Skip to main content

Cornell University

Windows

Content (99)

How do we get access to the central ITSO console? Send a request to data-discovery@cornell.edu. Specify the AD group the TSPs who will need to access the ITSO Console. What is the URL for the central ITSO console? cdd.security.cornell.edu/console
Have you ever seen warning like the one shown here?  It may have made you wonder if someone was sending you forged email. You should always be on your guard, but there can also be an innocent explanation.
Sign in to Google Workspace (formerly G Suite) at gsuite.cornell.edu Google Workspace sign-in uses Cornell login. Your email address is your NetID@cornell.edu address and your password is the one you use with your NetID to sign in to other Cornell services. In addition, students, faculty, and…
We strongly recommend that you work with your Cornell Workspace (formerly G Suite) email using Google's web interface at gsuite.cornell.edu. This method requires no setup and, as long as you keep your browser up to date, will require no maintenance on your part. We recognize that some users may…
Vendors may change mailing parameters at any time. If you need more information about mailing limits or other parameters not defined here, refer to Google’s documentation for sending limits and receiving limits.
Cornell's commitment to privacy has not changed as a consequence of offering Google Workspace, a cloud-based service.  As with all decisions that Cornell makes regarding information technologies, privacy and security are key elements. In addition, Cornell remains committed to freedom of…
Cornell provides licenses for Spirion to be installed on Cornell-owned computers only, including those not located on university property. For example, if the computer at your house is owned by Cornell, you can install Spirion with a Cornell license. Discuss this with your local technical…
Introduction You can configure a scanner for any Perceptive Content client computer. Scanning profiles and capture profiles define the behavior of the scanner in connection with the Perceptive Content client. You must have the Perceptive Content client installed before you can configure the…
Run the Perceptive Content client. On the Perceptive Content sunflower screen, click Connection Profiles, then Edit connection profiles.
Effective May 23, 2022, Microsoft has announced that the Outlook for Android mobile app will no longer be supported on Android version 7.1 or earlier. If you have Outlook for Android installed on your mobile device, make sure your device is running Android version 8 or higher. If not, upgrade…
TPM Off or Does Not Exist   Reboot into BIOS (F2 at POST). In the TPM Security section, make sure the boxes are checked. Click Apply. Exit BIOS. The computer will reboot. Re-run the MBAM installer.
This information is intended for technical support providers. End users should contact their technical support for assistance. If BitLocker encounters problems unlocking the drive during the boot process, you will see a screen like this:
The procedure described on this page is only for Windows computers that are NOT managed through CIT's Managed Desktop service. If you are unsure if your computer is managed, we urge you to check with your local technical support provider.
This information is intended for technical support providers. End users should contact their technical support for assistance. Prerequisites Update the computer to the latest BIOS before beginning the encryption process. If the client computers have been previously encrypted, you must decrypt…
The easiest way to determine who has access to a particular Windows machine is to go into computer management (compmgmt.msc) and look in Local Users and Groups.  Check the Administrators group and the Remote Desktop Users group to see who belongs to these. Those…
Cornell students, faculty, staff, and visitors from other eduroam-participating institutions, should use eduroam to securely connect to the internet. Welcome to the Cornell campus. To access the internet, you must register to use the Cornell-Visitor network. Follow the steps below.
Note: This page outlines secure methods for transferring files between a Windows or Unix client and a Unix server.
Some of Our Most Recent Work See our comprehensive portfolio!
To use CU VPN with Cornell campus networks and services, you must use the Cisco AnyConnect VPN software. Built-in Windows and macOS software will not work. Supported operating systems: Windows 10 macOS, the current version and the two previous versions iPhone and iPod Touch (…
To use Cornell's Virtual Private Network (VPN) with campus networks and services, you must use Cisco Secure Client VPN software. See the How to Install Cisco VPN Software page for instructions.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.