Search 32 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

UIC-WiFi

eduroam. Other Service Names Wireless Network Features UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise implements the 802.11i security standard, which includes AES encryption and

Email and Calendaring

collaboration: federated calendar sharing with UIH, UIUC, UIS (including calendar publishing) Client support for mobile devices     Exchange Online Archiving  Message Encryption Data loss prevention

What is Azure?

private and public clouds. Identity and access management (IAM) -- These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information

I will be traveling internationally. Will I have access to university resources while abroad?

traveling to enforce restrictions on access to services outside its borders? Some countries may inspect electronic devices at border crossings, even demanding encryption be unlocked. If this were to

How can I protect PHI while using Zoom?

Firefox/Chrome/etc - while these plugins cannot be disabled, their use is not allowed for PHI. Technical Controls Enabled for Zoom HIPAA-Compliant Meetings: Additional encryption enabled

Microsoft Azure

Azure services, and help protect encryption keys and other sensitive information in the cloud. Services include support for Azure Active Directory and multifactor authentication (MFA). Who Is

TLS Server Certificates

browsers), and enables encryption to secure communications from eavesdropping and maintain the integrity of the data transmitted. To avoid warning dialogs issued by web browsers, the certificate must

Microsoft Exchange

mailboxes for users with Microsoft 365 A1 licenses. Microsoft data centers located within the US Encryption coming soon! Availability will be based on departmental business requirements Exchange Online

Microsoft Intune

portal, from device lock, data encryption, passcode reset – or a wipe of university data for stolen or lost devices. Intune also protects employee-owned devices and partitions work from personal data

How do I connect to UIC-WiFi using Windows?

: Network name: UIC-WiFi (This has to be exactly UIC-WiFi because that is the name of the network.) Security type: WPA2-Enterprise Encryption type: AES Leave the Security Key blank. Select Start

Travel Laptops for Researchers

Windows or Mac laptops available for loan. Features Clients may request either a Windows or Mac laptop. Both types of laptops include: UIC standard encryption UIC AnyConnect VPN client

How can I estimate a monthly cost for Azure?

automatic scaling or use Azure Disk Encryption.  The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS. Low-priority VMs can be used

How do I create a VM in Azure?

are encrypted. Follow the documentation found here: https://docs.microsoft.com/en-us/azure/security/fundamentals/azure-disk-encryption-vms-vmss Ensure that the latest OS Patches

How can I estimate the costs of using Azure?

Encryption.  The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS.Low-priority VMs can be used in a set with other machines, but these take

How do I create a simple, secure, Web App in Azure?

encryption. For each app, in settings, click on SSL settings and ensure that the minimum TLS Version is set to 1.2 under protocol. Ensure that Register with Azure Active Directory is