When using this option, schedule privileges must first be granted to the scheduler. When the scheduler creates a meeting using this privilege, the owner role is given to the person on whose…
Committee members are actively pursuing the following proposals outlined this May. Project/Initiative Current status Hardware asset inventory discovery…
The updated IT@Cornell website (it.cornell.edu) went live after the close of business hours on Monday, September 25, 2023. The launch concludes the new site project, which began late in 2022. The…
Run an Attendance ReportLog in to the Cornell Zoom website.Click Reports on the sidebar navigation menu.Under the Usage Reports tab, click Usage. This will take you to the Usage …
The CIO reports directly to the Vice President and Chief Global Information Officer Curtis Cole. Ben Maddox is the CIO. He provides strategic and operational leadership for Cornell Tech, the…
Begin by preparing your presentation in Google Slides.When you are ready to share the Google Slides presentation in Appspace, allow the piece to be shared publicly. Open your presentation in…
Your biometric sensor must use either facial or fingerprint recognition in order to work with Secure Connect. Security keys that lack this functionality (for example, a Yubikey) are not…
HTML-Formatted Email HTML formatted email is the default for most email clients, including Outlook on the Web. Sending email to a non-Cornell address Your URLs will not be formatted by Safe Links…
OverviewChaptersChapters are markers that work like bookmarks within the video. Using them, you can jump directly to that section of the media.Open the Chapter listing by clicking the Navigation icon…
For instructions on using this feature, visit Zoom’s documentation pages:Conducting polls in meetings: How to use the Polls/Quizzes libraryConducting polls in webinars: How to use the Polls/Quizzes…
Malicious WebsiteA warning appears when the clicked URL points to a site that has been identified as malicious. Verifying LinkA dialog box appears when you click…
About Safe LinksSafe Links checks links in emails both as they arrive to your mailbox, and when you click on a link. If a web site is compromised after you received an email, but before you visit it…
Campus partners,We are writing to update you on progress that has been made implementing Marketing Cloud at Cornell. The project continues to proceed with notable successes. Phase 2 accomplishments…
The Cornell AWS Regulated Buckets Data Storage service allows secure storage and movement of Low, Medium or High risk data in AWS. (Note that the service does not yet offer controls for HIPAA…
AWS SSO is a free service that allows AWS administrators to centrally manage human user access to AWS accounts and applications. Available features let administrators configure the SSO…
Microsoft provides information for faculty wishing to create a Class Team, add students, and access their online classroom. They also provide downloadable Guides for Educators using…
Secure Connect enables you to use your fingerprint or your facial features (your biometrics) to log in to services that require your NetID and password. On Windows, you may know this feature as…
Biometric verification uses physical characteristics of a person to verify their identity. The fingerprint login or facial recognition you might use on your smartphone or computer are examples of…
Account-holders can store files locally to their computer, or to OneDrive, where those files will be accessible online from the cloud. Depending on your storage needs, you may choose to sync files…
Amazon Web Services (AWS) Web ConsoleAzure PortalBlogsBomgar / BeyondTrust Administrative Interface (service providers only)Bomgar / BeyondTrust Remote Support (end users with session key from…