Search 377 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
How do I use Microsoft Stream?
)
Trim Video Options
Find Trim Video Feature in Stream (Classic)
Knowledge base article with other applications Applications Available to Trim Videos or Recordings
Link to Microsoft
Appropriate Use of OneDrive
appropriate-use ... .
OneDrive Appropriate Use Video
OneDrive Terms of Use
OneDrive Appropriate Use Video
OneDrive Terms of Use
This service is not intended for storage of files which might be
Purchasing Apple Hardware
Apple hardware to purchase through OIT Procurement. ... apple ... Apple hardware can be purchased through the OIT Procurement office.
Standard specifications for Apple models typically purchased can be found here: Service - Hardware Procurement Request
How do I create a rule in OWA?
This tutorial applies to the following operating system(s):
Windows
Macintosh
Overview:
Email rules allow you to sort incoming email to separate folders based on information contained
Why was my Microsoft 365 application "Approval Required" request denied?
application ... Overview
The University of Idaho automatically blocks all applications which request permissions to access Microsoft 365 services. This is done to enforce identity and security policies. An
Navigating Sophos Antivirus for Windows
This tutorial applies to the following operating system(s):
Windows
Overview:
Sophos Cloud endpoint antivirus provides protection to your device against malware and other online threats
Remote Access Lab Connection Guide
need to install the "Microsoft Remote Desktop" from the App Store.
Once the Microsoft Remote Desktop 10 application is installed. Click "Connect" on an available lab computer (see step
FAQ: University Transition to Microsoft Teams Voice
, like many other organizations across the country, is moving its phone system to Microsoft Teams. By enhancing capabilities within our current Teams application we can meet the needs of our employees
Whole Disk Encryption FAQ
smartphone as well?
At this time, our encryption platform does not support mobile devices and the Security Office is not requiring smartphones to be encrypted. If you receive your university email on
Phishing
destination. On your mobile device, press and hold on the link to reveal its URL. Is the address different than what you expected? Is it garbled or incoherent? Does it claim to be from the university
What is the session limit for web applications?
Overview
There are three types of session restrictions in place for web applications used at the university.
Idle Timeout - used to detect user inactivity and require re-authentication. No
How do I open a ticket with Enterprise applications?
appadmins ...
Summary and Definition of Terms
Use this guide to submit a TDX ticket (Incident or Service Request) with the Enterprise Applications Application Administration or Development and Integration
What is phishing?
over it to reveal its destination. On your mobile device, press and hold on the link to reveal its URL. Is the address different than what you expected? Is it garbled or incoherent? Does it claim to be
Guidelines for Temporary Employees and High Risk Data
emphasizes the importance of protecting university data, and following UI policies. (See General Counsel for an NDA appropriate for your area.)
Include ethics training, or a signed code of ethics if
Why does a Microsoft 365 application display "Approval Required"?
application ... Overview
The University of Idaho automatically blocks all applications which request permissions to access Microsoft 365. This is done to enforce identity and security policies. Users will see an