• Home
  • Getting Started
  • ICTO Home
  • UM Home
  • 繁體中文
logo
  • Home
  • Getting Started
  • ICTO Home
  • UM Home
  • 繁體中文
You are here: /Information Security / Two-Factor Authentication (2FA) /
ICTO - FAQ » Information Security » Two-Factor Authentication (2FA) » Systems that are protected by 2FA

Systems that are protected by 2FA

  • Published on: May 30, 2019   Last updated on: January 8, 2025
  • Information Security/ Two-Factor Authentication (2FA)
  • A A A

Print

Please login with your UMPASS to view the complete contents.


Tagged:2FATwo-Factor Authentication

Related Articles

  • What is the External Email Tag?

  • Quick Guide of Two-Factor Authentication (2FA)

  • How to apply 2FA (Two-Factor Authentication) in UM App?

  • How to enable Auto Unlock for your removable drives encrypted by BitLocker?

  • Information Security Measures: Microsoft BitLocker Encryption

  • How to backup BitLocker Recovery Key?

Popular Articles

  • How to apply UM@Connect?
  • In Outlook 2013, how do I exclude certain emails from auto replies in the Out of Office Assistant?
  • Can I copy the Lotus Notes document links to the email in Outlook?
  • What can I do if I forgot my user account password?

Latest Articles

  • How to subscribe to Microsoft Copilot for M365?
  • How to Apply for a VooV/Tencent Meeting Account?
  • What features do VooV Meeting, Tencent Meeting, and Teams Meeting offer?
  • How to record meeting in VooV Meeting and Tencent Meeting?

Tag Cloud

UMMoodle Outlook staff email UM@Connect softphone jabber UMPASS SPAM Outlook 2013 HPCC Secure Email Gateway WebCMS User Digest Quarantine Office 2013 IP Phone Printing Computer Room 打印 Wireless Network Service Network 2FA Email Alias 垃圾電郵 安全電郵網關 隔離 PowerPoint 2013 雙重認證服務 eduroam UMDrive WebCMS getting started Two-Factor Authentication Follow-You Printing Wireless Open OnDemand Word 2013 WordPress
Copyright © 2021 ICTO, University of Macau. All rights reserved.