Skip to Knowledge Base content

Recently Modified Articles

How to use two-factor authentication with the Junos Pulse client.
At the University of Wyoming, Two-Factor Authentication is required for all off-campus logins accessing UW systems and applications.
One of the most common forms of a phishing attack in higher education environments is official looking emails claiming to be from the university’s technical support team and usually taking the form of a message asking for your user ID and password, with a threat of account deactivation if you fail to reply. These specifically crafted phishing attempts are primarily focused on gaining access to email accounts to enable them to send malicious emails to other systems with the appearance of coming
Two-factor authentication strengthens access security by requiring two methods to verify your identity.  These methods can include something you know -- like a username and password, plus something you have -- like a smartphone app to approve authentication requests.
Two-factor authentication adds a second layer of security to the log-in process, keeping your account secure even if your password is compromised. The University of Wyoming uses Duo to provide two-factor authentication services. The full Duo Guide to Two-Factor Authentication contains updated instructions and can be viewed by visiting
Directions if you need to re-add your duo mobile account.
How to navigate to and schedule the account analysis report from Scheduled Processes. Formating the report for use using the account analysis pivot macro.
Tips and advanced features of the Account Analysis Pivot Macro.
Information on how to connect on a Mac to UWStudent and Classfiles storage
Information about the drive map location
How to access and read the TouchNet Deposit Detail Report.
Install SAS JMP Pro v.13 Windows Installation from the UW Network
Please note this report is being retired. To obtain budget information budget information previously obtained via this report, please use the Budget by Account Report.
How to use the web based time clock to clock in and out.
How to enter an expense report.
Information Technology does not recover deleted or lost email items. However, if you accidentally delete email from your Microsoft Outlook Exchange mailbox, you can usually recover it for up to 30 days after the deletion occurs. When an email is first deleted, it is moved to the Deleted Items folder. Until this folder is emptied, you can move items back from it into your Inbox or any other folder for 30 days from the time the email was moved to the Deleted Items folder. If the items in the  Dele
Information on how to recover deleted items in outlook
Information on how to restore deleted file on OneDrive