IT Answers (FAQ)
Centralized collection of answers to selected frequently asked IT related questions.
Keywords / Tags
800-172 account acrobat admin administrator admin rights adobe adobe cc apple AppsAnywhere backup bpm 12004 cloud creative cloud email Foundry foxit google hardware HPC install issue jamf licensing mac mailbox matlab microsoft network nist onedrive password renewal review security sharepoint software sponsor storage supercomputer support update upgrade vpn windows
Recently Updated Questions and Answers
- Administrator Privileges through LAPSIT Management and Software Installation: Information Technology (IT) is responsible for managing all University-owned systems including software installation. If support is needed, users should contact the IT Help Desk. On occasion, with an appropriate business case justifies the significant risk, individuals may be granted administrator privileges to install complex software or perform other administrator tasks….Continue Reading Administrator Privileges through LAPS
- What are the features of BitLocker and OneDrive on my managed computer? S&T IT is rolling out a new security feature of the Microsoft Windows operating system called BitLocker. Over the next few months, IT will enable BitLocker on managed computers in small groups to closely monitor success. To reduce potential impacts of this deployment, OneDrive will be enabled (if not already) to provide storage space in…Continue Reading What are the features of BitLocker and OneDrive on my managed computer?
- Windows 11 Transition – March 2025 UpdateIn 2023, S&T IT began focusing efforts and communicating to campus about the transition to Windows 11 operating system for campus computers to be compliant with UM System Information Security policies and guidelines. In fall 2025, Microsoft will no longer support the Windows 10 operating system. IT has a goal to transition computers running Windows…Continue Reading Windows 11 Transition – March 2025 Update
- Remote Vendor Support Options: Overview, Risks and MitigationRemote vendor support can be a valuable tool for troubleshooting and resolving technical issues. However, it also introduces potential risks if not handled securely. To assist you in utilizing remote support options while safeguarding your system, we have outlined four approaches below. Each approach is detailed in its respective section to guide you through the…Continue Reading Remote Vendor Support Options: Overview, Risks and Mitigation
- Remote Vendor Support Option- Recorded Zoom CallOne reliable option for remote support is hosting a recorded Zoom call. This enables users to document vendor assistance, share screens for live troubleshooting, and provide remote access when necessary for detailed guidance. Steps: 2. Start recording as soon as the session begins. 3. After the recording is started you have the option to stop…Continue Reading Remote Vendor Support Option- Recorded Zoom Call
- Remote Vendor Support Option – Recorded Teams CallRemote vendor support plays a crucial role in ensuring efficient problem resolution and guidance without the need for physical presence. Utilizing tools like Microsoft Teams enhances collaboration, allowing users to connect with vendors seamlessly. Recorded Teams Call:One effective remote support option is hosting a recorded Microsoft Teams call. This enables users to receive step-by-step assistance,…Continue Reading Remote Vendor Support Option – Recorded Teams Call
- Send Encrypted Emails in Outlook: A Complete GuideIn today’s digital landscape, protecting sensitive information is crucial, especially in email communication. Outlook’s Email Encryption feature empowers users to safeguard their confidential messages, keeping unauthorized eyes at bay. This guide explains when, why, and how to use Outlook Email Encryption to ensure your emails are secure and compliant. When Should You Use Outlook Email…Continue Reading Send Encrypted Emails in Outlook: A Complete Guide
- What is happening to Grammarly at S&T? Am I affected?All paid Grammarly licenses will change from @mst.edu email addresses to @umsystem.edu email addresses. This transition will move all paid licenses to a Grammarly enterprise licenses to ensure enhanced data protection and privacy, aligning with UM System policies. We will need to know if you want to have a Grammarly enterprise license which will incur…Continue Reading What is happening to Grammarly at S&T? Am I affected?
- Microsoft AuthenticatorThere are four common forms of second factor authentication: Using a hardware security token or an authenticator application, such as Microsoft Authenticator, provides the best security. As there are scenarios where a hardware security token cannot be used the most robust second factor to use is an authenticator application. Account security can be improved by…Continue Reading Microsoft Authenticator