Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
299 Results
Licensed Software
- Faculty
- Staff
- Student
HBS Timekeeping System
Description HBS (Huntington Business Systems), is an online time and attendance system. It is used by all academic and administrative staff (exempt and non-exempt employees) who earn leave. Note: HBS is not applicable for the 5,000+ academics who do not earn leave (e.g., residents, emeritus faculty).
- Faculty
- Staff
- Student
- Business Applications
Avoiding Spam
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
ProofPoint Quarantine FAQs
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
SharePoint
DescriptionWithin Office 365, Sharepoint Online provides a robust platform for creating collaborative websites to share documents and information with colleagues, partners, and customers.
- Faculty
- Staff
- Student
- Technical Partner
- Email & Collaboration
Everbridge
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Server Management & Monitoring
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
Account Login & Password
DescriptionActive Directory (AD) is a Microsoft-based technology that provides a variety of network services, including:Lightweight Directory Access Protocol (LDAP)Kerberos-based authenticationDNS-based namingA central location for network administration and delegation of authorityUsing Active DirectoryYour UCSF AD account provides access to many systems:
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
Subscribe to a Listserv
- Faculty
- Staff
- Student
IT Security Risk Assessment
Overview UCSF is required by a number of policies, laws, and regulations to assess the security risk of information systems that handle UCSF data. What is an IT security risk assessment at UCSF? The IT security risk assessment process collects information about each of our information systems and scores their security compliance. The process measures the security aspects of all computing devices associated with the system including servers, desktop computers and laptops, mobile devices, network hardware, and other related technologies.
- Faculty
- Staff
- Technical Partner
- Security