Restoring deleted files in OneDrive for Business

Deleted items go into the recycle bin where they stay for up to 90 days. All deleted files and folders are permanently deleted after this period. Click on the Settings icon (gear) and select Site contents. Under Site Collection Administration, click Recycle bin. You will be presented with the contents of your recycle bin. Tick the check box next to the item(s) you wish to recover and click Restore Selection. You will be prompted for confirmation. Click OK to move the file(s) from the recycle bin to your OneDrive for Business library. To return to your files, click OneDrive in the top menu bar.

Resources for Recovering Lost Files in Microsoft Word

Microsoft Documentation Microsoft has official pages with different methods that can potentially find lost files or recover content from unsaved documents. These instructions vary depending on if you are using a Mac or PC. Windows Instructions Mac Instructions Additional Information There is no 100% guarantee that a file can be found if it was never saved. IT recommends that you save your work frequently and save to cloud storage such as OneDrive to ensure that you retain access to your file.

Resources and Info for Retirees

St. Lawrence official retirees may choose to keep their university network/email account. Those who choose to keep this account must submit a service request to schedule a consultation with IT. Without this consultation, network and email accounts will expire 30 days from retirement date and cannot be reactivated unless employment status changes. St. Lawrence Network and Email Account As is outlined in the St. Lawrence University Acceptable Use Policy (AUP) and University IT/Information Security Policies, network and email accounts are to be used for university business only and personal…

Resolve Slowness on St. Lawrence websites in Firefox

Problem There is a known issue in Mozilla Firefox with St. Lawrence websites loading slowly on the campus network. This issue is related to the way Firefox enables DNS compared to other web browsers. This article explains how to turn off this feature in Firefox. Who Is Affected? Anyone who is browsing St. Lawrence websites in Firefox while on campus may encounter this issue. Resolution In Firefox, click the Menu button on the top right corner of the window (the button that looks like 3 lines stacked on top of each other). Click Settings. Scroll down to the "Network Settings" section of the…

Required passwords for scheduled Zoom meetings

All scheduled meetings created in Zoom require a password by default. Numeric passwords are automatically generated, encrypted, and embedded in meeting links. Participants with the meeting link are not prompted for the password. Anyone wishing to not require a password can disable this function when scheduling a meeting. Meeting links without a password Zoom meeting links without a password are short and simple. The numeric meeting ID is added to the end of the link. Example: https://stlawu.zoom.us/j/ 123456789 Without other safe guards in place, anyone guessing meeting IDs may be able to join…

Removing Malware from Your Computer

This article recommends free tools for both Windows and Mac to remove malware from your personal computer. If you have malware on your university owned computer, please put in a request and our staff will assist you. For an overview on malware, please see this article. Windows and Mac (for personal computers): Malwarebytes is a great tool to scan and remove malware from personal computers. There are free and paid versions available. In most cases, the free version is sufficient. Visit their website to download and for instructions on how to use this product. If you wish to check in your…

Reimbursement Requests and Requisitions (also known as “Financial Management”)

Upon clicking the option named “requisitions, purchase orders, and request for payment,” the “view” tab will populate with your previously submitted requisitions, issued purchase orders, or requests for payment. To create a Requisition or Reimbursement Request you begin on the “Create” screen and select the appropriate document type. The system will automatically default to a requisition so if the the dollar threshold is under $5,000 you can choose in the drop down menu request for payment so the system will properly create a payment voucher rather than a purchase order. Complete the necessary…

Recover Deleted SLU Emails (Cleared from Deleted Items Folder)

Recovering Deleted Emails If you have deleted an email that was emptied from your trash, you have a limited time to recover it by accessing the Restore Deleted Items feature. Currently, there is no way to recover deleted emails on Outlook for Mac. However, you can still recover deleted emails by using Webmail. Outlook Webmail Go to outlook.office.com on your computer. Click on your Deleted Items folder Click Recover Deleted Items from Server on the banner that appears. Select the email(s) you wish to recover. *Hold ctrl and click to select multiple emails* Click Restore Selected Items Click OK…

Record a Screencast with Screenpal

Getting Started Sign in via our single sign-on (SSO) portal at https://screenpal.com/stlawu with your St. Lawrence University credentials. If your students will use ScreenPal, it's wise to have them sign in at least once to activate their account. Click Start Recorder If you do not have the ScreenPal application installed, you will be prompted to download and install it When the application opens, choose your recording options Click Record If at any point you are prompted for an access URL, it is screenpal.com/stlawu. If you are asked to confirm your plan, it is a Team Plan. St. Lawrence…

Recognize and Report Phishing Messages

What is a phishing message? Per the Computer Security Resource Center - [Phishing is] a digital form of social engineering that uses authentic-looking—but bogus—e-mails to request information from users or direct them to a fake Web site that requests information. This is a form of cybercrime intended to steal user information, including passwords, addresses, credit card info, etc. Voice calls, text, apps, email, social media, and websites can all be used by hackers to trick you into providing personal information or credentials. Attackers can then use this information to gain access to other…
Subscribe to How-To