Search40 Results

This article contains the contact methods available to seek direct assistance from YuJa's Support team.
UND Employees are not allowed to setup automatic forwarding from their UND email account to an external email address.
This article for students and instructors explains how users can choose which course's notifications they get, as well as the format they receive them in.
This article outlines the limits on sending emails through Microsoft with a UND email account and the limits associated with distribution groups.
Steps to update your personal email addresses in campus connection.
Need to report a phishing email? These steps will show you how to use the Phish Notify button within your O365 email account.
This is a step-by-step guide to installing and configuring the Evolution email client for Linux distributions. For Linux users, this represents the best option for connecting Office 365 Exchange Online aside from the Outlook Web App. (Note that this information is provided for informational purposes only. This is not an officially supported client in our environment.)
To build a successful online community, students need the tools to interact and have conversations. Through conversation, we learn about each other, ourselves, the topic, how to get along, and make group decisions. Though time and geography limit some of our conversations, the power of the connection using varied conversation technologies build community.

Students report that their satisfaction with online courses relates to instructor presence and the collaboration and sense of community the
How to access files or folders sent to you through LiquidFiles Secure File Share.
LiquidFiles Secure File Share can be found at https://sendfiles.ndus.edu.
This article shows how to download and install the Outlook plugin for LiquidFiles Secure File Share and where the plugin is found in Outlook.
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you now what you’re looking for.
Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information from your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you know what to look for. Here's a look at the anatomy of a typical phishing email
There has been an increase in phishing, fraud, and scam emails. Currently, this has taken the form of fraudulent job postings. Fake job postings come as unsolicited emails sent directly to your account or through an online job listing sites. We advise students, faculty, and staff to avoid being scam victims by following these guidelines: