Search9 Results
- Knowledge Base
- Information Security
- Cybersecurity Awareness
This is the process by which you send a suspicious email to Information Security through the "Report to SLUAware" method.
- Knowledge Base
- Communication and Collaboration
Step-by-step instructions how to send or receive large files that exceed the attachment limits of email.
- Knowledge Base
- End-Point Computing
- Network Access
This article provides a modified step-by-step process to register in Okta for members of the SLU community who are hearing-impaired.
- Knowledge Base
- Information Security
- Cybersecurity Awareness
Guidance for how to maintain a secure presence on the web and how to keep your devices protected.
- Knowledge Base
- Teaching and Learning
- Canvas
- Instructor Guides
Goes over the two main ways to email all students in a course
- Knowledge Base
- Information Security
- Identity and Access Management
Phishing emails are emails sent to individuals or a large group to collect personal or institutional information for malicious intent. Identifying these emails and reporting them to SLUAware will help protect the University and its employees.
For more information on reporting suspicious emails, see our askSLU article:
https://ask.slu.edu/TDClient/30/Portal/KB/Artic...
- Knowledge Base
- Communication and Collaboration
- Email & Calendaring
Step-by-step process to install and configure the Microsoft Intune Company Portal on an Android device to access Outlook email for an @health.slu.edu account.
- Knowledge Base
- Communication and Collaboration
- Email & Calendaring
Step-by-step process to install and configure the Microsoft Intune Company Portal on an iOS device to access Outlook email for an @health.slu.edu account.
- Knowledge Base
- End-Point Computing
Overview of links and resources for incoming SLU students to help them access the technology tools they need.