Search 114 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

What is a Secure Computing Environment?

ePHI (electronic personal health information) and other types of high-risk data require the need for the Secure Computing Environment (SCE). Overview:  The Secure Computing Environment (SCE

How do I request a NetID change?

Explains how a user can request a NetID change.   NetIDs will be changed only in certain circumstances, on a case by case basis. The NetID is the key to your digital identity at UIC. It is used

How is Shibboleth used at UIC?

Overview Shibboleth (an open-source implementation of SAML) is a framework that allows applications to authorize access via an organization's Identity Provider Service. Shibboleth can be used to

How do I set budgets in Azure and trigger an action when a threshold is met?

the lab.   After the action group is created, close the box to return to your budget. Configure your budget to use your action group when an individual threshold is met. Up to five different thresholds are supported.

How can I get started with Grammarly?

documents, check the box next to "I understand that these documents will be permanently deleted from my account."   Then select "Join the team"   Select "Get Started" to

How can I set up and schedule scans in Qualys?

on the box that says “New” Click the first option in the drop-down “Scan”. This will open a new window. This is where you will enter all the information to run a scan. To begin you should

What is Microsoft 365 and how can I use it?

, selecting View Account. The Manage installs link in the Install Status box will help you manage which devices have active installs of Office.

How do I create a VM in Azure?

.   6. Under Inbound port rules, choose Allow selected ports and select RDP. 7. Select Yes for Already have a Windows license, then check the Confirmation Box.     8. Leave the

How can I install Splunk universal forwarder on Linux?

This document outlines a set of instructions that were performed on a Red Hat Linux system. These instructions are applicable to any system that uses the RPM style package management system

How do I use Cisco Finesse as a call center supervisor?

Subsystems|RmCm|Resources.   Click the name of the appropriate agent.   Change an existing skill level by selecting it in the “Assigned Skills” box and then selecting a new “Competence

How do I use Apple School Manager and What's changing with my Apple devices?

Content check-box Choose the location that has purchased the app to distribute to computers (Optional) If you want to associate VPP codes with the app and have not already

How do I create a simple, secure, Web App in Azure?

web app's current tier is highlighted by a dark blue box NOTE: Custom SSL is not supported in the F1 or D1 tier. If you need to scale up, follow the steps in the next section.  Scale

How can I use the Jabber softphone on a Mac?

End Call Placing Calls From the Search or call box Type the phone number or   Type the URI or   Search for a contact.   Under the Recent Tab

How do I use Cisco Finesse as a call center agent?

conference as shown above. Wrap-Up Codes During a call, the Wrap-Up Reason selection box will be available. You can select a Wrap-Up Reason during a call or after a call. Select the

How can I use the Jabber softphone on Windows?

is active, the interaction window appears. While on an active call, the following options are available: Placing Calls From the Search or call box: 1. Use the numpad (from recent