Each Thursday, the UIS Service Desk shares important updates and tips to keep CU System employees more informed and secure. Tech Tip Thursday emails include helpful information, resources and basic troubleshooting tips, in service of one the UIS Service Desk’s primary goals: Empowering System employees to accomplish tasks and resolve issues.

Here are some recent Tech Tips, but System employees are encouraged to keep an eye on their inbox each Thursday for a new round of Tech Tips.

Have a suggestion for a Tech Tip topic? Let us know!

CO exposure notification, adding reminders to e-mails and more, Nov. 19


The Colorado Department of Public Health & Environment launched CO Exposure Notifications on Oct. 25 to track COVID exposure throughout Colorado. The new system is a smartphone-based tool that anonymously alerts users who have been in close proximity to someone who has tested positive for COVID-19. 

This is a free service used through the phone’s Bluetooth, and it can notify you if a person nearby has tested positive for COVID-19. Users can also share that they have tested for COVID-19 anonymously.

With this technology, there is no use of GPS, location data or any personal information; it is completely voluntary, Android or Apple users can choose to opt-in or opt-out at any time. Being informed about an exposure can help you reduce the risk of spreading the virus.

Follow these steps to enable this tool on your phone:


  1. Download and install CO Exposure Notifications from the Google Play Store

Apple (iOS 13.7 or higher):

  1. Go to the Settings app from your home screen.
  2. Locate and open Exposure Notifications – it is located next to Emergency SOS and Battery settings.
  3. Click Turn On Exposure Notifications and tap Continue.
  4. Select the Country and State you are in.
  5. Review and accept the CDPHE’s terms and conditions.
  6. Enable access to your phone’s Bluetooth to allow Exposure notifications. Turn On notifications on your phone.


With the volume of emails we get, it is possible that you or a colleague will miss a few responses. Flagging emails for a follow up can help remind yourself or recipients to emails that require a response.

Flag emails for yourself: You’re sending a message that requires a response. You want to make sure you don’t forget about the request and you get the information you need. A flag to yourself lets you know that you asked others for a response. By adding a flag, you’ll see a to-do item in Tasks and the Tasks peek.

Flag for recipients: A flag on a message to recipients adds extra emphasis. A flag appears in the message list and text appears above the From line in the message. An item will be added to his or her to-do list and will send them a reminder on the due date.

Get step-by-step instructions to flag emails for yourself or for others here.

Be aware of who sees your personal information, lengthen your battery’s life, and more, Nov. 12


Do you charge your battery too often or find your battery drains quickly? Here’s how you can ensure a healthier battery:

  • Lithium-ion and polymer batteries despise heat. Don't leave your laptop in the car on a sunny day, and don't block the vents on your laptop (pillows on the lap, etc.). Don't charge devices in sunlight or near a heat source.
  • Store your device in a cool and dry place if it is not going to be used for a long time.
  • Use the charger that comes with the device. If it's defective, contact the UIS Service Desk to obtain the correct make and model. Purchasing a charger on the web is costly and may not be high quality.
  • Replace used batteries. If you see that your battery drains quickly, contact the UIS Service Desk to ensure we have a replacement battery on hand. We will make an appointment for you to bring the laptop into 1800 Grant to swap out batteries. The Service Desk will strive to make this as convenient as possible, and it also reduces the risk of safety problems.
  • Don't leave your device plugged in all the time. Although the battery will stop charging once it is fully charged, you are advised to disconnect your device from time to time and run it on the battery so that it can perform its function. 


Personal identifiable information (PII) and protected health information (PHI) are both sensitive and one must understand who is receiving this information.

When sharing information, the sender and receiver have the responsibility to respect and protect the individual’s privacy. Only share information legally and on a need-to-know basis.
The Health Insurance Portability and Accountability Act (HIPPA) helps protect PHI and PII with safeguards and effective privacy rules.

Follow these technical safeguards for better protection:

  • Double check who you are sending an email to
  • Use OneDrive when storing sensitive files
  • Choose which applications you use wisely as they do not all comply with HIPAA standards
  • Know your surroundings and be aware of who you are talking to – verify that a contact is CU personnel before sharing any sensitive information

For more tips about this, visit the Office of Information Security blog post.

Request a softphone, create a strong password, and more, Nov. 5


As System Administration staff continues to work from home, consider using a softphone to your computer to make phone calls.

Once you have a softphone installed, you can place and receive calls directly from your computer with no need for a physical desk phone. The softphone feature is available on PC, Mac, and mobile devices. Plus, your CU phone number will remain the same.

Use our how to guide to see if you have Cisco Jabber on your computer. If not, request a softphone from the Service Desk.


University policy states new passwords must have a minimum of 8 characters and include: a lowercase letter, a capital letter, a number, and a special character (such as $, #, or !). Passwords cannot contain words that can be found in a dictionary or parts of the user's own name.

Some tips to make your password stronger are: 

  • Longer passwords are better. The US Department of Defense requires a minimum of 15 characters in a password, which is a good rule to follow. 
  • Don't use the same password for multiple sites.
  • Don’t use pet or children's names.
  • You can make a password that appears random by making up a passphrase that means something to you, and only using the first letter of each word. For example, the phrase “My first job in 94 was delivering pizzas!” could become the secure password “M1stji94wdP!”
  • Keep your password to yourself, and don’t create opportunities for someone else to steal your information:
    • Don’t tell other people your password.
    • Don’t write your password down.
    • Don’t allow your browser to save your credentials or automatically fill your credentials for you. If you can log in automatically, so can anyone else with your device.

Keep all Information secured privately, activate your OneDrive account, and more, Oct. 29


As part of Cybersecurity Awareness Month, brought to you by CU’s Office of Information Security (OIS), we will share a way to enhance your security every week in October. This week, we are highlighting more efficient ways to reduce risk.

There are multiple ways to ensure a safe working environment and as part of the CU community, you are responsible for using technologies securely. 

  1. Create strong, unique passwords: Weak passwords give cybercriminals easy access to your files and private documents. Be sure to go beyond the minimum requirements and keep your passwords to yourself.
  2. Be on the lookout for insider threat: An insider threat is the threat that an employee or a contractor will use authorized access to compromise the confidentiality, integrity or availability of private or sensitive information. If you see suspicious behavior, report it to your campus IT or Information Security office.  
  3. Only use CU approved applications: In order to avoid any malicious software attacks, only use applications and systems approved by the university.
  4. Protect the privacy of those in the CU community: Only use private information when needed and follow university policies and standards to retain privacy at all times.
  5. Trust your instinct: If something seems suspicious, it probably is. OIS relies on you to identify and report events that are not routine. You don't have to be an expert. Contact OIS and they'll look into it for you.

Learn more on how to have a secure and safe working environment here.


System Administration is changing its backup services from Code42 to OneDrive, an online service included in your Office 365 license that brings more benefits to you at a significantly lower cost to CU. These benefits include:

  • Enhanced flexibility: Once the files are synced with OneDrive, users can access their files on their computer, mobile device or in the cloud. 
  • Version control: You can view or restore previous versions of documents in OneDrive. Version control is accessible through Microsoft Office (Word, Excel, PowerPoint).
  • Restore deleted files: The Service Desk can restore deleted files from OneDrive up to 30 days after deletion. 
  • Storage included in our Office 365 license: OneDrive offers users 5 TB of storage space with our Office 365 licenses. 
  • Easy organization: You can store any kind of file on OneDrive, including photos, video and documents. 

Complete the steps on our website by Feb. 1, when our current backup service expires. 

Join the Service Desk for our next OnBase Live Training and Q&A Session on:
Tuesday, Nov. 17, 2-3 p.mRegister for this training.

How to keep university information secure, use your OneDrive account to save documents, and more, Oct. 22


As part of Cybersecurity Awareness Month, brought to you by CU’s Office of Information Security (OIS), we will share a way to enhance your security every week in October. This week, we are highlighting efficient ways to reduce risk.

University of Colorado members are responsible for keeping information secure from both the office and at home. Use the following actions to reduce risks of a security breach.

  1. Use safeguards: Make sure your remote location is safe and restrict your university devices to be used only by you and no other family member. 
  2. Report an incident: If sensitive university information is lost or improperly disclosed, report it as soon as possible for an investigative team to help resolve the issue. See Reporting an Incident for more examples.
  3. Phishing and other deceptive tactics: Be aware of deceptive tactics in your email, text messages, phone calls, and in-person interactions. Report any suspicious phishing.
  4. Protect university information: Only access the information you need to perform your job, and do not share it with others unless they are authorized. This includes verbal and written information.
  5. Secure all devices: Help keep devices secure by using a stable Wi-Fi connection, virtual private network (VPN) for a layer of protection and up-to-date software.

Learn more on how to have a secure and safe working environment.


All System Administration employees will be required to use OneDrive beginning Feb. 1. OneDrive gives you access to your files on their computer or in the cloud, syncing your data across multiple devices. It is important to keep all documents and images backed up to prevent data loss.

System Administration employees who have not used OneDrive before will need to log into OneDrive and sync their account. It is important to move files that do not automatically back up to avoid losing them, in the event of a computer crash.

The UIS Service Desk will host several live virtual trainings and Q&A sessions. Find dates and register here.

Learn more about OneDrive and how to activate your account on our website.

How to change your status on Teams, keep your healthcare secure from cybercriminals, and more, Oct. 15


If your office door is closed, that’s normally a good hint for people not to bother you, but working remotely has made it harder for coworkers to know whether you are busy or not.
Managing Teams status settings allows others to know if you are away, available, busy, can’t be disturbed, or in a meeting. It is important to update your status so that you are not interrupted during a meeting, and it helps coworkers know when they can expect a response from you.

Change your status using these easy steps:

  • Open Microsoft Teams
  • Click your profile button in the top right corner
  • Under your name, click the status menu

From there, you can choose among the statuses: available, busy, do not disturb, and away. Microsoft Teams also has the option to set a status message. Similarly to how you set a status, another option under your profile is set status message. From there, you can compose a status message and choose if you want to be notified when people message you. On the same pop-up, you are given the option to clear the message after a specified day or time.


As part of Cybersecurity Awareness Month, brought to you by CU’s Office of Information Security (OIS), we will share a way to enhance your security every week in October. This week, we are highlighting how to keep your health care information secure.

Health care has become more connected through technologies especially now that everything has shifted online due to an unpredicted pandemic. The convergence of health care being online carries many benefits, but this does mean that patients and health care providers could be at risk from cybercriminals.

Some programs and technologies that have become more popular throughout this time are telehealth, health and wellness apps, and online health records. All this information becomes vulnerable when it is transmitted online, and though it does make for easier access, you must ensure a safe way to access your healthcare accounts.

Connect to a secure Wi-Fi when attending online health appointments and always keep your health and wellness apps, as well as your mobile device, updated. 

Learn more about keeping your health care information safe here.

Keep your smart devices secure, reboot your computer periodically for best performance, and more, Oct. 8


As part of Cybersecurity Awareness Month, brought to you by CU’s Office of Information Security (OIS), we will share a way to enhance your security every week in October. This week, we are highlighting how to secure and protect your information on smart devices.

Smart devices provide convenience, but they can also come with security vulnerabilities that put your privacy and sensitive information at risk. Reported incidents include eavesdropping, harassment and theft. Take these actions to help keep your devices secure:  

  • Do your homework. Before purchasing a smart device, consider only those from reputable manufacturers and conduct research to learn about any privacy or security concerns.
  • Secure access. Use encryption and change the default password to one that is complex and unique. Engage multi-factor authentication where possible.
  • Use separate networks. Maintain a network for smart devices only. Keep sensitive information on a separate network.
  • Check default permissions. For each device you install, review privacy settings to make sure you’re only sharing what you’re comfortable with.
  • Share minimal personal information with smart devices. Don’t share financial information, such as banking details.
  • Maintain your devices. Keep the software on all devices and apps up to date. If automatic updates are available, turn them on.

Read more about security on smart devices here.

Learn more about Cybersecurity month and the webinar featuring an FBI Chief Security Officer, cybersecurity quiz and prize drawing, and more on OIS's website.


Whether remoting into a desktop or working on a university laptop, computers function best when rebooted periodically. Rebooting helps keep your computer running efficiently and can often speed up its performance. The combination of actions, such as flushing the RAM and clearing up temporary files and processes, helps keep “computer cobwebs” from forming and allows your PC to perform at peak speed.

Learn more about Cybersecurity Awareness Month and how to use Teams quiet hours for mobile devices, and more, Oct. 1


CU’s Office of Information Security (OIS) is promoting Cybersecurity Awareness Month this year, a global effort recognized each October to promote the awareness of online safety and privacy. 

Homes and organizations are more connected than ever. With more of us now working from home, these two internet-connected environments are colliding on a scale we’ve never seen before. Learn protective steps you can take at both home and work.

  • Save the date for the Cybersecurity Month Webinar: 
    • Date: 10-11 a.m. Tuesday, Oct. 27  
    • Speaker: Michael Mercer, Chief Security Officer, FBI (Denver Division)
    • Zoom link will be available soon.
  • Cybersecurity Quiz and Prize Drawing
    • A quiz will be emailed to you on Oct. 5 to help you assess your knowledge of cybersecurity. By completing the quiz, you will be automatically entered into a drawing for a chance to win a gift card. (See the rules for eligibility.)
  • Learn more about Cybersecurity from the following articles from OIS:

Learn more about Cybersecurity Awareness Month here.


Although the Teams mobile application has allowed you to work from anywhere it does not mean you should be available 24/7. The quiet hours feature for the Teams mobile application allows you to specify the hours and days you want to be notified on new messages. For instance, if your work days end at 5 p.m. and starts at 7 a.m., turn on quiet hours from 5 p.m. to 7 a.m.

Turn quiet hours on using the following steps:

  1. Open the Teams app and click on the navigation menu on the top left. 
  2. Click Notifications.
  3. Click on the bell icon identified as quiet hours at the top of the screen:
    1. Once you click quiet hours, you will have the option to turn it on along with quiet days.
    2. Choose the appropriate times and days, your changes will save automatically.

Have questions? Contact the Service Desk and let our technicians help!

Zoom removes passcode and waiting room requirement, and keep yourself and your family safe from cybercrime, and more, Sept. 24


It is important to teach your family and kids how to keep computer devices secured and your private information safe. That’s why CU’s Office of Information Security (OIS) has put the following tips together to help you and your family. Although it may not seem troublesome to your kids, they may unknowingly be putting your family at risk as they are prone to sharing personal information online, which can lead to identity theft.

Here are some ways to keep your family secure from online cybercrime:

  1. Talk openly with your kids: Walk your kids through why certain information is considered private and how to recognize if behavior is suspicious. Teach them about how the internet can propose threats.
  2. Configure security settings together: Teach your kids how to configure security and privacy settings on their favorite websites. 
  3. Control and monitor online activities: Add parental controls to your devices and be involved on the same social network applications that they are using.
  4. Keep devices and applications secure: Continuously update applications and ensure all your passwords are kept up-to-date and strong. 

Get more tips and information from the OIS article here.


Previously, we shared that Zoom planned to require security features, including a mandatory waiting room or passcode, for all users. On Sept. 20, Zoom changed their decision to require these features based on customer feedback. Zoom will not be enforcing a mandatory security requirement on enabling a waiting room or passcode for any accounts on Sept. 27, or any point thereafter.

Already have it set up? You can either remove them or keep it enabled for an added layer of security. 

Have questions? Contact the Service Desk and let our technicians help!

Learn how to create Microsoft Office 365 groups on PC or Mac, and automatically clear your browser’s cache, and more, Sept. 17


Microsoft Office 365 Groups is a tool used to bring all your teammates together with repeating emails and calendars. With Groups you are able to share your resources with a group of people you work with such as shared Outlook inbox, shared calendar, shared files, project plans or documents. All members in the group have permission to any of the resources shared.

To create Groups:

You can create Groups using Outlook, Outlook Mobile, SharePoint, Planner, and Teams. Choosing where to start your group depends on what your team consists of.

Outlook on PC and Mac:

  • Open Outlook and select Home
  • Select New  Items > Group
  • Fill out the information
    1. Group name
    2. Privacy
    3. Description > then click Next
    4. Select members and enter their email addresses

Group creators are capable of adding or removing members and customizing permissions. They can also edit the group’s information. Group members cannot change group settings though they can view anything in the group as long as the owner gave them permission.

Using Groups in the workplace can make it easier to collaborate and schedule team meetings. Don’t hesitate to start a group and share resources.

Have additional questions? Contact the Service Desk.


For those who like to keep their cache clear, you can configure each browser to clear cache when you close Chrome and Internet Explorer. 


  1. Open browser
  2. Use the 3 dots to the right of the URL window to open the Chrome Toolbar, click Settings.
  3. Scroll to the Privacy and security section, click Site Setting.
  4. Scroll to Content and select “Cookies and site data.”
  5. Scroll to “Clear cookies and site data when you quit Chrome” and press the toggle on.

Internet Explorer:

  1. Open Internet Explorer browser
  2. On the menu bar, select Tools > Internet Options > Advanced tab
    • Don’t see a menu bar? Right click at the top of the window and select “Menu bar”
  3. Under the Security Section, check the box labeled Empty Temporary Internet Files folder when browser is closed
  4. Click OK 

Have questions? Contact the Service Desk and let our technicians help!

Connect to Wi-Fi safely with a VPN, fortify your home internet connection with encryption and more, Sept. 10


Accessing the internet on an unsecured Wi-Fi network means you could be exposing private information. That’s why a virtual private network, better known as a VPN, is a must for anyone looking to maintain online security and privacy.

A VPN works by creating a private network from a public internet connection. This can protect the information you share or access over the internet against cyberthieves on the same network who could otherwise capture your login credentials, credit card numbers, social security number and other private information.

With CU’s Cisco AnyConnect VPN, you can establish a secure and encrypted connection on any network and mask your internet protocol (IP) address so your online actions are virtually untraceable.

  • Encryption makes your data unreadable by scrambling all incoming and outgoing traffic so that it can only be “read” using a unique key. You can increase Wi-Fi security by connecting to a VPN at home and when traveling.
  • Using CU’s Cisco AnyConnect VPN may be required to access many CU-specific drives and applications.
  • You can connect to a VPN using your computer or any Wi-Fi-enabled mobile device.
  • VPN’s are a great way to increase security even on trusted networks, but always be sure to connect to the VPN before using unsecured networks or public Wi-Fi.

Learn how to set up the CU VPN for your computer, Android and IOS phone. 


Data security is especially important when using a public Wi-Fi network because it prevents anyone else on the network from eavesdropping on your internet activity. However, VPNs enable greater privacy even when you connect to a secure, trusted Wi-Fi network. 

Here are some more techniques to keep your work and personal information safe on your home network:

  • Ensure there is a true business need for collecting personal information.
  • Secure your home Wi-Fi router by using a strong, unique password and changing it regularly.
  • Enable WPA2 encryption, which secures your network traffic with a unique encryption key. 
  • Check your internet service provider’s website for details on how to customize your Wi-Fi security settings.

Refer to our Wireless guides on the UIS Service Desk site. 

Have questions? Contact the Service Desk and let our technicians help!

Learn how to keep university information secure and maintain data privacy while working from home, and more, Sept. 3


Only university-provided computers, including mobile computing devices, should be used to access or handle sensitive university information. Do not allow members of your household to access your university-provided computer, as they may unknowingly put your computer at risk. Always lock your computer when stepping away from it, just as you would in the office.

If you must use a personal computer, it is recommended that you use remote desktop to connect to your university-provided computer. Visit the UIS Service Desk website for guides on VPN, remote desktop and collaboration tools. 


It's important to understand the types of data you handle to ensure you are keeping it safe. Your job may require you to handle private information related to students, employees, alumni, donors, research sponsors, patients and others. This material can carry personally identifiable information such as social security numbers, credit card information, educational records and health information.

When handling private information, consider these actions:

  • Ensure there is a true business need for collecting personal information.
  • Only request the minimum information required. Do not collect additional information that you “might” need in the future.
  • Inform the individual why you need the information and how it will be used. If the information will be handled by a third-party, clearly disclose that, too.
  • Follow CU security standards and consult with the Office of Information Security to properly secure personal information. Most notably, limit access to personal information to only those who need to know.
  • Have a data retention plan that includes a schedule to delete personal information when it is no longer needed and ensure information is cleaned up according to that plan.
  • Be aware of any regulatory or contractual requirements regarding privacy and security. Be sure you know your obligations and come up with processes to meet them. This may mean meeting specific security standards, minimum/maximum data retention requirements or other required steps.
  • Know how you will handle privacy related questions and requests. Email privacy@cu.edu for assistance and to connect with others at CU who can help with any privacy concerns.

Have questions? Contact the Service Desk and let our technicians help!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Learn how to boost your WiFi connectivity and how to set up virtual backgrounds in Teams, and more, Aug. 27


As school starts up, children are now connecting to local Wi-Fi in your area more than before. You may find you have network connectivity issues that you didn’t have a week ago. Some ways to help with this include:

  • Connect to your Internet with an Ethernet cable directly to your home router.
  • Place you system near the Wi-Fi access point: The strength of the wireless signal could be greatly weakened by obstructions like walls, ceilings, doors, or furniture.
  • Shut down or pause other devices and applications running on your network such as:
    • Streaming video services.
    • Cloud backup or sync applications.
    • Content downloads on computers, tablets, and mobile devices.
    • Video/audio communication applications.
  • Turn your Zoom camera off or stop Zoom and dial-in.
  • Update firmware: Router manufacturers publish firmware updates regularly and upgrading your router can provide a performance boost and access to new features.
  • Upgrade router: Routers vary significantly in functionality and price, but in this case the upgrade to make is generally in terms of how far your Wi-Fi is broadcast.


Working from home and don’t want your colleagues to see your background? No worries, you can change your background on Teams.

Prior to joining a scheduled meeting:

  • Select “Join the Meeting” in your invite. You will be taken to a Test screen, seen above.
  • Click the middle toggle to turn on virtual backgrounds. Background options will display on the right of the screen.
  • Replace the entire background by choosing an image provided or add your own.

During a meeting:

You can also change your background after you have joined a meeting by selecting the three dots for more options from your meeting controls.

  • Click Show background effects 
  • Select a new background or upload your own image

Have questions? Contact the Service Desk and let our technicians help!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Learn more about power supplies and the benefits of using Outlook Online, and more, Aug. 20


Using Outlook Web Client gives users many organizational and instant benefits with the same functionality of the application itself. Having access to Outlook Web Access (OWA) provides users with their Office 365 mailbox without needing to use the Outlook application. 

Because OWA only requires a web browser, you can send emails anytime, anywhere and by using any device. All you’ll need is to log in with your email and password. After logging in, you will be able to see your mailbox in real time with no delay in any email arrival to your inbox.

Some OWA benefits include:

  • Emails are delivered extremely fast, compared to using Microsoft Outlook on a laptop or computer.
  • Complete email history is available. Because OWA doesn’t need to download copies of your messages like the local copy on your computer, you can see a complete history of all your emails. 
  • Advanced search on OWA allows users to search more than one location at once and add filters such as keywords, date, subject, and if it has any attachments.
  • OWA allows you to customize the layout of the mailbox such as the color scheme, focused inbox, display density, the location of the reading pane and how to sort emails.


When a dock or a laptop is provisioned for use, each device is paired with the appropriate power supply (also known as power adapter or power cord) from the factory. The power supply that is included with your laptop should only be used when you are not connected to the dock. The power supply for the dock is for the dock only. Because the two carry different specifications that can cause damage, they should not be used interchangeably. Using them interchangeably can also cause insufficient charging to your laptop. 

Have questions? Contact the Service Desk and let our technicians help!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Join us for a live Zoom Training today at 1 p.m., and more, Aug. 13


With the latest version, Zoom has introduced filters. Enjoy new virtual backgrounds, video filters and adjust the lighting to feel more comfortable on video. Learn how to use these new features here.

Don’t have the latest version? Find step-by-step instructions on how to update your Zoom desktop app here.


Starting Sept. 27, Zoom will require that all meetings have a passcode or a Waiting Room enabled for all paid accounts. You’re in control of your meeting security selections, and we have designed the options with security and ease of use in mind.

  • Enabling a Waiting Room: The Waiting Room feature allows the host to control when a participant joins the meeting by placing participants in a Waiting Room prior to joining the session. It is recommended that you review your Waiting Room selections and options for ‘join before host’ and which participants to place in the Waiting Room. Learn more about Waiting Rooms here.
  • Want to add a passcode? It’s easy! Follow this Zoom guide for step-by-step instructions.
  • What if I don’t have a Waiting Room or Passcode enabled by September 27? If neither is enabled, Zoom will enable a Waiting Room for your meetings.

If you already have those two options enabled, no further selection needs to be made and the setting will not change unless done manually by you or your administrator. These preferences can be changed at any time.

Having your Waiting Room and Passcode enabled will not have an effect on how you schedule meetings, calendar invites or the meeting attendees. 

Learn more about this change here.


Want to make working on your desktop easier? Use these Zoom desktop shortcuts to manage your meetings and help you communicate with others easily.

For your meetings, audio, and control
Zoom shortcuts for PC Desktop:

  • Start or stop video using Alt+V 
  • Mute or unmute using Alt+A
  • Start or stop screen share using Alt+shift+S
  • Screenshot using Alt+Shift+T
  • Close the current window using Alt+F4
  • Enter or exit full screen using Alt+F

Zoom shortcuts for Mac Desktop: 

  • Start or stop video using Command+Shift+V 
  • Mute or unmute using Command+Shift+A
  • Start or stop screen share using Command+shift+S
  • Screenshot using Command+T
  • Close the current window using Command+W
  • Enter or exit full screen using Command+Shift+F

NOTE: To access all running shortcuts on Zoom Desktop, log in to Zoom then click on the profile photo (or box with your initials) in the upper-right corner. Select Settings and click Keyboard Shortcuts.

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

The important of SSO in Zoom and learn more about your laptop ports, and more, Aug. 6


Have you been hosting a Zoom meeting and found this error?

You aren’t alone! If this happens, it could be because you started the meeting without using the single sign-on (SSO) authentication.

How to sign into Zoom through SSO:

  • When logging into Zoom on the Web, go to https://zoom.us/signin
  • Scroll down the page to “Sign in with SSO”. 
  • Enter “cusystem” as the Company Domain and click continue. 
  • Enter in your CU credentials and password. 

This is the same process for the Zoom desktop client and mobile app.

Signing into the SSO not help enable your screen sharing? As the host, click on the arrow next to “Share Screen” and select “Multiple participants can share simultaneously” and try sharing your screen.

Still having issues? Contact the Service Desk and let our technicians help!


Your CU issued laptop and docking station have several ports that it sometimes can become overwhelming keeping track of their names or what they do. Some common ports your laptop and docking station have include:

  • VGA connector: A Video Graphics Array (VGA) connector is a three-row 15-pin DE-15 connector. The 15-pin VGA connector was provided on many video cards, computer monitors, laptop computers, projectors, and high definition television sets.
  • HDMI port: A High Definition Media Interface (HDMI) port permits the transfer of audio and video signals between your laptop and other devices like laptops, digital cameras, monitors, game consoles, projectors and more.
  • Display port: This port (like HDMI) comes with a 20-pin connector and also sends video and audio signal to external display devices like monitors. There are two types of DisplayPorts used on modern-day laptops: standard DisplayPort (pictured above) and mini DisplayPort.
  • Type-C or USB C: Universal Serial Bus (USB) ports are usually used for file transfer between your laptop and other devices (laptops, storage disks, smartphones etc), attaching and charging peripherals, and also sometimes serve as a laptop’s charging point. USB-C is the newest USB option and is slimmer, smaller, reversible and handles higher currents with faster transfer speed.

Have another port you aren’t sure what it does? Contact the Service Desk for help!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Get virtual assistance from the Service Desk and use keyboard shortcuts for MS Teams, and more, July 30


Whether you are setting up your home office for the first time, need help troubleshooting an issue or want to make sure you setup your equipment correctly, the UIS Service Desk can help. 

With most System Administration employees working remotely, the Service Desk is able to provide virtual assistance to help you with any technical questions or issues. 

Call or email the Service Desk to schedule a remote video call for assistance.


Use these general keyboard shortcuts to search your chats and access different commands in Teams.

Windows Shortcuts:

Go to Search CTRL + E
Show commands CTRL + /
Search within a selected message or channel CTRL + F
Show all keyboard shortcuts CTRL + .

MacOS Shortcuts:

Go to Search COMMAND + E
Show commands COMMAND + /
Search within a selected message or channel COMMAND + F
Show all keyboard shortcuts COMMAND + .

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Learn how to use Zoom whiteboard and how to check colleagues availability in Outlook, and more, July 23


Struggling with collaboration while working remotely? The Whiteboard functionality in Zoom can help! Here’s how to use it:

  1. After starting Zoom, select the Share Screen button located in the bottom tool bar. 
    1. Having issues sharing your screen? Learn why here.
  2. Click the second option at the top, Whiteboard.
  3. Click Share.
  4. You can show and hide the Whiteboard tools, known as annotation tools, by pressing the Whiteboard option in the meeting controls. 
  5. Use the page controls on the bottom-right corner of the whiteboard to create and switch between pages. Note: Only the host or the participant who began sharing the whiteboard is capable of creating and switching pages.
  6. To end sharing the whiteboard, click Stop Share.

Having multiple whiteboards in a meeting is possible if simultaneous screen sharing is on. This allows more than one participant to share a whiteboard. However, to see two whiteboards at once or your own whiteboard and another participant's, you will need to have dual monitors enabled.
Learn more here.


Have you tried to schedule a meeting with a colleague only to have them decline because they have another meeting? Outlook Scheduling Assistant allows you to see your colleagues’ availability to avoid double-booking them.

  1. From the Inbox, select New Items > Meeting or in the Calendar, select New Meeting. You also can use the keyboard shortcut Ctrl+Shift+Q to create a new meeting request.
  2. Add attendees in the To box.
  3. Select Scheduling Assistant from the ribbon. You'll see a row for every recipient you entered in the To box. If you want to add more attendees, you can type their name in any blank row in the Scheduling Assistant.
  4. Times that your attendees are busy are shown in dark blue. Times that your attendees have a tentative appointment are shown in a light blue hashed block, and times outside of your attendees' working hours are shown in light gray. Select an available time for all of your attendees.

View more detailed instructions from Microsoft:

Scheduling Assistant for PC
Scheduling Assistant for Mac

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Learn shortcuts for Teams, how to move between tabs in your internet browser and more, July 16


While you can use your mouse to click through your open tabs, an easier keyboard shortcut will allow you to view tabs quicker and more efficiently.

The keyboard shortcuts vary between browsers:

  • Google Chrome: You can switch between tabs in Google Chrome by pressing CTRL+TAB. That will simply rotate you through all the tabs going forward and then starting from the beginning again when you reach the last tab on the right. If you want to go the other way, right to left, then press CTRL+SHIFT+TAB.

Want to pull up a specific tab? You can press CTRL+N, where is a number between 1 and 8. Unfortunately, you can’t go past 8, so if you have more than eight tabs, you’ll have to use a different keyboard shortcut or just click on it. CTRL+9 will take you to the last tab, even if there are more than 8!

Accidentally closed a tab? On Google Chrome CTRL+SHIFT+T can bring back the last tab you closed.

  • Internet Explorer: Similar to Google Chrome, you can switch between tabs from beginning to end, right to left, and view specific tabs using the same keyboard shortcuts. 
  • Safari: Also like Google Chrome and Internet Explorer, CTRL+TAB and CTRL+SHIFT+TAB work the same on Safari. On Mac, you are still able to view each tab individually by clicking COMMAND+N by replacing N with the number tab you want to view. If you find yourself confused finding which tab is which, click on COMMAND+SHIFT+\ to view all open tabs. Lastly, revive your last closed tab with COMMAND+Z.

Extra Tip: You can also use the ALT+TAB shortcut key on a PC for switching between open applications to more easily navigate. For Mac users, use COMMAND+TAB to switch between open applications.


Ever had to quickly mute yourself in a meeting and struggled to find the mute button on the screen? With Teams keyboard shortcuts, you can mute/unmute, turn the camera off and on, and blur the background easily.

For Windows:

  • To mute or unmute during a call on Teams, click CTRL+SHIFT+M
  • To turn the camera on and off, click CTRL+SHIFT+O
  • To blur background, click CTRL+SHIFT+P

For macOS:

  • To mute or unmute during a call, click COMMAND+SHIFT+M
  • To turn the camera on and off, click COMMAND+SHIFT+O
  • To blur background, click COMMAND+SHIFT+P

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Update your drivers to keep your machine running smoothly, learn how to grab screenshots and more, July 9


If you notice your computer has been running slower than usual, it could be due to outdated device drivers. Device drivers are an essential piece of software that helps different hardware components work smoothly with your computer. When these drivers are properly updated, your computer will run great. However, when they have become outdated, they can start causing problems.

Some issues caused by out-of-date drivers include:

  • Monitor display problems
  • USB mouse not detected
  • Webcam issues
  • Slower operating speeds
  • Crashing

Another key advantage of keeping device drivers updated is having the peace of mind of a secure machine. Outdated drivers are a security risk and can make your computer vulnerable to hackers and malicious software.

Updating drivers can solve many problems with both your hardware and software. Give the Service Desk a call to report performance issues and to have one of our skilled technicians troubleshoot and install updates, if needed.


Need to capture a screenshot? Windows 10 and MacOS contain built-in snapshot tools that can be utilized with keyboard shortcuts.


For Windows 10 users, pressing the WIN+SHIFT+S keys together will allow you to 'snip' a portion of your screen to be saved. A small menu bar will appear at the top and give you the option to draw your snip area, snip a specific application window or capture the entire screen. The image is then saved to your clipboard, and can be pasted into an email, chat, document, etc. Note: you cannot save your item directly this way. You must paste it somewhere (such as an empty document, Paint, an email, etc.).

You can also use the snipping tool application by searching for it in your bottom search bar. This tool will give you more options, and allow you to save your item by pressing the “save” icon to pick where you’d like the capture saved. Learn more about what your snipping tool can do here.


For Mac users, pressing the COMMAND+SHIFT+4 keys will allow you to snip a portion of your screen. You can then click and drag your cursor to draw a box around your desired screenshot. These automatically save to your desktop as a file that can then be attached or embedded anywhere.

If you press the COMMAND+SHIFT+3 it allows you to take a full capture of whatever screen you have open. This also automatically saves to your desktop.


As the university moves towards a paperless environment, it is essential to start using a more current version of Adobe. Many of you are still using Adobe Acrobat XI Pro, which stopped receiving support from Adobe in October 2017. Windows updates have been known to render this software version unusable. The Service Desk has been able to apply “fixes” so far, but that won’t work indefinitely. In addition, for those that have Adobe Acrobat Pro 2017, it will no longer be supported as of June 2022. For the many users at 1800 Grant who use this version, you will receive support and updates through June 2022.

Departments using the outdated, unsupported version of Acrobat (XI) should consider purchasing the most current version. Adobe Acrobat Pro 2020 can be purchased for $102.35. Purchasing this version will ensure you receive updates and support through June 2025. For larger departments, these licenses are transferrable. As employees leave and replacements fill their positions, you will not need to purchase another. The UIS Service Desk simply reassigns the license to the new employee.

To request assistance in purchasing Adobe Acrobat 2020, email the UIS Service Desk at help@cu.edu stating the request and include your department’s SpeedType. We will take care of the rest!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Reboot your computer to prevent slowness, secure your files by saving to the P: drive and more, July 2


Have you ever wondered why the Service Desk Team will ask, “Have you tried rebooting your computer?” It might sound like a dismissive response, but rebooting or restarting a computer can solve many issues. This solution is not limited to computers; it applies to all types of computing devices: wireless routers, iPads and mobile phones. It also applies to software – is Google Chrome acting slow and consuming a lot of memory? Try closing it and reopening it!

Some benefits of restarting your computer include: 

Flushes RAM – RAM stands for Random Access Memory and is your computer’s main type of memory. When you restart your computer, you flush out all the random, unimportant, and temporary data bogging down your device. 
Boost Performance – Think of RAM like your short-term memory. You can only keep so much in mind at one time without losing concentration, and the same is true for your computer. Rebooting keeps your computer running quickly because it flushes all those temporary files piled on your PC’s memory. 
Saves Time – Rebooting your computer is one of the quickest ways you can fix an error with your machine. 
Bug Fixes – Computers that go without reboots for extended periods of time are prone to an assortment of bugs and glitches. Rebooting your computer will help clean up those little errors and prevent the systems’ processors from becoming overloaded. 
And more! – There are several other benefits to restarting your computer regularly, like completing software updates and allowing simple startup diagnostics to check your computer’s essential file structures.


When you started at CU, you were provided a computer with access to three drives:

  • P: drive (personal)
  • S: drive (department/shared)
  • R: drive (Scratch – open access)

Your P: drive is a great place to save files as it is continuously backed up to the university’s servers, ensuring you can retrieve a file if it is accidentally deleted or lost.

Recover your lost files by submitting a ticket to the UIS Service Desk. Have questions? Contact the Service Desk with any questions regarding your P: drive while working remote.


With the safer-at-home order still in place, the UIS Service Desk has been working hard to ensure you can continue to work remotely without issue. While we have been able to mostly support our end-users using secure remote connections, there are situations where we may ask you to return your device to 1800 Grant for technical support.

The UIS Service Desk Team strives to ensure all employees remain safe during these times. To ensure we are able to social distance appropriately, please contact the Service Desk and schedule a time to meet with one of our technicians if you have to bring your equipment in. We support in-person help on Tuesday’s from 10:00 a.m. - 2:00 p.m. by appointment.

Our team practices safety measures by wearing face masks, using hand sanitizer continuously and disinfecting your device before giving it back to you. Please help us prevent the spread of COVID-19 by calling (303) 860-4357 and scheduling a time or open a ticket by emailing us at help@cu.edu. We look forward to serving you!

Want to get to know the UIS Service Desk? Visit the website to put a face to the name!

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Create a fillable PDF, connect to the VPN regularly and more, June 25


Have you ever needed to create a form as a fillable PDF? It’s not as difficult as you may think.

Learn how to easily turn a scanned paper form or a simple form made in Microsoft Word, Excel, or another application into an intelligent PDF form with this Adobe guide.


What do you do if you see this Windows license dialogue box on your computer?

Some laptops can run into Windows licensing issues, update issues, etc. The UIS Service Desk recommends that you make certain to connect to the Cisco AnyConnect Security Mobility Client Virtual Private Network (VPN) on your machine at least once a week to help ensure that your PC is up-to-date with all policies, for licensing and data security. Visit the How to Guide section to learn more about VPNs.

Security tip: Use the VPN to boost Wi-Fi security at home and when traveling; it provides a secure connection to the CU network from any location and may be required to access many CU-specific drives and applications. Be sure to connect to the VPN before using unsecured networks or public Wi-Fi. Learn more security tips here


You can quickly express yourself by adding an emoji with this nifty keyboard shortcut. Do this by pressing the Windows logo key + period (.) to open an emoji panel on a PC. For a Mac press Command + Control + Space to open an emoji panel.

In addition to traditional emojis, you can use kaomojis to create faces with text, as well as symbols—like rare punctuation and currency—to make a statement.

Not seeing the emoji keyboard? Contact the Service Desk for help.

Having other issues? Please contact our technicians by emailing help@cu.edu or calling (303) 860-HELP (4357). 

Creating and managing Outlook rules, resolving Teams login issues, and more, June 18


In a time when we are relying on electronic communications more than ever, it can often feel overwhelming with how many emails hit our inbox each day. Outlook makes it easy for users to manage and organize their inbox and allow you to teach Outlook how you want specific messages handled automatically.

Interested in finding out more? Check out the step-by-step instructions in Microsoft Office's walkthrough on managing email messages by using rules.


We all make mistakes from time to time. It's impossible to go back in time to correct your previous actions like they never existed… or is it? If you find yourself editing a document and realize you need to quickly undo or redo previous actions, do so with ease using this week's keyboard shortcuts.

In many applications - including Adobe and Microsoft - pressing Ctrl+Z (Cmd+Z in MacOS) undoes the last operation/action you performed. Conversely, you can redo the last operation/action performed by pressing Ctrl+Y (Cmd+Y in MacOS).


Sometimes after changing your system password, Teams may appear unresponsive, fail to update or fail to login. The login screen may appear blank or display the following message:

If you find yourself in this situation, follow the steps in the Service Desk's guide on How to Troubleshoot Microsoft Teams Login Issues.

Still having problems logging in? Please contact our technicians by emailing help@cu.edu or calling 303-860-HELP (4357). 

Make the most of Microsoft Teams chat, keyboard shortcuts and more, June 11


Creating a Microsoft Teams group chat is a great way to stay connected, collaborate and share files as a group – up to 100 people can participate.

Starting a group chat is easy:

  • Start by selecting the New Chat icon at the top of Teams, next to the search box.
  • To add members, select the field labeled To: Enter Name, Email or Tag and type the names of the people you want to add.
  • Name your group using the field labeled Group Name. You can edit the group name at any time by selecting the Pencil Icon next to group’s name.   

Hosts can continue to invite members to the chat by clicking the Add People icon in the top right corner and can decide how much of the chat history a new member can view.


The more, the merrier. As part of recent Microsoft Teams upgrades, users can now video chat with up to nine participants. (The previous limit was four). Microsoft launched this feature in response to many requests from users working at home.


Print a document quickly by pressing Ctrl+P (Cmd+P in MacOS). From there, a preview window will let you print or save a PDF copy. This shortcut works in Microsoft O365, on internet browsers and in many other programs.

Archiving Outlook messages, adjusting Zoom audio and more, June 4


Emails are a great way of communicating and serve as a reference for work done in the past, so it’s important to be able to have a way to access old emails. However, each user has a 100GB mailbox limit. If your mailbox gets too full, you will be unable to send/receive new emails and can make searching through old emails painstakingly slow. Don’t fret! You can easily clean up storage space without having to resort to deleting any messages.

Archiving your emails provides an easy, reliable way to clean up storage space while still providing you access to all the emails you’ve ever sent and received. Outlook also allows you to be in control of the method and frequency of archiving and has provided a number of resources to help:


We’ve shared with you before how to test your Zoom audio prior to joining a meeting, but have you ever run into issues with the volume of audio once the meeting starts? You can easily check and adjust the volume of your speaker or microphone during a meeting using these instructions on Testing Audio Using Audio Settings.


Each month, the Service Desk deploys important updates that provides necessary – and sometimes critical – fixes to known issues with Microsoft products. Known as patches, these fixes are crucial in maintaining a reliable and secure system.

For University Information Services, the Service Desk deploys these updates on the third Saturday of each month, ready to install starting at 6:00 am by restarting your device. Installation is required by 6:00 pm the next day (Sunday).

For the rest of System Administration, the Service Desk deploys these updates the following Friday, ready to be installed starting at noon that day by restarting your device. Installation is required by noon the following Tuesday.

It is important to note that you must restart your computer in order for these updates to install. No action by that deadline will result in an automatic install, forcing your device to shut down. We recommend all users restart their devices prior to that deadline in order to avoid risking losing any unsaved information or being kicked out of a meeting due to the forced restart.

Recalling a sent email, O365 Tech Talk and more, May 28


Do you find yourself needing a little assistance when using a Microsoft application like Word or Excel? Get the help you need with this week’s first keyboard shortcut.

While using a Microsoft O365 application, simply press F1 to bring up the Help Screen. From there, you can perform a number of actions including searching for help, reviewing featured help topics, formatting tips and templates and assistance with formulas and functions.


We’ve all been there – you hit Send on an email only to realize you sent it to the wrong person or forgot to include an attachment. If only there was a way to get that email back before the recipient sees it. Great news – there is! Message recall can delete or replace copies of that email (as long as they have not read the message yet).

To recall an email in Outlook, simply follow these instructions from Microsoft. Outlook can even confirm whether the recall succeeds or fails, allowing you to breathe a little easier knowing the status of your message.


No longer scroll through documents trying to find the information you need with this week’s second keyboard shortcut.

In a Microsoft O365 document, press Ctrl+F (Cmd+F in MacOS) to open the Navigation/Find and Replace window (depending on the application). From there, type the word or phrase you are looking for into the search bar to locate your information.

Request a Zoom Pro license, new portal VPN labels and more, May 21


In the past, we’ve reminded you to always double check that you are connected to CU System’s Virtual Private Network (VPN) when working remotely, ensuring you have a secure, encrypted connection to our network. This VPN connection is required to access many CU-specific applications.

Earlier this month, UIS made it easier to identify when a VPN connection is required to access select CU Resources portal tiles. Each tile requiring a VPN connection is now marked with a red VPN label:

Need a refresher on connecting to the VPN? Check out the UIS Service Desk how-to-guides on configuring Cisco AnyConnect VPN.


For many of us, Zoom has become a necessity to stay connected to each other and we want to make sure you are getting the most out of it. Some users have signed up for Zoom using the free login and their university email, but this does not give you all the features or protection that a Pro account offers.

UIS has purchased enough Zoom Pro Licenses to provision each System Administration employee with one. If you do need a Zoom account (whether brand new or upgraded from a free account), please contact the UIS Service Desk to request a Pro License by emailing help@cu.edu or calling 303-860-HELP (4357).


For most users with a CU-provisioned laptop at home, there is no need to remote into a desktop at the office. As long as you are connected to the VPN, you will be able to access all CU applications and network drives (for example, your personal P: drive and shared S: drives).

By asking users to use only one CU-provisioned device, it reduces the risk of power issues - like the one experienced last week - and alleviates the need for each desktop computer to be rebooted after an outage. Please contact the UIS Service Desk for more information.

Coronavirus-themed scams, computer locking shortcut and more, May 14


From phishing texts to emails appearing to come from the recipient’s IT help desk, would-be scammers are capitalizing on the anxiety and uncertainty surrounding the COVID-19 outbreak with an increasing number of new scams.

The best way to protect yourself is to arm yourself with up-to-date information for recognizing phishing attempts and other scams. We encourage all CU System employees to review the Office of Information Security’s information and resources on coronavirus-themed scams and to report anything that looks “phishy” to you.


As University of Colorado employees, it is our responsibility to protect potentially sensitive or confidential information. When you want to step away from your computer but not shut it off, press Windows+L (Ctrl+Cmd+Q in MacOS) to quickly lock your computer, keeping your files safe and preventing others from accessing your computer.


As intuitive as Outlook rules are, some junk mail will always make its way past the filter. While you can simply delete each message, there is a way to identify messages as junk and keep them out of your inbox for good.

To mark a message as junk, right click the message in the preview pane and locate the Junk option. From there, you can select a variety of options – including Block a Sender, ensuring those emails do not continue to clutter your inbox.