Top Documents of the Week

  1. Word (Mac) - How to password protect and encrypt a document
  2. Palo Alto: Firewall Log Viewing and Filtering
  3. LastPass - How do I import passwords from KeePass?
  4. LastPass - Downloading the LastPass Browser Extensions/Desktop Apps/Mobile Apps
  5. Excel (Win) - How to password protect and encrypt a workbook
  6. Palo Alto: HIP Features - VPN, Host-Info and Firewall Security
  7. Palo Alto: Security Zones, Profiles and Policies (Rules)
  8. Palo Alto: Making URL Exceptions To Your URL-Filtering Security Profiles
  9. Phishing Detection and Remediation
  10. Endpoint Security - Campus Symantec License Expiration
  11. Palo Alto: Application ID
  12. Recommended Antivirus Solutions & Cybersecurity Roadmap
  13. Palo Alto: Security Profiles
  14. Word (Win) - How to password protect and encrypt a document
  15. Spirion (Identity Finder) - Scheduling a Scan Using the Client (Win)
  16. LastPass - Opting-in and Activating Your LastPass Enterprise Account
  17. OneTrust - Common requests made via OneTrust
  18. LastPass - How to create an account for UW work related activities
  19. OneTrust - How to access OneTrust
  20. OneTrust - Risk Management Workflow Stages
  21. Cybersecurity Elastic Logging Service
  22. LastPass - What’s the Difference Between LastPass Enterprise, LastPass Premium, and LastPass Free Accounts?
  23. OneTrust - Using the Risk Dashboard
  24. LastPass - How Do I Add a Password or a Secret to LastPass?
  25. OneTrust - Assessment Stages
  26. Spirion (Identity Finder) - Taking Action on the Scan Results
  27. LastPass - How Do I Link/Unlink My LastPass Premium/LastPass Free Account to/from My LastPass Enterprise Account?
  28. Encryption - Encryption Tools Matrix
  29. Palo Alto: Firewall Administrative Access Confirmation
  30. Cisco AMP - Collaborative Teams Group for AMP Admins & Training Video
  31. LastPass - What if I Have Multiple LastPass Enterprise Accounts?
  32. CyberArk - Add users to a Safe (for Safe Managers)
  33. Palo Alto: Security Policies
  34. Trend Micro - Introduction to Trend Micro AV for Personally Owned macOS Devices
  35. Palo Alto Next Generation Firewall - Rulesets on UW-Madison Wireless and WiscVPN networks
  36. Built-in Protection for macOS
  37. LastPass - What if I am Unable to Recover My Master Password?
  38. CyberArk - View accounts
  39. Encryption - Issues to Consider Before Implementing Encryption
  40. CyberArk - Safe Members
  41. OneTrust - Viewing and Using Dashboards
  42. CyberArk - How to add an account
  43. LastPass - How to create an account for non-UW work related activities
  44. CyberArk - Search Accounts
  45. LastPass - How Do I Backup My Credentials?
  46. CyberArk - Safes
  47. What is the Cybersecurity Risk Register?
  48. Spirion (Identity Finder) - Guide to the Administrative Console
  49. Excel (Mac) - How to password protect and encrypt a workbook
  50. Palo Alto Firewalls: Creating Custom Reports
  51. Spirion (Identity Finder) - Performing a Scan with the Local Client
  52. Spirion (Identity Finder) - How to Save and Retrieve the Results of a Scan
  53. LastPass - Can I Have More Than One Account or Account Type?
  54. Security Tools - Communities of Practice for Security Administrators
  55. Cybersecurity Awareness Training - FAQs
  56. HIPAA O365 Controls - How do I auto-forward my @wisc.edu email to another domain?
  57. LastPass - What Happens to My Shared Folders When I Leave the University?
  58. LastPass - Why Use LastPass Enterprise?
  59. LastPass - UW–Madison LastPass Enterprise Service Terms of Use
  60. LastPass - What if I Used My NetID@wisc.edu Email Address to Sign Up for a LastPass Free or LastPass Premium Account?
  61. LastPass - Can I Use My LastPass Enterprise Vault to Store My NetID Credentials? Should I?
  62. OneTrust - How to request permission changes for SecureBox
  63. OneTrust - How to request advanced access
  64. LastPass - Does LastPass Keep a Record of My NetID Login Credentials?
  65. Encryption - Types of encryption and key concepts
  66. Palo Alto Network Firewall Advanced Protection Implementation Summary
  67. OneTrust - Risk Workflow Procedure
  68. LastPass - Why Use LastPass Premium?
  69. OneTrust - Common Risk Terms and Definitions
  70. OpenSSL - Heartbeat Vulnerability (aka "Heartbleed") Information
  71. Spirion (Identity Finder) - Using Regular Expressions to Find Custom Data
  72. OneTrust - Viewing Risk Details
  73. OneTrust - Configuring and Filtering the Risk Register
  74. LastPass - What if I Already Have a LastPass Account?
  75. LastPass - How Do I Sign Up for LastPass Premium?
  76. Cisco AMP - Running a Scan from the Local GUI
  77. LastPass - How Do I Set Up Master Password Recovery Options?
  78. Spirion (Identity Finder) - Advanced Searching
  79. Reviewed Tools - Globus
  80. Cybersecurity Announcement - PrintNightmare Windows Zero-Day
  81. LastPass - What Cyberattacks Does LastPass Help Protect Me From?
  82. Endpoint Security - FAQ for the Endpoint Protection Project
  83. LastPass - Should I Use LastPass Enterprise or LastPass Premium?
  84. LastPass - What Happens to My Accounts When I Leave the University?
  85. OneTrust - How to change your default "Organization"
  86. HIPAA O365 Controls - How to allow a user to set an auto-forward to approved domains.
  87. LastPass - Can My Stored Passwords Be Made Available Offline?
  88. HIPAA O365 Controls - Controls implemented for the UW-Madison Health Care Component
  89. Protect Against The Threat of Ransomware
  90. LastPass - Using the browser extension
  91. LastPass - Is it Possible to Change from Master Password Login to NetID Login?
  92. LastPass - Installing the browser extension
  93. LastPass - How Do I Use the LastPass Browser Extensions?
  94. LastPass - Does LastPass Keep a Record of My Master Password?
  95. Trend Micro - Installing Trend Micro AV on Your Personally Owned macOS Device
  96. LastPass - How to create a strong and memorable password
  97. OneTrust - Creating a New Risk From the Risk Register
  98. CyberArk - Glossary
  99. LastPass - How to download native apps
  100. CyberArk - How to login to CyberArk

Number of documents to list: 20  30  40  50  60  70  80  90  100  110  120