Skip to main content

Common Accounts

May 18, 2017

This content is Onyen protected. Please enter your Onyen to log in and view it.

Bitlocker

May 15, 2017

This content is Onyen protected. Please enter your Onyen to log in and view it.

Access Control Guidelines

April 27, 2016

Document describes how to set folder privileges on storage.unc.edu Group naming convention SOP_M-folder.subfolder-permission Permission is either LF, R or F List Folder (LF) This allows for folder traversal, should be used sparingly to avoid deeply nested / confusing inheritance structures. … Read more

Lock Computer When Left Unattended

July 24, 2015

If you leave your computer unattended make sure to lock the computer to prevent someone from sitting at the console and using the computer under your account.  Locking your computer will require your login password to be entered in order … Read more

Configure RHEL7

June 22, 2015

This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy. The following scripts can be used to configure the system. https://adminliveunc.sharepoint.com/sites/pharmacy/itsop/Downloads/rhel7_setup.zip   Monthly … Read more

Backup Your Computer

January 21, 2015

This document provides a discussion of computer backup solutions and our recommendations. For computer backups we generally distinguish between two types: file and image. A file backup is simply a copy, or snapshot, of a set of files at a … Read more