2-Step Verification for Duo
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: if you have access to privileged systems you […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Office 365 – Email Setup (Outlook, Apple Mail, Mail App, Email App, and Outlook App)
Description: Overview and Configuration Settings UNC-Chapel Hill is migrating Exchange accounts to Office 365. Your email settings can be configured on either a desktop client (Windows, Mac OS X) or a mobile device (iPhone/iPad (iOS), Android). This document is written to take you through a new Office 365 email configuration. Please see the tabs below for the […]
» Subjects: » Tags: , , , , , , , , , , , , , ,

VPN Installation and Clients (Onyen Restricted)
Description: -
» Subjects: , , , , » Tags: , , , , , , , , , ,

Connecting to the UNC Wired Network
Description: Connecting your computer or device to the University network involves three steps: Finding your network card(s) hardware address. Registering your network card(s) hardware address. Configuring your system for the University wired or wireless network (Some Game Systems).
» Subjects: , , , , , , , , » Tags: , , , , , , , , , ,

How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: , , , » Tags: , ,

Update Your Software Regularly
Description: As a best practice the University recommends that you keep your software up to date on a regular basis.  This software includes, Operating Systems, Web Browsers, and Web applications/ web browser plug-ins.  Leaving these unattended can leave them open to attacks and breach in sensitive information. How to update you operating system: Windows Turn on […]
» Subjects: , , , » Tags: , , ,

VPN Installation
Description:
» Subjects: , , , » Tags: , , , , ,

Connecting to the UNC Wireless Network
Description: Please click the buttons below to expand and see the configuration instructions:
» Subjects: , , , » Tags: , , , , , , , , , , , , , ,

Uninstalling the VPN Client in Mac OS X
Description: Uninstalling the VPN Client for Mac OS X You must have administrator privileges to uninstall the VPN Client. If you do not have administrator privileges, you must have someone with administrator privileges uninstall the product for you. The VPN Client uninstall script uninstalls any previous command-line or GUI versions of the VPN Client from your […]
» Subjects: , » Tags: , ,