Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
UO Service Portal
Sign In
Search
Home
Help for Students
Help for Faculty and Staff
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Information Security
Guidelines
Guidelines
Articles pertaining to recommended guidelines for security across devices and operating systems.
Categories (3)
Travel Guidelines
Articles pertaining to guidelines to take before, during, and after traveling.
Expand
Operating System Guidelines
Articles pertaining to security guidelines for operating systems regardless of device.
Expand
Personal technology guidelines
Articles for personal technology guidelines
Expand
Articles (10)
Adding a Custom Attribute to an IP address in Netdot
This document guides you through the process of using custom attributes to tag IP addresses and IP address block with identifying tags than can be used for specific processing by the Information Security Office (ISO)
Doxing and protection
What is doxing, how do we avoid it, and respond if it should happen.
Guidelines for compliance with UO Endpoint Management Standard
Learn more about the compliance guidelines to meet the UO Endpoint Management Standard.
Identity Theft
Learn more about identity theft: what it is and how to avoid, detect, and handle it.
Remote Work Guidelines For Information Services Staff
This article covers the guidelines for working remotely within the Information Services (IS) unit.
SSL Certificates
Info on SSL certificates.
Tips for being a data privacy snob
Some tips for how to value your data — such as your location, contacts, and photos — as much as the people and companies who buy it.
Tips to help determine if a suspicious email is malicious
The UO community is often the target of unwanted email messaging campaigns requesting that the user visit a website and enter their credentials in order to address an urgent issue with their accounts, banking records, student information, and employee records. This knowledge base article will provide you with ten (10) basic tips that everyone can follow to help discern whether an email message is face.
Ways to test your server for SSL vulnerabilities
Self-testing for SSL vulnerabilities can be performed via several methods. Each of these methods gives visibility into slightly different facets of the SSL configuration and posture of the server.
What to Do if Your Account is Compromised
This article contains information on preventing an account compromise as well as how to regain access once an account is compromised.
Search this category
Search
Blank
Popular Articles
UO Accounts: Duck ID and UO ID Number
Reverting to a Previous Version of Java (Windows)
How to log out of all Office 365 devices
Getting Started with Two-Step Login (Duo)
How to Change the Dimensions of an Image (macOS)
Recent Articles
How to use a SMART Board
What to Do if Your Account is Compromised
Email Spoofing FAQ
Using Two-Step Login with NetApp OnCommand Unified Manager
Using Two-Step Login with RHEL6 Hosts Accessed by SSH
Popular Tags
office-365
(23)
outlook
(23)
sharepoint
(21)
uo-blogs
(21)
onedrive
(19)
wi-fi
(18)
getting-started
(17)
uomail
(17)
windows
(17)
papercut
(15)