Skip to main content

Cornell University

Faculty

Content (1184)

CIT services included in online bills and reports Services NOT included (Not a comprehensive list, just some of the ones we are asked about most often) Account codes   AUDIX  
CU VPN authenticates your identity and affiliation with Cornell using your NetID and password. Traffic to and from Cornell IT resources hosted on campus is sent through an encrypted “tunnel” to campus. All other traffic goes over your local Internet connection and does not use the…
The VM Self-Service app has been retired.
University-Owned Options We recommend CrowdStrike for all Windows computers that are part of Certified Desktop.
University-Owned Computers If the university-owned computer is managed by a unit that's signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.
Microsoft frequently changes the design of Outlook on the web, so your version may differ somewhat from the description here. In the red, Cornell-branded toolbar, click the gear icon. At the bottom of the list that appears, click View all Outlook settings. In the settings window, in the left…
Before constructing your rule, decide where you want to put the meeting-related messages. If the folder doesn't already exist, create the folder now so it will be available to your rule.
From the Home ribbon, in the Move section, click Rules, then click Manage Rules & Alerts. A Rules and Alerts dialog box will open. On the E-mail Rules tab, click New Rule.
As a retiree, you can choose from these ways to continue receiving your Cornell email:
Here's how to view headers for the email clients supported by the IT Service Desk.
You can grant the same access and permission to many different users by adding user accounts to groups. Members of a group can make the same types of changes to settings and have the same access to folders, printers, and other network services.
Audio-Visual Design Consulting Submit service requests for new AV design consulting using the "Audio-Visual Consulting Request" button in the sidebar. The Service Manager will evaluate the request, seek any addition initial information to validate an active project, and assign the project to…
Requests for a New Machine Virtual Server Order New Blade Request Requests for Existing Machines Linux Account Request Form Unix Printer Request Form
Response Time CIT's goal is to respond to non-urgent support requests within two business days.
Note: Remember to submit your change request(s) to the CIT Change Advisory Board (CCAB). Business Days Saturdays & Holidays Sundays 12:00 am to 5:00 am Emergency Response Only Emergency Response Only Emergency Response Only 5:00 am to 7:00 am
Contact Systems Support Weekdays During Business Hours Userids, holding IDs, file transfer accounts, or Samba shares: Submit the Unix Account Request Form. Other routine requests: Email systems-support@cornell.edu Urgent requests: Email
Schedule (Invite) a Resource The default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…
This procedure assumes you are already using Outlook to access your NetID email account. If you are not using Outlook for your NetID email account, follow the steps in our Initial Setup for Outlook article, then come back here and complete the steps below.
By default, everyone can see the free/busy status of a Resource Account while proposing a meeting, but cannot open the resource's calendar. This procedure explains how the owner of a Resource Account can grant additional access rights (viewing and/or editing) to a Resource Account. First, you'll…
Schedule (Invite) a Resource The default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.