email

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

Resources for:
icon Close

These instructions demonstrate adding an FDU email account to an Apple mobile device’s native Apple “Mail” app. Unfortunately, adding an FDU email account on an Android OS mobile device’s native “Mail” app is currently unsupported by FDU IT support. Information regarding adding an FDU email account to an Android OS mobile device via the Outlook App can be found below for Android OS mobile device users.

Note:

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). FDU IT supports and advises using this method due to the program’s robustness and integration of all Microsoft 365 features. A link with instructions for the Outlook app on mobile devices can be found at the bottom of this page.

Setting up your FDU Email Account in the Mail app on iOS
  1. Go to the “Settings” app
  1. Tap “Mail
  1. Tap “Accounts
  1. Tap “Add Account” and then select or tap “Microsoft Exchange
  1. Enter your FDU email address and a description of your email account in the corresponding text boxes. Please note that the default description name for the account will be ‘Exchange’ if left unchanged. Tap “Next” to continue
  1. Tap “Sign In
  1. Enter your FDU email address and password. Tap “Sign In” to continue
  1. For security purposes, all applications which use FDU’s Single Sign-On require Duo Two-Factor Authentication (2FA). After entering your FDU NetID login credentials, Duo requires you to complete a method of second-factor authentication
  1. Choose the FDU NetID account information you want to synchronize or access on your iOS mobile device by toggling the choices on/off. Tap “Save” to continue
  1. Your FDU email account has successfully been added to your iOS mobile device
close
Setting up your FDU Email Account on Android OS

Due to the multiple Android OS mobile device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features differ depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to set up Outlook on Android OS.

close
Last Modified:

CrashPlan Backup Email Alert

Resources for:
icon Close

Backup Alert Email Notifications

CrashPlan Backup will send users an email alert notifying them of any incomplete backups of their devices.

  • The CrashPlan Backup email alert will be sent from “CrashPlan <noreply@crashplan.com>
  • The Subject line of the email will be labeled with: “[External]Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:

CrashPlan Backup Alert Email Notification

What to do if you get a backup alert

After receiving a CrashPlan Backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan Backup device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email.

For Windows Devices

To locate the name of a CrashPlan Backup device:

  1. Click the CrashPlan Backup icon in the Windows System Tray, also referred to as the notification area.

CrashPlan Backup icon

  1. Click “Run Backup now

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

Ensure the CrashPlan backup application displays the same name as the CrashPlan Backup alert email you received.

close
For macOS Devices

After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:

  1. Click the “CrashPlan Backup” System Tray or macOS menu bar Icon

CrashPlan Backup Icon

  1. Click “Run Backup now

Note

The backup may take some time to complete. This depends on the length of time since CrashPlan Backup’s last completed backup and the amount of new data that needs to be backed up.

close
Last Modified:

Email and File Encryption

Resources for:
icon Close

Virtru email encryption is the preferred method to send and view encrypted emails and files with your FDU email address. Available for FDU Faculty and Staff upon request. Click the link below to request access to Virtru Email Encryption.

The Virtru Email Encryption Tutorial will help users navigate installation, basic use, different usage scenarios, and common technical questions.

Alternative Approved Methods for Encryption

If you are not approved for Virtru email encryption, the articles below are alternative, FDU OIRT and DSIRT approved methods for encrypting Microsoft Office and Adobe PDF files and comply with the University WISP.

Warning Warning

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology.

For more information, visit the link at the bottom of the page.

Last Modified:

FDU Virtru Email Encryption Tutorial

Resources for:
icon Close

Virtru email encryption is a security enhancement to FDU’s Office 365 and Microsoft Outlook email environment, which provides Faculty and Staff the option of sending and receiving encrypted emails using their FDU email account.

index

Index

What is Virtru Email Encryption

Virtru email encryption is a security enhancement to FDU’s Microsoft Office 365 and Microsoft Outlook email environment, which provides Faculty and Staff the option of sending and receiving encrypted emails using their FDU email account. Virtru for the Microsoft Outlook desktop email client is available for installation for approved FDU Faculty and Staff via the FDU Self Service Portal for Software on Windows 10 desktops and laptops owned by the University.

Virtru Email Client

The Virtru client provides a seamless experience when using the Microsoft Outlook desktop client. The Virtru Outlook plugin is only available on university laptops or desktops running Microsoft Windows.

Virtru for Office365

All Apple macOS users and users who access their FDU email through Office 365 can use Virtru email encryption to send sensitive information electronically.

Tip

Microsoft Office 365 is accessed by visiting office365.fdu.edu from any web browser.

What is Virtru Secure Reader?

Virtru’s Secure Reader is a platform that can be accessed within FDU’s Outlook on the Web (office365.fdu.edu) and right on your web browser by clicking the “Unlock Message” button in your Virtru secured email. From there, all you have to do is quickly validate you are an authorized recipient of that email or file. Once complete, you can read and reply to the secure email directly in your browser.

A secure message encrypted by Virtru will have a few key components, including a short unencrypted message from the sender, and a button that says “Unlock Message”.

Note

The Secure Reader is used when viewing encrypted emails from Microsoft Office on the web and any email client on mobile devices (AndroidOS and iOS)

Request Form

To obtain access to Virtru in order to send encrypted emails, you must fill out the request from below:

For additional support, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Installing Virtru onto a University PC

  1. Open the FDU Self Service Portal for Software application. Locate and left-click Virtru Email Encryption and then click “Install

For additional information on the FDU Self Service Portal for Software, please click the following link:

  1. A message box will appear notifying that Microsoft Outlook needs to be closed. Click “OK” and the installation will continue

Note

This window will only appear if the Microsoft Outlook Client is running.

  1. A message will appear when Virtru is finished installing. Click “OK” to finalize the process

Virtru is now ready to be activated.

Activating Virtru on a University PC

  1. When you open Microsoft Outlook after the Virtru has been installed, you will be prompted to activate your Virtru plugin. Click “Activate to begin. You may choose “Laterif you do not wish to activate at this time

Note

Check “Don’t show me again” before you click “Activate” or “Later” to prevent a pop-up window from re-appearing to prompt activation of un-activated account(s) whenever you start Outlook.

  1. You will be presented with a list of FDU email accounts configured to use in Microsoft Outlook. If your Microsoft Outlook application is associated with multiple email accounts, click on only those you will need to use Virtru email encryption. Then click “Continue
  1. After selecting the proper accounts, you will have the choice of signing in with FDU’s email provider (Microsoft Office 365) or choosing to receive an activation email. Choose “Sign in with Office 365

Activating Virtru through Office 365 Sign in

  1. Enter your FDU NetID credentials when prompted and proceed through the FDU Single Sign-on webpage, including completing Duo Multi-Factor authentication. If you experience issues, choose to “Send me an activation email” and follow the directions given below in item

Note

If you cannot activate your account(s) using “Sign in with Office 365”, choose to “Send me an activation email.”

Activating Virtru through Activation Email

  1. If you are unable to activate your account(s) using “Sign in with Office 365,” choose to “Send me an activation email.” The process will take a few moments to complete in the background
  1. During this process, Virtru will send a unique email from noreply-activation@virtru.com to your mailbox. The Virtru plugin will search for this email in your inbox. When the activation email is found, Virtru will automatically delete the email from your email inbox, and the Virtru plugin will complete the activation

Tip

Click “Take a tour” for a brief walkthrough of your new Virtru features.

If your activation does not automatically complete in a few minutes, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Activating from the Virtru Menu

If you have disabled automatic activations, you can still activate Virtru on your account(s) at any time.

  1. Select the ‘Virtru‘ menu tab from the top bar of the main Microsoft Outlook window
  1. Choose “Authorize Accounts” or “Options
  1. If you select “Options,” go to the ‘Account Activation‘ menu tab, select your FDU email account, and click on “Activate Selected
  1. You will then follow the activation process already illustrated above in “Activating Virtru through Office 365 Sign-on or “Activating Virtru through activation email” described above

Re-enabling a Virtru Account

FDU Virtru users will occasionally be required to reactivate their Virtru add-in due to the following:

  • You’ve cleared your registry
  • Your Virtru activation status has expired. For security purposes, Virtru will invalidate your activation status every
    • 120 days for users accessing their own mailboxes
    • 10 days for users accessing shared or delegated mailboxes
  • You are using Virtru on a new machine

You are automatically prompted when you need to re-activate. You can also proactively reactivate at any time via the ‘Virtru’ menu tab. This process was described above in “Activating from the Virtru Menu.”

Reset Activations

If you wish to fully deactivate all accounts in Microsoft Outlook, you can do so from the ‘Virtru’ menu tab:

  1. Click on the ‘Virtru‘ menu tab at the top of your Microsoft Outlook window and select “Debug Log
  1. Click on the ‘Debug Commandsmenu tab option and select the “Reset Activations (clears registry only)” option
  1. Click “Yes” and then “OK” to confirm the changes
  1. From the ‘Virtrumenu tab, you can reauthorize by clicking on “Authorize Accounts

Virtru Walkthrough Video

Send a Virtru-encrypted Email in Outlook

With Virtru, you can easily protect your emails by encrypting messages and attachments in a few simple clicks.

  1. Left-click “New Email” from the main Outlook window
  1. Open the ‘Message menu tab and left-click the “Virtru button” to turn “Virtru ON.” The button should turn blue and read “Virtru ON
  1. Add recipients, a subject, the body of the email, and any relevant attachments

Tip

Additional security options for the message, including Disable Forwarding, setting an Expiration Date, and applying Watermarking and/or Persistent File Protection (PFP) to attachments are available to select for your Virtru-encrypted email. More details on these additional features can be on the “FDU Virtru Email Encryption Tutorial” under “Additional Resources.”

  1. When your message is ready, click “Send.” You should see a brief animation letting you know that the message is “Encrypting” before it is fully sent

FDU Virtru-encrypted Email Introduction for Recipients

FDU includes a standardized introduction to inform the recipient that they are viewing a Virtru-encrypted email. Below is an example of what the recipient will see. If you have updated the introduction, it will be reflected accordingly

Personal Virtru-encrypted Email Introduction for Recipients

You can also set a one-time, unencrypted personal introduction for the message to either clarify the introduction of Virtru to the recipient or provide some context about the email. Left-click the “Personal Introduction” menu button in your email draft window.

Note

The Personal Introduction only supports plain text and line breaks. Special formatting is not supported.

Send a Virtru-encrypted Email on Microsoft Office 365

With Virtru, you can easily protect your emails by encrypting messages and attachments in a few simple clicks. To send Virtru encrypted emails from your Microsoft Office 365 email acount, simply prepend the subject line of your email as follows:

#secure#

Virtru-encrypted Email Recipient Experience

The recipient will receive an email that looks like this:

Read a Virtru Encrypted Email on Microsoft Office 365

In this article, we’ll show you how to quickly access and read your Virtru-secured message or attachment within Microsoft Office 365 using Virtru’s Secure Reader.

How to Access and Read your Message

  1. Login to FDU’s Microsoft Office 365 web portal using any web browser. Enter your FDU NetID credentials
  1. Open the Virtru-secured email in your inbox and left-click “Unlock Message.” A new tab will open
  1. When prompted, select your FDU email address

Tip

If you don’t see yours listed, left-click “Use another email address” and enter your email address.

Note

Please be sure to verify using the exact email address to which the secure message was sent. If the email was sent to an alias, group address, or distribution list address, you will need to select or enter that exact email address rather than your personal address.

  1. Choose how you’d like to verify your identity
    • Microsoft Office 365 users can use their FDU NetID credentials to log into the Secure Reader using “Sign In with Microsoft.” If you choose this route, you can skip step #5 below.
    • Alternatively, users may choose “Or sign-in with a one-time verification link.”

Warning Warning

For emails sent to an alias, group address, or distribution list address, you will need to select the Or sign-in with a one-time verification link option. For group addresses and distribution list addresses, this action will send the verification email to all users on that group or distribution list.

  1. If you selected “Or sign-in with a one-time verification link,” check your inbox for your verification email. It will come from verify+xxxxxxxx@virtru.com (with each “x” being a digit). Open the verification email and left-click “View Message” to open your message

Note

Both the “Unlock Message” and “View Message” links need to be opened in the same browser on the same device in order to confirm your identity.

Please also note, Virtru offers a “cookie-less” verification pathway if we detect that tracking or cookies and local storage have been disabled in the browser. In these cases, we send a verification code via email. This code, once received, simply needs to be pasted into the proper field in your browser in order to grant access.

  1. Your message will open the Virtru Secure Reader in a new tab in the browser. You will also be able to view and access attachments at this time

For a variety of reasons, some recipients may occasionally receive an error message when trying to open a secure email or attachment. If you are having problems accessing your secure email and/or files, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.

Reply to a Virtru Encrypted Email on Microsoft Office 365

In this article, we’ll show you how to quickly reply to your Virtru-secured message or attachment within Microsoft Office 365 using Virtru’s Secure Reader.

How to Reply to a Secure Message

  1. Login to FDU’s Microsoft Office 365 web portal using any web browser. Enter your FDU NetID credentials
  1. After successfully opening the Virtru-secured message, to send a “Secure Reply,” scroll down the page below the main message, or click the icon in the top right with the arrow pointing to the left. You may also click on the arrow next to it to reveal additional options such as “Secure Reply All
  1. Attachments can be added by clicking “Add Attachment.” These attachments will be sent securely as well
  1. When you are ready to send your email, hit the “Secure Send” button. Both you and all applicable recipients will receive a copy of your reply. Please note that your secure reply will be sent from secure-reply@virtru.com

Viewing a Secure File or Attachment on Microsoft Office 365

This article covers the different options you have for viewing and downloading secure attachments and files within Microsoft Office 365 using Virtru’s Secure Reader. Depending on the type of attachment you’ve received, you can view your file directly in the Virtru Secure Reader or download the file to your computer. The Virtru Secure Reader can preview various file types, including PDF, Word documents, most image files, and plain text files.

Viewing Directly in the Secure Reader

  1. Login to FDU’s Microsoft Office 365 web portal using any web browser. Enter your FDU NetID credentials
  1. If you’ve received an attachment in a Virtru secured email or an encrypted file that was shared directly with you, you can hover over the file name and choose “View” or “View Protected file” to view the attachment right in your web browser

Downloading Unsupported File Types

If you’ve received a file that cannot be previewed in the Virtru Secure Reader, you will be prompted to download that file directly. There will be no “View” option.

Printing Attachments in the Secure Reader

You can print a document from the Secure Reader by selecting the menu under the “Downloadbutton and then selecting “Print.” You may also choose to download it first, then open and print via a preferred program on your computer.

Note

Note that printing via your web browser’s File>Print option will not print the document as expected.

Using the Virtru Dashboard for Microsoft Office 365 Users

Users who access their FDU email through the Microsoft Office 365 web portal and all Apple macOS users will need to use the Virtru Dashboard to manage all of Virtru’s security options.

  1. To use the Virtru Dashboard, click the link below:

Tip

We will refer to the “Virtru Dashboard” many times, as this dashboard is used to change settings after an encrypted email has been sent. It is suggested that you bookmark this site for easy access.

  1. Choose “Sign in with Office365“, and skip to Step 5. If you choose to request a one-time verification link, enter your FDU email address and click on “Submit
  1. If you request the one-time verification link, you will receive an email from Verify for Virtru, as shown below. If you are using different web browsers, such as Google Chrome or Mozilla Firefox, it will be reflected in the email message accordingly
  1. Click “Verify me” and choose “Copy Link Location.” Open a new browser tab and paste the link location into the URL space. Hit the “Enter” or “Return” key on your keyboard
  1. When you log in to the Virtru Dashboard for the first time, you will see the message below. Left-click “OK, GOT IT!
  1. You will now be able to view Virtru encrypted emails or files you have sent, as well as open the ‘Settings‘ menu tab to set behaviors for your Virtru account

Manage Virtru’s Expiration Date Security Option in Outlook

In addition to encrypting messages and files, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply an “Expiration Date” to an encrypted email or file.

Typically, if a Virtru email recipient receives an encrypted message or file, they can indefinitely access that content. However, as the owner of that content, you can restrict access after a particular point in time. If a recipient tries to access the content after expiration, they will receive a prompt indicating their access is expired.

Manage Virtru’s Expiration Date Security Option in the Virtru Dashboard

In addition to encrypting messages and files, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply an “Expiration Date” to an encrypted email or file.

Typically, if a Virtru email recipient receives an encrypted message or file, they can indefinitely access that content. However, as the owner of that content, you can restrict access after a particular point in time. If a recipient tries to access the content after expiration, they will receive a prompt indicating their access is expired.

Manage Virtru’s Disable Forwarding Security Option in Outlook

In addition to encrypting messages and attachments, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply “Disable Forwarding” to a Virtru-encrypted email.

Typically, if a Virtru plugin for Microsoft Outlook user receives an encrypted message, they can use Virtru to forward the email to a new party. This will add the new recipient as an authorized user and allow them to unlock the message. “Disable Forwarding,” however, ensures that your recipients can access the encrypted content but will stop any additional users from gaining access to the message. If the original recipient passes the email to a new party, then the new user will not be added as an authorized user and will not be able to unlock the message.

Manage Virtru’s Disable Forwarding Security Option in the Virtru Dashboard

In addition to encrypting messages and attachments, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply “Disable Forwarding” to an encrypted email.

Manage Virtru’s Watermarking Security Option in Outlook

In addition to encrypting messages and attachments, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply “Watermarking” to an encrypted file.

Typically, if a Virtru recipient receives an encrypted file, they can preview the file in the Virtru Secure Reader and download a decrypted copy locally. When “Watermarking” is applied to a secure file, recipients will only have access in the Secure Reader and will see their email address watermarked across the document.

The addition of the watermark is visible but transparent enough not to obscure the contents of the file when viewed. A recipient will not be able to download a local decrypted copy of the file.

This feature can be applied using the Virtru plugin for Microsoft Outlook or the Virtru Dashboard. It supports the following common file types:

  • Microsoft Office documents: .docx, .pptx, .xlsx
  • Common image file formats: .jpeg, .png
  • PDF documents

Note

Although newer Microsoft Office file types are supported, older versions (.doc, .ppt, .xls) are not compatible. Additionally, these other common file types are NOT supported: .msg, .zip, .md.

Mange Virtru’s Watermarking Security Option in the Virtru Dashboard

In addition to encrypting messages and attachments, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply “Watermarking” to an encrypted file.

Typically, if a Virtru recipient receives an encrypted file, they can preview the file in the Virtru Secure Reader and download a decrypted copy locally. When “Watermarking” is applied to a secure file, recipients will only have access in the Secure Reader and will see their email address watermarked across the document.

The addition of the watermark is visible but transparent enough not to obscure the contents of the file when viewed. A recipient will not be able to download a local decrypted copy of the file.

This feature can be applied using the Virtru plugin for Microsoft Outlook or the Virtru Dashboard. It supports the following common file types:

  • Microsoft Office documents: .docx, .pptx, .xlsx
  • Common image file formats: .jpeg, .png
  • PDF documents

Note

Although newer Microsoft Office file types are supported, older versions (.doc, .ppt, .xls) are not compatible. Additionally, these other common file types are NOT supported: .msg, .zip, .md.

Revoke Virtru Encrypted Content in Outlook

When a Virtru user sends encrypted content, they have full control over access to the message(s) and/or file(s). Even if a recipient receives encrypted content, the sender has the ability to revoke (or reauthorize) access at any time. Virtru even allows the sender to revoke access to specific recipients.

Note

Virtru can only revoke emails that were sent securely with Virtru. Any messages sent prior to having Virtru installed or messages sent unsecured after Virtru has been installed cannot be revoked.

Revoke Virtru Encrypted Content in the Virtru Dashboard

When a Virtru user sends encrypted content, they have full control over access to the message(s) and/or file(s). Even if a recipient receives encrypted content, the sender has the ability to revoke (or reauthorize) access at any time. Virtru even allows the sender to revoke access to specific recipients.

Note

Virtru can only revoke emails that were sent securely with Virtru. Any messages sent prior to having Virtru installed or messages sent unsecured after Virtru has been installed cannot be revoked.

Using Virtru’s Persistent File Protection (PFP) Security Option

Note

Please note that Persistent File Protection (PFP) Security Option is only available from the Virtru add-on to the Microsoft Outlook Desktop Application. It is not available when using Outlook on the Web (office365.fdu.edu) or the Virtru Dashboard.

In addition to encrypting messages and attachments, Virtru users have the ability to apply additional security settings to protected content. Among these settings is the option to apply “Persistent File Protection (PFP)” to an encrypted file.

PFP provides a secure file container that is portable, universally accessible, and built on top of open standards. Regardless of where files are stored, PFP allows you to select, protect, and share a file with anyone while maintaining full visibility into how it is being used and retaining the ability to revoke access at any time. Any file protected with PFP will convert into the .tdf.html file format. This ensures that the contents are only accessible in Virtru’s Secure Reader, and only authorized parties can view it.

This feature can be applied using the Virtru plugin for Microsoft Outlook on Windows Operating Systems only. It supports the following common file types:

  • Microsoft Office documents: .docx, .pptx, .xlsx
  • Common image file formats: .jpeg, .png
  • PDF documents

Note

Although newer Microsoft Office file types are supported, older versions (.doc, .ppt, .xls) are not compatible. Additionally, these other common file types are NOT supported: .msg, .zip, .md.

Last Modified:

Home/Department Shared Drive Quota Limit Email

Resources for:
icon Close

Home drives and departmental shared drives come with a limited capacity of data storage, known as a quota. When a drive reaches 85% of that quota, both the departmental shared drive manager as well as the user uploading the content that puts a drive over that threshold will receive a message from psadmin@fdu.edu as seen below.

By informing the share manager and providing the name of the share affected, the share manager has an opportunity to respond to the notification prior to any disruptions to day-to-day workflows.

Upon receiving this email, the share owner should:

  1. Review and confirm that all uploaded content is required for current business purposes
  2. Review and consolidate any duplicated items
  3. Remove any documents, files, or pictures no longer needed

Note

Shared drives are not intended for archival purposes. We ask that the share manager please remove documents, files or pictures that are no longer actively required.

These measures will resolve most shared drive quota issues. If the shared drive is still nearing its storage quota, please fill out the Home/Department Share Management Form using the link below:

Home/Department Share Management Form

Last Modified:

Legacy Authentication

Resources for:
icon Close

Legacy Authentication is a term Microsoft sometimes uses to describe basic authentication when used with its cloud-based services. This is in contrast with the term “modern authentication” which provides more security and capabilities.

ALERT ALERT

FDU has blocked legacy authentication as of September 19, 2022.

Legacy Authentication Topics

Background

Legacy (or basic) authentication is characterized by:

  • A client or network protocol that is incapable or not configured to do modern authentication
  • A client which sends both the username and password to the application
  • An application using the username and password to get a logon token on behalf of the user

Modern authentication is characterized by:

  • a client and service capable and configured to use OpenID Connect, SAML, and/or OAuth 2.0 for authentication AND
  • a client and service which can accept redirects to the identity provider for all authentication interactions and can work with authentication tokens of the protocols above

All Microsoft cloud services are modern authentication capable.

Whether legacy or modern authentication is used is dependent on the client capabilities. To use modern authentication, you can, in many cases, update your client application or change to an alternative client application.

A list of known clients using legacy authentication is available. Transitioning from legacy authentication usually requires the individual user to change the client software they are using, which may require assistance from the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Protection with two-factor authentication (2FA)

Legacy authentication can not be protected by 2FA. Because the password is known to the application accessed via legacy authentication, it is less secure than modern authentication. If legacy authentication is not blocked for your account, 3rd party applications can ask for your credentials and have your password without you being aware they do.

Transition from legacy authentication

For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.

close
How Do I Address My Use of Legacy Authentication

In most cases, users will need to do one or more of the following:

  • Update their application to a version that supports modern authentication protocols
  • Upgrade to the latest version of their phone operating system
  • Remove and re-add their FDU account in the configuration of their iOS or macOS application so it will use modern authentication protocols

All three of these actions are informed by the list of known insecure client apps. FDU IT doesn’t know your devices like you do, nor do we manage which client applications you use, so only you can identify where action needs to be taken.

If you don’t seem to have one of the insecure client applications but still suspect you have legacy authentication, For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.

close
To Remove your FDU Account on iOS
  1. Open “Settings
  2. Choose “Calendar” or “Mail
  3. Choose “Accounts
  4. Choose “Exchange” or “Google” – make sure you are choosing an account in the format fdunetid@fdu.edu
  1. Choose “Delete account
  1. Confirm the deletion by choosing “Delete from my iPhone
close
To Remove your FDU Account on Android
  1. Open the “Gmail App
  1. Tap the Account icon in the top right to view all existing accounts
  1. Tap “Manage Accounts on this device
  1. Select your @fdu.edu mail account from the list
  1. Tap “Remove account
close
To Re-add your FDU Exchange Account on iOS and Android

To add your FDU Email account to an iOS device’s native “Mail” app follow the instructions on the link below:

close
List of Known Clients Using Legacy Authentication

This list is not intended to be comprehensive; it is only a list of known client applications. If you have one which should be added, please let us know.

Client AppFDU IT RecommendationNotes
Outlook 2010 or earlierReplace with one of the supported email clients
Outlook 2013 without special settings enabledReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Enable Modern authentication for Office 2013 on Windows devices – Microsoft 365 admin | Microsoft Docs
Mail or Calendar on iOS11 or newerReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Remove FDU account on device, then re-add FDU account.

These apps now support modern authentication, but that support was only recently added and any account setup previously is “stuck” in legacy authentication. You’ll need to delete the account and set it back up fresh to get modern authentication. Apple plans to release an update which automatically fixes this.
Mail or Calendar on iOS 10 or lowerReplace with one of the supported email clientsAlternate resolution: upgrade to iOS 11 or newer, then follow resolutions for that scenario
Any client application on iPhone 5 and lowerUse OWA or replace this device
Any client application on iPad 4th generation and lowerUse OWA or replace this device
EudoraReplace with one of the supported email clients
PineReplace with one of the supported email clients
ThunderbirdReplace with one of the supported email clients
Mac Mail on Mac OS 10.13 or earlierReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Upgrade macOS, remove FDU account on device, then re-add FDU account
Any client application on ChromebooksUse OWA or replace this device
Sharepoint Designer 2013Retire the use of this discontinued tool.Contact FDU IT for more information
close
Known Problem: Your Email Access Has Been Blocked

You may see an email in your FDU inbox like this:

While the email message says it was sent by your IT department, it was not. This email message wasn’t actually sent–it only exists on your mobile device and was created to alert you to the fact that your client application can’t sign into your account. Your email access has not been blocked–it is only that this client application is broken. You can verify for yourself that your email access was not blocked by going to Outlook on the Web. And the reason the client application is broken is because it can only do legacy authentication OR it only has cached credentials which are based on legacy authentication.

close
How Do You Know if You Will Be Impacted?

There are several ways to determine if you’re using Basic authentication or Modern authentication. If you’re using Basic authentication, you can determine where it’s coming from and what to do about it.

Authentication dialog

A simple way to tell if a client app (for example, Outlook) is using Basic authentication or Modern authentication is to observe the dialog that’s presented when the user logs in.

Modern authentication displays a web-based login page:

Basic authentication presents a dialog credential modal box:

On a mobile device, you’ll see a similar web-based page when you authenticate if the device is trying to connect using Modern authentication.

You can also check the connection status dialog box, by “CTRL + right-clicking” the Outlook icon in the system tray, and choosing Connection Status.

When using Basic authentication, the “Authn” column in the “Outlook Connection Status” dialog shows the value of “Clear“.

Once you switch to Modern authentication, the “Authn” column in the Outlook Connection Status dialog shows the value of “Bearer“.

close
Last Modified:

Managing Clutter in Outlook

Resources for:
icon Close

What is Clutter?

Microsoft has implemented a new feature to its mail client called Clutter. Clutter acts as a filter that separates e-mails that it Deems low priority. The e-mails are placed in a folder and are out of sight, with no notifications visible to the user. The problem with Clutter is that it is a learning program that tries to guess what emails are important or low priority and might filter out emails that you need.

Disabling Clutter rules in Outlook 

If you wish to disable clutter, log in to Office 365 using our portal office365.fdu.edu with your NetID credentials.

  1. Look for the settings icon on the upper right corner of your window and click on it
  2. Click on the “Mail” option under “Your app settings”
  1. Drill down to “Mail > Automatic processing > Clutter”
  2. Uncheck “Separate items identified as clutter”
close
Last Modified:

Microsoft 365 Quarantine Support

Resources for:
icon Close

Spam Quarantined Email

Microsoft 365 email has filters to protect users from spam and malicious emails like phishing scams.

Messages caught by the filters are placed in quarantine for Fairleigh Dickinson University and its users’ protection. Users will receive a Spam Notification message once a day, notifying them of any messages placed in quarantine. Any legitimate mail caught by mistake can be released directly from this message or from the quarantine portal.

Warning Warning

Mail left in quarantine will automatically be deleted after 15 days.

Handling Quarantined Email

Legitimate messages placed in quarantine may be released into your inbox in one of two ways:

  1. From the daily spam notification email message

If you receive mail that has been placed in quarantine, you’ll receive an email message from quarantine@messaging.microsoft.com. The message will look like the one below:

Note

You will only receive an email if you have items in quarantine.

The following options will be available to you by clicking the respective links in the email notification or you can choose to do nothing.

  • Review Message – go to the Microsoft 365 Security & Compliance Center to review it
  • Release – the message is removed from quarantine and placed in your inbox
  • Block Sender – add the sender to the Blocked Senders list in your mailbox
  1. From the Microsoft 365 Security & Compliance Center

Quarantined email can also be handled in the Microsoft 365 Security & Compliance Center.

  1. Go to Microsoft 365 Security & Compliance Center >
    • A list of your emails in quarantine will be displayed
  2. Click on any message to select it, then choose from the options given:
    • Release message
    • Preview message
    • View message header
    • Block Sender

For more details, use this link:

Last Modified:

Microsoft New Outlook Tutorial

Resources for:
icon Close

Microsoft has released a new version of Outlook that will eventually replace the classic version. The new Outlook for Windows brings the latest features, intelligent assisted capabilities, and a new modern and simplified design to your Outlook app. The New Outlook has many features and is vastly different visually from the classic version of outlook presently installed on all university owned computers.

index

Index

The New Outlook is compatible fully with all Office365 functions but because there are some features missing that presently exist in the classic Outlook, FDU IT highly recommends NOT switching to the new Outlook currently, especially since not all features are present and Microsoft is still developing the new Outlook.

Some of the features not available in the New Outlook are:

  1. Existing Offline Outlook files called PST files stored locally on your computer
  2. Virtru Email Encryption Client: While the Add-on is not supported, you can still send and receive encrypted email using the “#secure# tag in the subject line of the email
  3. Adobe Acrobat and/or Foxit PDF Professional Outlook using the COM-Add-ins platform
  4. Zoom Outlook Plugin or any other Meeting platform using the COM-Add-ins platform
  5. Any other third-party COM-Add-in
  6. Custom Macros or Custom Visual Basic functions manually added
  7. Many Rule templates and options are not available

Note

The New Outlook has already been deployed to university owned macOS devices, due to the number of enhancements it provides, and that COM-Add-in platform was a Windows only feature.

  1. Turn on the toggle “Try the new Outlook” which will begin downloading the New Outlook
  1. From the Success window, select “Switch”. This will close the current version of Outlook and New Outlook will sign you in automatically. Select “Next” to accept the privacy settings
  2. Select an option about sending optional data, and then select “Accept”. Review the privacy information about connected experiences, and then select “Continue”
  3. Select “Import Settings” to bring over your settings from classic Outlook. New Outlook will begin adding your accounts
  1. The new Outlook for Windows will open once the setup is complete, and you can start reading and sending emails immediately.

New Look

This is the new Outlook mail icon. It might also include the word NEW.

When you open new Outlook, you’ll see the following tabs on the ribbon: Home, View, and Help. This version includes Settings which is available in the navigation header. Settings is where you can customize your Outlook experience.

Note

If you are using the new outlook and never created an account using the Classic Outlook, you will have to create a ticket using FDU SAMI Support by clicking the Support button at the bottom of this page.

If you switched from the classic Outlook for Windows, you’ll have the option to migrate some of your settings, which you can learn more about on following the link below:

Microsoft Learn

However, it’s still good to familiarize yourself with the latest options.

You’ll find Settings in the gear icon in the upper right corner. You can also make quick updates to certain settings by clicking on the View tab.

Changes you make to settings in the New Outlook for Windows will also be reflected in Outlook on the web.

Become Familiar with The New Ribbon

The top bar of the app should be familiar if you’ve used any apps like Word or Excel before, including the classic Outlook for Windows.

Known as the ribbon, it is the place to find the commands you need to manage your inbox or format emails. You can make the ribbon larger (the classic experience) or smaller (the simplified experience) using the dropdown arrow on the right side of the bar. If you want to personalize the commands you see in the simplified ribbon, select Customize.

On the left side you’ll see the navigation bar, which makes it simple to switch to Calendar, Contacts, or any other app you frequently use. For quick access to your calendar or tasks without leaving the inbox, you can use My Day by selecting the icon in the upper right.

Pin Emails

Do you ever have trouble tracking down that key email thread you’re actively responding to? Or is there an email with key information you frequently refer to? Now, simply right-click any message and choose. Pin and that email will appear at the top of your inbox, saving you time from having to go back and search for it.

Snooze an Email

Sometimes email is very important, but not yet. With the Snooze feature, you can schedule a time for the email to be re-delivered to your inbox, appearing at the time you want it to, so you can handle it when it’s the right time for you. Just right-click any message and choose Snooze, or select Snooze from the ribbon. Then choose the time you want it to be delivered.

Scheduling Poll (Formerly Find Time)

Schedule an Email

In today’s hybrid work world, your day might be someone else’s night, so you don’t want to send an email to someone in the middle of the night. With the new Outlook, it’s simple to send an email when you want to. Just select the dropdown arrow next to Send and choose Schedule send.

You might be familiar with categories, but they’ve been significantly upgraded. See the category names and colors directly on your messages in your inbox. Want to see everything you’ve tagged with that category? Just click it right on your message. You can even add a category to your Favorites.

Install an Add-in from The Office Store

  1. In Outlook, go to the navigation bar and select “More Apps > Add apps”

Tip

You can also access the Store from the Apps button to install an add-in directly from a message or appointment.

Note

Only Approved Addons will be allowed to be installed. To request an Addon, Open a Sami Support Ticket.

For guidance on how to locate the Apps button to access add-ins while reading or composing a mail item, see Use an add-in in Outlook following the link below:

Using an Add-in in Outlook

  1. In the “Apps” page, search for the add-in you want from the available list. Alternatively, if you’re after a specific add-in, enter its name in the search box. When you find the add-in you want to install, select it to learn more about the add-in and review its privacy policy
  2. When you’re ready to install the add-in, select “Add”

Add-ins Installed by your IT Admin

If you’re part of an organization and a new add-in is installed for you by your IT admin, the add-in will be available on the read or compose surface where it’s designed to work. For guidance on how to access an add-in, follow the link below:

Use an add-in in Outlook

Using an Add-in

The location of where an Add-in is installed depends on whether you’re reading or composing a mail item.

Tip

If you moved from classic Outlook for Windows to the new Outlook for Windows, note that the location of add-ins is different. While add-ins are accessed from the ribbon or app bar in classic Outlook, access to add-ins in new Outlook for Windows depends on whether you’re reading or composing a mail item.

For guidance on how to use Add-ins in classic Outlook, visit the link below:

Use an add-in in Outlook

Using an Add-in While Reading a Message

  1. Select a message in the Reading Pane or open a message in a separate window
  2. From the action bar of the message, select “Apps”
  3. Select the “Add-in” you want to use

Tip

Customize your action bar to quickly access your add-ins. In the message action bar, select the ellipsis button (•••), then choose Customize actions. In the Addins section, check the boxes for the add-ins you want to see in the action bar.

Use an Add-in While Composing a Message

  1. Create a new message or reply to an existing one
  2. From the ribbon, select the “Message” tab, then choose the Add-in you want to use. If the Add-in doesn’t appear in the ribbon, select “Apps” to view your installed add-ins

Use an Add-in While Viewing or Scheduling a Meeting or Appointment

  1. Open an existing appointment or create a new one

Tip

If you want to use an add-in on an existing meeting or appointment, you must open the meeting or appointment in a pop-up window to view the ribbon.

  1. From the ribbon, select the “Add-in” you want to use

Delete an Add-in

  1. Go to the navigation bar and select “More Apps” then “Add Apps”
  2. On the “Apps” page select “Manage your Apps”
  3. Under “Manage your Apps” find the app you want to delete and select “More options” then “Remove”

As of November 2023, the Microsoft 365 Groups experience in Outlook is generally available for Outlook on the web and new Outlook for Windows. Access new Groups by selecting Groups on the navigation bar.

Tip

New Groups in classic Outlook is available in Build Version 16.0.16714.10000 or later. To access new Groups in classic Outlook, from the navigation bar select More Apps > Groups.

New Outlook Groups

Groups in Microsoft 365 let you choose a set of people that you wish to collaborate with and easily set up a collection of resources for those people to share. Resources such as a shared Outlook inbox, shared calendar or a document library for collaborating on files.

Outlook now has a new home for Microsoft 365 Groups - one place to connect, communicate, and collaborate with your team. Groups Home provides a central destination to get critical information from all the different groups you may be part of.

Benefits of the new Groups experience include:

  • Group Home landing page – Stay updated on your groups, including recent files across all your groups. From Home, you can access frequently used groups and find new ones based on your interests.
  • Recent groups and Recent files – Find recent active groups and quick links to get to files, emails, events, and member management from the Groups Home landing page.
  • Revamped individual Groups experience – Create, consume, and share information related to a particular group, as well as manage events and members efficiently in fewer clicks.

Accessing New Groups

In the New Outlook, from the navigation bar select “Groups”. This takes you to Groups Home.

In the Classic Outlook, from the navigation bar select “More apps” then “Groups”.

Tip

To pin, right-click Groups and select Pin.

From Groups Home you can see all your groups at once. Or, when you select an individual group, you can:

  • Send an email to the group, access and edit your group settings and preferences, and manage group membership as needed.
  • Access the group email, files, events, and members by selecting the respective tab.
  • Access connected apps like Teams, SharePoint, OneNote, and Planner.

Talk

Conversations in Microsoft 365 Groups in Outlook happen in the shared inbox for the group. Users can read and reply to messages, and members can easily search or scroll back through the message history to get caught up on what’s been discussed before. The shared inbox looks a lot like the personal inbox that Outlook users are familiar with. Each conversation appears separately in the message list at the left and clicking on one will open it in the reading pane. If a user marks a message, or conversation, as read it doesn’t affect how the messages appear for other members of the group so you don’t have to worry that other members may miss an important message.

The shared inbox for your Office 365 group is where conversations occur.

Tip

A recent change in the way messages are displayed, and counted, in Outlook may have reset the number you see next to your group name in the Outlook navigation pane. If you want to reset that number to zero you can right-click the group and select Mark all as read.

Now that you’ve got your group created, let’s start a new conversation. You can post a new message by opening the shared inbox for the group and clicking New Conversation on the Ribbon. Or you can simply send an email to the group’s alias. All members of the group will be able to read the new message you’ve posted and any members who follow the group will get a copy of your message in their personal inbox.

Share Files

Each Microsoft 365 Group gets a shared files library where you can store, share, and collaborate on documents, workbooks, presentations, or just about any kind of file.

Access the files library by going to your group in Outlook (on the left navigation pane) and click Files on the Ribbon. The files library will open in a browser and from here you can create new files, upload files from your computer and do just about anything else a SharePoint document library can do. Think about what kind of files would be useful to share with your group, and don’t feel limited to Microsoft Office files. You can also share PDFs, photos or just about any other kind of file that your group would find useful.

To download or delete a file just select it and those options will appear on the toolbar at the top.

Collaborate

Each Microsoft 365 Group gets its own shared OneNote notebook where they can gather ideas, collaborate and store research.

Go to your group in Outlook by finding it on the left navigation pane, or in Outlook on the web by going to the People tile. Once you’re there click Notebook on the Ribbon to open the group’s shared notebook.

The first time you open the group’s shared notebook it will open in the browser in OneNote for the web. You can make edits there, or if you have OneNote 2016 and you’d prefer to use that just click Edit in OneNote from the Ribbon. Once you’ve opened it in OneNote the notebook will sync to your list of open notebooks and you can access it directly from within OneNote without having to go to the group first.

Try going to your group’s OneNote notebook and think about what might be useful for the group to collect ideas and collaborate on. For example you might have a section that you use to gather and comment on web content that is relevant to your team.

Plan Events

Chances are good that your group has events, meetings, milestones or other items that would benefit from a shared calendar. Each Microsoft 365 Group has a shared calendar that all members can see and contribute to.

Working with the calendar of your group is no different than working with your personal calendar. If you select the calendar button on the navigation pane, you’ll see your personal calendar, plus the shared calendars of any groups you’re a member of. You can check the boxes next to each calendar you want to see and view them side by side or overlapped.

Adding an item to the shared calendar works just as it does on your personal calendar. Any meeting you add to the shared calendar will invite the other members of the group to that event as well, so they can have it on their own calendars. Appointments added to the shared Group calendar do not appear on the personal calendars of other members.

Now that you’ve got your shared calendar try adding any upcoming meetings or events that your group might be participating in.

Last Modified:

Policy for Acceptable Use of Email

Resources for:
icon Close

As a member of our community, your FDU NetID is your passport to accessing many of Fairleigh Dickinson University’s IT services. Most important is your student, employee, or alumni FDU Email account. When using FDU Email, you are an ambassador for our institution and our expectation is that you will conduct yourself in an efficient, effective, ethical and lawful manner. Please review our Policy for Acceptable Use of Email to ensure that you are adhering to all security and decorum requirements.

Effective Date: 01/01/2018

1.0 Introduction

The purpose of this policy is to ensure the proper use of e-mail by all those assigned a Fairleigh Dickinson University (FDU) e-mail account. This policy applies to any e-mail system that FDU has or may install in the future. It also applies to employee use of personal e-mail accounts via browsers, as directed below. All users of FDU e-mail systems have the responsibility to use their e-mail in an efficient, effective, ethical and lawful manner. E-mail users must follow the same code of conduct expected in any other form of written or face-to-face business communication. FDU may supplement or modify this policy for specific employees in certain roles. This policy complements similar FDU policies such as the Acceptable Use Policy and the Written Information Security Program (WISP). Please read and follow those policies as well.

The University subscribes to the 1940 Statement of Principles on Academic Freedom and Tenure and the 1940 and 1970 Interpretive Comments issued thereon, formulated jointly by the Association of American Colleges and the American Association of University Professors. Nothing in this policy is intended to supersede those statements and principles.

2.0 Ownership of Email Data

The University owns all University email accounts in the fdu.edu domain, or any subsequent domains it may create (University Email Accounts). Subject to underlying copyright and other intellectual property rights under applicable laws and University policies , the University also owns data transmitted or stored using the University Email Accounts.

3.0 Employee Responsibilities

FDU only supports the installation and usage of approved e-mail clients.

Usernames will be assigned as part of the University’s e-mail registration process and reflect internally mandated e-mail naming conventions.

3.1 Acceptable Uses

  • Communicating in a professional manner with other FDU associates about work-related matters.
  • Communicating in a professional manner with parties outside FDU for business purposes.
  • Personal communications that are brief and do not interfere with work responsibilities.
  • Users are allowed to access personal e-mail accounts on a limited basis, without disrupting business responsibilities. Access can be gained only by using a browser. Use of e-mail-specific protocols, such as POP3 and IMAP4, is prohibited, since they require specific firewall ports to be open.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

3.2 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an associate’s use of e-mail that breaks laws.
  • Personal communication that interferes with work responsibilities.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Sending unprotected healthcare data and personally identifiable consumer data or other confidential information to unauthorized people or in violation of FDU’s Acceptable Use Policy, or the Written Information Security Program (WISP). , Health Insurance Portability and Accountability Act and/or Gramm-Leach-Bliley Act regulations. Exceptions may be authorized by the University Chief Information Security Officer working with the employee’s supervisor. Communications that strain FDU’s network or other systems unduly, such as sending large files to large distribution lists.
  • Communications to distribution lists of only marginal interest to members, and replying to the entire distribution list when a personal reply is effective.
  • Communications with non-specific subject lines, inarticulate language, and without clear purpose.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Circulating unprotected healthcare data and personally identifiable consumer data that would violate U.S. Federal HIPAA and GLB regulations. Exceptions may be authorized by the employee’s supervisor and in conjunction with use of a University-approved e-mail encryption service.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)

4.0 Privacy Guidelines

The University typically does not review the content of electronic messages or other data, files, or records generated, stored, or maintained on its electronic information resources; however, it retains the right to inspect, review, or retain the content of such messages, data, files, and records at any time without prior notification. Any such action will be taken for reasons the University, within its discretion, deems to be legitimate. These legitimate reasons may include, but are not limited to,

  • responding to lawful subpoenas or court orders;
  • investigating misconduct (including research misconduct);
  • determining compliance with University policies and the law; and
  • locating electronic messages, data, files, or other records related to these purposes.

FDU maintains the right to monitor and review e-mail activity to ensure compliance with this policy, as well as to fulfill FDU’s responsibilities under the laws and regulations of the jurisdictions in which it operates. Users should have no expectation of privacy.

  • Except as otherwise stipulated in this policy, on termination or separation from FDU, FDU will immediately deny access to e-mail, including the ability to download, forward, print or retrieve any message stored in the system, regardless of sender or recipient.
  • Except as otherwise stipulated in this policy, employees who leave FDU will have their mailbox deleted within six months of their termination date. The employee’s manager may request that access be given to another employee who may remove any needed information within the same six month time frame.
  • FDU reserves the right to intercept, monitor, review and/or disclose any and all messages composed, sent or received on the University e-mail system. Intercepting, monitoring and reviewing of messages may be performed with the assistance of content filtering software, or by designated FDU employees and/or designated external entities. Employees designated to review messages may include, but are not limited to, an employee’s supervisor or manager and/or representatives from the HR, legal or compliance departments.
  • FDU reserves the right to alter, modify, re-route or block the delivery of messages as appropriate. This includes but is not limited to:
    • Rejecting, quarantining or removing attachments and/or malicious code from messages that may pose a threat to FDU resources.
    • Rejecting or quarantining messages with suspicious content.
    • Rejecting or quarantining messages containing offensive language or topics.
    • Re-routing messages with suspicious content to designated FDU employees for manual review.
    • Appending legal disclaimers to messages.
  • Electronic messages are legally discoverable and permissible as evidence in a court of law.
  • Users of the University’s computing and electronic communications resources must understand that electronic messages, data, files, and other records generated, stored, or maintained on University electronic information resources may be electronically accessed, reconstructed, or retrieved by the University even after they have been deleted.

5.0 Security

As with any other type of software that runs over a network, e-mail users have the responsibility to follow sound security practices.

  • Users should not use the e-mail system to transfer sensitive data, except in accordance with FDU data protection policies. Refer to the Written Information Security Program (WISP). Sensitive data passed via e-mail over the Internet could be read by parties other than the intended recipients, particularly if it is clear text. Malicious third parties could potentially intercept and manipulate e-mail traffic.
  • In an effort to combat propagation of e-mail viruses, certain attachment types may be stripped at the University e-mail gateway. Recipients will be notified via e-mail when this occurs. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).
  • Attachments can contain viruses and other malware. User should only open attachments from known and trusted correspondents. Suspicious attachments should be reported to the University Technical Assistance Center (UTAC).
  • Spam is automatically filtered at the University gateway in a highly efficient manner. Errors, whereby legitimate e-mail can be filtered as spam, while rare, can occur. If business-related mail messages are not delivered, users should check their local spam folder or the daily spam digest. If the message is not there, users should contact University Technical Assistance Center (UTAC).
  • Users will not be asked by OIRT or any other FDU group by e-mail for personal information such as usernames or passwords. Any such requests should not be responded to and should be referred to the University Technical Assistance Center (UTAC). Such approaches – known as phishing – are fraudulent approaches carried out for the purpose of unlawful exploitation.

6.0 Operational Guidelines

FDU employs certain practices and procedures in order to maintain the health and efficiency of electronic messaging resources, to achieve FDU objectives and/or to meet various regulations. These practices and procedures are subject to change, as appropriate or required under the circumstances.

  • For ongoing operations, audits, legal actions, or any other known purpose, FDU saves a copy of every e-mail message and attachment(s) to a secure location, where it can be protected and stored for three years. Recovery of messages from this store is prohibited for all but legal reasons.
  • To deliver mail in a timely and efficient manner, message size must be less than 25MB. Messages larger than 25MB will be automatically blocked and users will be notified of non-delivery. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).

Access to the content of electronic mail, data, files, or other records generated, stored, or maintained by any user may be requested from the University’s Associate Vice President of Technology Infrastructure for the reasons set forth below and shall be authorized as follows:

  1. by the Associate Vice President of Human Resources for all University employees;
  2. by either Dean of Students for students; or
  3. by the General Counsel for the purposes of complying with legal process and requirements or to preserve user electronic information for possible subsequent access in accordance with this policy.

In all cases, the Office of the General Counsel must be consulted prior to making a decision on whether to grant access. In the case of a time-critical matter, if the authorizing official is unavailable for a timely response, the General Counsel may authorize access.

All full-time faculty who retire from the University may keep their email address for life if they request to do so.

All full-time faculty who leave the University for reasons other than termination for cause, may request email forwarding for up to six months.

7.0 Governance and Enforcement

This policy was created with input from the University’s Data Security Incidence Response Team (DSIRT). At the request of the University’s Chief Information Security Officer (CISO), the DSIRT will review this policy annually to ensure that FDU is in compliance with internal or external requirements. FDU faces liability if users violate the terms of this policy. Therefore, willful or repeated violations of this Acceptable Use Policy for E-mail can result in informal or formal warnings, the loss of e-mail privileges, and other sanctions including termination. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

For assistance with this policy, please contact the University’s Chief Information Security Officer (CISO).

Exceptions to this policy may be authorized by the University Chief Information Security Officer working with the employee’s supervisor.

Policy violations should be reported immediately to the University’s Associate Vice President of Technology Infrastructure

The University reserves the right to suspend an e-mail account while investigating a complaint or troubleshooting a system or network problem.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers.

It is the user’s responsibility to remain informed about the contents of this document.

Other Related and Applicable Policies


Last Modified:

Reporting Phishing or Junk Emails

Resources for:
icon Close
Outlook Web Access (Office365.fdu.edu)
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click the down arrow next to the Junk button
  1. Click on the appropriate button to report the email (Junk, Phishing or Block)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Microsoft Outlook for Windows or Mac
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click on the Report Message button
  1. Click the appropriate option button (Junk or Phishing)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Last Modified:

SAMI Support Public Request Form

Resources for:
icon Close

The SAMI Support portal requires a valid NetID and password, along with DUO multi-factor authentication, for access. Upon entry, users can create new tickets, review open or closed requests, and explore the IT Knowledgebase for solutions to common issues. Access the support portal using the button below:

SAMI Support Portal

If you need to open a request and cannot access SAMI Support for any of the reasons below, please complete this request form to contact the Fairleigh Dickinson University Technical Assistance Center (UTAC). A member of the IT support team will assist you via phone call or email.

  • I do not have a valid University issued NetID
  • I am not able to authenticate through DUO
  • I have not set up my DUO account
  • I am a vendor without a University issued NetID
  • I am an admitted student
  • I am a newly hired employee or adjunct
  • My FDU account is locked
  • I need my Net ID password reset and have already attempted to do that through identity.fdu.edu

Tip

The form below is not compatible with Dark Mode. For an optimal experience, disable Dark Mode either in your device’s system settings or directly from the FDU IT website menu bar.

SAMI Support Public Request

Last Modified:

Sending an Encrypted File Using Email

Resources for:
icon Close

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology.

Instructions for Windows

If you do not have a university issued laptop or desktop, you must download and install 7-Zip on your computer in order to proceed with the instructions. Please follow the following steps in order to download and install 7-Zip on to your personal device:

  1. Download 7-Zip:
  1. Launch the 7-Zip installer “7z1900-x64.exe” or “7z1900.exe

NOTE: The Installer file name may change as newer versions are released.

  1. Click “Yes” if asked to run an unknown app from User Access Control
  2. Click “Install” on the setup screen
  1. 7-Zip will now install, when completed, click “Close

Preparing an Encrypted 7-Zip File

  1. Single “Right” click on the file
  2. Highlight “7-Zip
  3. Navigate and “Left” click on “Compress and Email…
  1. Change Archive Format to “ZIP
  1. Enter and Retype a password in the “Encryption Section” and check the box to “Encrypt file names
  2. Change the Encryption Method to “AES-256

NOTE: The password must be a complex password that contains the following:

  • At least one capital letter
  • At least 2 numbers 0-9
  • At least 1 special character (%, ^, &, ! , @ , !, ….)
  • Be at least 8 characters long
  1. Click “OK

NOTE: A progress bar will open to encrypt and zip the file. Depending on the size of the file, this may take a few minutes.

  1. An email message to compose your new email with the compressed and encrypted file will appear
  1. Address and compose your email as desired

CAUTION: Never send an email that contains both the password and file together. These must be sent separately.

  1. Compose and send a separate email, or place a phone call, to the receiving parties which contains the password for the compressed file for them to read

NOTE: Without the password, the receiving party will not be able to open and view the file.

Opening an Encrypted 7zip File

  1. Open the email that contains the encrypted file
  2. Click the arrow “V“’ and select “Save As
  1. From the saved location open the encrypted file
  2. Enter the password provided to you from the sender

Once the password is entered correctly, the enclosed document will then load, and you can make any changes and save inside the protected file. If needed, the file can be returned to the sender with needed information.

NOTE: The Archive Window must not be closed if making any changes that need to be saved.

IMPORTANT: After the document is no longer needed, the encrypted file should be SECURELY DELETED from your hard drive. At no time should this be saved for later use.

Instructions for macOS

  1. Download Keka:
  1. Open Keka Preferences and check the box next to Use AES-256 when encrypting ZIP files (less compatible)
  1. Set a password for the file
  1. Drag your file onto Keka to compress and encrypt. The encrypted file will be placed next to the original file
  2. If you need to extract an encrypted file, simply drag it onto the Keka window and enter the file password in the prompt. The file will be extracted in the same location as the original
Last Modified:

Shared Mailbox in Outlook

Resources for:
icon Close

A shared mailbox makes it easy for a group of people to read and send emails from one public email address, like info@fdu.edu. When a person in the group replies to a message sent to the shared mailbox, the email appears to be from the shared address, not from the individual user. Shared mailboxes can also be used to provide a shared calendar, allowing multiple users to schedule and view calendar tasks.

Request Access to an FDU Shared Mailbox

Users can request a new shared mailbox by completing and submitting the “Distribution Group/Shared Mailbox Request” form found below.  Users needing access to a specific FDU shared mailbox account may request access by reaching out to the shared mailbox owner.  To fulfill this request, the shared mailbox owner will open a support case with the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Add a Shared Mailbox to Outlook

Windows
  1. The shared mailbox should automatically display in your folder pane on the left-hand side of your Outlook application within 24 hours of its creation. Closing and restarting the Outlook application maybe necessary if you do not see it after 24 hours

Note

Before you can use a shared mailbox, the Microsoft 365 admin for the university has to add you as a member.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
macOS
  1. Select Tools from the Outlook menu bar at the top of the screen, then choose Accounts
  1. Select the Advanced… tab
  1. Select the Delegates tab
  1. Click the + button, located under Open these additional mailboxes:
  1. Type or select your correct shared mailbox, and then select Add
  1. Select the OK tab
  1. You should now see your shared mailbox listed on the left-hand side of your Outlook email application window

Note

This is a one-time process only. You do not need to follow the above steps to add this to Outlook on your macOS device again.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

New Outlook version on macOS

Some macOS users may take advantage of the “New Outlook” version of the Outlook application. You can identify which Outlook version you are using by locating the “New Outlook” slider tab button on the top right of the application.

  1. Select Tools from the Outlook menu at the top of the screen, then choose Accounts
  1. Select the Delegation and Sharing tab
  1. Choose the Shared With Me tab and then select the + button
  1. Begin to type the shared mailbox name or its email address, choose the correct shared mailbox before selecting Add, and finally Done when finished
  1. You should now see your shared mailbox, located on the left-hand side of your Outlook application window

Note

This is a one-time process only. You do not need to follow the above steps to add this to Outlook on your macOS device again.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
office365.fdu.edu / Outlook Web App
  1. Navigate to the FDU Office 365 Portal webpage
  1. Select the Outlook web app icon, located on the left-hand side of your display
  1. Right-click on the Folders option located on the left side of the menu; a small drop-down menu should display. Select Add shared folder
  1. Begin typing the email address for the shared mailbox, auto-populated suggestions will be displayed. Select the correct shared mailbox address and click Add
  1. You should now see the added shared mailbox located on left side of your Outlook web email window

Note

This was a one-time process. You do not need to follow the above steps to add this to your account again. You will automatically see the shared mailbox when you sign in to your account next time.

If you cannot open a shared mailbox, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) and open a service request.

close
Android and iOS
  1. Sign in to your primary FDU email account in the Microsoft Outlook for Android or iOS app
  2. Tap the Add Account button in the left navigation pane, then tap Add Shared Mailbox
  1. Enter the name of the shared mailbox and tap Add Shared Mailbox when finished

Note

If you have multiple accounts in Outlook Mobile, select the account that has permissions to access the shared mailbox.

  1. After the account setup process completes, the shared mailbox will display in your account list within the Outlook for Android or iOS app

Tip

To remove a shared mailbox, go to Settings > Accounts. Then tap on the shared mailbox and select Delete Account.

close

Send Email from a Shared Mailbox

Windows / macOS
  1. Open Outlook
  2. Choose New Email to start a new message
  3. If you don’t see the From field at the top of your message, choose Options, and select the From tab
  1. Click From in the message, and change to the shared email address

Note

If you don’t see your shared email address displayed, choose “Other email address…” Enter the full email address for the shared mailbox in the blank or search for the email address by clicking “From” tab. Click “OK” when finished.

  1. Finish typing your message and then choose Send

Note

From now on when you want to send a message from your shared mailbox, the address will be available in your “From” drop down list.

Whenever you send a message from your shared mailbox, your recipients will only see the shared email address in the message.

close
office365.fdu.edu / Outlook Web App
  1. Choose New Message
  2. Choose From and change to the desired shared email address

Note

If you don’t see your shared email address displayed, choose “Other email address…” Enter the full email address for the shared mailbox, then select the appropriate shared email address from the auto populated list when finished.

  1. Finish typing your message and then choose Send
close
Last Modified:

Student Technology Resources

Resources for:
icon Close

Fairleigh Dickinson University provides an extensive array of technological resources and services tailored for our students. This guide is designed to assist students in navigating and utilizing these tools effectively, ensuring they can easily set up, access, and manage their accounts, while also offering comprehensive information on each service.

ID and Email

FDU NetID

Your FDU NetID verifies who you are and ensures the privacy of your personal information. Your FDU NetID and your NetID password will provide access to a variety of IT resources including your Self-Service, WebCampus, Office365, and Email.

To obtain your NetID, follow the guide below:

close
Changing your FDU NetID Password

To protect the University and our Students from cyber attacks and other malicious activity, we require that everyone in our community to periodically change their password.

To change your password, follow the guide below:

close
DUO Multi-factor Authentication

To successfully use your NetID to access your accounts, you will need Two-Factor Authentication with Cisco DUO MFA.

Two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.

To set up your mobile device with DUO MFA, follow the guide below:

Additionally, refer to our FAQ for commonly asked questions about DUO:

close
Email and Office 365

Students can access their emails through any Web browser using their NetID and password to log in. To access our email, visit the Office 365 Portal:

Office 365 Portal

Students can also access their FDU Email accounts on their mobile devices by installing the Outlook app. For instructions to setting up your FDU Email account in the Outlook app, follow the guide below:

Current students who are registered for classes for the current term, or a future term have access to Microsoft Office 365 Suite applications. For more information, visit the links below:

close

Academic Systems

Webcampus

Webcampus is a course content management system. FDU’s Webcampus is also known as the Blackboard System. On-line courses are taught through this system which also allows for interaction between the student and faculty member as well as on-line class discussions.

To learn more about how to access Webcampus, review the guide below:

close
Self-Service

Self-Service is an interactive web application that enables students to view their individual information contained in FDU’s Student Information System. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes.

Review the Tutorial below to learn how to use Self Service:

close

Connectivity

Connecting to the FDU Wireless Network

Using your FDU NETID, you can connect to the FDU Wireless Network. For instructions view the links below:

close

Security

Security Resources

Understanding and implementing cybersecurity measures is crucial for protecting your personal and institutional information. This section provides essential resources to help you navigate the landscape of cyber threats.

Stay safe online by reviewing the articles below:

close

Software

Available Software for FDU Students

Fairleigh Dickinson University has both licensed and open-source software, that is offered for academic and/or personal use for students. The links below point out to commonly used software, both licensed and open source, that are offered for academic and/or personal use to all Fairleigh Dickinson University faculty, staff and students.


In our digital learning environment, mastering online tools is essential for academic success. These resources are designed to guide you through the process of engaging in classes virtually via Zoom and accessing your files on OneDrive.

close

Printing and Labs

Computer Labs and Printing

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use.

close
Virtual Labs

FDU also provides remote access to many of the software applications typically found in university computer labs through our platform FDU Anywhere. You can access it using your FDU NetID credentials using the link below:

FDU Anywhere

Review the FDU Anywhere Tutorial below to learn how to use our virtual labs:

close

For any IT related questions and support, contact our Fairleigh Dickinson University Technical Assistance Center (UTAC):

SAMI Support

Last Modified: