University Systems and Networking (USAN) oversees the University's Data Centers and Wired / Wireless Network. We support both the Metropolitan and Florham campuses, as well as our international campuses in Vancouver and Wroxton. USAN enables the access, flow and storage of information within the University while defending our network against all threats and maintaining the integrity of our data.
FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.
Note
Your process may vary slightly based on the version of the Operating System that your device is using.
SAMI Support
If you have any questions or concerns, please visit SAMI Support, where you can request additional information from UTAC or search our extensive IT knowledge base. While SAMISupport provides the quickest and easiest access for IT support, you can always contact UTAC by phone (973)-443-8822 or email at fdutac@fdu.edu.
Revision Date: New Policy Effective Date: 11/1/2023
Section A – University Systems and Applications
I. Purpose
The purpose of this policy is to establish information security standards for individuals receiving credentials to Fairleigh Dickinson University (“FDU” or “University”) resources and how those resources are accessed.
II. Scope and Applicability
This policy applies to all university system resources. All Users are responsible for adhering to this policy.
III. Definitions
Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.
Account: An established relationship between a User and a computer, network, or Information System which is assigned a credential such as a username and password.
System Administrative Account: An Account with elevated privileges intended to be used only when performing management tasks, such as installing updates and application software, managing user accounts, and modifying operating system and application settings.
Entitled Account: A user who has met the minimum requirement to be granted authorization to access electronic Fairleigh Dickinson University Resources.
Authorized User: A User who has been granted authorization to access electronic Fairleigh Dickinson University Resources and is current and active in their privileges.
Contractor or Vendor: A person or a company that undertakes a contract to provide materials or labor to perform a service.
Employee: University staff faculty and adjunct, including nonexempt, exempt, and overseas staff and collegiate faculty.
Multi-Factor Authentication (MFA): Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password); something you have (e.g., cryptographic identification device, token); or something you are (e.g., biometric).
Privileged Account: An Account that is authorized to perform security-relevant functions that an ordinary Account is not authorized to perform.
Single Sign-On (SSO): An authentication process that allows an Authorized User to access multiple applications with one set of login credentials. SSO is a common procedure in enterprises, where a client accesses multiple resources connected to a local area network (LAN).
User: A member of the University community, including but not limited to Staff and Faculty, and other individuals performing services on behalf of University, including Contractors, volunteers and other individuals who may have a need to access, use or control University Data.
IV. Authentication
Any service, application or Information System, whether on-premise or in the cloud, that contains WISP protected information, especially PI or PHI; OR is accessed by a large group of employees (20 or more), must use Single Sign-on authentication.
If the service or application is being provisioned by a business unit, the unit must engage University Systems to work with the provider to enable SSO.
If SSO is not supported by the service or application, it will not be approved for use by the university.
See Section V for exceptions.
Multi-factor authentication (MFA) must be used to access University resources.
Passwords must be constructed in accordance with the minimum requirements as listed below:
Authorized User Account passwords must meet a minimum length of 8 characters.
Administrative and Privileged Account passwords must meet a minimum of 10 characters.
Passwords must contain a mix of alphanumeric characters. Passwords must not consist of all digits, all special characters, or all alphabetic characters.
Automated controls must ensure that passwords are changed at 90-day intervals for both general users and administrative-level accounts.
NetIDs associated with a password must be disabled for a period of time after 10 consecutive failed login attempts. A minimum of 30 minutes is required for the reset period.
Passwords must not be the same as the NetID.
Passwords must not be displayed on screens.
Users must not share passwords.
Initial passwords and password resets must be issued pre-expired forcing the user to change the password upon first use.
Password reuse must be limited by not allowing the last 10 passwords to be reused. In addition, the password must be at least 2 days old in order to be voluntarily changed.
Access will be disabled 90 days past the date that a password expired if not changed.
Access will be disabled after 30 days of creation if NetID is not claimed.
Expired passwords must be changed before any other system activity is allowed.
Server Password Protocol
If, at any time, a member of the Community is granted permission to install a server, and access to that server is restricted via Login, and if that process is granted SSO exception through section VII., that system can not hold passwords in clear text. That system must use an approved irreversible cryptographic transform to protect its users’ passwords.
VI. Enforcement
This policy will be enforced by technical controls wherever feasible; otherwise, this policy will be enforced by OIRT under the direction of the CIO. All members of FDU’s faculty and staff have a responsibility to promptly report any known instances of noncompliance to AVP of University Systems and Networking or the Director of Systems.
Failure to comply with this policy can result in disciplinary action. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.
VII. Exceptions
Exceptions to this policy should be submitted to the AVP, USAN for review. Approval of the Chief Information Officer (CIO) or Data Security Incident Response Team (DSIRT) may be required.
Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. Some external entities, however, that conduct business with University employees utilize the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff (not students) to enable collaboration with these external entities to conduct University business.
II. Purpose
Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. However, it is recognized that not all entities use Microsoft Office 365 as their platform and, from time to time, FDU faculty and staff may need the ability to collaborate with external entities that may be using the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff to enable collaboration with these external entities.
Faculty and staff are reminded that in accordance with the University’s WISP policy, WISP protected data must not be stored or transmitted through any service, without the prior written authorization from the University Chief Information Security Officer.
As stated in the “Policy for Acceptable Use for Email”, Google Gmail is not available for use. All University business must be conducted through an FDU email account on Microsoft Office 365.
Faculty and staff may not use, or attempt to use, Google apps as a method of collaboration with students, faculty or staff. This FDU Policy on the Availability and use of Google Apps is expressly for the use with external entities only.
This Policy on the Availability and use of Google Apps applies only to use of Google applications by faculty and staff, and not FDU students.
Microsoft Office 365 is the only FDU supported platform for email and collaboration.
Google Apps are not supported by FDU IT personnel.
III. Scope
This policy applies to all FDU faculty and staff, wherever located throughout the world. Students will NOT have access to the fdu.edu Google Apps suite of products.
IV. Data Security Coordinator
The University has designated the Chief Information Security Officer, working together with the Data Security Information Response Team (DSIRT) and the USAN Director of Systems, to implement, supervise and maintain this Policy.
V.Internal Risks
To combat internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this Policy and the WISP will be strictly enforced.
VI.External Risks
To combat external internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this policy and the WISP will be strictly enforced.
These applications may only be used in collaboration with outside entities who use Google applications as their sole source of collaboration and request the use of any one of these application for official FDU business use. Any other use of these applications by FDU faculty and staff is a violation of this Policy.
Services
Descriptions
Assignments
Assignments brings together the capabilities of Google Docs, Drive and Search into a tool for collecting and grading student work.
Calendar
Google Calendar is a web-based tool for personal scheduling and calendar sharing. It can be accessed through either a Web browser or through a third-party calendar client.
Classroom
Google Classroom enables teachers to create an online classroom area in which they can manage all the documents that their students need.
Drive and Docs
Google Docs is an online word processor that lets you create and format text documents and collaborate with other people in real time. Google Drive on the web lets you store, access, and edit your files anywhere — on the web, on your hard drive, or on the go.
Google Meet
Google Meet enables conversations with photos, emoji, group video calls for free. You can connect across computers, Android and Apple devices.
Google Vault
Vault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users’ Google Workspace data.
Groups for Business
Google Groups for Business is an extended service available for G Suite users that allows you and other members in your organization to access the main Google Groups interface located at groups.google.com.
Jamboard
Google Jamboard is an online, collaborative whiteboarding application that lets you create, edit, and collaborate with other people in real time. Google Jamboard applications can be accessed on the Web, Android, and iOS.
Keep
Google Keep is a note-taking service included as part of the free, web-based Google Docs Editors suite offered by Google
Tasks
Google Tasks is a simple to-do list—but with lists, subtasks, and mobile notifications, it has the basics you need to stay productive and keep track of the most important things you need to do.
Applied Digital Skills
Applied Digital Skills is a free, flexible video-based curriculum that prepares students for the growing number of jobs that require basic digital skills, such as email and spreadsheets.
Google Ad Manager
Google Ad Manager is an ad exchange platform introduced by Google on June 27, 2018. It combines the features of two former services from Google’s DoubleClick subsidiary, DoubleClick for Publishers and DoubleClick Ad Exchange.
Google Ads
Google Ads is Google’s online advertising program. Through Google Ads, you can create online ads to reach people exactly when they’re interested in the products and services that you offer
Google AdSense
Google AdSense is an advertising program launched by Google in 2003 that allows website publishers to display targeted text, video, or image advertisements on website pages.
Google Alerts
Google Alerts is a tool that allows you to track your chosen keywords and phrases so that you never miss another important conversation.
Google Analytics
Google Analytics generates detailed statistics about a website’s traffic and traffic sources and measures conversions and sales
Google Cloud Platform
Google Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware.
Google Cloud Print
Google Cloud Print is a web service offered by Google. Users associate printers with their Google Account.
Google Data Studio
Data Studio is Google’s reporting solution for power users who want to go beyond the data and dashboards of Google Analytics.
Google Earth
Google Earth is the most photorealistic, digital version of our planet.
Google My Maps
Google My Maps is your way to keep track of the places that matter to you.
Google Payments
Google Pay (stylized as G Pay; formerly Pay with Google and Android Pay) is a digital wallet platform and online payment system developed by Google to power in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches.
Google Play
In Google Play, the app description is split into two fields: Short Description, a limited 80 characters preview field and. the Full Description field, giving you space for an up to 4000 characters long app description.
Google Play Console
Google App Store
Google Search Console
The Search Console lets you, as a webmaster, check on the status of the indexing Google does on your site, helping you to optimize your page visibility in Google search results. Get data, tools and diagnostics for a healthy, Google-friendly site.
Google Takeout
Google Takeout is a service that allows users of Google products, such as YouTube, Gmail, etc., to export their data to a downloadable ZIP file.
Managed Google Play
Managed Google Play Managed Google Play is a version of Google Play that’s optimized for enterprises.
Material Gallery
Material Gallery is a collaborative tool for uploading design work, getting feedback, and tracking revisions – quickly and efficiently.
Partner Dash
Partner Dash is a service that hosts several applications used by Google’s partners to manage their relationships with us. Some of these applications are invite-only, while others are publicly available to anyone logged in with a Google Account.
Scholar Profiles
The Google Scholar Profile search pane in Publish or Perish allows you to look up a Google Scholar profile and analyze the associated publication metrics.
Search And Assistant
Google Assistant is Google’s artificial intelligence-powered voice assistant, which grew out of Google Now.
FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files off of your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.
To view FDU’s stance on this issue in its entirety, please view the document below.
This article offers a detailed, step-by-step guide, on how to change your NETID password directly from your Mac using the Jamf Connect and how to synchronize this updated NETID password with your Mac’s user account password.
Changing and Syncing your NET ID Password on your Mac
Click on the “FDU shield icon” located in the top right of your screen’s menu bar
Select “Change Password at FDU Identity“
Sign in to the “FDU Identity Portal” that opens up
Scroll to “Change My Password” section and enter your old password and new password in the appropriate fields. Then click the “Change My Password” button
You will see the password successfully changed in the red bar when successful. Click “Done“
Enter your “FDU NetID” and “Password” in the corresponding fields. Click “Sign In”
Enter your old password in the “Local Password” prompt and click “Sync” to synchronize the new password with your Mac’s login password
Note
You will need to reauthenticate your Office 365 apps and FDU-Secure.
Synchronizing NETID Password with your Mac Password
If you changed your NETID password outside of your FDU Mac, you will be prompted automatically to sync your password to your Mac’s password the next time you are connected to the internet. You will first need to log in to the machine using your old password and then proceed with the synchronization following the steps below.
The following dialog box will appear once you are connected to the internet automatically. Enter your “FDU NetID” and “Password” and click “Sign In”
Enter your old password in the “Local Password” prompt and click the “Sync” button to synchronize the new password with your Mac’s login password
Note
You will need to re-authenticate to your Office 365 apps and FDU-Secure.
Welcome to Fairleigh Dickinson University. As a new campus community member, one of your priorities will be gaining access to FDU NetID. With an FDU NetID, you can access various IT resources, including Microsoft 365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.
New Student through Welcome Email (US Students)
If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below:
New Faculty, Staff Member Temporary Employee, or On-Campus Contractor
If you are a new Faculty, adjunct Faculty, Staff member, temporary employee, or contractor who works on campus and requires a NetID, please visit the link below:
If you are entitled to an FDU NetID account and either do not fall under any of the categories above or attempted to claim their NetID and received a message that your NetID has not been created, please visit the link below:
Effective Date: 11/07/2023 Last Revision: 11/01/2013
Select employees of Fairleigh Dickinson University may be required to engage with confidential University data. The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.
Confidentiality Agreement and Security Policy
Fairleigh Dickinson University regards the security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:
Policy on Confidential Information
Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including the Family Education Rights and Privacy Act (“FERPA”) and, as applicable, The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). For more information, see: FDU’s General Confidentiality Policy, FERPA and HIPAA.
Confidential Information shall be defined as:
regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record;
regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and
any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.
The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:
is or becomes publicly available without breach of this Policy by the recipient;
is rightfully received by the recipient without obligations of confidentiality; or
is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, the New Jersey Conscientious Employee Protection Act (“NJCEPA”), or similar legislation. (Brief overview of the NJCEPA is available here.
Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:
Access Confidential Information solely in order to perform his/her job responsibilities.
Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.
It is the individual’s responsibility to immediately report, as outlined under “Information Security Breach and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.
Security Measures and Procedures
All users of University information systems, including Datatel, MS File shares and FDU Office 365 email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:
All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.
Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.
Your user ID, password or PIN provides access to information that has been granted specifically to you. To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.
It is your responsibility to change your password immediately if you believe someone else has obtained it.
Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.
You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so. Any access obtained without written authorization is considered unauthorized access.
In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday.
If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breach and Violation Reporting” at the end of this policy.
NOTE: All University’s computer system will periodically prompt you to change your password.
Upon termination or transfer of an employee, Human Resources will notify University Systems and Security, who in turn will notify the appropriate areas in the Computer Center.
Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.
Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID.
I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated. Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal. This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.
Information Security Breach and/or Policy Violation Reporting
If you suspect an Information Security Data Breach or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC); do not provide details but request a ticket be opened with University Systems & Security due to an information security data breach or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.
This article is intended for students, staff, and faculty who wish to connect their non-PC, IoT, gaming, or streaming devices to the FDU-Wireless network. Devices that require registration include gaming consoles (such as Xbox, PlayStation, Switch) and streaming devices (like Amazon Fire Stick, Apple TV, and Roku).
Note
FDU-Wireless is only for non-PC, IoT, gaming, or streaming devices that do not support WPA2 Enterprise authentication or features a web browser.
Registering a Non-PC Device for use on FDU-Wireless Network
Use the link and directions below to register and manage wireless network access for your non-PC devices.
Sign in into FDU MyDevices portal using the link below using your FDU NetID. Make sure to check “I agree to the terms and conditions” button before clicking “Sign On“
Enter your device type and your device’s MAC Address into the corresponding text boxes. An optional description may be entered for your device as well. Your device’s MAC Address must be entered to register the device and continue. Refer to your devices manufacture for instructions on how to obtain the devices MAC Address. When finished, select “Submit“
Tip
Some devices have their MAC Address labeled alongside it’s Serial number.
Your device should now be listed on MyDevices Portal and allowed to connect to the FDU-Wireless network. It may be necessary to select the FDU-Wireless network on your device or restart your device before successfully connecting to the wireless network
Note
Once your device is added, the status will always remain as Pending. However you will be able to connect the device to FDU-Wireless regardless of this status.
FDU-Secure uses current encryption standards to connect to the FDU network via secure wireless traffic. As a result, FDU-Secure is the preferred method of accessing the on-campus Wireless network if you are Faculty, Student, or Staff member. To connect to the FDU-Secure Wireless Network, you will need an FDU NETID (username@fdu.edu or username@student.fdu.edu).
Below are the necessary steps to connect to the FDU-Secure Wireless Network, specified for various device types:
Windows
Select the “Internet Symbol” located at the right-hand side of the “task bar”
Select “FDU-Secure” from the pop-up menu
Enter “FDU Net ID and Password” and press “OK”
When prompted with “Continue connecting?” press “Connect”
close
macOS
Select the “Wi-Fi Symbol” located at the right-hand side of the “menu bar”
Select “FDU-Secure” from the drop-down menu
Enter “FDU Net ID and Password” and press “OK”
When prompted with “Verify Certificate” press “Continue”
close
iOS
Select the “Wi-Fi” tab located in the “Settings” app
Select “FDU-Secure” from the list of available networks
Enter “FDU Net ID and Password” and press “Join”
When prompted with “Certificate” press “Trust”
close
Android
Select the “Connections” tab located in the “Settings” app
Press “Wi-Fi”
Select “FDU-Secure” from the list of available networks
Enter “FDU Net ID and Password”
Press “CA certificate” then press “Use System Certificates” drop the drop down menu
Input “fdu.edu” in the domain field and press “Connect”
The following guides provide an overview of connecting to Fairleigh Dickinson University’s wireless network. Whether you’re a guest, staff, or student, using FDU-owned or personal devices, these articles provide essential steps for secure and efficient connectivity across various equipment, including non-PC and mobile devices.
Connect to FDU-Secure Wi-Fi
Follow these steps to connect to the FDU-Secure wireless network, which adheres to the latest encryption standards.
Fairleigh Dickinson University vigorously enforces United States copyright law. When utilizing the FDU Local Area Network or FDU provided Internet Access, you are required to adhere to all existing US copyright laws.
CrashPlan Backup will send users an email alert notifying them of any incomplete backups of their devices.
The CrashPlan Backup email alert will be sent from “CrashPlan <noreply@crashplan.com>”
The Subject line of the email will be labeled with: “[External]Critical: [Name of Device] not backed up“
Backup Alert
You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:
CrashPlan Backup Alert Email Notification
What to do if you get a backup alert
After receiving a CrashPlan Backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan Backup device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email.
For Windows Devices
To locate the name of a CrashPlan Backup device:
Click the CrashPlan Backup icon in the Windows System Tray, also referred to as the notification area.
CrashPlan Backup icon
Click “Run Backup now“
Tip
The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.
Ensure the CrashPlan backup application displays the same name as the CrashPlan Backup alert email you received.
close
For macOS Devices
After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:
Click the “CrashPlan Backup” System Tray or macOS menu bar Icon
CrashPlan Backup Icon
Click “Run Backup now“
Note
The backup may take some time to complete. This depends on the length of time since CrashPlan Backup’s last completed backup and the amount of new data that needs to be backed up.
CrashPlan is a backup agent that will back up all data on a university device under the primary owner’s profile. The backup sets can be used for restoring data to a machine, whether it has been reformatted, replaced, or compromised. This document will outline the steps needed to install, activate, and restore data to a new or existing device.
CrashPlan is required on all University provided desktops and laptops to backup all University Business data to prevent data loss.
Who Can use CrashPlan?
CrashPlan is presently licensed for full-time faculty and full-time staff only. The University mandates CrashPlan for proper data security practices. If a user has personal data that they wish to exclude from being backed up, a folder labeled “Personal Documents” can be found and utilized in your “Documents” folder. This folder and its contents will be ignored by CrashPlan when your system is being backed up.
Personal Documents folder locations:
Windows PC
C:\users\username\Documents\Personal Documents\
macOS
/users/username/documents/Personal Documents/
Tip
If the Personal Documents folder does not exist in your Documents folder, you can manually create it and the folder will be automatically ignored by CrashPlan.
Is My Data Secure?
CrashPlan uses AES-256 encryption is used when storing your backups and can only be accessed by theCrashPlan account owner and administrators.
What is Backed Up?
All data found in a user profile will be backed up by CrashPlan.
Location of User Profile:
Windows PC
C:\users\UserName\
macOS
/users/username/
Warning
Any data not stored in the user profile will NOT be backed up by CrashPlan. It is highly encouraged to store university business data within your user profile.
To install CrashPlanon your Windows PC, please follow the instructions below.
Note
CrashPlan is being automatically deployed to all systems owned by Faileigh Dickinson University.
Before Installing CrashPlan, you must be logged in as the owner of the machine using your NetID Credentials.
Open FDU Self Service Portal for Software on your University PC
Click on CrashPlan Backupand then click “Install” on the right-hand side
Note
It could take several minutes for the client to make the first connection and start the first backup.
The entire process will take approximately 5-7 minutes, depending on your internet speed. Once CrashPlanis installed, your account is automatically provisioned in the CrashPlansystem, and your backup will begin shortly.
To install CrashPlan on your macOS device, please follow the instructions below.
Note
CrashPlan is being automatically deployed to all systems owned by Faileigh Dickinson University.
Locate the FDU Self Service Portal in your applications folder or locating the icon on your dock
Locate CrashPlan Backup and click “Enroll”
After the package installs, you will be prompted to enter your FDU email address and then click “OK“
Note
It could take several minutes for the client to make the first connection and start the first backup.
The entire process will take approximately 5-7 minutes, depending on your internet speed. Once CrashPlan is installed, your account is automatically provisioned in the CrashPlan system, and your backup will begin shortly.
This process is used when someone will be assigned a second device and wishes to have it backed up or if the CrashPlan needs to be re-installed on the same device. Because an account already exists, it cannot be provisioned automatically. It must be manually setup either to replace an existing device or create a new backup set on the second computer.
Note
In order to proceed, CrashPlan must be installed prior to continuing, please refer back to the Install instructions for your operating system from the CrashPlan User Guide. A link is found at the bottom of this page.
Tip
A backup set is CrashPlan’s way of describing the backup configuration and what files are being backed up.
Click on the CrashPlan app in the system tray (PC) or Menu bar (macOS) and then click “Setup Device”
If prompted, log in to the FDU NetID Portal and proceed through the FDU single sign-on process
Click “Replace Existing”
Click “Start” to continue with the replace existing device process
Select the device from the list you are replacing and click “Continue”
Click “Select Files” on the following window
Select and Choose which files you wish to replace by placing a checkmark next to each. When finished, click “Restore Files”
The next window will allow you to select how you wish to restore your files. Make your selections and click “Go”
The next window will display download progress for the restore process. You can continue forward by clicking “Continue” at the bottom
The next window Downloads the Files to your device. When the transfer is completed, click “Next”
Tip
You can close this window and continue working or you can click transfer more files and repeat the steps for additional files. This will extend the time it needs to restore.
If you are unsure if you have CrashPlan installed and backing up your system, this quick guide will help give you some comfort.
Click on theCrashPlan icon from the system tray on Windows and the menu bar on macOS
CrashPlan Icon
The Progress will be displayed like in the Figure below
Note
Depending on your backup size, this could take anywhere from a few minutes to a few days. CrashPlan will continue to run and backup in the background. After the first successful backup, incremental backups will occur.
Accidentally deleted or unable to find a file? CrashPlan can help. Please follow the following guidelines in restoring lost or previous versions of files.
Click the CrashPlan System Tray or macOS menu bar Icon
CrashPlan Icon
Left-click on the gear symbol and left-click on “Open CrashPlan….”
If prompted, log in to the FDU Single sign-on Portal and proceed through the FDU DUO Multifactor authentication procedures
Click “Restore Files”
Select the device you wish to restore from
Note
If you have more than one backup device, please select the device from where you want to restore the file from.
You can select a date range from when you wish to restore from on the right-hand side
Navigate to the folder(s) and/or file(s) you wish to restore and place a check next to each one
Click “Restore Files”
Select how CrashPlan will restore your files. Click “Go” when finished
Note
Above are the recommended options for restoring files, this will help you find them more easily.
The time it takes to restore your files will depend on how much data is being restored, available system resources, and available bandwidth.
Using CrashPlan you can create backup sets that will back up your data to additional devices utilizing a schedule. This is useful to have immediate access to critical files in the event of data loss.
This guide is only needed if you wish to have a local backup of your data.
Note
If you schedule multiple backup sets to run at specific times and the backup sets go to the same destination, ensure that these times do not overlap. This ensures good backup performance.
Click the CrashPlan System Tray or macOS menu bar Icon
CrashPlan Icon
Left-click on the gear symbol and left-click on “Open CrashPlan….”
If prompted, log in to the FDU Single Sign-on Portal and proceed through the FDU DUO Multi-factor authentication procedures
From the CrashPlan console window, click the “Dropdown Arrow” symbol next to your device name to drop down a menu, then click “Add Backup Set…”
The next window will be the Add Backup Set configuration window.
Note
The “Add Set” button will be un-clickable until it is completely configured.
Click “Rename” to label your backup set
Changing Selected Files, click “Change”, and select the files and folders you wish to backup to a local destination
When finished click “Save“
Click “Change” to set your destination for your backup
Select your destination by clicking “Add Local Destination (usually an external hard drive) and click “Save“
Click “Add Set” to finalize the setup and start backing up to a local location
Your new back upset is finished and will begin backing up as configured.
CrashPlan will send users an email alert notifying of any incomplete backups of their devices.
The CrashPlan email alert will be sent from CrashPlan for Enterprise <noreply@crashplan.com>
The Subject line of the email will be labeled with: Critical: [Name of Device] not backed up
Backup Alert
You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:
CrashPlan Backup Alert Email Notification
What to do if you get a backup alert
After receiving a CrashPlan backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email. To locate the name of a CrashPlan device, left-click the CrashPlan “C” symbol icon in the Windows System Tray, also referred to as the notification area.
Tip
The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.
For macOS users left-click CrashPlan symbol icon on the macOS icon menu bar. The CrashPlan device name will be displayed in the console. Ensure the CrashPlan application displays the same name as the CrashPlan backup alert email you received.
CrashPlan Symbol Icon
CrashPlan Device Name
After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:
Left-click the “CrashPlan” System Tray or macOS menu bar Icon
CrashPlan Icon
Left-click “Run backup now“
Note
The backup may take some time to complete. This depends on the length of time since CrashPlan’s last complete backup and the amount of new data needed to be backed up.
Whether you’re working at home or the office, OneDrive makes it easy to create new documents and share your files. You can even collaborate with others on a document.
In the following external article, you’ll learn how to create documents and folders. It will go over how to share your files with different groups of people, as well as the various collaboration tools available in Office 365.
Generative Artificial Intelligence (GenAI) is a technology capable of generating new text, images, video, and other data by analyzing and modeling existing datasets. This policy ensures that all members of the FDU Community understand that entering information into publicly available GenAI applications may contribute that data to the application’s training models, potentially making it accessible beyond the university and exposing confidential information.
Additionally, this policy defines the responsible use and data security requirements for GenAI by University faculty, staff, and students. These requirements supplement existing data security policies established by OIRT. Accordingly, diligence must be maintained to protect the confidentiality, integrity, and availability of Administrative Data and Education Records that may be accessed, processed, or generated through GenAI applications.
Confidential, Restricted, or Official Use Only Information must not be entered into any publicly available or commercial GenAI application unless an approved agreement is in place with the Chief Information Security Officer (CISO) or the Chief Information Officer (CIO). This agreement must include appropriate data security requirements in compliance with university policies.
WISP protect information shall not be entered into any private GenAI application without prior approval from the Chief Information Security Officer (CISO) or the Chief Information Officer (CIO). Additionally, if the application is not owned and administered by Fairleigh Dickinson University, an approved use agreement must be executed with the application provider and must include appropriate data security requirements in compliance with university policies.
Each GenAI application handling Confidential, Restricted, or Official Use Only Information must have an Acceptable Use Policy (AUP) defining its terms of use, data collection policies, and user responsibilities. Faculty may include the AUP in course syllabi if GenAI is permitted for use in the course.
Output from a GenAI application must be reviewed by the submitter of the request for confidentiality, integrity, accuracy, fairness, regulatory compliance, and academic attribution with unintended bias before publication or ingestion into another University system in accordance with current FDU Information Security policies located on IT.FDU.EDU.
Confidential, Restricted, or Official Use Only Information must not be retained within GenAI systems after processing, particularly in products and services not hosted by FDU. If the GenAI system allows data deletion, the data must be securely removed once processing is complete unless retention is legally or regulatory required. If deletion is not feasible due to system limitations, alternative measures must be implemented to ensure data confidentiality, such as anonymization or eliminating sensitive data before inputting it into the system.
A disclaimer must clearly indicate when GenAI is used to generate data or influence decision-making. This ensures transparency regarding the nature and origin of the information provided.
In the event of a suspected or confirmed data security incident involving a GenAI system, users must immediately report the incident to the Data Security Incident Response Team (DSIRT) by contacting the Fairleigh Dickinson University Technical Assistance Center (UTAC) at (973)-443-8822. The UTAC is available 24×7.
Appendix I
Key AI Definitions
Submitter—End user (student, faculty member, staff) inputting a query or prompt into an AI tool or product
Generate— the process of creating new content such as text, images, audio, video, or other forms of data based on patterns and information learned from existing datasets
Generator–A system, tool, or mechanism that creates new content
Ingestion— the process of inputting, integrating, and processing data into a system
Appendix II
DATA SECURITY INCIDENT RESPONSE TEAM (ROLES AND RESPONSIBILITIES)
The Data Security Incident Response Team membership includes the Chief Operating Officer, the Chief Information Officer, the Chief Information Security Officer, the Chief Academic Officer, the University General Counsel and the University Risk Manager. Each member of the Data Security Incident Response Team (DSIRT) has responsibilities related to the security of all the organization’s sensitive information. The DSIRT members listed below have specific responsibilities regarding the reporting and handling of data security incidents. Note that one person may serve in multiple roles.
Senior Vice President and Chief Financial Officer: Frank Barra Office: 201-692-2237; Email: fbarra@fdu.edu
Chief Information Officer (CIO): Neal Sturm Office: 201-692-8689; Email: sturm@fdu.edu
Chief Information Security Officer (CISO): Kimberley Dawn Dunkerley Office: 201-692-7672; Email: ddunkerley@fdu.edu
Privacy Officer: Kimberley Dawn Dunkerley Office: 201-692-7672; Email: ddunkerley@fdu.edu
Senior Vice President and University Provost: Benjamin Rifkin Office: 201-692-7093; Email: brifkin@fdu.edu
Office of the General Counsel: Steve Nelson Office: 201-692-2466; Email: snelson@fdu.edu
University Risk Manager: Gail Lemaire Office: 201-692-7083; Email: lemaire@fdu.edu
Vancouver Campus Executive: Wilfred Zebre Office: 604-648-4462; Email: wilfred_zerbe@fdu.edu
Associate Vice President for MIS: Saul Kleinman Office: 201-692-2065; Email: saul@fdu.edu
In an effort to maintain the reputation, security, continuity, and technical oversight of university assets considered part of our overall catalog of services, the Office of Information and Resource Technology is issuing a new policy concerning domain names affiliated with Fairleigh Dickinson University. Affiliation with FDU is determined by OIRT in conjunction with the Offices of General Counsel and Communications and Marketing.
II. POLICY
All domain registrations that have an affiliation with the University must be registered through OIRT. An affiliation is defined as a domain that identifies the University as part of its naming nomenclature and houses content specific to the University or any function, whether administrative, academic, or student related to the University. To request a new domain, please complete the following:
You may also try emailing your questions to domainregistrar@fdu.edu.
In addition to the domain registration, ongoing certification renewals and any backend technical configurations will be managed by OIRT. All costs associated with the domain will be charged back to the department.
Any department that today independently manages/operates a University domain as defined above or has obtained a domain with any affiliation with FDU must notify OIRT of the existence of that domain so ownership can be moved over to OIRT management. Please contact OIRT by sending all available information to domainregister@fdu.edu. A member of OIRT will work with the department to move the ownership over properly. All content of any domain, as well as plug-ins or any other functionality of the domain, will be reviewed by OIRT but are the responsibility of the individual departments.
III. IN CASE OF QUESTIONS
All questions relating to the Domain Registration Policy can be addressed to the VP & CIO of Fairleigh Dickinson University.
This guide is designed to assist you in mastering both the classic and updated versions of the DUO Device Management Portal. It simplifies the process of modifying existing devices and integrating new ones into your multi-factor authentication setup.
Legacy DUO Device Management Portal
Accessing the legacy DUO Management Portal
In a Desktop or Laptop browser visit the “DUO Management Portal“. You will be prompted to authenticate through SSO and complete the Multi-factor Authentication process
After authenticating you’ll see the DUO Management Portal. This is where you can enroll new devices, reactivate, edit, or delete your existing devices
close
Default Authentication Options
If you authenticate with more than one device, you can specify which you would like to be the default.
Click the “Default Device” drop-down menu and pick your default device for authentication. Click “Save” if you’re done making changes
You can choose which authentication method you prefer to use when logging in by clicking on the “When I log in” drop-down menu
Ask me to choose an authentication method: it will prompt you to select an option every time you log in
Automatically send this device a DUO Push: it will automatically send a DUO Push to your default device
close
Reactivate Duo Mobile
Click on “Reactivate DUO Mobile” if you need to get DUO Push working on your phone, for example, if you replaced your phone with a new model but kept the same phone number.
After answering some questions about your device, you’ll receive a new QR code to scan with your phone, which will complete the DUO Mobile activation process
close
Change Device Name
Click on “Change Device Name” to open up an interface to change the display name of your phone
Type in the new name and click “Save“
close
Remove Device
Click the “trash” icon button to delete a device
Confirm that you want to remove the device by clicking on “Remove“. The device will be deleted. It will no longer be able to approve DUO authentication requests.
Note
You may not remove your last device. If you wish to remove it, first add another, then delete the original. If you are unable to delete a device, contact your administrator to have it removed.
close
Add New Device
To add a new authentication device, click “Add another device” link on the right side of the DUO Prompt. You’ll be taken to the new device enrollment prompt
You can use the DUO Quick Start Guide for instructions on how to enroll a new device
Accessing Updated Device Management in the DUO Universal Prompt
You can add additional verification methods, manage your existing devices, or reactivate DUO Mobile for DUO Push from the DUO Universal Prompt.
When logging in to an application with the Universal Prompt Click the “Other Options” link on the authentication page to view your list of available methods
Click on “Manage devices” at the end of the list to enter the device management portal
You will be prompted to verify your identity by completing the DUO Multifactor Authentication process. Select your preferred authentication method from the listed options to continue
After approving a DUO authentication request you can see the Device Management Portal with all your registered devices.
close
Add New Device
To add a new method of verifying your identity in DUO, click “Add a device” and follow the enrollment process described in the DUO Quick Start Guide, starting on Step 3.
The difference between adding a new device from the Device Management Portal and during first-time enrollment is that when you have finished enrolling the new device you return to the Device Management Portal to view all your registered devices, including the new one, instead of continuing to log into an application.
close
Rename or Remove a Device
Click the “Edit” button on the device you would like to rename or remove to view the drop down menu
Then click either “Rename” or “Delete“
When renaming a device, type the new name for your device, then click on “Rename” to save your changes
When Deleting a device, confirm your selection to delete
close
Reactivate DUO Mobile for an Existing Device
If you have replaced the phone you activated for DUO Push, you can reactivate DUO Push if you have the same phone number.
Click on “I have a new phone” for the device you want to reactivate
Click “Get Started” to continue
Click on “Send me a passcode” or “Call my phone” then proceed to follow the instructions prompted to complete the reactivation process
close
Reactivate DUO Mobile outside of the Device Management Portal
Let the DUO Push authentication time out
Click on the “I got a new phone” link shown in the Universal Prompt
If you still use the same phone number as you did when you first set up the phone to use DUO Push, then click or tap the “Text me a link” button
When the text message with the link arrives on your phone, tap it to automatically reactivate DUO Mobile on your phone to use DUO Push again. If you don’t have DUO Mobile installed be sure to install it before you try to open the activation link in the text message.
If you are using a different phone number than the one you first set up, then press on “I got a new number“
Press “Continue” to proceed to the DUO Device Management Portal, where you can complete the steps to “Adding a New Device“and set up DUO Push on the new phone
Note
You will need to verify your identity with a different DUO verification method, so if you don’t have one available you will need to contact the Fairleigh Dickinson University Technical Assistance Center for help.
Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got to add another layer of security to our accounts.
DUO Push – if you have the DUO Mobile App installed on your smartphone or tablet, you can receive a push notification. From the app, you can approve or deny the login attempt.
Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you a one-time code, click Enter Passcode, then click on the blue button “Text me new codes.” These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
Phone Call (Faculty/Staff Only) – you can receive a phone call on your mobile phone or landline phone. The call will give instructions on approving or denying the login attempt.
If you opt-out of the DUO Mobile Application push notifications, there are a variety of passcode options to utilize as your second verification method.
Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
Passcodes via SMS(Faculty/Staff Only) – users can receive a one-time use code via text message. To get you one-time code click Enter Passcode, then click on the blue button “Text me new codes.”These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
Selecting this option will allow you to bypass DUO authentication for the next 60 days. This only works if cookies are enabled, and you are logging in from the same computer and browser. You will still be prompted to verify once – with your username and password. You will not be able to access your settings on that particular browser during the 60 days. Please note that if you have tools or policies running that regularly delete or clean cookies, the remember me feature will not work. If you do need to access your settings (perhaps to add another device), just try another browser or visit the FDU Self-Service Portal. Remember me will not work if your browser is set to private browsing mode.
The remember me feature relies on browser cookies. For remember me to work, your Internet browser must allow cookies to be stored. Visit your browser content settings to ensure cookies are being stored. Some departments on campus do not allow cookies to be stored. If the remember me feature does not work on your browser, check with desktop support in your area.
If you do not have your device with you, you can obtain a batch of temporary passcodes. To obtain a temporary passcode, call the Fairleigh Dickinson University Technical Assistance Center (UTAC). Each of the passcodes can only be used once and will expire in 7 days.
Yes, the passcode option on the DUO app does not require WiFi or cellular connectivity, it even works on airplane mode. To use this option, visit the DUO app on your smartphone, and tap the key icon to obtain a passcode. Enter the passcode into the DUO prompt when logging into any website that requires DUO authentication.
DUO Authentication is required by any application the utilizes the university Single Sign-On (SSO) service. Examples of some websites that require DUO authentication are listed below.
You may have trouble receiving push requests if there are network issues between your phone and Duo’s service. Many phones have difficulty determining whether to use the Wi-Fi or cellular data channel when checking for push requests and simply turning the phone to airplane mode and back to normal operating mode again often resolves these types of issues, if there is a reliable internet connection available. Similarly, the issue may be resolved by turning off the Wi-Fi connection on your device and using the cellular data connection.
Check the time and date on your phone and make sure they are correct. If the date and time on your phone are manually set, try changing your device’s configuration to sync date and time automatically with the network.
iOS users can run a troubleshooting tool from within Duo Mobile version 3.32.0 or later. To run the tool:
Open the Duo Mobile app on your iOS device and tap the Edit button in the top left of the accounts list screen, then tap the name of the account for you aren’t receiving push requests.
Next, tap the Get Started button in the “Missing Notifications?” section of the “Account Details” screen.
Duo Mobile performs the test. If any step fails, you’ll receive further troubleshooting suggestions. After taking the suggested actions, press “Run test again” to retry.
The steps that Push Troubleshooting performs automatically are as follows:
Check device settings.
Check internet connectivity.
Check that the device can contact Duo’s cloud service.
Attempts to send a test Duo Push notification.
Should none of these actions help, see the Duo Knowledge Base for additional iOS and Android troubleshooting steps.
If you can’t get Duo Push working on your own, you can log in with a passcode generated by the Duo Mobile app and send a new activation link to your phone.
NOTE: Google Play Services are required to receive push notifications on Android. Users without Google Play Services installed will have to “fetch” by swiping down in the DUO Mobile app.
If your phone number has not changed, login to FDU Self-Service Portal then choose the “Call my Phone” option.
Choose your device from the list, and then click “Device Options” next to your phone.
Next click the “Reactivate Duo Mobile” button (you will need to install the Duo app on your phone to proceed). Then follow the instructions to activate DUO Mobile on your new device.
If you have a new phone number, you will first need to obtain a temporary passcode (see the ‘What are Passcodes?’ section above).
Yes, you can add devices by visiting your DUO settings. When you see the DUO prompt with the three notification options, click “Settings” at the top right.
NOTE: If you are using the Remember Me for 60 days feature, you will need to visit FDU Self-Service Portalaccess your settings.)
After you click Settings, click “Add a New Device“. You can register smartphones, cell phones, tablets, and landline phones.
The DUO smartphone application serves only to provide two-factor authentication. It does not access any personal information on your device, nor does it track your location. Learn more about DUO’s commitment to privacy on its website.
A “bypass code” is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally, used as “backup codes,” so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily cannot use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.
A user must have a valid Duo authentication device enrolled (like a phone or iPad) to use a bypass code to authenticate. Bypass codes are not intended as a user’s only 2FA method.
Bypass codes expire after being used the allowed number of times, or after an administrator-defined amount of time. Once a bypass code is created, the timeout and allowed uses cannot be extended.
If you need a Bypass code please visit SAMI Support, where you can request additional information from UTAC or search our extensive IT knowledge base. While SAMI Support provides the quickest and easiest access for IT support, you can always contact UTAC by phone at (973) 443-8822 or email at fdutac@fdu.edu.
DUO two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.
Install DUO Mobile App
The DUO app is available for mobile phones and tablets. You can directly access the DUO Mobile Security App using these links:
In a Desktop or Laptop browser visit the DUO Management Portal to begin the activation process by enrolling your device. Activation requires scanning a QR code with the DUO app’s built-in scanner
Duo prompts you to enroll the first time you visit the DUO Management Portal using a browser or a client application that shows the interactive Duo web-based prompt
Supported Browsers: Chrome, Firefox, Safari, Edge, Opera, and Internet Explorer 8 or later. Some browsers do not support all of DUO’s authentication devices (for example, Security Keys won’t work with Internet Explorer). For the widest compatibility with DUO’s authentication methods, we recommend recent versions of Chrome and Firefox.
Click “Start setup” to begin enrolling your device
Select the type of device you’d like to enroll and click “Continue“. We recommend using a smartphone for the best experience, but you can also enroll iPadOS and Android tablets
Select your country from the drop-down list and type your phone number. Use the number of your smartphone or cell phone that you installed the DUO Mobile Security App on in the Step 1
Double-check that you entered it correctly, check the box, and click “Continue“
Note
If you’re enrolling a tablet you aren’t prompted to enter a phone number.
Choose your device’s operating system and click “Continue“
Click “I have DUO Mobile installed”
If you have not completed installing the DUO Mobile App in Step 1 please complete now by following the platform-specific instructions on the screen. After installing the app return to the enrollment window
Activating the app links it to your account so you can use it for authentication
On iPhone or Android, activate DUO Mobile by scanning the barcode with the app’s built-in barcode scanner. Follow the platform specific instructions for your device:
The “Continue” button is clickable after you scan the barcode successfully
Can’t scan the barcode? Click “Or, have an activation link emailed to you instead” and follow the instructions
Once activated click “Continue” to complete registration
Configure Device Options (Optional)
You can use Device Options to give your phone a more descriptive name, or you can click “Add another device” to start the enrollment process again and add a second phone or another authenticator
If this is the device you’ll use most often with DUO then you may want to enable automatic push requests by changing the “When I log in:” option and changing the setting from “Ask me to choose an authentication method” to “Automatically send this device a DUO Push” and click “Save“. With one of the automatic options enabled DUO automatically sends an authentication request via push notification to the DUO Mobile app on your smartphone.
Your device is ready to approve DUO push authentication requests. Click “Send me a Push” to give it a try. All you need to do is tap “Approve” on the DUO login request received at your phone
With DUO activated on your account, and with your device enrolled, you are ready to use DUO. When logging in, you will have two authentication options. Review the options below to determine what works best for you.
Tip
We recommend the push notification to your smartphone, it’s the easiest. You can also check the box “Remember Me for 60 Days” to only perform the authentication once every two months on that device.
close
OKTA Initiated DUO Activation
Note
This step requires a Desktop or Laptop browser.
FDU NetID users who are logging into OKTA for the first time will be prompted to enroll using a browser or a client application that shows the interactive Duo web-based prompt.
Click on “Enroll” to continue
You will be redirected to verify with DUO MFA. Click on “Set up” then “Next” to continue
Supported Browsers: Chrome, Firefox, Safari, Edge, Opera, and Internet Explorer 8 or later. Some browsers do not support all of DUO’s authentication devices. For the widest compatibility with Duo’s authentication methods, we recommend recent versions of Chrome and Firefox.
Choose “DUO Mobile” as your verification method
Select your country from the drop-down list and type your mobile phone number. Use the number of your smartphone or cell phone that you installed the DUO Mobile Security App. Click on “Add phone number” to continue
Note
If you’re enrolling a tablet, don’t enter a phone number and click on “I have a tablet” instead
Double-check that you entered your information correctly. Click on “Yes, it’s correct” to continue if the information is correct
Click “Next” if you downloaded the DUO app as instructed in the first step
If you have not completed installing the DUO Mobile App please complete now by following the platform-specific instructions on the screen. After installing the app return to the enrollment window
Open the DUO Mobile app on your phone or tablet and add this account by scanning the QR code shown on-screen
When you receive confirmation that DUO Mobile was added click “Continue“
Note
If you aren’t able to scan the QR code, click on “Get an activation link instead” and then enter your email address to send the activation link to yourself. Open your email address on your Mobile device where you installed DUO Mobile. Follow the instructions in the email to activate the new account in DUO Mobile.
Once the setup is completed, click on “Log in with DUO“
close
Authentication Options
With DUO activated on your account, and with your device enrolled, you are ready to use DUO. When logging in, you will automatically receive a DUO Push but will also have the choice to select from “Other Options“. Review the options below to determine what works best for you.
Tip
We recommend the push notification to your smartphone, it’s the easiest form of authentication.
These are the different ways in which you can use DUO:
Duo Push
Once you have activated DUO Authentication, Duo will automatically send a DUO Push to your registered device. Open the notification on your device, and you’ll see a green checkmark and a Red “x“. Simply tap the “Green Checkmark” to approve the authentication request and gain access to your account.
VPN users select the number corresponding to Push or type “push“. Users with multiple devices will need to include a number indicating desired device i.e. push2.
close
DUO Mobile Passcode
Once you have activated Duo Authentication, you can use the DUO mobile app to generate passcodes. This option does not require wifi or data, so this is a great option if you’re traveling or if you have limited or no cell/Internet service. Open your DUO mobile app, tap the FDU logo and it will reveal a passcode. During login, choose the enter a passcode option, enter the code and you’re in.
close
Text Message Passcode (Faculty/Staff)
You can receive a one-time use code via text message. To get your one-time code click on “Text message passcode“. When you land on the text message page, it will show that a text message was just sent to you with a passcode.
VPN users select the number corresponding to SMS passcode or type “SMS“. Users with multiple devices will need to include a number indicating desired device i.e. sms2.
Note
These text message passcodes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
close
Phone Call (Faculty/Staff)
Click the “Phone call” option and DUO will call your phone. Answer the phone call from DUO and follow the voice instructions to log in to the application.
VPN users select the number corresponding to Phone Call or type “phone“. Users with multiple devices will need to include a number indicating desired device i.e. phone2.
How Do I Change Settings or Enroll Another Device?
You can use the DUO Management Portal to easily edit and add new devices. For instructions on how to access the DUO Management Portal, follow the steps using the link below:
DUO two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students. Please follow the steps below.
Install DUO Mobile App
The DUO app is available for Android, iOS and iPadOS. Use the links below to install DUO on your mobile device.
In a Desktop or Laptop browser visit the DUO Management Portal to begin the activation process by enrolling your device. Activation requires scanning a QR code with the DUO app’s built-in scanner
Supported Browsers: Chrome, Firefox, Safari, Edge, Opera, and Internet Explorer 8 or later. Some browsers do not support all of DUO’s authentication devices (for example, Security Keys won’t work with Internet Explorer). For the widest compatibility with DUO’s authentication methods, we recommend recent versions of Chrome and Firefox.
Click “Start setup” to begin enrolling your device
Select the type of device you’d like to enroll and click “Continue“. We recommend using a smartphone for the best experience, but you can also enroll iOS/Android tablets
Select your country from the drop-down list and type your phone number. Use the number of your smartphone or cell phone that you installed the DUO Mobile Security App on in the Step 1
Double-check that you entered it correctly, check the box, and click “Continue“
Note
If you’re enrolling a tablet you aren’t prompted to enter a phone number.
Choose your device’s operating system and click “Continue“.
Click “I have DUO Mobile installed”
If you have not completed installing the DUO Mobile App in Step 1 please complete now by following the platform-specific instructions on the screen. After installing the app return to the enrollment window
Activating the app links it to your account so you can use it for authentication
On iPhone, Android, and Windows Phone activate DUO Mobile by scanning the barcode with the app’s built-in barcode scanner. Follow the platform specific instructions for your device:
The “Continue” button is clickable after you scan the barcode successfully
Can’t scan the barcode? Click “Or, have an activation link emailed to you instead” and follow the instructions
Once activated click “Continue” to complete registration
close
Configure Device Options (Optional)
You can use Device Options to give your phone a more descriptive name, or you can click “Add another device” to start the enrollment process again and add a second phone or another authenticator
If this is the device you’ll use most often with DUO then you may want to enable automatic push requests by changing the “When I log in:” option and changing the setting from “Ask me to choose an authentication method” to “Automatically send this device a DUO Push” and click “Save“. With one of the automatic options enabled DUO automatically sends an authentication request via push notification to the DUO Mobile app on your smartphone.
Your device is ready to approve DUO push authentication requests. Click “Send me a Push” to give it a try. All you need to do is tap “Approve” on the DUO login request received at your phone
With DUO activated on your account, and with your device enrolled, you are ready to use DUO. When logging in, you will have two authentication options. Review the options below to determine what works best for you.
Tip
We recommend the push notification to your smartphone, it’s the easiest. You can also check the box “Remember Me for 60 Days” to only perform the authentication once every two months on that device.
close
Authentication Options
There are two ways you can use DUO:
Push Notification
Once the DUO mobile app is installed, you can select to receive a DUO notification on your smartphone. Open the notification, and you’ll see a green checkmark, and a red X. Simply tap the “GreenCheckmark” to gain access.
Passcodes
You can use the DUO mobile app to generate passcodes. This option does not require wifi or data, so this is a great option if you’re traveling or if you have limited or no cell/internet service. Open your DUO mobile app, tap the FDU logo and it will reveal a passcode. During login, choose the enter a passcode option, enter the code and you’re in.
How Do I Change Settings or Enroll Another Device?
To change settings or enroll another device, visit DUO Management Portal or any DUO-supported application. When you get to the DUO prompt, click the “Settings” button and choose to add a new device or access your settings.
An alias is an additional email address that will direct mail to your FDU email account. Creating an alias for your account can be a useful strategy. For instance, if you are spearheading a project, it may be easier to solicit replies to an address that contains the name of the project than it would be to garner responses to your existing email address. If this solution interests you, please fill out the Email Alias form.
Due to the cavernous email storage offered on the Office365 platform, there has been little to no demand for FDU staff and faculty members to request an increased mail quota. Office365 email provides enough capacity for even our most prolific users. However, if special circumstances make you the exception to this rule, you can request a quota increase by completing the Quota request form.
FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files from your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.
Phishing involves the use of e-mail messages that appear to come from your bank or another trusted business in an attempt to scam the user into surrendering private information that will be used for identity theft. The phishing e-mail typically ask you to click a link to visit a Web site, where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers
Scammers have become increasingly sophisticated in creating fraudulent emails and Web sites that look authentic. These emails and Web sites often appear to be from legitimate companies and include images and logos of these organizations.
The Network ID (NetID) is a Windows Active Directory account uniquely assigned to each student, faculty & staff. It serves as your login to many computing and networking services including FDU Email.
In order to provide a safe and stable computing environment, the FDU-Wireless and FDU-Secure wireless networks require NetID authentication. However, in certain instances our students, staff and faculty members will need to work on campus with people from outside of our community. This can include vendors, contractors, visiting scholars, or even a visiting family member or friend. In these instances, the FDU community member can sponsor a guest for temporary wireless access. The sponsor of a guest account will be responsible for the actions of his or her guest. Please ensure that your guest(s) follow FDU’s Acceptable Use Policy for Computer Usage.
In order to provide a safe and secure network environment, FDU IT requires devices to authenticate to the FDU network before connecting. This works well for computing devices such as desktop computers, laptop computers, and mobile devices such as tablets and phones. Most other electronics, including gaming consoles and streaming video boxes, cannot properly authenticate to the network. In these instances, we ask you to register the device using the online form below. Please note that each user on our network is entitled to register up to 5 devices.
To access Forms, you will be directed to our SAMI Support Portal where you will be asked to log in using your NETID and authenticate using Duo. Once you click “Next,” you will be forwarded to samisupport.fdu.edu in a new window or tab.