Search 37 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
PGP Desktop Encryption
An easy to use and secure encryption to protect sensitive data on laptops or PCs. ... What Is It?
PGP Desktop Encryption, licensed through Symantec, provides easy to use and secure encryption to protect sensitive data on laptops or PCs. Laptops are easily lost, and even desktop
Microsoft BitLocker Encryption
A simplified administrative interface that you can use to manage BitLocker Drive Encryption. ... What Is It?
Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 provides a simplified administrative interface that you can use to manage BitLocker Drive Encryption. You can configure
What is Symantec Encryption Desktop? (formerly known as PGP Desktop Encryption)
Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers. Laptops are ... Overview
Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers
What are common issues with encryption?
This article details common issues associated with encryption. ... This article details common issues associated with encryption.
If the client never pops up and asks you to encrypt, some possible causes are:
The client never installed (for 64 bit
Where can I find PGP Desktop Encryption guides?
Symantec Encryption/PGP documentation for Windows and MacOS. ... Symantec Encryption/PGP documentation for Windows and MacOS.
Symantec's documentation on Symantec Encryption Desktop (formerly known as PGP Desktop) is quite good. If you have any questions
What type of data is acceptable for use with the Office 365 Encryption option?
Learn about what data can and cannot be sent with encrypted email
What type of data is acceptable for use with the Office 365 Encryption option?The Office 365 encryption feature is suitable
How do I send an encrypted email using Office 365?
O365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365. ... O365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365.
Details
How to begin
About the
How do I use Box with an FTP client to bulk transfer files to U of I Box?
access method.
Please note that Box does not support SFTP (SSH File Transfer Protocol). Please use FTPS or FTPES for transfers requiring encryption. File transfers performed via FTP interfaces do
What are PGP Public and Private Keys?
This article details what Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption work. ... Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption
PGP, Pretty Good Privacy, is a "public key cryptosystem." (Also known as PKC.) In PGP, each person has two "keys": a "public key
How can I recognize the UIC WiFi network?
The UIC community wireless network identifies itself as UIC-WiFi.
The UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise includes AES encryption and 802.1x authentication. The specific
How do I configure Active Directory to store BitLocker recovery information?
You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS). ... You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS
Can I use Webex Meetings for telehealth?
uUniversity-owned device that is encrypted with a University-approved encryption solution.
Personal Rooms:
If using the Webex Personal Room option for telehealth purposes, take the necessary
How do I encrypt using MBAM?
MBAM:
1. You will be presented with the following screen. Click on "Start".
NOTE: Depending on when the client was installed, you may be able to postpone encryption until a later date by
How do I setup my UIC Exchange email on my Android device?
take a minute or two for this prompt to appear.
When prompted to "Set device encryption", tap Not Now.
When prompted, add another account if you so desire. Otherwise, tap maybe later.
Press skip to skip the tutorial if you so desire.
How do I install MBAM?
install the client:
1. Open up the Group Policy Management console.
2. Find the OU that contains computers you want to enforce encryption on, right-click on it, and select "Link an Existing