Content (65)
How do we get access to the central ITSO console?Send a request to security-services@cornell.edu. Specify the AD group the TSPs who will need to access the ITSO Console.What is the URL for the central ITSO console?https://sf-hops16.serverfarm.cornell.edu/console
Have you ever seen warning like the one shown here?
It may have made you wonder if someone was sending you forged email. You should always be on your guard, but there can also be an innocent explanation.
Sign in to Google Workspace (formerly G Suite) at
gsuite.cornell.edu
Google Workspace sign-in uses Cornell login. Your email address is your NetID@cornell.edu address and your password is the one you use with your NetID to sign in to other Cornell services.
In addition, students, faculty, and…
We strongly recommend that you work with your Cornell Workspace (formerly G Suite) email using Google's web interface at gsuite.cornell.edu. This method requires no setup and, as long as you keep your browser up to date, will require no maintenance on your part.
We recognize that some users may…
We strongly recommend that you work with your Cornell Google Workspace email using Google's web interface at gsuite.cornell.edu. Using Apple Mail is not as good.
However, if you choose to view your messages through Apple Mail, see below.
Vendors may change mailing parameters at any time. If you need more information about mailing limits or other parameters not defined here, refer to Google’s documentation for sending limits and receiving limits.Mailbox SizeThe default quota for Google Workspace is 15 GB. This includes email, email…
Cornell's commitment to privacy has not changed as a consequence of offering Google Workspace, a cloud-based service.
As with all decisions that Cornell makes regarding information technologies, privacy and security are key elements. In addition, Cornell remains committed to freedom of…
Cornell provides licenses for Spirion to be installed on Cornell-owned computers only, including those not located on university property. For example, if the computer at your house is owned by Cornell, you can install Spirion with a Cornell license. Discuss this with your local technical…
You can grant others permission to see your calendar. You choose the level of detail (when you’re free or busy, the subject of the event, or the details of the event). You also have the option of marking a calendar item as Private; this removes all privileges except seeing that you are busy for the…
This information is intended for technical support providers.
You will not be able to enable FileVault on a computer that is managed by Cornell IT staff, because encryption will already be setup. If you are not sure whether your computer is managed, please contact your support provider.
To enable FileVault on a non-managed Mac computer,…
When installing the Mac CU VPN client, you receive an error that the vpn.pkg file is damaged.
How to Solve this Problem
The error message is misleading. The installation package is not damaged. However, a security setting on your Mac is preventing the client installation. To solve this…
These instructions are for computers using Certified Desktop. To connect a personal device, please use our onboarding tool.
Select eduroam from the Airport menu bar.
Cornell students, faculty, staff, and visitors from other eduroam-participating institutions, should use eduroam to securely connect to the internet.
Welcome to the Cornell campus. To access the internet, you must register to use the Cornell-Visitor network. Follow the steps below.
Some of Our Most Recent WorkSee our comprehensive portfolio!
To use CU VPN with Cornell campus networks and services, you must use the Cisco AnyConnect VPN software. Built-in Windows and macOS software will not work.
Supported operating systems:
Windows 10
macOS, the current version and the two previous versions
iPhone and iPod Touch (…
To use Cornell's Virtual Private Network (VPN) with campus networks and services, you must use Cisco Secure Client VPN software. See How to Install Cisco VPN Software for instructions.
You must have administrative privileges to install the CU VPN software on your computer.
After you install the Secure Client, the software will be upgraded to newer versions automatically. Allow the client to upgrade when it requests permission.
Enter the following:
University-Owned ComputersIf the university-owned computer is managed by a unit that’s signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.
Schedule (Invite) a Resource
The default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…