Search
Filter your search results by first selecting a content type. You can continue to narrow down the search results by selecting a topic. If you still can't find what you are looking for, use the Get Help tab on the right.
Types of content
KnowledgeBase Topics
46 results
… of operations while allowing for remote work or shift work in support of social distancing. The guides below are also … Additional Remote Work Resources Topic Overview Resources Secure Login / Okta Secure Login, provided by Okta, allows … Password Regster a Phone Number Use Okta Verify to Log-in MobileIron MobileIron is mobile device management …
… and is compliant with Mass General Brigham’s Information Security and Privacy policies. New users can sign up for an … your Mass General Brigham or affiliate email address go in to Plans & Pricing in the top right corner to activate. If … Q: How do I change my email address in Constant Contact? Log into to your Constant Contact account Place your mouse …
… Partitions Slurm’s partitions are similar to ‘queues’ in other job schedulers like LSF on Scientific Computing … , you will have access to the installed software. (For security reasons we don't wish to have users with root … #SBATCH --time=00:10:00 #SBATCH --mem=8G #SBATCH --output=log.%j #SBATCH --error=logErrors.%j ## This is a comment ## …
… COVID19_Mart tables. Prerequisites Access your workspace in the Enclave as outlined in the article Get Started With … shared file will reconnect the shared drive whenever you log on to the Enclave Virtual Desktop. Click on the Finish … files, transfer between external devices , enclave secure collaboration, enclave, enclave secure, enclave …
… INFO: The PEAS Menu The PEAS Menu is available for download in the Self Service application; it is currently included … well as making sure devices that come on the network are secure. For a Mac, this is done through the ForeScout … Preferences and Quit. To reopen the PEAS Menu, you can log out and log back in of your Mac. Alternatively, you can …
… next arrow. Click the Get Started button Click the Sign in button. Enter your Primary Email Address and then click … Enter your User name (example: ABC0) then click the log in button You may be prompted to answer your security questions. Next enter your Password and click the …
… Enrollment for iOS These instructions are also available in PDF Format Requirements Device must be running on a … the Ivanti Go Configuration Open your Safari browser In the address bar, type http://enroll.partners.org  ; — … the authentication. If your device is not connected to a secure MGB WIFI network (i.e. PHSWIFI3), you will need to …
… or laptop computer or tablet) is protected with the latest security update. Here's an example of Google Chrome Updates . … Click Add Server or plus ( + ) sign to add a new server In the Connection Server field, enter my.analyticsenclave.org … Save or Move Files in the Enclave Virtual Desktop enclave secure collaboration, enclave, enclave secure, enclave …
… See TRBL: Zoom 40 Minute Limit for details. Zoom Sign-in Credentials Zoom uses a unique password separate from the … expiration? Licenses don’t expire, but a user can always log into their Zoom account at www.zoom.us to determine if …
… INFO: Cloud Security Risk Assessment Process Keywords : Amazon Web … the cloud needs defined and a cloud architecture solution in place, the business owner fills out an ISPO Cybersecurity … identities involved, will backups be required, how long logs will be retained, etc. The business owner will then fill …