Top Documents of the Week

  1. Word (Mac) - How to password protect and encrypt a document
  2. Excel (Win) - How to password protect and encrypt a workbook
  3. Excel (Mac) - How to password protect and encrypt a workbook
  4. Encryption - Types of encryption and key concepts
  5. Encryption - Issues to Consider Before Implementing Encryption
  6. Phishing Detection and Remediation
  7. Identity Finder (Win) - Installing Identity Finder Enterprise Client
  8. Identity Finder - What is Identity Finder?
  9. Identity Finder - Creating a Custom Identity Finder Installer for Windows
  10. Identity Finder - Administrator FAQ
  11. Identity Finder - Creating and Using Reports
  12. Palo Alto Next Generation Firewall - Rulesets on UW-Madison Wireless and WiscVPN networks
  13. OpenSSL - Heartbeat Vulnerability (aka "Heartbleed") Information
  14. Identity Finder - Understanding Tags in the Console
  15. Mass Emailing Guidelines
  16. Identity Finder (Win) - Advanced Searching
  17. Identity Finder - Using Regular Expressions to Find Custom Data
  18. Encryption - Encryption Tools Matrix
  19. Word (Win) - How to password protect and encrypt a document
  20. Identity Finder (Mac) - Using a Profile Password
  21. Identity Finder - Scheduling a Scan from the Console
  22. Identity Finder - Creating and Using Policies
  23. Identity Finder (Mac) - Advanced Searching
  24. Identity Finder - Creating a Custom Spirion (Identity Finder) Installer for Mac
  25. Identity Finder - How to Save and Retrieve the Results of a Scan
  26. Identity Finder (Win) - Using a Profile Password
  27. Identity Finder - Regular Expressions to Find SSN Based Photo IDs
  28. Identity Finder (Mac) - Taking Action on the Scan Results
  29. Identity Finder (Win) - Scanning Emails
  30. Identity Finder (Mac) - Scanning Emails
  31. Cisco AMP - Creating Exclusions & Whitelisting Files
  32. Identity Finder - Getting Started with Identity Finder for IT Administrators
  33. Identity Finder (Win) - Taking Action on the Scan Results
  34. Identity Finder - Running Console Service Jobs
  35. Identity Finder - Effective Remediation Strategies with Identity Finder
  36. Identity Finder (Mac) - Installing Identity Finder Mac Edition
  37. Identity Finder (Win) - Scheduling a Scan Using the Client
  38. Identity Finder (Mac) - Performing a Scan
  39. Reporting Restricted Data
  40. Identity Finder (Win) - How Console Data is Generated
  41. Identity Finder (Win) - Performing a Scan
  42. UW-Madision Enterprise Box for HIPAA data
  43. SSL Installing Intermediate Certificates
  44. SSL Certificates - How to verify that your intermediate certificates are installed correctly
  45. SSL Certificate Types and Purposes
  46. SSL Certificate FAQs
  47. SSL Wildcard Certificates
  48. SSL - Requesting a SSL Server Certificate
  49. SSL Certificate Support
  50. SSL Certificate Service
  51. SSL CertificateTrust Chains
  52. SSL Certificate Tools
  53. Securing Printers
  54. Campus Network - Determining Whether a Site is Blocked by DNS

Number of documents to list: 20  30  40  50  60  70  80  90  100  110  120