Explore our comprehensive IT resource library to discover a wealth of helpful information tailored to your needs. Utilize our filters to refine your search by role at FDU, department, or specific service for a more personalized experience.
FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.
Note
Your process may vary slightly based on the version of the Operating System that your device is using.
SAMI Support
If you have any questions or concerns, please visit SAMI Support, where you can request additional information from UTAC or search our extensive IT knowledge base. While SAMISupport provides the quickest and easiest access for IT support, you can always contact UTAC by phone (973)-443-8822 or email at fdutac@fdu.edu.
The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines for appropriate behavior and use of FDU computing resources.
SCOPE
These guidelines apply to all users of FDU computing resources. Users include all students, faculty, staff, visiting faculty, volunteers, guests of the administration, and external individuals or organizations.
Computing resources include, but are not limited to, desktop and laptop computers, file servers, smart phones, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased, or licensed by FDU. In addition, computing resources include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies to all usage of university computing resources, whether that usage occurs through a university owned device or personal device.
University property, including computing resources, are provided to you for University business. Although security protocols have been put in place to restrict access to computing resources to protect them against unauthorized access by external parties, it is important that all members of the University community take appropriate measures to safeguard these resources.
Users – and not the University — are responsible for the materials that users prepare, receive, or transmit through computing resources. Thus, as a condition of using the University’s computer system, all users represent that they are in compliance with applicable laws and University policies, including l federal, state, and international copyright and other intellectual property laws and laws regarding defamation.
ACCEPTABLE USE
Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:
You will not use an account that does not belong to you. You will use only the computers, computer accounts, and computer files for which you have authorization. You may not share accounts, files, or access to computer resources with any unauthorized person.
You are responsible for any computer account you have been given. You will set a password on the account that is in compliance with university password policies, and you may not share this password with any other person. If you discover that someone has made unauthorized use of your account, you should change your password immediately and immediately report the event to one of the individuals listed in Appendix 1.
You agree not to intentionally seek out information about, copy, or modify password files, other users’ files, or disks and tapes belonging to other people, unless specifically authorized by those persons, whether at FDU or other facilities.
You should not attempt to decrypt material to which you are not entitled or attempt to gain rights you have not been specifically granted by the owner. If you observe or discover a gap in system or network security, you agree to inform one of the individuals listed in Appendix 1 and not to exploit the gap.
You agree to refrain from any activity that interferes with a computer’s operating system or its logging and security systems, or that may cause such effects. Additionally, users are not authorized to remove any security software installed on FDU equipment by FDU Systems personnel.
You must be sensitive to the public nature of computing resources and agree not to transmit, post, or otherwise display material that is threatening, obscene, harassing, or defamatory. The use of University computing resources to libel, slander, or harass any other person is not allowed and could lead to University discipline as well as legal action by those who are the recipients of these actions.
You agree not to make copies of or distribute software the University owns or uses under license, unless the owner of the software or the owner of the license has specifically granted permission to copy. If in doubt as to whether you have permission to copy software, assume you don’t.
Messages, statements, and declarations sent as electronic mail or public postings should be treated as if they were tangible documents. From electronic identifiers used in the transmission of messages, addressees can see the University is the source of the message or its system is being used to transmit it, similar to how letterhead or return addresses on a tangible document would identify the University. Therefore, as a representative of the FDU community, you are expected to respect the University’s good name in your electronic dealings with those both within and outside the University. Moreover, in so far as employees make use of FDU computing resources to relay personal opinions, it is their obligation to make sure that no addressee can infer that their personal opinions are necessarily shared or authorized by the University, and they are obligated to clearly identify their opinions as their own and not those of the University.
You agree not to create, alter, or delete any electronic information contained in any system that is not your own work, unless specifically authorized by the owner of that information.
You agree not to create, send, or forward electronic chain mail letters. You agree not to attempt to alter or forge the “From” line or any other attribution of origin contained in electronic mail or postings. You agree not to use any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email).
You may not use FDU computing resources as a means of obtaining unauthorized access to any other computing systems.
FDU’s data storage on University servers, hosted servers, third party storage, or hosted storage, is an FDU computing resource with costs attached and should be used with care and discretion. It is primarily meant for current class work, research and development projects, business files, and temporary storage of other files. Users are expected to keep their disk usage reasonably minimized, in keeping with their University role.
Network addresses such as TCP/IP addresses and machine addresses are assigned by University Systems and Networking staff and may not be altered or otherwise assigned without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). In addition, no equipment may be attached to the network without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). This applies to all staff as well as academic departments.
FDU’s computing resources are not to be used for the transmission of commercial or personal advertisements, solicitations, and promotions or for extended reproduction of political, ideological or commercial material originated by a person or organization. This includes but is not limited to the execution of revenue-generating advertising programs which pay users when the programs are run. The Associate Vice President of Systems and Networking (or other designee) may suspend this rule when it is in FDU’s best interest to permit such activity.
Users may not contract with external Internet services, service providers, or the like without the explicit written approval of the Associate Vice President of Systems (or designee) and Networking and compliance with Finance and Office of General Counsel policies.
Without the explicit written permission of the Associate Vice President of Systems and Networking (or designee) you agree not to run any of the following protocols or services:
Port scanners, network monitors or other types of utilities that probe any other computer, be they inside or outside FDU’s network.
Routing or network serving protocols such as RIP, IGRP, OOTP or DHCP on the network.
Daemons, processes or programs that accept incoming connections, as a server would.
Streaming media servers or any other server that broadcasts continuous data streams.
FDU’s computing resources, including equipment, network, services, and wiring may not be modified or extended beyond the areas of their intended use.
Network connections may not be used to provide network access to anyone outside the University community or for any purposes other than those that are in direct support of the academic mission of the University.
All computers connected to FDU’s network must run an operating system and configuration that is supported by its vendor with regard to security patches and updates, as well as antivirus software with current virus definitions. It is the user’s responsibility to keep their virus definitions up to date and to apply all critical operating system updates. More information is available at https://it.fdu.edu or submit questions through the SAMI Support portal or by emailing fdutac@fdu.edu.
Users may not alter the operating system or configuration of University owned computers without the explicit written authorization of the Associate Vice President of Systems and Networking (or designee).
PERSONAL USE
Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University, should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.
Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.
SECURITY
Users should use reasonable available methods to safeguard their data, including regular changes of passwords, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.
The Office of Information Resources and Technology (“OIRT”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems.
In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years. This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years.
In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.
OIRT and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.
PRIVACY
Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval, and review. Individuals using FDU computing resources should have no expectation that any information transmitted through or stored on FDU computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private. By using FDU computing resources, the user consents to the University’s (and its designees’, both internal and external) access to their electronic files, documents, and materials stored, transmitted, or otherwise accessible on those resources.
Examples of where the University might access a user’s electronic files include system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; keystroke monitoring of sessions to determine inappropriate use of the computing facilities; searches in connection with a litigation, threatened litigation, governmental proceeding or investigation; investigation of a possible data breach; investigation of possible breach of University policy, rules, handbooks, or protocols; and other measures to safeguard the University’s systems and compliance with laws. These examples are not intended to limit the University’s right to access a user’s electronic files under circumstances deemed appropriate by the University. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated, stored, and forwarded by appropriate personnel without the user’s permission or knowledge.
Without limitation, because employees are granted access to and use of FDU computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information.
The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data and this policy is subject to FERPA requirements. In general, FERPA gives students more control over their educational records, and it prohibits educational institutions from disclosing “personally identifiable information in education records” without the written consent of the student (subject to specified exceptions). To find out specifically what information you may or may not give out and to whom, contact the office of the Vice President for Student Affairs.
POLICY VIOLATIONS
Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.
Violations of this policy will be addressed as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and, if applicable, State and Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion, or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.
The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.
This policy is subject to revision. Comments and suggestions are welcome and should be sent to Stuart Alper, Associate Vice President of Systems and Networking, mailstop T-BH1-01, or stuper@fdu.edu.
It is the user’s responsibility to remain informed about the contents of this document.
CONTACTS
Stuart Alper Associate Vice President of Systems and Networking Mailstop T-BH1-01 (201)-692-2414 stuper@fdu.edu
Saul Kleinman Associate Vice President of Management Information Systems Mailstop T-BH2-03 (201)-692-2065 saul@fdu.edu
The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). We support and advise using this method due to the program’s robustness and integration of all Office365 features. Follow the steps below to install and set up the Outlook app on your phone.
Outlook App on Apple iOS and Android Mobile Devices
Use the links below to install the Outlook app onto your mobile device.
Launch the app and press on “Add Account” if on an Android device. It will then prompt you to input your FDU email address. On iOS, the app will launch and immediately ask you for your FDU email address. Once filled out press “Continue” on Android. On iOS press “Add Account”
Android
Android
iOS
You will be routed to the FDU Single Sign On Page, from here input your FDU email address and password and press “Sign In”
For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
Your FDU email account has now been added to your device successfully. Ensure the email account is listed on your Outlook application.
These instructions demonstrate adding an FDU email account to an Apple mobile device’s native Apple “Mail” app. Unfortunately, adding an FDU email account on an Android OS mobile device’s native “Mail” app is currently unsupported by FDU IT support. Information regarding adding an FDU email account to an Android OS mobile device via the Outlook App can be found below for Android OS mobile device users.
Note:
The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). FDU IT supports and advises using this method due to the program’s robustness and integration of all Microsoft 365 features. A link with instructions for the Outlook app on mobile devices can be found at the bottom of this page.
Setting up your FDU Email Account in the Mail app on iOS
Go to the “Settings” app
Tap “Mail”
Tap “Accounts”
Tap “Add Account” and then select or tap “Microsoft Exchange”
Enter your FDU email address and a description of your email account in the corresponding text boxes. Please note that the default description name for the account will be ‘Exchange’ if left unchanged. Tap “Next” to continue
Tap “Sign In”
Enter your FDU email address and password. Tap “Sign In” to continue
For security purposes, all applications which use FDU’s Single Sign-On require DuoTwo-Factor Authentication (2FA). After entering your FDU NetID login credentials, Duo requires you to complete a method of second-factor authentication
Choose the FDU NetID account information you want to synchronize or access on your iOS mobile device by toggling the choices on/off. Tap “Save” to continue
Your FDU email account has successfully been added to your iOS mobile device
close
Setting up your FDU Email Account on Android OS
Due to the multiple Android OS mobile device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features differ depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to set up Outlook on Android OS.
Revision Date: New Policy Effective Date: 11/1/2023
Section A – University Systems and Applications
I. Purpose
The purpose of this policy is to establish information security standards for individuals receiving credentials to Fairleigh Dickinson University (“FDU” or “University”) resources and how those resources are accessed.
II. Scope and Applicability
This policy applies to all university system resources. All Users are responsible for adhering to this policy.
III. Definitions
Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.
Account: An established relationship between a User and a computer, network, or Information System which is assigned a credential such as a username and password.
System Administrative Account: An Account with elevated privileges intended to be used only when performing management tasks, such as installing updates and application software, managing user accounts, and modifying operating system and application settings.
Entitled Account: A user who has met the minimum requirement to be granted authorization to access electronic Fairleigh Dickinson University Resources.
Authorized User: A User who has been granted authorization to access electronic Fairleigh Dickinson University Resources and is current and active in their privileges.
Contractor or Vendor: A person or a company that undertakes a contract to provide materials or labor to perform a service.
Employee: University staff faculty and adjunct, including nonexempt, exempt, and overseas staff and collegiate faculty.
Multi-Factor Authentication (MFA): Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password); something you have (e.g., cryptographic identification device, token); or something you are (e.g., biometric).
Privileged Account: An Account that is authorized to perform security-relevant functions that an ordinary Account is not authorized to perform.
Single Sign-On (SSO): An authentication process that allows an Authorized User to access multiple applications with one set of login credentials. SSO is a common procedure in enterprises, where a client accesses multiple resources connected to a local area network (LAN).
User: A member of the University community, including but not limited to Staff and Faculty, and other individuals performing services on behalf of University, including Contractors, volunteers and other individuals who may have a need to access, use or control University Data.
IV. Authentication
Any service, application or Information System, whether on-premise or in the cloud, that contains WISP protected information, especially PI or PHI; OR is accessed by a large group of employees (20 or more), must use Single Sign-on authentication.
If the service or application is being provisioned by a business unit, the unit must engage University Systems to work with the provider to enable SSO.
If SSO is not supported by the service or application, it will not be approved for use by the university.
See Section V for exceptions.
Multi-factor authentication (MFA) must be used to access University resources.
Passwords must be constructed in accordance with the minimum requirements as listed below:
Authorized User Account passwords must meet a minimum length of 8 characters.
Administrative and Privileged Account passwords must meet a minimum of 10 characters.
Passwords must contain a mix of alphanumeric characters. Passwords must not consist of all digits, all special characters, or all alphabetic characters.
Automated controls must ensure that passwords are changed at 90-day intervals for both general users and administrative-level accounts.
NetIDs associated with a password must be disabled for a period of time after 10 consecutive failed login attempts. A minimum of 30 minutes is required for the reset period.
Passwords must not be the same as the NetID.
Passwords must not be displayed on screens.
Users must not share passwords.
Initial passwords and password resets must be issued pre-expired forcing the user to change the password upon first use.
Password reuse must be limited by not allowing the last 10 passwords to be reused. In addition, the password must be at least 2 days old in order to be voluntarily changed.
Access will be disabled 90 days past the date that a password expired if not changed.
Access will be disabled after 30 days of creation if NetID is not claimed.
Expired passwords must be changed before any other system activity is allowed.
Server Password Protocol
If, at any time, a member of the Community is granted permission to install a server, and access to that server is restricted via Login, and if that process is granted SSO exception through section VII., that system can not hold passwords in clear text. That system must use an approved irreversible cryptographic transform to protect its users’ passwords.
VI. Enforcement
This policy will be enforced by technical controls wherever feasible; otherwise, this policy will be enforced by OIRT under the direction of the CIO. All members of FDU’s faculty and staff have a responsibility to promptly report any known instances of noncompliance to AVP of University Systems and Networking or the Director of Systems.
Failure to comply with this policy can result in disciplinary action. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.
VII. Exceptions
Exceptions to this policy should be submitted to the AVP, USAN for review. Approval of the Chief Information Officer (CIO) or Data Security Incident Response Team (DSIRT) may be required.
FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files off of your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.
To view FDU’s stance on this issue in its entirety, please view the document below.
This article offers a detailed, step-by-step guide, on how to change your NETID password directly from your Mac using the Jamf Connect and how to synchronize this updated NETID password with your Mac’s user account password.
Changing and Syncing your NET ID Password on your Mac
Click on the “FDU shield icon” located in the top right of your screen’s menu bar
Select “Change Password at FDU Identity“
Sign in to the “FDU Identity Portal” that opens up
Scroll to “Change My Password” section and enter your old password and new password in the appropriate fields. Then click the “Change My Password” button
You will see the password successfully changed in the red bar when successful. Click “Done“
Enter your “FDU NetID” and “Password” in the corresponding fields. Click “Sign In”
Enter your old password in the “Local Password” prompt and click “Sync” to synchronize the new password with your Mac’s login password
Note
You will need to reauthenticate your Office 365 apps and FDU-Secure.
Synchronizing NETID Password with your Mac Password
If you changed your NETID password outside of your FDU Mac, you will be prompted automatically to sync your password to your Mac’s password the next time you are connected to the internet. You will first need to log in to the machine using your old password and then proceed with the synchronization following the steps below.
The following dialog box will appear once you are connected to the internet automatically. Enter your “FDU NetID” and “Password” and click “Sign In”
Enter your old password in the “Local Password” prompt and click the “Sync” button to synchronize the new password with your Mac’s login password
Note
You will need to re-authenticate to your Office 365 apps and FDU-Secure.
Welcome to Fairleigh Dickinson University. As a new campus community member, one of your priorities will be gaining access to FDU NetID. With an FDU NetID, you can access various IT resources, including Microsoft 365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.
New Student through Welcome Email (US Students)
If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below:
New Faculty, Staff Member Temporary Employee, or On-Campus Contractor
If you are a new Faculty, adjunct Faculty, Staff member, temporary employee, or contractor who works on campus and requires a NetID, please visit the link below:
If you are entitled to an FDU NetID account and either do not fall under any of the categories above or attempted to claim their NetID and received a message that your NetID has not been created, please visit the link below:
The FDU computer labs provide a safe and welcoming study space for our users. The computer labs provide access to technological resources such as: current specialty software applications for a variety of majors, access to online libraries for research, internet access, and print services. Our labs are also available to faculty for instruction in both technology-intensive and non-intensive majors. The computer labs are also used as a venue for various workshops and university programs. The lab hours are flexible to meet the needs of both resident students and commuter students. The lab operations also provide on-campus work opportunities for our students to develop their skills and offer customer service and technical support to our campus community.
FDU Computer Labs Provide:
A conducive learning space that enables students to develop the skills necessary for collaboration and teamwork.
Hands on experience with current hardware and software applications used for a variety of majors.
Students access to the same technology resources for the purposes of research, printing, and producing professional work.
Customer service and on-site technical support from our student staff.
Access and opportunities for students to develop their computer skills.
Interactive learning opportunities between faculty and students; theory and application in one setting under the supervision of faculty with the support of student staff.
Computing Services has multiple computer labs in our New Jersey Campuses for classroom instruction and student use.
Florham Campus
Dreyfuss Building
Building
Mon
Tue
Wed
Thur
Fri
Sat
Sun
Dreyfuss Building
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 5PM
10AM- 5PM
12PM- 9PM
Dreyfuss 211, 212, 213
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 5PM
10AM- 5PM
12PM- 9PM
Rooms:
D206
D207
D208
D209
D211
D212
D213
Phone:
(973)-443-8689
close
Metropolitan Campus
Dickinson Hall – Hackensack
Building
Mon
Tue
Wed
Thur
Fri
Sat
Sun
Dickinson Hall
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 5PM
CLOSED
CLOSED
Rooms:
Lab A (DH2163)
Lab B (DH2164)
Lab C (DH2165)
Phone:
(201)-692-7111
close
University Hall – Teaneck
Building
Mon
Tue
Wed
Thur
Fri
Sat
Sun
University Hall
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 11PM
8AM- 5PM
10AM- 6PM
2PM- 10PM
Rooms:
Front Lab (UH 22)
Back Lab (UH 28)
UH Side Lab
Phone:
(201)-692-7112
close
Student Union Building – Teaneck
Rooms:
Multipurpose Room 135
Phone:
(201)-692-2222
Tip
The Student Union Building Multipurpose Room will be locked at all times. To gain access to the Student Union Building computer lab, you will need to contact Public Safety at (201)-692-2222.
close
Note
Computer Lab hours of operation are subject to change based on utilization throughout the semester. Lab computers are available on a first-come-first-serve basis unless reserved for classes. Class reservations are posted at the lab entrances.
This article is intended for students, staff, and faculty who wish to connect their non-PC, IoT, gaming, or streaming devices to the FDU-Wireless network. Devices that require registration include gaming consoles (such as Xbox, PlayStation, Switch) and streaming devices (like Amazon Fire Stick, Apple TV, and Roku).
Note
FDU-Wireless is only for non-PC, IoT, gaming, or streaming devices that do not support WPA2 Enterprise authentication or features a web browser.
Registering a Non-PC Device for use on FDU-Wireless Network
Use the link and directions below to register and manage wireless network access for your non-PC devices.
Sign in into FDU MyDevices portal using the link below using your FDU NetID. Make sure to check “I agree to the terms and conditions” button before clicking “Sign On“
Enter your device type and your device’s MAC Address into the corresponding text boxes. An optional description may be entered for your device as well. Your device’s MAC Address must be entered to register the device and continue. Refer to your devices manufacture for instructions on how to obtain the devices MAC Address. When finished, select “Submit“
Tip
Some devices have their MAC Address labeled alongside it’s Serial number.
Your device should now be listed on MyDevices Portal and allowed to connect to the FDU-Wireless network. It may be necessary to select the FDU-Wireless network on your device or restart your device before successfully connecting to the wireless network
Note
Once your device is added, the status will always remain as Pending. However you will be able to connect the device to FDU-Wireless regardless of this status.
FDU-Secure uses current encryption standards to connect to the FDU network via secure wireless traffic. As a result, FDU-Secure is the preferred method of accessing the on-campus Wireless network if you are Faculty, Student, or Staff member. To connect to the FDU-Secure Wireless Network, you will need an FDU NETID (username@fdu.edu or username@student.fdu.edu).
Below are the necessary steps to connect to the FDU-Secure Wireless Network, specified for various device types:
Windows
Select the “Internet Symbol” located at the right-hand side of the “task bar”
Select “FDU-Secure” from the pop-up menu
Enter “FDU Net ID and Password” and press “OK”
When prompted with “Continue connecting?” press “Connect”
close
macOS
Select the “Wi-Fi Symbol” located at the right-hand side of the “menu bar”
Select “FDU-Secure” from the drop-down menu
Enter “FDU Net ID and Password” and press “OK”
When prompted with “Verify Certificate” press “Continue”
close
iOS
Select the “Wi-Fi” tab located in the “Settings” app
Select “FDU-Secure” from the list of available networks
Enter “FDU Net ID and Password” and press “Join”
When prompted with “Certificate” press “Trust”
close
Android
Select the “Connections” tab located in the “Settings” app
Press “Wi-Fi”
Select “FDU-Secure” from the list of available networks
Enter “FDU Net ID and Password”
Press “CA certificate” then press “Use System Certificates” drop the drop down menu
Input “fdu.edu” in the domain field and press “Connect”
The following guides provide an overview of connecting to Fairleigh Dickinson University’s wireless network. Whether you’re a guest, staff, or student, using FDU-owned or personal devices, these articles provide essential steps for secure and efficient connectivity across various equipment, including non-PC and mobile devices.
Connect to FDU-Secure Wi-Fi
Follow these steps to connect to the FDU-Secure wireless network, which adheres to the latest encryption standards.
Fairleigh Dickinson University vigorously enforces United States copyright law. When utilizing the FDU Local Area Network or FDU provided Internet Access, you are required to adhere to all existing US copyright laws.
Whether you’re working at home or the office, OneDrive makes it easy to create new documents and share your files. You can even collaborate with others on a document.
In the following external article, you’ll learn how to create documents and folders. It will go over how to share your files with different groups of people, as well as the various collaboration tools available in Office 365.
Generative Artificial Intelligence (GenAI) is a technology capable of generating new text, images, video, and other data by analyzing and modeling existing datasets. This policy ensures that all members of the FDU Community understand that entering information into publicly available GenAI applications may contribute that data to the application’s training models, potentially making it accessible beyond the university and exposing confidential information.
Additionally, this policy defines the responsible use and data security requirements for GenAI by University faculty, staff, and students. These requirements supplement existing data security policies established by OIRT. Accordingly, diligence must be maintained to protect the confidentiality, integrity, and availability of Administrative Data and Education Records that may be accessed, processed, or generated through GenAI applications.
Confidential, Restricted, or Official Use Only Information must not be entered into any publicly available or commercial GenAI application unless an approved agreement is in place with the Chief Information Security Officer (CISO) or the Chief Information Officer (CIO). This agreement must include appropriate data security requirements in compliance with university policies.
WISP protect information shall not be entered into any private GenAI application without prior approval from the Chief Information Security Officer (CISO) or the Chief Information Officer (CIO). Additionally, if the application is not owned and administered by Fairleigh Dickinson University, an approved use agreement must be executed with the application provider and must include appropriate data security requirements in compliance with university policies.
Each GenAI application handling Confidential, Restricted, or Official Use Only Information must have an Acceptable Use Policy (AUP) defining its terms of use, data collection policies, and user responsibilities. Faculty may include the AUP in course syllabi if GenAI is permitted for use in the course.
Output from a GenAI application must be reviewed by the submitter of the request for confidentiality, integrity, accuracy, fairness, regulatory compliance, and academic attribution with unintended bias before publication or ingestion into another University system in accordance with current FDU Information Security policies located on IT.FDU.EDU.
Confidential, Restricted, or Official Use Only Information must not be retained within GenAI systems after processing, particularly in products and services not hosted by FDU. If the GenAI system allows data deletion, the data must be securely removed once processing is complete unless retention is legally or regulatory required. If deletion is not feasible due to system limitations, alternative measures must be implemented to ensure data confidentiality, such as anonymization or eliminating sensitive data before inputting it into the system.
A disclaimer must clearly indicate when GenAI is used to generate data or influence decision-making. This ensures transparency regarding the nature and origin of the information provided.
In the event of a suspected or confirmed data security incident involving a GenAI system, users must immediately report the incident to the Data Security Incident Response Team (DSIRT) by contacting the Fairleigh Dickinson University Technical Assistance Center (UTAC) at (973)-443-8822. The UTAC is available 24×7.
Appendix I
Key AI Definitions
Submitter—End user (student, faculty member, staff) inputting a query or prompt into an AI tool or product
Generate— the process of creating new content such as text, images, audio, video, or other forms of data based on patterns and information learned from existing datasets
Generator–A system, tool, or mechanism that creates new content
Ingestion— the process of inputting, integrating, and processing data into a system
Appendix II
DATA SECURITY INCIDENT RESPONSE TEAM (ROLES AND RESPONSIBILITIES)
The Data Security Incident Response Team membership includes the Chief Operating Officer, the Chief Information Officer, the Chief Information Security Officer, the Chief Academic Officer, the University General Counsel and the University Risk Manager. Each member of the Data Security Incident Response Team (DSIRT) has responsibilities related to the security of all the organization’s sensitive information. The DSIRT members listed below have specific responsibilities regarding the reporting and handling of data security incidents. Note that one person may serve in multiple roles.
Senior Vice President and Chief Financial Officer: Frank Barra Office: 201-692-2237; Email: fbarra@fdu.edu
Chief Information Officer (CIO): Neal Sturm Office: 201-692-8689; Email: sturm@fdu.edu
Chief Information Security Officer (CISO): Kimberley Dawn Dunkerley Office: 201-692-7672; Email: ddunkerley@fdu.edu
Privacy Officer: Kimberley Dawn Dunkerley Office: 201-692-7672; Email: ddunkerley@fdu.edu
Senior Vice President and University Provost: Benjamin Rifkin Office: 201-692-7093; Email: brifkin@fdu.edu
Office of the General Counsel: Steve Nelson Office: 201-692-2466; Email: snelson@fdu.edu
University Risk Manager: Gail Lemaire Office: 201-692-7083; Email: lemaire@fdu.edu
Vancouver Campus Executive: Wilfred Zebre Office: 604-648-4462; Email: wilfred_zerbe@fdu.edu
Associate Vice President for MIS: Saul Kleinman Office: 201-692-2065; Email: saul@fdu.edu
Click on the three dots and select Settings.Select Advanced to show the advanced settings. Select Content settings.Select Cookies.Click the garbage can icon to delete the cookies.
Click on the three lines and select OptionsSelect the Privacy & Security tab and click Manage Data found under Cookies and Site Data.Select fdu.edu and select Remove Selected, select Save Changes when finished.
Click on the Settings “Gear” located on the top right of the browser, select Internet OptionsDelete in the Browser History sectionUncheck all boxes listed, except Cookies and website data, click Delete when finished
This guide is designed to assist you in mastering both the classic and updated versions of the DUO Device Management Portal. It simplifies the process of modifying existing devices and integrating new ones into your multi-factor authentication setup.
Legacy DUO Device Management Portal
Accessing the legacy DUO Management Portal
In a Desktop or Laptop browser visit the “DUO Management Portal“. You will be prompted to authenticate through SSO and complete the Multi-factor Authentication process
After authenticating you’ll see the DUO Management Portal. This is where you can enroll new devices, reactivate, edit, or delete your existing devices
close
Default Authentication Options
If you authenticate with more than one device, you can specify which you would like to be the default.
Click the “Default Device” drop-down menu and pick your default device for authentication. Click “Save” if you’re done making changes
You can choose which authentication method you prefer to use when logging in by clicking on the “When I log in” drop-down menu
Ask me to choose an authentication method: it will prompt you to select an option every time you log in
Automatically send this device a DUO Push: it will automatically send a DUO Push to your default device
close
Reactivate Duo Mobile
Click on “Reactivate DUO Mobile” if you need to get DUO Push working on your phone, for example, if you replaced your phone with a new model but kept the same phone number.
After answering some questions about your device, you’ll receive a new QR code to scan with your phone, which will complete the DUO Mobile activation process
close
Change Device Name
Click on “Change Device Name” to open up an interface to change the display name of your phone
Type in the new name and click “Save“
close
Remove Device
Click the “trash” icon button to delete a device
Confirm that you want to remove the device by clicking on “Remove“. The device will be deleted. It will no longer be able to approve DUO authentication requests.
Note
You may not remove your last device. If you wish to remove it, first add another, then delete the original. If you are unable to delete a device, contact your administrator to have it removed.
close
Add New Device
To add a new authentication device, click “Add another device” link on the right side of the DUO Prompt. You’ll be taken to the new device enrollment prompt
You can use the DUO Quick Start Guide for instructions on how to enroll a new device
Accessing Updated Device Management in the DUO Universal Prompt
You can add additional verification methods, manage your existing devices, or reactivate DUO Mobile for DUO Push from the DUO Universal Prompt.
When logging in to an application with the Universal Prompt Click the “Other Options” link on the authentication page to view your list of available methods
Click on “Manage devices” at the end of the list to enter the device management portal
You will be prompted to verify your identity by completing the DUO Multifactor Authentication process. Select your preferred authentication method from the listed options to continue
After approving a DUO authentication request you can see the Device Management Portal with all your registered devices.
close
Add New Device
To add a new method of verifying your identity in DUO, click “Add a device” and follow the enrollment process described in the DUO Quick Start Guide, starting on Step 3.
The difference between adding a new device from the Device Management Portal and during first-time enrollment is that when you have finished enrolling the new device you return to the Device Management Portal to view all your registered devices, including the new one, instead of continuing to log into an application.
close
Rename or Remove a Device
Click the “Edit” button on the device you would like to rename or remove to view the drop down menu
Then click either “Rename” or “Delete“
When renaming a device, type the new name for your device, then click on “Rename” to save your changes
When Deleting a device, confirm your selection to delete
close
Reactivate DUO Mobile for an Existing Device
If you have replaced the phone you activated for DUO Push, you can reactivate DUO Push if you have the same phone number.
Click on “I have a new phone” for the device you want to reactivate
Click “Get Started” to continue
Click on “Send me a passcode” or “Call my phone” then proceed to follow the instructions prompted to complete the reactivation process
close
Reactivate DUO Mobile outside of the Device Management Portal
Let the DUO Push authentication time out
Click on the “I got a new phone” link shown in the Universal Prompt
If you still use the same phone number as you did when you first set up the phone to use DUO Push, then click or tap the “Text me a link” button
When the text message with the link arrives on your phone, tap it to automatically reactivate DUO Mobile on your phone to use DUO Push again. If you don’t have DUO Mobile installed be sure to install it before you try to open the activation link in the text message.
If you are using a different phone number than the one you first set up, then press on “I got a new number“
Press “Continue” to proceed to the DUO Device Management Portal, where you can complete the steps to “Adding a New Device“and set up DUO Push on the new phone
Note
You will need to verify your identity with a different DUO verification method, so if you don’t have one available you will need to contact the Fairleigh Dickinson University Technical Assistance Center for help.
Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got to add another layer of security to our accounts.
DUO Push – if you have the DUO Mobile App installed on your smartphone or tablet, you can receive a push notification. From the app, you can approve or deny the login attempt.
Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you a one-time code, click Enter Passcode, then click on the blue button “Text me new codes.” These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
Phone Call (Faculty/Staff Only) – you can receive a phone call on your mobile phone or landline phone. The call will give instructions on approving or denying the login attempt.
If you opt-out of the DUO Mobile Application push notifications, there are a variety of passcode options to utilize as your second verification method.
Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
Passcodes via SMS(Faculty/Staff Only) – users can receive a one-time use code via text message. To get you one-time code click Enter Passcode, then click on the blue button “Text me new codes.”These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
Selecting this option will allow you to bypass DUO authentication for the next 60 days. This only works if cookies are enabled, and you are logging in from the same computer and browser. You will still be prompted to verify once – with your username and password. You will not be able to access your settings on that particular browser during the 60 days. Please note that if you have tools or policies running that regularly delete or clean cookies, the remember me feature will not work. If you do need to access your settings (perhaps to add another device), just try another browser or visit the FDU Self-Service Portal. Remember me will not work if your browser is set to private browsing mode.
The remember me feature relies on browser cookies. For remember me to work, your Internet browser must allow cookies to be stored. Visit your browser content settings to ensure cookies are being stored. Some departments on campus do not allow cookies to be stored. If the remember me feature does not work on your browser, check with desktop support in your area.
If you do not have your device with you, you can obtain a batch of temporary passcodes. To obtain a temporary passcode, call the Fairleigh Dickinson University Technical Assistance Center (UTAC). Each of the passcodes can only be used once and will expire in 7 days.
Yes, the passcode option on the DUO app does not require WiFi or cellular connectivity, it even works on airplane mode. To use this option, visit the DUO app on your smartphone, and tap the key icon to obtain a passcode. Enter the passcode into the DUO prompt when logging into any website that requires DUO authentication.
DUO Authentication is required by any application the utilizes the university Single Sign-On (SSO) service. Examples of some websites that require DUO authentication are listed below.
You may have trouble receiving push requests if there are network issues between your phone and Duo’s service. Many phones have difficulty determining whether to use the Wi-Fi or cellular data channel when checking for push requests and simply turning the phone to airplane mode and back to normal operating mode again often resolves these types of issues, if there is a reliable internet connection available. Similarly, the issue may be resolved by turning off the Wi-Fi connection on your device and using the cellular data connection.
Check the time and date on your phone and make sure they are correct. If the date and time on your phone are manually set, try changing your device’s configuration to sync date and time automatically with the network.
iOS users can run a troubleshooting tool from within Duo Mobile version 3.32.0 or later. To run the tool:
Open the Duo Mobile app on your iOS device and tap the Edit button in the top left of the accounts list screen, then tap the name of the account for you aren’t receiving push requests.
Next, tap the Get Started button in the “Missing Notifications?” section of the “Account Details” screen.
Duo Mobile performs the test. If any step fails, you’ll receive further troubleshooting suggestions. After taking the suggested actions, press “Run test again” to retry.
The steps that Push Troubleshooting performs automatically are as follows:
Check device settings.
Check internet connectivity.
Check that the device can contact Duo’s cloud service.
Attempts to send a test Duo Push notification.
Should none of these actions help, see the Duo Knowledge Base for additional iOS and Android troubleshooting steps.
If you can’t get Duo Push working on your own, you can log in with a passcode generated by the Duo Mobile app and send a new activation link to your phone.
NOTE: Google Play Services are required to receive push notifications on Android. Users without Google Play Services installed will have to “fetch” by swiping down in the DUO Mobile app.
If your phone number has not changed, login to FDU Self-Service Portal then choose the “Call my Phone” option.
Choose your device from the list, and then click “Device Options” next to your phone.
Next click the “Reactivate Duo Mobile” button (you will need to install the Duo app on your phone to proceed). Then follow the instructions to activate DUO Mobile on your new device.
If you have a new phone number, you will first need to obtain a temporary passcode (see the ‘What are Passcodes?’ section above).
Yes, you can add devices by visiting your DUO settings. When you see the DUO prompt with the three notification options, click “Settings” at the top right.
NOTE: If you are using the Remember Me for 60 days feature, you will need to visit FDU Self-Service Portalaccess your settings.)
After you click Settings, click “Add a New Device“. You can register smartphones, cell phones, tablets, and landline phones.
The DUO smartphone application serves only to provide two-factor authentication. It does not access any personal information on your device, nor does it track your location. Learn more about DUO’s commitment to privacy on its website.
A “bypass code” is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally, used as “backup codes,” so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily cannot use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.
A user must have a valid Duo authentication device enrolled (like a phone or iPad) to use a bypass code to authenticate. Bypass codes are not intended as a user’s only 2FA method.
Bypass codes expire after being used the allowed number of times, or after an administrator-defined amount of time. Once a bypass code is created, the timeout and allowed uses cannot be extended.
If you need a Bypass code please visit SAMI Support, where you can request additional information from UTAC or search our extensive IT knowledge base. While SAMI Support provides the quickest and easiest access for IT support, you can always contact UTAC by phone at (973) 443-8822 or email at fdutac@fdu.edu.
DUO two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students. Please follow the steps below.
Install DUO Mobile App
The DUO app is available for Android, iOS and iPadOS. Use the links below to install DUO on your mobile device.
In a Desktop or Laptop browser visit the DUO Management Portal to begin the activation process by enrolling your device. Activation requires scanning a QR code with the DUO app’s built-in scanner
Supported Browsers: Chrome, Firefox, Safari, Edge, Opera, and Internet Explorer 8 or later. Some browsers do not support all of DUO’s authentication devices (for example, Security Keys won’t work with Internet Explorer). For the widest compatibility with DUO’s authentication methods, we recommend recent versions of Chrome and Firefox.
Click “Start setup” to begin enrolling your device
Select the type of device you’d like to enroll and click “Continue“. We recommend using a smartphone for the best experience, but you can also enroll iOS/Android tablets
Select your country from the drop-down list and type your phone number. Use the number of your smartphone or cell phone that you installed the DUO Mobile Security App on in the Step 1
Double-check that you entered it correctly, check the box, and click “Continue“
Note
If you’re enrolling a tablet you aren’t prompted to enter a phone number.
Choose your device’s operating system and click “Continue“.
Click “I have DUO Mobile installed”
If you have not completed installing the DUO Mobile App in Step 1 please complete now by following the platform-specific instructions on the screen. After installing the app return to the enrollment window
Activating the app links it to your account so you can use it for authentication
On iPhone, Android, and Windows Phone activate DUO Mobile by scanning the barcode with the app’s built-in barcode scanner. Follow the platform specific instructions for your device:
The “Continue” button is clickable after you scan the barcode successfully
Can’t scan the barcode? Click “Or, have an activation link emailed to you instead” and follow the instructions
Once activated click “Continue” to complete registration
close
Configure Device Options (Optional)
You can use Device Options to give your phone a more descriptive name, or you can click “Add another device” to start the enrollment process again and add a second phone or another authenticator
If this is the device you’ll use most often with DUO then you may want to enable automatic push requests by changing the “When I log in:” option and changing the setting from “Ask me to choose an authentication method” to “Automatically send this device a DUO Push” and click “Save“. With one of the automatic options enabled DUO automatically sends an authentication request via push notification to the DUO Mobile app on your smartphone.
Your device is ready to approve DUO push authentication requests. Click “Send me a Push” to give it a try. All you need to do is tap “Approve” on the DUO login request received at your phone
With DUO activated on your account, and with your device enrolled, you are ready to use DUO. When logging in, you will have two authentication options. Review the options below to determine what works best for you.
Tip
We recommend the push notification to your smartphone, it’s the easiest. You can also check the box “Remember Me for 60 Days” to only perform the authentication once every two months on that device.
close
Authentication Options
There are two ways you can use DUO:
Push Notification
Once the DUO mobile app is installed, you can select to receive a DUO notification on your smartphone. Open the notification, and you’ll see a green checkmark, and a red X. Simply tap the “GreenCheckmark” to gain access.
Passcodes
You can use the DUO mobile app to generate passcodes. This option does not require wifi or data, so this is a great option if you’re traveling or if you have limited or no cell/internet service. Open your DUO mobile app, tap the FDU logo and it will reveal a passcode. During login, choose the enter a passcode option, enter the code and you’re in.
How Do I Change Settings or Enroll Another Device?
To change settings or enroll another device, visit DUO Management Portal or any DUO-supported application. When you get to the DUO prompt, click the “Settings” button and choose to add a new device or access your settings.
The “remember me” option is displayed by Duo when you sign in with FDU NetID on the web. After providing your second factor for authentication, Duo will present you with a prompt asking if you would like to have this device remembered for future logins. Selecting “Yes, this is my device” sets the “remember me” status for Duo.
Use the “remember me” option to reduce how often you have to sign in with two-factor authentication (2FA) on the same web browser. It’s safe to use on trusted computers and lasts for 30 days.
Refer to our Duo Quick Start Guide below for instructions on using the “remember me” option within the context of the overall sign-in experience.
The “remember me” option is safe to use on computers and devices that you can trust to protect your browser. Examples include managed workstations at work, lab computers that require you to sign in, and personal computers, laptops, tablets, and mobile devices that protect your browser from use by others.
Do not use “remember me” on public or shared computers
The “remember me” option shouldn’t be used on computers and devices that don’t protect your browser, such as public or shared computers, and computers you don’t sign in to and cannot lock to protect your browser.
FAQ
What is the “remember me” option?
The “remember me” option is a feature of Duo that tells your browser to remember that you have confirmed your identity using your 2FA device. If you confirm that “Yes, this is my device” when authenticating with Duo, you won’t have to use your 2FA device as often on that browser. For example, if you use it on your computer at work, it reduces how often you have to sign in with 2FA at work; but your laptop at home will still ask you to sign in with 2FA.
Why would I want to use it?
The “remember me” option saves you time and reduces distraction by reducing how often you have to use your 2FA device. If you routinely use the Duo callback method, it also saves the FDU money in telephony costs.
Is “Remember Me” safe? Doesn’t it defeat the purpose of 2FA?
The “remember me” option is safe to use on computers and devices that you can trust to protect your browser. It doesn’t defeat the purpose of 2FA because the convenience it provides is limited to each computer and browser that you choose to use it on. If you or anyone else tries to sign in with your FDU NetID on a different computer or browser, 2FA will be required.
How long does it last?
The “remember me” option lasts 30 days. It saves a secure cookie on your browser to track the time until you need to use your 2FA device again. If your browser clears cookies this will remove “remember me” until you re-select it.
Why is the “remember me” duration 30 days?
30 days is the current “remember me” duration because it is often enough to remind you that 2FA is turned on, but not so often to be annoying. While some institutions use shorter or longer durations, 30 days is a common duration at peer institutions.
How do I clear it on my current browser?
If the “remember me” option is enabled on the browser you’re using right now, clear your cookies for duosecurity.com. To clear it on other browsers, repeat this process on each of them.
How do I reset it on a browser I no longer control?
If you enabled the “remember me” option on a browser you no longer control, Please open a support ticket by clicking Support at the top of the page, or visiting samisupport.fdu.edu.
Note
When FDU IT resets your “remember me”, it will clear it on all your browsers, including those you no longer control. Once it has been reset, you can enable it again on your current browser(s).
close
Troubleshooting
I’m using the “remember me” option, and I still have to use my 2FA device more often than every 30 days. Why is that?
Some system owners require you to reauthenticate with 2FA every time you access their systems for security, regardless of using the “remember me” option (workday for example). This can increase how often you have to sign in with 2FA. If you find you are regularly asked for 2FA on some sites despite the “remember me” option, but not other websites this is likely the cause. Other contributing factors include how many different computers you use, how many different browsers you use on these computers, whether or not you use the “remember me” option on all of them, how your browsers are configured to use cookies, and how often you clear your browser cookies.
Why do some system owners override the “remember me” option and reauthenticate me every time I sign in?
System owners decide to reauthenticate you based on what institutional and personal data they need to protect, and what threats and risks they need to guard against. Some of them reauthenticate you because they are concerned about unauthorized access from unattended browser sessions, and forcing you to reauthenticate is one way to re-establish that it’s you.
Why isn’t the “remember me” option working for me? Are there things that prevent it from working correctly?
The “remember me” option requires the use of browser cookies, so it may not work as expected in these circumstances:
You are accessing a site that overrides the “remember me” option
After June 30, 2023, Transport Layer Security (TLS) 1.0 and 1.1 connection requests to Duo will not receive a response, resulting in blocked multi-factor authentication.
Who will be affected?
This may affect FDU community users using Windows 7, Windows 8.1, Android Devices with Android OS version 9 or lower, and Apple devices with iOS versions that don’t support TLS 1.2.
Check if you are using the supported endpoints by reading the information below:
Windows
Supported Windows operating system (OS) versions will support TLS 1.2 by default. If you are running a supported Windows OS, no action is required.
If your operating system was manually changed to disable TLS 1.2 for some reason, connection requests will fail. Verify your system is properly configured for TLS 1.2 with the suggested steps below.
Verifying TLS 1.2 on your Operating System
Check OS Version
Open the Windows Search box and type “About your PC” and click on “Open“
Under Windows Specifications, check which edition and version of Windows your device is running
Enabling TLS 1.2 on your Operating System
If your operating system was manually changed to disable TLS 1.2 for some reason, you can verify or configure your system for TLS 1.2.
Before making any changes, create a backup of the registry:
In the Windows Registry Editor, locate and click the “Protocols registry key” or “subkey“ that needs to be backed up
Click “File”, then “Export”
In the Export Registry File dialog box, select the filename and location of where to save the backup
Click “Save”
After creating a backup of the registry, follow the steps below to enable TLS 1.2 on your system:
Click the Start menu, type “regedit” and press the Enter key. The Registry Editor window should be opened.
Navigate to follow the registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
Check if the subkey of TLS v1.2 is enabled for both the server and the client. Each protocol’s state is controlled by two keys: Enabled and DisabledByDefault
Make sure the Enabled value is 1 and the DisabledByDefault value is 0 or missing, the protocol is enabled.
If the Enabled value is 1 but the DisabledByDefault value is 1, the protocol is disabled by default – it will not be used unless another host explicitly requests it during negotiation.
If the Enabled value is 0, the protocol is disabled
Restart the system to ensure the new settings take effect
close
DUO Mobile
Supported Duo Mobile applications running on supported OS versions will support TLS 1.2+ by default. If you are running a supported Duo Mobile application on a supported OS, no action is required.
Supported Android OS versions: Android 10.0 and greater
Supported iOS versions: iOS 14.0 and greater
Note
Using a mobile device with unsupported versions can still receive DUO push or generate one-time passcode as before, but it will prevent you from logging in to any systems that are accessed through our FDU Single Sign On Login Page.
Web Browsers
Common web browsers like Google Chrome, Microsoft Edge, Mozilla Firefox, Opera, etc. with their latest version are supporting TLS 1.2.
Note
If your browser was manually changed to disable TLS 1.2 for some reason, connection requests will fail. Please verify your browser is properly configured for TLS 1.2 with the suggested steps below.
Check TLS Support on a Web Browser
Chrome and Microsoft Edge
In the Windows menu search box, type “Internet Options”
In the Internet Properties window, on the Advanced tab, scroll down to the Security section
Make sure the “User TLS 1.2” checkbox is checked
Click “OK” and restart the browser
Mozilla Firefox
Open the Mozilla Firefox Browser
In the address bar, type “about:config” and press “Enter“
In the Search Field type “tls”. Find and double-click the entry for “security.tls. version. min”
Make sure the integer value is 3 to force a minimum protocol of TLS 1.2
Click “OK” and restart the browser
close
We understand that upgrading your device is not always an option. In these instances, you can still use Duo Passcodes to perform multi-factor authentication.
To use this method, select “Enter a passcode” upon receiving your browser’s Duo security prompt
Next, open the Duo app and click “Show”. This will provide a six-digit passcode which you can enter into the browser prompt
Enter the six-digit passcode from the DUO app and click “Log in”
COLLEAGUE uses single sign-on protocol for users to login. The login or user ID consists of the first part of the FDU NetID up until the @ sign in the NetID.
For instance, if your NetID webmail address is john.q.public@fdu.edu your COLLEAGUE login ID would be “john.q.public“
The password would be the exact same one that you use with your FDU NetID.
Revised: April 2, 2019 Last Revised: June 1, 2017 Prior Revision: August 1, 2016
I. POLICY STATEMENT
FDU has implemented the FDU Alert system to expand and enhance its emergency notification methods. In the event of an emergency, FDU Alert may be used to provide pertinent information and instructions to FDU students, faculty and staff through voice, text messaging and/or E-mail. FDU Alert uses the a mass notification system that sends emergency messages instantly and simultaneously to registered mobile phones, wireless devices and E-mail addresses.
Reason For Policy
This policy establishes the proper use and testing of the FDU Alert Emergency Notification System (FDU Alert).
Who Should Read This Policy
Members of the University Community including Students, Faculty, Staff, as well as all other individuals who have been registered to receive FDU Alert emergency notifications.
Website Address For This Policy
The website for this policy as well as other related FDU Alert information can be found at the following URL or by clicking on Web Shortcuts on the top right of the FDU Homepage.
These definitions apply to these terms as they are used in this policy.
Emergency
A sudden unforeseen crisis, usually involving danger, which requires immediate action.
FDU Alert System
The University’s emergency notification system is designed to alert, warn and inform registered members of the University Community of what to do in case of an emergency, a disaster, a crisis or any other situation that affects the FDU community. For example, receiving these alerts and messages could keep you from driving to campus only to find that a power failure has closed the campus.
FDU Alert Authorizer
Individual who has the authority to assess an emergency and activate the FDU Alert Emergency Notification System; this individual is authorized to contact an authorized Sender.
FDU Alert Sender
Individual who has been trained and is authorized to facilitate the actual sending of an Emergency Notification message.
Crisis
An unstable event or situation of extreme danger or difficulty, which is often sudden or unexpected, that disrupts the normal operations of the institution or its educational mission and threatens the well-being of personnel, property, financial resources and/or the reputation of the institution.
Timely Warning
Refers to the need to provide timely notification to the University Community after it is determined there is a credible threat to campus persons or property or when information is considered vital to the University community.
SMS
Refers to the Text Messaging method of FDU Alert delivery.
FDU Alert Spokesperson
An individual may be identified to respond to, and act as University spokesperson, to inquiries by students, faculty, staff, parents and others about an FDU Alert. Inquiries may be forwarded to the FDU Alert Spokesperson via the special call forwarding alert hotline.
III. OVERVIEW
Any time that an emergency situation arises, either on campus or in the immediate area of the campus, that in the judgment of an FDU Alert Authorizer poses an ongoing or continuing threat to the campus community, a campus “Timely Warning” will be issued. This warning may be issued through the FDU Alert system by one, all, or a combination of the following delivery methods.
Voice mail or telephone notification
E-mail
Posted on the University website
Posted notices
Public address announcements
Direct contact with individuals
Whenever possible, the FDU Alert Authorizer will consult with the Campus Director of Public Safety, the Campus Executive, or another Authorizer prior to using FDU Alert messaging capabilities.
In an emergency, and upon activation by Authorizers and Senders, FDU Alert will send notifications to registered individuals at one, some, or all of the following registered points of delivery.
Work Phone
FDU E-mail
Cell Phone
SMS (Text Message)
Alternate E-mail
Home Phone
Parent/Significant Other E-mail
Parent/Significant Other Phone
Parent/Significant Other SMS (Text Message)
Parent/Significant Other Cell Phone
To provide the safest possible environment for students, faculty, staff, and visitors to FDU campuses, the University will strive to provide timely, reliable notifications by all possible means in the event of emergency. Generally, an emergency is any incident that involves the possibility of death, serious injury, or the threat of death or serious injury to people, or to University facilities, materials or property.
Fairleigh Dickinson University uses a variety of methods to provide emergency and safety information, including mass notification systems, web pages, door-to-door assistance from on-site staff and Residence Hall assistants, over-the-air broadcasts, and a consolidated communications system. Collectively, these capabilities are called “FDU-Alert”. (1)
The communication system permits broadcast messages to be sent quickly as voice calls to office, local home, or cell phones, and as text messages to cell phones or University and external E-mail accounts. This system will be used to announce and provide guidance in an emergency or crisis and to communicate relevant critical updates.
If an emergency occurs near but not on an FDU campus, and in other situations in which emergency responders determine and report that no apparent or imminent threat to that campus exists, an advisory may be posted on informational web sites, E-mails, or text messages only. In these cases, you may not receive an emergency notification directly to your phone.
University administration or individual campuses may, as an authorizer deems appropriate, use the communications system for other urgent messages related to administration or operation, such as campus closings due to adverse weather, unusual situations, or utility outages.
(1) More information about these services, as well as current emergency status or preparedness information for FDU, is planned for availability on the University’s emergency preparedness website once established.
IIII. POLICY
Proper Use of FDU Alert
FDU Alert is offered not to replace but to augment existing emergency notification methods, which include: University-wide broadcast E-mails, online updates via web and coordinated use of public media outlets, fire alarms, public address systems, and signs.
Any time that a serious situation arises either on campus or in the immediate area of the campus that in the judgment of the campus Director of Public Safety, and whenever possible, in consultation with the Campus Executive poses an ongoing or continuing threat to the campus community, a campus “Timely Warning” will be issued. This warning may be issued through the FDU Alert system, voice mail or telephone notification, E-mail, posted on the University website, posted notices, public address announcements, and direct contact with individuals.
If, in the opinion of the local law enforcement authority, a message would hinder the police response or investigation and the local law enforcement authority has requested that we not send out a message, no message may be sent without the specific authorization of the President, University Provost, Sr. V.P. for Finance & Administration, or FDU legal counsel.
Limited Use of FDU Alert
Although the use of other emergency notification method(s) will be determined on a case-by-case basis, FDU Alert should only be used in the following situations:
(1) an imminent threat of physical danger to the campus community;
(2) a campus closure; and
(3) certain Campus Crime Alerts as determined by Public Safety;
(4) off-campus events that could impact health, safety, life or access to a campus.
The above situations can include but are not limited to ongoing criminal incidents, fires, chemical leaks, pandemics, campus-wide utility failures (such as gas, electrical, or water), and extreme weather conditions that result in a campus closure (e.g. snow/ice storms) or pose an imminent threat of physical danger to the campus community (e.g. tornado within close proximity to campus).
FDU Alert Authorizers
Only the people in the following positions have the authority to activate the FDU Alert emergency message system and author an appropriate message:
President of the University
University Provost & Senior Vice President for Academic Affairs
Senior Vice President for Finance & Administration
Campus Executives
Deputy Campus Executive, Metropolitan Campus
Associate Vice President for Communications
Executive Director of Communications and News
Director of Public Safety, Florham Campus
Assistant Director, Public Safety, Florham Campus
Director of Public Safety, Metropolitan Campus
Campus Investigator, Public Safety, Metropolitan Campus
Campus Executive, Vancouver Campus
Business Manager, Vancouver Campus
FDU Alert Authorizers (“Authorizers”) have the authority to activate the system without consulting other Authorizers; however, when circumstances permit, an Authorizer should consult with at least one other Authorizer before sending a message.
FDU Alert Authorizer Responsibilities
Responsibility of Creating FDU Alert Messages
Authorizers have the responsibility to write and disseminate the appropriate message to be sent by Sender. For consistency, simplicity, and to minimize confusion, whenever possible, the Authorizer should base the message on one of the sample alert messages included in the Standard Operating Procedures manual.
This responsibility carries forward to writing and disseminating subsequent messages that must be sent to keep the recipients apprised of the status of the emergency event through to the conclusion of the emergency event with the transmission of an “All Clear-Resume Normal Schedule” message.
In the event more than thirty (30) minutes has passed while an emergency event is in progress, and there is no new information to communicate, the Authorizer should write a message(s) stating that the status of the emergency event remains the same, e.g., “Investigation continues, will communicate updates as new information becomes available.”
Messages should be written to support text to speech. Minimum or preferably no use of abbreviations and acronyms should be used. All messages must include an appropriate lead-in, for example, “!!FDU Florham Emergency Alert!!,” which includes where appropriate, the campus affected. Examples of these lead-in statements are included with the sample messages in the FDU Alert Confidential Operations Manual.
Responsibility of Authorizer to Prepare Additional Information
Alert Notifications and Updates Published via the FDU Website
Text Messaging (SMS) capability has a message character limit that precludes long and detailed messages. Detailed messages and updates regarding the FDU Alert can be made available on the University Website. Should it be necessary or appropriate to post additional information on the FDU website, it is the responsibility of the Authorizer to work with the Associate Vice President for Communications & Marketing or designee, to prepare and post the information on the University website in a timely manner. As this information will have wide and general exposure, it is critical to ensure that the information is current, correct, adequate, and consistent with the University messaging strategy.
It is the responsibility of the Authorizer, or designee as assigned by the Authorizer and the Associate Vice President for Communications & Marketing or designee, to keep vigil over the messaging to ensure accuracy and timeliness and message removal upon event termination.
FDU Alert Voicemail Box (Answer Only Voicemail Box)
Two FDU Alert Voicemail Boxes (one for each primary New Jersey campus) are available in order to provide the community with detailed information via a pre-recorded announcement regarding the FDU Alert. Should it be necessary or appropriate to post an additional information announcement on the FDU Alert Voicemail Box, it is the responsibility of the Authorizer to work with the Associate Vice President for Communications & Marketing or designee, to prepare, record, and post the announcement in the FDU Alert Voicemail Box in a timely manner. Because this information will have wide and general exposure, it is critical to ensure that the information is current, correct, adequate, and consistent with the University messaging strategy.
Requests for information or updates regarding the FDU Alert should be directed to the affected campus FDU Alert Voicemail Box.
Metropolitan Campus: 201-692-7000
Florham Campus: 973-443-8000
No voice mails can be left on the FDU Alert Voicemail Box. It is answer only.
The default message in the FDU Alert Voicemail Boxes will be “All University Operations Are Normal”
General telephone inquiries to the switchboard regarding the FDU Alert should be transferred to the appropriate FDU Alert Voicemail Box. Caller expectations can be managed by using phraseology such as “The latest and most current information regarding the FDU Alert is available on the FDU Alert Voicemail Box. Please hold while I connect you to this important informational announcement” in advance of the transfer.
It is the responsibility of the Authorizer, or designee as assigned by the Authorizer and the Associate Vice President for Communications & Marketing, to keep vigil over the messaging to ensure accuracy and timeliness and message removal upon event termination.
FDU Alert Spokesperson to Other Inquiries
FDU Alerts will stimulate telephone inquiries to the switchboard, Residence Life, Public Safety, Enrollment Services & other key offices. Callers should be directed to the University mailbox for announcements and updates. In the unusual event where it is determined to be necessary to have a Spokesperson available for call handling, callers will be directed to a special hotline with ultra-call forwarding setup to transfer to the FDU Alert Spokesperson.
The FDU Alert Spokesperson is an individual identified by the FDU emergency response teams to respond to inquiries by students, faculty, staff, parents, and others about an FDU Alert. Inquiries will be forwarded via the special call forwarding alert hotline.
The following are attributes for The FDU Alert Spokesperson:
Must provide contact information (and back up) to the switchboard and emergency management teams
Must be available to take calls continuously throughout the emergency (2)
Must be aware of the event and current activities and commentable actions
Must be media aware
Must have the power to speak to the event with autonomy and authority
Emergency Event Status Reports on the FDU Website
The FDU Website Homepage provides an FDU Alert Icon under Web Shortcuts that links to a dedicated webpage containing information on the current status of the University’s operations. As referenced above in Section 4.3.1.3, in the event there is an emergency, the Authorizer will work with the Associate Vice President for Communications and Marketing or designee to prepare and post a message providing current information concerning the emergency event and the status of the University’s operations, which will be posted on the operations status page.
FDU Alert Senders
FDU Alert Senders (“Senders”), upon the request of Authorizer(s), have the authority to activate the system, enter messages under the direction of the FDU Alert Authorizer(s), and initiate the send message process. All FDU Alert Senders are provided with appropriate access to the secured FDU Alert emergency notification system and necessary training.
Sender names and contact information are included in the FDU Alert Operations Manual.
FDU Alert Sender Responsibilities
Senders are required to respond to Authorizer requests to facilitate the timely activation of the FDU Alert System. Senders acknowledge that time may be of the essence and will fulfill the request or immediately notify another Sender to fulfill the request. The transfer of such transfer of control requires Authorizer and/or emergency response team acknowledgment.
FDU Alert Senders will advise the FDU Alert Authorizer(s) when the message send process has been initiated and the sender can confirm delivery of such messaging.
(2) A special phone number with Remote Call Forwarding will be utilized for this purpose.
Message Content
Any message sent using FDU Alert should be as brief as possible and should, if appropriate, typically contain the following information:
The reason for the message;
Any response required;
Location (campus) of event;
The duration of the emergency and any relevant dates and times;
Methods to obtain further information; and
When circumstances permit, before sending a message, Authorized Senders should consult with the relevant University administrator(s) regarding message content.
Because text messages may have a single message size limitation depending on the recipient’s device, they should be limited to 160 characters. While brevity and abbreviations will reduce a message size, care must be taken to ensure that all messages are brief, concise, accurate, and understandable. Sample messages are included in the FDU Alert Confidential Operations Manual.
After Message Review
After a message is sent using FDU ALERT, the Authorized Senders and the Campus Emergency Management Team will meet as appropriate to discuss the emergency, the results of the alert, and compliance with the FDU Alert Policy.
FDU Alert System Testing
System Wide Delivery Testing
Once every Fall and Spring semester, a live test of the FDU Alert system will be conducted. During the test, one or more messages will be transmitted to every individual registered in the system using every delivery method for each point of contact (phone, e-mail, SMS, etc.) The FDU Alert message(s) sent during the test will clearly state “THIS IS A TEST,” so that it is clear that there is no actual emergency.
FDU Alert Senders
At least once per calendar month, FDU Alert senders will test the FDU Alert system by sending themselves a test message. The message sent during this test will clearly state “THIS IS A TEST BY AUTHORIZED SENDER,” so that it is clear that there is no actual emergency.
Service Provisioning
Regular Reminders to University Community to Register/Update FDU Alert Individual Database Record
The effectiveness of any alert system depends upon the accuracy of the contact information in its database. All students, faculty, and staff will therefore receive notices/reminders prior to the semester’s scheduled test to review/update their emergency contact information. Emergency contact information can be modified at any time by logging onto Webadvisor.
V. EMERGENCY LEVELS AND INSTITUTIONAL MESSAGING GOVERNANCE
The following are three levels of emergencies and suggested methods of communications and notifications for each. No other use of this FDU Alert System is permitted.
Level 1 Emergency – Informational
Circumstance:
incident has occurred
incident is contained and/or well defined
continuing activity/investigation
caution conditions exists
timely follow up communications required
Examples include:
natural disaster
aircraft crash, or similar event, near campus
major structural collapse
snow closings
elevator accident
must know information – (e.g. “Because of bad weather the University will close at…” and “An electrical cable to the SUB has been damaged and electrical power will not be restored until…”)
The “Authorizer” should use the following formats: E-mail/WWW/Text Messaging/Posted Notices/Public Address Announcements. Based on the event and any unusual circumstances, voice messaging may be used at the “Authorizer’s” discretion…
Level 2 Emergency – Life and Safety Alert
Circumstance:
incident has occurred and/or is continuing
incident is contained but may be extensive
cautions exist
continuing/on-going activity/investigation
timely follow up communications required
Examples include:
bomb threat
contained/small scale explosion/fire
act of violence on campus
fire confined to an area
contained/small hazardous material spill or release
buildings without electricity, heat or water
major building flooding
The “Authorizer” should use the following formats: E-mail/WWW/Text Messaging/Posted Notices/Public Address Announcements/Direct Contact with Individuals as necessary. During extended business hours (7 a.m. to 7 p.m.) voice messaging will also be used. The Authorizer will have the discretion to utilize voice messaging after extended business hours if it is deemed appropriate.
Level 3 Emergency – Imminent life or safety alert – Immediate Action Required
Circumstance:
incident has occurred and/or is continuing
scope of incident may be undefined
alert action required
cautions exist
continuing/On-going activity/investigation
time is of the essence follow up communications
Examples include:
evacuations
on-going violent campus demonstrations
intruder alerts
radiological incident
contained or uncontained hazmat/hazardous material spill or release
large explosion/fire
aircraft crash, or similar event, on campus
acts of terrorism
confirmed explosives devices
The “Authorizer” should use all available formats: Voice Message/Voice Mail/E-mail/WWW/Text Messaging/Posted Notices/Public Address Announcements/Direct Contact with Individuals as necessary.
No other use of this FDU Alert System is permitted.
FDU provides remote access to many software applications typically found in university computer labs. This new Virtual Desktop Infrastructure (VDI) gives users access to a Windows desktop environment along with many General Lab Software, without requiring downloading and installing programs on a user’s personal equipment. The service, called FDU Anywhere, is powered by University Systems and Networking (USAN) and can be found at anywhere.fdu.edu.
Using FDU Anywhere is like walking into one of FDU’s computer labs. Upon logging in with your FDU NetID and password, you will have access to the virtual platform. To find a list of currently available software on FDU Anywhere, use the FDU Software Catalog. A listing of available Free and Open Source software can also be found by visiting the FDU Software Catalog.
The FDU Software Catalog provides an up-to-date catalog of software available to Faculty, Staff, and Students at the university:
FDU Anywhere is a powerful resource with a lightweight footprint. In order to utilize FDU Anywhere, you must have the following:
Any device with a browser that supports HTML 5 will work. HTML 5 is supported by almost all desktop and mobile browsers including Google Chrome, Apple Safari, Microsoft Edge, and Mozilla Firefox
An internet connection
FDU NetID credentials
Tip
Your system hardware specifications may impact the performance of FDU Anywhere, such as systems with less than 8GB of memory.
Network Requirements
For the best experience, while using FDU Anywhere, your network should:
Have a download speed of at least 5Mb/s or more
If your download speed falls below 5Mb/s, the connection could become unstable and cause issues with your stream
Have an upload speed of 5Mb/s or higher
An upload speed of 5Mb/s is enough to use a basic mouse, keyboard, and controller. More bandwidth-heavy devices such as webcams, microphones, and external storage devices can use up to 100Mb/s
Wired network connections are preferred over Wi-Fi network connections whenever possible
Wired network connections are more stable and offer more bandwidth over Wi-Fi
For graphics-intensive applications, like Adobe Creative Cloud and Autodesk, we recommend using a wired network connection instead of Wi-Fi, ideally with a bandwidth of 5 Mbp/s.
Wi-Fi networks with 5Ghz rated wireless connections are preferred over 2.4Ghz wireless routers and provide better performance.
VPN Applications and Connections
Warning
The use of any VPN Software within FDU Anywhere is not allowed. Using a VPN client in FDU Anywhere may interrupt your session and disable your access for approximately 15 minutes.
Testing your Connection
Your experience with FDU Anywhere greatly depends on your internet connection. Testing your connection can help you identify and correct most issues.
To test your Internet connection speed, click the link below:
For the best overall experience using FDU Anywhere, Google Chrome is the browser of choice.
Use your FDU Credentials (NetID and associated password) to complete the login to the FDU Anywhere
General Lab
Note
When you login to the General Lab experience, it may take about 60 seconds to get to the desktop. This is because your profile is being created or loaded.
The selected app or desktop opens in a new browser tab
Note
Depending on your screen resolution, your desktop experience view may differ from the picture above.
Log Out of FDU Anywhere
Logging out is a critical step in making sure others continue to be able to easily accessFDU Anywhere services. To log out of FDU Anywhere, follow these steps:
Click the Windows “Start” button
Click your “Name“
Click “Sign Out“
On the upper left-hand side, click the “Hamburger” menu icon
Click “Log Out“
Click “OK” to confirm Logout
Automatic Session Logout Policy
To help make FDU Anywhere as available as possible to all students, accounts that have been inactive (or idle) for 15 minutes will automatically be logged out.
There are many ways in which you can access and save files within FDU Anywhere. Fairleigh Dickinson University highly recommends saving all files on your FDU Microsoft 365 OneDrive which is accessible within FDU Anywhere. There will be a first-time setup and initialization process required to use OneDrive within FDU Anywhere.
Setup and Initialization Process
Accessing your Microsoft 365 OneDrive account is done easily by following these instructions:
From the FDU Anywhere General Lab, single click on the “OneDrive” icon found on the Windows desktop
Enter your FDU NetID and click “Next”
Follow the FDU standard single sign-on prompts to complete the login process
Note
Your FDU NetID may already be filled in, just click Sign in.
You have successfully logged into OneDrive, click “Next“
Microsoft OneDrive may prompt you to backup your folders, click “Next” to skip this step
A brief overview will be given on OneDrive, to begin, click “Next“
When the tutorial is finished, click “Later“
OneDrive setup is complete and ready to use. Click the “X” to close the window or “Open My OneDrive Folder” to access files
Using OneDrive
Using Microsoft OneDrive within FDU Anywhere is very similar to accessing, saving, and opening files on a computer. Just open up File Explorer and look for OneDrive – Fairleigh Dickinson University.
if you need to zip files to submit them to Webcampus, please follow these instructions:
Click the file or folder
Note
For macOS users, you can use the “Two Finger” click method on the trackpad in order to initiate the right click. For additional information, please see the link below for “FDU Anywhere – Keyboard Shortcuts”.
Click on 7-zip then click “Add to Archive“
Change Archive Format to “zip” like in the picture below, then click “OK” to zip your files
The zip archiving process could take some time depending on the size of the file. Once completed, the file will be in the same location as the folder. You can then email or upload your file to your professor.
Alternate Way to Zip Files
Click “Start” on the taskbar on the left-hand side
Type “7zip” and click on 7-zip File Manager that appears
Navigate to the location of your saved file/folder and click to highlight, then click the “Add” button at the top
Change “Archive Format” to “zip” and then click “OK” to zip your files
The file will now be zipped and you will find your file in the same folder as the project folder or file you wanted to zip.
Note
The zip archive could take some time depending on the size of the file. Once completed, the file will be in the same location as the folder is. You can then email or upload your file to your professor.
Submitting Files to WebCampus
To successfully submit your coursework to WebCampus, it is best to use the Google Chrome, Mozilla Firefox, or Microsoft Edge web browser located on the desktop of FDU Anywhere.
To submit your coursework to Webcampus, you can log on from within FDU Anywhere. For more information on Webcampus visit:
Sometimes you may want to copy and paste content from your own computer to an FDU Anywhere desktop or application. You can do this using the copy-and-paste menus or keyboard shortcuts, for example, “Ctrl+C” and “Ctrl+V“.
Note
FDU Anywhere only allows copying from your personal computer into the FDU Anywhere desktop.
If you cannot copy and paste for any reason, we recommend using our FDU OneDrive service to access any files not found in FDU Anywhere.
Copy files from Windows OS Devices
Windows OS to FDU Anywhere
Highlight the text you want to copy from your computer
Press “CTRL+C” to copy the selected text
Move the cursor to the paste location in FDU Anywhere
Press “CTRL+V” to paste the text
close
Copy Files from Apple OS Devices
Your macOS to FDU Anywhere
Highlight the text you want to copy from your computer
Press “COMMAND+C “to copy the selected text
macOS also supports “CTRL+C“
Tip
You may find it easier to use CTRL + C when copying content to FDU Anywhere, so you don’t have to switch back and forth between COMMAND + CTRL.
Move the cursor to the paste location in “FDU Anywhere“
Press “CTRL+V” to paste the text
close
Note
The copy and paste functions DO NOT work across all applications and browsers, including the copying and pasting of images. This is a limitation inherent in browser clipboards. We recommend the Google Chrome web browser for optimal clipboard capabilities.
If you are experiencing issues while using FDU Anywhere, please use the following tips as guidelines to help improve your experience.
Power-cycle your Modem/Router
Power cycling your modem and router allows them to reset and re-establish a connection to your Internet Service Provider (ISP). Shut down your computer and unplug your modem/router. Plug them back in after 60 seconds and watch the lights on your modem/router. Once the lights are on and steady, start your computer.
Keep all your Local Components Up-to-date
Check that your modem/router and your local computer are totally up to date. This includes the operating system, driver, and browser updates.
Disconnect/Turn off any Devices that are not in use
Some devices could be using bandwidth while on standby. Gaming consoles, for example, might download and install updates. Turn off these devices to keep your bandwidth free.
Use an Ethernet Cable
Using a wired Ethernet connection will make your connection more stable and eliminate additional latency compared to a wireless connection.
Change your Wi-Fi Configuration
If a wired Ethernet connection is not possible or your device requires a wireless connection:
Connect to a 5GHz wireless network. Some routers offer both 2.4GHz connections and 5GHz
Place your devices (such as a computer or smartphone) and your router closer to each other
Note
You may need to contact your internet service provider for help with rebooting your router and/or to configure your wireless settings correctly.
Welcome to our comprehensive guide on utilizing the FDU Jamf Connect for login and NETID credential synchronization on macOS. This article is tailored for the staff, faculty, and students at FDU, providing a detailed walkthrough of the Jamf Connect login interface.
Tip
Connecting to FDU-Secure is not supported on this login screen. Please use a wired connection while on campus.
Jamf Connect Interface Walkthrough
The Jamf Connect login screen consists of three sections: The login fields, the function buttons, and language and Wi-Fi.
The login fields are used to enter the NetID and password while the login button initiates the login. The username can be entered in any form that is recognized by Okta.
Shut down: Powers the machine off
Restart: Reboot the machine
Help: Opens a mini browser to the FDU IT site
Language Selection: Changes language
Wi-Fi: Allows selection of wireless network
close
Logging into Jamf Connect
Enter your “FDU NetID” and “Password” and click the “Login” button
You will see the message “Creating your account on this Mac” while the account is being created on the Mac
If you are using a non-standard account name that does not match your FDU NetID, you will be able to select this account at login and link it to your NetID
Locate the account and click “Connect” to link it to your NetID. If you do not wish to link the existing, account click “Create Account” to proceed with a new account
Note
Any data stored under the old account will not be accessible if choose not to link it.
You will be prompted to enter the “existing password” for the local account. Click “Connect” to complete the link.
close
Synchronize NETID Password via Jamf Connect App
The Jamf Connect app is used to synchronize domain credentials with the local machine credentials.
Enter your “FDU NETID” and “Password” and click the “Sign In” button
If your NETID password is out-of-sync, you will be prompted to sync them by entering the Local Password you use to sign into the machine. Click “Sync” to sync the new NETID password
FDU’s Single Sign-On (SSO) experience has been improved and OKTA is the primary Single Sign-On provider. OKTA will replace our “Legacy” SSO login page for all applications over time.
OKTA SSO Login Page
New and existing FDU NetID users who are logging into OKTA for the first time will need to finish setting up their multifactor authentication with DUO.
Enter your FDU NetID and click “Next“
Enter your FDU NetID Password and click “Sign In”
For existing users with DUO configured please skip to step 4. For new users please click “Setup” then “Enroll” to continue the process
For instructions on setting up DUO for the first time, refer to our “Quick Start Guide“
The maps below highlight the buildings at Fairleigh Dickinson University with wireless networking on the Metropolitan Campus, and College at Florham.
Metropolitan Campus
Click or Tap Image to Enlarge
1. Bancroft Hall – General Coverage 2. Williams Hall -– General Coverage 3. Fitness Center – General Coverage 4. Northpointe Residence Hall – General Coverage 5. Robison Hall – General Coverage 6. Robison Hall Annex – General Coverage 7. Muscarelle Center – General Coverage 8. Kron Administration Building – General Coverage 9. University Hall – General Coverage 10. Alumni Hall – General Coverage 11. Metropolitan Campus Library – General Coverage 12. Becton Hall – General Coverage 13. to 22. University Court Residence Halls 1 to 10 – General Coverage 23. Public Safety Office – General Coverage 24. Interfaith Chapel – General Coverage 25. International Student Services – General Coverage 26. EOF Office – General Coverage 27. 840 River Road – No Coverage 28. Housekeeping – No Coverage 29. 835 SUB Lane – General Coverage 30. 839 SUB Lane – No Coverage 31. Dean of Students – General Coverage 32. Greg Olsen Student Union – General Coverage 33. to 40. Linden Court Residence Halls – General Coverage 41. Knight Spot – General Coverage 42. Residence Life – General Coverage 43. Banta Coe House – No Coverage 44. River House – General Coverage 45. Student Counseling and Psychological Services – General Coverage 46. University Mail Services (10 Woodridge Ave) –General Coverage 47. External Building (1 Woodridge Ave) – No Coverage 48. Center for Psychological Services(131 Temple Ave) – General Coverage 49. Center for Psychological Services(139 Temple Ave) – General Coverage 50. Rothman Center – General Coverage 51. Dickinson Hall – General Coverage 52. Softball Field – No Coverage 53. Edward Williams Hall – General Coverage 54. Field House – General Coverage 54b. Naimoli Family Baseball Complex – No Coverage 54b. Soccer Field – General Coverage 54b. Tennis Courts – No Coverage 55. 1154 River Rd. – General Coverage
College at Florham
Click or Tap Image to Enlarge
1. Hennessy Hall(Mansion) – General Coverage 2. Reuter’s Rock – No Coverage 3. Science Building – General Coverage 4. East Cottage – General Coverage 5. West Cottage – General Coverage 6. Zen Building(Stadler-Zenner-Hoffmann La Roche) – General Coverage 7. Ferguson Recreation Center – General Coverage 8. Dreyfuss Building – General Coverage 9. Rothman Building(Admissions Office) – General Coverage 10. Black Box Theater – General Coverage 11. The Barn(Public Safety, Campus Facilities) – General Coverage 12. Chaine House – General Coverage 15. Monninger Center (Library) – General Coverage 16. Orangerie – General Coverage 17. Public Relations – General Coverage 18. Frank Santoloci Student Center – General Coverage 19. Twombly Residence Halls – General Coverage 20. Village Residence Halls – General Coverage 21. Park Avenue Residence Halls – General Coverage 23. Rutherford Residence Hall – General Coverage 24. Wellness Center – General Coverage 25. Gatehouse – General Coverage 25b. Baseball Field – General Coverage 25b. Soccer Field – No Coverage 25b. Football Field – General Coverage
Oracle is a multi-model relational database management system, mainly designed for enterprise grid-computing and data warehousing. It is one of the first choices for enterprises for cost-effective solutions for their applications and data management. It supports SQL as a query language to interact with the database.
Now let’s discuss how to use Oracle in the FDU environment.
Accessing Oracle
FDU provides Oracle access to students and faculty on the Opus server. The Oracle environment is provided to support coursework and skill development.
Opus users are automatically granted access to Oracle after first successfullogin (It may take up to six hours before access is available).
If you do not already have Opus access you will need to request access by completing the Form:
Access to the Opus server is restricted to FDU networks only. If you are off campus and would like to access Opus for your Oracle work you will need to use FDU’s Virtual Private Network (VPN).
The Oracle Database is accessed using the SQL Plus utility, which has a command-line interface. To start using SQL Plus simply type “sqlplus /” on the Opus command line.
Interactive use can then start by entering a SQL statement (terminated by a semicolon), a PL/SQL block, or another command. For example:
SQL> select 'Hello world' as example from dual;
EXAMPLE
--------------------------------
Hello world
Click “App launcher” (icon located at top left corner ) which should show list of applications available to you and then click the “OneDrive” icon. This should open your OneDrive page either in new tab in your browser or in a new browser window.
Note:
Please look for the pop-up blocker in case you don’t see OneDrive window after clicking this icon.
close
Accessing OneDrive in Mobile Devices
You can access OneDrive in your iOS or Android devices.
Sign-in with your FDU NetID and password. Please select “OneDrive for Business” or “OneDrive for School” if given a choice to select type of account. DO NOT select personal OneDrive option if it is available. You’ll be presented with FDU’s Single Sign-On screen where you’ll be required to enter your NetID and password
close
Accessing OneDrive in Windows
If you are using Windows 10 computer, then OneDrive should already have been installed. If not, please follow steps below to download and install it in your computer
Click “App launcher” (icon located at top left corner ) which should show list of applications available to you and then click the “OneDrive” icon. This should open your OneDrive page either in new tab in your browser or in a new browser window
Note:
Please look for the pop-up blocker in case you don’t see OneDrive window after clicking this icon.
Click “Get the OneDrive apps” located at lower left corner which should download installation file for OneDrive
Execute this newly downloaded installation file which should install OneDrive in your computer
Start “OneDrive” and enter your NetID and click “Sign In”
Select “Work or School” option which should take you to FDU’s Single Sign-On screen
Enter your NetID and password
close
Accessing OneDrive on a macOS
Click below to install OneDrive from the Mac App Store
The Fairleigh Dickinson University Technical Assistance Center (UTAC) serves as the primary help desk for all university technology-related support. Students, Faculty, and Staff can easily reach out to UTAC through the SAMI Support portal, email, or phone for assistance with application software, desktop setups, peripheral devices, network issues, password management (such as for Microsoft 365), and configuration support for hardware and software. UTAC also addresses inquiries related to Blackboard and classroom projector troubleshooting.
There are four ways to create a ticket and get support:
Create SAMI Support requests by filling out a quick form
Access the most updated status of your SAMI support request
Interact with the technician currently assigned to resolve your SAMI support request
Review all your open and closed SAMI support request history
Access our knowledge base to view information about our current systems
Access solutions for the most frequently asked questions
close
SAMI Support Public Form
You can submit a request for support by filling out the form below
Tip
The form below is not compatible with Dark Mode. For an optimal experience, disable dark mode either in your device’s system settings or directly from the FDU IT website menu bar.
close
Call Center
Our Technical Assistance Center is available 24 hours a day for you to log a support ticket
The center can be reached at (973)-443-8822
close
Email
Users can log tickets by sending an email to our technical assistance Center
There are a few different ways to change your University NetID password. However, Computing Services strongly urges everyone to change their FDU NetID password using a provided Apple or Windows university computer.
The process for changing your FDU NetID password on a macOS device differs from a Windows device, so please follow the instructions provided for macOS computers below.
If you do not have a university-owned Apple or Windows laptop/desktop and cannot use a University lab computer, please follow the procedures described in “Using identity.fdu.edu Web Portal to Change your FDU NetID Password” below.
Please click on one of the links below for instructions on how to change your FDU NetID password:
Changing a FDU NetID Password on a FDU-owned Windows Computer
Note
To change your password, you must be logged into the machine and either on campus or connected to the Cisco AnyConnect VPN.
On FDU-issued laptops, desktops, and lab machines, the FDU NetID password can be changed by pressing the “Ctrl+Alt+Del” button combination on the keyboard from any screen and selecting “Change a Password”
Now enter the following:
Your old or current password
Type in a new password
Retype the new password to confirm
Press the “Right Arrow” button to continue
Tip
The newly created FDU NetID password must meet the complexity requirements.
Use 8 to 16 characters for your new password. Passwords must include all of the following 4 character types: Upper case letters, lower case letters, numbers, and special characters. Allowed special characters are: ! # $ @ _ + , ? [ ] . – ) ( ` ~ % ^ & * = { } | : ? , / and a dot. Please refrain from using portions of your name or email address within the password. Please refrain from using a password that you have already used.
Once this has been done, you must lock and unlock the machine once to complete updating your password:
Press the “Ctrl+Alt+Del” keys combination again
Click “Lock”
Then log back in with your new password
Your FDU NetID password was changed successfully!
Note
Your new password will need to be updated in all web browsers with saved passwords and email clients across all devices. Examples include faculty and staff e-mail accounts synched to their iPad, iPhone, and or Android device. FDU-Secure Wi-Fi network access is also attached to your FDU NetID username and password and will need to be updated on devices that use it.
close
Changing and Syncronizing your FDU NetID Password on a FDU-owned Apple Computer
To change and/or synchronize your FDU NetID password with your FDU Issued Apple computer, please follow the directions provided in the following article:
Using “identity.fdu.edu” Web Portal to Change your FDU NetID Password
Adjunct professors, students, and anyone with a personal laptop/desktop/tablet device will use the FDU Identity Web Portal to change their NetID password.
Open a web browser (e.g., Google Chrome, Mozilla Firefox, Internet Explorer, Safari) and navigate to the following URL:
Click on “Account Maintenance” on the top right hand of the web page
You will be redirected to the FDU Single-Sign-On login page. Enter your FDU NetID email and password in the corresponding text boxes and click “Sign In.” Complete the FDU 2fa Duo push notification to proceed
Under Sign-In and Security, select “Change My Password”
Enter your current password
Enter a new password
Retype your new password to confirm
When finished, select “Change My Password”
Tip
The newly created FDU NetID password must meet the complexity requirements.
Use 8 to 16 characters for your new password. Passwords must include all of the following 4 character types: Upper case letters, lower case letters, numbers, and special characters. Allowed special characters are: ! # $ @ _ + , ? [ ] . – ) ( ` ~ % ^ & * = { } | : ? , / and a dot. Please refrain from using portions of your name or email address within the password. Please refrain from using password that you have already used.
“Password successfully changed” will be displayed if your FDU NetID password was successfully changed
Note
Your new password will need to be updated in all web browsers with saved passwords and email clients across all devices. Examples include faculty and staff e-mail accounts synched to their iPad, iPhone, and or Android device. FDU-Secure Wi-Fi network access is also attached to your FDU NetID username and password and will need to be updated on devices that use it.
close
Using “identity.fdu.edu” Web Portal to Change your FDU NetID Display Name
You also have the option to change the name that is displayed on your NetID account.
Open a web browser (e.g., Google Chrome, Mozilla Firefox, Internet Explorer, Safari) and navigate to the following URL:
Click on “Account Maintenance” on the top right hand of the web page
You will be redirected to the FDU Single-Sign-On login page. Enter your FDU NetID email and password in the corresponding text boxes and click “Sign In.” Complete the FDU 2fa Duo push notification to proceed
Under Sign-In and Security, select “Change Display Name”
Enter your New Display Name
Click on “Change Display Name“
“Display Name successfully changed” will be displayed if your Display Name was successfully changed
When preparing for a Zoom class, the 15 minutes before it begins are crucial for setting yourself up for success. In these final moments, finding a quiet, well-lit space with a strong internet connection is key. Ensuring your camera, microphone, and environment are ready will help you avoid any distractions or technical difficulties during class. With everything in place, you can focus on fully engaging in the session, confident that you’re ready to participate seamlessly.
15 Minutes Before Class Starts
15 minutes before class starts, find a quiet place with strong internet that is free of distractions. Remember that everyone in the class will be able to see you! Find an appropriate background and make sure the room is well-lit. Make sure that you have your device plugged in so you don’t need to worry about battery issues mid-class
Open Zoom. You can open Zoom by clicking the link your professor sends you or downloading the Zoom app or program on your device. If you have headphones, plug them in now
Test your microphone and camera
To test your microphone, click “Test Computer Mic & Speakers” in the pop-up window that appears when first opening a test meeting or beginning your scheduled meeting
To test your camera, just look at the Zoom window to see that you are visible, non-pixellated, and can move and speak without noticeable delays
You may need to permit Zoom to access your camera and microphone beforehand. Typically, the request for permission will appear in a pop-up window the first time you open a Zoom Meeting, and will carry over to future meetings. If you declined permissions in the past, you will need to go into your PC or Mac’s settings to allow Zoom to access your camera and microphone
Close any windows or programs open on your device that are unrelated to class.
During Class
Click Start Video to begin broadcasting from your webcam
Use the Chat bubble as appropriate. You can chat with everyone in the meeting, the professor, or a specific person
Find out who else is in the meeting by clicking Participants. This is also where you can “raise your hand” to ask or respond to a question
Be prepared to share your screen with the class (If you do so, we will see all tabs you have open. We could also see your email, messages, etc. Please ensure that anything you would like to keep private is closed before class begins)
The Zoom Menu
The Zoom menu contains several features that can be used during class meetings. For laptops, PCs, and Macs the menu can be found by hovering over the bottom of the Zoom window. In the Zoom app, the menu can be accessed by tapping the bottom of the app window. Here is a picture of the menu bar.
Mute: Silences and unsilences your microphone. Your professor will “Mute” the whole class to reduce background noises, but if you’d like to speak, you need to click “Unmute” first
Share Screen: Allows you to share a variety of windows and applications. Participants can share views of their desktops and specific windows currently open on their computer, write on a digital whiteboard, and even share a screen directly from their iPhone or iPad
Chat: You can send messages to everyone, just the professor, or a specific person
General Zoom Etiquette
Getting a clear video is a lot like taking a good selfie. Light your face more brightly than the background to make it easier to see you
Remember that everyone else can see you
Be yourself, move physically, and make facial expressions
Microphones pick up all ambient noise, so keep your mic muted until it’s your time to speak.
Remember that when on camera, other activities such as eating, drinking, shuffling papers, etc are extremely distracting
If you’re having trouble joining a Zoom meeting or class, refer to the article below for troubleshooting tips.
The purpose of the Information Technology Strategic Plan (ITSP) is to leverage information technology to advance the mission of the University, to help achieve the goals identified in the University Strategic Plan, and to shape the future direction for information technology (IT) initiatives to create a competitive advantage for the University.
The ITSP is the culmination of an in-depth process that involved strategic thinking, research on IT and higher education trends, and discussions about technology needs with the University community. The Technology Plan was envisioned and created with guidance from administrators, staff, faculty, and students. The Plan will provide direction and set IT priorities for the next three to five years.
2 Governance Overview
The mission of IT is to provide services that are critical to the front-line mission of the institution: teaching and research. IT provides services that are critical to all of the other services that are directly or indirectly supporting the mission of the institution (e.g., business operations, academic and student support, research operations, auxiliaries, data security). Most importantly, IT provides important services directly to all students.
IT resource needs will always outstrip available resources, thereby requiring strategic prioritization of how resources are deployed, within the context of the mission of the institution. IT security, business continuity and compliance needs require sensible and enforceable policies that support, rather than unduly interfere with, the mission of the institution. Appropriately balancing central and local IT activities requires frequent recalibration and every member of the University community (student, faculty, and staff) is a direct stakeholder in the success of our IT enterprises.
Governance Committee Activities
Evaluate and recommend technology related policies and procedures
Recommend IT service and project priorities for the University
Advise on the implementation of the IT Strategic Plan
Advise on the development of future versions of the IT Strategic Plan
Identify existing campus technology committees and working groups, then develop and maintain a framework that connects them back to this Committee for purposes of information-sharing
Review proposals, recommendations, and input from other campus technology committees and working groups make recommendations for further action
Provide recommendations for effective use of campus-wide technology resources
Support the CIO (and appropriate others) in campus-wide monitoring of and ensuring compliance with best practices, IT policies/processes, and institutional priorities
Provide input regarding technology project and service proposals into the University budget process
Recommend approval of all proposed technology projects and services that meet certain criteria (e.g., affects a certain number of users, affects more than one division or unit)
Make recommendations for aligning IT professional resources to institutional goals with respect to FDU’s IT organizational structure and standards for compensation and competency
Recommend approval of procurement of all technology services and products that meet certain criteria (e.g., a large project over a certain dollar threshold)
Implement a simplified and consistent cost and funding model for services. Fewer and more consistent funding models that work within the constraints of unit budgets and grants, incentivize adoption and retirement of services, provide transparency to costs, and support interdisciplinary work are crucial to supporting the goals in this strategic plan.
Create and adopt a consistent decision frameworks and simpler funding models to guide funding decisions for existing and new services.
Create the ability to procure subscription-based services aligned to the frequency and speed at which new services enter the technology market.
Utilize advisory groups composed of members from throughout the University to recommend, and advocate for, appropriate service investment decisions, such as subsidization and retirement.
3 Fronts of Focus
3.1 New Jersey Campuses
New Jersey (USA)
3.2 Wroxton College
Wroxton College (UK) is the British campus of Fairleigh Dickinson University, situated in the ancestral home of Lord North at Wroxton Abbey in Oxfordshire. The Abbey is located in the Village of Wroxton, which lies in a dip on the northeast edge of an ironstone escarpment bordering the Cotswolds.
The main College building is Wroxton Abbey, home of Wroxton College, a fully modernized Jacobean mansion on 56 acres of its own lawns, lakes and woodlands. It now houses the College’s classrooms and seminar rooms, the library, fully modernized student lodging facilities, and computer laboratories.
Wroxton College is a unique experience both culturally and academically for students seeking to extend their horizons. Students come to Wroxton from more than 250 colleges and universities to participate in academic programs offered by resident British faculty and visiting British scholars and corporate professionals. The academic offerings are supplemented by a program of tours to various historic sites, artistic and cultural centers, and places of political and commercial significance.
Wroxton College has been a travel abroad campus which will be expanded to support new degree programs. Work is already underway to upgrade the technology infrastructure to support enhanced telephony, intranet, internet, smart classrooms, and videoconferencing. Full degree programs may require additional IT investment strategies to fully realize the potential of this charming campus location as a full degree granting location. Management of the Wroxton College IT infrastructure and support has been outsourced under the supervision of the CIO and University Systems and Network (USAN).
3.3 Vancouver campus
The Vancouver Campus (BC) offers accredited professional degree programs to international students with majors in business administration and information technology. Students majoring in business administration are required to complete a concentration in international business and may elect to complete a second concentration in entrepreneurship, finance, information technology, or marketing. Students majoring in information technology typically complete a minor in business administration. They also have optional concentrations in Network and Systems Administration or Web Technology.
The University also offers a Bachelor of Arts – Individualized Studies degree. A Master in Administrative Science degree and a Master of Science in Hospitality Management Studies are offered at the graduate level. In addition, the Vancouver campus offers a Pre-University Program which provides advanced English-language training for students who meet the requirements for admission but require additional training in English (in speaking and/or writing) prior to matriculating in a degree program.
The Vancouver campus boasts an excellent and dedicated core of full- and part-time faculty; a new, state-of-the art facility; small class sizes; close working relations between students, faculty and staff; and an intensive and unrivaled student support system focused on individual student success.
Growth at the Vancouver campus has demanded a facilities and IT program to increase administrative and instructional spaces. Having outgrown the existing Vancouver campus space, FDU will assume additional non collocated spaces (temporarily) while FDU plans for the construction of a new and larger facility to house the FDU Vancouver campus. As these locations come on-line over the next five years, FDU will standardize on platform, systems, and network capabilities to scale and tie into the larger FDU network infrastructure.
3.4 Student Success
Outreach programs are a necessity in higher education. Students rely on their instructors to set the tone for the course and seek their instructor’s guidance and mentoring throughout their time spent together in the course. Students, in general, need to know that their success in the classroom is important to both their instructor and the university.
Even more importantly, direct instructor outreach is an essential tool for success for online learning programs as students do not have face-to-face interaction with their instructors as they would in an on ground setting. Without direct instructor contact with the student, the student’s need for validation of their efforts from the instructor and institution is not met, which can lead to the student becoming disengaged within the class and/or the institution.
Online student tracking system net retention awards. The implementation of a tracking system assists in identifying at-risk students to develop individualized plans to assist the student in creating a positive educational experience. By instructors or advisors identifying the individual needs of the student, better strategies can be developed to serve the student population. It is important to note that instructor-student interaction plays a large role in the traditional on-campus environment for retention and student success.
Based on the current research and literature regarding student retention rates and the need of proactive approaches, two general conclusions can be made: The need for instructor-student interaction is a factor in the student’s success whether the learning environment is a traditional on-campus program or online program and the degree and approach of instructor-student interaction for online learning environments must be proactive in the online learning environment.
4 Guiding Principles for Plan Development
Technology Impact
Does the strategy recognize and acknowledge that changes in technology can have significant impact to the University as a whole?
Commitment to Investing in People
Does the strategy recognize a need to invest professional development to leverage modern technologies?
Representation from across the University
Does the development of the strategy include representation from the distributed units found on most campuses?
Update Mechanism
Does the strategy provide a mechanism for updating it?
Easy to Understand
Can the goals of the strategy be easily understood, and applied to daily operations within units?
Pathway to Success
Does the strategy include an assessment of the current state, a vision of the future, and a pathway for achieving the desired future state?
Tangible Outcomes
Does the strategy provide a clear picture of what success looks like with a defined outcome?
Understanding of the Influences
Does the strategy allow the reader to understand the influences and pressures on the University?
Descriptive not Prescriptive
Does the strategy provide a description of the outcomes without describing individual tasks that must be accomplished?
5 IT Strategic Goals
FDU seeks to develop an environment where information is easily leveraged to strengthen FDU’s leadership in collaborative research and learning, with appropriate levels of security and privacy. The continued growth of data-based research, learning analytics, and interdisciplinary collaboration requires data to be more available and accessible. At the same time, security, privacy, and regulatory compliance are critical and increasingly difficult to achieve. FDU will seek to be a leader in creating an environment that balances these often competing needs.
FDU will spur growth in the computational and data sciences by creating a unified university-wide research IT ecosystem that enables cost-effective and at-scale provisioning of on premise and cloud-based computing, storage, networking, and visualization services and tools.
The university is a learning laboratory geared towards discovery and positioned to change how the world teaches and learns. FDU will support an experience by capturing information about the university environment and using this information to advance research in the learning sciences. The learning laboratory will support the development of new applications and innovations in teaching and learning. The full experience of the student will be personalized to each individual, both inside and outside the classroom, increasing access, affordability, and inclusion.
FDU seeks to deliver an environment with minimal administrative burden for mission related work. Increasing compliance requirements combined with complex business processes consume time and resources that would be better directed to teaching students and conducting research. FDU must take an end-to-end approach to service design and development to eliminate waste and apply technology that makes administrative processes and adherence to compliance requirements less burdensome.
Understanding and advancing technology’s role in defining the student experience on campus (from applicants to alumni).
6 Strategic Alignment with FDU Mission, Vision, and Values
6.1 Education and Outreach
Outreach programs have been implemented in higher learning institutions to increase student retention and satisfaction. The challenges of outreach can increase when students are in an online environment. Online students do not have physical contact with their instructor and classmates and this can cause students to feel isolated and discouraged. Online higher learning institutions can approach outreach at various levels: no formalized outreach program for instructors, a formalized outreach program for instructors incorporating required outreach periodically throughout the course for at risk students, or a formalized outreach program for instructors incorporating weekly outreach throughout the course for at risk students.
6.2 Research Computing
FDU will champion open and advance conversations with the State of NJ and other institutions of higher education partners to develop a strategy for advancing the State as a national hub for computational and data science innovation. The development of an “open cloud infrastructure” that enables universities, government, and the business community to conduct collaborative research through sharing computational and data analytics technologies.
Provide a unified FDU research computing and data environment to enable collaboration and innovation. By bridging the “health to campus” research computing and data divide, FDU will accelerate the development of cross-campus and cross-agency interdisciplinary research initiatives, attract nationally recognized leaders in computational and data science, and realize a return on investment in computational and data science exceeding our peers.
We will coordinate and expand the research support community across the university, providing support that goes beyond narrow technical issues and complements domain-specific expertise with knowledge of best practices and available resources.
6.3 Information Security and Risk Management
Information security is not a risk that can be contained to technology operations alone. Information security risks are strategic risks to the institution and require a comprehensive, enterprise risk management (ERM) approach in order to be effectively addressed.
The IT profession is undergoing its own remaking that is every bit as monumental as higher education’s. The economic and political pressures on higher education have been placing constraints on its IT workforce. Higher education is not as intrinsically attractive a place for IT staff to work as it once was, and there are many other options that offer higher salaries, more interesting and more modern challenges, greater professional development, and better benefits. IT managers are challenged on multiple fronts. They need to attract and retain the best talent. They need to adapt the existing workforce to new roles and techniques. They need to work with non-IT managers to enlist functional staff in the critical roles that these staff can play in new technology-related initiatives. The work won’t get done without people, and the “people part” has become very difficult.
Expand the cyber security awareness program (including mandatory training for staff and faculty)
Continually review policies, content, and strategies to stay abreast of current threats and mitigations
Two Step Authentication
Annual Network Intrusion and end-user Phishing awareness and testing
Make it easier to keep sensitive information secure and meet compliance requirements by providing guidelines, tools, and services to the entire community, based on data or system sensitivity, not unit
Develop a risk-based security strategy that keeps pace with security threats and challenges
6.4 Administrative Systems
We must aggressively streamline the administrative systems in order to reduce administration and compliance burden on users. This initiative will increase the amount of time people in the FDU community spend working on their mission and improve the user experience when using technology. It will also help prepare the systems for an eventual move to a cloud-based provider, which will reduce the total cost of ownership, and expand the capacity for value-added initiatives to further the university’s mission.
Optimize and standardize current end-to-end business processes to use industry best practices that are provided by our administration systems.
Standardize management reports for university units, in order to increase consistency in reporting while decreasing the total number of reports.
Review current administrative system customizations and remove or streamline changes that are unused or increase complexity for users.
Eliminate shadow and supplemental administrative systems and reports when it is possible to combine multiple systems into a common solution.
Nurture a university-wide IT community that delivers services and solutions in partnership, as a single team, regardless of organizational lines. Many initiatives in this strategy require IT cooperation across the university. A collaborative IT community that crosses the organizational boundaries, and has a diverse set of viewpoints, will provide consistently timely and effective support to faculty, students, and staff, in order to improve their productivity and retention.
7 Advancing the FDU Mission
7.1 OIRT
The Office of Information Resources and Technology provides secure, innovative, reliable, and integrated technology solutions, quality services, and information resources.
OIRT will strive to create a collaborative and secure IT environment that attracts and retains the best students, faculty, and staff by providing a common foundation of anytime / anywhere technology that focuses on strategically funding targeted technology capabilities to support FDUs academic, administrative, and outreach goals. To achieve this, FDU must:
Ensure that a collaborative IT Governance Model is deployed that continually focuses on prioritizing, funding and driving community-valued IT services
Recognize that having a secure and robust underlying technology infrastructure is critical to providing all other technology services
Identify core IT services and assess cost effectiveness and use potential savings to fund strategically targeted projects
Mobilize collaborative campus constituencies to identify and address common goals
Streamline administrative processes and systems to provide more seamless and automated service to all campus stakeholders
Have consistent and strong executive support to ensure that the ITSP is supported
Excite students and faculty to leverage technology to improve learning and research outcomes
7.2 Teaching and Learning
7.2.1 Classroom Technology
It has been demonstrated that when technology is integrated into lessons, students are expected to be more interested in the subjects they are studying. Technology provides different opportunities to make learning more fun and enjoyable in terms of teaching same things in new ways. For instance, delivering teaching through gamification, taking students on virtual field trips and using other online learning resources. Technology can encourage a more active participation in the learning process which can be hard to achieve through a traditional lecture environment.
No one learns in the same way because of different learning styles and different abilities. Technology provides great opportunities for making learning more effective for everyone with different needs. For example, students can learn at their own speed, review difficult concepts or skip ahead if they need to. What is more, technology can provide more opportunities for struggling or disabled students. Access to the Internet gives students access to a broad range of resources to conduct research in different ways, which in turn can increase the engagement.
Students can practice collaboration skills by getting involved in different online activities. For instance, working on different projects by collaborating with others on forums or by sharing documents on their virtual learning environments. Technology can encourage collaboration with students in the same classroom, same school and even with other classrooms around the world.
By using technology in the classroom, both teachers and students can develop skills essential for the 21st century. Students can gain the skills they will need to be successful in the future. Modern learning is about collaborating with others, solving complex problems, critical thinking, developing different forms of communication and leadership skills, and improving motivation and productivity. What is more, technology can help develop many practical skills, including creating presentations, learning to differentiate reliable from unreliable sources on the Internet, maintaining proper online etiquette, and writing emails. These are very important skills that can be developed in the classroom.
With countless online resources, technology can help improve teaching. Teachers can use different apps or trusted online resources to enhance the traditional ways of teaching and to keep students more engaged. Virtual lesson plans, grading software and online assessments can help teachers save a lot time. This valuable time can be used for working with students who are struggling. What is more, having virtual learning environments in schools enhances collaboration and knowledge sharing between teachers.
7.2.2 Lecture Capture and Distribution
Lecture capture is the process of recording classroom lectures as videos, and making them available for students to review after the class. The term “lecture capture” is actually quite broad and can be used to describe a variety of solutions, software, and hardware. One may need to record something as simple as audio and PowerPoint point slides. Or, you might want to capture a camera, computer screen, separate microphone, and webcam all for one class. Lecture capture solutions take on many forms depending on how each individual intends to use them.
Since recordings using software-based systems can be done on a standard PC or Mac — or even a mobile device — a lecture can be captured in a lecture hall, an office, or even on-site at a hospital. Capturing lectures helps keep students from falling behind. Less than 40 percent of full-time students complete their bachelor’s degree on time. In some cases, a student’s normal schedule may be interrupted due to illness or family emergency. The more sessions a student misses, the more likely they are to drop a class or even drop out of the program. Often, dropped classes are not offered again until the following academic year, putting the student further behind and driving up the cost of their education.
Video conferencing (VC) technology is becoming more reliable and robust, while hardware and software costs have fallen, making lecture capture a strong strategic capability to improve student success and retention.
7.2.3 ITV / VC
Education is evolving faster than ever. Educators are facing increasing demands as a result of new curriculum standards. While higher education institutions are increasingly competing through distance learning programs, distance learning programs can be enhanced by providing more interactive and synchronous learning resulting in improved student performance. Administrative staff can also more efficiently communicate across campus, across the state/district, or the globe.
The need for ITV is drastically increasing. In the past, ITV systems were large, expensive, and required special hook-ups. Today, there are numerous options to enable ITV capabilities in more locations across FDUs campuses, at reduced costs with increased performance. As these technologies become more mainstream and robust, OIRT will support the implementation to enhance learning, collaboration, and efficiencies. The classroom technology provided in different spaces is dependent upon size, function, and how knowledge and skills are exchanged in an educational context, and considers the interactions that take place during learning.
The future state of FDU requires a significant increase in the number of locations equipped with videoconferencing (VC) capabilities, without the high cost of dedicated VC equipment. FDU will benefit greatly from a standardized software based video platforms installed in all meeting, conference, labs, and instructional spaces.
The need to connect researchers to research studies in progress without the burden of travel requirements
ITV connects researchers to research studiesIn-progress – no matter the location. For example, FDU research fellows can connect with grad students conducting supporting research in a variety of remote locations. The ability to cut travel time and expense saves research teams precious time needed to complete work without exceeding department budgets or research grants.
The need to provide a collaborative platform for research teams
ITV makes it easy for researchers from different campuses, universities or locations to collaborate with one another. Researchers can connect within minutes for scheduled or ad hoc meetings – all that’s needed is a webcam-equipped device and an internet connection.
The need to bring researchers and stakeholders together
When researchers are able to connect with key stakeholders such as grantors, the result is increased visibility, knowledge sharing and accountability over the course of projects that may involve grants and require many months or years to complete. Enhanced communication helps researchers to provide stakeholders with timely and informative updates on progress.
The need to publish and disseminate information and research for continued analysis and practical use
Research is by nature dynamic, being analyzed and updated after its initial publication. ITV platforms extend access to and use of published work so that researchers can easily conduct webcasts or live lectures and record these sessions for archival and later use.
8 IT Strategic Plan Goals, Objectives, and Key Strategies
8.1 IT Strategic Plan (ITSP) Roadmap
Goals
Objectives
1. Advance the academic mission of the University through innovative and effective technologies, resources, and services.
1.1: Leverage technologies and information resources for recruitment and retention efforts and to support student services.
1.2: Provide technology systems and services to enhance student learning and to foster curricular innovation.
1.3: Provide technology infrastructure and support for research, scholarship, and creative activities.
2. Leverage our reliable, secure, and efficient information technology infrastructure and maximize staff potential to foster innovation and excellence.
2.1: Maintain and enhance the IT infrastructure to support the operations of the University.
2.2: Provide a secure computing environment that ensures data privacy and integrity and mitigates cyber-security threats.
2.3: Ensure a strong IT workforce capable of achieving the information technology goals of the University.
2.4: Align funding and explore new funding sources essential for IT operations and new strategic initiatives.
3. Advance business processes and operational efficiencies through effective implementation of information technology.
3.1: Support, upgrade, and enhance current business processes, tools, and administrative systems.
3.2: Evaluate and implement new technologies to improve operational efficiency.
3.3: Ensure excellent service to enable the effective use of technology, resources, and systems by the University community.
4. Provide technologies to enhance communications with the greater University community and the world.
4.1 Leverage web, social media, and mobile technologies to provide effective and consistent content delivery.
4.2 Support effective means of internal and external communications for all University constituent groups.
4.3 Institutionalize knowledge centered support (KCS) and self service capabilities.
Goal 1: Advance the academic mission of the University through innovative and effective technologies, resources, and services.
Objective 1.1: Leverage technologies and information resources for recruitment and retention efforts and to support student services.
Key Strategies:
Optimize the effectiveness of Customer Relationship Management (CRM) software to improve communication and engagement with prospective and current students.
Deploy data analytics to shape strategy and decision making in enrollment management.
Identify, evaluate, and implement enhancements to processes supported by the Student Information System (SIS).
Investigate and implement technological solutions to foster communication and interaction between students, faculty, and advisors (Outreach)
Deploy an early alert system to identify and engage at-risk students.
Manage system implementations and integrations that support multiple student success initiatives.
2024 OIRT Update:
The following completed initiatives were driven by the focus to continually improve the student experience;
Implemented Ellucian Experience as the interface for all Ellucian processes
Implemented Ellucian Self-Service, replacing Web Advisor, for improving the course registration process
Implemented Ellucian Advise to improve retention/graduation rates through proactive alerting and earlier potential intervention by advisors for at-risk students
Implemented Chrome River for more an accurate and faster electronic expense tracking and processing
Expanded use of DocuSign to streamline forms processing across various university departments
Objective 1.2: Provide technology systems and services to enhance student learning and to foster curricular innovation.
Key Strategies:
Create individual and campus-wide opportunities for faculty, staff, and students to explore, evaluate, and implement new technologies to improve teaching, learning, and innovation.
Provide dependable IT-enabled classrooms, computer labs, and virtual learning spaces.
Develop a BYOD capability and strategy.
Provide students with mobile access to lab software (via VDI?).
Enhance video content management and distribution system.
Provide a robust Learning Management System (LMS) and instructional technology to support ubiquitous learning, learning analytics, and adaptive learning.
Enhance training options and diverse training modalities for faculty and students.
Expand ePortfolio technologies to enhance the creation and preservation of personal learning experiences.
Improve IT literacy to ensure competency in common IT skills for all students.
Enable the ubiquitous use of iPads w/MDM and apps.
2024 OIRT Update:
Zoom has been standardized across FDU for interactive remote learning and other video conferencing opportunities with the rollout in over 93 locations to date and increasing improving student experience over ITV
Kaltura video repository system (Media Space) has been implemented as a repository with online courses in BlackBoard
Objective 1.3: Provide technology infrastructure and support for research, scholarship, and creative activities.
Key Strategies:
Provide responsive support and innovative technical solutions to meet the needs of faculty and departments.
Expand expertise in high-performance computing, open-source, and open-standard environments.
Goal 2: Leverage our reliable, secure, and efficient information technology infrastructure and maximize staff potential to foster innovation and excellence.
Objective 2.1: Maintain and enhance the IT infrastructure to support the operations of the University.
Key Strategies:
Provide a robust, resilient, and reliable wired and wireless data network infrastructure.
Maintain and upgrade data center hardware and software to ensure scalability to meet future needs.
Provide a robust and reliable voice communications infrastructure.
Develop a strategy for integration of personally owned devices to provide secure and effective access to enterprise data and services.
Develop a cloud computing strategy based on benefits, return on investment, security, and data privacy risks.
Identify and implement improvements that reduce power consumption within the IT environment.
Develop an IoT (internet of things) capability and strategy.
2024 OIRT Update:
Developed Wireless Infrastructure Strategic Plan
Measured current wireless needs and requirements
Enhanced wireless infrastructure with capacity capable of accommodating the growing number of devices with quicker turnaround for callers while maintaining security
Wireless capacity study and heatmap completed and is under review to prioritize additional capacity where critically necessary
Upgrading/replacing infrastructure equipment for continuous High Availability of critical technology products and services
Storage Area Network Upgrade
Objective 2.2: Provide a secure computing environment that ensures data privacy and integrity and mitigates cyber-security threats.
Key Strategies:
Create a comprehensive IT security position to help address the challenges with information security, network security, disaster recovery, and compliance issues.
Develop an information security framework based on accepted best practices and standards that will be the basis of managing and mitigating cyber-security threats.
Implement and maintain hardware and software essential for institutional information security.
Educate the campus community about information security issues through various training modalities and opportunities.
Enhance, operationalize, and periodically test the IT disaster recovery plan.
2024 OIRT Update:
Implementation of DUO for consistent multi-factory authentication for university applications
Established WISP program for mandatory continuing education and compliance tracking
Established policy for Annual Penetration Testing and semi-annual vulnerability assessments with followup remediation plans and action items
Firewall and DDoS services implemented to further protect University resources
Partnering with 3rd Party Monitoring Service for continuous monitoring and alerts for potential high vulnerability threats
Objective 2.3: Ensure a strong IT workforce capable of achieving the information technology goals of the University.
Key Strategies:
Provide technical and leadership professional development opportunities for IT employees.
Provide flexibility in scheduling and projects to allow staff time to work with innovative technologies.
Recruit, develop, and retain a strong permanent staff and student staff.
Establish cases for new employee positions focused on the strategic needs of the University and the Technology Plan.
Execute an IT staffing skills assessment and deliver a professional development plan to stay ahead of the learning curve.
2024 OIRT Update:
Leadership development opportunities in various platforms, examples in Rising Leaders Forum and Gartner Symposiums
Current staff trained and now Apple Certified able to service a large portion of FDU’s devices
Objective 2.4: Align funding and explore new funding sources essential for IT operations and new strategic initiatives.
Key Strategies:
Demonstrate and communicate, through a transparent and inclusive governance process, how IT directly impacts the core institutional missions of teaching, research, scholarship, and service to the community.
Develop metrics and quantitative measures to establish the effectiveness of IT projects.
Develop a long-range capital plan for IT including funding for lifecycle replacement of hardware and systems including classroom technology.
Identify opportunities to administer centralized software licenses for cost-savings, operational efficiency, and security
Implement Virtual Desktop Infrastructure (VDI).
Explore opportunities for external funding for IT related projects.
2024 OIRT Update:
CapEx planning with major project tracking shared with IT Executive Governance committee twice a year for review
Launched OIRT resource and capacity study
Developing Project Rationalization and Prioritization Framework within OIRT before potential rollout to key business stakeholders
Goal 3: Advance business processes and operational efficiencies through effective implementation of information technology.
Objective 3.1: Support, upgrade, and enhance current business processes, tools, and administrative systems.
Key Strategies:
Provide ongoing support for existing administrative processes and business systems.
Streamline workflow and automate business processes to improve business efficiency and reduce the use of paper.
Enhance interfaces between administrative systems to optimize efficiency and ensure the integrity of shared data.
Provide access to data and analytical tools to support administrative decision making and compliance.
Leverage existing systems and platforms to improve the on/off boarding processes.
Objective 3.2: Evaluate and implement new technologies to improve operational efficiency.
Key Strategies:
Research and deploy a new file storage solution that meets organizational needs including cost, usability, security, compliance, and scalability.
Deploy a course catalog system for academic departments to effectively manage course information.
Conduct an ERP feasibility study and evaluate business processes to assess whether a new ERP can improve the administrative functions of the University.
Identify and implement new business technologies and systems, including e-commerce options, which can improve the administrative functions of the University.
Investigate and implement technological solutions to help assessment initiatives.
Publish an online service catalog that outlines the services IT that provides.
Research and deploy a solution for managing, searching, and archiving digital assets such as photographs and videos.
2024 OIRT Update:
Working with multiple 3rd party resources, a customization study was undertaken to determine the readiness for modernizing the current SIS environment, both database and platform, in preparation for the eventual migration to a SaaS hosted model
Objective 3.3: Ensure excellent service to enable the effective use of technology, resources, and systems by the University community.
Key Strategies:
Develop and enhance training using various modalities for students, faculty, and staff.
Work with departments to provide training on enterprise technologies.
Identify and implement a common service and support philosophy, including the use of IT service management tools and processes where it will improve the service and support experience for faculty, students, and staff.
Identify and implement ways to further strengthen the helpdesk operations, including self-help capabilities, knowledgebase, and AI as a means of reducing the number of support requests.
Enhance communications to keep the University community informed of changes in the IT environment.
2024 OIRT Update:
Partnered with key stakeholders across various student facing departments to ensure OIRT engagement with new and existing students about available technology services and support opportunities
Established and maintaining various communication channels ensuring University constituents are aware of impending changes and potential disruption to technology services
Annual deployment of surveys to key constituents to better understand the technology support experience and find opportunities for improvement
Lecture capture system implemented university wide allowing pre-recorded lectures to be viewed by students on-demand
Video Repository System for centrally managed and dedicated student and staff training videos
Enhanced antiplagiarism tool integrated into the Learning Management System increasing academic integrity while reducing faculty resource time
Goal 4: Provide technologies to enhance communications with the greater University community and the world.
Objective 4.1: Leverage web, social media, and mobile technologies to provide effective and consistent content delivery.
Key Strategies:
Deploy a web content management system (CMS) to improve web usability, accessibility, and content delivery.
Create a strategy to enhance University’s web and social media presence.
Improve the social media presence of departments to engage with users more effectively.
Implement a mobile application to provide content and functionality uniquely suited to mobile devices.
Increase the number of technology rich classrooms including ITV capability.
Evaluate, and where appropriate, implement services as they become available to meet institutional needs.
2024 OIRT Update:
Dedicated OIRT resource assigned for establishing and maintaining consistent branding experience across distribution platforms
Conducting scheduled review of shared OIRT documentation for accuracy and relevancy as part of self-service and knowledge transfer
Objective 4.2: Support effective means of internal and external communications for all University constituent groups.
Key Strategies:
Develop a comprehensive plan for digital signage across the campus.
Optimize the effectiveness of the University calendar, event, and notification systems.
Research and provide technical solutions to enhance communications with alumni, the community, and donors.
Leverage VoIP capabilities to improve communications throughout the University.
Objective 4.3: Institutionalize knowledge centered support (KCS) and self service capabilities.
Key Strategies:
Develop and implement just in time knowledge centered support (KCS) methodologies.
Develop an in-house knowledge base and self-service capabilities to ubiquitously deliver support content.
Foster student internships as an innovation center to develop and publish creative content.
Champion the development and distribution of institution-wide content on any device, at any time.
2024 OIRT Update:
Implemented and enhanced existing products with self-service capabilities
Student Information System
ITSM platform
8.1.1 ERP Evaluation
ERP projects impact the entire organization – they are not limited to just financial and operating metrics. The disruption is felt during both implementation and in the production environment. Missteps due to a lack of strategy can cost time as well as financial resources. Over half of ERP projects fail to achieve their planned business objectives.
An ERP strategy is an ongoing communication tool for the business. Accountability for ERP success is shared between IT and other institutional business units. An actionable roadmap provides a clear path to benefits realization. Align the ERP strategy and roadmap with business priorities; securing buy-in from the business for the program including the identification of gaps, needs, and opportunities in relation to business processes; ensuring the most critical areas are addressed and to assess alternatives for the critical path(s) most relevant to FDU’s direction. Upon completion, a roadmap that promotes structure and accountability by categorizing and prioritizing work initiatives, and by identifying resources, timelines, and investment.
8.1.2 VoIP
The aging POTS infrastructure will become too expensive to upkeep, and telecom companies are investing in the latest technology like fiber optic cables and 5G. VoIP is built on internet protocols and works via Ethernet cable, Wi-Fi, and even LTE. One can make VoIP calls from any internet connected device – including traditional desktop phones (older models just require a small adapter to connect to Ethernet ports).
VoIP is constantly evolving and due to the nature of VoIP contracts (monthly subscription-based), customers can take advantage of software and hardware advancements without having to pay more. It’s a competitive market, so new features and even greater reliability and security protocols are being put into place.
Most importantly is the promise VoIP brings as a springboard from which one can access new business communication capabilities. It’s a great first step on the road to fully Unified Communications, which integrates voice calling with other advanced office communication features like video conferencing.
The promise of unified messaging (a business term for the integration of different electronic messaging and communications media technologies into a single interface, accessible from a variety of different devices) will enable efficiencies and streamline communications channels throughout the University.
Objectives
Expanding unified communications capabilities to extend the campus telephone experience to off-campus and mobile devices
8.1.3 Virtual Labs
Classroom technology is evolving rapidly. Virtual laboratories are making it easier and less expensive for students to do experiments remotely. Here are some of the benefits of virtual labs:
Flexible access. Perhaps the most often cited benefit of any online learning is that it can be done at the student’s convenience and when he or she learns best. The same is true of virtual laboratories if the experiments are on the student’s own time. In some cases, a virtual lab may be used during regular class time which narrows this benefit but still allows flexibility for the teacher who is not limited by using resources within a strict timeframe.
Instant feedback. Students can redo experiments on the spot while they are still in a critical thinking mode. All the results are recorded, making communication between teachers and students more efficient too. Experiments no longer have a “one chance” option and students can analyze what went wrong immediately and give it another shot.
Top-notch equipment. Schools and students that use virtual labs have access to cutting-edge technology when it comes to experimentation. Companies that build and maintain virtual labs must compete with each other to stay ahead of technology progression and that raises the quality of options for students. With a virtual lab, students do not have to settle on outdated, yet expensive, equipment because a school cannot afford to replace it consistently.
Lower costs. There is a fee associated with using virtual labs but the capital and maintenance costs are drastically reduced. Instead of one school footing the bill for resources, the cost is split among the clients of the particular virtual lab. This allows school to provide a better learning experience for students at a fraction of the cost.
2024 OIRT Update:
SIM Lab implemented with the support of OIRT providing a stable and reliable real-world experience to the School of Pharmacy
8.1.3.1 VR and AR in Data Visualization
Harnessing the combined power of Virtual Reality (VR), Augmented Reality (AR) and Artificial Intelligence (AI), enhancing the process of data analysis, presentation, collaboration, and general daily work flow. Revolutionizing the way we interact with information, data analysis, and presentation.
2024 OIRT Update:
Supporting the School of Nursing in piloting VR for training
8.1.3.2 STEM
Virtual and Augmented Reality are poised to profoundly transform the STEM curriculum. In this article, we offer several inspiring examples and key insights on the future of immersive learning and the sciences. Immersive technologies will revolutionize learning through experiential simulations, modelling and spatial representation of data, and a sense of presence in contextual gamification.
Understanding our place in the universe, building the next Martian Rover, designing new transportation systems, fostering sustainable communities, modeling economic stability — finding the solution for these pressing and interconnected challenges brings us to STEM and STEAM in teaching and learning. The movement behind STEAM advocates incorporating the arts and humanities to the science, technology, engineering and math curriculum.
8.1.4 VDI – Virtual Desktop Infrastructure
Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. Desktop virtualization can be used in conjunction with application virtualization, user profile management systems, now termed “user virtualization,” to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems. If a user’s device or hardware is lost, the restore is straightforward and simple, because the components will be present at login from another device. In addition, because no data are saved to the user’s device, if that device is lost, there is much less chance that any critical data can be retrieved and compromised.
8.1.4.1 System Architectures
Desktop virtualization implementations are classified based on whether the virtual desktop runs remotely or locally, on whether the access is required to be constant or is designed to be intermittent, and on whether or not the virtual desktop persists between sessions. Typically, software products that deliver desktop virtualization solutions can combine local and remote implementations into a single product to provide the most appropriate support specific to requirements. The degrees of independent functionality of the client device is necessarily interdependent with the server location and access strategy. Virtualization is not strictly required for remote control to exist. Virtualization is employed to present independent instances to multiple users and requires a strategic segmentation of the host server and presentation at some layer of the host’s architecture. The enabling layer—usually application software—is called a hypervisor.
8.1.4.2 Remote Desktop Virtualization
Remote desktop virtualization implementations operate in a client/server computing environment. Application execution takes place on a remote operating system which communicates with the local client device over a network using a remote display protocol through which the user interacts with applications. All applications and data used remain on the remote system with only display, keyboard, and mouse information communicated with the local client device, which may be a conventional PC/laptop, a thin client device, a tablet, or even a smartphone.
Remote desktop virtualization is frequently used in:
Distributed environments with high availability requirements and where desk-side technical support is not readily available, such as branch campuses.
Environments where high network latency degrades the performance of conventional client/server applications.
Environments where remote access and data security requirements create conflicting requirements that can be addressed by retaining all (application) data within the data center – with only display, keyboard, and mouse information communicated with the remote client.
Remote desktop virtualization is also used as a means of providing access to Windows applications on non-Windows endpoints (including tablets, smartphones, and non-Windows-based desktop PCs and laptops). Remote desktop virtualization can also provide a means of resource sharing, to distribute low-cost desktop computing services in environments where providing every user with a dedicated desktop PC is either too expensive or otherwise unnecessary. For IT administrators, this means a more centralized, efficient client environment that is easier to maintain and able to respond more quickly to the changing needs of the user and business.
8.2 Organizational Evolution
8.2.1 CIO | University President | FDU Alignment
We must reposition the role of IT leadership as an integral strategic partner of institutional leadership in achieving institutional missions. This requires change leadership to assist institutional constituents (including the IT staff) to adapt to the increasing pace of technology change and to communicate effectively to stakeholders.
Mastering the basics
Filter through the alignment jargon by asking the right questions
Get a comprehensive look into the business from FDU’s President’s perspective
Ensure that IT stays on the right path
Stay on track with the President’s vision for the future of FDU
Invest in technologies that suit academic and business needs
Target alignment efforts effectively
Determine how IT can best support FDU’s top priorities
Address gaps by understanding the differences between the CIO and the University President
Deliver and communicate IT progress
Use the right indicators and metrics to evaluate your IT department
Deliver results in a way that allows the stakeholders to recognize IT progress
Build common leadership language, strengths and a culture of inclusion by investing in a continuing leadership development program and ongoing activities that bring IT leaders at all levels together
2024 OIRT Update:
Increasing OIRT presence in business governance and steering committees creating a bidirectional relationship with various stakeholders;
President’s Leadership Team
OIRT Executive Governance
Data Governance Committee
Introduction of the Academic Technologies BRMO department to better align the core business and OIRT
OIRT teams establishing relationships with key stakeholders within individual departments creating strategic alignment and fostering a partner-type relationship
With the implementation of the ITSM platform, key data is now captured and available allowing for measurement of current OIRT performance and opportunities for improvement
Continuous Process Improvement Team in place to review customer feedback and find new opportunities to improve the customer experience
Feedback process implemented recording Customer Satisfaction
Scheduled review of Incident resolution time between OIRT and 3rd party Help Desk to ensure consistent and improving turnaround times
Quarterly newsletter published with relevant articles about the work within OIRT, article writers are comprised of non-managing personnel
Daily operations dashboard leveraging with near real-time statistics and auto update features made available for viewing with key stakeholders
8.2.2 Develop a Technical Skills Sourcing Plan
The IT organization must acquire skills in the five trending areas – mobility, cloud, big data, social media, and security – within the next few years, or risk running a skills deficit. We must decide whether to retrain existing staff, hire new staff, contract, or outsource the work; poor decisions here will result in higher costs, delays, or inadequate quality. Having chosen a particular direction, IT must move quickly to define skill requirements and find appropriate talent, often in a very competitive market.
All industries are expected to be affected by the talent gap in the coming years. We need to plan ahead to address our organization’s future needs as the demand for talent far exceeds the supply of available professionals. We need to identify the skills that will be needed to meet our organization’s short- and long-term initiatives in order to systematically source skills. Then, we can develop roles that align with these skills and create the action plan to acquire skills.
Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. We need to plan ahead to address our organization’s future needs.
Base acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects our organizational strategy, initiatives, and pressures.
A skills gap will always exist to some degree. The threat landscape is constantly changing, and our workforce’s skill sets must evolve as well.
Ensuring adequate staffing capacity and staff retention in the face of retirements, new sourcing models, growing external competition, rising salaries, and the demands of technology initiatives on both IT and non-IT staff. Balancing and rightsizing IT priorities and budget to support IT-enabled institutional efficiencies and innovations in the context of institutional funding realities
2024 OIRT Update:
OIRT has taken a Standardization First approach for the planning, implementation, and support phases for both Wroxton and Vancouver campuses
Site Agnostic Implementation and Support Teams
Continued adoption of Ellucian Colleague and related products throughout campuses where applicable
8.2.3 Best Practices and Frameworks
Adopting IT Service Management (ITSM) principles is key towards organizational maturity and agility. ITIL, CoBit, and CIMM offer frameworks to optimize and standardize current end-to-end business processes to use industry best practices that are provided by our administration systems. We need to evaluate, and where appropriate, implement ITSM best practices to meet institutional needs.
2024 OIRT Update:
FDU managed ITSM software (TOPDesk) rolled out and now capturing data and metrics for technology resources.
Modules released include Ticket Management, Project Management, and Change Management, Contract Management
Adopting an Agile type of approach for product management and delivery ensuring continuous alignment with organizational demand
8.3 Professional Development
Develop a professional development plan to engage, enlighten, cross train, and reward IT staff for acquired knowledge, implementation, and process improvements.
9 Measures of Plan Success – KPIs
Security Posture Index
Industry recognize security index, measured quarterly against peer universities.
Client Satisfaction (students)
The percent of students satisfied with Technology Services.
Client Satisfaction (faculty)
The percent of faculty satisfied with Technology Services.
Client Satisfaction (Staff)
The percent of staff satisfied with Technology Services.
Calls resolved on first contact
Percent of support incidents resolved on the first contact with the UTAC
Unplanned Effort
Percent of technology resource time spent on unplanned work in each quarter
ROI and Digital Foundation Ecosystem
Number of technology projects that yield a positive return on investment.
Strategic Alignment Index
The measure of the contribution of technology projects to the achievement of the FDUs institutional goals, determined in collaboration with the client.
10 Conclusion
11 Acknowledgements
This work has incorporated independent research, interviews with students, faculty, and staff, technology vendors and industry analysts. Many ideas, thoughts, and strategies were developed from peer institutions, EDUCAUSE, Gartner, InfoTech, and others.
This plan represents a refined and collective process to forecast educational and technological trends that will change the face of higher education.
12 Appendix
12.1 Scope of IT at FDU – An Overview
Fairleigh Dickinson University IT provides the following services:
Administrative systems which enables the fish and administrative functions by providing systems that support the achievement of institutional goals services include access to management of student business and public safety systems as well as facilitating integration between the systems.
Client support which provides clients with a digital workspace that enables effective performance. Services include desktop and software management, printers, Storage Solutions, research computing, and much more.
Communication Services that promotes information sharing some communication and collaboration, enabling the FDU community to work together effectively. Services include online collaboration, video conferencing, messaging, email, event services, and digital signage.
Teaching and Learning supports achievement of student success by fostering the 21st century teaching and learning environment. Services include academic support resources such as Blackboard, technology in classrooms and smart computing labs, lecture capture, and more.
Analytics and reporting enables decision makers by providing a full range of reporting and business intelligence tools. Services include data analysis and mining, predictive analytics and then, creation of interactive dashboards, data visualization, and ad hoc reports.
Mobile and Web Services empowers the FDU community to engage their clients using dynamic, secure recognizable web and mobile solutions. Services include custom application development, business process Automation Solutions, web site hosting and management, web content management, user experience, and mobile app development.
Consulting Services assists clients in the optimizing use the technology to solve challenging institutional needs. Services include research consulting, visualization, three D modeling, project management, process improvement, new technology solution valuations, and more.
Cyber Security Services reduces the risk of cyber security threats by protecting FDU’s technology assets. Services include secure computing such as data protection and encryption, and vulnerability scans.
12.2 University IT Strategic Plan Teams
12.3 University IT Strategic Plan Documents
12.4 Technology Budget
Operating:
For FY19, the total operating budget was $5.7M. Of that, almost $1.7M represented software licensing; another $800,000 represents contracted Help Desk and contracted tier 1.5 technical support; $870K represents equipment leases (laptops, desktops & Servers); $696K represents equipment service contracts; 500K represents Internet and Inter-campus data lines; and $195K represents telephone services. In total, the contractual commitment of the OIRT budget was about 4.761M or 83%, leaving about $940K available for office operations, data and lab center operations, non-contracted repairs and maintenance; and the ability to meet new demands for services as they come up. While this budget might appear significant, when you consider the size and scope of the University combined with the continuing and growing demands from faculty and students, coupled with the needs and desires to use technology as an instrument of recruitment and retention, these dollars are small by any measurement.
Compensation:
The OIRT compensation budget for FY19 was $5.1M which includes a $296K (6%) vacancy factor. For years leading up to Y2K, our ability to hire and retain employees was extremely challenging and our vacancy was therefore high. As a result, the vacancy factor was created to help balance the budget based on the reality of spending and the difficulty in fully funding the budget. While Y2K may have been over nineteen years ago, that vacancy factor still haunts us and causes an operational challenge to balancing the budget each year.
Another piece noteworthy of mentioning is that of the total compensation budget, $155,000 (3%) is allocated to student assistants. These student assistants operate (or staff) the computer labs which are open more than seventy hours per week. At the Metropolitan campus, this includes two separate locations (Dickinson Hall and University Hall). At the Florham campus, it includes lab assistants in Dreyfuss, ZEN and the Library.
The Technology Fee:
Created, approved and communicated as a dedicated fee in 1999, this fee was established to help meet the growing demands of technology. It was further agreed that this fee would increase as necessary with the additional funds going directly back to OIRT in support of its mission.
Based on a twelve month look back on actuals, the total revenue generated by the Technology fee is approximately $5.9M. This represents 54% of the OIRT combined Operating and compensation budgets.
IT Capital Refurbishment Plan and Budget:
During the latter half of 2017, we developed a five-year (2017-2022) CAPEX IT plan to provide financial vision and guidance in making CAPEX investments that keep our physical assets up to date and thus allowing us to remain competitive and maintain service levels at the University. The primary drivers of the CAPEX plan are to help cut costs and boost efficiency; replace or upgrade old assets; meet new requirements or take advantage of opportunities; and help the University gain and maintain competitive advantage. A capital budget in the amount of $1M per year has been set aside and is under the control of the Senior VP for Finance and Administration.
IT Capital Enhancement Plan and Budget:
What is not included in any of the budgets above is capital funding for new innovative initiatives. The budget above maintains and enhances the status quo. Working with the Deans and members of the IT Executive Governance Committee, we will develop a baseline set of new priorities coupled with the associated costs. While no funding sources will be initially identified, this plan, coupled with the priorities and costs, will act as a framework for planning to that end.
12.5 Imperatives, Objectives and Tactics
12.5.1 ERP Evaluation
ERP projects impact the entire organization – they are not limited to just financial and operating metrics. The disruption is felt during both implementation and in the production environment. Missteps due to a lack of strategy can cost time as well as financial resources. Over half of ERP projects fail to achieve their planned business objectives.
An ERP strategy is an ongoing communication tool for the business. Accountability for ERP success is shared between IT and other institutional business units. An actionable roadmap provides a clear path to benefits realization. Align the ERP strategy and roadmap with business priorities; securing buy-in from the business for the program.
Identification of gaps, needs, and opportunities in relation to business processes; ensuring the most critical areas are addressed.
Assess alternatives for the critical path(s) most relevant to our organization’s direction.
Develop a roadmap that promotes structure and accountability by categorizing and prioritizing work initiatives, and by identifying resources, timelines, and investment.
12.5.1.1 Analysis of Current Portfolio
Activities
Outputs
1.1
Conduct an inventory collection of key ERP applications.
ERP application inventory
1.2
Conduct an inventory of key processes related to the ERP applications.
ERP processes compiled
1.3
Develop a high-level current state map of applications.
Current state of application portfolio
12.5.1.2 ERP Needs and Solution Alternatives
Activities
Outputs
2.1
Determine remediation alternatives for current applications and validate with IT.
Future application needs
2.2
Review future solution alternatives for ERP – maintain, augment, optimize, transform, hybrid vs. cloud, etc.
Alternative solutions
12.5.1.3 ERP Gap Analysis and Strategic Initiatives
Activities
Outputs
3.1
Using gap analysis, identify application initiatives and categorize by objective.
Gap analysis
3.2
Define and prioritize application portfolio business value metrics.
ERP portfolio objectives
12.5.1.4 ERP Roadmap
Should FDU make the decision to migrate/adopt to another ERP platform
Activities
Outputs
4.1
Prioritize application initiatives.
4.2
Develop 3-5-year ERP roadmap.
Detailed 3-5-year ERP roadmap
4.3
Develop main executive communication messages
Executive communication messages
12.6 Supporting Documentation
12.6.1 eSports
The idea of colleges fielding teams for video games, an oddity just several years ago, now supports an athletic conference and is seeing major growth. What was perhaps a wild pipe dream decades ago has come true: colleges are paying students scholarships to play video games.
The concept of collegiate eSports has blossomed and become much more organized in recent years. Some smaller private institutions view gaming as a way to attract prospective students amid enrollment downturns, and even a number of Division I colleges and universities have entered this digital arena. Video games support an athletic conference and is seeing major growth and colleges are paying students scholarships to play video games.
The system works like this: Institutions form teams that train and compete with other institutions in some of the nation’s most popular strategy and battle video games. Those players often maintain stringent practice schedules that occupy a massive chunk of time, not unlike a typical athlete’s regimen.
Coupled with game design and development program, exclusively for students who want to design a new generation of video games and virtual reality on multiple platforms, it allows students to pursue their dreams and ambitions within the lucrative entertainment and software industry.
Game based learning, such as the initiative at Texas A&M, Design Teams brainstorms each game’s concept, mechanics, and background, incorporating learning objectives and prototyping concepts to test their validity. The Concept Team develops the look and feel, creating a style that effectively conveys the topics while engaging players. The 3D Team, specialized in procedural generation using technical modeling software executes the game’s visual target on a more massive scale. The Engineering Team brings all of the work to life, programming and integrating both the mechanics and art assets and performing quality assurance testing. Finally, the Management Team oversees and tracks the progress of all teams and operations, ensuring the quality and integrity of each project.
Employees/students are paid above minimum wage, receive royalties for any commercialized products they have worked on, and—most important—gain exceptional game development experience and exposure before graduating college.
With skilled and complete production teams, the help of subject matter experts, and a passion for game development, such programs have managed to create balanced interactive experiences that are both entertaining and educational.
12.6.2 Virtual Labs
Earlier this year, the Stanford Human Computer Interaction Lab released a free virtual reality simulation, The Stanford Ocean Acidification Experience, which transports students to a simulated ocean of the future. The goal of the simulation is to educate, spread awareness and inspire action on the issue of ocean acidification. Director Jeremy Bailenson and his team developed the experience in collaboration with Stanford marine biologists Fiorenza Micheli, Kristy Kroeker and Roy Pea, a professor at Stanford Graduate School of Education.
Designed as a field trip to a location that few scientists will ever visit in person, students use the HTC Vive headset to observe the effect of carbon dioxide on marine life and collect samples from the ocean floor. The simulation is one of many virtual experiences developed by the Lab in its mission to use VR in research and to “improve everyday life, such as conservation, empathy, and communications systems.”
Stanford Virtual Human Interaction Lab Ocean Acidification Experience
At the University of Michigan–Ann Arbor, a variety of STEM projects are supported through MIDEN (Michigan Immersive Digital Experience Nexus), formerly known as the CAVE. The CAVE concept was originally developed through the groundbreaking work at the University of Illinois at Chicago. CAVE environments create an immersive experience by projecting stereo images on the inner surfaces of a room-sized cube. Users wear special glasses that, along with an optical motion-tracking system, help render digital objects in response to the viewer’s position. Since the system is “see-through” users can see their own hands and actual physical objects can be brought into the space.
The College of Engineering uses MIDEN to experiment with 3-D building models to better understand the structural stability of engineering projects. Students and faculty in other programs use it for architectural walkthroughs, virtual reconstruction of archeological sites, human ergonomic studies and training scenarios for dangerous situations.
Among a variety of projects at Texas A&M, students and faculty in the Immersive Mechanics Visualization Lab are bringing computational and experimental data into AR and VR environments. In virtual reality, 3D CAD models can be manipulated and refined within virtual worlds, turning industrial design into a highly intuitive and collaborative process.
In addition to their work in the lab, Professor Darren Hartl and undergraduate student Michayal Mathew connected with high school students to help them prepare for an international STEM competition, by inserting their 3D CAD designs into a virtual world, which allowed aerodynamic experts to provide feedback on their car models using Tilt Brush.
As Matthew pointed out, “To be honest, seeing things in 2-D on a whiteboard just doesn’t cut it, because almost all our important concepts are three-dimensional.” For Professor Hartl, these projects serve as an opportunity to assess whether his graduate students can improve their intuition about their results by interacting with data in virtual environments.
Immersive Software Platforms
If you can turn your data into a VR world, how about stepping into a VR science lab? This is what Labster and other software platforms are doing to bring immersive technology into the STEM classroom. Labster has developed a suite of advanced lab simulations that encourage open-ended investigation. With a gamified experience, students can play the role of a CSI-type forensics analyst who solves a crime. More importantly, the simulations provide access to high-cost NGS machines and electron microscopes that many institutions are unable to afford. While today Labster is a platform for learning, tomorrow’s science research will likely happen over distributed virtual environments.
Students as Creators
While research centers will continue to build advanced immersive labs, the developments in standalone VR headsets and software platforms like Unity and Unreal engine are driving a democratization of immersive experiences. New VR native applications like Tilt Brush will enable our students to become creators in virtual worlds. They will not only have the opportunity to observe unseen phenomena but to prototype solutions to complex problems.
NYU’s Tandon School of Engineering made a splash with its Tandon Labs experience at the 2017 SXSW Gaming Expo. Incoming students at Tandon for a second year were sent a 3D cardboard viewer in their acceptance packages. It took them into a game-like environment that “. . . enables users to explore and engage with a microscopic, intracellular world.”
The game built on the research by Alesha Castillo, an assistant professor in the Department of Mechanical and Aerospace Engineering, the project was done in collaboration with NYU’s Mobile Augmented Reality Lab, and a graduate student from the Integrated Digital Media program. Using a female undergraduate to narrate the experience, it also helps support Tandon’s commitment to diversity. Projects like this inspire and encourage collaboration across disciplines.
Immersive Technologies and the Future of STEM
World Science Festival: Global VR Classroom
Scientists are also using immersive technologies to communicate difficult concepts to the broader public. Brian Greene, the director of Columbia’s Center for Theoretical Physics, uses VR to explain string-theory which posits that the universe exists in more than three dimensions. As part of the World Science Festival in New York, Greene taught a featured session on string theory with students from across the world wearing VR headsets. We can expect to see many more immersive global experiences transforming the classroom.
At NASA, scientists and engineers use Microsoft’s HoloLens mixed reality headset to collaborate in building a true-to-scale visualization of the next Martian Rover in an embodied experience, which is something unique to immersive technologies. They also use HoloLens to “teleport” to Mars “walk on” the Martian surface to determine the optimal path of the current Rover. While today this only available to people at JPL, in the future researchers and students from universities and libraries across the world will be able to participate in the explorations of the solar system.
Microsoft and JPL create virtual Mars with Hololens
All these projects are a window into the future of STEM education. Immersive technologies along with AI, computer vision and machine learning will transform engineering, enable scientists to visualize data to advance exploration research, and provide new opportunities for collaboration between faculty and students and across disciplines.
This document outlines how the help desk should handle issues regarding supporting personal hardware.
All support tickets for personal hardware will need to be created and supported by the help desk. Limited support will be provided by completing basic troubleshooting and diagnostics.
This includes:
Laptops and Desktops
iMacs and MacBooks
Docking Stations, Monitors, and Peripherals
Mobile phones and Tablets
Note
The help desk should communicate directly to the users that limited support can be provided for personally owned devices, the Help Desk will assist by providing the below troubleshooting steps. Escalation of the request to Computing Services can be performed. If additional support is needed Computing Services will direct the user to contact their hardware manufacturer for additional support directly if needed.
The following basic troubleshooting steps can and should be performed when any of the above hardware is having issues:
The device should be power cycled and/or rebooted to ensure all device resources have been refreshed.
If the machine or device is frozen locate and hold the power button for a minimum of 60 seconds until the device has powered down and then have the user power on the device and attempt to use the equipment.
The help desk can check and confirm if any updates have recently been loaded on the workstation that may be pending a machine reboot to complete the installation.
The following should not be performed on any personal machines:
Upgrading or downgrading of any Microsoft or Apple operating system.
Removing and/or reinstalling any licensed software such as but not limited to Microsoft Office, Microsoft Visio, Microsoft Project, Adobe Creative Cloud, etc.
Other software such as antivirus, games, or manufacturer-issued diagnostic utilities.
Regarding the troubleshooting of issues related to personal docking stations, monitors, peripherals, mobile phones and tablets. The basic functions of unplugging the power cable and/or power cycling the equipment will be the acceptable troubleshooting necessary.
We do not want to perform any updates for devices operating systems such as mobile phones or tablets. The steps involved in completing these kinds of updates require a more extensive timeframe to be available to successfully be completed.
If you have any questions or require additional information, please contact the FDU Director of Computing Services Peter Mannarino via email p.mannarino@fdu.edu
Microsoft has implemented a new feature to its mail client called Clutter. Clutter acts as a filter that separates e-mails that it Deems low priority. The e-mails are placed in a folder and are out of sight, with no notifications visible to the user. The problem with Clutter is that it is a learning program that tries to guess what emails are important or low priority and might filter out emails that you need.
Disabling Clutter rules in Outlook
If you wish to disable clutter, log in to Office 365 using our portal office365.fdu.edu with your NetID credentials.
Look for the settings icon on the upper right corner of your window and click on it
Click on the “Mail” option under “Your app settings”
Drill down to “Mail > Automatic processing > Clutter”
Unused Teams and Groups can accumulate and become a burden to resources over time. To prevent this from happening, Fairleigh Dickinson University has implemented an expiration policy for Teams and Groups. This article will explain the expiration policy and provide you with information regarding renewal.
What is the FDU expiration policy for Teams and Groups
Any Team or Group inactive for 365 days or more will expire
Team and Group owners will be notified 30 days, 15 days, and 1 day before the team’s expiration date. If the Team or Group is not renewed before expiration, it will be deleted.
Note
Expiration notices for groups used in Teams appear in the Teams Owners feed.
The expiration period of 365 days begins at the creation of the Team or Group, or the date it was last renewed
Note
When the policy goes into effect, all groups that have already passed the 365 days period will expire. Affected group owners will be notified to renew.
How to renew a Team or Group
There are two methods to prevent the Microsoft 365 group from being deleted.
The group owner can manually renew the group by clicking the button in the warning message
A member of the group can perform a monitored user activity:
SharePoint: view, edit, download, move, share, or upload files (viewing a SharePoint page does not count as an action for automatic renewal)
Outlook: join or edit group, read or write group messages from the group, and like a message (Outlook on the web)
Teams: visit a teams channel
Yammer: view a post within a Yammer community or an interactive email in Outlook
Forms: view, create, or edit forms, or submit a response to a form
When the team owner receives the expiration notification, go to the Team’s group “Manage team” option and click on Renew now as shown below
Whenever the Microsoft 365 group is renewed by any of the methods mentioned, the group’s lifetime will be extended for another period of 365 days.
What are Microsoft 365 Groups
Microsoft 365 groups are created from a variety of tools including Outlook, SharePoint, Planner, and Teams. Microsoft 365 groups allow you to choose a set of people to collaborate with. You can use Microsoft 365 groups to communicate with others, share files, and apply permissions to shared resources.
Who are Group Owners
When a Microsoft 365 group is created, the person creating the group is designated as the owner. After adding members to the group, the primary owner can also promote other members to owner status. We suggest that when practical, Microsoft 365 groups have at least 2 owners. This can be important as only the group owner will receive the warning messages. In some cases, the group owner may have removed themselves from the group or left the university entirely. If you find yourself a member of a Microsoft 365 group without an owner, please contact support by creating a SAMI Support Request.
Groups without Owners
Ownerless or orphaned Groups may be deleted by USAN. USAN will notify Group members prior to deletion, but if they receive no response, the Group will be deleted. If USAN deletes a Group, all the records associated with the Group’s shared space will be deleted as well
Automatic Renewal
Groups that are actively in use are renewed automatically setting the days to zero. Any of the following actions will auto-renew a group:
SharePoint – view, edit, download, move, share, or upload files. (Viewing a SharePoint page does not count as an action for automatic renewal.)
Outlook – join the group, read or write group messages from the group, and like a message (Outlook on the web).
Teams – visiting the Teams channel.
Recover Deleted Teams or Groups
When the 365 days limit hits, the Microsoft 365 group will expire and be put into a “Soft-deleted” state. Which means it can still be recovered for up to 30 days. To have the Microsoft 365 group recovered please contact support by creating a SAMI Support Request and include the Microsoft 365 group or Team name to be recovered.
Where to Get Help
For assistance with Microsoft 365 groups, please contact support by creating a SAMI Support Request. We can answer questions about the expiration policy, renewing groups, and updating group owners.
Microsoft 365 email has filters to protect users from spam and malicious emails like phishing scams.
Messages caught by the filters are placed in quarantine for Fairleigh Dickinson University and its users’ protection. Users will receive a Spam Notification message once a day, notifying them of any messages placed in quarantine. Any legitimate mail caught by mistake can be released directly from this message or from the quarantine portal.
Warning
Mail left in quarantine will automatically be deleted after 15 days.
Handling Quarantined Email
Legitimate messages placed in quarantine may be released into your inbox in one of two ways:
From the daily spam notification email message
If you receive mail that has been placed in quarantine, you’ll receive an email message from quarantine@messaging.microsoft.com. The message will look like the one below:
Note
You will only receive an email if you have items in quarantine.
The following options will be available to you by clicking the respective links in the email notification or you can choose to do nothing.
Review Message – go to the Microsoft 365 Security & Compliance Center to review it
Release – the message is removed from quarantine and placed in your inbox
Block Sender – add the sender to the Blocked Senders list in your mailbox
From the Microsoft 365 Security & Compliance Center
Quarantined email can also be handled in the Microsoft 365 Security & Compliance Center.
Microsoft has released a new version of Outlook that will eventually replace the classic version. The new Outlook for Windows brings the latest features, intelligent assisted capabilities, and a new modern and simplified design to your Outlook app. The New Outlook has many features and is vastly different visually from the classic version of outlook presently installed on all university owned computers.
The New Outlook is compatible fully with all Office365 functions but because there are some features missing that presently exist in the classic Outlook, FDU IT highly recommends NOT switching to the new Outlook currently, especially since not all features are present and Microsoft is still developing the new Outlook.
Some of the features not available in the New Outlook are:
Existing Offline Outlook files called PST files stored locally on your computer
Virtru Email Encryption Client: While the Add-on is not supported, you can still send and receive encrypted email using the “#secure# tag in the subject line of the email
Adobe Acrobat and/or Foxit PDF Professional Outlook using the COM-Add-ins platform
Zoom Outlook Plugin or any other Meeting platform using the COM-Add-ins platform
Any other third-party COM-Add-in
Custom Macros or Custom Visual Basic functions manually added
Many Rule templates and options are not available
Note
The New Outlook has already been deployed to university owned macOS devices, due to the number of enhancements it provides, and that COM-Add-in platform was a Windows only feature.
Turn on the toggle “Try the new Outlook” which will begin downloading the New Outlook
From the Success window, select “Switch”. This will close the current version of Outlook and New Outlook will sign you in automatically. Select “Next” to accept the privacy settings
Select an option about sending optional data, and then select “Accept”. Review the privacy information about connected experiences, and then select “Continue”
Select “Import Settings” to bring over your settings from classic Outlook. New Outlook will begin adding your accounts
The new Outlook for Windows will open once the setup is complete, and you can start reading and sending emails immediately.
New Look
This is the new Outlook mail icon. It might also include the word NEW.
When you open new Outlook, you’ll see the following tabs on the ribbon: Home, View, and Help. This version includes Settings which is available in the navigation header. Settings is where you can customize your Outlook experience.
Note
If you are using the new outlook and never created an account using the Classic Outlook, you will have to create a ticket using FDU SAMI Support by clicking the Support button at the bottom of this page.
If you switched from the classic Outlook for Windows, you’ll have the option to migrate some of your settings, which you can learn more about on following the link below:
The top bar of the app should be familiar if you’ve used any apps like Word or Excel before, including the classic Outlook for Windows.
Known as the ribbon, it is the place to find the commands you need to manage your inbox or format emails. You can make the ribbon larger (the classic experience) or smaller (the simplified experience) using the dropdown arrow on the right side of the bar. If you want to personalize the commands you see in the simplified ribbon, select Customize.
On the left side you’ll see the navigation bar, which makes it simple to switch to Calendar, Contacts, or any other app you frequently use. For quick access to your calendar or tasks without leaving the inbox, you can use My Day by selecting the icon in the upper right.
Do you ever have trouble tracking down that key email thread you’re actively responding to? Or is there an email with key information you frequently refer to? Now, simply right-click any message and choose. Pin and that email will appear at the top of your inbox, saving you time from having to go back and search for it.
Snooze an Email
Sometimes email is very important, but not yet. With the Snooze feature, you can schedule a time for the email to be re-delivered to your inbox, appearing at the time you want it to, so you can handle it when it’s the right time for you. Just right-click any message and choose Snooze, or select Snooze from the ribbon. Then choose the time you want it to be delivered.
Scheduling Poll (Formerly Find Time)
Schedule an Email
In today’s hybrid work world, your day might be someone else’s night, so you don’t want to send an email to someone in the middle of the night. With the new Outlook, it’s simple to send an email when you want to. Just select the dropdown arrow next to Send and choose Schedule send.
You might be familiar with categories, but they’ve been significantly upgraded. See the category names and colors directly on your messages in your inbox. Want to see everything you’ve tagged with that category? Just click it right on your message. You can even add a category to your Favorites.
In Outlook, go to the navigation bar and select “More Apps > Add apps”
Tip
You can also access the Store from the Apps button to install an add-in directly from a message or appointment.
Note
Only Approved Addons will be allowed to be installed. To request an Addon, Open a Sami Support Ticket.
For guidance on how to locate the Apps button to access add-ins while reading or composing a mail item, see Use an add-in in Outlook following the link below:
In the “Apps” page, search for the add-in you want from the available list. Alternatively, if you’re after a specific add-in, enter its name in the search box. When you find the add-in you want to install, select it to learn more about the add-in and review its privacy policy
When you’re ready to install the add-in, select “Add”
Add-ins Installed by your IT Admin
If you’re part of an organization and a new add-in is installed for you by your IT admin, the add-in will be available on the read or compose surface where it’s designed to work. For guidance on how to access an add-in, follow the link below:
The location of where an Add-in is installed depends on whether you’re reading or composing a mail item.
Tip
If you moved from classic Outlook for Windows to the new Outlook for Windows, note that the location of add-ins is different. While add-ins are accessed from the ribbon or app bar in classic Outlook, access to add-ins in new Outlook for Windows depends on whether you’re reading or composing a mail item.
For guidance on how to use Add-ins in classic Outlook, visit the link below:
Select a message in the Reading Pane or open a message in a separate window
From the action bar of the message, select “Apps”
Select the “Add-in” you want to use
Tip
Customize your action bar to quickly access your add-ins. In the message action bar, select the ellipsis button (•••), then choose Customize actions. In the Addins section, check the boxes for the add-ins you want to see in the action bar.
Use an Add-in While Composing a Message
Create a new message or reply to an existing one
From the ribbon, select the “Message” tab, then choose the Add-in you want to use. If the Add-in doesn’t appear in the ribbon, select “Apps” to view your installed add-ins
Use an Add-in While Viewing or Scheduling a Meeting or Appointment
Open an existing appointment or create a new one
Tip
If you want to use an add-in on an existing meeting or appointment, you must open the meeting or appointment in a pop-up window to view the ribbon.
From the ribbon, select the “Add-in” you want to use
Delete an Add-in
Go to the navigation bar and select “More Apps” then “Add Apps”
On the “Apps” page select “Manage your Apps”
Under “Manage your Apps” find the app you want to delete and select “More options” then “Remove”
As of November 2023, the Microsoft 365 Groups experience in Outlook is generally available for Outlook on the web and new Outlook for Windows. Access new Groups by selecting Groups on the navigation bar.
Tip
New Groups in classic Outlook is available in Build Version 16.0.16714.10000 or later. To access new Groups in classic Outlook, from the navigation bar select More Apps > Groups.
New Outlook Groups
Groups in Microsoft 365 let you choose a set of people that you wish to collaborate with and easily set up a collection of resources for those people to share. Resources such as a shared Outlook inbox, shared calendar or a document library for collaborating on files.
Outlook now has a new home for Microsoft 365 Groups - one place to connect, communicate, and collaborate with your team. Groups Home provides a central destination to get critical information from all the different groups you may be part of.
Benefits of the new Groups experience include:
Group Home landing page – Stay updated on your groups, including recent files across all your groups. From Home, you can access frequently used groups and find new ones based on your interests.
Recent groups and Recent files – Find recent active groups and quick links to get to files, emails, events, and member management from the Groups Home landing page.
Revamped individual Groups experience – Create, consume, and share information related to a particular group, as well as manage events and members efficiently in fewer clicks.
Accessing New Groups
In the New Outlook, from the navigation bar select “Groups”. This takes you to Groups Home.
In the Classic Outlook, from the navigation bar select “More apps” then “Groups”.
Tip
To pin, right-click Groups and select Pin.
From Groups Home you can see all your groups at once. Or, when you select an individual group, you can:
Send an email to the group, access and edit your group settings and preferences, and manage group membership as needed.
Access the group email, files, events, and members by selecting the respective tab.
Access connected apps like Teams, SharePoint, OneNote, and Planner.
Talk
Conversations in Microsoft 365 Groups in Outlook happen in the shared inbox for the group. Users can read and reply to messages, and members can easily search or scroll back through the message history to get caught up on what’s been discussed before. The shared inbox looks a lot like the personal inbox that Outlook users are familiar with. Each conversation appears separately in the message list at the left and clicking on one will open it in the reading pane. If a user marks a message, or conversation, as read it doesn’t affect how the messages appear for other members of the group so you don’t have to worry that other members may miss an important message.
The shared inbox for your Office 365 group is where conversations occur.
Tip
A recent change in the way messages are displayed, and counted, in Outlook may have reset the number you see next to your group name in the Outlook navigation pane. If you want to reset that number to zero you can right-click the group and select Mark all as read.
Now that you’ve got your group created, let’s start a new conversation. You can post a new message by opening the shared inbox for the group and clicking New Conversation on the Ribbon. Or you can simply send an email to the group’s alias. All members of the group will be able to read the new message you’ve posted and any members who follow the group will get a copy of your message in their personal inbox.
Share Files
Each Microsoft 365 Group gets a shared files library where you can store, share, and collaborate on documents, workbooks, presentations, or just about any kind of file.
Access the files library by going to your group in Outlook (on the left navigation pane) and click Files on the Ribbon. The files library will open in a browser and from here you can create new files, upload files from your computer and do just about anything else a SharePoint document library can do. Think about what kind of files would be useful to share with your group, and don’t feel limited to Microsoft Office files. You can also share PDFs, photos or just about any other kind of file that your group would find useful.
To download or delete a file just select it and those options will appear on the toolbar at the top.
Collaborate
Each Microsoft 365 Group gets its own shared OneNote notebook where they can gather ideas, collaborate and store research.
Go to your group in Outlook by finding it on the left navigation pane, or in Outlook on the web by going to the People tile. Once you’re there click Notebook on the Ribbon to open the group’s shared notebook.
The first time you open the group’s shared notebook it will open in the browser in OneNote for the web. You can make edits there, or if you have OneNote 2016 and you’d prefer to use that just click Edit in OneNote from the Ribbon. Once you’ve opened it in OneNote the notebook will sync to your list of open notebooks and you can access it directly from within OneNote without having to go to the group first.
Try going to your group’s OneNote notebook and think about what might be useful for the group to collect ideas and collaborate on. For example you might have a section that you use to gather and comment on web content that is relevant to your team.
Plan Events
Chances are good that your group has events, meetings, milestones or other items that would benefit from a shared calendar. Each Microsoft 365 Group has a shared calendar that all members can see and contribute to.
Working with the calendar of your group is no different than working with your personal calendar. If you select the calendar button on the navigation pane, you’ll see your personal calendar, plus the shared calendars of any groups you’re a member of. You can check the boxes next to each calendar you want to see and view them side by side or overlapped.
Adding an item to the shared calendar works just as it does on your personal calendar. Any meeting you add to the shared calendar will invite the other members of the group to that event as well, so they can have it on their own calendars. Appointments added to the shared Group calendar do not appear on the personal calendars of other members.
Now that you’ve got your shared calendar try adding any upcoming meetings or events that your group might be participating in.
Microsoft Teams is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration. Continue reading to find more information about the new Teams app, common features and settings most commonly used.
A New Teams client is rolling out! Though it looks nearly identical to classic Teams, it has been redesigned from the ground up to take advantage of future developments. Microsoft has discontinued the use of classic teams in July of 2024.
For a comprehensive list of all the new features of Microsoft Teams, click the link below:
Looking for the new Teams experience? The upgrade process itself is quick and silent, where Microsoft 365 will install the new Teams client in the background.
For all university owned computers, the new Teams app has been silently rolling out in the background and may be presented with as the following options to switch over
New Teams experience has been delivered to the device
You may be presented with an option to Upgrade your device with the New Teams experience
A notification prompt to switch your device to the new Teams experience
A “Try the new Teams” toggle switch will present itself if the new Teams app upgrade has completed but continue to use the classic Teams experience.
During the transition phase, which will end in June of 2024, you might see two icons. The old Teams is labelled Microsoft Teams classic (work or school), and the new Teams will be labeled Microsoft Teams (work or school). The new Teams will also have a cyan “New” label on the icon as well.
Windows 10 Search for Microsoft Teams
Windows 11 Search for Microsoft Teams
macOS spotlight search for Microsoft Teams
Note
The new Teams app should be used unless there is a specific reason not to (like troubleshooting a Teams Application issue).
For a complete list of all changes in the New Microsoft Teams, visit:
When you’re upgraded to the new Teams, your display settings will reset. Here’s how to change the most commonly accessed display settings.
Click on the “Ellipses” in upper right-hand corner, and then “Settings”
The default theme for new Teams is Light, which appears grey. Dark will color the window black. Classic will bring back the purple/gray theme from classic Teams
Another commonly changed display setting is Layout. You can choose your Teams to display in a Grid view, which is the new Teams default, or a List view, which will show all your Teams in a list on the left, similar to how Outlook displays folders.
There are many other settings in Teams, and we encourage you to review your device settings and video effects (blurred and custom backgrounds) prior to joining your next meeting. Custom backgrounds may need to be re-added.
What happened to my Contacts list on the Chat tab?
Microsoft has moved the Contacts list to the People app. You can find People by clicking the “…” tab in the left navigation bar and typing “People” in the search.
To pin it to your sidebar, right click “People” then select “Pin”
Note
If People is not able to be found when searching, this means that the People App is already Pinned.
close
Where are my Saved Items?
Saved Items are not currently available in new Teams. Microsoft plans to release a new functionality that will replace it and offer you a method for exporting Saved Items from Teams Classic in the near future. For now, Microsoft recommends using Classic Teams to access Saved Items.
close
Why are my Office documents opening in my browser or Teams app unexpectedly?
We have observed some cases where upgrading to new Teams will reset your file open preference. You can change it by going to “Settings > Files and Links” from the (•••) menu at the upper right.
close
Why can’t I tag some private channels?
We have observed that you cannot @ mention or tag some private channels in the new Teams experience. This issue appears most likely to affect older private channels and has been reported to Microsoft.
close
What happened to Groups?
Groups are now called Categories and how to create and manage categories will be discussed in the Section for Teams Chat.
close
What happened to Contacts?
Contacts have been moved to the People App. How to manage and use People will be discussed in the Teams Chat Section.
The page will automatically detect your operating system and redirect you to the appropriate desktop client (e.g. Windows, macOS) or mobile client (e.g. Android, Apple iOS).
The Microsoft Teams application is automatically pushed to all university owned computers. To determine if you already have it installed, search for “Teams” using the Windows Search Bar or Spotlight Search on Apple devices. If you are working on a university computer and you cannot locate the Microsoft Teams application, you can install by following the instructions below.
Windows – FDU Self Service Portal for Software
Press the “Windows key” on your keyboard and type “FDU Self”
Launch “FDU Self Service Portal for Software” from the search results list
Select the “Microsoft Teams” experience from the list and click “Install”
The classic Teams experience will be available until the end of June of 2024.
Web – Access the Office Web Application
The web client is a full, functional client that can be used from a variety of browsers including Google Chrome, Edge Browser, and Mozilla Firefox. Microsoft Teams will also be available on Safari soon.
Teams allow’s for text-based conversations using the Chat feature. Although it does not replace email in all use cases, it is a great tool for asking quick questions or just saying hello. When using chat, be mindful and adhere to FDU’s Written Information Security Program.
Select “Chat” from the left menu and then click on the top search bar
Classic Teams
New Teams
Type the name of the person you are attempting to locate and click on their name. Only FDU faculty, staff, and students are accessible in Microsoft Teams
Classic Teams
New Teams
You will be brought to the chat window and can start your conversation
The Chat window has many convenient tabs and shortcuts aimed at improving collaboration. Near the top of the screen, next to the name of the contact that you are chatting with, you will notice the default tabs, followed by a plus sign.
Classic Teams – Tabs
Chat: tab contains the conversation
Files: tab contains all files shared in during the conversation
Organization: Two person conversations, the Organizationtab shows your contact’s organization chart. This information is pulled from Office 365
Note
Datatel remains the authoritative source for this information and the data contained here is not intended to be 100% accurate.
In two person conversations, the “Activity” tab will list the latest activity of your contact
You can use the “+ sign” to create a new tab from a file or an app. This can be a quick and convenient way to access a collaborative file that was previously shared in the conversation
To the right of these tabs are a series of shortcut icons which perform the following functions:
Classic Teams – Shortcuts
Video call: icon starts a new video call
Audio call: icon starts a new voice call
Screen sharing: icon allows you to share your desktop or an application
Add people: icon is used to invite additional people to the chat
Pop out chat: icon creates a separate window with your chat
close
New Teams – Tabs
Chat: contains the conversation
Files: Contains all files shared in during the conversation
Add a Tab: Add an App to the tab list for all users
To the right of these tabs are a series of shortcut icons which perform the following functions.
Shortcuts – New Team
Audio Call icon starts a new voice call
Add people icon is used to invite additional people to the chat
Ellipses is used for additional features:
Open Chat in New Window: Pops chat in separate window
Schedule Meeting: schedules a meeting with individual
Screen Sharing: initiates a screen sharing session and calls individual
Pin: Pins person to pinned section in teams
Note
Depending on your screen resolution and application window size, your view may differ from the picture above, but all options outlined will be available.
The Chat function allows you to have conversations with one person or groups of people. In classic Teams, this is known as Contacts and in the New teams, this is called People.
The pane on the left-hand side of the screen is split into Recent and Contacts. Contacts acts like a rolodex that allows you to store and sort a list of the people you contact most frequently. The Recent list will display your most recent conversations with single people or group messages.
Types of Contacts
There are two types of contacts, directory contacts which come from your organization, and local contacts which you can add from scratch to your copy of Teams.
Directory contacts have some fields set by your organization, and additional fields which can be edited by you.
Local contacts are stored within your local copy of Teams, and do not synch with an organization’s directory.
Note
For contacts you create based on the company directory, the admin may control some of the fields, like the name and email. They will appear grayed out and you will not be able to modify them.
Classic Teams – Contacts
By default, the Contacts tab will already have a “Favorites” group. However, creating new groups can be a helpful way to organize your contacts. For example, you may wish to create a group for people that you are working with on a project or for people that you interact with from a department.
To create a new contact group, click “Create a new contact group” on the bottom of the pane
Enter a name for your group, and click “Create”
To add contacts to a group, click the “More options” icon (•••) next to the group name and select “Add a contact to this group” from the drop-down menu
Begin typing the name of your contact. Once you see their name appear, select it and select “Add”
You can add the same contact to as many groups as you would like. The chat with your contact will remain the same regardless of which group you are accessing the conversation from.
close
New Teams – People
Microsoft has moved the Contacts into the People App. By default, the People tab will already have a “Favorites” group and a “My Group” category. However, creating new categoriess can be a helpful way to organize your contacts.
For example, you may wish to create a category for people that you are working with on a project or for people that you interact with from a department.
Add People to Favorites
Find the contact you wish to be added to favorite and click the star in front of their name
Add People to Category
Next to the contact, click the ellipses button and then click “Add Category”
Type in the name of the new Category, search for an existing category, or select from the provided list
Screen sharing is one of Microsoft Teams’ most powerful collaborative features. You can show your screen to your colleagues and even grant them control to edit Microsoft Office files with you in real time.
Note
Before you get started, make sure that you are using the installed version of Microsoft Teams, as the browser-based Teams version does not support this functionality.
From the chat window or from an ongoing call, click on the “Screen Sharing / Share” icon
Classic Teams
New Teams
You be given a choice to either share your desktop or an application from the Microsoft Office suite, click on the window you want to share
Classic Teams
New Teams
Once you select the screen you wish to share, the members of your chat or call will be able to view your screen and request access to remotely control your desktop or program.
You can only share your screen with a mobile device user if you are engaged in an active voice or video call with them.
Creating a team provides remote team members with the ability to work together and share information via a common online space. You can also organize your information by creating channels to help optimize your team’s workflow.
To create a Microsoft Team, you must request one using an online form on SAMI Support. To request a team, follow these instructions:
Navigate to the SAMI Support using the link below, logging in with your FDU NetID account
Scroll down to “Microsoft Team Request” and click on it to expand the information
Fill out all the fields and click on the “Submit” button
Note
You can specify additional team owners. Owners will have rights to invite and make other changes to the team after its creation.
You should now see a screen informing you that your form was successfully submitted
Note
Please allow 3 to 5 business days for the Team to be created.
You will receive an email once the team is created. The next time you log in to Teams you will see your team listed in the Teams section
Click on your team to open the general channel. From here you can create channels, add users, and customize your team. Any team members that you add will receive an email notifying them that they were added to your team. The next time that they log in or open Teams, they will find the team listed in their Teams section
Channels are dedicated sections within a team. You can keep conversations organized by specific topics, projects, disciplines, or whatever works for your team! Channels are where conversations happen and where the work gets done. There can be public channels which are open to all team members or, if you require a more select audience, private channels can be open to a subset of your team.
Select Teams from the menu on the left-hand side of the screen. If you have multiple teams, select your team of choice
Click on the “More options” icon (•••) next to the team name and select “Add channel”
Give the channel a name, and a brief description as if would would like
Select your channel’s preferred level of privacy and press “Add”
Standard channels are open for anyone to join Private channels are invitation only
If you selected “Private” you will see a window that lets you add the team members that should have access to the channel. Once all members are added, press “Close”
Once a channel is created it will show up under the General channel in the channels list. If the channel was set to Private, only the members can see it. Anyone who belongs to the channel can click on it to view its contents
Note
Since channels are sections within a team, it is not possible to add members to a channel that are not part of the team.
Now that your teams and channels are created, you can begin to take advantage of Microsoft Teams’ management features. Team management includes essential functions such as adding and removing members, assigning permissions for individual members, and managing your channels. You can also implement granular customizations such as setting parameters on the use of tags and emojis.
Select Teams from the left menu. If you have more than one team, click on your team
Click “More Options” icon (•••) next to the team name and select “Manage Team”. From here, you can select one of the following tabs
Manage Members Tab
Add a member by clicking “Add Member” button on the top right of the window
Remove a member by pressing “X” button on the right of their name
Use the drop-down menu to change a member’s role to Owner. This allows them full access to change settings
Manage Request Tab
Use this tab to accept or deny a person’s request to join your team
Manage Channels Tab
Create a channel by pressing the “Add channel” button on the top right of the window
You can restore deleted channels by expanding the “Deleted” list and pressing on “Restore”
The experience for managing a team setting varies between both the classic and new Teams.
Classic Teams – Manage Settings Tab
Team picture: is an optional setting which allows you to set a profile picture for your team. You can upload your own image or use one of the colorful templates provided by Microsoft
Member permissions: to set editing permissions for your team members
Guest permissions: settings you can allow guests to create, update, and delete channels
@mentions: lets you choose if you allow the @mention function to send notifications to individuals or entire channels
Team code: will provide you with a join code that you can give out to new members. This will allow them to join without being placed in the Pending Requests section
Fun stuff: lets you allow gifs and memes to be displayed on the channel
Tags: setting todecide who can use the tags feature. With tags, your team members can add labels help them better identify other members of the team
close
New Teams – Manage Settings Tab
Team Details: is an optional setting which allows you to set a profile picture, description and set privacy options for your team. You can upload your own image or use one of the colorful templates provided by Microsoft
Member permissions: to set editing permissions for your team members
Guest permissions: settings you can allow guests to create, update, and delete channels
@mentions: lets you choose if you allow the @mention function to send notifications to individuals or entire channels
Team code: will provide you with a join code that you can give out to new members. This will allow them to join without being placed in the Pending Requests section
Fun stuff: lets you allow gifs and memes to be displayed on the channel
Tags: setting todecide who can use the tags feature. With tags, your team members can add labels help them better identify other members of the team
Team Expiration: Specifies when the Team will expire. By policy no user can change the expiration policy and can visit SAMI Support to extend the expiration when nearing the expiration date.
New Teams – Team Settings Page
New Teams – Team Details Page
New Teams – Team Image Page
close
Manage Analytics Tab
The Analytics tab displays usage information for your team
Manage Apps Tab
The Apps tab allows you to add or remove application plug ins for your channels
Instead of scheduling a meeting for a future date, you can start one right away and invite people in on the fly.
Select “Calendar” from the left-hand side of the screen and press “Meet Now”
Give your meeting a name, select audio and video options, and press on “Join Now”
Classic Teams – Meet Now Options
New Teams – Meet Now Options
New Teams – Meet Now Audio Options
New Teams – Meet Now Invite Prompt
Your meeting should start with the “Participants” tab displayed so you can start inviting people right away. As you search for people and add them to your meeting, they will receive a call to be connected
As people accept the meeting invitation they will automatically be connected
Meetings in Teams include audio, video, and screen sharing. They’re one of the key ways to collaborate in Teams.
The Teams Calendar can be found by clicking Calendar in the left pane
Classing Teams – Scheduled Meeting
New Teams – Scheduled Meeting
You can join a scheduled meeting by selecting the “Calendar” tab from the left menu, then finding and left clicking on your meeting and clicking join for the Classic Teams Experience, or simply press “Join” on the New Teams experience
Select your video and microphone options, then left click “Join Now”
Classing Teams – Join Meeting Options
New Teams – Join Metting Options
Join
Depending on the Metting owner’s settings, you may receive a message that you are waiting for the host to let you into the meeting. You will remain on the Join Meeting Options Screen until you are admitted into the meeting.
If you are the first participant that joined the meeting, you will see a black screen informing you that you are waiting for other members to join. As people join the meeting they will show up on the screen. If you are the host and your meeting has the lobby opened, you will have to admit everyone who joins the meeting
Classic Teams – Waiting in Meeting
New Teams – Person in Lobby Prompt
When you are done with the meeting, close it by pressing the red telephone icon to “Hang up” the call
Due to Office 365 calendar integration, scheduling video and voice meetings on Microsoft Teams is simple and convenient.
Select the “Calendar” tab from the left-hand side of the screen. This screen displays your entire FDU Office 365 calendar. Next, press “New Meeting” button on the top right of the window
You will notice that the New Meeting window offers 2 tabs: “Details & Scheduling Assistant”
From the “Details” tab, enter the following information about your meeting:
Title
Required Attendees
Note
You can also add optional attendees by pressing + optional button
Time
Specify whether the meeting reoccurs
Add Channel is optional and lets you specify an entire Teams channel to receive a meeting notification
Add location is optional and enables you to select a physical location for members to meet at
Add details like the topic of discussion, meeting outline, etc
Classic Teams – Meeting Invitation Request
New Teams – Meeting Invitation Request
The “Scheduling Assistant” tab allows you to view the calendar of all attendees to check for availability. It is possible to adjust the meeting time on this tab
When finished, press the “Send” button on the top of the page. The meeting will be posted on the channel you selected, and invites will be emailed to all requested attendees. The meeting will also show up on the calendar of the people who have accepted the meeting invitation
Microsoft has acquired Flipgrid for video submissions for Classroom Assignments. This feature is only available from within a Classroom Team for assignment posting and submission.
Faculty can request a classroom team by using the following SAMI Support form:
The description must state that a classroom team is required.
After the new classroom team is created, the requesting faculty member can assign students to the classroom team. Students can only access the Flipgrid video submission button within the classroom team.
After you have created assignments or posted to an assignment, A new app tab will be displayed within your Teams app list labeled Assignments.
Microsoft Office 365 offers a comprehensive set of software tools that facilitate documentation, collaboration, and communication. These tools are available on the Web or as downloadable desktop Office 365 apps.
Below is a list of articles for each of the available tools in the Microsoft Office 365 environment. Each article contains information on what each application is and training on how to use them.
Outlook
Outlook allows you to connect and stay organized with your email, calendar, and contacts all in one place.
PowerPoint is a slideshow presentation program that’s part of the Microsoft office suite of tools. PowerPoint makes it easy to create, collaborate, and present your ideas in dynamic, visually compelling ways.
Teams is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration. Here you will find documentation on how to install and use Teams and all its features.
OneNote is a cross-functional digital notebook. You can organize different notebooks into sections and pages with easy annotation and navigation tools.
Lists you can Build and share lists to help you track issues, assets, routines, contacts, inventory, and more. You can get started with Microsoft Lists from Microsoft 365, from MS Teams or from within SharePoint.
Power Apps is a suite of apps, services, connectors, and data platform that provides a rapid application development environment to build custom apps. Using Power Apps, you can quickly build custom apps that connect to data stored throughout Microsoft 365.
Power Automate is a service that helps you create automated workflows between apps and services to synchronize files, get notifications, collect data and more.
Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. It allows connections to hundreds of data sources and generate live dashboards and reports.
Planner makes it easy for your team to create new plans, organize and assign tasks, share files, chat about what you are working on, and get updates on progress.
Bookings offers a simpler way to organize schedules and manage appointments. Microsoft Bookings includes a web-based booking calendar and integrates with Outlook to optimize your calendar and give your contacts the flexibility to book a time that works best for everyone involved.
Forms is an app that lets you create surveys, quizzes, and polls to collect real-time responses from students, collaborates and colleagues. It has built-in analytics to evaluate responses, and export results to Excel for additional analysis or grading.
The Microsoft productivity suite subscription includes Office for the Web, stand-alone, downloadable Office 365 desktop clients and mobile apps. Included in the Microsoft Office suite of products are
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
Microsoft OneNote
Microsoft Outlook
Microsoft Publisher
Microsoft Access
Available Platforms
Windows10or higher
Mac
iOS, Android, Other Devices
Browsers – Current versions of Safari, Chrome, Firefox, Microsoft Edge, and Internet Explorer
Eligibility
Current students that are registered for classes for the current term or a future term.
How to Install Microsoft Office 365 Pro Plus
Current students can download the latest version of Microsoft Office free of charge as part of the Microsoft Campus Agreement. Microsoft Office Suite can be installed on up to five devices.
Note
Students leaving Fairleigh Dickinson University (by graduating or otherwise) will need to purchase Office to continue using it. You will be prompted by Microsoft to purchase Office the next time you launch the software. If you don’t purchase Office, you will still be able to open the documents you created but won’t be able to edit them or create new documents.
Office 365 Pro Plus can be installed on Windows 10 or higher
Office 365 Pro Plus can be installed on Mac OS 10.13.6 (Sierra) or higher
Enter your FDU NetID and then click “Next”. This will re-direct you to the FDU SSO login page
Enter your FDU NetID and Password then click “Sign In“. Follow the prompts on the next screen to authenticate with Duo
In the Software window, click “Office“. Then click the “Install” button
Windows
macOS
The software will be downloaded and installed on your computer. Your copy of Microsoft Office remains active until you leave the University, at which point, you will either need to uninstall it or purchase a license key
Note
Any computer with Office 365 Pro Plus installed on it must connect to the Internet at least once every 30 days so the status of your subscription can be verified. If you do not connect to the Internet every 30 days or less, Office 365 will go into reduced functionality mode. Once the computer reconnects to the Internet and the subscription status is verified, all features will become available again.
Microsoft Teams is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration. Here you will find documentation on how to install and use Teams and all of its features.
The page will automatically detect your operating system and redirect you to the appropriate desktop client (e.g. Windows, macOS) or mobile client (e.g. Android, Apple iOS).
The Microsoft Teams application is automatically pushed to most university owned computers. To determine if you already have it installed, search for “Teams” using the Windows Search Bar or Spotlight Search on Apple devices. If you are working on a university computer and you cannot locate the Microsoft Teams application, you can install by following the instructions below.
Windows – Portal Manager
Press the Windows key on your keyboard and type Portal Manager
Launch Portal Manager from the search results list
Select Microsoft Teams from the list and click Install
Mac – FDU Self Help
Press cmd+space on your keyboard and type FDU Self Service
Launch FDU Self Service from the spotlight search results
Locate and double click on Microsoft Teams. If Teams is already installed, it will not show up on the list
Web – Access the Office Web Application
The web client is a full, functional client that can be used from a variety of browsers including Google Chrome, Edge Browser, and Mozilla Firefox. Microsoft Teams will also be available on Safari soon.
Teams allows for text-based conversations using the Chat feature. Although it does not replace email in all use cases, it is a great tool for asking quick questions or just saying hello. When using chat, please be mindful and adhere to FDU’s Written Information Security Program.
Select Chat from the left menu and then click on the top search bar
Type the name of the person you are attempting to locate and click on their name. Only FDU faculty, staff, and students are accessible in Microsoft Teams
You will be brought to the chat window and can start your conversation
The Chat window has many convenient tabs and shortcuts aimed at improving collaboration. Near the top of the screen, next to the name of the contact that you are chatting with, you will notice the default tabs, followed by a plus sign.
Tabs
The Chat tab contains the conversation
The Files tab contains all files shared in during the conversation
In two person conversations, the Organization tab shows your contact’s organization chart. This information is pulled from Office 365. Datatel remains the authoritative source for this information and the data contained here is not intended to be 100% accurate
In two person conversations, the Activity tab will list the latest activity of your contact
You can use the + sign to create a new tab from a file or an app. This can be a quick and convenient way to access a collaborative file that was previously shared in the conversation
To the right of these tabs are a series of shortcut icons which perform the following functions.
Shortcuts
a. The Video call icon starts a new video call b. The Audio call icon starts a new voice call c. The Screen sharing icon allows you to share your desktop or an application d. The Add people icon is used to invite additional people to the chat e. The Pop out chat icon creates a separate window with your chat
The Chat function allows you to have conversations with one person or groups of people. The pane on the left-hand side of the screen is split into Recent and Contacts. Contacts acts like a rolodex that allows you to store and sort a list of the people you contact most frequently. The Recent list will display your most recent conversations with single people or group messages.
By default, the Contacts tab will already have a “Favorites” group. However, creating new groups can be a helpful way to organize your contacts. For example, you may wish to create a group for people that you are working with on a project or for people that you interact with from a department.
To create a new contact group, click “Create a new contact group” on the bottom of the pane
Enter a name for your group, and click “Create“
To add contacts to a group, click the “More options” icon (3 dots) next to the group name and select “Add a contact to this group” from the drop-down menu
Begin typing the name of your contact. Once you see their name appear, select it and select “Add“
You can add the same contact to as many groups as you would like. The chat with your contact will remain the same regardless of which group you are accessing the conversation from.
Screen sharing is one of Microsoft Teams’ most powerful collaborative features. You can show your screen to your colleagues and even grant them control to edit Microsoft Office files with you in real time.
Before you get started, make sure that you are using the installed version of Microsoft Teams, as the browser based OWA version does not support this functionality.
From the chat window or from an ongoing call, click on the “Screen sharing / Share” icon
You be given a choice to either share your desktop or an application from the Microsoft Office suite, click on the window you want to share
Once you select the screen you wish to share, the members of your chat or call will be able to view your screen and request access to remotely control your desktop or program.
You can only share your screen with a mobile device user if you are engaged in an active voice or video call with them.
Creating a team provides remote team members with the ability to work together and share information via a common online space. You can also organize your information by creating channels to help optimize your team’s workflow.
Navigate to the forms website and log in using you FDU NetID account information
Scroll down to Microsoft Team Request and click on it to expand the information
Fill out all the fields and click on the “Request Microsoft Team” button
Note
You can specify additional team owners. Owners will have rights to invite and make other changes to the team after its creation.
You should now see a screen informing you that your form was successfully submitted. Please allow 3 to 5 business days for the Team to be created
You will receive an email once the team is created. The next time you log in to Teams you will see your team listed in the Teams section
Click on your team to open the general channel. From here you can create channels, add users, and customize your team. Any team members that you add will receive an email notifying them that they were added to your team. The next time that they log in or open Teams, they will find the team listed in their Teams section
Channels are dedicated sections within a team. You can keep conversations organized by specific topics, projects, disciplines, or whatever works for your team! Channels are where conversations happen and where the work gets done. There can be public channels which are open to all team members or, if you require a more select audience, private channels can be open to a subset of your team.
Select Teams from the menu on the left-hand side of the screen. If you have multiple teams, select your team of choice
Click on the “More options” icon (3 dots) next to the team name and select “Add channel“
Give the channel a name. Optionally, you can write in a brief description as well
Select your channel’s preferred level of privacy and click “Add“
Standard channels are open for anyone to join.
Private channels are invitation only.
If you selected “Private” you will see a window that lets you add the team members that should have access to the channel. Once all members are added, click “Close“
Once a channel is created it will show up under the General channel in the channels list. If the channel was set to Private, only the members can see it. Anyone who belongs to the channel can click on it to view its contents
Note
Since channels are sections within a team, it is not possible to add members to a channel that are not part of the team.
Now that your teams and channels are created, you can begin to take advantage of Microsoft Teams’ management features. Team management includes essential functions such as adding and removing members, assigning permissions for individual members, and managing your channels. You can also implement granular customizations such as setting parameters on the use of tags and emojis.
Select Teams from the left menu. If you have more than one team, click on your team
Click “More Options” icon (3 dots) next to the team name and select “Manage Team“. From here, you can select one of the following tabs
Manage Members Tab
Add a member by clicking “Add Member” button on the top right of the window
Remove a member by clicking “X” button on the right of their name
Use the drop-down menu to change a member’s role to Owner. This allows them full access to change settings
Manage Request Tab
Use this tab to accept or deny a person’s request to join your team
Manage Channels Tab
Create a channel by clicking the Add channel button on the top right of the window
You can restore deleted channels by expanding the Deleted list and clicking on Restore
Manage Settings Tab
The Team picture is an optional setting which allows you to set a profile picture for your team. You can upload your own image or use one of the colorful templates provided by Microsoft
Use Member permissions to set editing permissions for your team members
With the Guest permissions settings you can allow guests to create, update, and delete channels
@mentions lets you choose if you allow the @mention function to send notifications to individuals or entire channels
Team code will provide you with a join code that you can give out to new members. This will allow them to join without being placed in the Pending Requests section
Fun stuff lets you allow gifs and memes to be displayed on the channel
Use the Tags setting todecide who can use the tags feature. With tags, your team members can add labels help them better identify other members of the team
Manage Analytics Tab
The Analytics tab displays usage information for your team
Manage Apps Tab
The Apps tab allows you to add or remove application plug ins for your channels
When you create a new team in Microsoft Teams, you’ll be asked to select from one of four teams.
Learn more in the table below about which team meets your teaching and learning goals.
Class
Professional Learning Community (PLC)
Staff
Other
Description
Teachers and students collaborating on group projects, assignments, and more.
Educators collaborating within a professional learning community. Examples:academic department, grade band, or group working on a shared goal.
Staff leaders and staff members collaborating on school administration and development.
Students and school employees collaborating in interest groups and clubs.
Team Owners & Team Members
Teachers are team owners and add students as team members.
Educators form the team and other educators join the team.
Staff leaders are team owners and add staff members as team members.
Any combination of students and school staff can form a team and add members.
Permissions
Teachers moderate student conversations and who can post where. Students only have write permission in certain areas.
Educators share equal read-write permissions.
Staff leaders control posting settings. Staff members only have write permission in certain areas.
Team members share equal read-write permissions unless the team owner(s) alter the settings.
Features
Class Notebook Assignments Conversations Files Video and audio calls Chat (if enabled) Pinning new tabs with documents or sites like Microsoft Forms
OneNote notebook Conversations Files Meetings Video and audio calls Chat (if enabled) Pinning new tabs with documents or sites
Staff Notebook Conversations Files Meetings Video and audio calls Chat (if enabled) Pinning new tabs with documents or sites
OneNote notebook Conversations Files Meetings Video and audio calls Chat (if enabled) Pinning new tabs with documents or sites
Educational Goals
Assign, track, and review student work Export grades Collaborate and communicate in the classroom Make announcements Administer quizzes and polls Work in student groups Share and organize rich content Invite virtual experts into the classroom
Collaborate in professional learning communities Communicate Make announcements Share work Organize virtual or face-to-face meetings Work in smaller groups Share and organize content
Oversee professional development, staff, and administrative goals Communicate Make announcements Share content and progress reports Work in smaller groups Organize virtual or face-to-face meetings
Collaborate and communicate with team members Make announcements Share content Organize virtual or face-to-face meetings Work in smaller groups
Instead of scheduling a meeting for a future date, you can start one right away and invite people in on the fly.
Select “Calendar” from the left-hand side of the screen and click “Meet Now“
Give your meeting a name, select audio and video options, and click on “Join Now“
Your meeting should start with the Participants tab displayed so you can start inviting people right away. As you search for people and add them to your meeting, they will receive a call to be connected
4. As people accept the meeting invitation they will automatically be connected
Meetings in Teams include audio, video, and screen sharing. They’re one of the key ways to collaborate in Teams.
You can join a scheduled meeting by selecting the “Calendar” tab from the left menu, then finding and left-clicking on your meeting
Click “Join” button on the top of the page
Select your video and microphone options, then left click “Join Now“
If you are the first participant that joined the meeting, you will see a black screen informing you that you are waiting for other members to join. As people join the meeting they will show up on the screen.
When you are done with the meeting, close it by clicking the red telephone icon to “Hang up” the call
Due to Office 365 calendar integration, scheduling video and voice meetings on Microsoft Teams is simple and convenient.
Select the “Calendar” tab from the left-hand side of the screen. This screen displays your entire FDU Office 365 calendar. Next, click “New Meeting” button on the top right of the window
You will notice that the New Meeting window offers 2 tabs, Details and Scheduling Assistant
From the Details tab, enter the following information about your meeting:
Title
Required Attendees
Note
You can also add optional attendees by clicking +optional button
Time
Specify whether the meeting reoccurs
Add Channel is optional and lets you specify an entire Teams channel to receive a meeting notification
Add location is optional and enables you to select a physical location for members to meet at
Add details like the topic of discussion, meeting outline, etc
The Scheduling Assistant tab allows you to view the calendar of all attendees to check for availability. It is possible to adjust the meeting time on this tab
When finished, click the “Send” button on the top of the page. The meeting will be posted on the channel you selected and invites will be emailed to all requested attendees. The meeting will also show up on the calendar of the people who have accepted the meeting invitation
Fairleigh Dickinson University’s Acceptable Use Policy for Computer Usage states, “All computers and mobile devices accessing any FDU resource must run an operating system and configuration that is supported by its vendor with regard to security patches and updates.”
Ensure your Duo Mobile app and device’s operating system are up-to-date to keep your two-factor authentication (2FA) effective. Regular updates are crucial for accessing the latest features, security, and maintenance improvements in Duo Mobile.
DUO for iOS 14 and Android 10 Not Supported
Beginning February 8, 2024, Duo Mobile will no longer be supported on these end of life devices.
General Recommendations
Update Duo Mobile Regularly: Make sure your device’s operating system is current to support the latest version of Duo Mobile, ensuring access to vital security updates and features.
Check After OS Updates: If you update your device’s OS, verify that Duo Mobile has also updated. You might need to manually update the app if it doesn’t automatically.
Guidance for Older Operating Systems
For Android Users: Starting Feb. 8, 2024, Android devices on OS 10 or below will not support new versions of Duo Mobile or receive updates. Upgrade to Android 11 or newer to continue using Duo Mobile without interruptions.
For Apple Users: Similarly, from Feb. 8, 2024, Apple devices on iOS 14 or earlier will not be eligible for the latest Duo Mobile version or updates. Update to iOS 15 or newer to maintain functionality.
Switch Devices: If your device cannot be updated, consider using another device that supports the latest Duo Mobile version.
Voice Call Authentication: You can enroll a phone number for authentication via voice calls.
Temporary Bypass Codes: If you encounter issues with Duo Mobile, obtaining a temporary bypass code can provide secure access to systems for a limited time.
Additional Notes
Continuous 2FA Protection: Duo Mobile will continue to offer 2FA protection on older OS versions after Feb. 8, 2024, though updates are recommended for the best security.
SMS/Text Passcodes: Note that SMS/text passcodes are not supported; 2FA passcodes should be generated through the Duo Mobile app for security.
myFDU Connect is a place where Students, Faculty, and Staff can go as their single point of entry for everything FDU. The homepage consists of a dashboard full of “cards” that represent different aspects of FDU. Users can personalize their dashboard to display cards relevant to their life on campus..
How to Navigate myFDU Connect
To log into myFDU Connect, you will need to visit myfduconnect.fdu.edu and login with your FDU NetID. Once logged in, you will land on your customizable homepage
The cards you see can be added to, removed, and rearranged to your liking. To add a new card, click on the “+ Discover More” button
In the top left of the page, you can use the search field to find specific cards. You can also scroll through the page to see everything that is available. When you have found a card you would like to add to your homepage, click on the “save card” ribbon on the top right of the card
Click on “myFDU Connect” in the top left of the page to return to your homepage. You should see your new card in the first slot
If you would like to change the order of your cards, click and hold on the top of the card and move the card to a new position
If you wish to remove a card from your homepage, click on the “remove card” ribbon on the top right
When new cards are available, you will be notified on the alarm button on the top right of the page
To access FDU’s social media pages, click on the hamburger menu in the top left of the page
The following tutorial will guide you through the process of connecting a printer while on-campus. Faculty and Staff members should review the purchasing process before engaging with the process for connecting a printer.
Note
Wireless printing is not permitted on campus. The information below is for wired connections only.
Connecting a Printer for Students in the Residence Halls
Most new printers are plug and play compatible with Windows 10. When you receive your new printer, you can unbox it and remove any orange tape you see. After plugging in the power and turning the printer on, allow the printer to initialize (most new printers will have a display to show you it’s progress). When the printer finishes initializing, just connect the usb printer cable from the printer to your computer. Windows 10 should automatically install the printer for you.
close
Printer Purchasing Process for Faculty and Staff
All printer purchases for faculty and staff on-campus use must appear on OIRT’s list of approved printer models. For the most up to date list of approved printer models, please contact the Purchasing Department. The purchase of any printer not on the list must be pre-approved by the CIO.
Determining if a Printer will be Directly Connected or On-Network
Faculty and Staff Members have the option of either making a direct or network connection to the printer. A direct connection is when a printer is connected to a single computer and an on-network printer means that multiple parties can print to it. Generally speaking, unless a printer is shared by three or more employees, users should request a direct connect printer.
If you are planning to use a direct connection, simply purchase any printer contained on the Purchasing Department’s list of approved models and follow the instructions for “Installing a Local Printer” in the “Connecting a Printer for Faculty and Staff Members” section below.
If your new printer will be on-network, please ask your department to contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for USAN to investigate the viability of any data jacks in the vicinity of where the printer will be located. The full workflow for this process is shown in the following diagram.
Most new printers are plug and play compatible with Windows 10. When you receive your new printer, you can Most new printers are plug and play compatible with Windows 10. When you receive your new printer, you can unbox it and remove any orange tape you see. After plugging in the power and turning the printer on, allow the printer to initialize (most new printers will have a display to show you it’s progress). When the printer finishes initializing, you can just connect the usb printer cable from the printer to your computer. Windows 10 should automatically install the printer for you.
Connecting to a Network Printer
Employees are able to add network printers to their own machines.
Do a search for printers, and click on “Printers & Scanners”
Click on “Add a printer or scanner”
The list will start to populate and if you find your printer you can click on it and then click on “Add device”, otherwise scroll down to the bottom of the list and select “The printer I wanted wasn’t listed”
In the new dialog box, select “Find a printer in the directory” and click “Next”
Search for your printer and double click on it when you find it
A box will let you know that the printer was successfully installed. Click “Next”
You can click on “Print a Test Page” to verify you are connected to the right printer otherwise click on “Finish”
Fairleigh Dickinson University’s Acceptable Use Policy for Computer Usage states, “All computers and mobile devices accessing any FDU resource must run an operating system and configuration that is supported by its vendor with regard to security patches and updates.”
This guide defines the lifecycle of our support for different operating systems.
Note
Apple does not publish official End of Life dates, but typically provides security updates for the current release of macOS, as well as the previous two releases.
Support Status Descriptions
Active (Default)
This platform is supported by FDU Computer Services & University Systems and Networking and new machines will be built with this platform unless otherwise requested.
Active
This platform is supported by FDU Computer Services & University Systems and Networking and will be installed on request.
Containment
This platform is currently supported by FDU Computer Services & University Systems and Networking but no new machines will be built with this platform. Platforms in containment will receive security updates and patches for the FDU supported software components. FDU Computer Services & University Systems and Networking Facilities will not provide new software or major revisions to existing software for these platforms.
Phasing Out
FDU Computer Services & University Systems and Networking is actively working to migrate assets away from this platform. Platforms go in to this status automatically 6 months before the FDU End of Support Date. Platforms may be placed in this status before that time.
EOL
This platform is no longer supported by FDU Computer Services & University Systems and Networking. Software support will be dropped from any asset running this platform. Other levels of support may be dropped as circumstances warrant. A valid reason is required to maintain an asset running this platform past the End of FDU Support date. All exceptions must be logged and periodically reviewed.
Supported Operating Systems
OS Family
Operating System
Latest Release
FDU Support Status
Vendor Release Date
Start of FDU Support
End of FDU Support
Latest Vendor EOL Date
Windows Desktop
Windows 11
23H2
Active (Default)
Oct-2023
Jul-2024
Oct-2026
Nov-2026
22H2
Phasing Out
Sep-2022
Jul-2023
Jul-2024
Oct-2025
Windows 10
22H2
Phasing Out
Oct-2022
Dec-2022
May-2025
Oct-2025
Apple Devices
macOS Sequoia
15
Active (Default)
Sept-2024
Nov-2024
Jun-2027
~2027
macOS Sonoma
14
Active (Default)
Sep-2023
Nov-2023
Jun-2026
~2026
macOS Ventura
13
Phasing Out
Oct-2022
Dec-2022
Jun-2025
~2025
Latest Release
The latest release for desktop operating systems includes all minor and incremental updates.
End of Life
Any operating system not listed above is considered EOL (End of Life) and will not be supported. Examples of EOL Operating Systems include:
Windows: 95,98, XP, ME, VISTA, 7 & 8
macOS: Yosemite, El Capitan, Sierra, High Sierra, Mojave, Catalina, & Big Sur
The instructions below pertain to any Vancouver user that will use the Secure Print, Scan to email, and Copy functions of the Xerox printers.
Account Balances
Vancouver users have the following account balances listed below:
Free Quota, is a designated account balance that is applied to all the students and is auto-replenished on schedule – before the start of the semester. This is the first balance that gets deducted after which the secondary “Paid_Balance” goes into effect.
Paid Balance is the amount credited onto a student’s account when they pay for extra printing credits.
Each user listed below has a specified amount of Free Quota replenished according to a schedule:
Adjuncts: $1000.00 replenished at the start of the school year
Student IT Assistants And Student Workers: $200.00 replenished at the start of every school term
Staff and Faculty: $1000.00 replenished at the start of every school term
Students: $10.00 replenished at the start of every school term
Paid Balance Reload / Replenishment
The instructions below are for Students on how to reload/replenish their Paid Balances:
Go to Enrollment Services to pay for the amount they wish to recharge
Bring the receipt to IT Office to request the reload for their Paid Balance
Logging In
Users can either swipe their badge or use their FDU NetID and password to log in. To use your credentials press the “Keyboard” button on the top right of the screen
If upon swiping your badge the following screen appears on the Xerox printer screen. Enter your credentials to associate them with your account. For a detailed walkthrough, play the video below:
close
Checking Account Balance on Printer
To check your total balance from the printer, log into that printer and press the “Access Device” button. The balance will be displayed on the screen.
close
Secure Print
To release a print job after you have sent a print job to the appropriate printer and logged into that printer. Press the “Print Release” button
To print all jobs under the queue press the checkbox above all the jobs (2) then press the “Print” button (5)
To print a selection of the jobs, select the appropriate checkbox beside the jobs you want to print (3), then press the “Print” button (5)
To delete jobs from the printer’s queue, select the appropriate checkbox beside the jobs you want to delete (3), then press the “Trashcan” button (4)
To log off of the printer, press the “Log Out” icon on the top right next to your name
close
Scan to Email
To start a scan-to-email job, log into a printer and press the “Scan” button
You can press the “Star“’ button (4) immediately to start scanning
Optionally you can edit the Subject and Filename entries (2) and the scan settings (3)
To log off of the printer, press the “Log Out” icon on the top right next to your name
close
Copying
To start a copy job, log into a printer and press the “Access Device” button
Press “Access Device“
To return to the PaperCut MF main screen, press the “PaperCut MF” button
To copy, press the “Copy” button
Enter the number of copies and then press the “Star“’ button for the default selection (Auto Detect Color, 1-1 Sided copies). Optionally you can change the settings shown in the yellow box below, then press the “Star” button
You can delete the job at any point in the previous screens by pressing the “Delete” button. If only N number of pages have been printed, you will only be charged N times
To log off of the printer, press your username on the top left and then press the “Log Out” button.
Log in using your FDU netID then select the “Login” button
You can review your Transaction History, Balances, Recent Print Jobs & Jobs Pending Release by selecting the appropriate tab on the left-hand side. You can also see your environmental impact according to your print, scan & copy activities
Creating strong, secure passwords is essential to protecting your personal information and maintaining the safety of your FDU NetID account. This article provides clear guidelines for password creation, including complexity requirements, helpful tips, and best practices to ensure your account remains secure. By following these guidelines, you can create passwords that are not only compliant with university policies but also resilient against potential threats.
Guidelines for Passwords
Passwords must be between 8-16 characters
Pass a basic complexity check
Password Requirements:
At least one uppercase letter
At least one lowercase letter
At least one number
At least one special character
Passwords must not:
Contain your first or last name
Be the same as any prior passwords
Helpful Tips:
Longer passwords (or “passphrases”) can be created using a phrase or sentence. These are easy to remember but difficult for others to guess.
A short, meaningful phrase or sentence is often easier to recall.
Other Important Password-Related Guidelines:
Your account is your responsibility. Do not share your password with others, including technicians. FDU IT staff will never ask for your password.
Avoid choosing a password based on personal information that someone who knows you could guess.
Do not use your FDU NetID or your name/department name as your password.
Refrain from using your FDU NetID and password to access third-party systems (e.g., online shopping, newspapers, travel websites).
Avoid letting software save or store your passwords. This increases the risk of unauthorized access and makes it harder to remember your password if you don’t type it in regularly.
Always log out of programs or websites and close your browser (e.g., Internet Explorer, Firefox, Chrome) when done, especially on public computers.
Treat your passwords as valuable and protect them accordingly.
To learn how to change your NETID password, follow the steps in this article:
To access Forms, you will be directed to our SAMI Support Portal where you will be asked to log in using your NETID and authenticate using Duo. Once you click “Next,” you will be forwarded to samisupport.fdu.edu in a new window or tab.