results for "windows"
Results 1-10 of 11
Results Per Page: 
Import USERTrust Intermediate Certificate: This article is intended for Windows 10 and Windows Server 2012 and up. There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same. USERTrust is an entity that signs LSU's SSL certificates on the behalf of Sectigo. Therefore, USERTrust is...
Article Id: 16563

This article is intended for Windows 10 and Windows Server 2012 and up. There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same. Import CA Certificate The root Certificate Authority(CA) for LSU is Comodo , and it is identified by the Issuer, AAA Certificate Services . This...
Article Id: 16562

Article Id: 20614

E-mail: Obtain the E-mail Headers Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. When reporting a message through the Report Phishing option in Outlook , the message and all of its header information are provided to the LSU IT Security and Policy (ITSP) team for evaluation.
Article Id: 14922

Security of Data Policy Statement In accordance with PS-124 Data Management , it is essential that confidential and/or private data be protected. It is very important to understand that confidential and/or private data could exist on your computer hard drive. When there is a loss of data through a security breach, a social engineering attack, or a hardware failure, there is a...
Article Id: 8037

General Information Disclaimer: BEFORE USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact. If you are required to or you do store sensitive information on an electronic device, you should protect yourself and the University by encrypting the data. You are able to ENCRYPT the Data ONLY WHEN...
Article Id: 6983

Keep Web Browsers Up-to-Date Most Web Browser Updates address Security Vulnerabilities and Critical Issues that NEED to be resolved. It is VERY IMPORTANT that these are kept up-to-date. These instructions will show How to keep your Web Browser updated . 1. Open the Google Chrome web browser. 2. Click the ellipses menu icon, located in the top right...
Article Id: 16342

Linux IAAS SLA Introduction This document is to establish the Service Level Agreement for LSU’s Linux-based IAAS (Infrastructure as a Service). Service Availability ITS does not currently guarantee a service availability target but strives to maintain 99.9% availability, excluding pre-established monthly maintenance windows and down time caused by...
Article Id: 17667

Note: SSLv3 or older protocols as well as TLS 1.0 and 1.1 should no longer be used. Use TLS 1.2 should be used instead. ? Recommendations for Microsoft Internet Information Services (IIS): Changing the SSL Protocols and Cipher Suites for IIS involves making changes to the registry. It is not direct or intuitive. Therefore, instead of repeating already published information, please...
Article Id: 17596

Report Phishing E-mails Phishing emails are malicious messages that attempt to trick recipients into providing sensitive information or performing fraudulent tasks. Users can report any suspicious or malicious message to LSU IT Security and Policy (ITSP) for review through the Report options in Outlook. Phishing emails may Request information like passwords or...
Article Id: 19636

Provide Search Feedback Logo
Search Google Logo