How To

545 Results

How-To

Installing Add-Ins for Outlook

To enhance your work within Outlook, there are numerous add-ins that can be installed to help you get things done right from your inbox. The following are a list of popular add-ins approved for use at UCSF:

  • Technical Partner
  • Email & Collaboration
How-To

Use a Recovery Key for FileVault instead of iCloud login

Try using Jamf Pro first Mac computers used for UCSF business or study can enroll into Jamf Pro to manage encryption and facilitate compliance with the UCSF Minimum Security Standards (http://tiny.ucsf.edu/mss/) . Jamf Pro is the recommended solution for encryption management on Macs used for UCSF work or study, and is provided at no charge to the UCSF community. 

  • Faculty
  • Staff
  • Student
  • Technical Partner
  • Security
How-To

What to Expect after Installing BigFix

What to expect after installing BigFix Desktops and laptops You will be prompted to register your computer through a simple, quick process: Follow the instructions at Registering Your Computer. BigFix will run in the background, and the BigFix icon will appear on the system tray (Windows) or menu bar (Mac OS X).

  • Faculty
  • Staff
  • Student
  • Desktop Support
How-To

Verify if BigFix is installed

Since BigFix allows us to track a computer, associate the computer with a specific user and collect system specifics (e.g., OS, CPU, RAM, hard drive space), we are able to determine if a system can support encryption. BigFix can also be leveraged to verify patch levels and anti-virus/anti-malware software versions.

  • Faculty
  • Staff
  • Student
  • Desktop Support
How-To

Zoom app- Store

  • Affiliate
  • Faculty
  • Staff
  • Student
  • Technical Partner
  • Volunteer
How-To

BeyondTrust Vendor Comparison

The following table will provide an overview of the features within BeyondTrust Privileged Remote Access and other Privileged Remote Access systems. We will be reaching out to departments to better understand your current solution and use cases to better transition to BeyondTrust Privileged Remote Access from another privileged remote access tool.  Please review the features of BeyondTrust compared to other solutions and if BeyondTrust does not satisfy your needs from a feature perspective, let us know.

  • Affiliate
  • Faculty
  • Non-UCSF
  • Staff
  • Student
  • Technical Partner
  • Volunteer
  • Desktop Support
How-To

BeyondTrust Training

Install the Access Console Prior to using BeyondTrust Privileged Remote Access, the Access Console must be installed and configured on your system.

  • Affiliate
  • Faculty
  • Non-UCSF
  • Staff
  • Student
  • Technical Partner
  • Volunteer
  • Desktop Support