Top Documents of the Week

  1. Excel (Mac) - How to password protect and encrypt a workbook
  2. Excel (Win) - How to password protect and encrypt a workbook
  3. Word (Mac) - How to password protect and encrypt a document
  4. Encryption - Types of encryption and key concepts
  5. Phishing Detection and Remediation
  6. Identity Finder - What is Identity Finder?
  7. Palo Alto Next Generation Firewall - Rulesets on UW-Madison Wireless and WiscVPN networks
  8. Identity Finder - Using Regular Expressions to Find Custom Data
  9. Identity Finder - Administrator FAQ
  10. Identity Finder - Creating a Custom Identity Finder Installer for Windows
  11. Identity Finder (Win) - Installing Identity Finder Enterprise Client
  12. Identity Finder - Creating a Custom Spirion (Identity Finder) Installer for Mac
  13. Identity Finder - How to Save and Retrieve the Results of a Scan
  14. Identity Finder (Win) - Advanced Searching
  15. Identity Finder (Win) - Using a Profile Password
  16. Identity Finder - Creating and Using Policies
  17. Identity Finder (Mac) - Installing Identity Finder Mac Edition
  18. Identity Finder (Mac) - Using a Profile Password
  19. Identity Finder (Mac) - Taking Action on the Scan Results
  20. Identity Finder - Creating and Using Reports
  21. Word (Win) - How to password protect and encrypt a document
  22. Identity Finder - Regular Expressions to Find SSN Based Photo IDs
  23. Encryption - Encryption Tools Matrix
  24. Identity Finder - Understanding Tags in the Console
  25. Identity Finder - Effective Remediation Strategies with Identity Finder
  26. Identity Finder (Win) - Scanning Emails
  27. Identity Finder (Win) - Taking Action on the Scan Results
  28. Identity Finder (Mac) - Performing a Scan
  29. Identity Finder (Win) - Scheduling a Scan Using the Client
  30. Identity Finder - Running Console Service Jobs
  31. Identity Finder - Getting Started with Identity Finder for IT Administrators
  32. OpenSSL - Heartbeat Vulnerability (aka "Heartbleed") Information
  33. Mass Emailing Guidelines
  34. Identity Finder (Mac) - Advanced Searching
  35. Identity Finder - Scheduling a Scan from the Console
  36. Reporting Restricted Data
  37. Identity Finder (Win) - How Console Data is Generated
  38. Encryption - Issues to Consider Before Implementing Encryption
  39. Identity Finder (Mac) - Scanning Emails
  40. Identity Finder (Win) - Performing a Scan
  41. UW-Madision Enterprise Box for HIPAA data
  42. SSL Installing Intermediate Certificates
  43. SSL Certificates - How to verify that your intermediate certificates are installed correctly
  44. SSL Certificate FAQs
  45. SSL Certificate Types and Purposes
  46. SSL Wildcard Certificates
  47. SSL Certificate Service
  48. SSL CertificateTrust Chains
  49. SSL Certificate Tools
  50. SSL Certificate Support
  51. Campus Network - Determining Whether a Site is Blocked by DNS
  52. SSL - Requesting a SSL Server Certificate
  53. Securing Printers

Number of documents to list: 20  30  40  50  60  70  80  90  100  110  120