Search18 Results

This guide instructs users on activating notifications on a single secret.
This article explains the basics of creating, editing, and sharing secrets within Secret Server.
This guide provides instructions for installing Cortex XDR antivirus on Windows, macOS, and Linux operating systems.
These instructions provide a guide on setting up a Yubikey USB authenticator for the first time.
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a macOS computer.
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a Windows computer.
Disk encryption is a security measure that involves encoding data stored on a hard drive, flash drive, or other storage device. This article provides general information for encryption methods available for Windows, macOS, and Linux.
Folders in Secret Server allow you to organize your secrets into logical groups and control access through permissions assigned to the folders. This article gives an overview of how shared folders are created and used.
The Secret Template Compendium gives a comprehensive view of all secret templates available for use within Delinea Secret Server.
This article outlines the NU IT Risk Classifications of Low, Medium, and High. These configurations align with National Institute of Standards and Technology (NIST) frameworks (800-53, 800-171), and Center for Internet Security (CIS) Levels 1 & 2.
This article provides a general walkthrough for performing some common activities in BeyondTrust Remote Support.
This article gives an overview of how a BeyondTrust Remote Support session works.
This article provides answers to the most commonly received questions about BeyondTrust and the Remote Support service offered by the university.
This article introduces the GlobalProtect Host Information Profile (HIP) and how the results of a HIP check can influence a device's access level.
This article discusses default security controls on University-managed macOS devices, focusing on screen lock settings. Users may notice their devices locking after around 2 minutes of inactivity, but they can adjust settings to extend this time. By following provided steps in System Preferences, users can increase the inactivity timeout beyond 15 minutes, ensuring the screen locks only after 15 minutes of idle time.