Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (0)
    • Homepage (0)
    • How-To (39)
    • Landing Page (0)
    • News (0)
    • Other Content (0)
    • Service (13)
    • Standard & Guideline (0)
    • Status (0)

    Service Category

    • Access & Identity (25)
    • Business Applications (165)
    • Desktop Support (60)
    • Education Applications (17)
    • Email & Collaboration (139)
    • Health Systems (11)
    • Hosting & Computing (29)
    • Network & Wireless (34)
    • Phones & Pager (15)
    • Research Services (39)
    • (-) Security (52)
    • Web Services (119)

    52 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services

    Application and Website Security

    Hackers must first find weaknesses (vulnerabilities) within a system or application in order to gain control of computers and other network systems. These weaknesses can be the result of many different causes, such as not keeping systems and applications up to date or the use of insecure development and coding practices. In either case, these weaknesses could allow hackers to gain unauthorized access to UCSF systems and data. 

    • Staff
    • Security

    Symantec Endpoint Protection (SEP)

    Symantec Endpoint Protection (SEP) is provided free of charge to UCSF faculty, staff, learners and researchers. SEP is designed to (1) detect, remove and prevent the spread of viruses, spyware and other security risks and (2)​​​ provide Windows, Mac and Linux computers with anti-virus (AV) and anti-spyware protection. In addition, UCSF SEP clients automatically keep both the client software and security definitions (AV and IPS) updated for the most complete protection.

    • Faculty
    • Staff
    • Student
    • Security
    Service

    Security Incident Response & Investigation

    • Technical Partner
    How-To

    ITOM Successes 2024

    • Affiliate
    • Faculty
    • Lab Manager
    • Research Staff
    • Researcher
    • Staff
    How-To

    Frequently Asked Questions

    How-To

    Researcher's Guide to Meet the UCSF Minimum Security Standards for Server Setup

    • Affiliate
    • Faculty
    • Research Staff
    • Researcher
    How-To

    Background

    • Affiliate
    • Faculty
    • Research Staff
    • Researcher
    • Staff
    • Technical Partner
    How-To

    Use a Recovery Key for FileVault instead of iCloud login

    Mac computers used for UCSF business or study can enroll into Jamf Pro to manage encryption and facilitate compliance with the UCSF Minimum Security Standards (http://tiny.ucsf.edu/mss/) . Jamf Pro is the recommended solution for encryption management on Macs used for UCSF work or study, and is provided at no charge to the UCSF community. 

    • Faculty
    • Staff
    • Student
    • Technical Partner
    • Security
    How-To

    SSL/TLS Certificate Requirements

    • Technical Partner
    How-To

    Trellix (formerly known as FireEye) for Mac: Installation and Update Guide

    These instructions are viewable on your mobile device by scanning this QR code:

    FireEye installation instructions with the required user actions for users of Macs that are not enrolled into Jamf Pro at UCSF.

    • Affiliate
    • Faculty
    • Non-UCSF
    • Staff
    • Student
    • Technical Partner
    • Volunteer
    • Security

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • Page 1
    • Current page 2
    • Page 3
    • Page 4
    • Page 5
    • Page 6
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California