Search 31 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

What information on backups is available for Administrators?

single encryption key for all backups. A user always belongs to one (and only one) organization. Device A single computer within your CrashPlan environment, identified by its GUID

How do I create a simple, secure, Web App in Azure?

of TLS encryption. For each app, in settings, click on SSL settings and ensure that the minimum TLS Version is set to 1.2 under protocol. Ensure that Register with Azure Active

How can I estimate the costs of using Azure?

Encryption.  The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS.Low-priority VMs can be used in a set with other machines, but these take

How can I estimate a monthly cost for Azure?

automatic scaling or use Azure Disk Encryption.  The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS. Low-priority VMs can be used

How do I create a VM in Azure?

encrypted. Follow the documentation found here: https://docs.microsoft.com/en-us/azure/security/fundamentals/azure-disk-encryption-vms-vmss Ensure that the latest OS Patches for

Travel Laptops for Researchers

Windows or Mac laptops available for loan. Features Clients may request either a Windows or Mac laptop. Both types of laptops include: UIC standard encryption UIC AnyConnect VPN client

How do I connect to UIC-WiFi using Windows?

 (This has to be exactly UIC-WiFi because that is the name of the network.) Security type: WPA2-Enterprise Encryption type: AES Leave the Security Key blank. Select Start this connection

Microsoft Intune

portal, from device lock, data encryption, passcode reset – or a wipe of university data for stolen or lost devices. Intune also protects employee-owned devices and partitions work from personal data

Microsoft Azure

Azure services, and help protect encryption keys and other sensitive information in the cloud. Services include support for Azure Active Directory and multifactor authentication (MFA). Who Is

How can I protect PHI while using Zoom?

HIPAA Compliant Meetings: Additional encryption enabled for all participants to meet HIPAA requirements. Cloud and local recordings are disabled. Additional device and user

Microsoft Exchange

Service Names Outlook, Exchange Online Features 99.9% reliability built-in and managed by Microsoft 100-gigabyte mailboxes Microsoft data centers located within the US Encryption

I will be traveling internationally. Will I have access to university resources while abroad?

traveling to enforce restrictions on access to services outside its borders? Some countries may inspect electronic devices at border crossings, even demanding encryption be unlocked. If this were to

What is Azure?

private and public clouds. Identity and access management (IAM) -- These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information

Email and Calendaring

collaboration: federated calendar sharing with UIH, UIUC, UIS (including calendar publishing) Client support for mobile devices     Exchange Online Archiving  Message Encryption Data loss prevention

UIC-WiFi

eduroam. Other Service Names Wireless Network Features UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise implements the 802.11i security standard, which includes AES encryption and