Search70 Results

Indiana State University (ISU) strives to minimize costs associated with providing unified communications (UC) audio devices to faculty and staff utilizing telephone services through University phone systems. These devices provide the interface to our telephony systems and incur costs based on the devices desired.
This article will describe audio/video devices to be used with ISU's unified communications system.
Users who require administrative rights on their ISU workstations will install and use Thycotic Privilege Manage to securely elevate their rights. This article describes how to install and use the solution.
After completing the article, it is expected that you will have a better understating of Microsoft Teams to allow for a seamless transition to the new voice platform
A shared voice mailbox in the Exchange Unified Messaging environment will allow a group of users to utilize the same extension and retrieve the voice mail messages received on that extension. The functionality that you see is very similar to what you are used to with a traditional voice mailbox.
This article is to assist users in signing into their Polycom Desk Phone after their migration to Microsoft Teams is complete.
Describes the computer ownership standards for ISU employees.
This guide will walk you through the process of acquiring the devices recommended to participate in an Audio/Video Conference.
This article will provide educational and business affiliate sponsors information about managing the affiliate accounts end date using the Employee Self-Service badge in the MyISU Portal.
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .
This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.