Search84 Results
- Knowledge Base
- Security
This standard describes the benefits and key features of the ISAD domain, how to connect a system to the ISUAD domain, and the requirements for a domain exemption.
- Knowledge Base
- Security
ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.
- Knowledge Base
- Get Connected
Outline of network device support SLA.
- Knowledge Base
- Conferencing, Collaboration, and Telephone
This article will describe audio/video devices to be used with ISU's unified communications system.
- Knowledge Base
- Email, Calendaring, File Storage and Additional Productivity Tools
- Email
The article will define retention standards for faculty and staff email sent out of or received by our enterprise system in Office 365.
- Knowledge Base
- Hardware, Software, Printing
- Software Support and Licensing
This article explains the major changes from Windows 10 to Windows 11 when updating to the newest operating system.
- Knowledge Base
- Business Applications
- Perceptive Content
This article goes over the designated Security Officers by department for the Perceptive Content system and provides a link to the Account creation service request.
- Knowledge Base
- Conferencing, Collaboration, and Telephone
Indiana State University (ISU) strives to minimize costs associated with providing unified communications (UC) audio devices to faculty and staff utilizing telephone services through University phone systems. These devices provide the interface to our telephony systems and incur costs based on the devices desired.
- Knowledge Base
- Classrooms and Labs
- Labs
This article will provide instructions for students on how to connect to the Microsoft Azure Virtual Desktop system. It also includes some usage notes as well as the software packages offered.
- Knowledge Base
- Security
Indiana State University subscribes to a cloud based security service that continuously monitors cyber-space for DNS (domain name system), infrastructure, and IP networks used in current and former cyber-attacks. Cisco Umbrella extends data protection to devices and users anywhere, whether they are on campus or in a remote location.
- Knowledge Base
- Conferencing, Collaboration, and Telephone
ISU's phone system allows for calls to placed to any phone number both inside and outside of the university.
This article will describe the process of dialing international phone numbers.
- Knowledge Base
- Security
Microsoft Intune keeps managed devices secure and up to date while securing ISU’S’s data. Data protection includes event monitoring of sensitive ISU data on and securing workstations and devices from attackers and other compromised systems.
Intune supports managed devices that run Android, iOS/iPad, MacOS, and Windows 10/11.
- Knowledge Base
- Security
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
- Knowledge Base
- Security
ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.
- Knowledge Base
- Parents, Alumni, and Guests
ISU provides some technology services to retirees, but important changes take place at the retirement date which may require action.