Search89 Results

This standard describes the benefits and key features of the ISAD domain, how to connect a system to the ISUAD domain, and the requirements for a domain exemption.
ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.
Outline of network device support SLA.
This article will describe audio/video devices to be used with ISU's unified communications system.
The article will define retention standards for faculty and staff email sent out of or received by our enterprise system in Office 365.
This article explains the major changes from Windows 10 to Windows 11 when updating to the newest operating system.
This article goes over the designated Security Officers by department for the Perceptive Content system and provides a link to the Account creation service request.
This article is a list of the groups by department in the Perceptive Content system as of July 2025.
Indiana State University (ISU) strives to minimize costs associated with providing unified communications (UC) audio devices to faculty and staff utilizing telephone services through University phone systems. These devices provide the interface to our telephony systems and incur costs based on the devices desired.
This article will provide instructions for students on how to connect to the Microsoft Azure Virtual Desktop system. It also includes some usage notes as well as the software packages offered.
Indiana State University subscribes to a cloud based security service that continuously monitors cyber-space for DNS (domain name system), infrastructure, and IP networks used in current and former cyber-attacks. Part of this protection includes scoring websites for potential risks. Scoring includes reputational values which considers the age of the site. New domains may be blocked for a 24 hour period following registration.
ISU's phone system allows for calls to placed to any phone number both inside and outside of the university.

This article will describe the process of dialing international phone numbers.
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
ISU provides some technology services to retirees, but important changes take place at the retirement date which may require action.
The article below will detail two situations that will determine how location information is determined.