Procedure for Setting up Email Forwarding in HKUCC1

Setup Email Forwarding in Webmail Interface (OWA) * Note: Please use Microsoft Edge to arrange the following setup. Select Settings  at the top right. Choose Options. Go to Mail > Automatic processing > Inbox and sweep rules, select . Type a name for your rule. Under *When the message arrives and it matches all of these conditions, select Apply […]

FAQ of Server Compliance

What is the license cost of the agent software for the Server Compliance Project? Each networked server is required to install an agent software to carry out compliance assessment and detect security vulnerability on the server. Its cost is HK$200 for each physical CPU core. Departments are not required to pay for maintenance cost. License […]

Accessing Exchange Online via Mail App on MacOS 12.0 or above

Open “System Preference”and choose “Internet Accounts”. Select “Microsoft Exchange” to perform the setup. Enter your name and HKUPortalUID@hku.hk. Click “Sign In”. Click “Sign In” Enter your HKUPortal UID@hku.hk and PIN. Click “Sign In”. Select the apps according to your preference or use the default setting. Click Doneto finish the setup.  

Check if there is any malicious email inbox rule

In recent cases of compromised account, some victims reported that their emails were deleted or being forwarded to the hackers. The problem was mostly due to unauthorized email inbox rules set up by the hacker. Please follow the steps below to check whether your mailbox has been injected with such malicious email inbox rules: HKU […]

Be careful of using public PCs

Avoid using public computers, and if really necessary: Avoid accessing personal and sensitive information through the public computers as your passwords and personal information may be revealed.  Do not use the “remember your password” feature associated with some web sites or browsers.  Beware of somebody standing nearby watching or even webcam installed to steal your account and […]

How to protect your computer accounts and passwords?

Here are some tips to protect your computer accounts and passwords from unauthorized use: Use a PIN/password of 10-18 characters include combinations of letters (upper and lower case) and digits.  For example, think of a sentence which can be easily remembered. Take the first character of each word and make it a password, e.g. Happy birthday to you 2 Winnie the Pooh and Tigger becomes the […]