Information Technology A to Z Index IT Service Support Request

Faculty Support

Use Microsoft Stream to Host Video Content in Blackboard

In order to reduce load on the Blackboard servers, it is a good practice not to upload videos directly to Blackboard.  Instead, all EKU users have an account on stream.microsoft.com where they can upload and share videos to other EKU users.  This tutorial illustrates how to use this feature to embed video content in to your Blackboard course without hosting the videos on the Blackboard server.

First, go to stream.microsoft.com and click on the sign in button in the top right:

Check Mac Office Version

ISSUE: Check what version of Mac Office on computer

RESOLUTION:

Remote Desktop Connection (Mac)

How to connect to another computer using Remote Desktop Connection.

Use a Secure Internet Connection

Use secure networks, such as your cellular carrier network, EKU_SECURE, or a wire connection.

On Campus

Use a wired connection when practical.  Wired connections to the internet from on-campus computers, including lab computers, use the university's secure network.  These are always recommended on-campus for Blackboard (e.g., taking tests and quizzes) and confidential university work (e.g., financial information).

External Email Tags

To identify potential phishing emails from outside senders, IT will begin using external email tags on Wednesday, April 22, 2020.

Get Started with Blackboard: Faculty

Blackboard is EKU's learning management system (LMS):

Wireless Network: Chromebooks

How to connect your Chromebook or other ChromeOS device to EKU's Wi-Fi.

Using Respondus LockDown Browser - For Instructors

Respondus LockDown Browser (LDB) is a tool that you can enable in your Blackboard course to perform a somewhat automated form of test proctoring.  LDB is a web browser that will prevent students from opening other programs or going to other websites besides EKU's Blackboard.  NOTE: Respondus Monitor is an option within LDB that automatically records the students' monitor display and their webcam.   

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Password Security Checklist

Change Your Password if it is at Risk

If your password is at risk, you may need to change it more often.  Ask yourself the questions below to see if you need to change your password now.  Balance your answers with the need to have a password that you can remember without having to write it down.  If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable. 

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook/OWA system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Office365 Email Migration - iOS Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native iOS email app

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

I am a new employee and require a computer

For all new employees, your supervisor will need to reach out to Amy Graham in IT to discuss computer needs.

We will need to know if you are full-time or part-time and if your department has a computer for you to use already that may need to be setup for the new employee.

At this time we can also discuss software requirements.

Office365 Email Migration - iOS Instructions for the Outlook App

Skip adding additional accounts if prompted.This will show you how to set up your new Office365 email on the Outlook email app

Pages