Office365

Welcome to Fairleigh Dickinson University. As a new member of our campus community, one of your first priorities will be gaining access to FDU NetID. With an FDU NetID, you will have access to a variety of IT resources, including Office365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.

New Student through Welcome Email (US Students)

If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below


New Student

If you are a new student at FDU Vancouver or if you are a New Jersey based student that has not received a Welcome Email, please visit the link below


New Faculty, Staff Member Temporary Employee, or On-Campus Contractor

If you are a new Faculty, adjunct Faculty, Staff member, temporary employee, or contractor who works on campus and requires a NetID, please visit the link below


All Others

If you are entitled to an FDU NetID account and either do not fall under any of the categories above or attempted to claim their NetID and received a message that your NetID has not been created, please visit the link below

Last Modified: icon icon Copy Link

Create and Share Office 365 Documents through OneDrive

icon Close

Whether you’re working at home or the office, OneDrive makes it easy to create new documents and share your files. You can even collaborate with others on a document.

In the following external article, you’ll learn how to create documents and folders. It will go over how to share your files with different groups of people, as well as the various collaboration tools available in Office 365.

Last Modified: icon icon Copy Link

Legacy Authentication is a term Microsoft sometimes uses to describe basic authentication when used with its cloud-based services. This is in contrast with the term “modern authentication” which provides more security and capabilities.

ALERT ALERT

FDU will block legacy authentication for users on September 19, 2022.

Legacy Authentication Topics

Background

Legacy (or basic) authentication is characterized by:

  • A client or network protocol that is incapable or not configured to do modern authentication
  • A client which sends both the username and password to the application
  • An application using the username and password to get a logon token on behalf of the user

Modern authentication is characterized by:

  • a client and service capable and configured to use OpenID Connect, SAML, and/or OAuth 2.0 for authentication AND
  • a client and service which can accept redirects to the identity provider for all authentication interactions and can work with authentication tokens of the protocols above

All Microsoft cloud services are modern authentication capable.

Whether legacy or modern authentication is used is dependent on the client capabilities. To use modern authentication, you can, in many cases, update your client application or change to an alternative client application.

A list of known clients using legacy authentication is available. Transitioning from legacy authentication usually requires the individual user to change the client software they are using, which may require assistance from the Fairleigh Dickinson University Technical Assistance Center (UTAC).

Protection with two-factor authentication (2FA)

Legacy authentication can not be protected by 2FA. Because the password is known to the application accessed via legacy authentication, it is less secure than modern authentication. If legacy authentication is not blocked for your account, 3rd party applications can ask for your credentials and have your password without you being aware they do.

Transition from legacy authentication

For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.

close
How Do I Address My Use of Legacy Authentication

In most cases, users will need to do one or more of the following:

  • Update their application to a version that supports modern authentication protocols
  • Upgrade to the latest version of their phone operating system
  • Remove and re-add their FDU account in the configuration of their iOS or macOS application so it will use modern authentication protocols

All three of these actions are informed by the list of known insecure client apps. FDU IT doesn’t know your devices like you do, nor do we manage which client applications you use, so only you can identify where action needs to be taken.

If you don’t seem to have one of the insecure client applications but still suspect you have legacy authentication, For the typical user, the complexity of determining whether you are using legacy authentication is significant. If you are using one of the client applications that does not use modern authentication protocols (see section below for a list of known clients using legacy authentication), you should replace them. If you don’t have one of these client applications but still suspect you have legacy authentication, contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for assistance.

close
To Remove your FDU Account on iOS
  1. Open “Settings
  2. Choose “Calendar” or “Mail
  3. Choose “Accounts
  4. Choose “Exchange” or “Google” – make sure you are choosing an account in the format fdunetid@fdu.edu
  1. Choose “Delete account
  1. Confirm the deletion by choosing “Delete from my iPhone
close
To Remove your FDU Account on Android
  1. Open the “Gmail App
  1. Tap the Account icon in the top right to view all existing accounts
  1. Tap “Manage Accounts on this device
  1. Select your @fdu.edu mail account from the list
  1. Tap “Remove account
close
To Re-add your FDU Exchange Account on iOS and Android

To add your FDU Email account to an iOS device’s native “Mail” app follow the instructions on the link below:

close
List of Known Clients Using Legacy Authentication

This list is not intended to be comprehensive; it is only a list of known client applications. If you have one which should be added, please let us know.

Client AppFDU IT RecommendationNotes
Outlook 2010 or earlierReplace with one of the supported email clients
Outlook 2013 without special settings enabledReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Enable Modern authentication for Office 2013 on Windows devices – Microsoft 365 admin | Microsoft Docs
Mail or Calendar on iOS11 or newerReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Remove FDU account on device, then re-add FDU account.

These apps now support modern authentication, but that support was only recently added and any account setup previously is “stuck” in legacy authentication. You’ll need to delete the account and set it back up fresh to get modern authentication. Apple plans to release an update which automatically fixes this.
Mail or Calendar on iOS 10 or lowerReplace with one of the supported email clientsAlternate resolution: upgrade to iOS 11 or newer, then follow resolutions for that scenario
Any client application on iPhone 5 and lowerUse OWA or replace this device
Any client application on iPad 4th generation and lowerUse OWA or replace this device
EudoraReplace with one of the supported email clients
PineReplace with one of the supported email clients
ThunderbirdReplace with one of the supported email clients
Mac Mail on Mac OS 10.13 or earlierReplace with one of the supported email clientsAlternate resolution (not supported by FDU-IT): Upgrade macOS, remove FDU account on device, then re-add FDU account
Any client application on ChromebooksUse OWA or replace this device
Sharepoint Designer 2013Retire use of this discontinued tool.Contact FDU IT for more information
close
Known Problem: Your Email Access Has Been Blocked

You may see an email in your FDU inbox like this:

While the email message says it was sent by your IT department, it was not. This email message wasn’t actually sent–it only exists on your mobile device and was created to alert you to the fact that your client application can’t sign into your account. Your email access has not been blocked–it is only that this client application is broken. You can verify for yourself that your email access was not blocked by going to Outlook on the Web. And the reason the client application is broken is because it can only do legacy authentication OR it only has cached credentials which are based on legacy authentication.

close
How Do You Know if You Will Be Impacted?

There are several ways to determine if you’re using Basic authentication or Modern authentication. If you’re using Basic authentication, you can determine where it’s coming from and what to do about it.

Authentication dialog

A simple way to tell if a client app (for example, Outlook) is using Basic authentication or Modern authentication is to observe the dialog that’s presented when the user logs in.

Modern authentication displays a web-based login page:

Basic authentication presents a dialog credential modal box:

On a mobile device, you’ll see a similar web-based page when you authenticate if the device is trying to connect using Modern authentication.

You can also check the connection status dialog box, by “CTRL + right-clicking” the Outlook icon in the system tray, and choosing Connection Status.

When using Basic authentication, the “Authn” column in the “Outlook Connection Status” dialog shows the value of “Clear“.

Once you switch to Modern authentication, the “Authn” column in the Outlook Connection Status dialog shows the value of “Bearer“.

close
Last Modified: icon icon Copy Link

Managing Distribution Groups in Office 365

Resources for: Faculty Staff
icon Close

A Distribution group (formerly known as mailing list) in Office 365 is a uniquely named email address that consists of multiple users and is managed by a designated owner. Distribution groups are intended to easily facilitate ongoing communications between a large and relatively fixed group of people.

There are a few important concepts to understand about distribution groups before we get started with group management:

  • Emails sent to a distribution group are distributed to all members of that distribution group.
  • Only users granted permission by the Distribution Group Owner can send emails to a particular distribution group.  Permission to post (send emails) to a group is managed by USAN, and Group Owners should open a ticket with UTAC to change members that can post to the group.
  • A distribution group can be configured in such a way that emails sent to it can be held for approval and specific users can be made approvers (also known as moderators).
  • A distribution group has a unique email address attached to it.  Users granted permission to send email to this email address can do so from any email client such as Outlook on the Web or Outlook installed in your computer, laptop, tablet or phone, Mozilla Thunderbird, Mac Mail and more.
  • You can request a distribution group by submitting the Distribution List/Shared Mailbox Request form located at FDU Forms Portal.
  • As a Distribution Group owner, you can change the group’s settings via the group’s management page on your Office 365 account (Outlook on the web). 
  • As a Distribution Group owner, you can add or remove members (recipients) from your group via your group’s management page. This can be accomplished via Outlook on the web or by using the Outlook application installed on your machine.
Adding and Removing Distribution Group Users in Outlook for Windows
  1. Open “Outlook” on your computer
  1. Open “Address Book

You can open Address Book in two different ways:

  • One way is to click the “Address Book” icon located at the top when “Home” tab is selected:
  • The second way is by composing/creating a new email and clicking the “To” button:
  1. Select “All Distribution Lists” from the drop-down menu located under Address Book:
Graphical user interface, text, application, chat or text message

Description automatically generated
  1. Select “More Columns” and enter the name or email address of your distribution group in the search field as shown in the first screen capture below. If you see your distribution group on the list, highlight it and double click it. If you do not find your list using “More Columns”, then it might be easier to find by using the “Name only
Graphical user interface, text, application

Description automatically generated
  1. Click on “Modify Members…
Graphical user interface, text, application

Description automatically generated
  1. If you want to remove a member, then select the member from the members list, click “Remove” button and then click “OK
  1. If you want to add a member, click “Add” button
  1. Select “More columns” and enter the new member’s name in the search field
  1. You should see the user in the list. Select “Name only” to search again if you are unable to locate the user. Once you have found the user, highlight the record and click “OK
  1. Verify that the new member is in the member’s list and click “OK
Graphical user interface, application

Description automatically generated
  1. Click “Apply” and then click “OK
Graphical user interface, text, application

Description automatically generated
close
Adding and Removing Distribution Group Users in Outlook on the Web
  1. Go to “fdu.edu” in the browser of your choice
  2. Go to “Shortcuts” menu
  3. Click “Office 365 and Email
  4. Sign-in with your NetID and password 
  5. Go to online Outlook app by clicking on the “Outlook” icon
  1. Go to Settings by clicking on the “Settings” icon
  1. Click on “View all Outlook settings
  1. Click “General
  1. Click on “Distribution groups

Here you see the list of distribution groups that you belong to and the list of distribution groups that you own

How to open the Configuration page for a particular Distribution Group that you own in Outlook on the Web

  1. Select the distribution group that you would like to make changes to and then click “Edit” (Pencil Icon)
  1. You should see the distribution group configuration page

How to see the list of recipients (members) for this Distribution Group in Outlook on the Web

  1. Click on “membership

How to add recipients (members) to this Distribution Group in Outlook on the Web

  1. Click on “+” icon (Plus Icon)
  1. Click “All Users
  1. Please enter the name or NetID of the user that you would like to add to this distribution group in the search text box
  1. Click “+” button beside the user that you would like to add from the search results (you can search and select more users if you would like)
  1. Click “Save” when you are done

Remove recipients (members) from this Distribution Group in Outlook on the Web

  1. Go to the membership list as shown in Step: 3 How to see the list of recipients (members) for this distribution group
  1. Click on the recipient (member) that you would like to remove

Tip

Press “Control” button while selecting recipient if you would like to select multiple recipients from the list.

  1. To select a range of adjacent recipients on the list, click the first recipient from that part. Now, press the “Shift” key and click last recipient in this part
  1. Click “” button at the top located below the “Members” title
  1. Click “Save” when you are done
close
Enabling Distribution Group Moderation and Adding Group Moderators
  1. Follow Step 1 & 2 in “Adding and Removing Distribution Group Users in Outlook on the Web
  1. Click “Message Approval
  1. Check (select) “Messages sent to this group have to be approved by a moderator”.
  1. Click “+” button under “Group Moderators

Note

By default, emails sent to the distribution group will be sent to the group owner for approval if you enable message approval and do not select any moderators.

  1. Click “All Users
  1. Please enter the name or NetID of the user that you’d like to add to this distribution group in the search text box
  1. Click “+” button beside the user that you’d like to add from the search results (you can search and select more users if you’d like)
  1. Click “Save” when you’re done. You’ll be taken to “Message Approval” screen
  1. You can add users’ emails from who do NOT require any approval by clicking “+” under “Senders who don’t require message approval” and following the same process as above
  1. You can choose who should be notified when an email sent to this distribution group has been held for approval -or- you can choose to disable these notifications as shown:
  1. Click “Save” again on “Message Approval” screen

Note

An email will NOT be held for approval from a group moderator who is allowed to send emails to the distribution group.

close
Last Modified: icon icon Copy Link

Microsoft Office 365 offers a comprehensive set of software tools that facilitate documentation, collaboration, and communication. These tools are available on the Web or as downloadable desktop Office 365 apps.

Below is a list of articles for each of the available tools in the Microsoft Office 365 environment. Each article contains information on what each application is and training on how to use them.


Outlook

Outlook allows you to connect and stay organized with your email, calendar, and contacts all in one place.


Word

Word allows you to collaboratively view, edit, and create high-quality shared documents.


Excel

Excel is the industry leading spreadsheet program, a powerful data visualization and analysis tool.


PowerPoint

PowerPoint is a slideshow presentation program that’s part of the Microsoft office suite of tools. PowerPoint makes it easy to create, collaborate, and present your ideas in dynamic, visually compelling ways.


Teams

Teams is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration. Here you will find documentation on how to install and use Teams and all its features.


OneNote

OneNote is a cross-functional digital notebook. You can organize different notebooks into sections and pages with easy annotation and navigation tools.


OneDrive

OneDrive and Microsoft 365 make it easy to access, share, and collaborate with your classmates or co-workers on files from anywhere within FDU.


Lists

Lists you can Build and share lists to help you track issues, assets, routines, contacts, inventory, and more. You can get started with Microsoft Lists from Microsoft 365, from MS Teams or from within SharePoint.


Yammer

Yammer is a collaboration tool that helps you connect and engage across the company. You can share information across teams and organize projects. Only your coworkers can join, so your communications on Yammer are secure and visible only to people within your organization.


Power Apps

Power Apps is a suite of apps, services, connectors, and data platform that provides a rapid application development environment to build custom apps. Using Power Apps, you can quickly build custom apps that connect to data stored throughout Microsoft 365.


Power Automate

Power Automate is a service that helps you create automated workflows between apps and services to synchronize files, get notifications, collect data and more.


Power BI

Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. It allows connections to hundreds of data sources and generate live dashboards and reports.


Planner

Planner makes it easy for your team to create new plans, organize and assign tasks, share files, chat about what you are working on, and get updates on progress.


Bookings

Bookings offers a simpler way to organize schedules and manage appointments. Microsoft Bookings includes a web-based booking calendar and integrates with Outlook to optimize your calendar and give your contacts the flexibility to book a time that works best for everyone involved.


Forms

Forms is an app that lets you create surveys, quizzes, and polls to collect real-time responses from students, collaborates and colleagues. It has built-in analytics to evaluate responses, and export results to Excel for additional analysis or grading.

Last Modified: icon icon Copy Link

Revision Date: 10/1/2016
Original Date: 03/1/2016

With so many threats to your online data, it has never been more important to have a thorough understanding of password security protocols. Towards this end, FDU IT strongly recommends that you familiarize yourself with the information outlined in our Password Policy. You will not only gain an understanding of your responsibilities as a member of our community, but you will also learn helpful tips for password selection and insight into our password construction rules and password change frequency.

I. Overview

1.1 Purpose of Policy

Passwords are an important part of Fairleigh Dickinson University’s [herein after referred to as FDU’s] efforts to protect its technology systems and information assets by ensuring that only approved individuals can access these systems and assets.

FDU recognizes that passwords have serious weaknesses as an access control. For some higher-risk systems, other approved authentication methods that provide higher levels of trust and accountability may be used.

Since most of FDU’s systems continue to rely on passwords alone, this policy is designed to address their weaknesses by establishing best practices for the composition, lifetime and general usage of passwords.

1.2 People Affected

All members of FDU’s student, faculty and staff population as well as all contractors and temporary staff who are approved to access the University’s network and systems.

1.3 People Responsible

The Chief Information Security Officer in consultation with the Data Security Incident Response Team shall be responsible for implementing, changing, enforcing and communicating this policy.

1.4 Structure of Policy

  • Policy schema
  • End users’ responsibilities
  • Help desk operators’ responsibilities
  • System developers’ and administrators’ responsibilities

1.5 Enforcement

This policy will be enforced by technical controls wherever feasible; otherwise, this policy will be enforced by line management.

All members of FDU’s faculty and staff have a responsibility to promptly report any known instances of noncompliance to the CISO.

1.6 Consequences of Noncompliance

Failure to comply with this policy can result in disciplinary action as set out in FDU’s Written Information Security Policy [herein after referred to as WISP].

1.7 Language

In the Responsibilities sections of this policy (3, 4 and 5), the keywords “must,” “must not,” “should,” “should not” and “may” are to be interpreted as follows:

  • “Must” and “must not” mean that compliance with the policy statement is mandatory.
  • “Should” and “should not” mean that compliance with the policy statement is strongly recommended. While these recommendations are not required if technical, operational or business issues make them infeasible, supporting rationale may be requested when audit or compliance review findings cite those responsible for noncompliance.
  • “May” means that compliance with the policy statement is recommended but optional.

II. Policy Schema

2.1 Password Confidentiality

A password can provide effective authentication if and only if it is known only to the individual user. End users will ensure the confidentiality of their passwords at all times. System developers and administrators will ensure that whenever technically possible, systems do not store passwords in clear text.

Administrative processes may necessitate temporary exceptions to this principle, but these will be kept to an absolute minimum.

2.2 Password Construction

Password length and complexity requirements provide resistance to common kinds of attacks. Because of technology constraints, password construction rules may vary from one system to another, but they will meet (or exceed) these requirements wherever possible.

FDU recognizes that long and complex passwords may be difficult for users to remember, and thus, this policy provides guidance to end users on how to construct a memorable password that meets (or exceeds) these requirements.

2.2.1 Password Construction Rules

A password will be made up of:

  • Eight (8) or more characters
  • At least one uppercase letter
  • At least one lowercase letter
  • At least one digit (0 through 9)
  • At least one special character ($, @, # and so on)

A password will not include a single instance of a dictionary word.

Note: The above rule is enforceable only on some systems.

A password will not include:

  • The user’s user ID or email address
  • The name of a group the user account belongs to

A password should not contain anything that is meaningful to the user, such as a name (either real or fictional), a date (such as family birthdays and anniversaries), telephone numbers, postal codes and car registration numbers.

Note: The above is not enforceable on any system.

Additionally, the University is utilizing modeling software that prohibits the use of passwords that are commonly used or appear on compromised lists. If a password meets the construction rules it may be rejected requiring the user to modify the password until it is accepted.

2.3 Password Change and Reuse

Users will be forced to change their passwords periodically in order to minimize the window of opportunity for an attacker who has discovered a user’s password.

A user’s new password will be completely different from any recently used password.

A user will be free to choose a new password at any time. However, performing multiple changes in quick succession to enable continued use of a recently used password will be prohibited.

2.3.1 Password Change and Reuse Rules

A user will change his or her password every 84-90 days depending on the system.

  • Datatel/Ellucian password life is set at 84 days
  • Alpha password life is set at 84 days
  • Windows Desktop/Office365/NetID password life is set at 90 days
  • Others not specifically identified shall be 90 days

Note: The above rule may not be enforceable on all systems.

A user’s password will be different from his or her previous (X) passwords as follows:

  • Datatel/Ellucian: 5
  • Alpha: 5
  • Windows Desktop/Office 365 and NetID: 10
  • Others not specifically identified shall be 10

Note: The above rule is only enforceable on some systems.

2.4 Password Entry

Whenever technically possible, the password field in a login panel will be configured to mask the password entered by a user to minimize the risk of opportunistic observation by another.

A system will allow multiple successive login attempts (“grace logins”). If the password is not correct on the last allowed attempt, the user’s account will be suspended, and the user will have to contact the University Technical Assistance Center (UTAC) and open a ticket to resume the account and, if necessary, reset the password.

2.4.1 Password Entry Rules

A system will allow between 5 and 10 failed login attempts as noted below:

  • Datale/Ellucian: 5
  • Alpha: 5
  • Windows Desktop/Office 365/NetID: 10
  • Others not specifically identified shall be 10

Note: This rule is enforceable on only some systems.

2.5 Password Storage

Whenever technically possible, a system will not hold passwords in clear text; it will use an approved irreversible cryptographic transform to protect its users’ passwords.

A system that stores users’ passwords for other systems, and brokers those passwords to those systems on behalf of the user, will use an approved (reversible) encryption algorithm.

III. End Users’ Responsibilities

If you are an end user of FDU’s systems, you have the following responsibilities regarding the password you use on any of FDU’s systems. (See 1.7 Language section for the meanings of the terms in bold type.)

These responsibilities apply even if the system does not enforce any specified rules:

a)  You must keep your password confidential at all times.

b)  You must not disclose your password to anyone, including FDU’s management and technical support staff, even if they demand it.

c)  If this happens, you must escalate to the CISO immediately. You should not use any password that you use on any FDU systems on any external system (including Internet banking and social networking services).

d)  You should not write down your password.

e)  You should not use the “remember password” feature in any Web browser.

f)  You must only use a “password keeper” or “password wallet” software or service that has been approved by policy or otherwise in writing by the CISO.

g)  You must choose a password that meets or exceeds the length and complexity requirements set out in 2.2.1 Password Construction Rules section.This is your responsibility even if these rules are not enforced by a particular system. Sometimes, technical restrictions on a system do not allow you to choose a password that meets these requirements. Such systems are enumerated in Schedule [X], along with the password construction rules that apply.

h)  You should choose a password that meets or exceeds the other requirements set out in 2.2.1 Password Construction Rules section.A help desk operator, system administrator or other user should never ask you to choose a password that doesn’t meet requirements (g) and (h). If this happens, you must escalate to the CISO immediately.Further, if any help desk operator asks you to change your password on a portal that does not use an HTTPS website with an SSL lock, you should escalate to the CISO immediately.

The following rules, (i) to (l), are enforced on most systems. If the rules are not enforced by the system, you are still expected to comply.

i)  You must change your password at least every 90 days.There is no need to access a rarely used system just to change an old password. Most systems will automatically expire the password after 90 days, and you will be prompted to change the password when you next log in.

j)  You should not use any of your previous six (5) passwords.

k)  You should choose a new password that has no more than four (4) characters in a row in common with your current password.For example, if your password is “anTelope1,” a new password of “anTelope2” is not acceptable, but “anTecede1” is.

l)  You should not change your password more than twice in any three (3) days.

Tips for Choosing a Good Password (Advisory)

The length and complexity requirements may appear to make it hard to choose a password that is easy to remember, but it can be pretty straightforward to do so.

A password that meets the minimum length requirement must be rather complex. You can readily construct such a password from the initial letters of a favorite quotation, song lyric, poem and so on, capitalizing some letters, and substituting a number or special character in an appropriate place.

For example:

  • Ww1dwysm — What would I do without your smart mouth?
  • Itwbtd2A — In the week before their departure to Arrakis.

A “very long” password can be relatively simpler. Choose three simple words, capitalizing some letters, and link them with a number or special character.

For example:

  • gorilla8banana@SanDiego

IV. Help Desk Operators’ Responsibilities

If you are an FDU IT technician or a system administrator providing support normally done by the help desk, you have the following responsibilities regarding users’ passwords on any of FDU’s systems that you support. (See 1.7 Language section for the meanings of the terms in bold type.)

a)  When a user asks you to reset his or her password, you must corroborate the user’s claimed identity in line with approved procedures in Appendix A.

b)  You must not disclose a user’s new password to anyone other than the user himself or herself.

c)  You must not write down a user’s new password.

d)  You must not send any new password to a user electronically.

e)  You must not ask any user to tell you his or her password.

V. System Developers’ and Administrators’ Responsibilities

If you are a system developer or system administrator, you have the following responsibilities regarding the passwords used on any of FDU’s systems that you own, develop or maintain. (See 1.7 Language section for the meanings of the terms in bold type.)

If compliance with (a), (c), (g), (h), (i), (j) or (k) is not technically feasible because of system constraints, contact the CISO to agree on and document the exception.

a)  You must configure each system to require that any user’s password meets the length and complexity requirements set out in 2.2.1 Password Construction Rules section.

b)  You should configure each system to require that any user’s password meets as many of the other requirements set out in 2.2.1 Password Construction Rules section as are technically feasible.

c)  You must configure each system to force a user to change his or her password every 90 days.

d)  You should configure each system to prohibit a user from using any of his or her previous five (5) passwords.

e)  You should configure each system to prohibit a user from choosing a new password that has more than four (4) characters in a row in common with his or her current password.

f)  You should configure each system to prohibit a user from changing his or her password more than twice in any three (3) days.

g)  You must configure the password field in a login panel to mask the password entered by a user to minimize the risk of opportunistic observation by another.

h)  You must configure each system to allow 5 successive login attempts (“grace logins”). If the password is not correct on the 5th attempt, the system must suspend the user’s account such that the user will have to contact an administrator to resume the account and, if necessary, reset the password.

i)  Passwords must be implemented in the strongest form the system supports and supports the intended business function. You should implement a cryptographic transform to protect the passwords of the users on each system

5.1 Requirements for Third-Party Systems

All mandatory requirements noted in this section (that is, those denoted by “must” or “must not”) constitute part of the minimum security specification for third-party system software that FDU acquires and implements. That is, it is essential that system software enables system developers and administrators to fulfill these responsibilities.

If a third-party system cannot meet the minimum security specification, contact the CISO to agree on and document the exception.

All optional requirements noted in this section (that is, those denoted by “should” or “should not”) constitute desirable features of third-party system software.


Last Modified: icon icon Copy Link

Sharing a Calendar and Delegating Administrative Rights

Resources for: Faculty Staff
icon Close

Calendar sharing is easier than ever with Office365. If you wish to share your calendar, follow the steps bellow.

  1. Log in to Office365 and go to your email.
  2. Once in Outlook look for the calendar shortcut on the bottom left
  1. Look for and click on the share button
  1. On the new pane that pops up type in the name of the person you would like to add and then select the person from the list
  1. After the person is added you can drop down the menu to the right of their name and select the amount of access they should have.
Last Modified: icon icon Copy Link

Fairleigh Dickinson University offers a variety of technological resources and services for students. This guide will help students navigate the different tools to access and manage their accounts or information.

ID and Email

  • Your FDU NetID

    Your FDU NetID verifies who you are and ensures the privacy of your personal information. Your FDU NetID and your NetID password will provide access to a variety of IT resources including your Self-Service, WebCampus, Office365, and Email. To get your NetID, review the guide on how to Claim or Create an FDU NetID Account.

  • Changing your FDU NetID Password

    To protect the University and our students from cyber attacks and other malicious activity, we require that everyone in our community to periodically change their password. To change your password, review the guide on How To Change Your FDU NetID Password.

  • Cisco DUO Multifactor Authentication

    To successfully use your NetID to access your accounts, you will need Two-Factor Authentication with Cisco DUO MFA

    Two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.

    Review the Duo – Student Quick Start Guide to set up your mobile device with Cisco DUO MFA, and look at the Cisco Duo FAQ’s to get more information about Cisco DUO MFA.

  • Email and Office 365

    Students can access their emails through any Web browser using their NetID and password to log in. To access our email, visit the Office Portal Login.

    Students can also access their FDU Email accounts on their mobile devices by installing the Outlook app. Read the guide below:

    Current students who are registered for classes for the current term, or a future term have access to Microsoft Office 365 Suite applications. For more information, click on the links below:

Academic Systems

  • Webcampus

    Webcampus is a course content management system. FDU’s Webcampus is also known as the Blackboard System. On-line courses are taught through this system which also allows for interaction between the student and faculty member as well as on-line class discussions.

    To learn more about how to access Webcampus, read the guide on How to log in to Webcampus.

     

  • Self-Service

    Self-Service is an interactive web application that enables students to view their individual information contained in FDU’s Student Information System. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes.

    To learn more about how to use Self-Service, review the Self-Service Tutorial.

Network

Security

Software

Printing and Labs

Frequent Asked Questions

Last Modified: icon icon Copy Link