Information, Technology & Consulting

Knowledge Base Search

Use the search box to query for articles in the Knowledge Base, or use the categories on the left to narrow down what results you are interested in.

The search found 125 results in 0.209 seconds.

Search results

    Junk Email Filtering

    Step-by-Step

    Dartmouth uses Microsoft's Exchange Online Protection system (EOP) for junk email and phishing filtering. These settings are controlled by Microsoft. However, there are several way in which you can control your junk email.

    First, you can notify Microsoft of messages that were incorrectly flagged as junk, or incorrectly flagged as not junk. There are several ways to do this:

    Report junk email in your Outlook inbox:

    Glossary of Computing Terms

    Details

    Glossary of Terms

    Active Directory: Microsoft’s directory product that contains the user account names and passwords that are used to access Microsoft-based systems like the Windows network, Exchange, Office 365 or Microsoft Online Services (MOS).
     

    Sync'ing Data from OneDrive/Groups/SharePoint

    Details

    When to Sync

    • When you have enough hard drive space to handle the amount of data being sync’d.
    • When you are going to be offline (no internet access) and still need access to your OneDrive data.
    • When you want quicker access to your OneDrive files. Accessing locally sync’d OneDrive files is quicker than accessing them directly online.

    When Not to Sync

    • You do NOT want to sync data on a computer that is not yours. Like a public computer or your friends computer.

    Protecting your Personal Information when on the Internet

    Details

    The Internet is home to a thriving criminal community actively looking for personal and financial information to be used for illegal gain. The major threats are:

    • Identity Theft
    • Malware and Adware

    All Computers, Laptops, Smartphones, Tablets (Windows and Mac) are susceptible.

    Identity Theft

    Identity theft occurs when an unauthorized person wrongfully obtains and uses another person's personal information to commit fraud or deception, often for economic gain. Valuable information includes:

    File Sharing Service Overview

    Details

    Description

    ITS provides a number of services that allow members of the Dartmouth community to share files with others across campus and beyond. These services include:

    • Box
    • OneDrive
    • SharePoint
    • SFTP
    • Canvas
    • Email

    Available to

    Dartmouth students, faculty and staff

Pages

Close
Information, Technology & Consulting