Category: Uncategorized

Administrator Privileges through LAPS

IT Management and Software Installation: Information Technology (IT) is responsible for managing all University-owned systems including software installation. If support is needed, users should contact the IT Help Desk.  On occasion, with an appropriate business case justifies the significant risk, individuals may be granted administrator privileges to install complex software or perform other administrator tasks….Continue Reading Administrator Privileges through LAPS

Remote Vendor Support Options: Overview, Risks and Mitigation

Remote vendor support can be a valuable tool for troubleshooting and resolving technical issues. However, it also introduces potential risks if not handled securely. To assist you in utilizing remote support options while safeguarding your system, we have outlined four approaches below. Each approach is detailed in its respective section to guide you through the…Continue Reading Remote Vendor Support Options: Overview, Risks and Mitigation

Remote Vendor Support Option- Recorded Zoom Call

One reliable option for remote support is hosting a recorded Zoom call. This enables users to document vendor assistance, share screens for live troubleshooting, and provide remote access when necessary for detailed guidance. Steps: 2. Start recording as soon as the session begins. 3. After the recording is started you have the option to stop…Continue Reading Remote Vendor Support Option- Recorded Zoom Call

Remote Vendor Support Option – Recorded Teams Call

Remote vendor support plays a crucial role in ensuring efficient problem resolution and guidance without the need for physical presence. Utilizing tools like Microsoft Teams enhances collaboration, allowing users to connect with vendors seamlessly. Recorded Teams Call:One effective remote support option is hosting a recorded Microsoft Teams call. This enables users to receive step-by-step assistance,…Continue Reading Remote Vendor Support Option – Recorded Teams Call

Send Encrypted Emails in Outlook: A Complete Guide

In today’s digital landscape, protecting sensitive information is crucial, especially in email communication. Outlook’s Email Encryption feature empowers users to safeguard their confidential messages, keeping unauthorized eyes at bay. This guide explains when, why, and how to use Outlook Email Encryption to ensure your emails are secure and compliant. When Should You Use Outlook Email…Continue Reading Send Encrypted Emails in Outlook: A Complete Guide

Windows 11 Transition Update

In 2023, S&T’s information technology team began focusing efforts on and communicating to employees about the transition to the Windows 11 operating system so campus computers comply with UM System Information Security policies and guidelines. In fall 2025, Microsoft will stop supporting the Windows 10 operating system. Progress: As of Thursday, Oct. 31, IT has…Continue Reading Windows 11 Transition Update

Why am I Having Trouble with Minerfiles on iOS?

If you have tried logging into minerfiles.mst.edu/dfs on your iOS device, you might notice that although you are able to log in, you eventually encounter a “Content Unavailable” when navigating deep enough. Unfortunately, this is a fundamental shortcoming of the iOS files app. The files app does support the technology required to connect to the…Continue Reading Why am I Having Trouble with Minerfiles on iOS?

What do I do with used printer toner cartridges?

If your printer is a Marco printer, the used toner needs to be returned to Marco. Here is a link with instructions: https://help.marconet.com/recycle-your-toner If the printer is not a Marco printer, the toner cartridge can be taken to the Rolla Recycling Center on Old St. James Road during regular office hours. There is not a…Continue Reading What do I do with used printer toner cartridges?

How do I secure my computer when traveling?

IT has implemented security procedures for International Travel by faculty, staff and students. If the traveler is on CUI or export-controlled projects, IT will provide a loaner laptop. If the traveler is not on CUI or export-controlled projects, then the traveler may take a loaner laptop or their S&T managed laptop. The loaner and the…Continue Reading How do I secure my computer when traveling?

How do I use Remote Desktop to remotely access campus computers

To remotely access computers on campus you must first install Open VPN and configure a connection to campus. Once a VPN connection has been established, use Remote Desktop or rdesktop to connect to a campus computer. For instructions on how to install OpenVPN and set up a profile to connect tot the S&T campus, see…Continue Reading How do I use Remote Desktop to remotely access campus computers

Research System Configuration and BPM12004

There are two aspects to research systems and BPM12004 compliance: requirements imposed by Data Classification Level (DCL) requirements and general IT requirements relating to security and supportability. While each of these points is listed individually they are not truly separable and have interactions. For example, using domain logins touches on access attribution, standard user privilege…Continue Reading Research System Configuration and BPM12004

ADA Accessibility Requirements

Information and Communication Technology (ICT) procurements must meet the applicable accessibility standards of 36 Code of Federal Regulations (CFR) 1194. 36 CFR 1194 implements Section 508 of the Rehabilitation Act of 1973, as amended. The refresh of Section 508 of the Rehabilitation Act, a law governing standards for electronic and information technology which applies to…Continue Reading ADA Accessibility Requirements

Accessing Adobe CC on Windows for the First Time After Installation

This article will show you how to load Adobe CC for the first time after installation on your Windows computer and show you how to install individual applications from the Adobe CC app. Adobe CC licenses are assigned per username and can be used on up to two computer systems simultaneously. 1. After IT confirms…Continue Reading Accessing Adobe CC on Windows for the First Time After Installation

Student Preferred Name

Adding or Changing Preferred Name Students may use preferred first and middle names at S&T. Preferred first and middle names are used on class rosters, ID cards, transcripts and diplomas and other locations where the legal name is not required. All preferred names should be entered into Joe’SS following the instructions. Do not use quotation…Continue Reading Student Preferred Name

Do I have to worry about IT taking my computer without telling me? 

Our commitment to you. As a general rule, Information Technology (IT) staff will not come and take your computer, especially without you knowing.  There are a few situations where IT may have to take your computer, but we will make every effort to inform you about the situation, recover your data if possible, and provide…Continue Reading Do I have to worry about IT taking my computer without telling me? 

What is the IT Status Page?

Having trouble connecting to Joes’SS or PeopleSoft? Is Canvas not loading properly? Make sure to check S&T IT Services and Systems Status page, or more commonly called the IT Status Page, at https://status.mst.edu/ for any and all technology performance issues and outages. Different icons are used to display the current status of each campus service…Continue Reading What is the IT Status Page?