Skip to main content
Help Center
  • Home
  • Get IT Help
  • Share Knowledge
  • Tech Alerts

Information Security

  1. Return to Help
  2. Information Security
  3. Procedures

Procedures

Last modified 4/3/2020

Step-by-step documents that provide a specified way of completing a process or activity.

  • Data Usage Form (DUF) Procedure
  • Deploying a ConfigMgr Antimalware Policy Procedure
  • Deploying a ConfigMgr Configuration Baseline Procedure
  • Deploying a ConfigMgr Microsoft Defender for Endpoint Policy Procedure
  • InCommon Certificate Request Procedures
  • Linking a Group Policy Object Procedure
  • Monitoring a ConfigMgr Configuration Baseline Procedure
  • Out-of-Band Access Request Procedures
  • Query Devices for Users that are Local Administrator Procedure
  • Ransomware Response Procedure
  • User Account Review Request Procedure

Explore Procedures

  1. Data Usage Form (DUF) Procedure
  2. Deploying a ConfigMgr Antimalware Policy Procedure
  3. Deploying a ConfigMgr Configuration Baseline Procedure
  4. Deploying a ConfigMgr Microsoft Defender for Endpoint Policy Procedure
  5. InCommon Certificate Request Procedures
  6. Linking a Group Policy Object Procedure
  7. Monitoring a ConfigMgr Configuration Baseline Procedure
  8. Out-of-Band Access Request Procedures
  9. Query Devices for Users that are Local Administrator Procedure
  10. Ransomware Response Procedure
  11. User Account Review Request Procedure

Help Topics

  • Technology
  • Software Catalog
  • Accessibility
  • Information Security
  • Identity and Access Management

Help Center

Contact Us

Illinois State
university
Illinois' first public university

© 2024 Illinois State University, Normal, IL USA

  • Privacy Statement
  • Appropriate Use Policy
  • Accessibility
Closing menu Closing Menu
  • × Close Menu
  • Illinois State
  • My Illinois State

Help Center

University Resources

  • My Illinois State
  • Map
  • Admissions
  • News
  • Events
  • Giving
Closing menu Closing Menu