmail Outlook Web App februari 2010 This document describes how to access and configure VU Webmail (Outlook Web App). 1. Index 1. Index
More informationwww.wit.tafensw.edu.au
CONNECTING TO WIRELESS NETWORK TAFE WESTERN CONNECTING TO WIRELESS NETWORK iphone/ipod Touch, ipad, Internet Explorer, Firefox TAFE Western provides wireless access for staff and students via the TAFE-Guest
More informationWelcome to ECBuzz.com! Please go through this document carefully to make the experience of owning and using a website an enjoyable one.
Sales call: 90116 90305 Sales email: sales@ecbuzz.com Support email: support@ecbuzz.com Welcome to ECBuzz.com! Please go through this document carefully to make the experience of owning and using a website
More informationBTC STUDENT EMAIL GUIDE
BTC STUDENT EMAIL GUIDE All students have a BTC email account. If you are unable to access your account, please contact your instructor. Student Email Each student has an email account. Your email address
More information