Information Technology A to Z Index IT Service Support Request

Student Support

Student Computing Fee Information

Original Proposal
Submitted by the Director of Academic Computing & Telecommunications Services
to the Student Government Association
Spring, 1998

STUDENT COMPUTING FEE PROPOSAL

PURPOSE

            The purpose of the student computing fee is to produce funding in order to provide EKU students with accessible, reliable, and appropriate computing resources that will enhance their educational experience.

ADMINISTRATION

Wireless Network: Chromebooks

How to connect your Chromebook or other ChromeOS device to EKU's Wi-Fi.

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

Disable clutter folder (How To)

Issue: I would like to disable the clutter folder in my EKU myMail account

Cause: The clutter folder in your myMail account is a new mailbox management feature of Office 365.  It can be turned on or off depending on your preferences.    Clutter analyzes how you process your email and moves the 'unimportant stuff' out of your inbox folder and places that into the clutter folder.  In theory it should leave you with an emptier and distraction-free inbox.  

ISSUE: Your account information is not available

ISSUE: While trying to activate my EKU student email account, I receive the error 'Your account information is not available'

RESOLUTION:   This means you have been accepted by the university but your email account is still not created in our system.  Generally if you give IT 2-3 days (not including weekends/breaks) it will fix itself.

If, however, you still get the same error after waiting 2-3 days (not including weekends/breaks) then you should call the IT Service Desk: 859-622-3000

 

Your password has changed

Issue: You receive an email with the subject: "Your password has changed" from it.customerservice@eku.edu

Cause: Your password was reset in EKU Direct.

Resolution:

The email will look like this, with your name:
password

If you did not reset your password in EKU Direct:

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

New Student Authentication Requirements (myMail, Office 365)

As of Friday, March 17, 2017 all EKU students will have a new authentication method that will affect things such as myMail and Office 365 login.  This new authentication page looks like the image below and requires, as the username, your entire EKU email address--not just the portion before the @ sign.  For example, you username used to be jane_doe101 and changed to jane_doe101@mymail.eku.edu.

EKU myMail POP, IMAP, SMTP Settings

Many email clients will likely configure the necessary settings if you provide your myMail address and password.  In case they don’t:

POP setting  (the first method of downloading mail; clients usually give you the option of keeping or removing a copy of messages stored on myMail site )
Server name:  outlook.office365.com
Port:  995
Encryption method:  TLS

Update/Change Verification Phone Number and Email - Student Password Self-Service

  1. Login to https://myapps.microsoft.com/.
  2. Click your profile image/badge in the top right of your screen, then choose Profile
    Click your profile image/badge in the top right of your screen, then choose Profile

     

IT Services - Leaving the University

Leaving EKU? Whether you're about to graduate, retire, or take another job, take these steps to make your transition as smooth as possible.

Effective Wednesday, October 1, 2018, EKU IT--to remain in legal compliance with both Microsoft, Google, and our software vendors-- must remove access to Office 365, Google app services, and university licensed software as listed below.

Two-Factor Authentication (2FA) Setup

  1. Open a browser on your computer and go to https://mymail.eku.edu then login
  2. You will see the screen below then click Set it up now
    You will see the screen below then click Set it up now

Manage Your Two-Factor Authentication (2FA) Settings

ISSUE: Authentication phone number or app changed and need to update or add security verifications

FIX:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Check Mac OS Version

ISSUE: Find what version of Mac OS currently using

RESOLUTION:

  1. Click the Apple icon in the top left screen.  Click About This Mac:
    About This Mac
  2. Your version number is located at the top of the windows that opens:
    iOS Version

 

How to turn off focused inbox

ISSUE: Student missing emails in inbox

RESOLUTION: Turn 'Focused Inbox' off in myMail settings

 

Reset EKU Password

ISSUE: I need to reset my EKU email password and it is still working

FIX

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Require two-factor verification (2FA) again on a device you've marked as trusted

ISSUE: You want to restore two-factor authentication on all your devices because your device is lost or you think your account is compromised

Pages