Skip to main content

Cornell University

Windows

Content (99)

You must have administrative privileges to install the CU VPN software on your computer. After you install the Secure Client, the software will be upgraded to newer versions automatically. Allow the client to upgrade when it requests permission. Enter the following:
University-Owned Options We recommend CrowdStrike for all Windows computers that are part of Certified Desktop.
From the Home ribbon, in the Move section, click Rules, then click Manage Rules & Alerts. A Rules and Alerts dialog box will open. On the E-mail Rules tab, click New Rule.
Schedule (Invite) a Resource The default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…
This procedure assumes you are already using Outlook to access your NetID email account. If you are not using Outlook for your NetID email account, do not follow the instructions here. Instead, skip down the the section at the bottom of this page labeled If You Are Not Using Outlook for your…
By default, everyone can see the free/busy status of a Resource Account while proposing a meeting, but cannot open the resource's calendar. This procedure explains how the owner of a Resource Account can grant additional access rights (viewing and/or editing) to a Resource Account. Before you can…
How Can I Request a Code-Signing Certificate? Send your request to the IT Service Desk. Specify the contact email address you would like to appear in your certificate. The IT Service Desk will initiate a code signing certificate invitation.
(For information about what phishing is, see How to Guard Against Internet Fraud.)
Recipient Rights With Recipient rights, a copy of messages sent to the account are delivered to your Exchange account.
Initial Setup The first time you launch Outlook for Windows, it will probably take you straight into the Auto Account Setup wizard, which looks like this: If you see this screen, skip the text in the "If the wizard does not start" box immediately below and proceed directly to the…
You will need an account with administrative rights on your computer.
Open the message. Click the small, downward-facing arrow next to the Reply arrow icon near the top right of the message window, just under the Subject of the message. Select Show original. A separate window will open, showing a few summary rows at the top, then the complete…
Open the message. Click the File tab on the message window (not the main Outlook window). Click Info in the left column (it may already be selected). Click Properties. The Internet headers section of the Properties dialog box shows all headers.…
This page describes the special handling required to back up encrypted volumes, which are "containers" that hold encrypted files and folders. Another method is Whole-Disk Encryption (WDE). If you use WDE, no special procedures are needed, assuming you have entered the WDE password or passphrase…
It is possible to include certain files and exclude others from backup using include/exclude rules. This article covers including files. We have a similar article on how to exclude files from backup.
Elsewhere we describe how to create rules to include files and how to create rules to exclude files.
Start up the TSM Backup Client (Start - (All) Programs - Tivoli Storage Manager - Backup Archive GUI). Click Restore. Click the plus sign next to File Level to expand the item. Single-click (to select/highlight) the filespace of interest (for example, \\wintest\c$ ). (Note: Do not click inside…
Once a filespace is deleted, all backups in that filespace are immediately and permanently removed from the EZ-Backup server. There is no possibility of accessing the backups after they are deleted.
If you experience problems (as described below), use the Setup Wizard available in the TSM Backup Client. These procedures require full administrator privileges and may require a reboot of the system.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.