Computing Services

The Computing Services department manages the University computer labs, develops and maintains the configurations of University owned laptop and desktop computers, performs maintenance and repairs on University owned software and hardware, deploys and maintains PC software site licenses, and provides general technical support for PCs at the University.

icon Open Support Request
Search Department Resources

Acceptable Use Policy for Computer Usage

icon Close

The computing and electronic communications resources at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines to appropriate behavior and use of FDU computing resources.


These guidelines apply to all users of FDU computing resources. Users include all students, faculty, visiting faculty, staff, guests of the administration, and external individuals or organizations.

Computing resources include, but are not limited to, desktop and laptop computers, file servers, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased or rented by FDU. In addition, computing resources expressly include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies equally to all usage of University computing resources, whether that usage occurs through a University owned device or personal device.

University property, including computing resources, are provided to you in order to conduct University business. Although security protocols have been put in place to restrict access to computing resources in order to protect them against external parties or entities obtaining unauthorized access, employees should understand that these systems are intended for business use, and all computer resources are to be considered as University records.

Fairleigh Dickinson University is not responsible for the content of any material users prepare, receive or transmit. Thus, as a condition of using the University’s computer system, the user represents that he/she is in compliance with all federal, state and international copyright and other intellectual property laws and agreements and other federal and state laws, and that in his/her use of the system the user will not violate any federal or state civil or criminal laws. Furthermore, the user will indemnify, exonerate and hold the University, and its representatives, harmless from any claim, damage or cost related to the user’s use that is in violation of University policy(ies), including any legal fees the University decides it is necessary to incur to defend itself.


Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:

  1. You also shall not use an account not belonging to you. You will use only the computers, computer accounts and computer files for which you have authorization.
  2. You are responsible for any computer account you have been given. You shall set a password on the account that is in compliance with University password policies and you shall not share this password with other people. If you discover that someone has made unauthorized use of your account, you should change your password immediately and immediately report the event to one of the individuals listed in Appendix 1.
  3. You agree not to intentionally seek out information about, copy, or modify password files, other users’ files, or disks and tapes belonging to other people, whether at FDU or other facilities.
  4. You should not attempt to decrypt material to which you are not entitled or attempt to gain rights you have not been specifically granted by the owner. If you observe or discover a gap in system or network security, you agree to inform the one of the individuals listed in Appendix 1 and not to exploit the gap.
  5. You agree to refrain from any activity that interferes with a computer’s operating system or its logging and security systems, or that may cause such effects.
  6. You must be sensitive to the public nature of computing resources and agree not to transmit, post or otherwise display material that is threatening, obscene, harassing or defamatory. The use of University computing resources to libel, slander, or harass any other person is not allowed and could lead to University discipline as well as legal action by those who are the recipients of these actions.
  7. You agree not to make copies of or distribute software the University owns or uses under license, unless the owner of the software or the owner of the license has specifically granted permission to copy. If in doubt as to whether you have permission to copy software, assume you don’t.
  8. Messages, statements, and declarations sent as electronic mail or public postings should be treated as if they were tangible documents. From electronic identifiers used in the transmission of messages, addressees can see the University is the source of the message or its system is being used to transmit it, similar to how letterhead or return addresses on a tangible document would identify the University. SUGGESTION: Therefore, as a representative of the FDU community, you are expected to respect the University’s good name in your electronic dealings with those both within and outside the University. Moreover, in so far as employees make use of FDU computing resources to relay personal opinions, it is their obligation to make sure that no addressee can infer that their personal opinions are necessarily shared or authorized by the University, and they are obligated to clearly identify their opinions as their own and not those of the University.
  9. You agree not to create, alter, or delete any electronic information contained in any system that is not your own work.
  10. You agree not to create & send, or forward electronic chain mail letters. You agree not to attempt to alter or forge the “From” line or any other attribution of origin contained in electronic mail or postings. You agree not to use any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email).
  11. You shall not use FDU computing resources as a means of obtaining unauthorized access to any other computing systems.
  12. FDU’s data storage, on University servers, hosted servers, third party storage or hosted storage, is an FDU computing resource with costs attached and should be used with care and discretion. It is not meant to be used for archiving programs and data not currently being used or for storage of files publicly available elsewhere. It is meant for current class work, research and development projects, business files and temporary storage of other files. Users shall attempt to keep their disk usage minimized and will refrain from maintaining duplicate copies of software already installed, or other files stored, on the system.
  13. Network addresses such as TCP/IP addresses and machine addresses are assigned by University Systems and Networking staff and may not be altered or otherwise assigned without the explicit permission of the Associate Vice President of Technology Infrastructure and CTO/CISO. In addition, no equipment may be attached to the network without the explicit permission of the the Associate Vice President of Technology Infrastructure and CTO/CISO.
  14. FDU’s computing resources are not to be used for the transmission of commercial or personal advertisements, solicitations, and promotions or for extended reproduction of political, ideological or commercial material originated by a person or organization. This includes but is not limited to the execution of revenue-generating advertising programs which pay users when the programs are run. The Associate Vice President of Technology Infrastructure and CTO/CISO may suspend this rule when it is in FDU’s best interest to permit such activity.
  15. Users may not contract with external Internet services, service providers or the like without the explicit approval of the Associate Vice President of Technology Infrastructure and CTO/CISO.
  16. Without the explicit permission of the Associate Vice President of Technology Infrastructure and CTO/CISO you agree not to run any of the following protocols or services:

    A. Port scanners, network monitors or other types of utilities that probe any other computer, be they inside or outside FDU’s network.
    B. Routing or network serving protocols such as RIP, IGRP, OOTP or DHCP on the network.
    C. Daemons, processes or programs that accept incoming connections, as a server would.
    D. Streaming media servers or any other server that broadcasts continuous data streams.
  17. FDU’s computing resources, including equipment,, network, services, and wiring may not be modified or extended beyond the areas of their intended use.
  18. Network connections may not be used to provide network access to anyone outside the University community or for any purposes other than those that are in direct support of the academic mission of the University.
  19. All computers connected to FDU’s network must run an operating system and configuration that is supported by its vendor with regard to security patches and updates, as well as antivirus software with current virus definitions. It is the user’s responsibility to keep their virus definitions up to date and to apply all critical operating system updates. For more information or questions email infosecurity@fdu.edu.
  20. Users may not alter the operating system or configuration of University owned computers without the explicit authorization of the Associate Vice President of Technology Infrastructure and CTO/CISO.


Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University , should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.

Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.


Users should use any available methods to safeguard their data, including regular changes of passwords, making duplicates of files, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.

Information Systems and Technology (“IST”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems. In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years. This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years.

In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.

University Systems and Networking and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.


Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval and review. Users of the University’s computing resources are hereby informed that they have no justified expectation of privacy in material processed, sent, or stored on or through the systems, and that the consent of the user to give access to his or her electronic documents is a condition precedent to the user’s use of University’s computer resources.

Even though the electronic data transmitted by or stored on University equipment is the property of the University, the IST staff will not normally log into another user account or access user’s files unless specifically granted permission by the user, or as otherwise permitted under this Policy. Student staff should avoid situations where helping another student or a faculty member would give them access to data relevant to a course that the student staff person is currently taking.

Exceptions to this practice are made under certain circumstances. These include: system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; and keystroke monitoring of sessions to determine inappropriate use of the computing facilities. Another exception is a suspected violation of the tenets in this policy, the Student, Faculty, or Employee Handbooks, University employment policies, rules or practices or local, state or federal law, or as required by court order. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated and/or stored for later review by appropriate personnel without the user’s permission or knowledge.

Because employees are granted access to and use of FDU’s computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information. Individuals using the University’s computing resources should also have no expectation that any information stored on the University’s computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private.

In the event that user files need to be copied or viewed for reasons other than security, diagnostic, system backup or in compliance with law enforcement, or internal investigations authorized by the Associate Vice President of Human Resources and the General Counsel, University Systems and Networking staff may attempt to inform the user of this access.

The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data. Its application relevant to this Acceptable Use Policy centers on a student’s right to consent to disclosure of personally identifiable information. FERPA does permit certain information to be released without consent and this information is referred to as “Directory information”. To find out specifically what information you may or may not give out and to whom, you must contact the respective Dean of Students office.


Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.

Violations of this policy will be dealt with as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and possibly State and/or Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.

The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.

This policy is subject to revision. Comments and suggestions are welcome and should be sent to Neal Sturm, Vice president & Chief Information Officer, mailstop M-DB2-01, or neal_sturm@fdu.edu.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers.

It is the user’s responsibility to remain informed about the contents of this document.


Neal Sturm
Vice president & Chief Information Officer
Mailstop M-DB2-01 973-443-8689 neal_sturm@fdu.edu

Saul Kleinman
Associate Vice President of Management Information Systems
Mailstop T-BH2-03 201-692-2065 saul@fdu.edu

Last Modified: icon icon Copy Link

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

icon Close

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android).  We support and advise to use this method due to the program’s robustness and integration of all Office365 features.  Follow the steps bellow to install and set up the Outlook app on your phone.

  1. Use the links below to install the Outlook app onto your mobile device.
Android Play Store
Apple App Store
  1. Launch the app and press on “Add Account” if on an Android device. It will then prompt you to input your FDU email address. On iOS, the app will launch and immediately ask you for your FDU email address. Once filled out press “Continue” on Android. On iOS press “Add Account”
  1. You will be routed to the FDU Single Sign On Page, from here input your FDU email address and password and press “Sign In
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Your FDU email account has now been added to your device successfully. Ensure the email account is listed on your Outlook application.
Last Modified: icon icon Copy Link

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

icon Close

Setting up your FDU Email Account in the Mail app on iOS

  1. Select the “Settings” app on your Apple iOS device
  1. Select “Passwords & Accounts
  1. Select “Add Account
  1. A list of email providers will be presented, select “Microsoft Exchange
  1. Enter your FDU email address and a description of the email account in the corresponding text boxes. Please note, the default description name for the account will be ‘Exchange’, if left unchanged. Tap or select “Next” to continue when finished
  1. When prompted select “Sign In
  1. Select “Work or School Account
  1. Enter your FDU email address and NetID password. Select “Sign In” to continue
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Chose the FDU NetID account information you would like to synchronize or access on your iOS device by toggling the choices on/off. Select “Save” to continue
  1. Your FDU email account has now been added to your iOS device successfully. Ensure the email account is listed under the “Passwords & Accounts” section of the ‘Settings’ iOS app

Setting up your FDU Email Account on Android OS

Due to multiple Android OS device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features are different depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to setup Outlook on Android OS.

Last Modified: icon icon Copy Link

Installing a Local Printer

Most new printers are plug and play compatible with Windows 10. When you receive your new printer, you can unbox it and remove any orange tape you see. After plugging in the power and turning the printer on, allow the printer to initialize (most new printers will have a display to show you it’s progress). When the printer finishes initializing, you can just connect the usb printer cable from the printer to your computer. Windows 10 should automatically install the printer for you.

Connecting to a Network Printer

Employees are able to add network printers to their own machines.

  1. Do a search for printers, and click on “Printers & Scanners”

  2. Click on “Add a printer or scanner”

  3. The list will start to populate and if you find your printer you can click on it and then click on “Add device”, otherwise scroll down to the bottom of the list and select “The printer I wanted wasn’t listed”

  4. In the new dialog box, select “Find a printer in the directory” and click “next”

  5. Search for your printer and double click on it when you find it.

  6. A box will let you know that the printer was successfully installed. Click “Next”

  7. You can click on “Print a Test Page” to verify you are connected to the right printer otherwise click on “Finish”

Last Modified: icon icon Copy Link

Approved Printer / Scanner List

Resources for: Faculty Staff
icon Close

Requesting a Printer

Ordering a printer can be done by contacting the Purchasing department.  Please remember that most printers don’t have USB printer cables included. The wireless capabilities of the printer are not permitted without prior authorization from University Systems and Networking. Further, the wireless capabilities of the printer (if any) must be disabled.


  • HP LaserJet M506N (low volume 1-3 people max)
  • HP LaserJet M506DN (low volume 1-3 people max)
  • HP LaserJet M506X (low volume 1-3 people max)
  • HP LaserJet M609DN (high volume 5+ people)
  • HP LaserJet M402N (single use only, no networking allowed)
  • HP Color LaserJet M452DN (single use only, no networking allowed)
  • HP Color LaserJet M553N (standard volume 1-3 people)
  • HP Color LaserJet M553DN (standard volume 1-3 people)
  • HP Color LaserJet M652N (high volume color 5+ people)
  • HP Color LaserJet M652DN (high volume color 5+ people)
  • HP LaserJet M609X (75PPM, 2-sided print, 650 sheets)


  • FUJITSU ScanSnap iX500 Document Scanner

Last Modified: icon icon Copy Link

Code42 is a backup agent that will back up all data on a university device under the primary owner’s profile. The backup sets can be used for restoring data to a machine, whether it has been reformatted, replaced, or compromised. This document will outline the steps needed to install, activate, and restore data to a new or existing device.



About Code 42

Code42 Policy

Code42 is required on all University provided desktops and laptops to backup all University Business data to prevent data loss.

Who Can use Code42?

Code42 is presently licensed for full-time faculty and full-time staff only. The University mandates Code42 for proper data security practices. If a user has personal data that they wish to exclude from being backed up, a folder labeled “Personal Documents” can be found and utilized in your “Documents” folder. This folder and its contents will be ignored by Code42 when your system is being backed up.

Personal Documents folder locations:

Windows PCC:\users\username\Documents\Personal Documents\
macOS/users/username/documents/Personal Documents/


If the Personal Documents folder does not exist in your Documents folder, you can manually create it and the folder will be automatically ignored by Code42.

Is My Data Secure?

Code42 uses AES-256 encryption is used when storing your backups and can only be accessed by the Code42 account owner and administrators.

What is Backed Up?

All data found in a user profile will be backed up by Code42.

Location of User Profile:

Windows PCC:\users\UserName\

Warning Warning

Any data not stored in the user profile will NOT be backed up by Code42. It is highly encouraged to store university business data within your user profile.

How to Install on a Windows PC

To install Code42 on your Windows PC, please follow the instructions below.


Code42 is being automatically deployed to all systems owned by Faileigh Dickinson University.

Before Installing Code42, you must be logged in as the owner of the machine using your NetID Credentials.

  1. Open FDU Self Service Portal for Software on your University PC
  2. Click on Code42 Backup and then click “Install” on the right-hand side


It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once Code42 is installed, your account is automatically provisioned in the Code42 system, and your backup will begin shortly.

How to Install on macOS

To install Code42 on your macOS device, please follow the instructions below.


Code42 is being automatically deployed to all systems owned by Faileigh Dickinson University.

  1. Locate the FDU Self Service Portal in your applications folder or locating the icon on your dock
  2. Locate Code42 Backup and click “Enroll”
  1. After the package installs, you will be prompted to enter your FDU email address and then click “OK


It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once Code42 is installed, your account is automatically provisioned in the Code42 system, and your backup will begin shortly.

How to Replace or Add a Second Device

This process is used when someone will be assigned a second device and wishes to have it backed up or if the Code42 needs to be re-installed on the same device. Because an account already exists, it cannot be provisioned automatically. It must be manually setup either to replace an existing device or create a new backup set on the second computer.


In order to proceed, code42 must be installed prior to continuing, please refer back to the Install instructions for your operating system from the Code42 User Guide. A link is found at the bottom of this page.


A backup set is Code42’s way of describing the backup configuration and what files are being backed up.

  1. Click on the Code42 app in the system tray (PC) or Menu bar (macOS) and then click “Setup Device
  1. If prompted, log in to the FDU NetID Portal and proceed through the FDU single sign-on process
  2. Click “Replace Existing
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-2.png
  1. Click “Start” to continue with the replace existing device process
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-3.png
  1. Select the device from the list you are replacing and click “Continue
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-4.png
  1. Click “Select Files” on the following window
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-5.png
  1. Select and Choose which files you wish to replace by placing a checkmark next to each. When finished, click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-6.png
  1. The next window will allow you to select how you wish to restore your files. Make your selections and click “Go
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-7.png
  1. The next window will display download progress for the restore process. You can continue forward by clicking “Continue” at the bottom
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-8.png
  1. The next window Downloads the Files to your device. When the transfer is completed, click “Next
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-9.png


You can close this window and continue working or you can click transfer more files and repeat the steps for additional files. This will extend the time it needs to restore.

  1. Your Transfer is now complete, click “Finish
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-10.png

Verifying a Backup Instructions

If you are unsure if you have Code42 installed and backing up your system, this quick guide will help give you some comfort.

  1. Click on the Code42 icon from the system tray on Windows and the menu bar on macOS
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. The Progress will be displayed like in the Figure below
This image has an empty alt attribute; its file name is Code42-Verifying-Backup-Progress-Figure-2.png


Depending on your backup size, this could take anywhere from a few minutes to a few days. Code42 will continue to run and backup in the background. After the first successful backup, incremental backups will occur.

How to Manage Backups

Code42 allows you to manage your backup sets. If you would like to review your backup set, please click the support link at the top of the page to open a UTAC ticket for a Computing Services team member to work with you.

How to Restore Files

Accidentally deleted or unable to find a file? Code42 can help. Please follow the following guidelines in restoring lost or previous versions of files.

  1. Click the Code42 System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click on the gear symbol and left-click on “Open Code42….
  1. If prompted, log in to the FDU Single sign-on Portal and proceed through the FDU DUO Multifactor authentication procedures
  2. Click “Restore Files
  3. Select the device you wish to restore from
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-2.png


If you have more than one backup device, please select the device from where you want to restore the file from.

  1. You can select a date range from when you wish to restore from on the right-hand side
  2. Navigate to the folder(s) and/or file(s) you wish to restore and place a check next to each one
  3. Click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-3.png
  1. Select how Code42 will restore your files. Click “Go” when finished
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-4.png


Above are the recommended options for restoring files, this will help you find them more easily.

The time it takes to restore your files will depend on how much data is being restored, available system resources, and available bandwidth.

How to Add Backup Sets

Using Code42 you can create backup sets that will back up your data to additional devices utilizing a schedule. This is useful to have immediate access to critical files in the event of data loss.

This guide is only needed if you wish to have a local backup of your data.


If you schedule multiple backup sets to run at specific times and the backup sets go to the same destination, ensure that these times do not overlap. This ensures good backup performance.

  1. Click the Code42 System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click on the gear symbol and left-click on “Open Code42….
This image has an empty alt attribute; its file name is Code-42-How-to-Add-Backup-Sets-Figure-1.png
  1. If prompted, log in to the FDU Single Sign-on Portal and proceed through the FDU DUO Multi-factor authentication procedures
  2. From the Code42 console window, click the “Dropdown Arrow” symbol next to your device name to drop down a menu, then click “Add Backup Set…
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-2.png
  • The next window will be the Add Backup Set configuration window.
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-3.png


The “Add Set” button will be un-clickable until it is completely configured.

  1. Click “Rename” to label your backup set
  2. Changing Selected Files, click “Change”, and select the files and folders you wish to backup to a local destination
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-4.png
  1. When finished click “Save
  2. Click “Change” to set your destination for your backup
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-5.png
  1. Select your destination by clicking “Add Local Destination (usually an external hard drive) and click “Save
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-6.png
  1. Click “Add Set” to finalize the setup and start backing up to a local location
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-7.png

Your new back upset is finished and will begin backing up as configured.

This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-8.png

Getting Support

If you require technical support, please contact UTAC (University Technical Assistance Center) and open a service request.

You may submit a service request by one of the following methods:

  • Clicking the “Support” button on top of this page
  • Emailing UTAC at FDUTAC@fdu.edu
  • Calling (973) 443-8822
Last Modified: icon icon Copy Link

Due to the increasing demand of the academic computer facilities, a general document detailing the policies for computer lab reservations has been outlined. The purpose of the computer lab reservation policy is to provide faculty, staff and students with equitable access to campus computing lab resources. Most computer labs are used as classrooms and they are available for open-access use when there are no classes in session.

  1. There are currently four Computing Services computer labs which can be used for classroom instruction on each campus. They are: D206, D207, D208, and D209 located in the Dreyfuss Building on the Florham Campus. The computer labs located on the Metropolitan Campus are: DH2163 and DH2164 in Dickinson Hall and UH Front Lab (UH22) and UH Back Lab (UH28) in University Hall. Also, there are three multimedia labs; two on the Florham campus and one on the Metropolitan campus. The multimedia labs for the Florham Campus are: D211-Animation Lab and ZEN110 – Graphic Design Lab) located in the Dreyfuss and ZEN Buildings. On the Metropolitan campus, the multimedia lab (MML) is located in Becton Hall Room 403. The multimedia labs are primarily used for courses offered by the FDU School of Arts. All labs used for classroom instruction and general use are equipped with a LaserJet printer and data projector. The Animation Lab is equipped with 3-D printers. All multimedia labs are equipped with ZOOM capability to support hybrid instruction.
  2. To reserve a computer lab, a faculty or staff member must fill out a Lab Reservation Request Form, preferably prior to the start of a semester. This form must be signed by the instructor who will be teaching the course. The lab reservation request form is available at the Office of Enrollment Services, the Lab Assistant station of any Computing Services office, and on the web at Lab Reservation Form This form must be filled out completely and accurately to prevent processing delays.
  3. Requests for the entire semester are processed on a first come first serve basis. These requests are processed by the Scheduling Officers in the department of Enrollment Services.
  4. Requests for specific dates during the semester are processed on a first come first serve basis. These requests are processed by the Lab & Operations Manager in the department of Computing Services. If all labs are occupied during the requested time, instructors will be asked to either choose a different date or time or plan to make arrangements with other instructors who have the lab reserved during that time. If an agreement cannot be reached with another instructor, the instructor requesting to use the lab should then approach the Dean of their department with the request. If the Dean is not able resolve the issue, the request should be taken to the Campus Executive for the final decision.
  5. Confirmations will be emailed to the departments or individual instructors making the request. Requests made during the semester will be confirmed based on the preference selected by the requestor on the Lab Reservation Request Form. The processing time for all lab requests made during a semester is one week. Please keep this in mind when submitting your lab reservations. To ensure you receive your confirmation in time, submit your reservation one week or more prior to the day the lab is needed. For instructions on How to Reserve a Computer Lab, please see the article listed below.
  6. Any changes made to the original request in day, time, or location will be treated as a new request.
  7. The requestor is responsible for enforcing all lab rules during the time the lab is scheduled. If a student or faculty member is violating lab rules, the lab assistants have the right to approach the individual at that time. To prevent interruption during class time, we stress that the lab rules be adhered to by all occupants including faculty and staff.
  8. Faculty and staff who have reserved a lab are responsible for notifying the Lab & Operations Manager if the course or the request has been cancelled. This will allow the Computing Services department to keep an updated and accurate schedule.
  9. If a scheduled class is absent for three consecutive weeks without prior notification, the lab reservation will be cancelled, and future reservations will be subject to further questioning before a confirmation is received.

If you have any questions regarding the lab reservation policy, please contact Lauren Elgin via email at: lauren@fdu.edu.

Last Modified: icon icon Copy Link

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use. Computer Lab hours of operation are subject to change based upon utilization throughout the semester.

All Computing Services Lab hours of operation are:

Metropolitan CampusFlorham Campus
Dickinson Hall – Hackensack
Phone: (201) 692-7111
Fax: (201) 692-7158

Lab A (DH2163),
Lab B (DH2164), Lab C (DH2165)
Dreyfuss Building
Phone: (973) 443-8689
Fax: (973) 443-8886

D206, D207, D208,
D209, D211
University Hall – Teaneck
Phone: (201) 692-7112

Front Lab (UH22),
Back Lab (UH 28), Side Lab
Park Ave South Building
Phone: (973) 443-8689

Activity Room 108
Student Union Building
Phone: (201) 692-2222

Multipurpose Room 135


The Student Union Building Multipurpose Room will be locked at all times. To gain access to the Student Union Building computer lab, you must contact Public Safety at (201) 692-2222.

Lab Hours of Operation

Spring Semester 2021 (Starting 1/25/2021)

BuildingMon – ThursFridaySaturdaySunday
Dreyfuss Building8 AM – 9 PM8 AM – 6 PM8 AM – 5 PMClosed
Dickinson Hall8 AM – 9 PM8 AM – 5 PM8 AM – 5 PMClosed
University HallClosedClosedClosedClosed
Student Union Building9 AM – 5 PM9 AM – 5 PMClosedClosed
Park Ave South24 Hours24 Hours24 Hours24 Hours


Lab computers are available on a first-come-first-serve basis. To adhere to local and state health guidelines, Computing Services lab room capacity is set to 10 people per lab.

**Break Days: 2/16, 3/17, and 4/12 Break Day Hours: 9 AM – 5 PM

Last Modified: icon icon Copy Link

Connecting a mobile device to the “FDU-Secure” Wireless Network

icon Close

Connecting to “FDU-Secure” Wireless Network with an iOS Device (iPhone and iPad)

  1. Locate and select or tap on the “Settings” app on your iPhone or iPad
  1. Select or tap on “Wi-Fi” within the “Settings” app
  1. Select or tap on “FDU-Secure”, located under the “Choose a Network Menu”
  1. Enter your full FDU e-mail address (ex. faculty@fdu.edu or student@student.fdu.edu) and your NetID password into the proper corresponding text boxes.
  1. Click “Trust” on the top right of screen to accept the security certificate; if you do not complete this step, you will not be able to successfully connect to the FDU-Secure wireless network.
  2. Note that “FDU-Secure” has a check mark under “Wi-Fi”, if so, you have successfully connected to “FDU-Secure” wireless network

Connecting to “FDU-Secure” Wireless Network with an Android Phone

  1. Swipe down twice from the top of your screen.
  1. Locate, then press and hold the Wi-Fi icon.
  1. Select “FDU-Secure” From the list of nearby networks.
  1. Fill in the information as seen on the photo.
Phase 2 AuthenticationMSCHAPV2
CA CertificateUse system certificates
NOTE: Some devices do not have this option. Instead select “Do not validate”
IdentityYour FDU e-mail address
Anonymous Identity Can be ignored
PasswordYour FDU email password
  1. If your device does not have system certificates installed and you select “Do not validate” you will see a warning message about security/privacy. It is safe to connect to our network, this is just a general message from the operating system.
  1. Press connect
Last Modified: icon icon Copy Link

Connecting and Using an All-in-One at Home

Resources for: Staff
icon Close

How to Connect an All-in-One for Work-at-Home

Making the Physical Connections

  1. Make the appropriate connections to the back of the all-in-one.
    • Plug in the power cable to the power port on the back of the all-in-one.
    • A physical network connection is only required if you do not want to or can not use wireless.
    • Both the keyboard and mouse can be plugged into any USB port.
  1. Turn the PC on and sign in as normal.

Connecting to Wi-fi (Skip if Using a Physical Network Cable)

  1. Click on the network icon on the bottom-right hand of the Start bar near the system clock.
  1. A list of available networks will populate. Select your home wireless network.
  1. Select your network and click “Connect“.
  1. Enter the network key for your wireless router. This can sometimes be located on the side or bottom of your router and/or modem. Click “Next“.

Connecting to VPN from Home

  1. Click on the arrow on the bottom right hand of the Start bar near the system clock and right-click on the “Cisco VPN Access” icon. On the pop-up menu, click “Connect“.
  1. If this is the first time connecting to VPN service please enter the text below as shown into the VPN field and click “Connect“.
  1. Enter your full NetID information and click “Ok“.
  1. Once a successful connection is made a prompt will appear and the icon for the Cisco VPN Access in the system try will appear with a lock.

Last Modified: icon icon Copy Link
Staff Directory
Karl Henry Computing Services Technical Manager
Lauren Elgin Computing Services Lab & Operations Manager
Lisa Stadler-Kay Computing Services Asset Manager
Ralph Knapp Computing Services Systems Engineer
Robert Pelech Computing Services Director