Skip to main content

Cornell University

Faculty

Content (1184)

If you type in the same password as always, but you get an "incorrect password" message no matter how carefully you check and retype it, your password may have been stolen. The person who stole it may have changed your password to block you from access to your own email and other services.…
A common problem: Check the "Caps Lock" indicator on your keyboard before typing your password; if the "Caps Lock" key has been pressed, your password might not be recognized. Uppercase and lowercase letters need to be typed exactly the same way every time you use the password. Retype your…
Only the individual for whom the NetID is issued may use it according to University Policy 5.8, Authentication to Information Technology Resources. The policy outlines rules each community member must observe to avoid unauthorized use of the NetID:
See Google's Out of office or vacation reply help page.
How are Gmail and Google Workspace (formerly G Suite) different? Google Workspace includes Gmail and several other tools. While you can continue to use your own Gmail account if you like, it will be completely separate from your Google Workspace account.  Your own personal Gmail account…
From the Mail menu, select Preferences. Click Composing in the toolbar. From the Message Format dropdown list, select either Plain Text or Rich Text (HTML). Close the Composing dialog box. You can switch to a different format for an individual…
Mail does not have a built-in auto-reply feature, but Mail users can set up an out-of-office message using Outlook on the Web.
We recommend using the Outlook on the Web settings for filtering junk mail, as they are processed on Microsoft's servers. This means that so they will be consistently applied no matter what client or app you use to read your mail. Automatic filtering is on by default. In addition, Mail can…
Depending on whether this is the first time you've started Mail, or the first time you've set up an account, some of these steps may appear in slightly different order. The information you enter on each screen remains the same. If you need assistance, please first update to the latest version of…
User Experience While using Mail (Apple's email client) to access an EGA, I get prompted repeatedly for my password, over and over again. How to Solve this Problem There is no current solution to this problem. The workaround is to use Outlook on the Web to access the EGA, or another…
Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords.
Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks.
This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.
These security procedures apply to Cornell University staff only.
These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT Employees.
Task responsibility Task details Consultant Agree to abide by Cornell's and Central IT policies and guidelines. Once you have a NetID, read the Annual Central IT Comprehensive Attestation and carefully review all the policy links.
E-lists (or mailing lists) are an important tool for keeping in touch with other technical support providers. They also offer a forum to discuss and get help with technical issues. To subscribe to an e-list, send the command join to listname-request@cornell.edu, where listname is the full name of…
CIT hosts more than 5500 different e-lists, serving more than 1,600,000 members. There are millions of lists hosted in other places. So how do you tell whether these web pages apply to the list you're interested in? A quick look at the email address of the list will tell you. CIT-hosted lists have…
To find out which CIT-hosted lists you have subscribed to, send an email message to lyris@cornell.edu   For the Subject of the message, type the single word which Leave the body of the message blank.  You must send this message from the email address where you receive e-…
Sending a message to the members of an e-list is almost exactly like sending any other email message. Put the e-list address in the To field. Be sure to include the hyphen and the letter L at the end of the list name. In this example, it's sheep-shearing-L  not sheep-shearing 

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.