Tag: security

Microsoft Authenticator

There are four common forms of second factor authentication: Using a hardware security token or an authenticator application, such as Microsoft Authenticator, provides the best security. As there are scenarios where a hardware security token cannot be used the most robust second factor to use is an authenticator application. Account security can be improved by…Continue Reading Microsoft Authenticator

How do I use Remote Desktop to remotely access campus computers

To remotely access computers on campus you must first install Open VPN and configure a connection to campus. Once a VPN connection has been established, use Remote Desktop or rdesktop to connect to a campus computer. For instructions on how to install OpenVPN and set up a profile to connect tot the S&T campus, see…Continue Reading How do I use Remote Desktop to remotely access campus computers

Zotero Remains Available Until December 31st, 2024

Over the last several months, your Information Technology (IT) organization has been actively working to allow for the continued use of Zotero by S&T faculty, administration, and students. Today, thanks to the efforts of Dan Stutts, the Information Technology Campus Committee (ITCC) Chair, the Chief Information Officer and he were able to speak directly with…Continue Reading Zotero Remains Available Until December 31st, 2024

Code Signing Certificate Requests

Macros within Microsoft Office must be signed with a code signing certificate for security purposes. If you need to sign macros then submit a support request to IT Security. If the request is approved you will be asked to refresh your user profile by either logging out and back in or restarting your computer. You…Continue Reading Code Signing Certificate Requests

Firewall Exceptions

By default, the S&T border firewall blocks all inbound connections. Only approved services are granted an exception to this default deny. All exceptions are subject to auditing, verification and revocation. Auditing The most basic audit performed is with a vulnerability scanner. Any critical vulnerabilities will preclude an exception and all important vulnerabilities must be remediated…Continue Reading Firewall Exceptions

Why is Zotero Being Removed From the S&T Campus?

Please see the July 24, 2024 update regarding Zotero on IT Answers for more information. Due to concerns that have arisen with Zotero, Missouri S&T IT has been instructed to retire the use of Zotero on university computer systems. To allow individuals who use Zotero time to transition, the software will remain available until August…Continue Reading Why is Zotero Being Removed From the S&T Campus?

Isora GRC Assessments

The University is using SaltyCloud’s Isora product to handle Governance, Risk and Compliance (GRC) assessments. Notifications about these assessments come from admin@mst.isora.saltycloud.com and the assessments can be accessed at https://mst.isora.saltycloud.com. The login uses your University account through a Microsoft login page (currently login.microsoftonline.com). In order to be able to login to the system your account…Continue Reading Isora GRC Assessments

What kind of network services does S&T have?

Networking is very important, especially here at S&T. But what services does our networking team provide exactly? First off, there are many moving parts when it comes to networking. These moving parts are split up into two different categories labeled Network Infrastructure and Plant Infrastructure. Behind each name, we have a wonderful team of people…Continue Reading What kind of network services does S&T have?

Does BPM 12004 Apply to Free Software and Free Services?

Yes. Free services, applications, and software still have license agreements that have to be officially reviewed by UM’s legal team. In some cases, authorized signers might still be needed to sign an agreement. S&T IT Security must also ensure that privacy is protected and that the service, application, or software is not a security threat…Continue Reading Does BPM 12004 Apply to Free Software and Free Services?

Do I have to worry about IT taking my computer without telling me? 

Our commitment to you. As a general rule, Information Technology (IT) staff will not come and take your computer, especially without you knowing.  There are a few situations where IT may have to take your computer, but we will make every effort to inform you about the situation, recover your data if possible, and provide…Continue Reading Do I have to worry about IT taking my computer without telling me? 

FIleVault/Encryption Key Escrow

FileVault is an extra layer of login protection implemented on Jamf managed Mac computers. It does not impede everyday use of the computer. The main function of FileVault is to encrypt the startup volume of Mac computers. When a user profile is created on a Jamf managed Mac computer, FIleVault is enabled for them and…Continue Reading FIleVault/Encryption Key Escrow

I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?

We offer a temporary admin request option that will allow users temporary ability to become admin on the computer. Due to security standard NIST 800-172, it is no longer possible to always allow full admin access. The use of JAMF has brought our Apple computer management and security more in line with the way we…Continue Reading I want to go back to being an admin on my Apple computer. Why can’t I go back to being an admin?

Why do we need JAMF?

JAMF is a new device management tool for Apple computers we have implemented to meet security standards. NIST 800-172 is a supplementary document to NIST SP 800-171, which is designed to help safeguard sensitive information on non-federal systems through best practice processes and security controls and applies to federal contractors that handle, process or store…Continue Reading Why do we need JAMF?

Making a BPM 12004 Request for Software

Making a BPM 12004 request with S&T IT will ensure that your software meets all security, compatibility, supportability, and sustainability requirements for Missouri S&T and the UM System and that legal responsibility is as removed from an individual person or a department as much as possible. You can learn more about the full process here:…Continue Reading Making a BPM 12004 Request for Software

Why Does IT Need to Review My Software?

Missouri S&T IT follows a software review process laid out by the UM System in BPM 12004. This policy ensures that IT and Telecom resources meet each campus’s security, compatibility, supportability, and sustainability requirements. When obtaining a software product (brand-new, renewal, open-source, or software maintenance), there is a lot going on behind the scenes. Legal…Continue Reading Why Does IT Need to Review My Software?

When does IT apply updates/patching/reboots to apps/desktops/services/network?

IT has a variety of defined maintenance windows and scheduled for different components of our computing environment. Some maintenance work is announced and scheduled explicitly. Others are scheduled on a recurrent basis. Different categories of updates/windows are included below for reference. Applications Applications are generally deployed during either the daily applications deployment window of 5pm-7pm,…Continue Reading When does IT apply updates/patching/reboots to apps/desktops/services/network?