Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2477 Results
UCSF DDPE for Windows Installation Guide
Back up your important files. Run Microsoft Software Update to patch your workstation. Verify your system meets the minimum software and hardware requirements. Verify you are not filing for an encryption waiver. Verify your system is not encrypted with another encryption product: See How To Determine Your Computer Encryption Status. You will be asked
Detect the Presence of Symantec Endpoint Protection (SEP)
Symantec Endpoint Protection (SEP) is an enterprise-wide application used for protection against intrusion. It includes protection against virus, malware and network layer attacks. SEP is available for both Macintosh- and Windows-based platforms. Identifying whether or not SEP is installed and functioning properly on a machine is critical in keeping your computer safe. To determine if SEP is installed on your computer, follow the instructions below:
Upgrading to Windows 10 with SEP
Reasons for upgrading include (1) the computer may be running Windows 7, Windows 8 or Windows 8.1 and have an older SEP client installed on it; (2) there is a want or need for the Windows workstation to be upgraded to Windows 10. SEP hardware requirements:
Report a lost or stolen mobile device
Immediately report the theft or loss of your device to the UCSF Police Department: 415-476-1414. Remember that time is of the essence. After reporting the loss or theft of your device to the UCSF Police Department, it is critical that you contact the IT Service Desk at 415-514-4100 as soon as possible.
Set Up a Transferred New Employee
To make sure a transferred UCSF employee is set up for work:
How Do I Choose and Buy a New Workstation for My Employee?
- Faculty
- Staff
- Technical Partner
Request a Device Encryption Waiver
Federal and state laws and regulations require that confidential electronic data, such as protected health information (PHI), personnel information, financial information, and personally identifiable information (PII) must be protected when stored on a computer, to reduce the impact of a computer loss or security breach. Such regulations include but are not limited to:
Encryption Frequently Asked Questions (FAQs)
What is encryption?
How to Determine Your Computer Encryption Status
Multiple methods for deploying whole-disk encryptions are used at UCSF Medical Center and UCSF Campus. The list of computer encryptions below is ordered by most to least well-used. For additional information regarding encryption, visit our Encryption FAQs.
How to Request or Buy Software
Make sure to determine your operating system before buying software. UCSF IT Field Services (ITFS) licenses the operating systems for Windows and Apple/Mac, as well as the basic Microsoft Office suite, for all Basic and Premium customers.