IT Professionals
Content (1346)
The EZ-Backup software makes distinctions between the "backup/restore" function and the "archive/retrieve" function.
Under what circumstances will I get notified by email that my computer was not backed up?
How many versions and for how long are files kept/saved with EZ-Backup? For example, can I specify the number of versions of each file to keep or is it time based (keep all versions less than 30 days old)? What are the limits for this feature?
There is quite a bit of flexibility here.
Can I customize my automatic scheduled backup times, frequencies, etc.? Would I have the option of scheduling an automated backup process to run on a daily or weekly basis? Does this include choosing the start time of the backup process?
No. EZ-Backup is for faculty and staff.
We recommend that students arrange for their own backup, either to an external drive or a web-based service, or both. CIT makes no specific recommendations.
Please read the following Terms and Conditions before registering for an EZ-Backup subscription.
The electronic mailing list ezbackup-announce-l provides news and announcements about EZ-Backup to users at Cornell University. Join the list to find out about software upgrades and server downtime.
To subscribe to the list, send an email message to ezbackup-announce-l-request@cornell.edu. No…
Automated Backup
No need to remember regular backups. EZ-Backup can be configured to back up everything automatically.
Reliable Solution
Because EZ-Backup is used to back up the University's critical data, it is essential that the service be reliable. The EZ-Backup service is a stronghold backup solution for the University's critical data, so it will be a centrally supported service, and is one that must be…
Some TSPs have access rights that allow them to start an unattended session with a user who has the Jump Client installed.The first question you should ask is “Have you ever used a remote access tool before? Would you like me to explain a little about what we'll be doing?”
Then explain the…
For nearly all remote assistance sessions, you will be in direct contact with your technical support provider (TSP) either by phone or through the chat window. This means you are always free to ask questions or get clarification before permitting a particular action.
Here is a partial list of the…
BeyondTrust Remote Support accounts are associated with teams, which are associated with academic or administrative units. Individuals are given access to BeyondTrust Remote Support through CornellAD groups managed by local IT support once the team has been configured. In general there is only one…
Remote Support works with
Windows 10 or 11
macOS 10.14 or newer
iOS 12 or newer
Many versions of Linux (Ubuntu, Red Hat, Fedora, and Suse)
Centrally-provided enterprise cloud services are listed below. Be sure you use these enterprise cloud services instead of consumer versions. Using enterprise versions means:
Some of the cloud's most attractive features are the ability to purchase resources on an as-needed basis and to avoid capital costs and internal operation expenses. A low price point and nimble accommodation of both quality and kind of demand also recommends it, as well as contracted upkeep and…
Who is Able to Use BeyondTrust Remote Support?
Cornell's BeyondTrust Remote Support license limits use to people in designated IT support roles at the university. It is not available for end users or technicians to use to gain remote access into their office computers.
Before a local technical support team can use BeyondTrust Remote Support, a local CornellAD OU admin must create and populate four BeyondTrust-related AD groups in their OU.
What are cloud services?
Cloud services are easy to recognize. They...
If you type in the same password as always, but you get an "incorrect password" message no matter how carefully you check and retype it, your password may have been stolen. The person who stole it may have changed your password to block you from access to your own email and other services. This…
Only the individual for whom the NetID is issued may use it according to University Policy 5.8, Authentication to Information Technology Resources. The policy outlines rules each community member must observe to avoid unauthorized use of the NetID: