If you believe you have been the target of a malicious phishing attack, it is crucial that you do not click any links and take the following steps to report the issue as soon as possible. Report the Suspicious Email Not sure if the email is phishing? Reach out to IT Security and they will…Continue Reading How do I report phishing?
How do I use Remote Desktop to remotely access campus computers
To remotely access computers on campus you must first install Open VPN and configure a connection to campus. Once a VPN connection has been established, use Remote Desktop or rdesktop to connect to a campus computer. For instructions on how to install OpenVPN and set up a profile to connect tot the S&T campus, see…Continue Reading How do I use Remote Desktop to remotely access campus computers
Zotero Remains Available Until December 31st, 2024
Over the last several months, your Information Technology (IT) organization has been actively working to allow for the continued use of Zotero by S&T faculty, administration, and students. Today, thanks to the efforts of Dan Stutts, the Information Technology Campus Committee (ITCC) Chair, the Chief Information Officer and he were able to speak directly with…Continue Reading Zotero Remains Available Until December 31st, 2024
Code Signing Certificate Requests
Macros within Microsoft Office must be signed with a code signing certificate for security purposes. If you need to sign macros then submit a support request to IT Security. If the request is approved you will be asked to refresh your user profile by either logging out and back in or restarting your computer. You…Continue Reading Code Signing Certificate Requests
Account Expiration & Extension
The University regularly reviews accounts for expiration or deletion. When an account owner no longer meets the account eligibility requirements, account access to resources will be terminated. For more information on account eligibility please see the Email Management Policy and Electronic Mail Use and Management Procedures . Account extensions are managed via AIMS with help…Continue Reading Account Expiration & Extension
Firewall Exceptions
By default, the S&T border firewall blocks all inbound connections. Only approved services are granted an exception to this default deny. All exceptions are subject to auditing, verification and revocation. Auditing The most basic audit performed is with a vulnerability scanner. Any critical vulnerabilities will preclude an exception and all important vulnerabilities must be remediated…Continue Reading Firewall Exceptions
Why is Zotero Being Removed From the S&T Campus?
Please see the July 24, 2024 update regarding Zotero on IT Answers for more information. Due to concerns that have arisen with Zotero, Missouri S&T IT has been instructed to retire the use of Zotero on university computer systems. To allow individuals who use Zotero time to transition, the software will remain available until August…Continue Reading Why is Zotero Being Removed From the S&T Campus?
Isora GRC Assessments
The University is using SaltyCloud’s Isora product to handle Governance, Risk and Compliance (GRC) assessments. Notifications about these assessments come from admin@mst.isora.saltycloud.com and the assessments can be accessed at https://mst.isora.saltycloud.com. The login uses your University account through a Microsoft login page (currently login.microsoftonline.com). In order to be able to login to the system your account…Continue Reading Isora GRC Assessments
Apple Temp Admin Rights
To obtain Temp Admin rights for a Jamf enrolled Mac, you will need to utilize the Self Service application. Follow the directions below or watch the attached video. *Time limit per request is 30 minutes, but there is no limit to the amount of requests. Guided directions for Grant Temp Admin.>>…Continue Reading Apple Temp Admin Rights
What kind of network services does S&T have?
Networking is very important, especially here at S&T. But what services does our networking team provide exactly? First off, there are many moving parts when it comes to networking. These moving parts are split up into two different categories labeled Network Infrastructure and Plant Infrastructure. Behind each name, we have a wonderful team of people…Continue Reading What kind of network services does S&T have?
What kind of technical support does S&T offer?
Here at S&T, a lot of the work done revolves around technology. Each and everyday students and staff log on to complete their various tasks for the day, but what do you do if something goes wrong with your computer? Who do you contact for any form of technical assistance? Luckily, we have a wonderful…Continue Reading What kind of technical support does S&T offer?
Does BPM 12004 Apply to Free Software and Free Services?
Yes. Free services, applications, and software still have license agreements that have to be officially reviewed by UM’s legal team. In some cases, authorized signers might still be needed to sign an agreement. S&T IT Security must also ensure that privacy is protected and that the service, application, or software is not a security threat…Continue Reading Does BPM 12004 Apply to Free Software and Free Services?
Do I have to worry about IT taking my computer without telling me?
Our commitment to you. As a general rule, Information Technology (IT) staff will not come and take your computer, especially without you knowing. There are a few situations where IT may have to take your computer, but we will make every effort to inform you about the situation, recover your data if possible, and provide…Continue Reading Do I have to worry about IT taking my computer without telling me?
FIleVault/Encryption Key Escrow
FileVault is an extra layer of login protection implemented on Jamf managed Mac computers. It does not impede everyday use of the computer. The main function of FileVault is to encrypt the startup volume of Mac computers. When a user profile is created on a Jamf managed Mac computer, FIleVault is enabled for them and…Continue Reading FIleVault/Encryption Key Escrow
I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?
We offer a temporary admin request option that will allow users temporary ability to become admin on the computer. Due to security standard NIST 800-172, it is no longer possible to always allow full admin access. The use of JAMF has brought our Apple computer management and security more in line with the way we…Continue Reading I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?
Why do we need JAMF?
JAMF is a new device management tool for Apple computers we have implemented to meet security standards. NIST 800-172 is a supplementary document to NIST SP 800-171, which is designed to help safeguard sensitive information on non-federal systems through best practice processes and security controls and applies to federal contractors that handle, process or store…Continue Reading Why do we need JAMF?
Making a BPM 12004 Request for Software
Making a BPM 12004 request with S&T IT will ensure that your software meets all security, compatibility, supportability, and sustainability requirements for Missouri S&T and the UM System and that legal responsibility is as removed from an individual person or a department as much as possible. You can learn more about the full process here:…Continue Reading Making a BPM 12004 Request for Software
Why Does IT Need to Review My Software?
Missouri S&T IT follows a software review process laid out by the UM System in BPM 12004. This policy ensures that IT and Telecom resources meet each campus’s security, compatibility, supportability, and sustainability requirements. When obtaining a software product (brand-new, renewal, open-source, or software maintenance), there is a lot going on behind the scenes. Legal…Continue Reading Why Does IT Need to Review My Software?
When does IT apply updates/patching/reboots to apps/desktops/services/network?
IT has a variety of defined maintenance windows and scheduled for different components of our computing environment. Some maintenance work is announced and scheduled explicitly. Others are scheduled on a recurrent basis. Different categories of updates/windows are included below for reference. Applications Applications are generally deployed during either the daily applications deployment window of 5pm-7pm,…Continue Reading When does IT apply updates/patching/reboots to apps/desktops/services/network?