1. Security, 3rd-party SSL certificate services, guidance and usage
  2. SSL Certificates, Certificate Service
  3. Endpoint Security, CrowdStrike, What is CrowdStrike?
  4. Cybersecurity, Gift Card Scams
  5. Security, How to identify phishing attempts and similar scams
  6. Shibboleth, Setting up a Service Provider
  7. Security Compliance, Electronic Data, Disk, SSD, or Other Storage Device Disposal
  8. Cybersecurity, Storing Secrets on Amazon Web Services (AWS)
  9. Endpoint Security, CrowdStrike, Is CrowdStrike Installed?
  10. Endpoint Security, CrowdStrike, Quarantined Files [Campus login required]
  11. Security, CISDSC, IT04 Compliance [Campus login required]
  12. Security, CISDSC, IT10 Compliance [Campus login required]
  13. Security, CISDSC [Campus login required]
  14. Cybersecurity, Logging Practices for Application Developers
  15. Endpoint Security, CrowdStrike, Getting Started with CrowdStrike
  16. Networking, Firewall, Special Ports for Mostly Open and Mostly Closed Categories
  17. Endpoint Security, CrowdStrike, Roles [Campus login required]
  18. Endpoint Security, Windows Updates, Security Best Practices [Campus login required]
  19. Endpoint Security, CrowdStrike, Notification from Security [Campus login required]
  20. Endpoint Security, CrowdStrike, Management Models [Campus login required]
  21. Safer Illinois, Smartphone Loan Setup Instructions
  22. Endpoint Security, CrowdStrike, Prevention Policies
  23. Zoom Vulnerability Message to IT Pros (CCSP)
  24. VPN, Frequently Asked Questions
  25. Shibboleth, Windows IIS Server specific configuration instructions
  26. Illinois Directory, How to suppress an entry in emergency situations
  27. Illinois Directory, How to suppress a Staff member's electronic entry
  28. Shibboleth, For IT Pros: Understanding Shibboleth Terms
  29. Skype for Business, Security, Caller ID spoofing
  30. Endpoint Security, CrowdStrike, Security Best Practices [Campus login required]
  31. Security, Unauthorized use of accounts
  32. Privacy and Information Security, Social Security Numbers
  33. Security, Freedom of Information Act, FOIA
  34. Security Camera Notification Requirements
  35. Active Directory, Group Policy Objects
  36. Security Camera Service
  37. Illini Alert, How do I unsubscribe?
  38. Security, Policy, Access to employee's email/files/folders by someone other than employee
  39. Security, Software, Anti-Virus, Home Solutions
  40. Passwords, Setting Strong Passwords
  41. Security, Encryption, Standards
  42. Security, FERPA
  43. Security, How to disable AirDrop on OS X computers
  44. Security, Password Manager, Why You Should Use One
  45. Security, Malicious domain blocking
  46. VPN, Security Benefits
  47. Security, Is it possible to have access to system logs?
  48. Security, Data Classification
  49. What are the Privacy & Security policies and standards?
  50. Security, Security Access Form
  51. Networking, Iris Scenarios: Port Security - Restricting Port Access to Specific MAC Addresses
  52. Security, Copyright Information and Blocked for Infringement
  53. VPN, CISCO AnyConnect VPN unable to create the interprocess communication depot