Search 37 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Microsoft BitLocker Encryption

BitLocker is Microsoft's full disk encryption solution for Windows devices. ... What Is It? Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 provides a simplified administrative interface that you can use to manage BitLocker Drive Encryption. You can configure

Apple Filevault Encryption

FileVault is full disk encryption for Mac. ... What Is It? FileVault is full disk encryption for Mac. When you use JAMF Now to set up FileVault, the recovery keys will be stored in JAMF. This is handy if you forget the password to the Mac and

What is Symantec Encryption Desktop? (formerly known as PGP Desktop Encryption)

Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers. Laptops are ... Overview  Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers

What are common issues with encryption?

This article details common issues associated with encryption. ... attempt the retrieve a key for a machine you are not authorized to use, it will say "Invalid recovery key ID." Error during encryption Some users may see an error during the initial encryption

Where can I find PGP Desktop Encryption guides?

Symantec Encryption/PGP documentation for Windows and MacOS. ... Symantec Encryption/PGP documentation for Windows and MacOS.   Symantec's documentation on Symantec Encryption Desktop (formerly known as PGP Desktop) is quite good. If you have any questions

What type of data is acceptable for use with the Office 365 Encryption option?

Learn about what data can and cannot be sent with encrypted email What type of data is acceptable for use with the Office 365 Encryption option?The Office 365 encryption feature is suitable

Device Management and Protection

encryption ... , Encryption Features Windows Device Management via MECM or Intune Apple Device Management via Jamf Device Encryption via Apple FileVault or Microsoft BitLocker Antimalware protection via

How can I recognize the UIC WiFi network?

The UIC community wireless network identifies itself as UIC-WiFi.   The UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise includes AES encryption and 802.1x authentication. The specific

How do I send an encrypted email using Office 365?

O365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365. ... Overview Office 365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365.   Table of Contents

How do I use Box with an FTP client to bulk transfer files to U of I Box?

access method.   Please note that Box does not support SFTP (SSH File Transfer Protocol). Please use FTPS or FTPES for transfers requiring encryption.  File transfers performed via FTP interfaces do

Can I use Webex Meetings for telehealth?

uUniversity-owned device that is encrypted with a University-approved encryption solution. Personal Rooms: If using the Webex Personal Room option for telehealth purposes, take the necessary

What are PGP Public and Private Keys?

This article details what Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption work. ... Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption PGP, Pretty Good Privacy, is a "public key cryptosystem." (Also known as PKC.) In PGP, each person has two "keys": a "public key

How do I configure Active Directory to store BitLocker recovery information?

You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS). ... You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS

How do I encrypt using MBAM?

:  You will be presented with the following screen. Click on "Start". NOTE:  Depending on when the client was installed, you may be able to postpone encryption until a later date

How do I setup my UIC Exchange email on my Android device?

take a minute or two for this prompt to appear.   When prompted to "Set device encryption", tap Not Now.   When prompted, add another account if you so desire. Otherwise, tap maybe later.   Press skip to skip the tutorial if you so desire.