Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
118 Results
RAE - Drive Mapping Instructions
Drive Mapping - Windows and Mac InstructionsWindows InstructionsMac InstructionsIt can sometimes be more convenient to map your RAE drive directly to your Windows or Mac device. These instructions will teach you how to do so on both types of devices. A VPN or UCSF network connection is required.Specific share names and paths are supplied in the RAE Welcome letter when signed up.
- Staff
Outlook for Mac Configuration
- Affiliate
- Faculty
- Staff
- Student
Content: Getting Started as a Content Editor
- Technical Partner
Microsoft 365 FAQs
We continue to update these FAQs. If your question isn't answered here, please contact the IT Service Desk at help.ucsf.edu, or ask your colleagues on the Office 365 Team.
- Faculty
- Staff
- Student
- Email & Collaboration
Network Access Control (NAC) Retrieved Properties
- Technical Partner
Getting Started with Digital Accessibility
How to get started monitoring your websites and web apps for accessibility. It's the right thing to do.
Microsoft Releases Out-of-band Update to Address Critical Issues
Microsoft releases Out-of-band update to address critical issues after installing the January Windows update. This update addresses issues related to VPN connectivity, Windows Server Domain Controllers restarting, Virtual Machines start failures, and ReFS-formatted removable media failing to mount. For a complete description of the vulnerabilities and effected systems, visit Windows message center.
Network Access Control (NAC) FAQs
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
Vulnerabilities in Cisco Small Business RV Series Routers will not be patched (End of Life)
Cisco has released a security advisory to announce that they will not patch vulnerabilities in older versions of their Cisco Small Business RV Series Routers. These vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.
Security Incident Response & Investigation
- Technical Partner