Hero Image

I Need More Help!

Request assistance using the IT Help System*.

*Non-ANR personnel should contact their local coordinator or site administrator for assistance.

You've found help

What is Sitebuilder 3.0?

Site Builder 3.0 is a web content management system created for use by anyone in University of California Agriculture and Natural Resources to create and maintain a web site. This Help site is dedicated to helping you find your way through it.

If you are ANR personnel, you can contact us directly at Communication Services and Information Technology for advice on how to use Site Builder 3.0 or to suggest additions or changes to this Help site. Non-ANR personnel should contact their local coordinator or site administrator for assistance.

From Our Blog
  • PDF Conversions and SiteBuilder

    Nov 1, 2019

    As part of our on-going effort to improve SiteBuilder efficiency and security, UC ANR IT is removing the PDF conversion tool from SiteBuilder.

    Unlike when SiteBuilder was first released, creating PDFs from documents, spreadsheets and presentations is far more readily available today on standard PC and Mac desktops. We encourage users to adopt a workflow that creates PDFs before they are uploaded to SiteBuilder (or other online entities) because it affords better control of the final product and eliminates unnecessary duplication.

    When using Office365, a user can easily download a file as a PDF, while desktop versions of Office provide the option of creating a PDF copy through the Export function.

    Please let us know if you have any questions or concerns.

    pdf conv1

    pdf conv2

    By Bruce Lidl
    Author - IT Communications Specialist
  • Accessibility Scores Available In Site Builder

    Oct 30, 2019

    Annotation 2019-10-30 094642

    You may have noticed a new notification when you first login to edit your site in Site Builder. In an effort to improve Electronic Accessibility at ANR, all sites that have switched over to the modern theme in Site Builder were automatically added to an Accessibility tool available to the entire UC called Siteimprove.

    As the notification suggests, you can contact help@ucanr.edu to get access to Siteimprove and view the accessibility report for your site. There is a lot of information there but a quick way to filter the issues to be more pertinent is to click on the 'Editor' and 'Webmaster' tabs. If you come across an issue that looks like it's part of the modern theme and would display on all ANR sites, we are currently working through those and trying to improve our scores across the board. You might also come across issues that you can easily fix yourself by editing a text asset, etc. For everything else, feel free to put in a ticket referencing the issue in Siteimprove and we'll take a look at it as soon as we can.

    Annotation 2019-10-30 103104

    A few other resources for getting started with Accessibility issues in Siteimprove can be found here:

    Siteimprove Help Center: Accessibility Score Points Weighting
    Siteimprove Help Center: Levels A, AA, AAA errors in Siteimprove Accessibility explained

    If you aren't seeing the notification in Site Builder and would like your site to be added to Siteimprove, let us know and we'll get you set up.

    By Andrew William Waegli
    Author - Application Programmer
  • International travel and cybersecurity

    Aug 12, 2019

    cartography-3244166 1280

    Electronic devices have become integral parts of our daily lives. We depend on them for connectivity, productivity and access to information. While abroad, however, we need to be aware of the increased risks we face in terms of cybersecurity.

    Using our cell phones, tablets and laptops in other countries can increase the risk of privacy breaches, system intrusion and device theft. 

    There are ways to protect your equipment, your information and your communications while traveling. Take the time to familiarize yourself to the following general guidelines and always check for updated resources before any foreign trip:

    1. The less you take the less you can lose. If you are not very sure you will need something, consider leaving it behind. This guideline applies to both devices and data (contacts, passwords, files).
    2. Be aware of basic security precautions. Keep devices with you – not in checked luggage, not in your hotel safe and not with airline or hotel staff. Be wary of public wireless Internet or Wi-Fi hotspots and use a virtual private network (VPN) if available. Never use the computers available in public areas, hotel business centers, or cyber cafés since they may be loaded with keyloggers and malware.  Do not plug in any untrusted attachments, like USB drives or other connectors.
    3. Know before you go. Read up on specialized laws about the country or region you are visiting, including export control laws, possible illegal content, or encryption rules.


    Additional tips and recommendations

    • For global travel, consider utilizing temporary gadgets, for example, an inexpensive laptop and a prepaid cell phone bought particularly for travel. Any device you bring to a foreign country may be compromised, even without you knowing.
    • If you do bring non-temporary devices, backup your data before you go. Install and configure encryption software.
    • In many countries, travelers should have no expectation of privacy. While VPNs can bypass some levels of censorship, they should not be relied on to work at all times (for China, see: https://www.travelchinacheaper.com/vpns-still-work-china)
    • Configure device according to minimum security standards.  The following requirements are especially critical for foreign travelers:
      • update your operating system and application software to the latest versions possible
      • install and update anti-malware software
      • choose strong passphrases
      • for laptops, setup and use a personal account that does not have superuser (root, administrator) privileges
    • After returning: change all passwords used abroad, run antivirus scans and delete apps used specifically for travel.
    • Ensure that you have the correct plug adapters and power converters.
    • You should assume no right to privacy at U.S. borders and points of entry. U.S. Customs and Border Protection officers can deny entry to the U.S. to individuals who refuse to unlock or surrender their electronic devices for inspection. (https://security.ucop.edu/resources/traveling-with-electronic-devices/faq.html)


    For updated travel security information, please see these resources:





    By Bruce Lidl
    Author - IT Communications Specialist
  • Spear Phishing Email Campaigns Target UC ANR Leadership

    Aug 9, 2019

    Fish hook

    Phishing (pronounced 'fishing') is an email scam designed to acquire sensitive information from people. The most successful phishing emails are designed to look like the email comes from a reputable source such as a known person or entity. UC ANR faculty and staff are often the target of attempts to gain login credentials or personal information through phishing scams that may claim to be coming from UC ANR. These are fraudulent attempts and should not be replied to or acted upon.

    In early July, a number of UC campuses and affiliated institutions were targeted by a coordinated, wide-ranging “spear phishing” campaign. The scammers, masquerading as unit leads and executives, tried to get people to reveal sensitive information. We would like to take a moment to describe this attack, and offer tips for spotting similar attacks, and how to report them. If you believe that you have received a phishing or spear phishing email, please forward it to help@ucanr.edu. Messages sent to the UC ANR IT email account will help improve our detection mechanisms for future phishing attempts.


    Warning Signs

    One telltale sign of spear phishing is an unusual request. For example, is a colleague asking you to transfer money or other goods seemingly out of the blue? Are they insisting on a specific deadline, or otherwise creating an artificial sense of urgency? If so, you might be a target of spear phishing.

    If the message or request does seem suspicious, do a little digging to ensure it is actually coming from your colleague. For example, in the recent attack, the fraudulent messages came from Gmail accounts designed to look like @ucsd.edu accounts:

    From: Bob Smith


    To: a colleague of the real Bob Smith

    In a few cases, the spammers changed the “from” address to other variations of a bogus email address, such as:

    From: Bob Smith


    To: a colleague of the real Bob Smith

    In this case, the recipients were all professional colleagues of the individuals whose names were used as the bogus sender of the messages. This suggests the individuals or organization sending the notes had researched their targets and crafted the messages specifically for them. This is the essence of spear phishing. The tactic is often a tool of state-sponsored hackers who are trying to garner a toe-hold into organizations with proprietary assets, including the world-class research and health care assets at University of California.

    How to notify

    Phishing attacks – and spear phishing attacks like the one that occurred earlier this month – are likely to become more and more sophisticated as time goes by. CSIT has tools to identify and remove fake emails that get delivered to @ucanr.edu accounts. But you can help too:

    The UCOP maintains extensive information on phishing on their website: https://security.ucop.edu/resources/security-awareness/phishing-2019-campaign.html

    Specific questions about our handling of spam and phishing that are not addressed above can be sent to the UC ANR Help at help@ucanr.edu.

    By Bruce Lidl
    Author - IT Communications Specialist