Skip to main content

Cornell University

IT Professionals

Content (1347)

This page is intended for technical support providers. It describes how to install the BeyondTrust Remote Support Representative Console on your device(s) so that you can initiate Remote Support sessions with end users who need assistance.
See Google's Out of office or vacation reply help page.
How are Gmail and Google Workspace (formerly G Suite) different? Google Workspace includes Gmail and several other tools. While you can continue to use your own Gmail account if you like, it will be completely separate from your Google Workspace account.  Your own personal Gmail account…
User Experience User may be unable to log on to their computer using their new NetID password (created at the “Manage Your NetID” page), if they reset the password while off campus. This issue only affects users whose units are using Active Directory authentication for computer log on purposes.
From the Mail menu, select Preferences. Click Composing in the toolbar. From the Message Format dropdown list, select either Plain Text or Rich Text (HTML). Close the Composing dialog box. You can switch to a different format for an individual…
Mail does not have a built-in auto-reply feature, but Mail users can set up an out-of-office message using Outlook on the Web.
We recommend using the Outlook on the Web settings for filtering junk mail, as they are processed on Microsoft's servers. This means that so they will be consistently applied no matter what client or app you use to read your mail. Automatic filtering is on by default. In addition, Mail can…
Depending on whether this is the first time you've started Mail, or the first time you've set up an account, some of these steps may appear in slightly different order. The information you enter on each screen remains the same. If you need assistance, please first update to the latest version of…
User Experience While using Mail (Apple's email client) to access an EGA, I get prompted repeatedly for my password, over and over again. How to Solve this Problem There is no current solution to this problem. The workaround is to use Outlook on the Web to access the EGA, or another…
CornellAD groups can be created to serve many purposes. For example, they can be used to control access to certain resources, or to send email to a defined group of people. Only OU administrators, or individuals who have been granted group management permissions, can create groups. If you need to…
Guests An acceptable-use policy will be displayed to a guest under these two situations:
Using a supported browser, connect to CornellAD. Log in using your NetID@cornell.edu or DOCID@cornell.edu account.
The basic form of membership in a group starts when you add the member and ends when you remove the member. It is also possible for you to specify a starting time and date, an ending time and date, or both. These are called temporal settings. You can use either the ARS Console or the web interface…
Room Lists are centrally-created groups that initially have no members. Organizational unit (OU) admins must add members (rooms and sometimes equipment) to their room list. When users schedule meetings using Outlook Web App (OWA), they are shown the rooms in their unit's room list.
Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords.
Reference Groups Reference groups are based on the University HR Organizational Tree (also known as the Department Tree Table) as represented in PeopleSoft database system, as well as on information about each student's college association(s). Reference groups organize people at the university…
Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks.
This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.
These security procedures apply to Cornell University staff only.
These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT Employees.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.