icon

University Systems and Networking

University Systems and Networking (USAN) oversees the University's Data Centers and Wired / Wireless Network. We support both the Metropolitan and Florham campuses, as well as our international campuses in Vancouver and Wroxton. USAN enables the access, flow and storage of information within the University while defending our network against all threats and maintaining the integrity of our data.

Help Desk
background
Search Department Resources

Accept a New Certificate for FDU-Secure Wireless Network

Resources for:
icon Close

FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.

Note

Your process may vary slightly based on the version of the Operating System that your device is using.

How to Accept the New Certificate for FDU-Secure Wireless

Windows
  1. Login to your Windows computer
  2. Go to the bottom right taskbar > Click on the “Networks” icon:
    • From the Networks list, select: “FDU-Secure
    • Click “Connect
  3. At the “Continue connection?” prompt, click “Connect
  1. Open your browser and test your Internet connection
close
macOS
  1. Login to your Mac computer
  2. Go to top right menu bar > Click “Wi-Fi” icon:
    • From the Wi-Fi list, select: “FDU-Secure
    • Click “Join
  3. At the “Authenticating to network FDU-Secure” prompt, click “Continue
  1. Click “OK
  2. Open your browser and test your Internet connection
close
iOS
  1. Login your iOS device (eg. iPhone)
  2. Go to your device’s Settings App > Select “Wi-Fi” > Select “FDU-Secure” > Click “Forget This Network
  3. Tap the “Back” button and select “Wi-Fi “once again to reload the available Wi-Fi networks:
    • From the Wi-Fi list, select: “FDU-Secure
    • Enter your complete FDU NetID as in the examples below: “username@fdu.edu, username@student.fdu.edu, username@alumni.fdu.edu”
    • Enter your FDU NetID Password
    • Click Join
  1. At the “Certificate” prompt, tap “Trust
  1. Open your browser and test your Internet connection
close
Android
  1. Login to your Android Device
  2. Open the “Settings” Application > Select “Wi-Fi” > Select the Gear icon next to FDU-Secure
  1. Select “Forget This Network
  1. Select FDU-Secure from the Wi-Fi menu
  1. Select “EAP method” and select “PEAP” from the dropdown menu
  2. Enter your complete FDU NetID and password
  3. In the “CA Certificate” field, select “Use System Certificates
  4. In the Domain field, enter fdu.edu
  5. Enable “Auto Reconnect
  6. Tap “Connect
  1. Open your browser and test your Internet connection
close
Last Modified:

Authorization, Authentication and Access Management Policy

Resources for:
icon Close

Revision Date: New Policy
Effective Date: 11/1/2023

Section A – University Systems and Applications

I. Purpose

The purpose of this policy is to establish information security standards for individuals receiving credentials to Fairleigh Dickinson University (“FDU” or “University”) resources and how those resources are accessed.

II. Scope and Applicability

This policy applies to all university system resources. All Users are responsible for adhering to this policy.

III. Definitions

Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.

  1. Account: An established relationship between a User and a computer, network, or Information System which is assigned a credential such as a username and password.
  2. System Administrative Account: An Account with elevated privileges intended to be used only when performing management tasks, such as installing updates and application software, managing user accounts, and modifying operating system and application settings.
  3. Entitled Account: A user who has met the minimum requirement to be granted authorization to access electronic Fairleigh Dickinson University Resources.
  4. Authorized User: A User who has been granted authorization to access electronic Fairleigh Dickinson University Resources and is current and active in their privileges.
  5. Contractor or Vendor: A person or a company that undertakes a contract to provide materials or labor to perform a service.
  6. Employee: University staff faculty and adjunct, including nonexempt, exempt, and overseas staff and collegiate faculty.
  7. Multi-Factor Authentication (MFA): Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password); something you have (e.g., cryptographic identification device, token); or something you are (e.g., biometric).
  8. Privileged Account: An Account that is authorized to perform security-relevant functions that an ordinary Account is not authorized to perform.
  9. Single Sign-On (SSO): An authentication process that allows an Authorized User to access multiple applications with one set of login credentials. SSO is a common procedure in enterprises, where a client accesses multiple resources connected to a local area network (LAN).
  10. User: A member of the University community, including but not limited to Staff and Faculty, and other individuals performing services on behalf of University, including Contractors, volunteers and other individuals who may have a need to access, use or control University Data.

IV. Authentication

  1. Any service, application or Information System, whether on-premise or in the cloud, that contains WISP protected information, especially PI or PHI; OR is accessed by a large group of employees (20 or more), must use Single Sign-on authentication.
    • If the service or application is being provisioned by a business unit, the unit must engage University Systems to work with the provider to enable SSO.
    • If SSO is not supported by the service or application, it will not be approved for use by the university.
    • See Section V for exceptions.
  2. Multi-factor authentication (MFA) must be used to access University resources.
  3. Passwords must be constructed in accordance with the minimum requirements as listed below:
    • Authorized User Account passwords must meet a minimum length of 8 characters.
    • Administrative and Privileged Account passwords must meet a minimum of 10 characters.
    • Passwords must contain a mix of alphanumeric characters. Passwords must not consist of all digits, all special characters, or all alphabetic characters.
    • Automated controls must ensure that passwords are changed at 90-day intervals for both general users and administrative-level accounts.
    • NetIDs associated with a password must be disabled for a period of time after 10 consecutive failed login attempts. A minimum of 30 minutes is required for the reset period.
    • Passwords must not be the same as the NetID.
    • Passwords must not be displayed on screens.
    • Users must not share passwords.
    • Initial passwords and password resets must be issued pre-expired forcing the user to change the password upon first use.
    • Password reuse must be limited by not allowing the last 10 passwords to be reused. In addition, the password must be at least 2 days old in order to be voluntarily changed.
    • Access will be disabled 90 days past the date that a password expired if not changed.
    • Access will be disabled after 30 days of creation if NetID is not claimed.
    • Expired passwords must be changed before any other system activity is allowed.
  4. Server Password Protocol
    • If, at any time, a member of the Community is granted permission to install a server, and access to that server is restricted via Login, and if that process is granted SSO exception through section VII., that system can not hold passwords in clear text. That system must use an approved irreversible cryptographic transform to protect its users’ passwords.

VI. Enforcement

  • This policy will be enforced by technical controls wherever feasible; otherwise, this policy will be enforced by OIRT under the direction of the CIO. All members of FDU’s faculty and staff have a responsibility to promptly report any known instances of noncompliance to AVP of University Systems and Networking or the Director of Systems.
  • Failure to comply with this policy can result in disciplinary action. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

VII. Exceptions

  • Exceptions to this policy should be submitted to the AVP, USAN for review. Approval of the Chief Information Officer (CIO) or Data Security Incident Response Team (DSIRT) may be required.

Last Modified:

Availability and Use of Google Apps

Resources for:
icon Close

Effective Date: April 1st, 2021

I. Objective

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. Some external entities, however, that conduct business with University employees utilize the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff (not students) to enable collaboration with these external entities to conduct University business.

II. Purpose

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. However, it is recognized that not all entities use Microsoft Office 365 as their platform and, from time to time, FDU faculty and staff may need the ability to collaborate with external entities that may be using the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff to enable collaboration with these external entities.

  • Faculty and staff are reminded that in accordance with the University’s WISP policy, WISP protected data must not be stored or transmitted through any service, without the prior written authorization from the University Chief Information Security Officer.
  • As stated in the “Policy for Acceptable Use for Email”, Google Gmail is not available for use. All University business must be conducted through an FDU email account on Microsoft Office 365.
  • Faculty and staff may not use, or attempt to use, Google apps as a method of collaboration with students, faculty or staff. This FDU Policy on the Availability and use of Google Apps is expressly for the use with external entities only.
  • This Policy on the Availability and use of Google Apps applies only to use of Google applications by faculty and staff, and not FDU students.
  • Microsoft Office 365 is the only FDU supported platform for email and collaboration.
  • Google Apps are not supported by FDU IT personnel.

III. Scope

This policy applies to all FDU faculty and staff, wherever located throughout the world. Students will NOT have access to the fdu.edu Google Apps suite of products.

IV. Data Security Coordinator

The University has designated the Chief Information Security Officer, working together with the Data Security Information Response Team (DSIRT) and the USAN Director of Systems, to implement, supervise and maintain this Policy.

V. Internal Risks

To combat internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this Policy and the WISP will be strictly enforced.

VI. External Risks

To combat external internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this policy and the WISP will be strictly enforced.

VII. In Case of Questions

Questions regarding the availability of Google Apps can be directed to the Fairleigh Dickinson University Technical Assistance Center (UTAC). The UTAC is available 24×7.

Note:

Please note that the UTAC is not able to provide application support on the Google suite of products.

VIII. Other Applicable Policies

IX. Exceptions

Requests for exceptions to this Policy should be directed in writing to the Chief Information Security Officer via the Fairleigh Dickinson University Technical Assistance Center (UTAC).

X. Appendix

X1.1 Google Apps Available to Faculty and Staff

Note

These applications may only be used in collaboration with outside entities who use Google applications as their sole source of collaboration and request the use of any one of these application for official FDU business use. Any other use of these applications by FDU faculty and staff is a violation of this Policy.

Services Descriptions
AssignmentsAssignments brings together the capabilities of Google Docs, Drive and Search into a tool for collecting and grading student work.
CalendarGoogle Calendar is a web-based tool for personal scheduling and calendar sharing. It can be accessed through either a Web browser or through a third-party calendar client.
ClassroomGoogle Classroom enables teachers to create an online classroom area in which they can manage all the documents that their students need.
Drive and DocsGoogle Docs is an online word processor that lets you create and format text documents and collaborate with other people in real time. Google Drive on the web lets you store, access, and edit your files anywhere — on the web, on your hard drive, or on the go.
Google MeetGoogle Meet enables conversations with photos, emoji, group video calls for free. You can connect across computers, Android and Apple devices.
Google VaultVault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users’ Google Workspace data.
Groups for BusinessGoogle Groups for Business is an extended service available for G Suite users that allows you and other members in your organization to access the main Google Groups interface located at groups.google.com.
JamboardGoogle Jamboard is an online, collaborative whiteboarding application that lets you create, edit, and collaborate with other people in real time. Google Jamboard applications can be accessed on the Web, Android, and iOS.
KeepGoogle Keep is a note-taking service included as part of the free, web-based Google Docs Editors suite offered by Google
TasksGoogle Tasks is a simple to-do list—but with lists, subtasks, and mobile notifications, it has the basics you need to stay productive and keep track of the most important things you need to do.
Applied Digital SkillsApplied Digital Skills is a free, flexible video-based curriculum that prepares students for the growing number of jobs that require basic digital skills, such as email and spreadsheets.
Google Ad ManagerGoogle Ad Manager is an ad exchange platform introduced by Google on June 27, 2018. It combines the features of two former services from Google’s DoubleClick subsidiary, DoubleClick for Publishers and DoubleClick Ad Exchange.
Google AdsGoogle Ads is Google’s online advertising program. Through Google Ads, you can create online ads to reach people exactly when they’re interested in the products and services that you offer
Google AdSenseGoogle AdSense is an advertising program launched by Google in 2003 that allows website publishers to display targeted text, video, or image advertisements on website pages.
Google AlertsGoogle Alerts is a tool that allows you to track your chosen keywords and phrases so that you never miss another important conversation.
Google AnalyticsGoogle Analytics generates detailed statistics about a website’s traffic and traffic sources and measures conversions and sales
Google Cloud PlatformGoogle Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware.
Google Cloud PrintGoogle Cloud Print is a web service offered by Google. Users associate printers with their Google Account.
Google Data StudioData Studio is Google’s reporting solution for power users who want to go beyond the data and dashboards of Google Analytics.
Google EarthGoogle Earth is the most photorealistic, digital version of our planet.
Google My MapsGoogle My Maps is your way to keep track of the places that matter to you.
Google PaymentsGoogle Pay (stylized as G Pay; formerly Pay with Google and Android Pay) is a digital wallet platform and online payment system developed by Google to power in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches.
Google PlayIn Google Play, the app description is split into two fields: Short Description, a limited 80 characters preview field and. the Full Description field, giving you space for an up to 4000 characters long app description.
Google Play ConsoleGoogle App Store
Google Search ConsoleThe Search Console lets you, as a webmaster, check on the status of the indexing Google does on your site, helping you to optimize your page visibility in Google search results. Get data, tools and diagnostics for a healthy, Google-friendly site.
Google TakeoutGoogle Takeout is a service that allows users of Google products, such as YouTube, Gmail, etc., to export their data to a downloadable ZIP file.
Managed Google PlayManaged Google Play Managed Google Play is a version of Google Play that’s optimized for enterprises.
Material GalleryMaterial Gallery is a collaborative tool for uploading design work, getting feedback, and tracking revisions – quickly and efficiently.
Partner DashPartner Dash is a service that hosts several applications used by Google’s partners to manage their relationships with us. Some of these applications are invite-only, while others are publicly available to anyone logged in with a Google Account.
Scholar ProfilesThe Google Scholar Profile search pane in Publish or Perish allows you to look up a Google Scholar profile and analyze the associated publication metrics.
Search And AssistantGoogle Assistant is Google’s artificial intelligence-powered voice assistant, which grew out of Google Now.
close
Last Modified:

Blocking Peer to Peer Applications

Resources for:
icon Close

FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files off of your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.

To view FDU’s stance on this issue in its entirety, please view the document below.

Last Modified:

Change and Sync NETID Password on Mac via Jamf Connect

Resources for:
icon Close

This article offers a detailed, step-by-step guide, on how to change your NETID password directly from your Mac using the Jamf Connect and how to synchronize this updated NETID password with your Mac’s user account password.

Changing and Syncing your NET ID Password on your Mac

  1. Click on the “FDU shield icon” located in the top right of your screen’s menu bar
  1. Select “Change Password at FDU Identity
  1. Sign in to the “FDU Identity Portal” that opens up
  1. Scroll to “Change My Password” section and enter your old password and new password in the appropriate fields. Then click the “Change My Password” button
  1. You will see the password successfully changed in the red bar when successful. Click “Done
  1. Enter your “FDU NetID” and “Password” in the corresponding fields. Click “Sign In”
  1. Enter your old password in the “Local Password” prompt and click “Sync” to synchronize the new password with your Mac’s login password

Note

You will need to reauthenticate your Office 365 apps and FDU-Secure.

Synchronizing NETID Password with your Mac Password

If you changed your NETID password outside of your FDU Mac, you will be prompted automatically to sync your password to your Mac’s password the next time you are connected to the internet. You will first need to log in to the machine using your old password and then proceed with the synchronization following the steps below.

  1. The following dialog box will appear once you are connected to the internet automatically. Enter your “FDU NetID” and “Password” and click “Sign In
  1. Enter your old password in the “Local Password” prompt and click the “Sync” button to synchronize the new password with your Mac’s login password

Note

You will need to re-authenticate to your Office 365 apps and FDU-Secure.

Last Modified:

Claim or Create an FDU NetID Account

Resources for:
icon Close

Welcome to Fairleigh Dickinson University. As a new member of our campus community, one of your first priorities will be gaining access to FDU NetID. With an FDU NetID, you will have access to a variety of IT resources, including Office365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.

New Student through Welcome Email (US Students)

If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below


New Student

If you are a new student at FDU Vancouver or if you are a New Jersey based student that has not received a Welcome Email, please visit the link below


New Faculty, Staff Member Temporary Employee, or On-Campus Contractor

If you are a new Faculty, adjunct Faculty, Staff member, temporary employee, or contractor who works on campus and requires a NetID, please visit the link below


All Others

If you are entitled to an FDU NetID account and either do not fall under any of the categories above or attempted to claim their NetID and received a message that your NetID has not been created, please visit the link below

Last Modified:

Confidentiality Agreement and Security Policy

Resources for:
icon Close

Effective Date: 11/07/2023
Last Revision: 11/01/2013

Select employees of Fairleigh Dickinson University may be required to engage with confidential University data. The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.

Confidentiality Agreement and Security Policy

Fairleigh Dickinson University regards the security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:

Policy on Confidential Information

Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including the Family Education Rights and Privacy Act (“FERPA”) and, as applicable, The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). For more information, see: FDU’s General Confidentiality Policy, FERPA and HIPAA

Confidential Information shall be defined as:

  • regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record; 
  • regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and 
  • any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.

The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:

  • is or becomes publicly available without breach of this Policy by the recipient;
  • is rightfully received by the recipient without obligations of confidentiality; or
  • is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
  • is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, the New Jersey Conscientious Employee Protection Act (“NJCEPA”), or similar legislation.  (Brief overview of the NJCEPA is available here.

Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:

  1. Access Confidential Information solely in order to perform his/her job responsibilities.
  2. Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
  3. Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
  4. Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
  5. Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
  6. Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
  7. Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
  8. Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.

It is the individual’s responsibility to immediately report, as outlined under “Information Security Breach and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.

Security Measures and Procedures

All users of University information systems, including Datatel, MS File shares and FDU Office 365 email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:

  1. All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.
    • Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.
    • Your user ID, password or PIN provides access to information that has been granted specifically to you.  To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.
    • It is your responsibility to change your password immediately if you believe someone else has obtained it.

NOTE: If you need your Password or PIN changed, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) immediately.

  1. Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.
    • You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so.  Any access obtained without written authorization is considered unauthorized access.
    • In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday.

NOTE:  If you require assistance in establishing your workstation password, please access the screensaver documentation or contact the Fairleigh Dickinson University Technical Assistance Center (UTAC).

  1. If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breach and Violation Reporting” at the end of this policy.

NOTE: All University’s computer system will periodically prompt you to change your password.

  1. Upon termination or transfer of an employee, Human Resources will notify University Systems and Security, who in turn will notify the appropriate areas in the Computer Center.
  1. Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
  1. You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.

Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID.

I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated. Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal. This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.

Information Security Breach and/or Policy Violation Reporting

If you suspect an Information Security Data Breach or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC); do not provide details but request a ticket be opened with University Systems & Security due to an information security data breach or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.


Last Modified:

Connecting a Non-PC Device to Wi-Fi

Resources for:
icon Close

This article is intended for students, staff, and faculty who wish to connect their non-PC, IoT, gaming, or streaming devices to the FDU-Wireless network. Devices that require registration include gaming consoles (such as Xbox, PlayStation, Switch) and streaming devices (like Amazon Fire Stick, Apple TV, and Roku).

Note

FDU-Wireless is only for non-PC, IoT, gaming, or streaming devices that do not support WPA2 Enterprise authentication or features a web browser.

Registering a Non-PC Device for use on FDU-Wireless Network

Use the link and directions below to register and manage wireless network access for your non-PC devices.

  1. Sign in into FDU MyDevices portal using the link below using your FDU NetID. Make sure to check “I agree to the terms and conditions” button before clicking “Sign On

FDU MyDevices Portal

  1. Select “Add” to begin registering a device
  1. Enter your device type and your device’s MAC Address into the corresponding text boxes. An optional description may be entered for your device as well. Your device’s MAC Address must be entered to register the device and continue. Refer to your devices manufacture for instructions on how to obtain the devices MAC Address. When finished, select “Submit

Tip

Some devices have their MAC Address labeled alongside it’s Serial number.

Your device should now be listed on MyDevices Portal and allowed to connect to the FDU-Wireless network. It may be necessary to select the FDU-Wireless network on your device or restart your device before successfully connecting to the wireless network

Note

Once your device is added, the status will always remain as Pending. However you will be able to connect the device to FDU-Wireless regardless of this status.

Last Modified:

Connecting to FDU-Secure Wi-Fi

Resources for:
icon Close

FDU-Secure uses current encryption standards to connect to the FDU network via secure wireless traffic. As a result, FDU-Secure is the preferred method of accessing the on-campus Wireless network if you are Faculty, Student, or Staff member. To connect to the FDU-Secure Wireless Network, you will need an FDU NETID (username@fdu.edu or username@student.fdu.edu).

Below are the necessary steps to connect to the FDU-Secure Wireless Network, specified for various device types:

Windows
  1. Select the “Internet Symbol” located at the right-hand side of the “task bar”
  1. Select “FDU-Secure” from the pop-up menu
  1. Enter “FDU Net ID and Password” and press “OK”
  1. When prompted with “Continue connecting?” press “Connect”
close
macOS
  1. Select the “Wi-Fi Symbol” located at the right-hand side of the “menu bar”
  1. Select “FDU-Secure” from the drop-down menu
  1. Enter “FDU Net ID and Password” and press “OK”
  1. When prompted with “Verify Certificate” press “Continue”
close
iOS
  1. Select the “Wi-Fi” tab located in the “Settings” app
  1. Select “FDU-Secure” from the list of available networks
  1. Enter “FDU Net ID and Password” and press “Join”
  1. When prompted with “Certificate” press “Trust”
close
Android
  1. Select the “Connections” tab located in the “Settings” app
  1. Press “Wi-Fi”
  1. Select “FDU-Secure” from the list of available networks
  1. Enter “FDU Net ID and Password”
  1. Press “CA certificate” then press “Use System Certificates” drop the drop down menu
  1. Input “fdu.edu” in the domain field and press “Connect”
close
Last Modified:

Connecting to FDU’s Wireless Networks

Resources for:
icon Close

The following guides provide an overview of connecting to Fairleigh Dickinson University’s wireless network. Whether you’re a guest, staff, or student, using FDU-owned or personal devices, these articles provide essential steps for secure and efficient connectivity across various equipment, including non-PC and mobile devices.

Connect to FDU-Secure Wi-Fi

Follow these steps to connect to the FDU-Secure wireless network, which adheres to the latest encryption standards.

Connecting to FDU-Secure Wi-Fi


Connect a Non-PC Device to Wi-Fi

Follow these steps to connect various non-PC devices, including IoT, gaming, and streaming gadgets, to FDU’s wireless network.

FDU-Wireless for Non-PC Devices


Connect to FDU Wireless as a Guest

Follow these steps to create a guest wireless account, ensuring secure and convenient access for your campus visitors.

FDU-Wireless for Guests


Click the link below to view where our Wireless networks are available on our NJ Campuses:

Last Modified:
FAQ
  • An alias is an additional email address that will direct mail to your FDU email account. Creating an alias for your account can be a useful strategy. For instance, if you are spearheading a project, it may be easier to solicit replies to an address that contains the name of the project than it would be to garner responses to your existing email address. If this solution interests you, please fill out the Email Alias form.

  • Due to the cavernous email storage offered on the Office365 platform, there has been little to no demand for FDU staff and faculty members to request an increased mail quota. Office365 email provides enough capacity for even our most prolific users. However, if special circumstances make you the exception to this rule, you can request a quota increase by completing the Quota request form.

  • FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files from your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.

  • Phishing involves the use of e-mail messages that appear to come from your bank or another trusted business in an attempt to scam the user into surrendering private information that will be used for identity theft. The phishing e-mail typically ask you to click a link to visit a Web site, where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers

    Scammers have become increasingly sophisticated in creating fraudulent emails and Web sites that look authentic. These emails and Web sites often appear to be from legitimate companies and include images and logos of these organizations.

  • The Network ID (NetID) is a Windows Active Directory account uniquely assigned to each student, faculty & staff. It serves as your login to many computing and networking services including FDU Email.

  • FDU’s Opus is a Red Hat Linux based server. Opus provides an environment for FDU students, staff, and faculty to practice using software such as:

    • Expect
    • Gcc
    • Gzip
    • Aspell (Ispell replacement)
    • Java (Now 1.8.0_181)
    • Make
    • Ncurses
    • Tcl
    • Tcsh
    • Tcl/Tk
    • Strace (Trace)
    • Emacs
    • Bison
    • Nano (Formerly Pico)
    • Perl
    • LaTeX
    • A2ps
    • Links (Lynx Alternative)

    If you require access to Opus, please fill out the form.

  • In order to provide a safe and stable computing environment, the FDU-Wireless and FDU-Secure wireless networks require NetID authentication. However, in certain instances our students, staff and faculty members will need to work on campus with people from outside of our community. This can include vendors, contractors, visiting scholars, or even a visiting family member or friend. In these instances, the FDU community member can sponsor a guest for temporary wireless access.  The sponsor of a guest account will be responsible for the actions of his or her guest. Please ensure that your guest(s) follow FDU’s Acceptable Use Policy for Computer Usage

  • In order to provide a safe and secure network environment, FDU IT requires devices to authenticate to the FDU network before connecting. This works well for computing devices such as desktop computers, laptop computers, and mobile devices such as tablets and phones. Most other electronics, including gaming consoles and streaming video boxes, cannot properly authenticate to the network. In these instances, we ask you to register the device using the online form below. Please note that each user on our network is entitled to register up to 5 devices.

Staff Directory
Anthony Licandro University Systems and Networking Senior Network Operations Manager
Atif Warriach University Systems and Networking Systems Administrator (Linux)
Basil Licop University Systems and Networking Office 365 Systems Administrator
Charles Ciccotto University Systems and Networking Operations Manager
Christopher Bland University Systems and Networking Systems Manager Lead
Christopher Robley University Systems and Networking Director of Systems
Cory Palacios Merino University Systems and Networking IT Assistant – Vancouver
Danovan Golding University Systems and Networking Senior System Technology Manager
Djeams Muse University Systems and Networking Network Analyst
Estref Resuli University Systems and Networking Technician Operations – Vancouver
Joshua Chan University Systems and Networking Systems Analyst
Juan Estrella University Systems and Networking Network Analyst
Juan Montufar University Systems and Networking Network Analyst
Karl Henry University Systems and Networking Senior Desktop Engineer
Kevin Atkinson University Systems and Networking Systems & Network Infrastructure Manager – Vancouver
Leslie McRae University Systems and Networking Operations Systems Analyst
Matt Gugel University Systems and Networking Senior Desktop Engineer
Michael Reekie University Systems and Networking Director of Networking
Rafael Alix University Systems and Networking Network Analyst
Shashi Patel University Systems and Networking Network Analyst
Stuart Alper University Systems and Networking Associate Vice President
Thomas Grassi University Systems and Networking Junior Systems Administrator
Torence Bobbitt University Systems and Networking User Support Helpdesk Technician
Vishal Gandhi University Systems and Networking Systems Analyst / Application Developer / Email Specialist