Content (68)
You must have administrative privileges to install the CU VPN software on your computer.
After you install the Secure Client, the software will be upgraded to newer versions automatically. Allow the client to upgrade when it requests permission.
Enter the following:
University-Owned OptionsWe recommend CrowdStrike for all Windows computers that are part of Certified Desktop.
Schedule (Invite) a ResourceThe default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…
Note: New Outlook is unable to work with EGAs. If that functionality is needed, you will need to use Legacy Outlook on Windows.This procedure assumes you are already using Outlook to access your NetID email account.
By default, everyone can see the free/busy status of a Resource Account while proposing a meeting, but cannot open the resource’s calendar.
This procedure explains how the owner of a Resource Account can grant additional access rights (viewing and/or editing) to a Resource Account.
Before you can…
How Can I Request a Code-Signing Certificate?Send your request to the IT Service Desk. Specify the contact email address you would like to appear in your certificate.The IT Service Desk will initiate a code signing certificate invitation.
(For information about what phishing is, see How to Guard Against Internet Fraud.)
Considerations:
Recipient Rights
With Recipient rights, a copy of messages sent to the account are delivered to your Exchange account.
Initial Setup
The first time you launch Outlook for Windows, it will probably take you straight into the Auto Account Setup wizard, which looks like this:
If you see this screen, skip the text in the “If the wizard does not start” box immediately below and proceed directly to the instructions…
You will need an account with administrative rights on your computer.
Open the message.
Click the small, downward-facing arrow next to the Reply arrow icon near the top right of the message window, just under the Subject of the message.
Select Show original. A separate window will open, showing a few summary rows at the top, then the complete…
CIT changed (December 2020) the update process to make delivering updates to software and operating systems less intrusive to individual users’ computer use and to eliminate the inconvenience and possible content loss that could result from forced system restarts.
With the revised process, IT…
The PrinterLogic browser extension should install automatically. You do not need to follow the steps on this page unless you see an alert telling you that the extension is not installed.
Firefox
At the Install Firefox Extension prompt, click Install.
Microsoft 365 Applications and Mobile AppsBecause Microsoft 365 uses Microsoft Azure authentication, you should rarely need to additionally authenticate with Two-Step Login when launching a Microsoft app on your computer or mobile device.
When updates are available, a small DellCommandUpdate dialog box will appear near your task bar.
You also have the option to run this utility manually.
CIT strongly recommends:
OneDrive, part of your Cornell faculty, student, or staff Microsoft account, provides cloud storage for all your important documents, connected with the Microsoft apps many of us use every day. Your files are protected from the risk of damage to your devices, and they’re available anytime through…
How can Cornell help you protect your computer in the face of mounting online threats? With Certified Desktop, CIT works with your department’s IT staff to make your computer safer.
BitLocker is a feature of Windows that encrypts your data to keep it safe from unauthorized access. Using BitLocker Whole Disk Encryption (WDE), your entire disk is encrypted. Please consult your security liaison or your local technical support provider before enabling this feature on any…
Keep Zoom meetings and webinars private and safe from unwanted attendees and Zoombombing and learn about Strategies to Block AI Bots from Zoom Sessions.Meetings vs.