There is no excerpt because this is a protected post.
» Read moreTags: etäväitökset, väitöstilaisuudet
There is no excerpt because this is a protected post.
» Read moreSoftware Center is a software installation service through which the users can install programs and updates to the UNIV workstation maintained by ICT Services. The installing of software and updates does not need administration rights The shortcut to Software Center is found on your desktop: Available applications and updates have been defined by ICT Services’ maintenance. […]
» Read moreThis way you can check which version of Windows is installed on your computer: Press the Windows button on the keyboard (there is a picture of the flag on the key) and the letter “R”. The Run/Suorita window opens on the screen: In the Open field, type: winver and press OK. In the window that […]
» Read moreIn case of information security deviations or cases related to them, the safest thing to do is to ask Campus ICT for advice. If you observe or suspect misuse of a network, services or an account, you can also send an e-mail notification to tietoturva@oulu.fi. In this instruction: What is an information security deviation? Reporting […]
» Read moreThis page awaits an update. Please follow the University of Oulu’s MFA instructions, now that we are sharing the same M365 tenant. Everyone at Oamk has multifactor authentication (MFA) in use for the Microsoft Office 365 cloud service. If you are not familiar with MFA in general, please see how MFA protects your account from […]
» Read moreMicrosoft 365 Education service’s language settings a) When using M365 service with a web browser, the online applications are affected by the following language settings: Your M365 profile’s language setting Region settings in M365 and/or OneDrive (in some cases/apps) Language settings for the browser you use (affects the front page view of the M365 portal). […]
» Read moreMobile devices (smart phones and tablets) can easily get lost or stolen. Therefore, they entail the risk of unauthorised access to the user’s or university’s data. Unauthorised users can also pose as the device owner and send e-mail in his/her name. Hence, it is important to know the information security risks and act accordingly. Contents […]
» Read moreThis Information Security Guide is primarily intended to serve as a general guide for university staff members, regardless of their place of work. It has been produced as a collaboration between universities and has been aimed at making it suitable for all universities. This Information Security Guide is the product of collaboration by the University […]
» Read moreThis Information Security Guide is primarily intended to serve as a general guide for university students, regardless of their place of study. The Information Security Guide is the product of collaboration by the University of Helsinki, University of Eastern Finland, University of Jyväskylä, University of Oulu, Hanken School of Economics and Åbo Akademi University, and […]
» Read morePKI (Public Key Infrastructure) is a device-specific certificate that can replace strong identification on university staff Univ-laptop when using UNIV VPN (Pulse Secure) or Eduroam wireless networks. Contents of this instruction: Utilising of PKI in Eduroam connections Utilising of PKI in Eduroam connections You can take advantage of your Univ laptop’s PKI certificate for all […]
» Read more