Search18 Results
- Knowledge Base
- IT Security
- Application Security
This guide instructs users on activating notifications on a single secret.
- Knowledge Base
- IT Security
- Application Security
This article explains the basics of creating, editing, and sharing secrets within Secret Server.
- Knowledge Base
- IT Security
- Platform Security
This guide provides instructions for installing Cortex XDR antivirus on Windows, macOS, and Linux operating systems.
- Knowledge Base
- IT Security
These instructions provide a guide on setting up a Yubikey USB authenticator for the first time.
- Knowledge Base
- IT Security
- Network Security
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a macOS computer.
- Knowledge Base
- IT Security
- Network Security
OnGuard is an application designed for personal (BYOD) computers to perform Baseline Security posture checks, allowing authentication to Medium Risk (Level 3) network segments while connected to Eduroam or a wired network on campus. This guide will detail the instructions for installing OnGuard to a Windows computer.
- Knowledge Base
- IT Security
- Platform Security
Disk encryption is a security measure that involves encoding data stored on a hard drive, flash drive, or other storage device. This article provides general information for encryption methods available for Windows, macOS, and Linux.
- Knowledge Base
- IT Security
- Application Security
Folders in Secret Server allow you to organize your secrets into logical groups and control access through permissions assigned to the folders. This article gives an overview of how shared folders are created and used.
- Knowledge Base
- IT Security
- Application Security
The Secret Template Compendium gives a comprehensive view of all secret templates available for use within Delinea Secret Server.
- Knowledge Base
- IT Security
This article outlines the NU IT Risk Classifications of Low, Medium, and High. These configurations align with National Institute of Standards and Technology (NIST) frameworks (800-53, 800-171), and Center for Internet Security (CIS) Levels 1 & 2.
- Knowledge Base
- IT Security
- Network Security
This article provides a general walkthrough for performing some common activities in BeyondTrust Remote Support.
- Knowledge Base
- IT Security
- Network Security
This article gives an overview of how a BeyondTrust Remote Support session works.
- Knowledge Base
- IT Security
- Network Security
This article provides answers to the most commonly received questions about BeyondTrust and the Remote Support service offered by the university.
- Knowledge Base
- IT Security
- Network Security
This article introduces the GlobalProtect Host Information Profile (HIP) and how the results of a HIP check can influence a device's access level.
- Knowledge Base
- IT Security
- Platform Security
This article discusses default security controls on University-managed macOS devices, focusing on screen lock settings. Users may notice their devices locking after around 2 minutes of inactivity, but they can adjust settings to extend this time. By following provided steps in System Preferences, users can increase the inactivity timeout beyond 15 minutes, ensuring the screen locks only after 15 minutes of idle time.