Search18 Results

If you are listed as the owner of the distribution list, you can make changes to the members of the list by following the instructions outlined in this article.
Each person that plans on writing a Knowledge Base article needs to follow these writing guidelines.
How to tell how much space you have , and how much space you have used so far.
This article provides steps for Mac users to enable Single Sign-On (SSO) on their workstation.
The article walks users through enrolling a Personal iOS device with Intune to access University data, files, and systems.
This article summarises and explains differences between three different types of channels that can be added to a team to organise its content. It also provides instructions for creating new channels, recovering deleted channels, and discusses some of the limitations associated with channels.
This article describes how to enroll a University-owned Linux device in Intune device management.
This article describes how to use the Company Portal app for macOS to enroll their work or BYOD devices themselves through the Company Portal app.
This issue affect Mac devices following Intune enrolment.
This article explains which browsers should be used for the optimal experience with systems and apps used at the University of Windows, such as Microsoft 365, Brightspace, UWinsite, etc.
This article outlines common issues with Adobe Acrobat Pro and provides instructions troubleshooting and for correcting them.
MIcrosoft Office for Mac is unable to activate
When accessing OneDrive or other Microsoft 365 Apps in a browser you may see a message displayed on the top of the browser window that says "Your organization doesn't allow you to download, print, or sync using this device (...) This can happen for three different reasons
IT Services utilizes the Outlook Junk Email Filter to block delivery of unwanted emails to your inbox. This article explains how to check and set junk mail settings. It also explains how to report spam and suspected phishing messages.
Phishing scams are fake e-mails trying to trick users into actions on behalf of the scanner. This article shows how to recognize phishing messages, how to avoid them and what to do when you discover one.