Skip to main content

Cornell University

Content (68)

This can happen if the files found are outside the user’s permission range, that is, they require admin credentials to access. Escalate to your local technical support. They will either handle the files themselves or give you access to the locations.
You can tell Spirion to ignore specific result locations after it has found a match, but you cannot pre-emptively tell Spirion to ignore the entire backup.
How do we get access to the central ITSO console?Send a request to security-services@cornell.edu. Specify the AD group the TSPs who will need to access the ITSO Console.What is the URL for the central ITSO console?https://sf-hops16.serverfarm.cornell.edu/console
Have you ever seen warning like the one shown here?  It may have made you wonder if someone was sending you forged email. You should always be on your guard, but there can also be an innocent explanation.
Sign in to Google Workspace (formerly G Suite) at gsuite.cornell.edu Google Workspace sign-in uses Cornell login. Your email address is your NetID@cornell.edu address and your password is the one you use with your NetID to sign in to other Cornell services. In addition, students, faculty, and…
We strongly recommend that you work with your Cornell Workspace (formerly G Suite) email using Google's web interface at gsuite.cornell.edu. This method requires no setup and, as long as you keep your browser up to date, will require no maintenance on your part. We recognize that some users may…
Vendors may change mailing parameters at any time. If you need more information about mailing limits or other parameters not defined here, refer to Google’s documentation for sending limits and receiving limits.Mailbox SizeThe default quota for Google Workspace is 15 GB. This includes email, email…
Cornell's commitment to privacy has not changed as a consequence of offering Google Workspace, a cloud-based service.  As with all decisions that Cornell makes regarding information technologies, privacy and security are key elements. In addition, Cornell remains committed to freedom of…
Cornell provides licenses for Spirion to be installed on Cornell-owned computers only, including those not located on university property. For example, if the computer at your house is owned by Cornell, you can install Spirion with a Cornell license. Discuss this with your local technical…
Introduction You can configure a scanner for any Perceptive Content client computer. Scanning profiles and capture profiles define the behavior of the scanner in connection with the Perceptive Content client. You must have the Perceptive Content client installed before you can configure the…
Run the Perceptive Content client. On the Perceptive Content sunflower screen, click Connection Profiles, then Edit connection profiles.
Effective May 23, 2022, Microsoft has announced that the Outlook for Android mobile app will no longer be supported on Android version 7.1 or earlier. If you have Outlook for Android installed on your mobile device, make sure your device is running Android version 8 or higher. If not, upgrade…
TPM Off or Does Not Exist   Reboot into BIOS (F2 at POST). In the TPM Security section, make sure the boxes are checked. Click Apply. Exit BIOS. The computer will reboot. Re-run the MBAM installer.
This information is intended for technical support providers. End users should contact their technical support for assistance.You will need to be on a campus network or VPN  to use BitLocker recovery with the self service link.If BitLocker encounters problems unlocking the drive during the…
The procedure described on this page is only for Windows computers that are NOT managed through CIT's Managed Desktop service. If you are unsure if your computer is managed, we urge you to check with your local technical support provider.
This information is intended for technical support providers. End users should contact their technical support for assistance.All managed computers in Configuration Manager now have their BitLocker managed and configured by ConfigMan itself. Configuration Manager will automatically install the MBAM…
Cornell students, faculty, staff, and visitors from other eduroam-participating institutions, should use eduroam to securely connect to the internet. Welcome to the Cornell campus. To access the internet, you must register to use the Cornell-Visitor network. Follow the steps below.
Some of Our Most Recent WorkSee our comprehensive portfolio!
To use CU VPN with Cornell campus networks and services, you must use the Cisco AnyConnect VPN software. Built-in Windows and macOS software will not work. Supported operating systems: Windows 10 macOS, the current version and the two previous versions iPhone and iPod Touch (…
To use Cornell's Virtual Private Network (VPN) with campus networks and services, you must use Cisco Secure Client VPN software. See the How to Install Cisco VPN Software page for instructions.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.