Skip to main content

Cornell University

Content (45)

For units who have signed up for Certified Desktop, the following alternative security tools may be considered acceptable for meeting compliance requirements. Units should consult with the IT Security Office on deployment and reporting considerations.  If the solution you're seeking is…
Office 365 Applications and Mobile Apps You will rarely, if ever, need to authenticate with Two-Step Login when you use an app on your computer or mobile device to access Office 365. You might be prompted when you install a fresh copy of the software.
Going online from a personal device like a tablet, phone, or computer creates a pipeline to an immense collection of resources and data, but the sheer size of the Internet also makes it an easy place for bad actors to hide and scope out their victims. Create a ring of protection around devices and…
Get Help for IT Security Problems Your NetID, along with other login information you use at Cornell, secures a host of services that are available to you as a member of the university community. Following some straightforward practices and guidelines will keep your identity, computer,…
Endpoint Management Tools helps IT staff automate the deployment and ongoing maintenance of software for desktops and laptops in compliance with university policy. Units adopting this service can expect to increase the technician-to-workstation ratio over that achievable with local point solutions…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.