Search27 Results
- Knowledge Base
- User Accounts and Access
- Knowledge Base
- IT Security
- Platform Security
Folders in Secret Server allow you to organize your secrets into logical groups and control access through permissions assigned to the folders. This article gives an overview of how shared folders are created and used.
- Knowledge Base
- IT Security
- Platform Security
This article explains the basics of creating, editing, and sharing secrets within Secret Server.
- Knowledge Base
- IT Security
- Platform Security
This article details the instructions for logging into Delinea Platform.
- Knowledge Base
- IT Security
This article provides a brief overview of how to enable the system firewall on macOS, Windows, and Linux.
- Knowledge Base
- IT Security
This article gives instructions on how to update systems and applications for macOS, Windows, and Linux.
- Knowledge Base
- IT Security
This article outlines the NU IT Risk Classifications of Low, Medium, and High. These configurations align with National Institute of Standards and Technology (NIST) frameworks (800-53, 800-171), and Center for Internet Security (CIS) Levels 1 & 2.
- Knowledge Base
- Wi-Fi and Network
This will walk you through the process of connecting your windows machine to the VPN
- Knowledge Base
- User Accounts and Access
Instructions for setting up the Duo Mobile app
- Knowledge Base
- IT Security
- Platform Security
This guide provides instructions for installing Cortex XDR antivirus on Windows, macOS, and Linux operating systems.
- Knowledge Base
- IT Security
- Platform Security
Operating system patch and security updates are software releases issued by OS developers to fix vulnerabilities, enhance performance, and add features. Operating System patches are frequently released to ensure systems remain resilient and protected against evolving cyber threats
- Knowledge Base
- IT Security
- Platform Security
This guide instructs users on activating notifications on a single secret.
- Knowledge Base
- IT Security
- Network Security
This article provides answers to the most commonly received questions about BeyondTrust and the Remote Support service offered by the university.
- Knowledge Base
- IT Security
- Network Security
This article gives an overview of how a BeyondTrust Remote Support session works.
- Knowledge Base
- IT Security
- Network Security
This article provides a general walkthrough for performing some common activities in BeyondTrust Remote Support.