Challenge
Backups are essential. Your hard drive could fail, you could lose your device, it could be stolen, or you could get a malware infection that takes your files hostage.
Challenge
Older or unpatched software increases exposure to vulnerabilities in the operating system, application software, and apps that can allow attackers to control your system or steal your private data.
Email scams (known as phishing) are a common method to trick you into visiting a fraudulent website, opening an infected document, or logging in to "validate your email account."
Downloading or sharing software, entertainment, or images may violate United States copyright law. Many torrent applications default to continue sharing your downloads with other users.
When inviting an internal or external user as a collaborator within a folder, you will have the ability to set the level of access that user has to your content.
Sometimes when you're sharing a file with someone you know they will need it for only a certain amount of time, or perhaps legally they or you can only have access to it for a certain amount of days.
How do Box Notes work in folders that have been synced?
Box Notes are synced to your computer like other documents, and will appear in your Box Sync folder. Box Notes will open in your browser.
There are two ways to change or transfer folder ownership to another collaborator. Through the Collaborators menu in the right pane of a folder or from the Collaborators page of a folder.
The Updates page provides logs of all the activity that is happening in your Box account. The updates page shows logs for actions taking place on files and folders such as:
Box Secure Storage provides many security features designed to protect your sensitive data files. However, there are actions you can take to make sure your data stay protected while in Box:
Events like leaving the university or changing roles can trigger a need to change collaboration levels or completely remove someone from a folder within Box.
Sometimes a folder should only be accessible to other users within the University of Minnesota system. This article explains how to do this to a folder.
While you can share with both internal and external collaborators through your Box account there are special considerations to take when sharing with alumni.
Sometimes when you try to access Box, you may be prompted to login to a Box screen rather than the standard University of Minnesota login page. You should not use this Box screen to login.
Each user has an unlimited amount of storage space available. However, individual files must be less than 15 Gb each. If you need to make files smaller use a compression tool such as 7-zip.
Box has several visual indicators that can help you easily understand things about the folder, such as collaboration level and ownership. The below is an overview of these icons and indicators.
There are various ways to integrate and update data within Box. This article covers the basics of the three ways you may want to modify data with Box and when or why you may want to use each.
If you set your Duo authentication through your mobile device (such as a smartphone or tablet), you are encouraged to add a backup telephone number to your Duo authentication options in case you forget your mobile dev
We strongly recommend enrolling at least 2 devices to ensure that you are able to access Duo at all times - even if you have lost your smartphone or are working somewhere with no cell service.
It happens to everyone from time to time: tokens break, tablets die, phones fall into the wrong hands. By following these steps right away, you can still keep yourself and the U secure.
By November 2019, Duo will be required at sign-in for all UMN faculty, staff, student, sponsored, and POI accounts. For instructions on setting up Duo, check the Duo
You can authenticate with Duo using two types of tokens: Hardware tokens (first and second images below) and security keys (also called 'U2F tokens', third image below).
Lost Hardware Token
Duo works with two types of tokens: U2F tokens (also referred to as 'security keys') and hardware tokens. This page describes what to do if your hardware token is lost or broken.
Duo Security (two-factor authentication) is stronger than a password alone, because it uses two factors to confirm that you are who you say you are. The first factor is something you know (your Inter
Managers or supervisors with employees who have a business need to access databases and enterprise-level applications that use Duo must request access to those services (via an Access Request Form, or ARF). When a fa
When any University employee (staff, faculty or student employee) or contractor ends their employment with the University, the supervisor needs to revoke access to any Enterprise systems
This article applies to international employees as well as traveling students, faculty, and staff. You can use Duo authentication when traveling internationally*, even without WiFi or cellular service.
Duo's "Remember Me" feature saves you time while keeping your information safe. It is like the "remember my computer" or "keep me logged in" options you may have seen on other websites.
Students at the University of Minnesota can register personal devices for WiFi access, even if they don't support WPA2 authentication (username and password).
Miniport Wifi Adapters are known to interfere with wifi connectivity for Windows users. If you can no longer connect to the network or your connection is intermittent, check for these adapters and disable them.
Your android device will automatically find all wireless networks in range. On campus, you will see the following UofM SSIDs (network names): eduroam and UofM-Guest.
Aruba 303H access points are deployed in residence halls across the University of Minnesota Twin Cities campus. These will provide WiFi, and Ethernet access within a particular room.
For Instructors
Duo Security helps keep student data—like grades, assignments, and contact information—more secure. It also helps students protect their financial aid from theft.
Duo’s "Remember Me" feature saves you time while keeping your information safe. It is like the "remember my computer" or "keep me logged in" options you may have seen on other websites.
Departments may also sponsor an internet account for a University-affiliated individual, as long as that individual provides a service or function that directly impacts students, faculty, or staff.
A guide to help you correctly identify the security level required for your research data developed by the College of Liberal Arts Technologies and Innovation Services.
Once you have the Apache Shibboleth Module installed and configured, you can add Apache Auth directives to any appropriate content-control block ( <Directory>,<File>, <Location>) in your virtual host
Users agree to comply with the laws or regulations of the United States Department of Commerce, the United States Department of Treasury Foreign Assets Control, or any other applicable United States foreign agency or
Beginning in November 2018, when the University begins to require Duo Security at the Sign-in page, hardware tokens will be available at no cost to UMN students, faculty, or staff who do not own mobile devices.
When guests are granted access to information technology resources they must abide by all relevant University of Minnesota policies, as well as all current federal, state, and local laws.
This policy provides information about the Information Security Risk Management (ISRM) program, including identifying and tracking information security risks, developing plans for remediation, and providing guidance o
U faculty and staff can use this password manager after checking with their technology support staff. For those in a health care component area, store the password database on a University managed device.
The InCommon certificate service allows for delegated administration, so designated people can submit and approve certificates for their department without intervention from OIT.
Through the InCommon Federation, University of Minnesota researchers can access national research and scholarship applications and web services, such as virtual organizations and
If you suspect a potential security issue involving any private information—whether the information is on a computer, on paper, on the web, etc.—immediately report the details to University Information Security
The UReport provides a way for University community members to report violations of rules, regulations and policies. The report can be made anonymously.
All Service Gateway users should follow the best practices listed below.During MigrationDuring migration, Service Gateway users should do the following.
All Service Gateway users should follow the best practices listed below.During MigrationDuring migration, Service Gateway users should do the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
OIT customers can use Service Gateway, a web-based application, to manage their own voice and data network connections. Common uses include the following.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up.Primary and secondary users have similar responsibilities.
Each management ID (MID) must have a minimum of one secondary user. Multiple users are recommended to ensure back-up.Primary and secondary users have similar responsibilities.
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
During migration to Service Gateway a management ID (MID) is assigned to the unit. An MID is simply a unique identifier in Service Gateway, used to associate all voice and data network services to a department/c
Understanding LogoutCurrently, Shibboleth doesn't support single logout (SLO), so the only way for a user to completely logout of all SP applications and the IDP server
Cohesive ServiceThe Office of Information Technology (OIT) is standardizing on a single wireless platform in order to offer seamless wireless service across the Twin Cities and Rochester campuses, as well as
Get a list of the current ports and other things that are blocked at the University's border. You must sign in as a University employee to see these network filters.
University units and community members must ensure that their electronic devices and other resources which store, transmit, or process University information meet the information security processes and standards conta
Purpose
The following questions will assist units or individuals to review IT contracts or licenses for both cloud-based/off-site or on-premise/locally hosted IT services.
Google APIs use the OAuth 2.0 protocol for authentication and authorization. Google supports common OAuth 2.0 scenarios such as those for web server, installed, and client-side applications.
The University uses a two-factor authentication system for users who need access to its enterprise-level applications, to ensure another level of security when working with sensitive data.
If you encounter a location with poor WiFi connectivity on campus, pin the location on the UMN WiFi Feedback site. Network engineers are alerted, and where possible, take action to improve connectivity.
Did you know that many WiFi connectivity problems are the result of settings or other issues on individual users’ computers, phones and other mobile devices? The good news is many of these can be easily fixed.