Resources

Explore our comprehensive IT resource library to discover a wealth of helpful information tailored to your needs. Utilize our filters to refine your search by role at FDU, department, or specific service for a more personalized experience.

Help Desk
Resources Header

Setting up Microsoft Bookings

Resources for:
icon Close
  1. Visit the FDU Office 365 Portal using any web browser
  1. Sign in to the FDU Single-Sign-On (SSO) page using your FDU NetID credentials
  1. In the upper left corner, click the dotted square and select All Apps
  1. In the All Apps menu, choose Bookings
  1. Microsoft Bookings will open. Click the Get it Now button to begin
  1. The next page will ask for two pieces of information: Business name and Business type. Enter your Department name or your First and Last Name. Click Continue

Note

Designating a Business Type is not required to be able to Continue.

  1. Once your Bookings page loads, the first section you should complete is Business Information. Click  Business Information in the left menu
  1. On the Business Information page, you can enter your business or department address, other contact information, upload a business logo, and set up your business hours
  1. Next, set up your service offerings. Click Services from the left menu

Note

By default, Microsoft Bookings will add a service called “Initial Consult.” You can click the pencil next to this service and make it your own, OR you can add a new service by clicking Add a service at the top of the screen.

  1. Once you’re on the service-editing page, enter your service details, including name, description, and location. When you start typing an address in the default location, suggested locations will populate. Below are explanations for the other fields on the service-editing screen:
    • Duration: You can enter how long you want the duration to last in days, hours, minutes, and set a buffer time when customers cannot book.
    • Reminders: You can have the system send customers email reminders before their scheduled appointment. Click the pencil to edit the text. 
    • Leave Publishing options checked.
    • Online Scheduling Options: This is where you can manage the settings for when customers can book services.
      • You can choose to use the default scheduling policy by leaving the option checked, OR
      • You can manage the settings for your scheduling policy by unchecking the option.  If you choose this option, we recommend setting the Minimum lead time to 24 and the maximum lead time to 30 days.
    • Don’t forget to click Save at the top of the Service details page
  1. Next, click Staff from the left menu. Click the pencil next to your name to edit your information. Also, you may add any staff or faculty members in your department by clicking the + Add staff button
  1. On this page, you can add information about yourself, including your office or department phone number and whether to receive email notifications (we recommend keeping this option checked).  Click Save when finished
  1. Next, select Booking page from the left navigation pane.
    • Booking page Status: Since this is the first time you are setting up your Bookings page, your status is set to Not published. Once you finish customizing your page and clicking Save, the status will change to Published. 
    • Customer data usage consent (optional):  Where you can customize a message for your visitors to consent to your site collecting their personal data. 
    • Scheduling Policy: Where you can set site-wide scheduling policies. We recommend the following settings:
      • Minimum lead time: 24
      • Maximum lead time: 30
    • Email Notifications: Notifies you when an appointment is made. 
    • Staff: You can allow customers to choose who they want to meet with. However, you can uncheck this option if you do not have any staff.
    • Customize your page: Choose a color theme for your bookings page.
    • Lastly, click Save and Publish
  1. Once you click Save and publish, your Bookings site is now live! You can view your published page by clicking Open published page and share your page with others by copying the link
Last Modified:

Shared Mailbox in Outlook

Resources for:
icon Close

A shared mailbox makes it easy for a group of people to read and send emails from one public email address, like info@fdu.edu. When a person in the group replies to a message sent to the shared mailbox, the email appears to be from the shared address, not from the individual user. Shared mailboxes can also be used to provide a shared calendar, allowing multiple users to schedule and view calendar tasks.

Request Access to an FDU Shared Mailbox

Users can request a new shared mailbox by completing and submitting the “Distribution Group/Shared Mailbox Request” form found below.  Users needing access to a specific FDU shared mailbox account may request access by reaching out to the shared mailbox owner.  To fulfill this request, the shared mailbox owner will open a support case with the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Add a Shared Mailbox to Outlook

Windows
  1. The shared mailbox should automatically display in your folder pane on the left-hand side of your Outlook application within 24 hours of its creation. Closing and restarting the Outlook application maybe necessary if you do not see it after 24 hours

Note

Before you can use a shared mailbox, the Microsoft 365 admin for the university has to add you as a member.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
macOS
  1. Select Tools from the Outlook menu bar at the top of the screen, then choose Accounts
  1. Select the Advanced… tab
  1. Select the Delegates tab
  1. Click the + button, located under Open these additional mailboxes:
  1. Type or select your correct shared mailbox, and then select Add
  1. Select the OK tab
  1. You should now see your shared mailbox listed on the left-hand side of your Outlook email application window

Note

This is a one-time process only. You do not need to follow the above steps to add this to Outlook on your macOS device again.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

New Outlook version on macOS

Some macOS users may take advantage of the “New Outlook” version of the Outlook application. You can identify which Outlook version you are using by locating the “New Outlook” slider tab button on the top right of the application.

  1. Select Tools from the Outlook menu at the top of the screen, then choose Accounts
  1. Select the Delegation and Sharing tab
  1. Choose the Shared With Me tab and then select the + button
  1. Begin to type the shared mailbox name or its email address, choose the correct shared mailbox before selecting Add, and finally Done when finished
  1. You should now see your shared mailbox, located on the left-hand side of your Outlook application window

Note

This is a one-time process only. You do not need to follow the above steps to add this to Outlook on your macOS device again.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
office365.fdu.edu / Outlook Web App
  1. Navigate to the FDU Office 365 Portal webpage
  1. Select the Outlook web app icon, located on the left-hand side of your display
  1. Right-click on the Folders option located on the left side of the menu; a small drop-down menu should display. Select Add shared folder
  1. Begin typing the email address for the shared mailbox, auto-populated suggestions will be displayed. Select the correct shared mailbox address and click Add
  1. You should now see the added shared mailbox located on left side of your Outlook web email window

Note

This was a one-time process. You do not need to follow the above steps to add this to your account again. You will automatically see the shared mailbox when you sign in to your account next time.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
Android and iOS
  1. Sign in to your primary FDU email account in the Microsoft Outlook for Android or iOS app
  2. Tap the Add Account button in the left navigation pane, then tap Add Shared Mailbox
  1. Enter the name of the shared mailbox and tap Add Shared Mailbox when finished

Note

If you have multiple accounts in Outlook Mobile, select the account that has permissions to access the shared mailbox.

  1. After the account setup process completes, the shared mailbox will display in your account list within the Outlook for Android or iOS app

Tip

To remove a shared mailbox, go to Settings > Accounts. Then tap on the shared mailbox and select Delete Account.

close

Send Email from a Shared Mailbox

Windows / macOS
  1. Open Outlook
  2. Choose New Email to start a new message
  3. If you don’t see the From field at the top of your message, choose Options, and select the From tab
  1. Click From in the message, and change to the shared email address

Note

If you don’t see your shared email address displayed, choose “Other email address…” Enter the full email address for the shared mailbox in the blank or search for the email address by clicking “From” tab. Click “OK” when finished.

  1. Finish typing your message and then choose Send

Note

From now on when you want to send a message from your shared mailbox, the address will be available in your “From” drop down list.

Whenever you send a message from your shared mailbox, your recipients will only see the shared email address in the message.

close
office365.fdu.edu / Outlook Web App
  1. Choose New Message
  2. Choose From and change to the desired shared email address

Note

If you don’t see your shared email address displayed, choose “Other email address…” Enter the full email address for the shared mailbox, then select the appropriate shared email address from the auto populated list when finished.

  1. Finish typing your message and then choose Send
close
Last Modified:

Sharing a Calendar and Delegating Administrative Rights

Resources for:
icon Close

Calendar sharing is easier than ever with Office365. If you wish to share your calendar, follow the steps bellow.

  1. Log in to Office365 and go to your email.
  2. Once in Outlook look for the calendar shortcut on the bottom left
  1. Look for and click on the share button
  1. On the new pane that pops up type in the name of the person you would like to add and then select the person from the list
  1. After the person is added you can drop down the menu to the right of their name and select the amount of access they should have.
Last Modified:

Single Number Reach Feature

Resources for:
icon Close

The Single Number Reach (SNR) feature allows users to answer incoming calls to their extension on either their desktop IP phone or at a remote destination, such as a mobile phone. Users can pick up active calls on either the desktop phone or the remote phone without losing the connection. This enables callers to dial a single number to reach the user.

Enabling Single Number Reach

  1. Log into the Self-Care Portal
  1. Click the “My Services Store” icon
  1. Click the “Single Number Reach” Icon
  1. Enter the Destination Number and click “Apply

Tip

After the Feature is enabled for 1 Destination, additional Destinations can also be added.

Adding Another Destination

  1. Click the “My Services Store” icon from the My Home Tab
  1. Click the “+” icon to Create another Destination
  1. Enter the additional Destination (you can also give it a Name for reference) and then click “Create

Adding a Ring Schedule

A Ring Schedule can be enabled for each Destination.

  1. From the “My Single Number Reach” section, click on the Destination Number you’d like to setup a ring schedule for
  1. Click the “Pencil” icon
  1. Enter the options in the Ring Schedule Panel and click “Apply

Disabling Single Number Reach

On NWN EMP Control page, hover your mouse pointer over the Single Number Reach icon and click “X” and confirm by clicking “Apply” on the next screen

When the Single Number Reach Feature is Enabled, it can also be turned off and on through the desktop Jabber application

Last Modified:

Software Compliance & Distribution Policy

Resources for:
icon Close

In accordance with FDU’s Acceptable Use Policy for Computer Usage, no employee shall copy or distribute software that violates copyright laws. All employees shall be aware that software and the accompanying documentation is generally owned by the manufacturer and the license only grants the user the right to use the software. Unlicensed software installations, also known as software piracy, are unacceptable at FDU.

The primary user of each computer shall take responsibility of keeping records of licenses for which software is installed. The University’s Computing Services Department shall also track licenses for software installed by the Computing Services Department though the purchase of high volume or site licenses. Users are advised that the software installed on University-owned computers may be audited internally (by the University) or externally (by software manufacturers or other anti-piracy software firms) at any time. Software found not to be in compliance with copyright laws will be removed and replaced with a licensed copy.

Computing Services will provide certain software that is commonly used by the majority of the University’s employees, including but not limited to word processing, spreadsheet, and anti-virus software. Some software manufacturers allow for non-concurrent use of a license on an office computer and an employee’s home computer. Computing Services will not provide non-concurrent licenses at off premise sites due to the inability to track these licenses.

In order to provide the best possible service and support, and to reduce the cost of software site licenses, Computing Services, in conjunction with the Center for Learning and Teaching with Technology, has standardized on Microsoft Office Professional and Symantec Endpoint Protection.

Popular Software Titles and Guidelines for Faculty and Staff to Obtain:

  • Microsoft Office for Windows or Macintosh: Available through standard deployment of leased or owned equipment or by request for any University-owned PC or Mac.
  • Microsoft Visual Studio: Installed in Labs. Available by request for staff and faculty machines.
  • Adobe Acrobat: Available by request for staff and faculty machines.
  • SAS: Installed in Labs. Available by request for staff, faculty and student machines.
  • SPSS (Base): Installed in Labs. Available by request for staff and faculty machines.
  • SPSS Advanced Modules: Available by request for staff and faculty machines.
  • Adobe Products: Faculty and staff may purchase Adobe products at level three pricing with the University’s CLP Membership No. 4400062846.
  • Symantec Endpoint Protection: Available through standard deployment of leased or owned equipment or by request for any University-owned PC or Mac.
  • Other products: Faculty and staff may obtain pricing and submit orders to Purchasing. If assistance is needed, contact Computing Services.

Software Quality Assurance and Compliance Policy for Network Server & Lab Installations

It is no longer possible for individuals to install software on staff or faculty desktops or lab computers. Laptops or Macintosh users have administrative rights and individuals can install additional licensed software to laptops.

Instructors wishing to have a software application installed in a lab for use by 20 or more people simultaneously must provide Computing Services the original installation media, installation guide, and the appropriate proof of license. Note that the licenses for some software may limit our ability to install it on the network. These materials must be provided a minimum of sixty days before the software is needed. Because it is impossible to predict how the software will interact with our network and other software already installed, we cannot guarantee that a program will work on our system.

For programs that will be used by less than 20 people, the instructor may install the application on up to 5 machines in a lab not normally used for classroom instruction, plus an “instructor’s machine” in one of the teaching labs. If fewer licenses are owned, then only that many licenses may be installed. The instructor will be told which machines to install the program on and will be given a password which can be used to disable the security on the machine for the duration of the installation procedure. Software installed in this way will only be available on those designated machines. Computing Services will make a reasonable attempt to keep these designated systems functioning with the additional software, but in the event that the machine needs to have it’s base configuration and software restored from backup, the instructor will be contacted and will need to reinstall the application.

In all cases, software must be owned or licensed by the University, even if the application is only to be used for demonstration purposes. No software owned by an individual will be installed on the systems.

Last Modified:

Software Request Guidelines for University Computers and Computer Labs

Resources for:
icon Close

Departments wishing to obtain software, whether it is for use by the department or to be installed in the FDU computer labs and/or FDU Anywhere, should plan appropriately to provide adequate time to acquire the software and make it available to users.

The following steps should be used as a guide when planning to obtain software for instructional or business use:

Tip

Plan a minimum of 3 weeks for a contract review before a PO can be processed. See contract review requirements and order process by visiting the link at the bottom of the page.

  1. Selection of product
  2. Creation of Purchase Order (PO) and approval by department/dean/chair
  3. Technology review and approval by OIRT
  4. New vendor processing, if necessary
  5. Contract review
  6. Software purchase and delivery to FDU
  7. Software preparation. Plan up to 60 days to allow for items such as:
    • Creating configurations for FDU’s needs and environment
    • Setting up license servers or other required systems
    • Integration with other systems (e.g., Single Sign On)
    • Testing mass deployment (if for the computer labs)
    • Integration with FDU Anywhere (if needed) assuming the software is licensed and approved for VDI enviroment
  8. Testing and confirmation of proper functionality by the requestor (instructor)
  9. Final installation on computers

Note

Even if the software has no cost to FDU, per the Office of the General Counsel and the Contract Review Policy, if the software requires you to agree to terms and conditions, it’s an agreement that must be reviewed

Please begin by completing the Computing Services > Lab Reservation & Lab Software Request (Faculty & Staff NJ Only)

SAMI Forms

Last Modified:

Spot a Phishing Scam

Resources for:
icon Close

What is a phishing scam?

Phishing refers to the act of using a fraudulent identity and scenario to extract personal information or something else of value. Although phishing scams can occur over various mediums including text messages, phone calls, and social media, they are most frequently carried out via email.

Scammers have many means of acquiring bulk email addresses. Receiving a phishing attempt does not mean that your account has been singled out or has been compromised in any way.

Fairleigh Dickinson University’s email accounts employ Microsoft’s Advanced Threat Protection (ATP) which, in addition to traditional spam filtering, removes malware infected attachments and utilizes Safelinks to scan messages for malicious links. Additionally, we have appended the subject line of messages coming from outside of the FDU domain with the “[External]” tag. Although phishing can occasionally come from inside of our domain, messages with the external tag demand extra scrutiny.

Despite all of these efforts, keeping up with the latest scams is always a cat and mouse game. It is best practice to have a solid foundational knowledge of how these scams work.

Detecting a Phishing Scam

Although each phishing scam is unique, there are certain common traits which can serve as red flags. The most common “tell” is a sense of urgency. Generally, phishers would like for you to act promptly and without careful consideration. As a result, they will pepper their email with phrases such as “immediate action required” and “to avoid the immediate suspension of your account”.

Although an urgent tone is likely to be your first clue, there are plenty of other red flags that you will begin to notice over time. Many phishing attempts are poorly constructed emails. Incorrect spelling and grammatical errors are common. The message could contain a blank subject line and the sender’s signature may only list their title instead of their name. Be wary of messages in which the quality of writing does not meet your expectations for the purported institution.

The goal of many scams is to make a request for your personal information. This can take the form of bluntly asking for your social security number. However, it may also take a subtler approach. Many phishing attempts will create a mock version of a University, banking institution, or commerce website and ask you to log in. Once you enter your account information, the scammers have acquired your password.

Although most phishing scams cast a wide net, some recent attacks have specifically targeted individual members of the University. If someone is claiming to be your colleague or supervisor, check to confirm that the message is coming from their FDU account. Do not trust messages claiming to be from FDU employees which originate from external accounts such as Gmail and Yahoo.

Many of these personalized scams also have a very specific common thread. After a bit of conversation, the scammer will request that you purchase gift cards for common services such as iTunes, Google Play, or Amazon. No, your boss does not urgently require you to purchase gift cards out of pocket.

Also, beware of solicitations coming to your FDU email address from businesses offering deals or asking you to click on a banner to receive a promotion. Make sure that the email is coming from the domain of the company offering the sale or promotion.

What does a phishing scam look like?

Now that you know what to look for, let’s look at a sample phishing attempt:

Reporting a Phishing Scam

You can use your newfound expertise to assist the FDU community. When you see a message that you believe to be a phishing scam, please report it to us. Via Outlook this can be accomplished via our reporting tool. Please see Reporting Phishing or Junk Emails for more information. If you are using an alternative mail client such as Apple Mail, you can forward the suspected scam to phishing@fdu.edu.

How should I proceed if I have already replied to a Phishing Scam?

Please change any passwords that you have provided to the scammer. Once this is completed, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for further instructions.

Last Modified:

Student Technology Resources

Resources for:
icon Close

Fairleigh Dickinson University provides an extensive array of technological resources and services tailored for our students. This guide is designed to assist students in navigating and utilizing these tools effectively, ensuring they can easily set up, access, and manage their accounts, while also offering comprehensive information on each service.

ID and Email

FDU NetID

Your FDU NetID verifies who you are and ensures the privacy of your personal information. Your FDU NetID and your NetID password will provide access to a variety of IT resources including your Self-Service, WebCampus, Office365, and Email.

To obtain your NetID, follow the guide below:

close
Changing your FDU NetID Password

To protect the University and our Students from cyber attacks and other malicious activity, we require that everyone in our community to periodically change their password.

To change your password, follow the guide below:

close
DUO Multi-factor Authentication

To successfully use your NetID to access your accounts, you will need Two-Factor Authentication with Cisco DUO MFA.

Two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.

To set up your mobile device with DUO MFA, follow the guide below:

Additionally, refer to our FAQ for commonly asked questions about DUO:

close
Email and Office 365

Students can access their emails through any Web browser using their NetID and password to log in. To access our email, visit the Office 365 Portal:

Office 365 Portal

Students can also access their FDU Email accounts on their mobile devices by installing the Outlook app. For instructions to setting up your FDU Email account in the Outlook app, follow the guide below:

Current students who are registered for classes for the current term, or a future term have access to Microsoft Office 365 Suite applications. For more information, visit the links below:

close

Academic Systems

Webcampus

Webcampus is a course content management system. FDU’s Webcampus is also known as the Blackboard System. On-line courses are taught through this system which also allows for interaction between the student and faculty member as well as on-line class discussions.

To learn more about how to access Webcampus, review the guide below:

close
Self-Service

Self-Service is an interactive web application that enables students to view their individual information contained in FDU’s Student Information System. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes.

Review the Tutorial below to learn how to use Self Service:

close

Connectivity

Connecting to the FDU Wireless Network

Using your FDU NETID, you can connect to the FDU Wireless Network. For instructions view the links below:

close

Security

Security Resources

Understanding and implementing cybersecurity measures is crucial for protecting your personal and institutional information. This section provides essential resources to help you navigate the landscape of cyber threats.

Stay safe online by reviewing the articles below:

close

Software

Available Software for FDU Students

Fairleigh Dickinson University has both licensed and open-source software, that is offered for academic and/or personal use for students. The links below point out to commonly used software, both licensed and open source, that are offered for academic and/or personal use to all Fairleigh Dickinson University faculty, staff and students.


In our digital learning environment, mastering online tools is essential for academic success. These resources are designed to guide you through the process of engaging in classes virtually via Zoom and accessing your files on OneDrive.

close

Printing and Labs

Computer Labs and Printing

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use.

close
Virtual Labs

FDU also provides remote access to many of the software applications typically found in university computer labs through our platform FDU Anywhere. You can access it using your FDU NetID credentials using the link below:

FDU Anywhere

Review the FDU Anywhere Tutorial below to learn how to use our virtual labs:

close

For any IT related questions and support, contact our Fairleigh Dickinson University Technical Assistance Center (UTAC):

SAMI Support

Last Modified: