Skip to main content

Cornell University

Windows

Content (92)

Secure Connect uses Beyond Identity to provide passkey login for staff and faculty at Cornell. Instead of using your NetID and password to access a web-based service, with Secure Connect you will use your biometrics to unlock a passkey stored on your device. It's another way to reduce the chances…
In an effort to reduce EZ-Backup storage charges, some users choose to back up only the folders that contain user documents. This method has serious repercussions in situations such as hard drive failures or lost systems, since operating system and application files can no longer be restored via EZ…
The instructions on this page are based on the IBM documentation TSM client for Windows v7.1.The following assumes that the TSM client on the system was installed using the EZ-Backup installer, or using an installation method developed in conjunction with the EZ-Backup team.The necessary steps…
This process assumes that the TSM client software was installed using the documentation and installer provided by the EZ-Backup Service.
TSM generates an error log file containing any errors generated by the Tivoli Storage Manager application and services.By default, you'll find the scheduler log in the following location:C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
If you are using Microsoft Outlook as your mail client, and you are storing mail on your system, (which means your messages are stored in .pst files on your system, you need to be aware that the TSM client may not consistently backup these files; Outlook can be changing these files while the TSM…
Once you have completed the steps in our Work with Task Sequences article, you need to deploy the task sequence to a collection containing the machines you would like to image. 
This page is intended for IT support professionals. End users should contact local IT support.
This page is intended for IT support professionals. End users should contact local IT support. This page provides configuration information regarding hardware, software, and security standards for the Endpoint Management Tools service. Hardware Endpoint Management Tools is designed to work…
This page is intended for IT support professionals. End users should contact local IT support. This page is for Endpoint Management Tools users who need to use any of the Task Sequences in the CM2012 Console under Software Library > Operating System > Task Sequences > MD > MD - PID
This page is intended for IT support professionals. End users should contact local IT support.Once the client is installed on a workstation, the workstationsends inventory data to the CM Current Branch servers andcan be managed via the console.We suggest that you copy the GPOs listed on this…
This page is intended for IT support professionals. End users should contact local IT support. There are several reports included in the CM2012 Console that focus on evaluating patch compliance. Three of the most helpful are
This page is intended for IT support professionals. End users should contact local IT support. There are several reports that focus on evaluating patch compliance.
This page is intended for IT support professionals. End users should contact local IT support. Various parts of the inventory database are updated automatically at different times. If you have made a change to a managed computer, the procedure described here will force an immediate update to…
This page is intended for IT support professionals. End users should contact local IT support. There are a number of ways to check if a computer is being managed through the Endpoint Management Tools service. Here are two easy ways.
This page is intended for IT support professionals. End users should contact local IT support. The CM2012 Console is your interface for Endpoint Management Tools for Windows. After your AD group has been given access to CM2012 Console, your techs can use the console to
Onboarding is the process of bringing a unit or department into the Endpoint Management Tools service. (It does not refer to the state of individual computers.) In order for the Endpoint Management Tools service to work properly in your environment, the CIT Desktop Engineering team needs to work…
For help installing or using Spirion, contact your local technical support provider or the IT Service Desk. For general questions about data discovery tools, process, or issues: data-discovery@cornell.edu.
Deal With Automated Results Windows: Handle Scan Results Mac: Handle Scan Results
When you redact (sometimes called scrubbing) files in Spirion, the original file is saved in the original location, but the instance of confidential data is masked. For example, where a Social Security number is redacted, you'll see something like "XXXXX1085." Redacting does not erase the…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.