Search71 Results

Configure an "Away" greeting to inform callers that you will be away from your phone for an extended period of time.
Use this guide if you are having trouble connecting to our wireless network. This guide lists devices and/or device specifications that are compatible with our ISU network. It also lists devices that are known to have problems connecting to our network.
This document explains how to set up your calendar so that current faculty and staff will retain the ability to do a busy search, but students will not be able to view your availability.
This article describes how to add a project plan to an existing project in TeamDynamix
This is the updated Secure Client Formally Anyconnect Secure Client instructions for connecting to the VPN.
Location and Location Room Information for Ticket Submission
Document on types of AV installations on campus and how they are serviced or maintained by OIT - Educational Technology Services.
This standard is in place to manage the work and cost associated with cabling and/or activating multiple network connections in a standard office space.
This article demonstrates how to add staff Resources to an existing TeamDynamix project. Once a staff Resource has been added to a project, that person can then be assigned to task in the project plan.
This article will provide the standards for refreshing lab computer equipment.
Steps to reset your password for your University Account
This article explains what fine-grained access in Banner entails, and what is currently applied in our Banner environment. The target audience is departmental security managers and business analysts.
This article is to be used to clarify the procedure on what the Department is supposed to do with the computer equipment when a Faculty or Staff employee separate from the University.
URL shorteners, like bit.ly and goo.gl, are frequently used to make it easier to display and enter a web address. However, these services make it difficult to determine what the actual address of the site is and where your browser will take you before you click on a shortened link. Bad actors persistently use these services to disguise malicious URLs, often for phishing or to initiative a download link for malware or ransomware.
This article describes how to recognize and react to fake job offer scams.