Tech Articles Knowledge Base
Accessing MyDocs You can use MyDocs to access files from your computer or the Documents folder in a Tech Spot computer lab. MyDocs, storage, share, sharing, store, documents, my, docs, mapping, server, drive |
Activate Microsoft Office from Off Campus Activate your UARK licensed copy of Office 2010, 2013 or 2016 from off campus. activate microsoft office, off-campus, ms, remote, vpn, word, excel, powerpoint |
Active Directory Organizational Units (OU) Create and manage an Active Directory Organizational Unit. Network, Active Directory, Organizational Units, security groups |
Add UA Holidays to Exchange Calendar This article describes how to display all day, banner entries for university holidays in your Outlook calendar. Exchange, Calendar, UA Holidays, Outlook 2011, Outlook 2013, Outlook 2016 |
BASIS Print Setup for Windows Set up BASIS printing on non-networked computers in Windows. BASIS, printing, printer, print, windows xp, windows 7, printer setup |
BI/Data Warehouse for MS Access Work with BI/Data Warehouse using MS Access. BI/Data, Warehouse, MS, Microsoft, Access, query, database, business, intelligence |
Blackboard Collaborate With Blackboard Collaborate, users on campus or anywhere in the world can access virtual collaborative spaces to participate in online course sessions, office hours or committee meetings. web conferencing, blackboard, collaborate |
Blackboard Learn Visit bbhelp.uark.edu for help with Blackboard Learn. Blackboard, learn, stub |
CNAME Records CNAME records are aliases for existing A or AAAA records, and can stand alone or as part of a host record. In the Infoblox GUI, the terms “CNAME” and “alias” are used interchangeably. cname, see, name, sea, c, host, records, alias, aliases, A, AAAA, fqdn, canonical, DNS, domain name services, infoblocks, passages |
Clickers Visit clickers.uark.edu for help with Clickers. Clickers, classroom, feedback, stub |
Distribution Switch Locations Network distribution switches route campus network traffic to various buildings on campus. Network, Distribution, Switch, Locations, buildings, ethernet, routes, routing |
Eduroam Wi-Fi The University of Arkansas is an eduroam member, providing secure wireless access to visitors from participating institutions. eduroam, network, wi-fi, wifi, wireless, visitor, guest, visiting, faculty |
Email Filters Setting filters for spam or other messages in UARK Gmail or OWA allows you to indicate which messages you wish to block or redirect at the server level. Email, Security, Filters, filtering, rules, inbox, move, Spam, automatically, phishing, server-side, exchange, ProofPoint |
Exchange Email Rules Create, edit and delete rules with the Office 365 Outlook Web App. Rules allow you to automatically filter email into folders or set other commands. Email, Exchange, Outlook, rules, inbox, filtering, move, automatic, automated, delete rules, sort |
Exchange Online Sharing and Delegating Set up sharing and delegation of calendars and other items in Outlook. Exchange, Calendar, Sharing, Delegating, emails, emailing, delegation, shares, outlook, mailbox, mailing, resources, shared, permissions |
Exchange Resource Calendars Request and manage resource calendar accounts in Exchange. Exchange, Resource, Calendars, emails, emailing, outlook, rooms, projectors, location, equipment, reservations, reserve |
Exchange Setup for Macs Set up your Exchange mailbox in Outlook 2011, Outlook 2016, macOS Mail/OS X Mail. Email, Exchange, add, Outlook 2011, Outlook 2016, macOS Mail, OS X Mail, Setup, email setup, ical, calendar, faculty, staff |
Exchange Setup for Mobile Devices Set up your Exchange mailbox on a mobile device. Email, Exchange, iPhone, iPad, ios, android, tablet, exchange, faculty, staff, windows, mobile, device, add, setup, phone, windows |
Exchange Windows Setup Set up your faculty or staff Exchange Online mailbox in Outlook 2013 or Outlook 2016. email, exchange, e-mail, e mail, setup, set up, mailbox, mail box, office365, office 365, outlook, Outlook 2013, Outlook 2016, faculty, staff |
Find a DNS Entry Find the DNS entry for your computer or site. Networks, DNS, entry, entries, domain, name, servers, networking, ip address |
Finding Your IP Address Find your IP address and reset an IP address. Networks, networking, addresses, internet, protocol, reset, ipconfig, ifconfig |
Finding Your MAC Address Find your MAC address in Windows or Mac. Networks, networking, Mac, addresses, access, adapter, physical, ethernet |
Forwarding Email Set your UARK Gmail to automatically forward to a personal email account. email, forwarding, gmail, exchange, pop, imap |
Generic Email Settings Set up your UARK mailbox in an unsupported or open-source email client such as Thunderbird, MailBird, Zimbra Desktop, etc. Email, Exchange, Gmail, basic, Generic, Settings, setup, phone, mobile, imap, smtp |
Gmail Password for Older Apps gmail, imap, password, login, issue, problem, log-in |
Google Apps and Accessibility Guidelines While access to Google Apps offers powerful sharing and collaboration tools, the accessibility of files created in Google Apps may vary as Google continues with development of these tools. ADA, Accessibility, Guidelines, Google, Apps, Americans, disabilities, act, disability, disabled, impairments, blind, deaf |
Google Apps for Faculty and Staff Faculty and staff can use Google Apps to share Google Drive content with students by creating Google accounts using their Exchange account information. Google Apps, Faculty and Staff Accounts |
Host Records Host records consolidate DNS, DHCP and IP address information in single place. A single host record is equivalent to creating A, PTR, and CNAME resource records for an IPv4 address. names, ipv4, cname, name-to-address, address-to-name, create, creation, creating, domain name services, infoblox, infoblocks, blox, blocks, PTR, MAC, passage.uark.edu, passages |
IT Services Word Usage When writing documentation, check this list for proper word usage. Web Development, IT Services Word Usage |
Identity Finder Download and use Identity Finder, a software tool designed to prevent identity theft. Security, Identity Finder, personally identifiable information, sensitive information, Identity Finder Enterprise Edition, AnyFind Searching, Automatic Searching Using AnyFind Worldwide, OnlyFind Include List, Search Summary window, Scan a Custom Location, Shred Sensitive Data, credit card, PII |
Install Kofax Capture for Windows Download and install Kofax Capture for Windows. kofax, imaging, perceptive, scanning, batch, cofax |
Joining a Workstation to Active Directory Join Windows or Mac computers to Active Directory on campus. Network, Microsoft, Active Directory, Workstation Account, Windows Workstation, Mac Workstation |
Kofax Capture Pre-installation Steps Follow these steps to fulfill security requirements before installing Kofax Capture. kofax, imaging, perceptive, scanning, batch, cofax |
Listserv Settings Manage your subscribed mailing list settings, and mange Listservs you own. Emails, emailing, Mailing, Lists, Listserv, manages, managing, management, subscribes, subscriptions, subscribing, unsubscribe, unsubscribing, unsubscriptions |
MAC Filters MAC filters are used to make sure that the correct PXE booting options are sent to the correct clients in campus buildings occupied by multiple departments with local IT support. mack, filters, pxe, booting, adding, deleting, delete, manage, infoblox, dhcpadmin |
MATLAB Student Setup Students can download and activate MATLAB free of charge. MathWorks, data, analysis, analyze, visualization, computational, finance, analytics |
Maintenance Schedules Scheduled maintenance is performed on the following systems as needed within these published time frames. Maintenance Schedules, Open Systems, Campus Network, Blackboard Learn, Windows Servers, BASIS Mainframe |
Mapping a Drive This article includes common network locations, mapping a drive in Windows, and connecting to a server on a Mac. mapping, drive, fileshare, server, vpn, gizmo, mydocs, cavern, locations, smb, ftp, sftp |
Nebula Setup Instructions Follow the setup instructions for your first time accessing Nebula. Nebula is a cloud computing platform for research and development. vm, virtual, machines, openstack, stack, open, lamp, keypair, key, pair, instance |
Network Printing How to register a printer on the network. Networks, Printing, Networking, Printers, DHCP, connections, connecting, connects |
OU Security Groups in Active Directory Create and manage security groups in an Active Directory Organizational Unit. Network, Microsoft, Windows, Active Directory, OU Security Groups, RSAT, organizational units, distribution groups, create OU |
Office 365 Desktop Apps Install Office 365 apps like Excel, OneDrive, Outlook, OneNote, PowerPoint and Word on your Windows or Mac laptop or desktop. office 365, O365, office365, windows, mac setup, set up, install apps, applications, word, excel, powerpoint, onenote, outlook, onedrive, skype for business, power, point, one, drive, out, look, note |
Office 365 Mobile Setup Install and set up Office 365 apps like Excel, OneDrive, Outlook, OneNote, PowerPoint and Word on your iPhone, iPad or Android mobile devices. Office365, Mobile, Setup, office, 365, word, powerpoint, power, point, excel, note, Microsoft, software, downloads, productivity, onenote, onedrive, one, drive, note, outlook, out, look |
Office 365 OneDrive Manage your files with OneDrive. Office 365, OneDrive, one, drive, Microsoft, micro, soft, storage, files, management, stores, retrieve, retrieval, organize, save |
Office 365 Online Apps Office 365 allows you to use Office apps like Excel, OneDrive, Outlook, OneNote, PowerPoint and Word in your web browser without installing any software. 365, Office365, OWA, Outlook, web, app, WebApp, OneDrive, one, drive, Microsoft, out, look, onenote, note, excel, word, powerpoint, power, point, o365, office |
OneDrive Troubleshooting The Microsoft Office Support team provides troubleshooting tips relating to naming, uploading and syncing files with OneDrive. one drive, onedrive, office, 365, office365, troubleshoot, troubleshooting, trouble, shoot, saving, naming, files |
Password-protect Microsoft Office Files Protect student information or other sensitive data by requiring a password to open a Microsoft Office file. protection, password, secure, security, sensitive, data, save, password, excel, gradebook, grades |
Perceptive Content for Windows To work with large volumes of files, complex workflows, batch scanning and indexing, and bulk loading of documents, download and install the Perceptive Content application for Windows. Document, Management, Perceptive, content, workflows, Application, Windows, ImageNow, driver, storage, storing, retrieve, retrieval |
Phishing Scams Phishing scams have become much more sophisticated at imitating university communications, and IT Services encourages users to take care in evaluating email messages that purport to be from the university. Email, Security, Phishing, Scams, prevents, prevention, scamming, protection, protects, phish |
Printing from BASIS Selected items, such as reports, can be printed from a BASIS session using a networked printer or a printer attached to a networked computer. BASIS, print, printing, networked printer |
Printing from the Web With Web Print, you can submit PDFs or documents from Excel, Word and PowerPoint to any General Access Computing Lab printer on campus. Printing, PrintSmart, webprinting, web |
Quotas and Server Information Get quota information for servers hosted at the University of Arkansas. Email, data center, Cavern, Comp Server, Quota, Information, Exchange Online, Gizmo Server, Microsoft IIS Server, www1, MyDocs, Legacy Web Servers |
Real World Safety in the Virtual World Today's Internet is big business, and what happens online can have a big impact in your real world. Security, online safety, tips |
Report Abusive Email and Expand Headers Forward abusive email to abuse@uark.edu with expanded headers in UARK Gmail, Exchange, Outlook and macOS Mail (OS X Mail). email, security, report phishing, spam, abusive, expand headers, gmail, exchange |
Requesting SSL Certificates Generate SSL certificates and submit Certificate Signing Requests to the IT Services Security Team. comodo, certificates, signing, security, secure, ssl, certification, esig, esignature, e-signature, e-sign, esign |
SAS SAS is an integrated suite of analytics software products, available by site license and in the General Access Computing Labs Statistical, statistics, analytics, research, SAS, Mathematical Analysis, programming language, data analysis, license |
SAS Tutorial Information Faculty and students can access SAS e-Learning materials with a licensed copy of SAS. Statistical, Software, system, SAS, Tutorial, analytics, data, management, license |
SPSS SPSS site licenses are available for purchase from IT Services, and SPSS for Windows is available in computer labs. Statistical Software, SPSS, statistics, analytics, reporting, research, data management, statistical analysis |
Securing Sensitive Data University employees have a legal responsibility to protect personal faculty, staff and student data. security, securing sensitive data, personal, legal requirements, standards, protecting devices, protected, secure, antivirus, crashplan, crash plan, code of computing practices, hipaa, ferpa, fisma, glba, pcidss, pci/dss, pci, dss |
Securing Your Passwords Get tips and learn general best practices for saving and protecting your passwords. Security, Passwords, passphrases, pass phrases, Protecting, Password Safe Tools, Encrypted, Password Card, password apps |
Service Account Guidelines A UARK service account is intended to authenticate one system, subsystem or application to another. Service accounts are not intended for personal use. security, service account guidelines, authenticate, system, subsystem, request |
SharePoint Online Group Access SharePoint Online sites have three types of group access automatically given default permission levels. SharePoint, Groups, Permissions, Add Users, Remove Users, Delete a Group, Access, Site, development |
SharePoint Online Navigation Tools SharePoint Online includes a set of customizable navigation features to help users find content in lists, libraries, and sub-sites. SharePoint, Navigation, development, site, website, settings, global, sorting, editing, ribbon |
SharePoint Online Permission Levels The level of access for users on a SharePoint Online site can be customized by changing permissions. SharePoint, Permission, Levels, sub-sites, document, management, storage, stores, Microsoft |
SharePoint Online Permissions for Site Owners Using security groups to grant access to SharePoint Online sites department tech support, sharepoint, share point, security groups, managing, manage, organizational units, OU, site owners, administrators, active directory, email-enabled, permissions |
Sharing an Exchange Calendar Share and publish calendars in Outlook Web App. Exchange, Calendars, Sharing, emails, emailing, outlook, office365, office, 365, share, publish |
Skype for Business Mac Setup The Skype for Business application for Mac is available to faculty and staff through the Office 365 campuswide license. skype for business, mac, lync, videoconferencing, office365, office 365, skyping |
Skype for Business Mobile Setup Install and set up Skype for Business on an iPhone, iPad, Android or Windows mobile device. Before you get started, connect your mobile device to Wi-Fi. Skype, skype for business, setup, business, video, calls, calling, conferenceing, videoconferencing, skyping |
Skype for Business Windows Setup The Skype for Business application for Windows is available to faculty and staff through the campuswide Office365 license. skype for business, windows, videoconferencing, skyping, office365, office 365, chat, lync |
Software Updates and Backups Keeping your software up-to-date is as important—perhaps even more important—than keeping antivirus software updated. Security, Backup, Software, Updates |
Spam Spam is unsolicited bulk email—indiscriminate, network-wide broadcasted messages which distribute advertisements and solicitations. Security, Spam, Spoofing, Chain Email, Chain Letter, Code of Computing Practices, email |
Streaming Video with Kaltura Kaltura allows you to create and share videos in Blackboard. Kaltura, video, streaming, Blackboard, stub |
Style Guide for University Online Forms When creating online forms, use this guide for proper styles and labels. Web Development, Style Guide, Online Forms, Layout, Capitalization, Word Usage, Coding, CSS Styling, Validation, standards |
Technology Enhanced Classroom Document Camera Learn how to use the document camera in a Campus Standard Technology Enhanced Classroom. classrooms, podium, projector, standard, Document, Camera, display live images, Ladibug |
Technology Enhanced Classroom Equipment Status Check the status of equipment in Technology Enhanced Classrooms. technology enhanced classrooms |
Technology Enhanced Classroom Standard Locations Get a list of standard Technology Enhanced Classroom locations and contact information. classrooms, technology, enhanced, podium, desk, class |
Technology Enhanced Classrooms: Annotation Learn how to use annotation software in Campus Standard Technology Enhanced Classrooms. classrooms, display, podium, projector, Annotation, Open-Sankoré |
Technology Enhanced Classrooms: Other Locations Get a list of non-Campus Standard Technology Enhanced Classroom locations and contact information. Technology Enhanced Classrooms, Other Locations |
Test Scanning and Scoring Instructions Drop-off and self-service test scanning is available from 9 a.m. to 4 p.m., Monday through Friday, in Gibson Annex next to the Fine Arts building. testing, tests, scanner, self-service, faculty, pearson, forms |
Transfer UARK Gmail to a Personal Gmail Account Students can transfer their UARK Gmail account inbox to a personal Gmail account. leaving, graduating, graduate, email, transferring, forwarding, moved, moving |
UARK Gmail Mac Setup Connect to UARK Gmail in Outlook or macOS Mail (OS X Mail). Email, Gmail, Outlook, 2011, macos, OS X, Mail, apple, imap, student, uarkgmail, troubleshooting, add, gmail |
UARK Gmail Setup for Mobile Devices Connect to UARK Gmail on an iPhone, iPad, Android, or Windows Phone 7. Email, Gmail, Mobile, setup, device, student, add, troubleshooting, iPhone, ios, iPad, Android, Windows, 7, phone, tablet, gmail |
UARK Gmail Windows Setup Connect to UARK Gmail in Outlook 2010 and 2013. Email, Gmail, Windows, Outlook, 2010, 2013, add, setup, gmail |
UARK Wi-Fi Mac Setup Connect to UARK Wi-Fi using Mac OS X. Network, UARK Wi-Fi, Mac, wifi, internet, wireless, online, connection |
UARK Wi-Fi Mobile Setup Connect to UARK Wi-Fi using your mobile device. networks, wifi, mobile, apple, iphone, windows phone, wireless, internet |
UARK Wi-Fi Ubuntu Setup Connect to UARK Wi-Fi in Ubuntu using the correct security settings. networks, networking, wifi, ubuntu, linux, internet access, wireless |
UARK Wi-Fi Windows Setup Connect to UARK Wi-Fi with Windows. Network, Wi-Fi, Windows, setup, wifi, online, connection, internet, wireless, web |
VPN Mac Setup Install Pulse Secure to connect to the University of Arkansas virtual private network (VPN) using Mac OS X. VPN, vpn, virtual private network, mac setup, set up, pulse secure, junos, installer, libraries, library, work from home |
VPN Mobile Setup Install Pulse Secure for iOS or Android to connect to the University of Arkansas virtual private network (vpn) from your mobile device. VPN, virtual, private, network, Mobile, setup, Pulse, Secure, drivers |
VPN Windows Setup Install Pulse Secure to connect to the University of Arkansas virtual private network (VPN) using Windows. VPN, virtual private networks, windows setup, set up, pulse secure, library |
Wipe Data from Stolen or Lost Mobile Device If your phone is lost, stolen or otherwise compromised, you can remotely wipe its data using the Office 365 Outlook Web App, protecting your identity and sensitive data. Exchange, wipe, stolen, lost, phone, remove, faculty, staff, mobile, tablet, sensitive, data, secure, security |
Writing Verifiable Emails A legitimate email can easily be disregarded as spam or a phishing attempt, creating a problem when important information that requires follow-up on the part of the recipient is ignored. Security, verifiable, anti-phishing, antiphishing, prevent, avoid, scam, email, phishing, spam, avoid |