|
Links in this video:Protect IU website: protect.iu.edu Disaster Recovery Planning resources: go.iu.edu/dr-plan Business Continuity Planning help and resources: go.iu.edu/bc-plan Contacts mentioned in…
|
|
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Log-ALERT with Splunk configurations: kb.iu.edu/d/bflj IU Log-ALERT site: logalert.iu.edu Protect IU best practices guide:…
|
|
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Unified Device Management (UDM) at IU: kb.iu.edu/d/bfhn UDM Service Overview: kb.iu.edu/d/beae Protect IU best practices guide:…
|
|
Links in this video:IU Policy IT-12: go.iu.edu/it-12 Security configs for smart phones and tablets: kb.iu.edu/d/bcnh#phone Stolen device help: kb.iu.edu/d/avbx Clear data info on the KB:…
|
|
Links in this video:Policy DM-01: go.iu.edu/dm-01 Connecting to VPN: kb.iu.edu/d/aygt IP addresses at IUB & IUPUI: kb.iu.edu/d/ayft IP addresses at regional campuses: kb.iu.edu/d/bdqz Private…
|
|
Links in this video:Vulnerability scanners: go.iu.edu/web-scan Protect IU site: protect.iu.edu Security First site: securityfirst.iu.edu In this video, you'll learn:why vulnerability scans are…
|