Search 114 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
What is a Secure Computing Environment?
ePHI (electronic personal health information) and other types of high-risk data require the need for the Secure Computing Environment (SCE).
Overview:
The Secure Computing Environment (SCE
How do I request a NetID change?
Explains how a user can request a NetID change.
NetIDs will be changed only in certain circumstances, on a case by case basis. The NetID is the key to your digital identity at UIC. It is used
How is Shibboleth used at UIC?
Overview
Shibboleth (an open-source implementation of SAML) is a framework that allows applications to authorize access via an organization's Identity Provider Service. Shibboleth can be used to
How do I set budgets in Azure and trigger an action when a threshold is met?
the lab.
After the action group is created, close the box to return to your budget.
Configure your budget to use your action group when an individual threshold is met. Up to five different thresholds are supported.
How can I get started with Grammarly?
documents, check the box next to "I understand that these documents will be permanently deleted from my account."
Then select "Join the team"
Select "Get Started" to
How can I set up and schedule scans in Qualys?
on the box that says “New”
Click the first option in the drop-down “Scan”. This will open a new window.
This is where you will enter all the information to run a scan. To begin you should
What is Microsoft 365 and how can I use it?
, selecting View Account. The Manage installs link in the Install Status box will help you manage which devices have active installs of Office.
How do I create a VM in Azure?
.
6. Under Inbound port rules, choose Allow selected ports and select RDP.
7. Select Yes for Already have a Windows license, then check the Confirmation Box.
8. Leave the
How can I install Splunk universal forwarder on Linux?
This document outlines a set of instructions that were performed on a Red Hat Linux system. These instructions are applicable to any system that uses the RPM style package management system
How do I use Cisco Finesse as a call center supervisor?
Subsystems|RmCm|Resources.
Click the name of the appropriate agent.
Change an existing skill level by selecting it in the “Assigned Skills” box and then selecting a new “Competence
How do I use Apple School Manager and What's changing with my Apple devices?
Content check-box
Choose the location that has purchased the app to distribute to computers
(Optional) If you want to associate VPP codes with the app and have not already
How do I create a simple, secure, Web App in Azure?
web app's current tier is highlighted by a dark blue box
NOTE: Custom SSL is not supported in the F1 or D1 tier. If you need to scale up, follow the steps in the next section.
Scale
How can I use the Jabber softphone on a Mac?
End Call
Placing Calls
From the Search or call box
Type the phone number or
Type the URI or
Search for a contact.
Under the Recent Tab
How do I use Cisco Finesse as a call center agent?
conference as shown above.
Wrap-Up Codes
During a call, the Wrap-Up Reason selection box will be available. You can select a Wrap-Up Reason during a call or after a call.
Select the
How can I use the Jabber softphone on Windows?
is active, the interaction window appears.
While on an active call, the following options are available:
Placing Calls
From the Search or call box:
1. Use the numpad (from recent