Search 31 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
What information on backups is available for Administrators?
single encryption key for all backups. A user always belongs to one (and only one) organization.
Device
A single computer within your CrashPlan environment, identified by its GUID
How do I create a simple, secure, Web App in Azure?
of TLS encryption.
For each app, in settings, click on SSL settings and ensure that the minimum TLS Version is set to 1.2 under protocol.
Ensure that Register with Azure Active
How can I estimate the costs of using Azure?
Encryption. The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS.Low-priority VMs can be used in a set with other machines, but these take
How can I estimate a monthly cost for Azure?
automatic scaling or use Azure Disk Encryption. The machine sizes that support Basic tier also have a lower maximum spec than Standard tier sizes, and lower max disk IOPS. Low-priority VMs can be used
How do I create a VM in Azure?
encrypted.
Follow the documentation found here: https://docs.microsoft.com/en-us/azure/security/fundamentals/azure-disk-encryption-vms-vmss
Ensure that the latest OS Patches for
Travel Laptops for Researchers
Windows or Mac laptops available for loan.
Features
Clients may request either a Windows or Mac laptop. Both types of laptops include:
UIC standard encryption
UIC AnyConnect VPN client
How do I connect to UIC-WiFi using Windows?
(This has to be exactly UIC-WiFi because that is the name of the network.)
Security type: WPA2-Enterprise
Encryption type: AES
Leave the Security Key blank.
Select Start this connection
Microsoft Intune
portal, from device lock, data encryption, passcode reset – or a wipe of university data for stolen or lost devices.
Intune also protects employee-owned devices and partitions work from personal data
Microsoft Azure
Azure services, and help protect encryption keys and other sensitive information in the cloud. Services include support for Azure Active Directory and multifactor authentication (MFA).
Who Is
How can I protect PHI while using Zoom?
HIPAA Compliant Meetings:
Additional encryption enabled for all participants to meet HIPAA requirements.
Cloud and local recordings are disabled.
Additional device and user
Microsoft Exchange
Service Names
Outlook, Exchange Online
Features
99.9% reliability built-in and managed by Microsoft
100-gigabyte mailboxes
Microsoft data centers located within the US
Encryption
I will be traveling internationally. Will I have access to university resources while abroad?
traveling to enforce restrictions on access to services outside its borders?
Some countries may inspect electronic devices at border crossings, even demanding encryption be unlocked. If this were to
What is Azure?
private and public clouds.
Identity and access management (IAM) -- These offerings ensure only authorized users can access Azure services, and help protect encryption keys and other sensitive information
Email and Calendaring
collaboration: federated calendar sharing with UIH, UIUC, UIS (including calendar publishing)
Client support for mobile devices
Exchange Online Archiving
Message Encryption
Data loss prevention
UIC-WiFi
eduroam.
Other Service Names
Wireless Network
Features
UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise implements the 802.11i security standard, which includes AES encryption and