Submit a Policy Exception Request (PER)
The institute’s Minimum Endpoint Security Standard defines a minimum set of security controls to increase protection of GT computing endpoints and data while reducing security incidents.
The institute’s Minimum Endpoint Security Standard defines a minimum set of security controls to increase protection of GT computing endpoints and data while reducing security incidents.
The TSO HelpDesk has written three small applications to gather information about the status of Endpoint Management (EPM) Software on your machine. This guide will detail the process for running these programs and sending the information to TSO.
OS X has password storage features, which can be accessed or managed using the Keychain Access application. When updating account passwords, issues can arise related to the storage of old or outdated passwords. In the following example, Keychain Access will be used to delete an outdated entry so the new credentials can be saved.