Information on App Services or Kubernetes on Azure
When should I create resources in regions other than North Central and who should I contact?
To ensure that access to the UIC network remains secure, it is not possible to save your password in AnyConnect.
AnyConnect VPN access through Remote Desktop
There are three methods for guests to obtain wireless network: self-created guest access, staff-sponsored guest access and eduroam.
How to find the MAC address of your Device
Instructions for configuring a linux server's firewall rules to allow connections via Cisco AnyConnect.
Information on the My Devices Portal and how to set it up for students living in UIC residence halls.
This tutorial explains how to create a resource group in Azure.
How to estimate monthly cost for Azure
AWS provides a convenient online calculator tool to estimate monthly costs
This article summarizes how to utilize the Azure Pricing Calculator to estimate a cost for services in Azure utilizing the University's contract.
This article is for Windows 8.1 and 10.
Technology Solutions has developed a web application for designated administrators of unit network space to manage the end-users that are authorized to access the respective unit's network.
The UIC community wireless network identifies itself as UIC-WiFi.
You can add users to your AWS account by adding user to groups in Azure Active Directory
Instructions on how to connect to network file shared managed by Technology Solutions
Provides instructions on and troubleshooting information for accessing university resources from off-campus.
Azure backups can be created through the Azure portal. This method provides a browser-based user interface to create and configure Azure backups and all related resources. You can protect your data by taking backups at regular intervals. Azure Backup creates recovery points that can be stored in geo-redundant recovery vaults.
Steps for connecting to Res-Net using a Mac laptop or iMac with a wired network connection.
The DHCP server should provide your IP address, a Subnet Mask, and Gateway, Search Domain and DNS servers for you.
Steps for connecting to Res-Net using your Windows laptop and desktop.
To connect to MySQL and MariaDB databases on Linux virtual servers, use a tool like MySQL Workbench (cross-platform), or Sequel Pro (Mac OS X). Both are free applications. Note: This does not include databases hosted by the Technology Solutions database service, which are accessed using a different process.
There are two ways to connect to your Windows virtual server:
UIC-WiFi uses enterprise-level security protocols. These instructions help you to connect your Chromebook device to the campus wireless network.
UIC-WiFi uses enterprise-level security protocols. These instructions should help you to connect your Android device to the campus wireless network.
Connecting to UIC-WiFi using an Apple device is simple!
Connecting to UIC-WiFi using a MacOS device is simple!
Connecting to our wireless network through Windows is easy with your UIC NetID and password.
Watch a video on how to connect to UIC-WiFi with Kindle
This article summarizes how to connect to UIC-WiFi using different devices.
Managing permissions in Azure is straightforward.
Using roles to control resource permissions in AWS
Follow these steps to create a secure Web App.
Follow this guide to set up a Virtual Machine in Azure.
An Azure storage account provides a unique namespace to store and access your Azure storage data objects. Every object that you store in Azure Storage has an address that includes your unique account name. The combination of the account name and the Azure Storage blob endpoint forms the base address for the objects in your storage account. All objects in a storage account are billed together as a group.
A resource group contains the resources required to successfully deploy a VM or service in Azure. It is a container that holds related resources for an Azure solution. In Azure, you logically group related resources such as storage accounts, virtual networks, and virtual machines (VMs) to deploy, manage, and maintain them as a single entity. Typically, Microsoft recommends that a resource group contain resources that have a similar life expectancy. For example, a resource group might contain re
This article walks the end user through the process of obtaining permission to have an application hosted in the cloud via an application request form found at:
http://cloudriskform.uic.edu
All faculty and staff automatically have a Crashplan account created for them 24 hours after their UIC account has been created. To begin using Crashplan, simply install the client on your machine and your files should automatically begin backing up.
NOTE: Crashplan is free to use for all faculty and staff.
Access is granted through Active Directory, and once a user logs in to the Commvault backup tenant, Tenant Admins can provide additional levels of access.
Import non AutoPilot computer into Entra/Intune.
This document provides instructions on the use of UIC’s Virtual Private Network solution.
This document provides instructions on the use of UIC’s VPN solution. 2FA provides an additional level of security to protect your resources.
This document provides instructions on use of UIC’s VPN solution. Please note that the use of this VPN solution requires you to enroll in the university’s 2-Factor Authentication (2FA) solution. 2FA provides an additional level of security to protect your resources.
This document provides instructions on the use of UIC’s Virtual Private Network solution.
This document provides instructions on the use of UIC’s Virtual Private Network solution.
Commvault offers application-specific backup agents that can be used to back up applications such as databases.
This article describes how to install server backup clients and register them with your server backup tenant.
Join a device to UIC's Azure Active Directory through the use of a Group Policy Objects and verify that the device has successfully entered a hybrid join state.
How to log in to UIC server backup tenants
Below are the instructions for logging into the AnyConnect VPN client.
Top Three recommendations/considerations:
Azure Cost Management works with Azure Advisor to provide cost optimization recommendations. Azure Advisor helps you optimize and improve efficiency by identifying idle and underutilized resources. This tutorial walks you through an example where you identify underutilized Azure resources and then you take action to reduce costs.
Use the form below to arrange the registration of your domain and/or to ask for information about it.
There are multiple options for restoring a virtual machine in Azure.
File restoration is completed through the Commvault Command Center web interface.
Create and manage Azure budgets
This article details how to plan a wireless network installation.
Steps on how to add a new device to your MY Devices listing.
When decommissioning a server, it is recommended to first uninstall the Commvault backup client. This article provides information on how to complete the uninstallation.
This article details the process for adding new apps to Intune.
This article contains a network diagram detailing how network traffic flows into and out of Azure from on campus.
One data jack can support four analog phone lines, or unlimited VoIP phone lines.
Archive Storage is built as a scalable service for cost-effectively storing rarely accessed data for long periods of time.
After changing your UIC password, you will need to have your device(s) forget the UIC-WiFi network so that you are prompted to reconnect with your updated UIC credentials.
Key features and requirements of the Technology Solutions West Campus Data Center are listed below.
The Technology Solutions has created a list of resources that you can use to learn about Azure.
Clients are responsible for adhering to the following Administrative Guidelines while utilizing the Technology Solutions Data Center.
This article details how to troubleshoot problems with CrashPlan.
Requirements and costs of an MS SQL database hosted through Technology Solutions
IP addresses of UIC's DNS Servers
If you are having trouble accessing UIC resources such as Blackboard, email, and more, from outside of the US, try using the UIC VPN solution.
Two group options exist when connecting to AnyConnect and there are some differences to be aware of to choose the best option for your needs.
This article details information on backups for administrators.
The choice of a name for any resource in Microsoft Azure is important because:
AWS is a cloud solution that offers many of the same solutions that might be found in traditional data centers.
Azure Blob storage is Microsoft's object storage solution for the cloud. Blob storage is optimized for storing massive amounts of unstructured data. Unstructured data is data that does not adhere to a particular data model or definition, such as text or binary data.
Azure Storage Explorer is an application which helps you to easily access the Azure storage account through any device on any platform, be it Windows, MacOS, or Linux. You can easily connect to your subscription and manipulate your tables, blobs, queues, and files. In addition to these, you can connect to and manipulate Azure Cosmos DB Storage and Azure Data Lake Storage as well.
Microsoft Azure is an ever-expanding set of cloud services to help UIC innovate and meet your organizational needs. It’s the freedom to build, manage, and deploy applications on a massive, global network using your favorite tools and frameworks.
Eduroam is an organization that joins educational institutions and allows them to broadcast the same Wi-Fi network, but allows for your local institution's username and password to access that network.
This article gives an overview of what type of activity is logged into Azure and for what duration of time.
Describes how to use the MySQL Portal to manage owned databases.
Access management for cloud resources is a critical function for any organization that is using the cloud. Role-based access control (RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.
Guest access to the UIC wireless network is provided as a service to visitors to the UIC campus. For information on how to obtain access to the guest network, see Guest Wireless at UIC.
All persons requesting guest wireless access must read and agree to these policies. Failure to abide by these policies will result in a loss of wireless network access. The use of Guest Wireless access at UIC for illegal purposes is prohibited and violators will be prosecuted to the fullest extent of the law.
By default, all users are given the Owner database role on their databases and the public role on the instance. This allows you to view every database on your departmental instance and perform all configuration and maintenance activities on your database as well as drop your database in SQL Server.
There are additional costs associated with storing HIPAA data in azure; primarily due to additional logging.
UIC-WiFi is ubiquitous within UIC and available in most public and student occupied space throughout campus.
The document explains the cost of each available service tier option and the services included in each service tier option
Data jack installation requests should be submitted by a person authorized to approve purchases for the department.
There are a few reasons why the AnyConnect client may give an error of Login Failed.
If you are trying to install the UIC VPN but can't continue with the installation because everything is greyed out or only the AMP is available, this happens when there is a previous installation of VPN on your machine.
There are two group options when connecting to AnyConnect: General-Use and Library-Resources.
Explains why/when using a VPN could be a good idea
How to upgrade the Windows Server OS on Technology Solutions hosted VMs.