VPN Installation and Clients (Onyen Restricted)
Description: -
» Subjects: , , , , » Tags: , , , , , , , , , ,

VPN Installation
» Subjects: , , , » Tags: , , , , ,

I just got my Onyen – when can I log in to the VPN?
Description: I just got my Onyen – when can I log in to the VPN? You should be able to log in to the VPN client as soon as you create a new Onyen.
» Subjects: ,

Best Practices for Using the Campus VPN
Description: Introduction “If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.” – Khalil Gibran Access Issues Access to campus resources from off-campus (for example, someone working at home) presents a number of issues related to maintaining a secure and available campus network environment. For one […]
» Subjects: ,

Uninstalling the VPN Client in Mac OS X
Description: Uninstalling the VPN Client for Mac OS X You must have administrator privileges to uninstall the VPN Client. If you do not have administrator privileges, you must have someone with administrator privileges uninstall the product for you. The VPN Client uninstall script uninstalls any previous command-line or GUI versions of the VPN Client from your […]
» Subjects: , » Tags: , ,

What subnet ranges are used with campus VPN? (Onyen Restricted)
Description: -
» Subjects: , » Tags:

Best Practices for Using Wi-Fi Securely
Description: Overview For information on how to configure your computer to connect to Wi-Fi at UNC, please visit our Connecting to the UNC Network – Getting Started document. This document provides best practices for using Wi-Fi securely. Following these guidelines can help keep your personal information safe while using Wi-Fi:   Keep your device’s software and web browsers […]

Office 365 Email Setup (Outlook, Apple Mail, Mail App, Email App, and Outlook App)
Description: Overview and Configuration Settings The University is migrating Exchange accounts to Office 365 and can be configured on either Desktop client or Mobile Device (iPhone/iPad (iOS), Android. This document is written to take a person through the Office 365 Email Configuration on Windows, Mac OS X, iPhone/iPad (iOS), and Android. Please see the tabs below […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , ,

Recognizing and Reporting Fraudulent Emails
Description: This document describes the most common types of fraudulent email and provides you with recommendations on what to do if when you receive one. The two most common types of fraudulent emails are: Phishing emails Spam emails What are Phishing Emails? Phishing emails are malicious messages that attempt to steal your sensitive information, such as your passwords, […]
» Subjects: , » Tags: , , ,

UNC-Chapel Hill Affiliate Computing Best Practices* (Onyen Restricted)
Description: -
» Subjects: ,