Search46 Results
- Knowledge Base
- Network - Connectivity
- Wired Network Access Control Project
Network Access Control Project Phase V overview and building schedule.
- Knowledge Base
- Network - Connectivity
- VPN
A Virtual Private Network (VPN) creates a secure connection between your off-campus computer and on-campus resources.
- Knowledge Base
- Network - Connectivity
- VPN
A Virtual Private Network (VPN) connection creates a secure path between an off-campus computer and on-campus resources.
- Knowledge Base
- Accounts - Access
- Account Authentication
CURRENT USERS. Set up and manage verification methods that allow you to access ECU apps and systems.
- Knowledge Base
- Accounts - Access
Submit the online Password Change form, visit your nearest Pirate Techs location or the self-service password reset portal.
- Knowledge Base
- Accounts - Access
- Alumni User Accounts
Alumni use Microsoft 365 account settings to manage passwords and authentication methods.
- Knowledge Base
- Accounts - Access
- ECU User Accounts
ECU-managed Mac users change their password locally rather than using PirateID Self Service.
- Knowledge Base
- Hardware - Software - Storage
- Computers - Printers - Mobile
- Faculty and Staff Computers
Windows only. User Account Control (UAC) for ECU-managed Windows devices.
- Knowledge Base
- IT Security - Compliance
- Information Security
- IT Security Series
We want to ensure that all in the Pirate community are aware of effective ways to work safely and securely in both an on-campus or remote environment.
- Knowledge Base
- Hardware - Software - Storage
- Software - Apps - Services
Let these FAQs answer your questions about AIP.
- Knowledge Base
- Accounts - Access
- ECU User Accounts
Teleworking? Traveling? Update your computer login password after you update your ECU password.
- Knowledge Base
- IT Security - Compliance
- Information Security
- IT Security Series
In this edition of the IT Security Series, we share tips and resources you can use to protect yourself from Online Identity Theft and Phishing Scams.
- Knowledge Base
- IT Security - Compliance
- Information Security
These security manuals outline your information protection responsibilities whether employee, manager or IT support staff member.
- Knowledge Base
- Network - Connectivity
- Wired Network
Department-owned devices connect to a secured segment of the wired network.
- Knowledge Base
- Network - Connectivity
- Wired Network
Authentication, network segment do's and don'ts and more.