Skip to main content

Access Control Guidelines

April 27, 2016

Document describes how to set folder privileges on storage.unc.edu Group naming convention SOP_M-folder.subfolder-permission Permission is either LF, R or F List Folder (LF) This allows for folder traversal, should be used sparingly to avoid deeply nested / confusing inheritance structures. … Read more

FTE Directory Information

April 4, 2016

This is an example of using the active-directory powershell module to query directory information. This script produces a count of all employees (faculty and staff) by Connect Carolina division number as well as comma separated list consisting of {division number, employee … Read more

Drag-n-Drop [mis]Behavior

March 22, 2016

Occasionally we receive requests about files being accidentally moved after a drag and drop operation where the intention was to copy the file. Drag and drop changes behavior based on the source from which you’re dragging and the destination where you’re dropping: … Read more

Setup Network Printer

January 26, 2016

This content is Onyen protected. Please enter your Onyen to log in and view it.

Prepare for External Vendor On-Site Support

January 8, 2016

Please notify itsop@unc.edu at least 24 hours prior to scheduled computer assistance provided by an external vendor (e.g., instrument, software, device manufacturers, etc.) by following the Request Admin Rights procedure.

Find Computer Serial Number

September 1, 2015

Many computer hardware vendors use the serial number to uniquely identify a system for the purpose of maintenance requests, warranty inquiries, etc. Typically the serial number can be found somewhere on the exterior of the case but here are a … Read more

File Naming and Organization Guidelines

August 11, 2015

Only use alphanumeric characters (i.e., A-Z, 0-9), space, hyphen or underscore in file names.  A reference for reserved characters can be found here for Mac and here for Windows.  Pay special attention when copy/pasting from a program to a filename to … Read more

Lock Computer When Left Unattended

July 24, 2015

If you leave your computer unattended make sure to lock the computer to prevent someone from sitting at the console and using the computer under your account.  Locking your computer will require your login password to be entered in order … Read more

Configure RHEL7

June 22, 2015

This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy. The following scripts can be used to configure the system. https://adminliveunc.sharepoint.com/sites/pharmacy/itsop/Downloads/rhel7_setup.zip   Monthly … Read more