Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
29 Results
Learner Device Setup
UCSF uses Microsoft Exchange as its email and calendar service. It can be accessed from any browser by going to: https://email.ucsf.edu. Requires two-factor authentication if off-campus.You can use desktop email clients such as Outlook and Apple Mail. Requires VPN connection if off-campus.
- Student
- Education Applications
Learner Accounts
The Registrar distributes login credentials; you should receive this in advance of your orientation. If you have not, please contact your program. Please follow these instructions the first time you log in. You need to setup the Duo Mobile App for two-factor authentication, enroll in the UCSF Password Management Tool, change your password, and setup Hitachi ID Mobile Access App.
- Student
- Education Applications
Data Loss Prevention (DLP)
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
Phish Alarm
Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.
- Faculty
- Staff
- Student
- Security
Proofpoint URL Isolation
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Security Incident Response & Investigation
- Technical Partner
Technology Introduction for Learners
Technology will be an integral component of your UCSF education. These how to page will help familiarize you with technology at UCSF and provides guidance on preparing your computer prior to starting your program. You will find information on the technology resources that are available to you, where to get support, how to setup devices, and information about email and accounts.
- Student
- Education Applications
Campus IT Operating Model (ITOM) Program
- Affiliate
- Faculty
- Lab Manager
- Principal Investigator (PI)
- Research Staff
- Researcher
- Staff
- Student
- Technical Partner
IT Security Risk Assessment
UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data.
- Faculty
- Staff
- Technical Partner
- Security
Avoid Spam
Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security