Skip to main content

Cornell University

Content (1175)

Starting Sunday, August 16, 2020, Zoom’s Telephone Call-out feature will no longer be available for hosts and attendees of Cornell Zoom meetings whose host does not have a Premium Audio license.
IT Statements of Need are now easier to submit and, if you have access, to view and search.
Outlook on the Web (outlook.cornell.edu) has keyboard shortcut keys that are turned on by default. If you'd prefer to work your inbox from the keyboard instead of having to use a mouse, you can see the options by typing ? while in the Outlook on the Web main view.   If you don't think you'll…
As previously announced, beginning October 31, 2018, Microsoft will enforce use of TLS 1.2 with Office 365. TLS (Transport Layer Security) provides communications security over computer networks and so affects email, instant messaging, and other networked communication interactions. Windows 10…
In response to reports of audio quality issues in Zoom meetings, investigation has turned up a range of causes, rather than a single issue within the service. The vendor has suggested that it's possible some of the reported issues may be related to running older versions of Zoom. If you encounter…
During tax time, there are many tax-related scams to watch out for. According to the Federal Trade Commission, tax-related identity theft is the most common form of identity theft reported in the U.S. As criminals continue to use stolen identities (Social Security numbers and personal data) to…
What kind of website you need depends a lot on what you're trying to accomplish. The good news is that there are many options to choose from when it comes to web hosting. The downside is that there is such a wealth of choices that picking the one that's the very best fit can sometimes be difficult…
This holiday season, watch out for email spam with subjects like:Holiday e-cardHoliday sales/discounts/dealsTravel notificationsCriminals will continue to spam people throughout the holidays with the hopes that the email subject line will trick someone.Our Cornell email addresses are listed in the…
Cornell's IT Security Office works to help you keep your university identity and information safe. Because online risks don't end when your work day does, we'd like to supply some suggestions for how you can protect your personal identity and information, too.Credit Freeze
TSM generates an error log file containing any errors generated by the Tivoli Storage Manager application and services.By default, you'll find the scheduler log in the following location:C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
Some TSPs have access rights that allow them to start an unattended session with a user who has the Jump Client installed. The first question you should ask is “Have you ever used a remote access tool before? Would you like me to explain a little about what we'll be doing?” Then explain the…
For nearly all remote assistance sessions, you will be in direct contact with your technical support provider (TSP) either by phone or through the chat window. This means you are always free to ask questions or get clarification before permitting a particular action. Here is a partial list of the…
BeyondTrust Remote Support accounts are associated with teams, which are associated with academic or administrative units. Individuals are given access to BeyondTrust Remote Support through CornellAD groups managed by local IT support once the team has been configured. In general there is only…
Remote Support works with Windows 10 or 11 macOS 10.14 or newer iOS 12 or newer Many versions of Linux (Ubuntu, Red Hat, Fedora, and Suse)
Centrally-provided enterprise cloud services are listed below. Be sure you use these enterprise cloud services instead of consumer versions. Using enterprise versions means:
Who is Able to Use BeyondTrust Remote Support? Cornell's BeyondTrust Remote Support license limits use to people in designated IT support roles at the university. It is not available for end users or technicians to use to gain remote access into their office computers.
Before a local technical support team can use BeyondTrust Remote Support, a local CornellAD OU admin must create and populate four BeyondTrust-related AD groups in their OU. 
What are cloud services?Cloud services are easy to recognize. They...
If you type in the same password as always, but you get an "incorrect password" message no matter how carefully you check and retype it, your password may have been stolen. The person who stole it may have changed your password to block you from access to your own email and other services.…
Only the individual for whom the NetID is issued may use it according to University Policy 5.8, Authentication to Information Technology Resources. The policy outlines rules each community member must observe to avoid unauthorized use of the NetID:

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.