results for "access"
Results 121-130 of 631
Results Per Page: 
This article provides guidance on changing the Instructor of Record (IoR) for courses after an IoR has already been assigned in Workday and a Moodle course is in use. NOTE: This process does not replace contacting the Faculty Technology Center (FTC) for assistance. Overview When an Instructor of Record (IoR) is assigned to a course in Workday, Moodle generates a...
Article Id: 20629

As part of ongoing modernization efforts with Single Sign-On (SSO) and Identity Access Management (IAM), LSU’s K2/BPM application offerings are being methodically migrated on an application-by-application basis to leverage an upgraded SSO process (much like Microsoft Teams and LSU E-mail are currently). Some common K2/BPM applications in use at LSU that will be affected include: Workday...
Article Id: 20630

Category Name Description Reporting Timeframe CAT 0 Exercise/Network Defense Testing This category is used during state, federal, national, international exercises and approved activity testing of internal/external network defenses or responses. Not Applicable; this category is for each agency's internal use during exercises.
Article Id: 6991

To Access Tiger TV through the myLSU Portal: (*Access directly: www.tigertv.tv *) 1. Log into myLSU . 2. On the left hand side panel, select Campus Community | Tiger TV : 3. After clicking on Tiger TV, a new window will open in your browser, and it will take you to the Tiger TV official website.
Article Id: 15684

General Information: Shared resources should be secured so that only those who need to access the resource can access the resource. While there are many ways to secure your Windows box, this document will describe the methods normally used by the Office of Computing Services Active Directory staff. By default, Windows installs NTFS permissions with the Everyone group having full...
Article Id: 5273

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

To Access Asset Management in the myLSU Portal: 1. Log into the myLSU Portal. 2. From the left hand panel of the homepage, select Asset Management | Financial Services . 3. You now have access to Asset Management as seen in the image below.
Article Id: 18288

To Access the HRM Mandatory Employee Training Programs through the myLSU Portal: 1. Log into myLSU Portal . 2. On the left hand side panel, expand Employee Resources, and click on Mandatory Annual Trainings . 3. The HRM Mandatory Employee Training page will appear, where you can access the annual Cybersecurity, Ethics, Title IX, and Digital...
Article Id: 17642

General Information On May 17th 2014, ITS officially RETIRED the secure wireless network " lsusecure, " making " eduroam " the ONLY secure wireless option at LSU. For many years, ITS has made eduroam available to make it possible for visitors from participating universities to use their "home" authentication to log into the LSU secure wireless network. This eliminates the...
Article Id: 17388

Mobile devices, such as smart phones and tablets, come with various Apps that can access your LSUMail account. Depending on the App, they will use different methods to get to your mailbox. Methods to Access LSUMail (Types of E-mail Apps) Method 1: Apps that use Modern Authentication (Recommended) LSU ITS strongly recommends the use of the Microsoft Outlook...
Article Id: 15939

Provide Search Feedback Logo
Search Google Logo