Search 1201 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Working with themes in NUsites
Northwestern University branding, you can use the Northwestern (Global) theme. This theme aligns with the branding guidelines set by the Northwestern University department of Global Marketing and
OnBase Unity Client Installation
The OnBase Unity Client is used for student hiring and HR document management. ... The OnBase Unity Client is used primarily by supervisors of student workers for the student hiring workflow. Library HR staff use Unity for the student hiring workflow and for ingest, storage and
Saving a complete copy of an email message
phishing or spam message and would like to report it, use the instructions below to save a complete copy of the message that includes both the full header and the message itself. Once you have the copy
Understanding the GL074 Financial Summary Report in Cognos Analytics
Use the GL074 Financial Summary to see chart strings filtered by Management Level, Project Purpose, and/or Manager/Reviewer. This report resembles the GL070, with the addition of management levels
SESP Technology Project Management
SESP Technology team project management related requests and task. ... Members of the SESP Technology team may select this service category for all tickets used to track SESP Technology team projects and tasks.
Available to
SESP Technology team members
Cost
N/A
How to Request Service
Click the "Request Service" button to the right.
Modern Authentication FAQ
clients?
Northwestern IT recommends and supports Outlook Web App for Linux users. Should you prefer a client solution, it is the responsibility of schools and departments to select and support a usable
TDX Interacting With Email
TeamDynamix is through email, which can be a convenient and effective way to manage service requests, when used properly. In this article, we will discuss the ways one can interact with TeamDynamix via
Managing your profile visibility in Our Northwestern
category has specific fields that can be managed. You may choose to set visibility of information to only yourself, to your connected friends within the site, or to registered users. Setting visibility to
Video Production Studio (Mudd)
, equations, and sketches, all while engaging with the camera and viewers.
The Libraries’ offer quarterly workshops on using the Video Production Studio. See the Libraries’ events page for upcoming
Eduroam CAT Installer for MacOS
If you are experiencing issues connecting to eduroam please use the following installer to automatically configure your device to connect to eduroam.
Forget or delete any listed eduroam
Enter Receipt via Add/Update Receipts in NUFinancials (Training Guide)
orders of $5,000 or more. Please enter receipts as soon as possible after receiving the product or service.
Can you use Add/Update Receipts to enter receipts for any non-catalog purchase order?
Yes
NUworkspace: Mapping a RDSS Drive
://northwestern.apporto.com”, and log in to the system using your credentials.
Click the App Store icon in the Navigation panel.
The ‘App Store’ screen displays. You can select any of your research
Quest Quick Start Guide
video tutorial Navigating Quest via Shell.
Once you've logged into Quest, you will begin in your Home directory: /home/<NetID>. The home directory has 80GB of storage and is backed up nightly. Backups
Microsoft Planner
Microsoft Planner, is a project management platform within the Microsoft 365 applications and add-ins that enables users to create and manage plans and tasks on various ad-hoc projects. ... Microsoft Planner, is a project management platform within the Microsoft 365 applications and add-ins that enables users to create and manage plans and tasks on various ad-hoc projects. The tasks are
Vulnerability Assessment
Northwestern IT's Information Security Office maintains and operates a Vulnerability Assessment Program to assist schools and departments in the auditing, identification, and remediation of security vulnerabilities in its own network infrastructure, related devices, and web services. ... workstations, servers, devices, and the overall security of the network infrastructure
Coordination, collaboration, and general technical consulting before, during, and after the assessment.
Follow-up