This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See
https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers. Once both those requests have been fulfilled, then you can use the instructions in this article.
This article provides a checklist of items for you to go through to ensure you have everything you need from your old computer before you return it to Enterprise Technology & Services (ET&S) when picking up your replacement device.
This article is designed to outline the standard patch processes across USNH managed computers.
This article provides information about the USNH Endpoint Management life cycle process and support provided through Enterprise Technology & Services (ET&S).
The purpose of this article is to provide current ET&S guidelines for determining when a USNH owned device is at the end of its lifecycle.
This article provides frequently asked questions and answers regarding managed endpoints, endpoint protection, and replacing managed computers at USNH.
This article provides additional information for established and approved USNH endpoint management standards and policies.
Jamf Connect is tool that allows users' to log into their Macs using their USNH username and password without being bound to the USNH domain. This article introduces the user to the components of Jamf Connect.
This article explains Jamf Pro, an IT and asset management system used by USNH.
This article provides steps for Mac users who experience an issue where videos suddenly play extremely fast, play without sound, or behave abnormally after waking their Mac from sleep. This quick guide explains how to fix the problem without needing to restart your computer.
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
This article shows how to install applications from Company Portal on USNH Windows workstations managed by Microsoft Intune.
This article shows how to install Windows Updates from Settings on Intune managed Windows workstations.
This article describes some changes USNH faculty and staff may see on their USNH-managed computers as we move to a new management solution called "Intune".
This article will give you instructions on how to run an On-Demand Scan with Crowdstrike on a Windows device.
This article shows how to view the Windows BitLocker Recovery Key.