Search38 Results
- Knowledge Base
- Accounts and Security
- IT Security
- Phishing
Need to report a phishing email? These steps will show you how to use the Phish Notify button within your O365 email account.
- Knowledge Base
- Microsoft 365 and Email
- Office 365
This is a step-by-step guide to installing and configuring the Evolution email client for Linux distributions. For Linux users, this represents the best option for connecting Office 365 Exchange Online aside from the Outlook Web App. (Note that this information is provided for informational purposes only. This is not an officially supported client in our environment.)
- Knowledge Base
- Teaching and Learning
- Blackboard
- Instructors
To build a successful online community, students need the tools to interact and have conversations. Through conversation, we learn about each other, ourselves, the topic, how to get along, and make group decisions. Though time and geography limit some of our conversations, the power of the connection using varied conversation technologies build community.
Students report that their satisfaction with online courses relates to instructor presence and the collaboration and sense of community the
- Knowledge Base
- Accounts and Security
- IT Security
- LiquidFiles Secure File Share
- From a browser
How to access files or folders sent to you through LiquidFiles Secure File Share.
- Knowledge Base
- Accounts and Security
- IT Security
- LiquidFiles Secure File Share
- From a browser
- Knowledge Base
- Accounts and Security
- IT Security
- LiquidFiles Secure File Share
- From the Outlook Plugin
This article shows how to download and install the Outlook plugin for LiquidFiles Secure File Share and where the plugin is found in Outlook.
- Knowledge Base
- Accounts and Security
- IT Security
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you now what you’re looking for.
- Knowledge Base
- Accounts and Security
- IT Security
- Phishing
Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information from your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you know what to look for. Here's a look at the anatomy of a typical phishing email
- Knowledge Base
- Accounts and Security
- IT Security
- Phishing
There has been an increase in phishing, fraud, and scam emails. Currently, this has taken the form of fraudulent job postings. Fake job postings come as unsolicited emails sent directly to your account or through an online job listing sites. We advise students, faculty, and staff to avoid being scam victims by following these guidelines:
- Knowledge Base
- Microsoft 365 and Email
Common problems you might encounter trying to log in to your UND email account.
- Knowledge Base
- Microsoft 365 and Email
Steps to log in to your UND email.
- Knowledge Base
- Teaching and Learning
- Blackboard
- Instructors
When an Announcement is added to a course, students are automatically able to see the announcement in the My Announcements module after logging into Blackboard.
If you wish to also send an email notification to each student, you must select "Send a copy of this announcement immediately" when creating the announcement.
- Knowledge Base
- Teaching and Learning
- Blackboard
When you send email from your course, the recipients receive it in their external email accounts, such as BobSmith@yahoo.com. Replies go to your email account, not to the course. You may want to set up a filter or message rule to easily group your course email into a single folder in your personal inbox.
- Knowledge Base
- Accounts and Security
- IT Security
This article outlines the limits on sending emails through Microsoft with a UND email account and the limits associated with distribution groups.
- Knowledge Base
- Accounts and Security
A complete guide to getting all your accounts and tech ready for your first semester at UND.