The University community collaborates with University Information Security to review and develop University of Minnesota information security policies and standards to protect University data and information technolog
Challenge
Backups are essential. Your hard drive could fail, you could lose your device, it could be stolen, or you could get a malware infection that takes your files hostage.
Challenge
Older or unpatched software increases exposure to vulnerabilities in the operating system, application software, and apps that can allow attackers to control your system or steal your private data.
When inviting an internal or external user as a collaborator within a folder, you will have the ability to set the level of access that user has to your content.
Sometimes when you're sharing a file with someone you know they will need it for only a certain amount of time, or perhaps legally they or you can only have access to it for a certain amount of days.
How do Box Notes work in folders that have been synced?
Box Notes are synced to your computer like other documents, and will appear in your Box Sync folder. Box Notes will open in your browser.
There are two ways to change or transfer folder ownership to another collaborator. Through the Collaborators menu in the right pane of a folder or from the Collaborators page of a folder.
The Updates page provides logs of all the activity that is happening in your Box account. The updates page shows logs for actions taking place on files and folders such as:
Box Secure Storage provides many security features designed to protect your sensitive data files. However, there are actions you can take to make sure your data stay protected while in Box:
Events like leaving the university or changing roles can trigger a need to change collaboration levels or completely remove someone from a folder within Box.
Sometimes a folder should only be accessible to other users within the University of Minnesota system. This article explains how to do this to a folder.
While you can share with both internal and external collaborators through your Box account there are special considerations to take when sharing with alumni.
Each user has an unlimited amount of storage space available. However, individual files must be less than 15 Gb each. If you need to make files smaller use a compression tool such as 7-zip.
Box has several visual indicators that can help you easily understand things about the folder, such as collaboration level and ownership. The below is an overview of these icons and indicators.
There are various ways to integrate and update data within Box. This article covers the basics of the three ways you may want to modify data with Box and when or why you may want to use each.
Canvas integrates with Google Drive both at the course level and at the Group level making it easy for you to collaborate with others in both environments. There are two different integrations at each level.
Canvas integrates with Google Drive both at the course level and at the Group level making it easy for you to collaborate with others in both environments. There are two different integrations at each level.
Description
This article will go through the basics of using the VPN before logging into a Windows device that has been shipped directly to a persons home and they have not logged into that device before.
These instructions are for Shared Drive Managers and Content Managers. It is possible to add members who do not have a University of Minnesota email account to a Shared Drive.
Google Shared Drives are shared spaces where teams can easily store, search, and access their files anywhere, from any device. Please note that only faculty and staff have the ability to create shared drives.
The Command Line Interface (CLI) is a mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks, and is a valid way to use AnyConnect.
The Command Line Interface (CLI) is a mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks, and is a valid way to use AnyConnect.
Follow these instructions to connect to the Cisco AnyConnect VPN Secure Mobility Client on your Mac, Windows, or Linux device. For assistance in connecting, including Login Failed messages, contact
Miniport WiFi Adapters are known to interfere with WiFi connectivity for Windows users. If you can no longer connect to the network or your connection is intermittent, check for these adapters and disable them.
Your android device will automatically find all wireless networks in range. On campus, you will see the following UofM SSIDs (network names): eduroam and UofM-Guest.
Aruba 303H access points are deployed in residence halls across the University of Minnesota Twin Cities campus. These will provide WiFi, and Ethernet access within a particular room.
At the University of Minnesota, personal Internet of Things (IoT) devices such as Xbox, PlayStation, Roku, Apple TV, etc can be registered for Wi-Fi service.
A guide to help you correctly identify the security level required for your research data developed by the College of Liberal Arts Technologies and Innovation Services.
Article from Google about how to access Google Drive and share and edit Google documents, slides, sheets, forms and drawings from within a Google Video Call (Hangout).
Google Workspace Learning Center guide on sharing files or folders with specific people, adding comments and replies, making edit suggestions, and working with suggested edits of Google Documents in Google Drive
A resource discussing several strategies, such as folder structure and tagging, that can help improve your Google Drive when used with departments or teams.
The University's Information Security Awareness & Training helps to inform and empower yourself about data and privacy good practices when you use a computer or mobile device.
This University policy provides the information security controls that are required to protect the data and University IT resources, and includes information on how to use the standards and request an exception.
This policy provides information about the Information Security Risk Management (ISRM) program, including identifying and tracking information security risks, developing plans for remediation, and providing guidance o
If your University-owned computer or other device was lost or stolen, the article provides steps to take in order to secure your and the University's data on the device.
If your University-owned computer or other device was lost or stolen, the article provides steps to take in order to secure your and the University's data on the device.
The intent of the Gap Analysis process is for units which support IT resources, or individuals who manage their own IT resources, to proactively identify and manage information security risks.
If you suspect a potential security issue involving any private information—whether the information is on a computer, on paper, on the web, etc.—immediately report the details to University Information Security
The UReport provides a way for University community members to report violations of rules, regulations and policies. The report can be made anonymously.
To improve the security, stability, and usability of University-owned devices, UMN limits the use of administrative rights (permissions granted to users that allow users to create, delete, and modify items and setting
Get a list of the current ports and other things that are blocked at the University's border. You must sign in as a University employee to see these network filters.
University units and community members must ensure their electronic devices and other resources which store, transmit, or process University information meet the information security processes and standards.
Purpose
The following questions will assist units or individuals to review IT contracts or licenses for both cloud-based/off-site or on-premise/locally hosted IT services.
If you encounter a location with poor WiFi connectivity on campus, pin the location on the UMN WiFi Feedback site. Network engineers are alerted, and where possible, take action to improve connectivity.