Challenge
Backups are essential. Your hard drive could fail, you could lose your device, it could be stolen, or you could get a malware infection that takes your files hostage.
Challenge
Older or unpatched software increases exposure to vulnerabilities in the operating system, application software, and apps that can allow attackers to control your system or steal your private data.
Overview of Storage Portfolio Restructuring InitiativeThe Office of Information Technology Storage and Hosting Services team is conducting phase 2 of the
Adobe Cloud Storage does not meet the University's security policy requirements and should not be used to store University data. This article contains instructions on how to migrate your data to an alternati
When inviting an internal or external user as a collaborator within a folder, you will have the ability to set the level of access that user has to your content.
Sometimes when you're sharing a file with someone you know they will need it for only a certain amount of time, or perhaps legally they or you can only have access to it for a certain amount of days.
How do Box Notes work in folders that have been synced?
Box Notes are synced to your computer like other documents, and will appear in your Box Sync folder. (Note: Box Sync has been replaced by Box Drive.
There are two ways to change or transfer folder ownership to another collaborator. Through the Collaborators menu in the right pane of a folder or from the Collaborators page of a folder.
The Updates page provides logs of all the activity that is happening in your Box account. The updates page shows logs for actions taking place on files and folders such as:
Box Secure Storage provides many security features designed to protect your sensitive data files. However, there are actions you can take to make sure your data stay protected while in Box:
Events like leaving the university or changing roles can trigger a need to change collaboration levels or completely remove someone from a folder within Box.
Sometimes a folder should only be accessible to other users within the University of Minnesota system. This article explains how to do this to a folder.
While you can share with both internal and external collaborators through your Box account there are special considerations to take when sharing with alumni.
Each user has an unlimited amount of storage space available. However, individual files must be less than 15 Gb each. If you need to make files smaller use a compression tool such as 7-zip.
Box has several visual indicators that can help you easily understand things about the folder, such as collaboration level and ownership. The below is an overview of these icons and indicators.
There are various ways to integrate and update data within Box. This article covers the basics of the three ways you may want to modify data with Box and when or why you may want to use each.
The University is transitioning from Google Docs Cloud Assignments to Google Assignments (LTI 1.3) and from Google Drive 1.1 to Google Drive (LTI 1.3) to maintain information security.
Description
This article will go through the basics of using the VPN before logging into a Windows device that has been shipped directly to a persons home and they have not logged into that device before.
For people leaving the University or changing departments, transferring team files to a shared drive may require transferring ownership of your work to someone else.
These instructions are for Shared Drive Managers and Content Managers. It is possible to add members who do not have a University of Minnesota email account to a Shared Drive.
Google shared drives are shared spaces where teams can easily store, search, and access their files anywhere, from any device. Faculty and staff have the ability to create shared drives.
If you are a user of a Windows computer supported by Health Sciences Technology (HST), you can connect to it remotely from another HST-supported computer, or from your personally owned computer.
You can install Cisco Secure Client on your University-owned or personal computer and connect to the Virtual Private Network (VPN) to remotely access University services or devices.
You can add a widget to a dashboard by selecting the Add Widget button (it looks like a + sign inside a circle), which will open the Add or Customize Dashboard Widget Templates window.
This article describes the different types of user roles and how those roles will have their permissions scoped for users of the University’s Qualys implementation.
Cisco Secure Client is the primary Virtual Private Network (VPN) tool supported by the University of Minnesota. All VPNs require Duo Security Multi-Factor Authentication (Duo).
The Command Line Interface (CLI) is a mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks, and is a valid way to use Secure Client.
The Command Line Interface (CLI) is a mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks, and is a valid way to use Secure Client.
This guide is intended for those who utilize Chromebooks and other ChromeOS devices to use Cisco AnyConnect to configure the Virtual Private Networking (VPN) service on your device. For assistance in connecting,
This article provides step-by-step instructions to connect to the Virtual Private Network (VPN) client Cisco Secure Client using an Android or iOS device. For assistance in connecting, including Login Failed mess
Departmental Virtual Private Network (VPN) groups are virtualized networks that may or may not be serviced by the same platform as the common good VPN groups.
This article provides troubleshooting instructions to re-enable WiFi connection to those who have been temporarily blocked from University WiFi on Lenovo and iOS devices.
Table of Contents:
Miniport WiFi Adapters are known to interfere with WiFi connectivity for Windows users. If you can no longer connect to the network or your connection is intermittent, check for these adapters and disable them.
Aruba 303H access points are deployed in residence halls across the University of Minnesota Twin Cities campus. These will provide WiFi, and Ethernet access within a particular room.
To import a list of new departmental or unit-owned Internet of Things (IoT) devices, use the bulk import facility. This requires using a spreadsheet template with some default values.
At the University of Minnesota, personal and departmental Wi-Fi devices can be connected to the Internet of Things (IoT) service. Follow these steps to connect your device for the Encrypted IoT Service.
At the University of Minnesota, personal and departmental Internet of Things (IoT) devices can be registered for the Wi-Fi service. The current IoT service option is the Encrypted Service.
These are some of the known issues and their workarounds for connecting departmental and personal Internet of Things (IoT) devices for University of Minnesota IoT Wi-Fi service.
At the University of Minnesota, personal Internet of Things (IoT) devices such as Xbox, PlayStation, Roku, Apple TV, etc can be registered for Wi-Fi service.
University of Minnesota departments and units can register to connect departmentally-owned Internet of Things (IoT) devices such as door locks, cameras, sensors, and Apple TVs to the Wi-Fi service.
If you want to set the same password for a group of departmental or unit-owned Internet of Things (IoT) devices, you need to export a spreadsheet, edit the passwords and then import your new spreadsheet back into the
Registering personal and departmental Wi-Fi devices allows users affiliated with the UMN to connect devices such as Xbox, Roku, Apple TV, Google Chromecast, door locks, freezer monitors, and more to the Universit
The University community collaborates with University Information Security to review and develop University of Minnesota information security policies and standards to protect University data and information tech
Overview
In February 2021, Google announced significant changes to its storage policy that ends unlimited storage for the academic community and rebranded
A guide to help you correctly identify the security level required for your research data developed by the College of Liberal Arts Technologies and Innovation Services.
To use Office of Information Technology (OIT) Storage and Hosting Services, all customers must onboard through the Customer Experience Standardization for Infrastructure (CESI) process.
This University policy provides information on how to report a suspected loss of private data, and includes information on the University process for notifying individuals of an information security breach.
Article from Google about how to access Google Drive and share and edit Google documents, slides, sheets, forms and drawings from within a Google Video Call (Hangout).
Google Workspace Learning Center guide on sharing files or folders with specific people, adding comments and replies, making edit suggestions, and working with suggested edits of Google Documents in Google Drive
A resource discussing several strategies, such as folder structure and tagging, that can help improve your Google Drive when used with departments or teams.
Google Drive offers two ways to create, share, and store files: Google shared drive and Google My Drive. Google shared drive should be used for files that should remain at the University after a person leaves.
When guests are granted access to information technology resources they must abide by all relevant University of Minnesota policies, as well as all current federal, state, and local laws.
The University's Information Security Awareness & Training helps to inform and empower yourself about data and privacy good practices when you use a computer or mobile device.
This University policy provides the information security controls that are required to protect the data and University IT resources, and includes information on how to use the standards and request an exception.
This policy provides information about the Information Security Risk Management (ISRM) program, including identifying and tracking information security risks, developing plans for remediation, and providing guidance o
This is a command line tutorial primarily conducted in in the OS X command line. Because of OSX’s unix heritage, much of the info here is also useful in other unix inspired systems, like the Linux com
If you suspect a potential security issue involving any private information—whether the information is on a computer, on paper, on the web, etc.—immediately report the details to University Information Secu
The UReport provides a way for University community members to report violations of rules, regulations and policies. The report can be made anonymously.
Devices considered to be part of the Internet of Things (IoT) include printers/copiers, cameras, thermostats, refrigerators, alarm systems, medical devices, streaming systems, smart speakers, smart TVs, workout equipm
In addition to creating new storage services, the Storage Portfolio Restructuring Initiative (SPRI) developed new standards for storage shares and group management.
University units and community members must ensure their electronic devices and other resources which store, transmit, or process University information meet the information security processes and standards.
PurposeThe following questions will assist units or individuals to review IT contracts or licenses for both cloud-based/off-site or on-premise/locally hosted IT services.
If you encounter a location with poor WiFi connectivity on campus, pin the location on the UMN WiFi Feedback site. Network engineers are alerted, and where possible, take action to improve connectivit
The Google Drive self-help guide provides how-to instructions for common tasks such as organizing and finding files and folders, sharing and working together on documents, and downloading and printing files.
University of Minnesota departmental and unit-owned Internet of Things (IoT) devices such as door locks, sensors, cameras, Apple TV, and more can be registered for Wi-Fi access even if they don't support standard auth
Students, staff, and faculty at the University of Minnesota can register personal gaming or streaming devices such as Xbox, Roku, Apple TV, and more for WiFi access even if they don't support WPA2 authentication
Did you know that many WiFi connectivity problems are the result of settings or other issues on individual users’ computers, phones and other mobile devices? The good news is many of these can be easily fixed.