Information Technology A to Z Index IT Service Support Request

Employee Support

Privilege Management for Windows (PMFW)

Installing Applications

A special malware protection mechanism has been installed on EKU laptops. That software, called Privilege Management for Windows (PMFW), provides the security of a limited-user account and the flexibility of elevating to an administrator account on demand.

Wireless Network: Linux/Unix-based

Information on how to set Linux/Unix-based systems up on EKU wi-fi.

Telephone Options Guide: Employees

This is a guide to telephone options for EKU employees.

Backup & Retention Policy

Time parameters for backups for various IT systems. This is a short list of important systems and the backup policies for each.

Remote Desktop Connection (Mac)

How to connect to another computer using Remote Desktop Connection.

Connecting to AD File Servers: Mac

Quick instructions for connecting to AD file servers from a Mac.

BitLocker Recovery

Because BitLocker uses custom passwords for encrypting external storage devices (thumb drives or USB hard drives), you might need to recover a forgotten password some day. You are welcome to call the IT Service Desk; however, this article describes how you can recover a BitLocker password through the self-service web site, bitlocker.eku.edu.

VPN

This article is a placeholder

The VPN client can be downloaded by going to https://sslvpn.eku.edu  and authenticating with your EKU email address and password if prompted.

External Email Tags

To identify potential phishing emails from outside senders, IT will begin using external email tags on Wednesday, April 22, 2020.

Data Trustee Program

This support article explains best practice data security management for employees who handle confidential information.

Wireless Network: Chromebooks

How to connect your Chromebook or other ChromeOS device to EKU's Wi-Fi.

Troubleshooting a Network Connection

Issue: Network speed or connection issues (Residence Halls and around campus)

Fixes:

Check Mac OS Version

This page is to find out what MacOS you are running.

Fax

Directions to use the fax feature on the department printers at EKU.

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Mac: MAC Address

Instructions on how to find the MAC address for ethernet or wireless networking card on a Mac computer.

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Mac: Screenshot

Learn how to take pictures of the screen (screenshots) on a Mac. These screenshots are saved as files on the desktop.

Pages