How To
535 Results
How to Submit Network DNS Requests
Steps to follow Prerequisite: If you are requesting DNS records for server you must ensure to include your server MAC address for mapping. There are two ways to submit Network DNS requests:
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Network & Wireless
Directory Services
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Volunteer
Manage Your UCSF Password
How to AccessEveryone accessing UCSF resources will have a password for their computers, email and access to email and Office 365 applications on their mobile devices. NOTE: To access your email on your mobile device, you will need to Enroll Your Mobile Device in Intune Company Portal.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
Report a lost or stolen mobile device
Steps to follow 1. Call the UCSF Police Department Immediately report the theft or loss of your device to the UCSF Police Department: 415-476-1414. Remember that time is of the essence. 2. Contact the UCSF IT Service Desk After reporting the loss or theft of your device to the UCSF Police Department, it is critical that you contact the IT Service Desk at 415-514-4100 as soon as possible.
Set Up a Transferred New Employee
Steps to follow To make sure a transferred UCSF employee is set up for work:
UCSF Email Information for New Students
- Student
Report a Security Incident
Steps to follow Report anything that causes concern Immediately contact the UCSF Service Desk to report an information security problem or a possible or potential information security problem. Phone: 415-514-4100 Email: [email protected] Web: http://help.ucsf.edu
How Do I Choose and Buy a New Workstation for My Employee?
- Faculty
- Staff
- Technical Partner
Request a Device Encryption Waiver
Background Federal and state laws and regulations require that confidential electronic data, such as protected health information (PHI), personnel information, financial information, and personally identifiable information (PII) must be protected when stored on a computer, to reduce the impact of a computer loss or security breach. Such regulations include but are not limited to:
Enable Encryption on Android Devices
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer