Search 37 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

PGP Desktop Encryption

An easy to use and secure encryption to protect sensitive data on laptops or PCs. ... What Is It? PGP Desktop Encryption, licensed through Symantec, provides easy to use and secure encryption to protect sensitive data on laptops or PCs. Laptops are easily lost, and even desktop

Microsoft BitLocker Encryption

A simplified administrative interface that you can use to manage BitLocker Drive Encryption. ... What Is It? Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 provides a simplified administrative interface that you can use to manage BitLocker Drive Encryption. You can configure

What is Symantec Encryption Desktop? (formerly known as PGP Desktop Encryption)

Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers. Laptops are ... Overview  Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers

What are common issues with encryption?

This article details common issues associated with encryption. ... This article details common issues associated with encryption. If the client never pops up and asks you to encrypt, some possible causes are: The client never installed (for 64 bit

Where can I find PGP Desktop Encryption guides?

Symantec Encryption/PGP documentation for Windows and MacOS. ... Symantec Encryption/PGP documentation for Windows and MacOS.   Symantec's documentation on Symantec Encryption Desktop (formerly known as PGP Desktop) is quite good. If you have any questions

What type of data is acceptable for use with the Office 365 Encryption option?

Learn about what data can and cannot be sent with encrypted email What type of data is acceptable for use with the Office 365 Encryption option?The Office 365 encryption feature is suitable

How do I send an encrypted email using Office 365?

O365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365. ... O365 delivers multiple encryption options to help us meet our needs for email security. This article describes how to encrypt email in Office 365.   Details How to begin   About the

How do I use Box with an FTP client to bulk transfer files to U of I Box?

access method.   Please note that Box does not support SFTP (SSH File Transfer Protocol). Please use FTPS or FTPES for transfers requiring encryption.  File transfers performed via FTP interfaces do

What are PGP Public and Private Keys?

This article details what Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption work. ... Pretty Good Privacy (PGP), PGP Keys, and PGP Whole Disk Encryption PGP, Pretty Good Privacy, is a "public key cryptosystem." (Also known as PKC.) In PGP, each person has two "keys": a "public key

How can I recognize the UIC WiFi network?

The UIC community wireless network identifies itself as UIC-WiFi.   The UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise includes AES encryption and 802.1x authentication. The specific

How do I configure Active Directory to store BitLocker recovery information?

You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS). ... You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS

Can I use Webex Meetings for telehealth?

uUniversity-owned device that is encrypted with a University-approved encryption solution. Personal Rooms: If using the Webex Personal Room option for telehealth purposes, take the necessary

How do I encrypt using MBAM?

MBAM: 1. You will be presented with the following screen. Click on "Start". NOTE:  Depending on when the client was installed, you may be able to postpone encryption until a later date by

How do I setup my UIC Exchange email on my Android device?

take a minute or two for this prompt to appear.   When prompted to "Set device encryption", tap Not Now.   When prompted, add another account if you so desire. Otherwise, tap maybe later.   Press skip to skip the tutorial if you so desire.

How do I install MBAM?

install the client: 1.  Open up the Group Policy Management console. 2. Find the OU that contains computers you want to enforce encryption on, right-click on it, and select "Link an Existing