Skip to main content

Cornell University

Students

Content (629)

Members of the Cornell Community Students, faculty, staff, and alumni. The faculty and staff category includes full-time and part-time faculty; visiting faculty; professors emeriti; full-time, part-time, and temporary staff; and retirees who are receiving Cornell benefits. The student category…
A Network ID (or NetID) is a personal, unique identifier assigned to you. It consists of your initials followed by one or more numbers. You use it, along with a password, to obtain access to online services, such as email and administrative systems. A password is required with your NetID to ensure…
Refer to Cornell University Policy 6.4, Prohibited Bias, Discrimination, Harassment, and Sexual and Related Misconduct, for obligations that apply in the Cornell employment setting. Unsolicited Email or Junk Email The amount of unwanted or unsolicited email (junk mail) has increased as more…
University-wide policies describe what activities constitute responsible use as well as violations. Following is more detail about some violations that IT@Cornell frequently gets questions about.
General Questions What services are included? See our List of Services page. Can I get information in real-time, for example, a call that was placed yesterday? No. Billing and reporting occur in monthly intervals. Bills are produced once per month, and all reports are static.…
University Policy 5.6, Recording and Registration of Domain Names, requires certain domain names to be registered or recorded in the Cornell Domain Name Registry. 
Instructor-led workshops and classes are offered on a variety of topics, including Office365 (Access, Excel, OneNote, Outlook, PowerPoint, Visio, and Word), and Adobe Creative Cloud (Captivate, Dreamweaver, InDesign, Illustrator, and Photoshop). IT professional technical courses on networking,…
If you have questions or need technical support, please contact hostmaster@cornell.edu
Due to licensing restrictions, people using CU VPN may need to authenticate via CUWebLogin before accessing certain electronic resources provided by Cornell University Library. All links from the library website and catalog should automatically check for authentication and enable proxy access. See…
Any member of the Cornell community -- whether faculty, staff, alumnus, or student -- may establish an e-list, as long as it supports instruction, research, outreach, administration, or other recognized university activities. There is no charge for creating a CIT-hosted e-list or using the CIT list…
Log in to the Lyris administrator web interface. - How do I log in? - Take me to the login page. On the left, click Members.
Information on Wired Networks for Students applies to only: 660 Stewart Hasbrouck Apartments Prospect of Whitby  Thurston Court Triphammer Cooperative Von Cramm Hall Wait Ave Cooperative  Wait Terrace Wari Cooperative Watermargin All other student housing uses wireless…
Does CIT scan and check to see what files I have on my computer? CIT may scan devices connected to the Cornell Network, but it only checks for vulnerabilities and infections. CIT is not able to tell anything about what sort of personal files you have on your hard drive. These scans do not…
Students should see to Microsoft Office for Cornell Students. All current Cornell faculty and staff have access to the latest version of Microsoft Office for Cornell business use on Cornell-owned computers. The license remains active until you leave the university.
About Office 365 ProPlus for Students To keep your free license activated, you need to launch at least one Office application (Excel, Word, Outlook, etc.) at least once every 30 days on each device. Thanks to Cornell's campus agreement with Microsoft, Cornell students can download and install…
Why Two-Step Login? NetID passwords belonging to Cornell community members are stolen, guessed, or hacked daily. Two-Step Login means a thief would also need to have your device in order to do anything with your password. Typically, by the time a password theft is detected or reported,…
If you don't see the Expand Where You Use Two-Step Login tab described below, then you are required to use Two-Step Login with any service where you log in with CUWebLogin and cannot opt out of this expanded use of Two-Step Login.  Expand Your Use of Two-Step Login To better protect…
About Hardware Tokens A hardware token is a keyfob-like device where you press a button to generate a one-time passcode for use in the second step of logging in. Hardware tokens are an option for situations where using a landline, cell phone, or other mobile device with Two-Step Login is not…
First Time Setup for Two-Step Login If you need information about the many types of devices you can use with Two-Step Login, you can explore device options, then return here to enroll your chosen device(s). If you have already selected your authentication device(s), continue with these…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.