Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
Service Portal Home
Services
Knowledge Base
Search
Articles
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Security
Security
Security, data integrity and compliance for institutional activities
Categories (1)
HIPAA Security
Confidentiality, Integrity, Availability, specifically related to PHI and ePHI at the University.
Expand
Articles (45)
Acceptable Use of IT Services
Activate Your Computer's Firewall
BitLocker with Active Directory Integration
Campus-Wide License for Web Security Certificates
Completely erase information before disposing of equipment
CrowdStrike Falcon Endpoint Protection
CrowdStrike Falcon provides enhanced endpoint protection to laptops, desktops, and servers owned by the University of Delaware. CrowdStrike Falcon software installed on these systems is managed by IT Professionals within each unit in partnership with UD Information Technologies.
Disable File and Print Sharing
Disable Guest Accounts
Email Phishing Controls
To identify emails that may be spoofed or possible phishing attempts, UD Information Technologies is using both a feature in Gmail and an email phishing service for Exchange that will mark suspicious incoming email messages with warning banners. This article covers what to do with those messages and options for resolving warnings if your own messages are being marked.
Encrypting Microsoft Office Documents
Encrypting Personally Identifiable Information (PII)
Encryption Key Management
Erase file(s): Windows Eraser
Eraser: Installing on Windows
How to Self-Enroll in Secure UD Training
Install and use anti-virus software on mac OS
Macintosh Native Encryption
Macintosh whole disk erase: Using Disk Utility
Macintosh: Burning a disk image of Parted Magic .iso
Microsoft Windows Update Services at UD
Notice of Required macOS Updates
Password Protect All Computer Accounts
Personal computer virus cleanup policy
Phish Alert Button (PAB): how to use it to report phishing emails
The Phish Alert Button (PAB) that allows you to report a potential phishing email via your Outlook desktop/web/mobile application or Gmail/Gmail mobile application. Using the PAB will alert the IT Security department to review the email and take immediate action.
PII Storage and Encryption Guidelines
Process for Purchasing Electronic & Information Technology (EIT) at UD
You must complete the following steps to ensure the University's accessibility and data security requirements are met before purchasing new technology or renewing existing technology contracts.
Protect and Clean your Computer
Protecting Personally Identifiable Information (PII)
Remove Hola VPN
Remove P2P Software
Resetting Windows Internet Options
Run Disk Cleanup on a Windows 10 Computer
Scanning for Personally Identifiable Information (PII)
Secure destruction of computer disks
Staff computer virus cleanup policy
Turn on Automatic Updates
UD Implementation of WSUS
Updating macOS
How to update macOS
Using AES Crypt on Windows
Using UD Central WSUS
Whole disk erase: Alternative Windows erasure method
Whole disk erase: Parted Magic
Windows native encryption
Windows whole disk erase: Disk Eraser
Windows: Burning a disk image of Parted Magic .iso
Search this category
Search
Blank
Popular Articles
Students - Forgot your Login?
Use Get Started at UD to sign-up for eduroam Wi-Fi
Using vi buffers to copy lines
Adding devices to the UD Wi-Fi network
Usernames, UDelNet IDs, and UD IDs
Recent Articles
New Project Checklist
Google Drive at UD
Creating a New Project
Managing a Project in TeamDynamix: Overview
Sponsor Canvas@UD and WordPress@UD Guest Accounts (faculty and staff)
Popular Tags
tech-request
(19)
Security
(9)
Training
(6)
remote
(4)
Wi-Fi
(4)
Apporto
(3)
Canvas
(3)
devices
(3)
Eduroam
(3)
equipment
(3)