3rd Party Mailers
Workflow for processing third-party mailer requests for external email services.
Workflow for processing third-party mailer requests for external email services.
The it-cloud-account-hub repository for account definitions and Terraform orchestration.
Process for requesting AWS accounts through the Aggie Innovation Platform.
Terraform module for creating AWS accounts in the account hub.
Break-glass procedures for accessing AWS when SSO is unavailable, including IAM user creation and role assumption.
Testing and deploying AWS Service Control Policies using Kion.
Processing Cloud Access Security Broker (CASB) alerts in Proofpoint.
Cloud security documentation including Kion cloud governance platform and security policies.
Investigating and resolving potentially compromised mail users in Microsoft 365.
Guidelines for appropriate deployment of Proofpoint Endpoint DLP agents.
Data Loss Prevention implementation guide for onboarding university units.
Guide to the DMARC Grafana dashboard panels and analysis techniques.
A comprehensive guide to configuring DLP in Microsoft Purview and Google Workspace to automatically encrypt or block sensitive emails, ensuring compliance with FERPA, HIPAA, and NIST.
Weekly email security metrics generation and reporting procedure.
Email security documentation for Proofpoint, Microsoft 365, DMARC, and related tools.
ExtraHop Reveal(x) network detection and response platform documentation.
Terraform module for creating Kion-specific resources in the account hub.
Administering Kion for cloud access management and federation into AWS accounts.
A technical guide for IT administrators on enabling, disabling, and managing Copilot in Windows and its integration with Microsoft 365 for the Texas A&M University environment.
Comprehensive guide for configuring and using Microsoft Entra Privileged Identity Management (PIM) with group-based role assignments.
Overview of NLA's critical role in RDP security, common threats when NLA is disabled, and mitigation strategies for IT administrators.
Network Level Authentication threats and mitigation strategies for Remote Desktop Protocol security.
Procedure to prevent syncing of personal OneDrive accounts on University devices using GPO and Intune.
Proofpoint Protection Server administration including user management and quarantine operations.
Proofpoint Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) documentation for enterprise data protection.
Managing the Proofpoint Targeted Attack Protection (TAP) custom blocklist.
Managing email safe lists, block lists, and submitting false positives/negatives to Proofpoint.
Practical guide for configuring SharePoint permissions using Cloud Scope Groups (CSGs) and File Scope Groups (FSGs) for Zero Trust governance.
Step-by-step guide for configuring secure SharePoint Online site permissions using scope groups.
How to install and connect to Texas A&M VPN using Cisco Secure Client on Windows, Mac, Linux, iOS, and Android
A comprehensive technical guide for IT administrators on the new features, security enhancements, known issues, and deployment strategies for Windows 11 Version 24H2.
A technical guide for IT administrators on the changes, security focus, and deployment of Windows 11 Version 25H2, the 2025 Update.
Windows features, updates, security, and enterprise management including WUfB, Autopatch, and deployment strategies.