Search 377 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

How do I use Microsoft Stream?

) Trim Video Options Find Trim Video Feature in Stream (Classic) Knowledge base article with other applications Applications Available to Trim Videos or Recordings Link to Microsoft

Appropriate Use of OneDrive

appropriate-use ... . OneDrive Appropriate Use Video OneDrive Terms of Use   OneDrive Appropriate Use Video     OneDrive Terms of Use This service is not intended for storage of files which might be

Purchasing Apple Hardware

Apple hardware to purchase through OIT Procurement. ... apple ... Apple hardware can be purchased through the OIT Procurement office.  Standard specifications for Apple models typically purchased can be found here: Service - Hardware Procurement Request

How do I create a rule in OWA?

This tutorial applies to the following operating system(s):   Windows Macintosh Overview: Email rules allow you to sort incoming email to separate folders based on information contained

Why was my Microsoft 365 application "Approval Required" request denied?

application ... Overview The University of Idaho automatically blocks all applications which request permissions to access Microsoft 365 services. This is done to enforce identity and security policies. An

Navigating Sophos Antivirus for Windows

This tutorial applies to the following operating system(s):  Windows Overview: Sophos Cloud endpoint antivirus provides protection to your device against malware and other online threats

Remote Access Lab Connection Guide

need to install the "Microsoft Remote Desktop" from the App Store.      Once the Microsoft Remote Desktop 10 application is installed. Click "Connect" on an available lab computer (see step

FAQ: University Transition to Microsoft Teams Voice

, like many other organizations across the country, is moving its phone system to Microsoft Teams. By enhancing capabilities within our current Teams application we can meet the needs of our employees

Whole Disk Encryption FAQ

smartphone as well? At this time, our encryption platform does not support mobile devices and the Security Office is not requiring smartphones to be encrypted. If you receive your university email on

Phishing

destination. On your mobile device, press and hold on the link to reveal its URL. Is the address different than what you expected? Is it garbled or incoherent? Does it claim to be from the university

What is the session limit for web applications?

Overview There are three types of session restrictions in place for web applications used at the university. Idle Timeout - used to detect user inactivity and require re-authentication. No

How do I open a ticket with Enterprise applications?

appadmins ...   Summary and Definition of Terms Use this guide to submit a TDX ticket (Incident or Service Request) with the Enterprise Applications Application Administration or Development and Integration

What is phishing?

over it to reveal its destination. On your mobile device, press and hold on the link to reveal its URL. Is the address different than what you expected? Is it garbled or incoherent? Does it claim to be

Guidelines for Temporary Employees and High Risk Data

emphasizes the importance of protecting university data, and following UI policies. (See General Counsel for an NDA appropriate for your area.) Include ethics training, or a signed code of ethics if

Why does a Microsoft 365 application display "Approval Required"?

application ... Overview The University of Idaho automatically blocks all applications which request permissions to access Microsoft 365. This is done to enforce identity and security policies. Users will see an