Search20 Results
- Knowledge Base
- User Accounts and Access
Instructions for setting up the Duo Mobile app
- Knowledge Base
- Wi-Fi and Network
This will walk you through the process of connecting your windows machine to the VPN
- Knowledge Base
- IT Security
- Platform Security
This article explains the basics of creating, editing, and sharing secrets within Secret Server.
- Knowledge Base
- IT Security
- Platform Security
This article details the instructions for logging into Delinea Platform.
- Knowledge Base
- IT Security
- Platform Security
Folders in Secret Server allow you to organize your secrets into logical groups and control access through permissions assigned to the folders. This article gives an overview of how shared folders are created and used.
- Knowledge Base
- IT Security
- Platform Security
This guide instructs users on activating notifications on a single secret.
- Knowledge Base
- IT Security
- Platform Security
This guide provides instructions for installing Cortex XDR antivirus on Windows, macOS, and Linux operating systems.
- Knowledge Base
- IT Security
These instructions provide a guide on setting up a Yubikey USB authenticator for the first time.
- Knowledge Base
- IT Security
- Network Security
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a macOS computer.
- Knowledge Base
- IT Security
- Network Security
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a Windows computer.
- Knowledge Base
- IT Security
- Platform Security
Disk encryption is a security measure that involves encoding data stored on a hard drive, flash drive, or other storage device. This article provides general information for encryption methods available for Windows, macOS, and Linux.
- Knowledge Base
- IT Security
This article outlines the NU IT Risk Classifications of Low, Medium, and High. These configurations align with National Institute of Standards and Technology (NIST) frameworks (800-53, 800-171), and Center for Internet Security (CIS) Levels 1 & 2.
- Knowledge Base
- IT Security
- Network Security
This article provides a general walkthrough for performing some common activities in BeyondTrust Remote Support.
- Knowledge Base
- IT Security
- Network Security
This article gives an overview of how a BeyondTrust Remote Support session works.
- Knowledge Base
- IT Security
- Network Security
This article provides answers to the most commonly received questions about BeyondTrust and the Remote Support service offered by the university.