Resources

Search our resource library below to find helpful information. You can fitler by your role at FDU as well by department or service.

Help Desk
Resources Header

Accept a New Certificate for FDU-Secure Wireless Network

Resources for:
icon Close

FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.

Note

Your process may vary slightly based on the version of the Operating System that your device is using.

How to Accept the New Certificate for FDU-Secure Wireless

Windows
  1. Login to your Windows computer
  2. Go to the bottom right taskbar > Click on the “Networks” icon:
    • From the Networks list, select: “FDU-Secure
    • Click “Connect
  3. At the “Continue connection?” prompt, click “Connect
  1. Open your browser and test your Internet connection
close
macOS
  1. Login to your Mac computer
  2. Go to top right menu bar > Click “Wi-Fi” icon:
    • From the Wi-Fi list, select: “FDU-Secure
    • Click “Join
  3. At the “Authenticating to network FDU-Secure” prompt, click “Continue
  1. Click “OK
  2. Open your browser and test your Internet connection
close
iOS
  1. Login your iOS device (eg. iPhone)
  2. Go to your device’s Settings App > Select “Wi-Fi” > Select “FDU-Secure” > Click “Forget This Network
  3. Tap the “Back” button and select “Wi-Fi “once again to reload the available Wi-Fi networks:
    • From the Wi-Fi list, select: “FDU-Secure
    • Enter your complete FDU NetID as in the examples below: “username@fdu.edu, username@student.fdu.edu, username@alumni.fdu.edu”
    • Enter your FDU NetID Password
    • Click Join
  1. At the “Certificate” prompt, tap “Trust
  1. Open your browser and test your Internet connection
close
Android
  1. Login to your Android Device
  2. Open the “Settings” Application > Select “Wi-Fi” > Select the Gear icon next to FDU-Secure
  1. Select “Forget This Network
  1. Select FDU-Secure from the Wi-Fi menu
  1. Select “EAP method” and select “PEAP” from the dropdown menu
  2. Enter your complete FDU NetID and password
  3. In the “CA Certificate” field, select “Use System Certificates
  4. In the Domain field, enter fdu.edu
  5. Enable “Auto Reconnect
  6. Tap “Connect
  1. Open your browser and test your Internet connection
close
Last Modified:

Acceptable Use Policy for Computer Usage

Resources for:
icon Close

Original Effective Date: 02/17/2013
Revised Date: 04/20/2023


The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines for appropriate behavior and use of FDU computing resources.

SCOPE

These guidelines apply to all users of FDU computing resources. Users include all students, faculty, staff, visiting faculty, volunteers, guests of the administration, and external individuals or organizations.

Computing resources include, but are not limited to, desktop and laptop computers, file servers, smart phones, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased, or licensed by FDU. In addition, computing resources include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies to all usage of university computing resources, whether that usage occurs through a university owned device or personal device.

University property, including computing resources, are provided to you for University business. Although security protocols have been put in place to restrict access to computing resources to protect them against unauthorized access by external parties, it is important that all members of the University community take appropriate measures to safeguard these resources.

Users – and not the University — are responsible for the materials that users prepare, receive, or transmit through computing resources. Thus, as a condition of using the University’s computer system, all users represent that they are in compliance with applicable laws and University policies, including l federal, state, and international copyright and other intellectual property laws and laws regarding defamation.

ACCEPTABLE USE

Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:

  1. You will not use an account that does not belong to you. You will use only the computers, computer accounts, and computer files for which you have authorization. You may not share accounts, files, or access to computer resources with any unauthorized person.
  2. You are responsible for any computer account you have been given. You will set a password on the account that is in compliance with university password policies, and you may not share this password with any other person. If you discover that someone has made unauthorized use of your account, you should change your password immediately and immediately report the event to one of the individuals listed in Appendix 1.
  3. You agree not to intentionally seek out information about, copy, or modify password files, other users’ files, or disks and tapes belonging to other people, unless specifically authorized by those persons, whether at FDU or other facilities.
  4. You should not attempt to decrypt material to which you are not entitled or attempt to gain rights you have not been specifically granted by the owner. If you observe or discover a gap in system or network security, you agree to inform one of the individuals listed in Appendix 1 and not to exploit the gap.
  5. You agree to refrain from any activity that interferes with a computer’s operating system or its logging and security systems, or that may cause such effects. Additionally, users are not authorized to remove any security software installed on FDU equipment by FDU Systems personnel.
  6. You must be sensitive to the public nature of computing resources and agree not to transmit, post, or otherwise display material that is threatening, obscene, harassing, or defamatory. The use of University computing resources to libel, slander, or harass any other person is not allowed and could lead to University discipline as well as legal action by those who are the recipients of these actions.
  7. You agree not to make copies of or distribute software the University owns or uses under license, unless the owner of the software or the owner of the license has specifically granted permission to copy. If in doubt as to whether you have permission to copy software, assume you don’t.
  8. Messages, statements, and declarations sent as electronic mail or public postings should be treated as if they were tangible documents. From electronic identifiers used in the transmission of messages, addressees can see the University is the source of the message or its system is being used to transmit it, similar to how letterhead or return addresses on a tangible document would identify the University. Therefore, as a representative of the FDU community, you are expected to respect the University’s good name in your electronic dealings with those both within and outside the University. Moreover, in so far as employees make use of FDU computing resources to relay personal opinions, it is their obligation to make sure that no addressee can infer that their personal opinions are necessarily shared or authorized by the University, and they are obligated to clearly identify their opinions as their own and not those of the University.
  9. You agree not to create, alter, or delete any electronic information contained in any system that is not your own work, unless specifically authorized by the owner of that information.
  10. You agree not to create, send, or forward electronic chain mail letters. You agree not to attempt to alter or forge the “From” line or any other attribution of origin contained in electronic mail or postings. You agree not to use any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email).
  11. You may l not use FDU computing resources as a means of obtaining unauthorized access to any other computing systems.
  12. FDU’s data storage on University servers, hosted servers, third party storage, or hosted storage, is an FDU computing resource with costs attached and should be used with care and discretion. It is primarily meant for current class work, research and development projects, business files, and temporary storage of other files. Users are expected to keep their disk usage reasonably minimized, in keeping with their University role.
  13. Network addresses such as TCP/IP addresses and machine addresses are assigned by University Systems and Networking staff and may not be altered or otherwise assigned without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). In addition, no equipment may be attached to the network without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). This applies to all staff as well as academic departments.
  14. FDU’s computing resources are not to be used for the transmission of commercial or personal advertisements, solicitations, and promotions or for extended reproduction of political, ideological or commercial material originated by a person or organization. This includes but is not limited to the execution of revenue-generating advertising programs which pay users when the programs are run. The Associate Vice President of Systems and Networking (or other designee) may suspend this rule when it is in FDU’s best interest to permit such activity.
  15. Users may not contract with external Internet services, service providers, or the like without the explicit written approval of the Associate Vice President of Systems (or designee) and Networking and compliance with Finance and Office of General Counsel policies.
  16. Without the explicit written permission of the Associate Vice President of Systems and Networking (or designee) you agree not to run any of the following protocols or services:
    • Port scanners, network monitors or other types of utilities that probe any other computer, be they inside or outside FDU’s network.
    • Routing or network serving protocols such as RIP, IGRP, OOTP or DHCP on the network.
    • Daemons, processes or programs that accept incoming connections, as a server would.
    • Streaming media servers or any other server that broadcasts continuous data streams.
  1. FDU’s computing resources, including equipment, network, services, and wiring may not be modified or extended beyond the areas of their intended use.
  2. Network connections may not be used to provide network access to anyone outside the University community or for any purposes other than those that are in direct support of the academic mission of the University.
  3. All computers connected to FDU’s network must run an operating system and configuration that is supported by its vendor with regard to security patches and updates, as well as antivirus software with current virus definitions. It is the user’s responsibility to keep their virus definitions up to date and to apply all critical operating system updates. More information is available at https://it.fdu.edu or submit questions through the SAMI Support portal or by emailing fdutac@fdu.edu.
  4. Users may not alter the operating system or configuration of University owned computers without the explicit written authorization of the Associate Vice President of Systems and Networking (or designee).

PERSONAL USE

Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University, should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.

Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.

SECURITY

Users should use reasonable available methods to safeguard their data, including regular changes of passwords, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.

The Office of Information Resources and Technology (“OIRT”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems.

In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years.  This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years. 

In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.

OIRT and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.

PRIVACY

Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval, and review. Individuals using FDU computing resources should have no expectation that any information transmitted through or stored on FDU computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private. By using FDU computing resources, the user consents to the University’s (and its designees’, both internal and external) access to their electronic files, documents, and materials stored, transmitted, or otherwise accessible on those resources.

Examples of where the University might access a user’s electronic files include system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; keystroke monitoring of sessions to determine inappropriate use of the computing facilities; searches in connection with a litigation, threatened litigation, governmental proceeding or investigation; investigation of a possible data breach; investigation of possible breach of University policy, rules, handbooks, or protocols; and other measures to safeguard the University’s systems and compliance with laws. These examples are not intended to limit the University’s right to access a user’s electronic files under circumstances deemed appropriate by the University. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated, stored, and forwarded by appropriate personnel without the user’s permission or knowledge.

Without limitation, because employees are granted access to and use of FDU computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information.

The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data and this policy is subject to FERPA requirements. In general, FERPA gives students more control over their educational records, and it prohibits educational institutions from disclosing “personally identifiable information in education records” without the written consent of the student (subject to specified exceptions). To find out specifically what information you may or may not give out and to whom, contact the office of the Vice President for Student Affairs.

POLICY VIOLATIONS

Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.

Violations of this policy will be addressed as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and, if applicable, State and Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion, or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.

The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.

This policy is subject to revision. Comments and suggestions are welcome and should be sent to Stuart Alper, Associate Vice President of Systems and Networking, mailstop T-BH1-01, or stuper@fdu.edu.

It is the user’s responsibility to remain informed about the contents of this document.


CONTACTS

Stuart Alper
Associate Vice President of Systems and Networking
Mailstop T-BH1-01
(201)-692-2414
stuper@fdu.edu

Saul Kleinman
Associate Vice President of Management Information Systems
Mailstop T-BH2-03
(201)-692-2065
saul@fdu.edu


Last Modified:

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

Resources for:
icon Close

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). We support and advise using this method due to the program’s robustness and integration of all Office365 features. Follow the steps below to install and set up the Outlook app on your phone.

Outlook App on Apple iOS and Android Mobile Devices
  1. Use the links below to install the Outlook app onto your mobile device.
Android Play Store
Apple App Store
  1. Launch the app and press on “Add Account” if on an Android device. It will then prompt you to input your FDU email address. On iOS, the app will launch and immediately ask you for your FDU email address. Once filled out press “Continue” on Android. On iOS press “Add Account”
Android
Android
iOS
  1. You will be routed to the FDU Single Sign On Page, from here input your FDU email address and password and press “Sign In
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Your FDU email account has now been added to your device successfully. Ensure the email account is listed on your Outlook application.
close
Last Modified:

ADA Compliance

Resources for:
icon Close

Regulatory Law

Any videos distributed on various platforms by FDU must comply with federal regulations concerning accessibility for individuals who are deaf or hard of hearing. It’s essential to ensure that our content is accessible to all members of our community, in line with these important guidelines.

To read the Americans with Disabilities Act rules and regulations, visit the link below:

Americans with Disabilities Act

Transcription and Closed Captioning

All video projects produced by Multimedia Services must be closed captioned and transcribed. Captions appear onscreen simultaneously with the audio and video and follows the same timing. It exists within the video player. A transcript is the same word-for-word content as captions, but presented in a separate document, whether it is a text file, word processing document, PDF, or web page.

Last Modified:

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

Resources for:
icon Close

These instructions demonstrate adding an FDU email account to an Apple mobile device’s native Apple “Mail” app. Unfortunately, adding an FDU email account on an Android OS mobile device’s native “Mail” app is currently unsupported by FDU IT support. Information regarding adding an FDU email account to an Android OS mobile device via the Outlook App can be found below for Android OS mobile device users.

Note:

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). FDU IT supports and advises using this method due to the program’s robustness and integration of all Microsoft 365 features. A link with instructions for the Outlook app on mobile devices can be found at the bottom of this page.

Setting up your FDU Email Account in the Mail app on iOS
  1. Go to the “Settings” app
  1. Tap “Mail
  1. Tap “Accounts
  1. Tap “Add Account” and then select or tap “Microsoft Exchange
  1. Enter your FDU email address and a description of your email account in the corresponding text boxes. Please note that the default description name for the account will be ‘Exchange’ if left unchanged. Tap “Next” to continue
  1. Tap “Sign In
  1. Enter your FDU email address and password. Tap “Sign In” to continue
  1. For security purposes, all applications which use FDU’s Single Sign-On require Duo Two-Factor Authentication (2FA). After entering your FDU NetID login credentials, Duo requires you to complete a method of second-factor authentication
  1. Choose the FDU NetID account information you want to synchronize or access on your iOS mobile device by toggling the choices on/off. Tap “Save” to continue
  1. Your FDU email account has successfully been added to your iOS mobile device
close
Setting up your FDU Email Account on Android OS

Due to the multiple Android OS mobile device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features differ depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to set up Outlook on Android OS.

close
Last Modified:

Audio Conferencing

Resources for:
icon Close

Instant Meeting

Verizon Audio Conferencing service allows you to hold a meeting by phone at any time. To Setup an account click on the link below, complete the form, and choose submit. Voice Services will contact you with all the necessary details to begin using the service.

There is no charge to have an account, but charges are incurred when the account is used.

You will be assigned a permanent dial-in number and two passcodes – one for the leader and one for the participants.

To host an Audio Conference Call simply distribute the dial-in number, and the passcode for the participants with the date and time of the meeting.

Last Modified:

Authorization, Authentication and Access Management Policy

Resources for:
icon Close

Revision Date: New Policy
Effective Date: 11/1/2023

Section A – University Systems and Applications

I. Purpose

The purpose of this policy is to establish information security standards for individuals receiving credentials to Fairleigh Dickinson University (“FDU” or “University”) resources and how those resources are accessed.

II. Scope and Applicability

This policy applies to all university system resources. All Users are responsible for adhering to this policy.

III. Definitions

Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.

  1. Account: An established relationship between a User and a computer, network, or Information System which is assigned a credential such as a username and password.
  2. System Administrative Account: An Account with elevated privileges intended to be used only when performing management tasks, such as installing updates and application software, managing user accounts, and modifying operating system and application settings.
  3. Entitled Account: A user who has met the minimum requirement to be granted authorization to access electronic Fairleigh Dickinson University Resources.
  4. Authorized User: A User who has been granted authorization to access electronic Fairleigh Dickinson University Resources and is current and active in their privileges.
  5. Contractor or Vendor: A person or a company that undertakes a contract to provide materials or labor to perform a service.
  6. Employee: University staff faculty and adjunct, including nonexempt, exempt, and overseas staff and collegiate faculty.
  7. Multi-Factor Authentication (MFA): Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password); something you have (e.g., cryptographic identification device, token); or something you are (e.g., biometric).
  8. Privileged Account: An Account that is authorized to perform security-relevant functions that an ordinary Account is not authorized to perform.
  9. Single Sign-On (SSO): An authentication process that allows an Authorized User to access multiple applications with one set of login credentials. SSO is a common procedure in enterprises, where a client accesses multiple resources connected to a local area network (LAN).
  10. User: A member of the University community, including but not limited to Staff and Faculty, and other individuals performing services on behalf of University, including Contractors, volunteers and other individuals who may have a need to access, use or control University Data.

IV. Authentication

  1. Any service, application or Information System, whether on-premise or in the cloud, that contains WISP protected information, especially PI or PHI; OR is accessed by a large group of employees (20 or more), must use Single Sign-on authentication.
    • If the service or application is being provisioned by a business unit, the unit must engage University Systems to work with the provider to enable SSO.
    • If SSO is not supported by the service or application, it will not be approved for use by the university.
    • See Section V for exceptions.
  2. Multi-factor authentication (MFA) must be used to access University resources.
  3. Passwords must be constructed in accordance with the minimum requirements as listed below:
    • Authorized User Account passwords must meet a minimum length of 8 characters.
    • Administrative and Privileged Account passwords must meet a minimum of 10 characters.
    • Passwords must contain a mix of alphanumeric characters. Passwords must not consist of all digits, all special characters, or all alphabetic characters.
    • Automated controls must ensure that passwords are changed at 90-day intervals for both general users and administrative-level accounts.
    • NetIDs associated with a password must be disabled for a period of time after 10 consecutive failed login attempts. A minimum of 30 minutes is required for the reset period.
    • Passwords must not be the same as the NetID.
    • Passwords must not be displayed on screens.
    • Users must not share passwords.
    • Initial passwords and password resets must be issued pre-expired forcing the user to change the password upon first use.
    • Password reuse must be limited by not allowing the last 10 passwords to be reused. In addition, the password must be at least 2 days old in order to be voluntarily changed.
    • Access will be disabled 90 days past the date that a password expired if not changed.
    • Access will be disabled after 30 days of creation if NetID is not claimed.
    • Expired passwords must be changed before any other system activity is allowed.
  4. Server Password Protocol
    • If, at any time, a member of the Community is granted permission to install a server, and access to that server is restricted via Login, and if that process is granted SSO exception through section VII., that system can not hold passwords in clear text. That system must use an approved irreversible cryptographic transform to protect its users’ passwords.

VI. Enforcement

  • This policy will be enforced by technical controls wherever feasible; otherwise, this policy will be enforced by OIRT under the direction of the CIO. All members of FDU’s faculty and staff have a responsibility to promptly report any known instances of noncompliance to AVP of University Systems and Networking or the Director of Systems.
  • Failure to comply with this policy can result in disciplinary action. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

VII. Exceptions

  • Exceptions to this policy should be submitted to the AVP, USAN for review. Approval of the Chief Information Officer (CIO) or Data Security Incident Response Team (DSIRT) may be required.

Last Modified:

Availability and Use of Google Apps

Resources for:
icon Close

Effective Date: April 1st, 2021

I. Objective

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. Some external entities, however, that conduct business with University employees utilize the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff (not students) to enable collaboration with these external entities to conduct University business.

II. Purpose

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. However, it is recognized that not all entities use Microsoft Office 365 as their platform and, from time to time, FDU faculty and staff may need the ability to collaborate with external entities that may be using the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff to enable collaboration with these external entities.

  • Faculty and staff are reminded that in accordance with the University’s WISP policy, WISP protected data must not be stored or transmitted through any service, without the prior written authorization from the University Chief Information Security Officer.
  • As stated in the “Policy for Acceptable Use for Email”, Google Gmail is not available for use. All University business must be conducted through an FDU email account on Microsoft Office 365.
  • Faculty and staff may not use, or attempt to use, Google apps as a method of collaboration with students, faculty or staff. This FDU Policy on the Availability and use of Google Apps is expressly for the use with external entities only.
  • This Policy on the Availability and use of Google Apps applies only to use of Google applications by faculty and staff, and not FDU students.
  • Microsoft Office 365 is the only FDU supported platform for email and collaboration.
  • Google Apps are not supported by FDU IT personnel.

III. Scope

This policy applies to all FDU faculty and staff, wherever located throughout the world. Students will NOT have access to the fdu.edu Google Apps suite of products.

IV. Data Security Coordinator

The University has designated the Chief Information Security Officer, working together with the Data Security Information Response Team (DSIRT) and the USAN Director of Systems, to implement, supervise and maintain this Policy.

V. Internal Risks

To combat internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this Policy and the WISP will be strictly enforced.

VI. External Risks

To combat external internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this policy and the WISP will be strictly enforced.

VII. In Case of Questions

Questions regarding the availability of Google Apps can be directed to the Fairleigh Dickinson University Technical Assistance Center (UTAC). The UTAC is available 24×7.

Note:

Please note that the UTAC is not able to provide application support on the Google suite of products.

VIII. Other Applicable Policies

IX. Exceptions

Requests for exceptions to this Policy should be directed in writing to the Chief Information Security Officer via the Fairleigh Dickinson University Technical Assistance Center (UTAC).

X. Appendix

X1.1 Google Apps Available to Faculty and Staff

Note

These applications may only be used in collaboration with outside entities who use Google applications as their sole source of collaboration and request the use of any one of these application for official FDU business use. Any other use of these applications by FDU faculty and staff is a violation of this Policy.

Services Descriptions
AssignmentsAssignments brings together the capabilities of Google Docs, Drive and Search into a tool for collecting and grading student work.
CalendarGoogle Calendar is a web-based tool for personal scheduling and calendar sharing. It can be accessed through either a Web browser or through a third-party calendar client.
ClassroomGoogle Classroom enables teachers to create an online classroom area in which they can manage all the documents that their students need.
Drive and DocsGoogle Docs is an online word processor that lets you create and format text documents and collaborate with other people in real time. Google Drive on the web lets you store, access, and edit your files anywhere — on the web, on your hard drive, or on the go.
Google MeetGoogle Meet enables conversations with photos, emoji, group video calls for free. You can connect across computers, Android and Apple devices.
Google VaultVault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users’ Google Workspace data.
Groups for BusinessGoogle Groups for Business is an extended service available for G Suite users that allows you and other members in your organization to access the main Google Groups interface located at groups.google.com.
JamboardGoogle Jamboard is an online, collaborative whiteboarding application that lets you create, edit, and collaborate with other people in real time. Google Jamboard applications can be accessed on the Web, Android, and iOS.
KeepGoogle Keep is a note-taking service included as part of the free, web-based Google Docs Editors suite offered by Google
TasksGoogle Tasks is a simple to-do list—but with lists, subtasks, and mobile notifications, it has the basics you need to stay productive and keep track of the most important things you need to do.
Applied Digital SkillsApplied Digital Skills is a free, flexible video-based curriculum that prepares students for the growing number of jobs that require basic digital skills, such as email and spreadsheets.
Google Ad ManagerGoogle Ad Manager is an ad exchange platform introduced by Google on June 27, 2018. It combines the features of two former services from Google’s DoubleClick subsidiary, DoubleClick for Publishers and DoubleClick Ad Exchange.
Google AdsGoogle Ads is Google’s online advertising program. Through Google Ads, you can create online ads to reach people exactly when they’re interested in the products and services that you offer
Google AdSenseGoogle AdSense is an advertising program launched by Google in 2003 that allows website publishers to display targeted text, video, or image advertisements on website pages.
Google AlertsGoogle Alerts is a tool that allows you to track your chosen keywords and phrases so that you never miss another important conversation.
Google AnalyticsGoogle Analytics generates detailed statistics about a website’s traffic and traffic sources and measures conversions and sales
Google Cloud PlatformGoogle Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware.
Google Cloud PrintGoogle Cloud Print is a web service offered by Google. Users associate printers with their Google Account.
Google Data StudioData Studio is Google’s reporting solution for power users who want to go beyond the data and dashboards of Google Analytics.
Google EarthGoogle Earth is the most photorealistic, digital version of our planet.
Google My MapsGoogle My Maps is your way to keep track of the places that matter to you.
Google PaymentsGoogle Pay (stylized as G Pay; formerly Pay with Google and Android Pay) is a digital wallet platform and online payment system developed by Google to power in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches.
Google PlayIn Google Play, the app description is split into two fields: Short Description, a limited 80 characters preview field and. the Full Description field, giving you space for an up to 4000 characters long app description.
Google Play ConsoleGoogle App Store
Google Search ConsoleThe Search Console lets you, as a webmaster, check on the status of the indexing Google does on your site, helping you to optimize your page visibility in Google search results. Get data, tools and diagnostics for a healthy, Google-friendly site.
Google TakeoutGoogle Takeout is a service that allows users of Google products, such as YouTube, Gmail, etc., to export their data to a downloadable ZIP file.
Managed Google PlayManaged Google Play Managed Google Play is a version of Google Play that’s optimized for enterprises.
Material GalleryMaterial Gallery is a collaborative tool for uploading design work, getting feedback, and tracking revisions – quickly and efficiently.
Partner DashPartner Dash is a service that hosts several applications used by Google’s partners to manage their relationships with us. Some of these applications are invite-only, while others are publicly available to anyone logged in with a Google Account.
Scholar ProfilesThe Google Scholar Profile search pane in Publish or Perish allows you to look up a Google Scholar profile and analyze the associated publication metrics.
Search And AssistantGoogle Assistant is Google’s artificial intelligence-powered voice assistant, which grew out of Google Now.
close
Last Modified:

B-ROLL Acquisition

Resources for:
icon Close

What is B-ROLL?

B-ROLL is supplemental footage inserted as a cutaway under narration or interview that helps tell the story. It can be used to introduce a segment or to cover a speaker’s audio or video miscues.

Acquiring B-ROLL

Multimedia Services has a significant amount of B-ROLL, however, there are projects that are so specific that we will not have the exact material required. In these situations, the producer will need to schedule a day(s) to acquire the footage. In some cases, scenarios may need to be created. If B-ROLL needs to be recorded off campus, permits may be required.

Requesting Access to B-ROLL Previously Captured

We currently grant access to existing B-ROLL via direct request. Our B-ROLL catalog is currently hosted on OneDrive and can be shared with anyone in and outside of FDU upon request. For access to our B-ROLL, please email danielpando@fdu.edu.

Note

Multimedia Services is diligently organizing and labeling our extensive collection of B-ROLL footage in preparation for the launch of a new cloud-based video library, set to become available in Summer 2024. This initiative aims to enhance accessibility and search-ability, ensuring efficient use of our valuable video resources.

Last Modified:

Best Practices for Securing Your Zoom Virtual Classroom

Resources for:
icon Close

Zoom comes pre-stocked with numerous security features designed to control online classrooms, prevent disruption, and help educators effectively teach remotely. Here are some best practices for securing your virtual classroom using Zoom.

Last Modified:

Blocking Peer to Peer Applications

Resources for:
icon Close

FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files off of your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.

To view FDU’s stance on this issue in its entirety, please view the document below.

Last Modified:

Budget Transfers and Invoicing

Resources for:
icon Close

Project Quotes

Upon request, we are able to provide an initial quote for your video project, giving you an estimated cost. For a more accurate estimate, please provide as many details as possible about the project. To initiate your video project and request a quote, please email danielpando@fdu.edu.

Note

Quoted prices serves as an estimate and the final price may exceed the initially quoted amount, depending on the actual hours worked to complete the project.

Invoicing After Project Completion

Once a project is completed, an invoice will be generated that accurately reflects the predetermined cost associated with the production. An e-mail will be sent to the initial contractor of the production, and a GL account number will be requested to be added to the invoice and sent to Finance to complete the transfer.

Note

Prior to the processing of any budget transfers, it’s mandatory for the invoice to receive written approval from the either the supervisor in charge of the GL budget code, or the project leader. This step ensures proper authorization and accountability.

Last Modified:

Cellular Services

Resources for:
icon Close

Required Process

Voice Services supports cellular services for faculty and staff for both FDU New Jersey Campuses.

In order to obtain a University provided cellular device, approval must be given by an Officer of the University along with the budget manager of your department. Any requests should be submitted through Voice Services with the approvals required by email.

All cellular service purchases must meet Fairleigh Dickinson University’s Cellular Policy.

Types of Cellular Devices/Services

Basic Cell Phones

Obtaining a basic cellular phone gives you the ability to make calls and text. There is a monthly charge for voice required with this device.

Smartphones

Obtaining a smartphone gives you the ability to make calls, text, email, and access the internet. There is a monthly charge for voice and data required with this device.

For a list of current devices available to FDU through Verizon Wireless please email voiceservices@fdu.edu.

Broadband

This service can be activated on a University provided iPad. This service is for domestic use only. There is a monthly charge for data required with this service.

Jetpack

This device is a 4G LTE mobile hotspot (mobile WIFI) and can be used with your laptop or iPad. Depending on the Jetpack model you are using it can be connected to multiple devices at one time. There is a monthly charge for voice and data required with this device

Mobile Hotspot

This service can be added to an existing FDU smartphone and is used as a WIFI hotspot on your smartphone. This is a domestic service only. There is a monthly charge required for this service.

International Services

Before you travel internationally, please email Voice Services. It is imperative that you request this change at least 3 business days prior to leaving the U.S. to ensure the changes are made and validated.

Last Modified:

Change and Sync NETID Password on Mac via Jamf Connect

Resources for:
icon Close

This article offers a detailed, step-by-step guide, on how to change your NETID password directly from your Mac using the Jamf Connect and how to synchronize this updated NETID password with your Mac’s user account password.

Changing and Syncing your NET ID Password on your Mac

  1. Click on the “FDU shield icon” located in the top right of your screen’s menu bar
  1. Select “Change Password at FDU Identity
  1. Sign in to the “FDU Identity Portal” that opens up
  1. Scroll to “Change My Password” section and enter your old password and new password in the appropriate fields. Then click the “Change My Password” button
  1. You will see the password successfully changed in the red bar when successful. Click “Done
  1. Enter your “FDU NetID” and “Password” in the corresponding fields. Click “Sign In”
  1. Enter your old password in the “Local Password” prompt and click “Sync” to synchronize the new password with your Mac’s login password

Note

You will need to reauthenticate your Office 365 apps and FDU-Secure.

Synchronizing NETID Password with your Mac Password

If you changed your NETID password outside of your FDU Mac, you will be prompted automatically to sync your password to your Mac’s password the next time you are connected to the internet. You will first need to log in to the machine using your old password and then proceed with the synchronization following the steps below.

  1. The following dialog box will appear once you are connected to the internet automatically. Enter your “FDU NetID” and “Password” and click “Sign In
  1. Enter your old password in the “Local Password” prompt and click the “Sync” button to synchronize the new password with your Mac’s login password

Note

You will need to re-authenticate to your Office 365 apps and FDU-Secure.

Last Modified:

Cisco DUO FAQ’s

Resources for:
icon Close

Two-factor Authentication

Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got to add another layer of security to our accounts.

Common FAQ’s for DUO Authentication

    • DUO Push – if you have the DUO Mobile App installed on your smartphone or tablet, you can receive a push notification. From the app, you can approve or deny the login attempt.
    • Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
    • Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you a one-time code, click Enter Passcode, then click on the blue button “Text me new codes.”  These codes do not expire, and they are valid until used.    You do not have to have a smartphone for this option.
    • Phone Call (Faculty/Staff Only) – you can receive a phone call on your mobile phone or landline phone. The call will give instructions on approving or denying the login attempt.
  • DUO is required for all FDU Staff, Faculty, and Students.

  • If you opt-out of the DUO Mobile Application push notifications, there are a variety of passcode options to utilize as your second verification method.

    • Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.

     

    • Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you one-time code click Enter Passcode, then click on the blue button “Text me new codes.”These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.

     

  • Selecting this option will allow you to bypass DUO authentication for the next 60 days. This only works if cookies are enabled, and you are logging in from the same computer and browser. You will still be prompted to verify once – with your username and password. You will not be able to access your settings on that particular browser during the 60 days. Please note that if you have tools or policies running that regularly delete or clean cookies, the remember me feature will not work. If you do need to access your settings (perhaps to add another device), just try another browser or visit the FDU Self-Service Portal. Remember me will not work if your browser is set to private browsing mode.

  • The remember me feature relies on browser cookies. For remember me to work, your Internet browser must allow cookies to be stored. Visit your browser content settings to ensure cookies are being stored. Some departments on campus do not allow cookies to be stored. If the remember me feature does not work on your browser, check with desktop support in your area.

  • If you do not have your device with you, you can obtain a batch of temporary passcodes. To obtain a temporary passcode, call the Fairleigh Dickinson University Technical Assistance Center (UTAC).  Each of the passcodes can only be used once and will expire in 7 days.

    NOTE: If you have lost your device, please report it to the Fairleigh Dickinson University Technical Assistance Center (UTAC).  We want to ensure someone else does not maliciously authenticate your account with your device.

  • DUO is available to all faculty,staff, and Students. At this time, DUO is not available to FDU retirees, past employees, or alumni.

  • Yes, the passcode option on the DUO app does not require WiFi or cellular connectivity, it even works on airplane mode. To use this option, visit the DUO app on your smartphone, and tap the key icon to obtain a passcode. Enter the passcode into the DUO prompt when logging into any website that requires DUO authentication.

  • DUO Authentication is required by any application the utilizes the university Single Sign-On (SSO) service.  Examples of some websites that require DUO authentication are listed below.

    • WebAdvisior
    • WebCampus
    • Office365 (Office365.fdu.edu)
    • Blackboard
    • Zoom
  • You may have trouble receiving push requests if there are network issues between your phone and Duo’s service. Many phones have difficulty determining whether to use the Wi-Fi or cellular data channel when checking for push requests and simply turning the phone to airplane mode and back to normal operating mode again often resolves these types of issues, if there is a reliable internet connection available. Similarly, the issue may be resolved by turning off the Wi-Fi connection on your device and using the cellular data connection.

    Check the time and date on your phone and make sure they are correct. If the date and time on your phone are manually set, try changing your device’s configuration to sync date and time automatically with the network.

    iOS users can run a troubleshooting tool from within Duo Mobile version 3.32.0 or later. To run the tool:

    1. Open the Duo Mobile app on your iOS device and tap the Edit button in the top left of the accounts list screen, then tap the name of the account for you aren’t receiving push requests.
    2. Next, tap the Get Started button in the “Missing Notifications?” section of the “Account Details” screen.
    3. Duo Mobile performs the test. If any step fails, you’ll receive further troubleshooting suggestions. After taking the suggested actions, press “Run test again” to retry.

    The steps that Push Troubleshooting performs automatically are as follows:

    • Check device settings.
    • Check internet connectivity.
    • Check that the device can contact Duo’s cloud service.
    • Attempts to send a test Duo Push notification.

    Should none of these actions help, see the Duo Knowledge Base for additional iOS and Android troubleshooting steps.

    If you can’t get Duo Push working on your own, you can log in with a passcode generated by the Duo Mobile app and send a new activation link to your phone.

    If you’ve tried the suggestions here but can’t get Duo Push working or reactivate your device yourself, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC).

  • Press the red “X to deny access to your account, then promptly change your FDU NetID password.

  • Yes! Visit the app store on your smartphone to download DUO Mobile.

    DUO for iOS >

    DUO for Android >

    NOTE: Google Play Services are required to receive push notifications on Android. Users without Google Play Services installed will have to “fetch” by swiping down in the DUO Mobile app.

    1. If your phone number has not changed, login to FDU Self-Service Portal then choose the “Call my Phone” option.
    2. Choose your device from the list, and then click “Device Options” next to your phone.
    3. Next click the “Reactivate Duo Mobile” button (you will need to install the Duo app on your phone to proceed). Then follow the instructions to activate DUO Mobile on your new device.

    If you have a new phone number, you will first need to obtain a temporary passcode (see the ‘What are Passcodes?’ section above).

    1. Login to FDU Self-Service Portal and enter the temporary passcode.
    2. Click on “Add a new device.”
    3. Once you complete adding your new device, please delete the device you are replacing.
  • Yes, you can add devices by visiting your DUO settings. When you see the DUO prompt with the three notification options, click “Settings” at the top right.

    NOTE: If you are using the Remember Me for 60 days feature, you will need to visit FDU Self-Service Portal access your settings.)

    After you click Settings, click “Add a New Device“. You can register smartphones, cell phones, tablets, and landline phones.

  • The DUO smartphone application serves only to provide two-factor authentication. It does not access any personal information on your device, nor does it track your location. Learn more about DUO’s commitment to privacy on its website.

  • For additional support, please visit the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Last Modified:

Cisco Unified Communications Call Forward

Resources for:
icon Close

With Cisco Unified Communications call forwarding, you have the ability to forward all of your incoming calls to another phone number. This can be useful in the event that you need to work from home or temporarily work from a different office.

Enabling Call Forwarding On-site
  1. To activate call forwarding, press “Forward All” while the phone is still on the hook
  2. To forward off campus, enter 3 then 1 and the 10-digit number.
    Example: (3 1 201 555 1212)
  3. To forward on campus, enter the 4-digit campus extension
    Example: (5555)
  4. A message will briefly appear on your phone’s screen to let you know that calls are now being forwarded
  5. With forwarding enabled, the onscreen “Forward All” button will now read as “Forward Off

Note:

To Disable Call Forwarding simply press this “Forward Off” button when you are ready to deactivate the feature.

The call forwarding process is also explained in your phone’s Quick Reference Guide.

This short and easy to use document explains many essential UC features including conference calls, call transferring and voicemail.

close
Enabling Call Forwarding Offsite

If you are unable to be by your FDU phone, and you need to set up Call Forwarding, you can do this through our Self-Service portal.

  1. You must have an NWN Cloud Self-Service account in order to modify your preferences. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Call the Fairleigh Dickinson University Technical Assistance Center (UTAC) and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Next click on your Name on the top right of the screen. Hover over the drop-down menu and click “My Account
  1. Under “Web Password” un-click the checkbox to set a custom password. When done, click “Apply” in the top right corner
  1. Once logged in, click “My Call Forwards
  1. Input the phone number you wish to forward to then click “Apply
    • To forward off campus, enter 3 then 1 and the 10-digit number.
      Example: (3 1 201 555 1212)
    • To forward on campus, enter the 4-digit campus extension
      Example: (5555)

NOTE: If you have more than one internal number, click on the extension you wish to forward.

NOTE: If you need to use your personal cell phone to make a call from a remote site, and you do not wish to reveal your Caller ID, simply prepend the phone number to be dialed with *67.  Example: *672015551212.  Your phone number will not appear to the phone of the person dialed.

close
Last Modified:

Cisco Unified Communications Headset Selection and Pricing

Resources for:
icon Close

As a staff or faculty member, you can request a Headset for the new Cisco IP Unified Communications system.

Below you will find PDF’s containing headset offerings and the pricing sheet.

Note: With the selection of a headset, please note which Cisco phone model your headset will being connecting to.

The prices on this sheet have been pre-negotiated with our vendor. A quote is not needed to place an order for one of the approved headsets. Only approved headsets can be attached to Unified Communications devices.

If you have any questions, please contact Megan Kogut at (203)-851-7083

Last Modified:

Cisco Unified Communications Jabber Softphone Installation

Resources for:
icon Close

Installing Cisco Jabber Softphone

When you are out of the office, a softphone on your computer can be used to make and receive calls from your campus phone number.

  1. You must have an active NWN Cloud Self-Service account in order to use the Cisco Jabber Softphone. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Click and download Jabber for Windows or macOS, located within the links sections.
  1. Each Jabber link will send you to a webpage to download the latest Cisco Jabber software. Choose download at the top right and wait for it to start

Note:

There is no need to login again if you are prompted, the download will begin shortly.

  1. Install the Jabber Software
Windows
  • For Windows, double click the downloaded CiscoJabber.ZIP file and double click on the Setup file to start the installation. Click “Yes” to accept and install the software. Once complete, the Cisco Jabber Software will start and it will have created a shortcut in your Programs Folder

Note:

If you are prompted for an administrative account, and the installation will not proceed, call UTAC and they will be able to assist you through this step.

close
macOS
  • For Mac, double click the downloaded CiscoJabber.PKG and proceed through the installation.

The Cisco Jabber Software will be available under your Applications folder.

close
  1. Start Cisco Jabber and enter your username, which is your full NETID@fdu.edu in the login field and click continue. Example: (SmithR@fdu.edu)
  1. Enter your NWN self-service portal password and click Sign In
  1. The Cisco Jabber client installation is now complete.
Last Modified:

Cisco Unified Communications Phone System Manuals

Resources for:
icon Close

Below you can download the manuals for the new FDU Unified Communications Phone Systems from Cisco. The manuals provide information on how to use and access the voicemail features.

Florham and Metro

Vancouver

Last Modified:

Cisco Unified Communications Voice Mail Features

Resources for:
icon Close

Initial Voice Mail Set-Up from Your Own Campus Extension

From your desk phone:

  1. Press the message button on your phone instrument.
  2. Enter your Mailbox ID, this is your 4 digit extension.
  3. Enter the temporary PIN 13579 followed by the # sign.
  4. Listen to the prompts to set-up your voicemail greeting.

Initial Voice Mail Set-Up from Off Campus

When off campus, you can setup your voicemail system by dialing your campus’ assigned voicemail number:

  • Florham Campus: (973)-443-8100
  • Metropolitan Campus: (201)-692-7600
  • Vancouver Campus: (604)-648-4485

Follow these instructions to log into and setup your voicemail:

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter the temporary PIN 13579 followed by the # sign.
  4. Listen to the prompts to set-up your voicemail greeting.

Accessing Voicemail On Campus

  • Press the message button on your phone instrument.
  • Enter your Mailbox ID, this is your 4 digit extension.
  • Enter your 5 digit PIN followed by the # sign.

Accessing Voicemail Off Campus

You can access your voicemail when off campus by dialing your campus’ assigned voicemail phone number:

  • Florham Campus: (973)-443-8100
  • Metropolitan Campus: (201)-692-7600
  • Vancouver Campus: (604)-648-4485

Follow these instructions to log into your voicemail:

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter your 5 digit PIN followed by the # sign.

Accessing Voicemail from Another Extension That Has Voicemail

Dial the voicemail extension 8100, 7600 or 4485.

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter your 5 digit PIN followed by the # sign.

Changing Voicemail Messages & Passcodes

When you first set up your mailbox, you record a greeting, your name and select a passcode. The set-up options allows you to change these at any time. You should update your greeting(s) regularly to let callers know whether you’re in or out of the office. Your voicemail message should always be appropriate, so callers will feel confident in leaving messages. And, of course, boxes should be emptied daily, if not more frequently.

When the University or your department closes you should always redo your voicemail message making the caller aware that the University or your department is closed.

The voicemail system will prompt you as to how to make changes. When you are in doubt about what to do next, you can download the manuals for the new FDU Unified Communications Phone Systems from Cisco. The manuals provide information on how to use and access the voicemail features.

If you are NOT forwarding your office phone, you should create a new voice message similar to the messages below and establish a pattern and practice of checking your voicemail regularly.

Please update your outgoing message to reflect an appropriate out of office message.

Voicemail Forwarding Suggested Message

Below is a recommended Voicemail Message:

“You’ve reached the voicemail of [NAME, TITLE/DEPT]. Fairleigh Dickinson University has moved to virtual business operations as a precaution against the spread of COVID-19. I’ll be checking my voicemail, but would appreciate you also reaching out to me by email at [YOUR EMAIL]@fdu.edu. Thank you.”

Last Modified:

Claim or Create an FDU NetID Account

Resources for:
icon Close

Welcome to Fairleigh Dickinson University. As a new member of our campus community, one of your first priorities will be gaining access to FDU NetID. With an FDU NetID, you will have access to a variety of IT resources, including Office365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.

New Student through Welcome Email (US Students)

If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below


New Student

If you are a new student at FDU Vancouver or if you are a New Jersey based student that has not received a Welcome Email, please visit the link below


New Faculty, Staff Member Temporary Employee, or On-Campus Contractor

If you are a new Faculty, adjunct Faculty, Staff member, temporary employee, or contractor who works on campus and requires a NetID, please visit the link below


All Others

If you are entitled to an FDU NetID account and either do not fall under any of the categories above or attempted to claim their NetID and received a message that your NetID has not been created, please visit the link below

Last Modified:

Classroom Technology

Resources for:
icon Close

FDU has a number of technology enhanced classrooms that are capable of video/computer projection. To find out if your classroom is on this list please review the charts below for your campus:

Metropolitan Campus Technology Chart

Tip

Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Becton Hall202YesYes Laser
Becton Hall205Yes Yes Laser
Becton Hall208YesYes Laser
Becton Hall302Only DVD Yes YesYes
Becton Hall304Only DVD Yes YesYes
Becton Hall305 Yes Yes
Becton Hall306 Yes Yes
Becton Hall402 Yes Laser
Becton Hall403/404 (LED Screen)Yes Yes YesYes
Becton Hall405 Yes Laser
Becton Hall406 Yes Laser
Becton Hall407 Yes Laser
Becton Hall408 Yes Laser
Becton Hall Conference Room307
Dickinson Hall1104YesYes Laser
Dickinson Hall1128YesYes Yes
Dickinson Hall1129YesYes Yes
Dickinson Hall1142YesYes Laser
Dickinson Hall1143Yes Yes Yes
Dickinson Hall1144Yes Yes Laser
Dickinson Hall1148 Yes
Dickinson Hall1149YesYes Yes
Dickinson Hall1150YesYes Yes
Dickinson Hall1151YesYes Laser
Dickinson Hall1152 (LED Television)YesYes Yes
Dickinson Hall1153 (LED Televison)YesYes Yes
Dickinson Hall1165 (LED Televison)YesYes Yes
Dickinson Hall1170 (LED Television)YesYes Yes
Dickinson Hall2135YesYesYesLaser
Dickinson Hall2137Yes Yes Yes
Dickinson Hall2177YesYes Laser
Dickinson Hall2178YesYesYesLaserYes
Dickinson Hall2230Yes Yes Laser
Dickinson Hall2249 Yes YesYes
Dickinson Hall2262Individual DVD & VCR Yes
Dickinson Hall2263 Yes Laser
Dickinson Hall4468Yes Laser
Dickinson Hall4469YesYes Laser
Dickinson Hall4473YesYes Laser
Dickinson Hall4475Yes Yes Laser
Dickinson Hall5504YesYes Laser
Dickinson Hall5506YesYes Laser
Dickinson Hall5509 Laser
Dickinson Hall5520 Yes Laser
Dickinson Hall5523 Yes Yes
Dickinson Hall5529YesYes Laser
Dickinson Hall5534YesYes Laser
Dickinson Hall – Conference Room1191 Laser
Dickinson Hall – Conference Room2245 YesYesLaser
Dickinson Hall – Continuing Education1127YesYes Laser
Dickinson Hall (Lab A)2163 Yes Laser
Dickinson Hall (Lab B)2164 Yes Laser
Edward Williams Building201 Yes Yes
Edward Williams Building202 Yes Yes
Edward Williams Building203 Yes
Edward Williams Building204 YesYes Yes
Edward Williams Building205 Yes Laser
Edward Williams Building206 Yes Laser
Edward Williams Building207 Yes Yes
Edward Williams Building209 Yes Laser
Edward Williams Building301 Yes Laser
Edward Williams Building302 Yes Laser
Edward Williams Building303 Yes Laser
Edward Williams Building304 Yes Laser
Edward Williams Building305 Yes Laser
Edward Williams Building308 Yes Laser
Edward Williams Building309 Yes Laser
Edward Williams BuildingCommons 1YesYes Laser
Edward Williams BuildingCommons 2YesYes Laser
Edward Williams BuildingAuditoriumYesYes Laser
Giovatto LibraryWriting Lab Yes Laser
Giovatto LibraryWLB 3YesYes Laser
Giovatto LibraryWLB 4YesYes Laser
Giovatto LibraryAuditoriumYesYes
Giovatto LibraryWLB 1 (LED Screen)YesYes (TV Speakers)
Giovatto LibraryWLB2 (LED Screen)YesYes (TV Speakers)
Multipurpose RoomYesYesYes Laser
Muscarelle105Yes Yes Laser
Muscarelle202YesYes
Muscarelle203Yes Yes Laser
Muscarelle204 Yes Laser
Muscarelle205YesYes Yes
Muscarelle206Yes Yes Yes
Muscarelle207L Yes Laser
Muscarelle207RYesYes Yes
Robison Annex100Yes Yes Laser
Robison Annex101YesYes Laser
Robison Annex203Yes Yes Yes
Robison Annex204YesYes Yes
Robison Annex205Yes Yes Laser
Robison Annex300 Yes Laser
Robison Annex301 Yes Yes
Robison Annex303 Yes Laser
Robison Annex304YesYes Laser
Robison Annex305 Yes Laser
Robison Hall23BYesYes Laser
Robison Hall501
Robison Hall503 Laser
Rutherford RoomYesYesYes Laser
University Hall TheatreLED ScreenYes
University HallFront Lab Yes Laser
University HallBack Lab Yes Laser
University HallMultimedia Lab YesYes Laser
Williams Hall Yes
Williams Hall102YesYes Laser
Williams Hall107YesYes Laser
Williams Hall201 Yes Laser
Williams Hall202 Yes Laser
Williams Hall203 Yes Laser
Williams Hall206 Yes Laser
Williams Hall207 Yes Yes
Wilson AuditoriumYesYesYes Laser
close
Florham Campus Technology Chart

Tip

Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Dreyfuss Building102YesYes Laser
Dreyfuss Building103YesYes Laser
Dreyfuss Building104YesYes Laser
Dreyfuss Building105YesYes Laser
Dreyfuss Building106YesYes Laser
Dreyfuss Building107YesYes Laser
Dreyfuss Building121Yes Laser
Dreyfuss Building125YesYes Laser
Dreyfuss Building206 Yes Yes
Dreyfuss Building207 Yes Yes
Dreyfuss Building208 Yes Yes
Dreyfuss Building209YesLaser
Dreyfuss Building210 Yes Yes
Dreyfuss Building211
Dreyfuss Building212
Dreyfuss Building213
Dreyfuss BuildingTheater
Hennessey Room 1Yes Yes Yes
Hennessey Room 2Yes Yes Yes
LibraryLibrary ClassroomYes Yes Laser
Mansion11YesYes Laser
Mansion12Yes Yes Laser
Mansion13YesYes Laser
Mansion17Yes Yes Laser
Mansion30Yes Yes Laser
Mansion33Yes Yes Yes
Mansion35Yes Yes Laser
Mansion36YesYes Yes
Mansion38YesYes Laser
Moninger 105 Just DVDYesYesYesYes
Moninger 106 Just DVDYesYesYesYes
Moninger 107YesJust DVDYes Laser
Moninger 113Yes Yes Yes
Moninger 118 Just DVDYesYesLCD ScreenYes
Moninger 119 Just DVDYesYesLCD ScreenYes
Moninger 205 Yes
Moninger 206 Yes
Moninger 210 Yes
Moninger 228YesYesLaser
OrangerieYes Yes Yes
Science Building1 Yes Yes
Science Building3 Yes
Science Building6 Yes
Science Building7Yes Yes Yes
Science Building9 Yes Yes
Science Building11Yes Yes Laser
Science Building15A Yes Yes
Science Building17YesYes Yes
Science Building18 Yes Yes
Science Building19 Yes Laser
Student CenterSammartino RoomYes Yes Yes
Student CenterFlorham RoomYes Yes Yes
Student CenterWroxton RoomYesYes
Student CenterBottle Hill Room
Twombly LoungeYesYesYes Laser
Zen Building102YesYes Laser
Zen Building103YesYes Laser
Zen Building104YesYes LCD Panel
Zen Building105YesYes
Zen Building106YesYes
Zen Building107YesYes Yes
Zen Building108YesYes Yes
Zen Building109YesYes Laser
Zen Building110DVD onlyYes LCD PanelYes
Zen Building202YesYes Yes
Zen Building203YesYes Yes
Zen Building204Yes Yes Yes
Zen Building205YesYes Yes
Zen Building206YesYes LCD Panel
Zen Building207Yes Yes Yes
Zen Building208DVD onlyYes LCD PanelYes
Zen Building209YesYes Yes
Zen Building210 Laser
Zen Building211 YesYes Yes
Zen Building212 YesYes Yes
close
Last Modified:

Computer Lab Mission Statement

Resources for:
icon Close

The FDU computer labs provide a safe and welcoming study space for our users. The computer labs provide access to technological resources such as: current specialty software applications for a variety of majors, access to online libraries for research, internet access, and print services. Our labs are also available to faculty for instruction in both technology-intensive and non-intensive majors. The computer labs are also used as a venue for various workshops and university programs. The lab hours are flexible to meet the needs of both resident students and commuter students. The lab operations also provide on-campus work opportunities for our students to develop their skills and offer customer service and technical support to our campus community.

FDU Computer Labs Provide:

  • A conducive learning space that enables students to develop the skills necessary for collaboration and teamwork.
  • Hands on experience with current hardware and software applications used for a variety of majors.
  • Students access to the same technology resources for the purposes of research, printing, and producing professional work.
  • Customer service and on-site technical support from our student staff.
  • Access and opportunities for students to develop their computer skills.
  • Interactive learning opportunities between faculty and students; theory and application in one setting under the supervision of faculty with the support of student staff.

Last Modified:

Computer Lab Reservation Policy

Resources for:
icon Close

Due to the increasing demand of the academic computer facilities, a general document detailing the policies for computer lab reservations has been outlined. The purpose of the computer lab reservation policy is to provide faculty, staff and students with equitable access to campus computing lab resources. Most computer labs are used as classrooms and they are available for open-access use when there are no classes in session.

There are currently four Computing Services computer labs which can be used for classroom instruction on each campus. They are: D206, D207, D208, and D209 located in the Dreyfuss Building on the Florham Campus. The computer labs located on the Metropolitan Campus are: DH2163 and DH2164 in Dickinson Hall and UH Front Lab (UH22) and UH Back Lab (UH28) in University Hall. Also, there are three multimedia labs; two on the Florham campus and one on the Metropolitan campus. The multimedia labs for the Florham Campus are: D211-Animation Lab and ZEN110 – Graphic Design Lab) located in the Dreyfuss and ZEN Buildings. On the Metropolitan campus, the multimedia lab (MML) is located in Becton Hall Room 403. The multimedia labs are primarily used for courses offered by the FDU School of Arts. All labs used for classroom instruction and general use are equipped with a LaserJet printer and data projector. The Animation Lab is equipped with 3-D printers. All multimedia labs are equipped with ZOOM capability to support hybrid instruction.

If you have any questions regarding the lab reservation policy, please contact Denzel James via email at: d.james@fdu.edu

Last Modified:

Computer Tips, Tricks, and Recommendations

Resources for:
icon Close

As technology evolves and new features are offered, there may be times when unwanted or unexpected things happen. This page is dedicated to providing some tips, tricks, and recommendations to circumvent these undesired circumstances.

Normalize Sound Levels – Windows

Microsoft Windows 10 automatically adjusts audio levels between different applications. This can affect the level of sounds from various applications depending on what program is currently being used. This feature can be turned off using the instructions below.

Instructions
  1. From the Sound Icon in your task bar, single right-click
  1. Click “Sounds
  1. Click “Communications” tab.
  1. Select the “Do nothing” radial button
  1. Click “Apply
  2. Click “OK
close

Adjust Microphone Settings – Windows

To ensure clear and audible audio in virtual meeting applications, such as Zoom, please follow the instructions below.

Instructions
  1. Right-click the Audio icon in the system tray portion of the task bar
  1. Click “Sounds
  1. Click “Recording

Note

Not all options may be visible.

  1. Right Click on “Microphone Array” and select “Properties
  1. Click the “Advanced” and un-check “Enable Audio Enhancements
  1. Click “Apply
  1. Click “OK
close

Adjust Power Options – Lenovo Laptops

Default power profiles in Windows 10 are configured to balance performance and battery life. To change these settings, please follow the steps below.

Instructions
  1. Click on Start, and then click “Settings
  1. Click on “System
  1. Select “Power & Sleep
  1. To modify power settings while the laptop is plugged in or on battery power, modify the below options

Note:

Selecting higher times may result in shorter battery life

  1. For additional power settings, such as the laptop lid and power button settings, click Additional power settings

Note

Depending on window size, this option may be located towards the bottom or on the right side of the screen.

  1. Select either “Choose what the power buttons door “Choose what closing the lid does
  1. The options below will allow modifying the effects of pressing the power button and closing the lid

Note

Setting DO NOTHING when closing the lid can lead to drastically less battery life as well as overheating when the laptop is placed inside a bag or briefcase.

close

Restarting A Computer

Rebooting a device is highly encouraged as it will help keep the system running at peak performance. The benefits of a weekly reboot include:

  • Mitigate vulnerabilities to cyber-attacks by applying critical updates
  • Prevent performance degradation
  • Prevent application memory faults
  • Effectively apply system policies

To restart a device, follow the instruction below.

Tip

Make sure any open application is saved and closed before a restart is performed. This includes applications like Outlook, Word, Excel and any other applications that may be opend.

Instructions for Windows
  1. Click the Start bottom on the bottom left hand side of the task bar
  1. Click the “Powerbutton
  1. Click “Restart

Note

Clicking “Shutdown” will not always properly apply updates or produce the desired effect. Clicking “restart” is the recomended option.

close
Instructions for macOS
  1. Click the “Apple” at the top left-hand side of your screen
  1. Click “Restart
close
Last Modified:

Computing Services Computer Labs

Resources for:
icon Close

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use. Computer Lab hours of operation are subject to change based upon utilization throughout the semester.

Spring Semester 2024 Computer Labs Hours

Jan 22, 2024 – May 14, 2024

Florham Campus

Dreyfuss Building
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
Dreyfuss Building8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
5 PM
12 PM-
9 PM
Dreyfuss
211, 212, 213
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
5 PM
12 PM-
9 PM

Rooms:

  • D206
  • D207
  • D208

  • D209
  • D211
  • D212
  • D213

Phone:

(973)-443-8689

close

Metropolitan Campus

Dickinson Hall – Hackensack
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
Dickinson Hall8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
ClosedClosed

Rooms:

  • Lab A (DH2163)
  • Lab B (DH2164)
  • Lab C (DH2165)

Phone:

(201)-692-7111

close
University Hall – Teaneck
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
University Hall8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
6 PM
2 PM-
10 AM

Rooms:

  • Front Lab (UH 22)
  • Back Lab (UH 28)
  • UH Side Lab

Phone:

(201)-692-7112

close
Student Union Building – Teaneck

Rooms:

  • Multipurpose Room 135

Phone:

(201)-692-2222

Note

The Student Union Building Multipurpose Room will be locked at all times. To gain access to the Student Union Building computer lab, you will need to contact Public Safety at (201)-692-2222.

close

Lab computers are available on a first-come-first-serve basis unless reserved for classes.
Class reservations are posted at the lab entrances.

Last Modified:

Confidentiality Agreement and Security Policy

Resources for:
icon Close

Effective Date: 11/07/2023
Last Revision: 11/01/2013

Select employees of Fairleigh Dickinson University may be required to engage with confidential University data. The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.

Confidentiality Agreement and Security Policy

Fairleigh Dickinson University regards the security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:

Policy on Confidential Information

Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including the Family Education Rights and Privacy Act (“FERPA”) and, as applicable, The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). For more information, see: FDU’s General Confidentiality Policy, FERPA and HIPAA

Confidential Information shall be defined as:

  • regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record; 
  • regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and 
  • any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.

The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:

  • is or becomes publicly available without breach of this Policy by the recipient;
  • is rightfully received by the recipient without obligations of confidentiality; or
  • is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
  • is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, the New Jersey Conscientious Employee Protection Act (“NJCEPA”), or similar legislation.  (Brief overview of the NJCEPA is available here.

Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:

  1. Access Confidential Information solely in order to perform his/her job responsibilities.
  2. Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
  3. Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
  4. Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
  5. Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
  6. Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
  7. Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
  8. Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.

It is the individual’s responsibility to immediately report, as outlined under “Information Security Breach and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.

Security Measures and Procedures

All users of University information systems, including Datatel, MS File shares and FDU Office 365 email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:

  1. All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.
    • Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.
    • Your user ID, password or PIN provides access to information that has been granted specifically to you.  To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.
    • It is your responsibility to change your password immediately if you believe someone else has obtained it.

NOTE: If you need your Password or PIN changed, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) immediately.

  1. Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.
    • You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so.  Any access obtained without written authorization is considered unauthorized access.
    • In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday.

NOTE:  If you require assistance in establishing your workstation password, please access the screensaver documentation or contact the Fairleigh Dickinson University Technical Assistance Center (UTAC).

  1. If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breach and Violation Reporting” at the end of this policy.

NOTE: All University’s computer system will periodically prompt you to change your password.

  1. Upon termination or transfer of an employee, Human Resources will notify University Systems and Security, who in turn will notify the appropriate areas in the Computer Center.
  1. Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
  1. You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.

Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID.

I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated. Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal. This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.

Information Security Breach and/or Policy Violation Reporting

If you suspect an Information Security Data Breach or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC); do not provide details but request a ticket be opened with University Systems & Security due to an information security data breach or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.


Last Modified:

Connecting a mobile device to the FDU-Secure Wireless Network

Resources for:
icon Close

Learn how to connect your Apple or Android mobile devices to the FDU-Secure wireless network. ChromeOS and or Chromebook devices will utilize the Android settings listed below to connect to the FDU-Secure wireless network.

Warning Warning

FDU Computing Services does not support ChromeOS and or Chromebook hardware except for explicitly connecting said devices to the FDU-Secure wireless network.

Apple iOS and iPad Mobile Devices
  1. From your Apple mobile device’s Home screen, locate and tap the Settings app
  1. Tap Wi-Fi within the “Settings” app
  1. Tap FDU-Secure
  1. Enter your FDU NetID credentials when prompted and then tap Join
  1. Tap Trust when prompted to accept the wireless security certificate; if you do not complete this step, you will not be able to connect to the FDU-Secure wireless network successfully
  1. After joining the FDU-Secure wireless network successfully, you will see a blue checkmark next to the network name and the “connected” Wi-Fi icon in the upper top portion of your device display
close
Android Mobile Devices
  1. Open your Android mobile or ChromeOS device’s Settings app
  1. Tap Network & internet > Internet within the “Settings” app
  1. Tap FDU-Secure from the listed nearby networks
  1. Enter the configuration information as seen below
Faculty & Staff
Students
EAP MethodPEAP
Phase 2 AuthenticationMSCHAPV2
CA CertificateUse system certificates
NOTE: Some devices do not have this option. Instead, select the “Do not validate” or “Trust on First Use” options if available.
Domainfdu.edu
IdentityYour FDU e-mail address
Anonymous Identity Can be ignored
PasswordYour FDU email password

If your device does not already have system certificates installed and you selected “Do not validate” you will see a warning message about security/privacy. It is safe to connect to our network; this is just a general message from the operating system.

“Do not validate” Warning

On Android devices with OS versions 11 and above, the “Do not validate” CA Certificate option has been removed as a menu option. “Trust on First Use” or “Use system certificates” must be used to successfully connect the mobile device to the FDU-Secure wireless network in this case. If the “Trust on First Use” CA Certificate option is selected, you will see a warning message requiring you to tap “Yes connect.”

“Trust on First Use” Warning
  1. Tap Connect
close
Last Modified:

Connecting a Non-PC Device to Wi-Fi

Resources for:
icon Close

This article is intended for students, staff, and faculty who wish to connect their non-PC, IoT, gaming, or streaming devices to the FDU-Wireless network. Devices that require registration include gaming consoles (such as Xbox, PlayStation, Switch) and streaming devices (like Amazon Fire Stick, Apple TV, and Roku).

Note

FDU-Wireless is only for non-PC, IoT, gaming, or streaming devices that do not support WPA2 Enterprise authentication or features a web browser.

Registering a Non-PC Device for use on FDU-Wireless Network

Use the link and directions below to register and manage wireless network access for your non-PC devices.

  1. Sign in into FDU MyDevices portal using the link below using your FDU NetID. Make sure to check “I agree to the terms and conditions” button before clicking “Sign On

FDU MyDevices Portal

  1. Select “Add” to begin registering a device
  1. Enter your device type and your device’s MAC Address into the corresponding text boxes. An optional description may be entered for your device as well. Your device’s MAC Address must be entered to register the device and continue. Refer to your devices manufacture for instructions on how to obtain the devices MAC Address. When finished, select “Submit

Tip

Some devices have their MAC Address labeled alongside it’s Serial number.

Your device should now be listed on MyDevices Portal and allowed to connect to the FDU-Wireless network. It may be necessary to select the FDU-Wireless network on your device or restart your device before successfully connecting to the wireless network

Note

Once your device is added, the status will always remain as Pending. However you will be able to connect the device to FDU-Wireless regardless of this status.

Last Modified:

Connecting and Using an All-in-One at Home

Resources for:
icon Close

How to Connect an All-in-One for Work-at-Home

Making the Physical Connections

  1. Make the appropriate connections to the back of the all-in-one.
    • Plug in the power cable to the power port on the back of the all-in-one.
    • A physical network connection is only required if you do not want to or can not use wireless.
    • Both the keyboard and mouse can be plugged into any USB port.
  1. Turn the PC on and sign in as normal.

Connecting to Wi-fi (Skip if Using a Physical Network Cable)

  1. Click on the network icon on the bottom-right hand of the Start bar near the system clock.
  1. A list of available networks will populate. Select your home wireless network.
  1. Select your network and click “Connect“.
  1. Enter the network key for your wireless router. This can sometimes be located on the side or bottom of your router and/or modem. Click “Next“.

Connecting to VPN from Home

  1. Click on the arrow on the bottom right hand of the Start bar near the system clock and right-click on the “Cisco VPN Access” icon. On the pop-up menu, click “Connect“.
  1. If this is the first time connecting to VPN service please enter the text below as shown into the VPN field and click “Connect“.
  1. Enter your full NetID information and click “Ok“.
  1. Once a successful connection is made a prompt will appear and the icon for the Cisco VPN Access in the system try will appear with a lock.
Last Modified:

Copyright Enforcement Policy

Resources for:
icon Close

Fairleigh Dickinson University vigorously enforces United States copyright law. When utilizing the FDU Local Area Network or FDU provided Internet Access, you are required to adhere to all existing US copyright laws.

To view the full statement of law, please visit:

Failure to comply with this document can result in FDU disciplinary action as well as civil and criminal penalties.

Last Modified:

Cost Associated with Production and Post Production

Resources for:
icon Close

Production Services

Multimedia Services operates as a cost recovery center, ensuring our pricing remains competitive and significantly lower than external video production studios, without compromising on production value.

Our pricing structure is straightforward: video production services are offered at a flat rate of $150.00 per hour, making high-quality production accessible and affordable.

Post Production

When it comes to post-production, our rates are equally transparent, set at a flat rate of $50.00 per hour. The total time required for editing a project can vary, but on average, it ranges between 20 to 30 hours, depending on the complexity of the project, its duration, and the number of revisions needed during the preview stages.

ADA Captioning

In line with ensuring all online distributed videos are ADA compliant, our services include closed captioning and transcription. While platforms like YouTube automatically generate captions, they might not always be perfectly accurate. For videos requiring 100% accuracy in transcription, or for content hosted on platforms other than YouTube, we offer professional transcription services at an additional cost to meet all accessibility standards.

Last Modified:

CrashPlan Backup Email Alert

Resources for:
icon Close

Backup Alert Email Notifications

CrashPlan Backup will send users an email alert notifying them of any incomplete backups of their devices.

  • The CrashPlan Backup email alert will be sent from “CrashPlan <noreply@crashplan.com>
  • The Subject line of the email will be labeled with: “[External]Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:

CrashPlan Backup Alert Email Notification

What to do if you get a backup alert

After receiving a CrashPlan Backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan Backup device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email.

For Windows Devices

To locate the name of a CrashPlan Backup device:

  1. Click the CrashPlan Backup icon in the Windows System Tray, also referred to as the notification area.

CrashPlan Backup icon

  1. Click “Run Backup now

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

Ensure the CrashPlan backup application displays the same name as the CrashPlan Backup alert email you received.

close
For macOS Devices

After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:

  1. Click the “CrashPlan Backup” System Tray or macOS menu bar Icon

CrashPlan Backup Icon

  1. Click “Run Backup now

Note

The backup may take some time to complete. This depends on the length of time since CrashPlan Backup’s last completed backup and the amount of new data that needs to be backed up.

close
Last Modified:

CrashPlan Tutorial

Resources for:
icon Close

CrashPlan is a backup agent that will back up all data on a university device under the primary owner’s profile. The backup sets can be used for restoring data to a machine, whether it has been reformatted, replaced, or compromised. This document will outline the steps needed to install, activate, and restore data to a new or existing device.

index

Index

About CrashPlan

CrashPlan Policy

CrashPlan is required on all University provided desktops and laptops to backup all University Business data to prevent data loss.

Who Can use CrashPlan?

CrashPlan is presently licensed for full-time faculty and full-time staff only. The University mandates CrashPlan for proper data security practices. If a user has personal data that they wish to exclude from being backed up, a folder labeled “Personal Documents” can be found and utilized in your “Documents” folder. This folder and its contents will be ignored by CrashPlan when your system is being backed up.

Personal Documents folder locations:

Windows PCC:\users\username\Documents\Personal Documents\
macOS/users/username/documents/Personal Documents/

Tip

If the Personal Documents folder does not exist in your Documents folder, you can manually create it and the folder will be automatically ignored by CrashPlan.

Is My Data Secure?

CrashPlan uses AES-256 encryption is used when storing your backups and can only be accessed by the CrashPlan account owner and administrators.

What is Backed Up?

All data found in a user profile will be backed up by CrashPlan.

Location of User Profile:

Windows PCC:\users\UserName\
macOS/users/username/

Warning Warning

Any data not stored in the user profile will NOT be backed up by CrashPlan. It is highly encouraged to store university business data within your user profile.

How to Install on a Windows PC

To install CrashPlan on your Windows PC, please follow the instructions below.

Note

CrashPlan is being automatically deployed to all systems owned by Faileigh Dickinson University.

Before Installing CrashPlan, you must be logged in as the owner of the machine using your NetID Credentials.

  1. Open FDU Self Service Portal for Software on your University PC
  2. Click on CrashPlan Backup and then click “Install” on the right-hand side

Note

It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once CrashPlan is installed, your account is automatically provisioned in the CrashPlan system, and your backup will begin shortly.

How to Install on macOS

To install CrashPlan on your macOS device, please follow the instructions below.

Note

CrashPlan is being automatically deployed to all systems owned by Faileigh Dickinson University.

  1. Locate the FDU Self Service Portal in your applications folder or locating the icon on your dock
  2. Locate CrashPlan Backup and click “Enroll”
  1. After the package installs, you will be prompted to enter your FDU email address and then click “OK

Note

It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once CrashPlan is installed, your account is automatically provisioned in the CrashPlan system, and your backup will begin shortly.

How to Replace or Add a Second Device

This process is used when someone will be assigned a second device and wishes to have it backed up or if the CrashPlan needs to be re-installed on the same device. Because an account already exists, it cannot be provisioned automatically. It must be manually setup either to replace an existing device or create a new backup set on the second computer.

Note

In order to proceed, CrashPlan must be installed prior to continuing, please refer back to the Install instructions for your operating system from the CrashPlan User Guide. A link is found at the bottom of this page.

Tip

A backup set is CrashPlan’s way of describing the backup configuration and what files are being backed up.

  1. Click on the CrashPlan app in the system tray (PC) or Menu bar (macOS) and then click “Setup Device
  1. If prompted, log in to the FDU NetID Portal and proceed through the FDU single sign-on process
  2. Click “Replace Existing
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-2.png
  1. Click “Start” to continue with the replace existing device process
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-3.png
  1. Select the device from the list you are replacing and click “Continue
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-4.png
  1. Click “Select Files” on the following window
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-5.png
  1. Select and Choose which files you wish to replace by placing a checkmark next to each. When finished, click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-6.png
  1. The next window will allow you to select how you wish to restore your files. Make your selections and click “Go
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-7.png
  1. The next window will display download progress for the restore process. You can continue forward by clicking “Continue” at the bottom
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-8.png
  1. The next window Downloads the Files to your device. When the transfer is completed, click “Next
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-9.png

Tip

You can close this window and continue working or you can click transfer more files and repeat the steps for additional files. This will extend the time it needs to restore.

  1. Your Transfer is now complete, click “Finish
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-10.png

Verifying a Backup Instructions

If you are unsure if you have CrashPlan installed and backing up your system, this quick guide will help give you some comfort.

  1. Click on the CrashPlan icon from the system tray on Windows and the menu bar on macOS

CrashPlan Icon

  1. The Progress will be displayed like in the Figure below
This image has an empty alt attribute; its file name is Code42-Verifying-Backup-Progress-Figure-2.png

Note

Depending on your backup size, this could take anywhere from a few minutes to a few days. CrashPlan will continue to run and backup in the background. After the first successful backup, incremental backups will occur.

How to Manage Backups

CrashPlan allows you to manage your backup sets. If you want to review your backup set or request assistance, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to initiate a service request.

How to Restore Files

Accidentally deleted or unable to find a file? CrashPlan can help. Please follow the following guidelines in restoring lost or previous versions of files.

  1. Click the CrashPlan System Tray or macOS menu bar Icon

CrashPlan Icon

  1. Left-click on the gear symbol and left-click on “Open CrashPlan….
  1. If prompted, log in to the FDU Single sign-on Portal and proceed through the FDU DUO Multifactor authentication procedures
  2. Click “Restore Files
  3. Select the device you wish to restore from
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-2.png

Note

If you have more than one backup device, please select the device from where you want to restore the file from.

  1. You can select a date range from when you wish to restore from on the right-hand side
  2. Navigate to the folder(s) and/or file(s) you wish to restore and place a check next to each one
  3. Click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-3.png
  1. Select how CrashPlan will restore your files. Click “Go” when finished
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-4.png

Note

Above are the recommended options for restoring files, this will help you find them more easily.

The time it takes to restore your files will depend on how much data is being restored, available system resources, and available bandwidth.

How to Add Backup Sets

Using CrashPlan you can create backup sets that will back up your data to additional devices utilizing a schedule. This is useful to have immediate access to critical files in the event of data loss.

This guide is only needed if you wish to have a local backup of your data.

Note

If you schedule multiple backup sets to run at specific times and the backup sets go to the same destination, ensure that these times do not overlap. This ensures good backup performance.

  1. Click the CrashPlan System Tray or macOS menu bar Icon

CrashPlan Icon

  1. Left-click on the gear symbol and left-click on “Open CrashPlan….
This image has an empty alt attribute; its file name is Code-42-How-to-Add-Backup-Sets-Figure-1.png
  1. If prompted, log in to the FDU Single Sign-on Portal and proceed through the FDU DUO Multi-factor authentication procedures
  2. From the CrashPlan console window, click the “Dropdown Arrow” symbol next to your device name to drop down a menu, then click “Add Backup Set…
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-2.png
  • The next window will be the Add Backup Set configuration window.
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-3.png

Note

The “Add Set” button will be un-clickable until it is completely configured.

  1. Click “Rename” to label your backup set
  2. Changing Selected Files, click “Change”, and select the files and folders you wish to backup to a local destination
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-4.png
  1. When finished click “Save
  2. Click “Change” to set your destination for your backup
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-5.png
  1. Select your destination by clicking “Add Local Destination (usually an external hard drive) and click “Save
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-6.png
  1. Click “Add Set” to finalize the setup and start backing up to a local location
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-7.png

Your new back upset is finished and will begin backing up as configured.

This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-8.png

Backup Alert Email Notifications

CrashPlan will send users an email alert notifying of any incomplete backups of their devices.

  • The CrashPlan email alert will be sent from CrashPlan for Enterprise <noreply@crashplan.com>
  • The Subject line of the email will be labeled with: Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:

CrashPlan Backup Alert Email Notification

What to do if you get a backup alert

After receiving a CrashPlan backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email. To locate the name of a CrashPlan device, left-click the CrashPlan “C” symbol icon in the Windows System Tray, also referred to as the notification area.

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

For macOS users left-click CrashPlan symbol icon on the macOS icon menu bar. The CrashPlan device name will be displayed in the console. Ensure the CrashPlan application displays the same name as the CrashPlan backup alert email you received.

CrashPlan Symbol Icon

CrashPlan Device Name

After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:

  1. Left-click the “CrashPlan” System Tray or macOS menu bar Icon

CrashPlan Icon

  1. Left-click “Run backup now

Note

The backup may take some time to complete. This depends on the length of time since CrashPlan’s last complete backup and the amount of new data needed to be backed up.

Getting Support

For additional support, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to initiate a service request.

Last Modified:

Create and Share Office 365 Documents through OneDrive

Resources for:
icon Close

Whether you’re working at home or the office, OneDrive makes it easy to create new documents and share your files. You can even collaborate with others on a document.

In the following external article, you’ll learn how to create documents and folders. It will go over how to share your files with different groups of people, as well as the various collaboration tools available in Office 365.

Last Modified:

Deleting Web Browser Cookies

Resources for:
icon Close

Select your browser below to learn how to delete your web browser cookies.

  • Click on the three dots and select Settings.Select Advanced to show the advanced settings. Select Content settings.Select Cookies.Click the garbage can icon to delete the cookies.

  • Click on the three lines and select OptionsSelect the Privacy & Security tab and click Manage Data found under Cookies and Site Data.Select fdu.edu and select Remove Selected, select Save Changes when finished.

  • Open Safari Preferences and select the Privacy tab.Select Manage Website DataSelect fdu.edu and click Remove.

  • Click on the Settings “Gear” located on the top right of the browser, select Internet OptionsDelete in the Browser History sectionUncheck all boxes listed, except Cookies and website data, click Delete when finished

Last Modified:

Domain Registration

Resources for:
icon Close

Last Revision: 02/07/2020

I. OBJECTIVE

In an effort to maintain the reputation, security, continuity, and technical oversight of university assets considered part of our overall catalog of services, the Office of Information and Resource Technology is issuing a new policy concerning domain names affiliated with Fairleigh Dickinson University. Affiliation with FDU is determined by OIRT in conjunction with the Offices of General Counsel and Communications and Marketing.

II. POLICY

All domain registrations that have an affiliation with the University must be registered through OIRT. An affiliation is defined as a domain that identifies the University as part of its naming nomenclature and houses content specific to the University or any function, whether administrative, academic, or student related to the University. To request a new domain, please complete the following:

Domain Transfer or Registration Request

You may also try emailing your questions to domainregistrar@fdu.edu.

In addition to the domain registration, ongoing certification renewals and any backend technical configurations will be managed by OIRT. All costs associated with the domain will be charged back to the department.

Any department that today independently manages/operates a University domain as defined above or has obtained a domain with any affiliation with FDU must notify OIRT of the existence of that domain so ownership can be moved over to OIRT management. Please contact OIRT by sending all available information to domainregister@fdu.edu. A member of OIRT will work with the department to move the ownership over properly. All content of any domain, as well as plug-ins or any other functionality of the domain, will be reviewed by OIRT but are the responsibility of the individual departments.

III. IN CASE OF QUESTIONS

All questions relating to the Domain Registration Policy can be addressed to the VP & CIO of Fairleigh Dickinson University.


Last Modified:

DUO Device Management Portal Guide

Resources for:
icon Close

This guide is designed to assist you in mastering both the classic and updated versions of the DUO Device Management Portal. It simplifies the process of modifying existing devices and integrating new ones into your multi-factor authentication setup.

Legacy DUO Device Management Portal

Accessing the legacy DUO Management Portal
  1. In a Desktop or Laptop browser visit the “DUO Management Portal“. You will be prompted to authenticate through SSO and complete the Multi-factor Authentication process

DUO Management Portal

  1. After authenticating you’ll see the DUO Management Portal. This is where you can enroll new devices, reactivate, edit, or delete your existing devices
close
Default Authentication Options

If you authenticate with more than one device, you can specify which you would like to be the default.

  1. Click the “Default Device” drop-down menu and pick your default device for authentication. Click “Save” if you’re done making changes
  1. You can choose which authentication method you prefer to use when logging in by clicking on the “When I log in” drop-down menu
    • Ask me to choose an authentication method: it will prompt you to select an option every time you log in
    • Automatically send this device a DUO Push: it will automatically send a DUO Push to your default device
close
Reactivate Duo Mobile
  1. Click on “Reactivate DUO Mobile” if you need to get DUO Push working on your phone, for example, if you replaced your phone with a new model but kept the same phone number.
  1. After answering some questions about your device, you’ll receive a new QR code to scan with your phone, which will complete the DUO Mobile activation process
close
Change Device Name
  1. Click on “Change Device Name” to open up an interface to change the display name of your phone
  1. Type in the new name and click “Save
close
Remove Device
  1. Click the “trash” icon button to delete a device
  1. Confirm that you want to remove the device by clicking on “Remove“. The device will be deleted. It will no longer be able to approve DUO authentication requests.

Note

You may not remove your last device. If you wish to remove it, first add another, then delete the original. If you are unable to delete a device, contact your administrator to have it removed.

close
Add New Device

To add a new authentication device, click “Add another device” link on the right side of the DUO Prompt. You’ll be taken to the new device enrollment prompt

You can use the DUO Quick Start Guide for instructions on how to enroll a new device

close

Updated DUO Device Management Portal

Accessing Updated Device Management in the DUO Universal Prompt

You can add additional verification methods, manage your existing devices, or reactivate DUO Mobile for DUO Push from the DUO Universal Prompt.

  1. When logging in to an application with the Universal Prompt Click the “Other Options” link on the authentication page to view your list of available methods
  1. Click on “Manage devices” at the end of the list to enter the device management portal
  1. You will be prompted to verify your identity by completing the DUO Multifactor Authentication process. Select your preferred authentication method from the listed options to continue
  • After approving a DUO authentication request you can see the Device Management Portal with all your registered devices.
close
Add New Device

To add a new method of verifying your identity in DUO, click “Add a device” and follow the enrollment process described in the DUO Quick Start Guide, starting on Step 3.

The difference between adding a new device from the Device Management Portal and during first-time enrollment is that when you have finished enrolling the new device you return to the Device Management Portal to view all your registered devices, including the new one, instead of continuing to log into an application.

close
Rename or Remove a Device
  1. Click the “Edit” button on the device you would like to rename or remove to view the drop down menu
    • Then click either “Rename” or “Delete
  1. When renaming a device, type the new name for your device, then click on “Rename” to save your changes
  1. When Deleting a device, confirm your selection to delete
close
Reactivate DUO Mobile for an Existing Device

If you have replaced the phone you activated for DUO Push, you can reactivate DUO Push if you have the same phone number.

  1. Click on “I have a new phone” for the device you want to reactivate
  1. Click “Get Started” to continue
  1. Click on “Send me a passcode” or “Call my phone” then proceed to follow the instructions prompted to complete the reactivation process
close
Reactivate DUO Mobile outside of the Device Management Portal
  1. Let the DUO Push authentication time out
  1. Click on the “I got a new phone” link shown in the Universal Prompt
  • If you still use the same phone number as you did when you first set up the phone to use DUO Push, then click or tap the “Text me a link” button
  • When the text message with the link arrives on your phone, tap it to automatically reactivate DUO Mobile on your phone to use DUO Push again. If you don’t have DUO Mobile installed be sure to install it before you try to open the activation link in the text message.
  • If you are using a different phone number than the one you first set up, then press on “I got a new number
  1. Press “Continue” to proceed to the DUO Device Management Portal, where you can complete the steps to “Adding a New Device and set up DUO Push on the new phone

Note

You will need to verify your identity with a different DUO verification method, so if you don’t have one available you will need to contact the Fairleigh Dickinson University Technical Assistance Center for help.

close
Last Modified:

DUO Quick Start Guide for Faculty and Staff

Resources for:
icon Close

DUO two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.

Install DUO Mobile App

The DUO app is available for mobile phones and tablets. You can directly access the DUO Mobile Security App using these links:

Activate yo