Skip to main content

Cornell University

Macintosh

Content (77)

Some of Our Most Recent Work See our comprehensive portfolio!
To use CU VPN with Cornell campus networks and services, you must use the Cisco AnyConnect VPN software. Built-in Windows and macOS software will not work. Supported operating systems: Windows 10 macOS, the current version and the two previous versions iPhone and iPod Touch (…
To use Cornell's Virtual Private Network (VPN) with campus networks and services, you must use Cisco Secure Client VPN software. See How to Install Cisco VPN Software for instructions.
You must have administrative privileges to install the CU VPN software on your computer. After you install the Secure Client, the software will be upgraded to newer versions automatically. Allow the client to upgrade when it requests permission. Enter the following:
University-Owned Computers If the university-owned computer is managed by a unit that's signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.
Before constructing your rule, decide where you want to put the meeting-related messages. If the folder doesn't already exist, create the folder now so it will be available to your rule.
Schedule (Invite) a Resource The default setting is that anyone using Exchange Calendar can schedule a resource. However, the owner can change this so that, when someone includes the resource as an invitee to a meeting, the owner (or someone delegated by the owner) approves or denies the request.…
This procedure assumes you are already using Outlook to access your NetID email account. If you are not using Outlook for your NetID email account, follow the steps in our Initial Setup for Outlook article, then come back here and complete the steps below.
By default, everyone can see the free/busy status of a Resource Account while proposing a meeting, but cannot open the resource's calendar. This procedure explains how the owner of a Resource Account can grant additional access rights (viewing and/or editing) to a Resource Account. First, you'll…
How Can I Request a Code-Signing Certificate? Send your request to the IT Service Desk. Specify the contact email address you would like to appear in your certificate. The IT Service Desk will initiate a code signing certificate invitation.
(For information about what phishing is, see How to Guard Against Internet Fraud.)
Recipient Rights With Recipient rights, a copy of messages sent to the account are delivered to your Exchange account.
Two-Step Login for Office 365, please note that it doesn't work with Apple's Mail and Calendar on macOS; it only works with those apps on iOS. Open Calendar, found on your dock or in your Applications folder. From the
Open the message. Click the small, downward-facing arrow next to the Reply arrow icon near the top right of the message window, just under the Subject of the message. Select Show original. A separate window will open, showing a few summary rows at the top, then the complete…
Right-click (or ctrl-click) the message in your Inbox or other folder (do not open the message). From the menu that appears, select View Source. Your text editor (typically an application called TextEdit) will open, displaying all the headers for the message, followed by the message body…
CIT is working with local IT support to move all Mac users from EZ-Backup to CrashPlan.
The TSM log files can be found in Library -> Logs -> tivoli -> tsm Double-click dsmerror.log The oldest entries appear at the beginning of the file; the newest entries appear at the end. If there is an error with a recent timestamp on it, you are having trouble with TSM. Email the…
CIT is working with local IT support to move all Mac users from EZ-Backup to CrashPlan. Check with your local technical support provider to learn about the plans for your unit. By default, the files are in the following four locations. We've listed the GUI navigation from hard drive given first,…
CIT is working with local IT support to move all Mac users from EZ-Backup to CrashPlan. Check with your local technical support provider to learn about the plans for your unit. Volumes that are no longer needed can be deleted.
Background In 2019, changes were made to the process for updating applications and operating systems on Mac devices. The process requires fewer prompts and user interruptions during the management, installation, update, and patching of operating systems and installed applications. Option 1: User-…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.