Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
348 Results
Using Add-ins in Outlook Web App
OverviewAdd-ins in Outlook.com are programs or utilities that help you automate tasks when you view or create messages.NOTE: You will need to install add-ins within Outlook to be able to use them in your work at UCSF.Locating and Installing Add-ins within Microsoft OutlookThe following steps will assist you with locating and installing add-ins within Microsoft Outlook.1. Select the Apps icon (Outlook Web App (OWA)
- Affiliate
- Faculty
- Staff
- Student
- Email & Collaboration
How to Confirm Crashplan Is Backing Up Your Computer
CrashPlan is UCSF's online backup program. All data that is backed-up by CrashPlan is encrypted, so it will securely backup your files even when you are NOT connected to the UCSF network or UCSF VPN. This also means this solution is HIPAA-compliant. CrashPlan Pro is offered, at no additional charge, to all ITFS supported desktops and laptops as part of the ITFS Basic Support, and to UCSF Medical Center supported laptops.
- Faculty
- Staff
- Desktop Support
IT Field Services (ITFS) Desktop Support: Hourly or Project Support
- Affiliate
- Faculty
- Staff
- Technical Partner
IT Field Services (ITFS) Desktop Support Health Desks
The Health Desk provides walk-up IT help.Typical Health Desk support includes:Duo enrollment and questionsAssistance with Wi-FiMobile email setupDevice encryptionVPN support
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Desktop Support
Request a Data Center Services Consultation
- Affiliate
- Faculty
- Staff
Navigating Box Drive
Overview Box Drive allows you to navigate the contents of your Box folders from a desktop application. With Box Drive installed, you will have:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Business Applications
External Vulnerability Resources
Information and resources Keeping on top of information security vulnerabilities is an essential component of information security. Attackers exploit existing security vulnerabilities on systems to gain unauthorized access to systems and data.
Microsoft 365 - Idle Session Time Outs
Idle Session Time OutsEach Microsoft 365 application has a different sign-in frequency, the following table highlights the sign-in frequency setting for each application and client.
- Faculty
- Staff
- Student
- Email & Collaboration
Telecommute Securely
Working remotely? Follow these tips to securely manage your telecommute.
- Faculty
- Staff
- Student
- Desktop Support
FAQs - InCommon SSL Certificate Service
- Staff