Connecting to the UNC Wired Network
Description: Connecting your computer to the University network involves three steps: Finding your network card(s) hardware address. Registering your network card(s) hardware address. Configuring your system for the University wired or wireless network (Some Game Systems).
» Subjects: Connecting to the Network, Game Systems, Networking, PS3, PS4, Wii, WiiU, Xbox 360, Xbox One » Tags: Mac OS X, Microsoft, Microsoft Windows, Nintendo, PS3, PS4, Sony, Wii, Xbox 360, Xbox One
What is the Clutter feature in Outlook for Office 365?
Description: Clutter is a new feature that is being introduced by Microsoft in Outlook and Outlook Web App for Office 365. This feature allows low priority emails to be place in a single folder. From this point the user can easily read the messages at a later date if wanted. The idea is to help clean […]
» Subjects: Mac OS X, Microsoft, Office 365, Windows » Tags: HeelMail, Office 365, outlook, OWA
Office 365 Help Index
Description: This document is written to provide assistance with using office 365.
» Subjects: Mac OS X, Microsoft, Office 365, Sharepoint, Windows » Tags: Office 365, SharePoint
Heelmail Office365 Setup on iOS
Description: On Feb 9, 2015, ITS Security blocked the Microsoft Outlook App for Android, due to security concerns. If you have the application installed it will not connect to UNC Servers. On March 8th, 2015, The university has transitioned (only for HeelMail users) to Office365. You will need to change your account settings. Please see the […]
» Subjects: Email, HeelMail, iOS, Mobile Devices » Tags: HeelMail, iOS, Office365
How to forward suspect Phishing & SPAM Email Messages for Evaluation
Description: The university’s Cisco Iron-Port filtering system allows us to report both Phishing and SPAM emails directly to Cisco. This document is written to assist in forwarding suspect Phishing and SPAM emails. Instructions In order to report your email please follow the instructions below: Phishing Forward your email as an attachment to firstname.lastname@example.org. Please contact the […]
» Subjects: Email, Exchange, HeelMail, Spam and Phishing » Tags: Mac Mail, outlook, OWA, Phish, Phishing, spam, Thunderbird
Getting Connected at UNC
Description: Wireless Connecting to the UNC Wireless Network Email Campus Email Cheat Sheet Heelmail (live.unc.edu) Outlook Android iOS (iPhone, iPod, iPad) Exchange (ad.unc.edu) Outlook Web App Outlook 2010 and 2013 (Win) Outlook 2011 (Mac) Android iOS (iPhone, iPod, iPad) Antivirus Personally Owned Microsoft Security Essentials (Windows) ClamX Antivirus (Mac) University Owned Microsoft […]
» Subjects: Android, Calendar, Email, Exchange, HeelMail, Introduction to Email, iOS, Mac OS X, Microsoft, Mobile Devices, Software » Tags: Android, email, Exchange, HeelMail, iOS, iPad, iphone, ipod, Microsoft Outlook, outlook
[Exchange] Outlook 2013 Configuration
Description: The University Campus Exchange account can be configured on Outlook. This document is written to take a person through the Exchange Email Configuration on Outlook 2013. In order to setup your account, please follow the instructions below. Configuration Settings User Name: Onyen Password: Onyen Password Server: outlook.unc.edu Domain: AD Exchange Email Setup on Outlook […]
» Subjects: Email, Exchange » Tags: Campus Exchange, Exchange, Outlook 2013
Installing SAS 9.4 on Windows
Description: This document provides instructions for installing the Windows version of SAS 9.4 on 7 and 8. This installation may take an hour or more. This document is written based on installing SAS 9.4 on Windows 7 64-bit version. In this installation only the SAS Foundation was chosen to be installed. If you choose to install […]
» Subjects: Research Computing, SAS, Software, Software Acquisition » Tags: sas, SAS 9.4
How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: Mac OS X, Microsoft, Security, Security Best Practice » Tags: firewall, Mac OS X, Microsoft Windows