Services
135 Results
Registering Your Computer
At UCSF, we are dedicated to providing you with the best customer experience and supporting your computer so you can focus on your business. In order to best protect UCSF data and resources, IT Field Services (ITFS) manages desktops and laptops with BigFix Endpoint Management.ITFS uses asset data to manage your computer by providing patching and ensuring your systems have the appropriate security.
- Faculty
- Staff
- Student
- Desktop Support
Gartner Research Portal - A Multi-service Resource
UCSF faculty, learners and staff have free and unmetered access to Gartner research, white papers, webinars and more covering an array of complex IT issues, emerging technologies and industry trends.
- Faculty
- Staff
- Technical Partner
- Business Applications
BigFix Endpoint Management
Install BigFix Endpoint Manager – UCSF IT does the rest! BigFix is required for all computers conducting UCSF business, whether a machine is UCSF-owned or your personal computer. This is because, when it comes to securing UCSF IT resources, we can't fix what we can't see.
- Faculty
- Staff
- Student
- Desktop Support
Phish Alarm
Phish Alarm is a tool that is available to all users at UCSF. With the click of a button, users can report a phishing or malicious message. As described here, the Report Phish button is available for both PC and Mac Outlook clients as well as on Outlook Web Access (email.ucsf.edu) and the Outlook Mobile App.
- Faculty
- Staff
- Student
- Security
UCSFwpa - Secure Wireless
The UCSFwpa wireless service provides protected communications to Campus and Medical Center resources and networks. It is widely available in clinical, research and administrative buildings.The UCSFwpa wireless network supports most wireless devices using 802.11a/b/g/n. It is the recommended method of network access at most UCSF locations. This service is available to faculty, staff, learners and affiliates with Active Directory (AD) accounts.
- Affiliate
- Faculty
- Staff
- Student
- Network & Wireless
Application and Website Security
Hackers must first find weaknesses (vulnerabilities) within a system or application in order to gain control of computers and other network systems. These weaknesses can be the result of many different causes, such as not keeping systems and applications up to date or the use of insecure development and coding practices. In either case, these weaknesses could allow hackers to gain unauthorized access to UCSF systems and data.
- Staff
- Security
WebLinks Update
- Staff
SSL / TLS Certificates
SSL (secure socket layer protocol), currently using TLS 1.2 or greater encryption, is used to secure transmissions between servers and clients. Example: Visiting a https address from Google Chrome or Safari. SSL / TLS certificates allow clients to verify a server's authenticity against known Certificate Authorities before establishing an encrypted connection. This helps determine if the server is who they say they are.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Technical Partner
- Security
Server Management & Monitoring
- Affiliate
- Faculty
- Staff
- Student
- Volunteer