Top Documents of the Week

  1. Excel (Win) - How to password protect and encrypt a workbook
  2. Trend Micro - Installing Trend Micro AV on Your Personally Owned macOS Device
  3. Palo Alto: Firewall Log Viewing and Filtering
  4. Excel (Mac) - How to password protect and encrypt a workbook
  5. Endpoint Security - Cybersecurity Roadmap & Recommended Antivirus Solutions
  6. Palo Alto: Security Zones, Profiles and Policies (Rules)
  7. Palo Alto: Making URL Exceptions To Your URL-Filtering Security Profiles
  8. Encryption - Types of encryption and key concepts
  9. Cybersecurity Elastic Logging Service
  10. Phishing Detection and Remediation
  11. Endpoint Security - Campus Symantec License Expiration
  12. Trend Micro - Introduction to Trend Micro AV for Personally Owned macOS Devices
  13. How to access OneTrust
  14. Palo Alto: HIP Features - VPN, Host-Info and Firewall Security
  15. Palo Alto: Security Profiles
  16. Cisco AMP - Running a Scan from the Local GUI
  17. Spirion (Identity Finder) - Guide to the Administrative Console
  18. Word (Mac) - How to password protect and encrypt a document
  19. Palo Alto Next Generation Firewall - Rulesets on UW-Madison Wireless and WiscVPN networks
  20. Built-in Protection for macOS
  21. Encryption - Issues to Consider Before Implementing Encryption
  22. Spirion (Identity Finder) - Understanding Tags in the Console
  23. Palo Alto: Application ID
  24. Spirion (Identity Finder) - Effective Remediation Strategies with Identity Finder
  25. Spirion (Identity Finder) - Creating a Custom Identity Finder Installer
  26. Spirion (Identity Finder) - Getting Started with Spirion for IT Administrators
  27. HIPAA O365 Controls - How do I auto-forward my email to another domain?
  28. UW Firewall Administration Policy Summary
  29. Palo Alto Network Firewall Advanced Protection Implementation Summary
  30. Spirion (Identity Finder) - Administrator FAQ
  31. UW-Madison Palo Alto Firewall Services Readme
  32. Encryption - Encryption Tools Matrix
  33. Spirion (Identity Finder) - How to Save and Retrieve the Results of a Scan
  34. Spirion (Identity Finder) - Scanning Emails
  35. Spirion (Identity Finder) - Taking Action on the Scan Results
  36. Spirion (Identity Finder) - Using Regular Expressions to Find Custom Data
  37. Spirion (Identity Finder) - Performing a Scan
  38. Palo Alto Firewalls: Creating Custom Reports
  39. Cisco AMP - Collaborative Teams Group for AMP Admins & Training Video
  40. Spirion (Identity Finder) - Scheduling a Scan Using the Client (Win)
  41. OpenSSL - Heartbeat Vulnerability (aka "Heartbleed") Information
  42. HIPAA O365 Controls - Controls implemented for the UW-Madison Health Care Component
  43. Trend Micro - Getting Help from Customer Support
  44. Palo Alto: Security Policies
  45. Spirion (Identity Finder) - Advanced Searching
  46. FERPA & HIPAA Crosswalk
  47. Endpoint Security - FAQ for the Endpoint Protection Project
  48. Spirion (Identity Finder) - Using a Profile Password
  49. Word (Win) - How to password protect and encrypt a document
  50. HIPAA O365 Controls - How to allow a user to set an auto-forward to approved domains.
  51. Palo Alto: Firewall Administrative Access Confirmation
  52. WiscVPN GlobalProtect VPN
  53. Help Desk - Which tool should I use? Blackboard Collaborate Ultra, Google Hangouts Meet, Cisco Webex , Microsoft Teams, Zoom
  54. LastPass - How do I import passwords from KeePass?
  55. KnowledgeBase Search Tips
  56. Remote Working and Learning - Tools to Access Campus Resources Remotely
  57. SSL Certificate Types and Purposes
  58. SSL Certificates - How to verify that your intermediate certificates are installed correctly
  59. SSL Installing Intermediate Certificates
  60. SSL Certificate FAQs

Number of documents to list: 20  30  40  50  60  70  80  90  100  110  120