The University of North Texas is committed to promoting development and assisting faculty and staff in pursuing higher education for themselves and their dependents. To see the full policy, look here.
The window server directories employees are supposed to acces are the following:
Yes! After you have completed the training, you will be sent an email containing a link with a certificate confirming your successful completion of the course 1 CPE credit.
The management at Barnes and Noble has instructed us that to get educational discounted prices, the UNT community members need to go to: here. This site is a partnership with Barnes and Noble and offers many of the same software at the same discounts as one used to be able to purchase off the shelves in the old Union bookstore. You will also notice that by clicking on their hardware tab that they have discounted hardware as well.
No. You can view each short video over as many sessions as required. You do not need to complete the training in one session because your progress will be saved when you exit the training site.
No. The FERPA training module included in the Securing the Human training is meant to enhance rather than replace, any existing FERPA training.
Employees should login to the EIS portal (my.unt.edu, my.untdallas.edu or my.untsystem.edu), go to the Human Resources tab and click on the link in the Information Security Training box.
Click Start, and then click Devices and Printers. On the top panel, click Add a printer. In the dialog box, select “Add A Network, Wireless, or Bluetooth Printer”. At the bottom of the dialog, select “The Printer That I Want Isn’t Listed”. Select the bullet “Find A Printer In The Directory, Based On Location or Feature”. This will bring up a list of all printers in Active Directory. To narrow down the search to strictly printers in ITSS, type CITC into the Name field and click Find Now.
On your Outlook client, click on File, Account Settings and Delegates Access. On the Delegates window click on Add, highlight the user, click on Add and OK. You will then be able to edit the delegate permissions for your mailbox.
Open Outlook. Click File and then click Account Settings button and select Account Settings from the drop down menu. Select the Data Files tab and click the Add button. Navigate to your .pst file and click OK. You should now see your archive listed in the mail panel on the left.To create a new archive folder, navigate where you want to save the .pst file and type in a new name in the File Name field and click OK.
Please go to https://ams.unt.edu and follow through the instructions after singing in. After changing your password, make sure to input the new password on your mobile device and other devices where you have your old password stored. As this may run a risk where your account can be locked out because of multiple authentication failures.
In some situations you might identify you need to create a separate document library that resides outside your OneDrive for Business folder.
Office 365 allows you to accomplish this task in just a few steps:
Click Start, and then click Run. In the open box, type cmd and then click OK. In the command prompt, type ipconfig /all. Your IP is located under “IP Address” and MAC is located under “Physical Address”
Click Start, and then click Computer. On top of the window, click Map Network Drive. Select a letter drive and type in the full path provided by your immediate manager in the Folder field. For example \\citcwin1.unt.ad.unt.edu
Any employee can create a standard configuration quote. It is best to involve your local IT staff in the generation of the quote since they can help you determine the appropriate standard configuration and accessories for your needs. This will also prepare them to configure and install the machine when it arrives. Please go to the ITSS Standard Configurations page and follow the instructions there: http://itss.untsystem.edu/divisions/mrs/policies/hardware
If you suspect a security violation has occurred, contact your IT Helpdesk right away. If confidential or sensitive data is associated with any computer involved in the incident, please call Information Security immediately at 940-369-7800 or contact us by email at firstname.lastname@example.org.
Refrain from accessing or further interacting with the computer in question. This will help preserve evidence integrity before the Information Security team can collect an image for forensic analysis.
Incident Reporting Steps:
UNT UIT Helpdesk 940-565-2324
HSC Helpdesk and Client Services 817-735-2192
UNT Dallas ITSS Helpdesk 972-780-3626
UNT System CTSS Helpdesk 940-565-4078
If you wish to report criminal activity, contact your campus Police Department.
UNT Police Department 940-565-3000
HSC Police Department 817-735-2210 (non-emergency number)
UNT Dallas Police Department 972-780-3009
More information is available at Incident Reporting.
This topic describes how to configure your desktop applications to work with Office 365.
To make a document or folder private, you can stop sharing it.
Select the people icon for the document or folder to open the Share dialog box.
In the Shared With dialog box, select Can view or Can edit next to the person you want to stop sharing with, and then select Stop sharing.
For more information on this topic here
You must have the OneDrive for Business sync app available here.
To turn Delve off click on your Office 365 Delve settings icon and select "Turn on or off" .
Click OK to confirm:
The videos linked below show you how to upload a file, upload several files at once, and how to quickly create new Office documents in your OneDrive for Business library.
All employees should complete this training by December 31.
The length of all of the required videos in the training is less than 30 minutes. All videos have a one-question assessment at the completion. There is also one page of information to read after the “You Are the Shield” segment.
Contact your local help desk or IT support team.
While you are in Remote Desktop, you will need to use the following keystroke command CTRL+ALT+INSERT
Before you can click the tick-box, you must navigate to the URL. Once you return to the training, you will be able to click on the acceptance statement.
UNT System did not purchase any addition language training packages, therefore, the training is only available in English for employees of the UNT System institutions.
UNT System does not restrict employees from using mobile devices unless confidential information is involved. Confidential information may not be stored on mobile computing devices, i.e., laptops, tablets, smart phones, etc., unless the device is encrypted. Cloud storage services are available through One Drive for Business. Employees may use OneDrive for Business to store files for a UNT System institution business purposes only. For more information about encryption and other topics on information security, please see the UNT System Information Security Handbook section 12.4 for information about encryption.
The chart below identifies the overall process of governance between institutional decision-making and IT Shared Services decision-making. It is important to understand that campuses will continue to make technology decisions for their own needs unless the project rises to the level of potentially being a shared service. The answer to the question "should/could this be used by another institution?" determines whether or not a decision needs to rise to the Shared Services Governance Process. In that instance, the campus process will shift to the appropriate PMC to make a shared/not shared decision. Should the PMC decide the project should be shared service then the IT Shared Services Governance Process will be used for decision making relative to it. If the PMC decides that the project is not a shared service then the project will immediately be returned to the originating campus to address as that campus sees fit.
All workstations should use antivirus software for protection against malware. ITSS Information Security provides McAfee Antivirus software that can be downloaded at AntiVirus Download with a valid EUID and password. The antivirus software should be configured for regular updates and automatic scans to remain effective. In addition, you can reduce your risk of compromise by following these practices:
You can learn more about information security by visiting the Information Security website here.
Any classification of data can be stored in OneDrive for Business, however it is not the appropriate storage location for institutional records.
Data classification/categorization information can be found in the Information Security Handbook, under section 7.3.
In general, storage of information must adhere to institutional policies and standards for protecting information, including physical security. The protection of information must be commensurate with the value of the information (e.g., category I requires the highest level of security, therefore no unauthorized sharing, access, or use of the information is allowed).
In regard to the exchange of information:
In regard to mobile devices:
In regard to backups:
In regard to who can store information, it is up to the information owner to make that decision, as they approve access to their information. Users must adhere to institutional policies and standards for protecting information when accessing resources and information remotely.
In summary, regardless of the technology used to store information, institutional policies and standards must be followed to ensure its protection.
Campus Technology Support Services, It Service Management, Communication and Collaboration Services, Enterprise Systems Infrastructure Services.
We intend to review processes to ensure that we are taking maximum advantage of current PeopleSoft capabilities. Our current system is basically using the functionality available 10 years ago when the original implementation occurred. The goal of process reviews is to minimize customizations which drive up the cost of the upgrade and ongoing support.
Oracle requires us to physically split the Human Capital database from the Campus Solutions database. Currently, this data is in one physical database. In addition to the split, we will be upgrading both Human Capital and Financial systems. In addition, we will implement three new modules in the Human Capital system:
We will be implementing one new module in the Financial system:
Finally, as part of the upgrade project, our portals will be redesigned for “look and feel” to improve the user experience.
Delve helps you discover the information that's likely to be most interesting to you right now - across Office 365.
The more you and your colleagues work together, by viewing, editing and sharing each other's documents, the more useful Delve will be for all of you.
Delve learns from how you and your colleagues work, and tailors the information to each of you. What you see in your views in Delve is different from what your colleagues see in theirs.
Delve never changes any permissions, so you'll only see documents that you already have access to. Other people will not see your private documents, for example documents that you've stored in private folders in OneDrive for Business.
You don't have to remember the title of a document or where it's stored. Delve shows you documents no matter where they are stored in OneDrive for Business or in Sites in Office 365.
You can find more on Delve here.
Total contracted project cost is $5,011,347.
It is the quickest and easiest way to share a file with everyone in the organization and allow edits unless you change the default permission setting.
It is important to note that the "Shared with everyone folder is not a common repository. It is your personal folder you share with everyone in the organization.
In Delve you'll find Word, PowerPoint, Excel, and PDF documents - that are stored in OneDrive for Business, in Sites in Office 365, or that have been shared with you as attachments in emails. You may also find videos* that have been uploaded to Office 365 Video.
You'll only see documents that you already have access to. You will not see documents that are stored in private folders unless they're shared with you.
Documents and videos are shown as content cards surfaced on different views. To learn more about the content cards, see How to use the content cards in Delve and What kind of information will I find in Office Delve.
Information Security offers online security awareness training for faculty and staff of all UNT System components. The security awareness course covers the basics of information security, as well as current trends, best practices, and important policies regarding computing usage throughout the UNT System. Full-time faculty and staff will be assigned training through the SANS Institute Securing the Human online video tutorials. After access has been granted, full-time employees can login with their UNT System credentials at here. For more information about the training, see Security Frequently Asked Questions page. Part-time employees, including student employees, can continue to access training here. Please note that accessing this training through Firefox or Chrome will require using the domain\username when logging in.
If you clicked on a link or responded to an email that you suspect may have been a phishing attempt, you should immediately change your password and contact your IT support staff. The senders of the fake email may be attempting to collect valid credentials for access to UNT institution services, or may have installed malware on your computer. Report the incident to your supervisor and IT support staff, so any additional containment or handling can be coordinated.More information is available at https://itss.untsystem.edu/security/phishing
A functional upgrade. That means we will review business processes to take advantage, to the greatest extent possible, of functionality in PeopleSoft version 9.2. This type of upgrade has not been done since the implementation of PeopleSoft 10 years ago. It will involve users deeply in the upgrade. All previous upgrades have been “technical” in nature – basically upgrading the engine but minimizing any impact on existing business processes. Specifically, a functional upgrade means we will be doing:
End-user data should be stored in OneDrive for Business. Official university records should not be stored on OneDrive for Business.
The project starts June 2013. It is planned to end in September 2015. The basic upgrade, however, will be completed by July 2015.
After an exhaustive review of all potential alternatives, the consensus decision was to move forward with a PeopleSoft functional upgrade. The decision process involved:
Campuses are funding the upgrade based on the IT Shared Services Cost Allocation formulas. Project funding actually occurs over 4 fiscal years – a small amount in FY2013, the largest amount in FY2014, a smaller amount in FY2015 and some in FY2016.
All employees of UNT, UNT Dallas, and UNT System who were hired before July 1, 2016 are required to complete this round of Security Awareness Training.
Through an RFP process, we have selected Ciber Inc. to provide the skills needed to upgrade our PeopleSoft systems. Also, they are providing professional project management for the project. Internally, we will have our own project coordinator working closely with the Ciber Project Manager. ITSS EIS staff will be assigned to the project and will perform technical aspects of the upgrade.
Keeping our confidential data secure requires the effort of technology, processes and people. In this training, you will learn why you are an important part of information security and what you can do to protect data. In addition, many regulations and standards require security awareness training for every employee.
Because Oracle will drop support of our current Financials and Human Capital software version in July 2015. Support includes many updates necessary to carry on business effectively. We must upgrade from our version 9.0 to version 9.2 to retain support. Campus Solutions will remain at version 9.0.