Search 34 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
How do I install MBAM?
This article details how to install Microsoft Bitlocker Administration and Monitoring (MBAM). ... Find the OU that contains computers you want to enforce encryption on, right-click on it, and select "Link an Existing GPO".
What do I need to know to use a university-provided travel cell phone?
The Travel Cell Phones for Researchers service offering provides temporary mobile devices to UIC research personnel for university-approved research-related travel to particular high-risk... ... App installation restrictions, including the exclusion of Box Sync/Box Drive, Microsoft OneDrive, Google Drive, and Microsoft Outlook applications Enforced encryption and screen lock policies.
UIC-WiFi
The UIC community wireless network identifies itself as UIC-WiFi. Only current students, faculty, and staff can use UIC-WiFi. ... WPA2 Enterprise implements the 802.11i security standard, which includes AES encryption and 802.1x authentication. The specific authentication method that we use is PEAP–MSCHAPv2.
Email and Calendaring
Technology Solutions provides a personal University email address to all current students, staff, and faculty. The email address is in the format NetID@uic.edu and can be used in conjunction with... ... Sharing and collaboration: federated calendar sharing with UIH, UIUC, UIS (including calendar publishing) Client support for mobile devices Exchange Online Archiving Message Encryption Data
What is Azure?
Microsoft Azure is an ever-expanding set of cloud services to help UIC innovate and meet your organizational needs. It’s the freedom to build, manage, and deploy applications on a massive, global... ... Identity and access management (IAM) -- These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information in the cloud....
I will be traveling internationally. Will I have access to university resources while abroad?
Some countries may inspect electronic devices at border crossings, even demanding encryption be unlocked.
Microsoft Azure
Microsoft Azure is an ever-expanding set of cloud services to help UIC innovate and meet your organizational needs. It’s the freedom to build, manage, and deploy applications on a massive, global... ... Identity and access management (IAM) -- These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information in the cloud.
Microsoft Exchange
Exchange is UIC’s primary email and calendaring solution. ... Microsoft data centers located within the US Encryption coming soon!
How can I protect PHI while using Zoom?
Individuals in a covered component of the University of Illinois Covered Entity may access the HIPAA compliant "UIC PHI" Zoom portal, capable of creating secure meetings for discussing PHI and... ... Technical Controls Enabled for Zoom HIPAA-Compliant Meetings: Additional encryption enabled for all participants to meet HIPAA requirements.
TLS Server Certificates
A required certificate to enable Transport Layer Security (TLS) operation on a server (typically a web server). ... certificate is needed to enable Transport Layer Security (TLS) operation on a server (typically a web server), which verifies the server's identity to clients (typically web browsers), and enables...
Microsoft Intune
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You control how your unit's devices are used, including mobile... ... There are a number of remote actions that can be accomplished through the Intune portal, from device lock, data encryption, passcode reset – or a wipe of university data for stolen or lost devices.
Travel Laptops for Researchers
To accommodate researchers' computer needs while traveling, UIC has made Windows or Mac laptops available for short-term loan. ... Both types of laptops include: UIC standard encryption UIC AnyConnect VPN client Microsoft 365 applications (Word, PowerPoint, Excel, Access, and Publisher) Excluding Outlook Adobe Acrobat
What are some ways to host my personal website?
UIC supports several options for creating and maintaining personal websites to serve a variety of needs. ... Identity and access management (IAM): These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information in the cloud.
How do I create a VM in Azure?
Follow this guide to set up a Virtual Machine in Azure. ... Follow the documentation found here: https://docs.microsoft.com/en-us/azure/security/fundamentals/azure-disk-encryption-vms-vmss Ensure that the latest OS Patches for all Virtual Machines
How can I estimate a monthly cost for Azure?
How to estimate monthly cost for Azure ... Basic VMs do not include the ability to do load balancing at the network port level, use automatic scaling or use Azure Disk Encryption.