IT Handbook UC Information Technologies (UCIT)

61
73 IT Handbook UC Information Technologies (UCIT) UCIT is pleased to offer you diverse, cutting edge technology services. From wireless to mobile app development and informatin security to Blackboard, we are here to provide the technology you need. We have staff dedicated to helping you with whatever technology questions or issues you may have. We also work with vendors to offer you significant discounts on all the software and hardware you need. Services at a Glance ..................................... 74 Security Basics ............................................... 76 Blackboard ...................................................... 81 Getting Online ............................................... 84 Safeconnect ............................................. 84 Wireless................................................... 109

Transcript of IT Handbook UC Information Technologies (UCIT)

73

IT HandbookUC Information Technologies (UCIT)

UCIT is pleased to offer you diverse, cutting edge technology services.

From wireless to mobile app development and informatin security to Blackboard, we are here to provide the technology you need. We have

staff dedicated to helping you with whatever technology questions or issues you may have. We also work with vendors to offer you significant discounts on all the software and hardware you need.

Services at a Glance .....................................74

Security Basics ...............................................76

Blackboard ......................................................81

Getting Online ...............................................84

Safeconnect .............................................84

Wireless................................................... 109

74

Services at a GlanceHelp Desk/ResNet: When you have a question or need support, the UCIT Help Desk is a quick phone call away! Just dial 556-HELP. Our Help Desk Technicians will get you the answer you need, or point you in the right direction. Having an issue with your device? Stop by ResNet, located on MainStreet, and let one of our technicians troubleshoot it for free!Visit uc.edu/ucit/helpdesk for more information.

UC Mobile App: No Bearcat should be without the UC Mobile App – your mobile connection to campus maps, shuttle tracker, Blackboard, athletics and more! You can download the UC Mobile App for your Android (on.uc.edu/WLPsm8) or Apple (on.uc.edu/VtqRTV ) device. Have a passion for development or an idea for the next big app? Stop by the UC App Lab on MainStreet to learn how you can collaborate with UC students, faculty and developers to gain experience in the exciting world of mobile app development.

Blackboard: Blackboard is how you’ll end up communicating with most of your professors on the Internet. Blackboard hosts your class syllabus, podcasts, links, videos and grades posted by your professor. It is also a great way to connect with news and events at UC! To log on, use your UC-issued username and password at blackboard.uc.edu

Email: That username and password you used on Blackboard also logs you onto your UC email account. Microsoft Office 365 is your official school email. Make sure you check it often, so you don’t miss out on anything important. But it is a lot more than just that! Students can access calendars, web conferencing and Sky Drive Pro – your personal web storage cloud! Just go to mail.uc.edu and use your log on credentials. Learn more at uc.edu/ucit/email/office365.

Secure Wireless: UC’s campus is 100% wireless. That means you can access our secured wireless network from every building and select green spaces on campus. Whether you have a smart phone, tablet or laptop, you never have to worry about staying connected to what matters to you! You can even print from your dorm room with wireless printing in residence halls!To learn how to connect to our secured wireless network, contact the Help Desk or stop by ResNet on MainStreet.

Computer Labs and File Storage: If you don’t have a computer, don’t worry! We do! We’ve got over 400 computers or kiosks all over campus. And when it’s late, you can head over to UCIT@Langsam — our 24 hour computer lab on the fifth floor of Langsam Library. You’ll find 100 computers, quiet study areas and breakout rooms with SMART Boards. You’ve got access on your time, anytime! And with UC File Space, you even have a place to store your files, host your website or update your blog!

Need help with technology? Our Help Desk is here for you!

513-556-HELP(4357)[email protected]

Or visit ResNet, our student walk-in help desk, on MainStreet across from Tangeman University Center (TUC)

GENERAL POLICY ON THE USE OF INFORMATION TECHNOLOGY

www.uc.edu/ucit/policies.html

As an institution of higher learning, the university both uses information technology and supplies it to the members of the university community. This policy sets forth the general rights and responsibilities common to all uses of information technology.

75

GoCharge Charging Stations: A long day on campus doesn’t have to mean the death of your phone or tablet’s battery! GoCharge, UC’s free mobile device charging stations, allow you to securely lock your device and leave it so it can charge while you’re away. Check out our GoCharge stations located at the Tangeman University Center’s food court and UCIT@Langsam, the 24-hour computer lab in Langsam Library.

Information Security: UCIT’s Office of Information Security is here to help the UC community maintain a secure computing environment. But safety is everyone’s responsibility! Visit our website, uc.edu/infosec,orconnectwithInformationSecurity@UC_OISonTwitterfortipsonhowtokeepyourcomputer and information safe – like learning how to protect your personal information from being stolen with an email phishing scam.

Free and Discounted Software: Did you know that students can download McAfee anti-virus software for free? As a matter of fact, students can take advantage of more than 15 free or discounted software programs, like Microsoft Office Suite! Before you make a software purchase, be sure to check out all the discounts available by visiting uc.edu/ucit/ware/software.

Lynda.com: Lynda.com is an online video-training library with more than 1,400 software, career-development, and technology training titles that is FREE to access anywhere using your UC username and password. Lynda’s video courses are taught by industry experts, teachers and professionals AND allow you to earn certificates of completion! Learn more or check out an online training video at uc.edu/ucit/learningtechnologies/lynda.

Order services: Student GetIT is the system you use to order IT items and services.

Password Reset: Password Self-Service allows you to reset your password to any connected application without having to call Help Desk. You simply answer a few questions and, if you later forget your password, you can reset your password instantly using PSS. You will be prompted with your questions and then allowed to reset your password yourself!

Printing: Each student recieves 150 free black and white prints per semester free of charge. After that, copies are 7 cents per page. Large page sizes and color printing are available in some locations.

VPN: VPN stands for Virtual Private Network. It’s how to access UC systems when you aren’t on campus. Most of the time, you won’t need it because only restricted information and systems access requires VPN. But sometimes, you may need to access something from the library website that is only available to staff, students or faculty, and you’ll need to log into the VPN.

UCIT @ LangsamComputer Lab located on West Campus • 540 Langsam Library • 513-556-0168

Open 24 hours a day, 7 days a week!

Equipped with macs, PCs & a sweet suite of software.

Plus, quiet study rooms with smart boards.

More information about all our labs at labs.uc.edu/.

uc.edu/ucit/students

76

Security Basics and Virus Informationhttp://www.uc.edu/infosec/, 513-558-ISEC (4732) Information Security UCIT’s Office of Information Security offers a wide variety of services. These include: • Links to FREE anti-virus/anti-spyware software. • Education and awareness training • Tips and How-To pages on fighting spam & identity theft, protecting your laptop and more! • These offerings and many more can be found at http://www.uc.edu/infosec. • If you suspect that you have been a victim of a computer crime or abuse while at UC, please report the incident to [email protected]. Give as much detail as possible: Who, What, When and Where.

Password Security •Neverdiscloseyourpasswordtoothers,eitherinperson,byphone,orbye-mail.•Neverleaveyourpasswordatthedefault.Changeitimmediately.•Makeyourpasswordeightormorecharacterswherepossible.•Donotreusepasswords.Thatwayifyourpasswordiscompromisedatonesiteitwon’tallowanyoneaccess to all sites•Makeyourpasswordfromaphrase(i.e.,usethefirstletterofeverywordfromasimplequote).•Useacombinationofupperandlowercaseletters,numbers,andspecialcharacterslike@!&*[].•Neveruseallnumbersorallletters.•Neverusepersonalinformationthatsomeonecouldeasilyguessordiscover:yourpetorhometown,etc.•Neveruseanywordfoundinadictionaryorthenameofasportsteam.•Ifyoumustwritedownyourpassword,keepitinalockedlocation.•Changeyourpasswordfrequently,atleastevery90days.•UCstaffwillneveraskforyourpasswordviae-mailortelephone.•Seehttp://www.uc.edu/infosec/password/choosepassword.htmlformoreideas!

Never disclose your password to others, either in person, by phone, or by e-mail. UC staff will never ask you for your password via e-mail or telephone. If you must write down your password, keep it in a locked location.

Never leave your password at the default. Change it immediately.

Never make your password less that eight characters if possible.

Never use all numbers or all letters. Use a combination of upper and lower case letters, numbers,andspecialcharacterslike@!&*[].

Never use personal information that someone could easily guess or discover: your pet, hometown, sports team or really any word found in a dictionary. Make your password from a phrase (i.e., use the first letter of every word from a simple quote).

Never keep the same pasword for longer than 90 days.

The NEVERS of password security

Never leave your desktop computer unlocked when you walk away, and turn it off at the end of the day.

Never download or install a screensaver; use what is preinstalled.

Never install software received from another user.

Never download copyrighted materials such as music or movies illegally.

Never leave your laptop unattended, even in the cab of your car. Protect it like your purse or wallet.Put location finding software (such as lo-jac) on your laptop.

Never check your laptop while flying.

Never leave sensitive information vulnerable. Password protect or encrypt any sensitive information on laptop. Use security cables.

The NEVERS of computer security

www.uc.edu/nfosec

77

Desktop Security •Whenyouneedtowalkawayfromyourcomputer,eitherlogoffORlock your workstation by pressing Windows Key+L or set an automatic screensaver then require a password to wake up.•Whenfinishedusingcomputer,logoff.Thisisespeciallytrueoflabcomputers! •Installthelatestupdatesforanysecuritypatches.•Donotinstallsoftware—commercial,shareware,orfreeware—borrowed or purchased from another user. •Useofpeer-to-peerapplicationstosharecopyrightedmaterials,suchas music or movies, is a direct violation of copyright laws. Do not do it!

Laptop Security •YourlaptopisagoldmineforIdentifyThieves.Protectitlikeyouwouldyourpurseorwallet.•Usealaptopsecuritycabletosecureittoadeskwheninanopenworkspace.•Alwayskeepabackupofyourwork,whethertoanexternalharddriveorasecurecloudservice.•Passwordprotectorencryptanysensitiveinformationstoredonthelaptop.•Whenyouareaway,lockitinadrawer,overheadbin,cabinetortakeitwithyou.•Neverleaveyourlaptopunattendedinapublicplace,evenfor“justaminute”.•Nevercheckyourlaptopasluggagewhenyoutravel.•Neverleaveyourlaptopinacarinplainviewontheseatorthefloor.•Neverleaveyourlaptopinacarovernight.•Encryptyourharddriveifitispossibletodoso. Spyware Spyware is used by the advertising industry and by crackers. Spyware and Adware are software that when installed on your computer, may send you pop-up ads, redirect your browser to certain web sites, or monitor web sites you visit. Extremely invasive versions of spyware may track exactly what keys you type to steal username and password information. •FightSpywareandothermalicioussoftwarebyinstallingananti-spyware/anti-viruspackage.•McAfeeanti-virus/anti-spywareisavailableforFREEtoUCstudents!http://www.uc.edu/infosec/>FreeAntivirus (in the top navigation bar). •Othertipstofightmalicioussoftware:donotclickonlinkswithpop-upwindows,chose“no”whenyouareasked unexpected questions; be wary of free, downloadable software, and never follow e-mail links. •Ifyoubelieveyouhavespywareonyoursystem,pleasecontacttheUCITIntegratedHelpDeskat513-556-HELP (4357) for assistance in having it removed.

Viruses, Worms and Trojans, Malware Viruses are computer programs designed to cause trouble to your computer. Worms are programs that replicate themselves and look for holes in networks or send themselves via e-mail to infect as many other computers as they can. Trojans are programs that carry hidden, malicious programs. •Fightmalicioussoftwarebyinstallingananti-spyware/anti-viruspackage.•McAfeeanti-virus/anti-spywareisavailableforFREEtoUCstudents!http://www.uc.edu/infosec/>FreeAntivirus (in the top navigation bar). •Donotopene-mailfilesfromanyoneyoudonotknow.•Donotopene-mailattachmentscontainingexecutablesormoviefiles.•Somefileextensionstoavoidinclude:.EXE.COM.CMD.PIF.SCR.VBS.WMF.ASF.PDF.DOCX E-mails and Spam •Alwayspasswordprotectyoure-mailaccount.•Donotuseyourpersonale-mailaccounttosendorreceivesensitiveinformation(creditcardnumbers,bank account info, SSNs, etc.). •Donotsendorforwarde-mailmessagessuchaschainletters,jokes,andmessagescontaininglewd,harassing, or offensive information. •Visithttp://www.uc.edu/infosec/info/fightspam.htmltolearnhowtosetuprulesandfilterstohelpmanageSpam. •Bewaryofunsolicitedattachments,evenfrompeopleyouknow.Virusestravelincognitousinglegitimatee-mail addresses to trick their way into users’ machines. •Donotclickalinkinane-mail.Evenifthelinksaysonethingitmaysendyousomewhereelse.

Be careful with QR codes!

Some QR codes are dirty, meaning they can

download viruses to your device. Only scan codes

from trusted sources!

78

[email protected].•[email protected]. A thorough review of “How To Fight Spam” will help to understand the world of spam and how you can help control it: http://www.uc.edu/infosec/info/fightspam.html

Social Engineering and Phishing Attacks Social engineering is used by criminals to gain unauthorized access to a computer or secure building. This is a non-technical intrusion that relies on people’s complacency regarding the value of the information they possess and their responsibility to protect it. Social engineers’ ploys often involve tricking people into breaking normal security procedures. Examples of social engineering behavior include the following: •SomeonecallingonthephoneaskingforinformationsuchasauserIDandpassword.•Someone“dumpsterdiving”tofindmemos,systemmanuals,andprintoutsofsensitiveinformation.•Someonepretendingtobeanoutsideconsultantortemporaryworker.•Someone“piggy-backing”entrancetoabuildingbyfollowinginanauthorizedperson,thusavoidingpresenting ID. If you permit someone access, make sure you know who he or she is. •Someonecreatingapersonathatmakeshimorherappeartobeapersoninauthority,sopeopleaskthehacker questions, rather than vice-versa. This is “reverse social engineering.” •Phishingusese-mailorwebsitestosolicitpersonal(oftenfinancial)information.Attackerssende-mail,seemingly from a reputable credit card company or bank that requests account information. Often, the message suggests that there is a problem that needs their attention. •Learnmoreaboutphishingbywatchingthisvideo:http://www.uc.edu/infosec/info/videos.html

Phone / PDA / Mobile Device Security Tips •Setapassword,lockpattern,orPINonyourphonetopreventunauthorizeduseandmakeitmoredifficultto hack if stolen or lost.•IfyourphonehasBluetoothfunctions,disablethemuntilthey’reneeded,andthensetvisibilitysettingsto“hidden” so that your device cannot be scanned by other Bluetooth devices. •Limittheamountofsensitiveorpersonalinformationsuchaspasswordsandaccountinformationstoredon your mobile device. •Considerpurchasinganti-virussoftwareforyourphoneandmakesureitisfrequentlyupdated.•Onlydownloadappsfromtrustedsources.•Donotjailbreakyourmobiledeviceasthiscanopenupsecurityholes•Treatmobiledevicesasyouwouldyourwallet,keys,orlaptop;don’tleavetheminplainsightandkeepthem close to you at all times. USB Drives / Thumb Drives / Jump Drives and other Mass Storage Devices These drives are a very convenient and commonly used method to hold personal files and school work. Unfortunately, the small physical size of these devices makes them easy to lose or to steal. •Ifyouuseamassstoragedevicetostoreanyimportantorsensitivedata—classwork,researchdata,clinicalinformation, personal files, etc.—make sure that the data is protected by encrypting the device.•Manymodernmassstoragedevicescomewithasecurityutilitythatcanencryptsensitivefiles.•Ifyoudonothaveencryptiononyourmassstoragedevice,don’tkeepsensitiveinformationonit.

Social Media SafetyWhat is social media? Social media refers to the means of interactions among people in which they create, share, and exchange information and ideas in virtual communities and networks. What are some examples of social media web sites? Several social media sites have become extremely popular in the last few years for internet users of all ages. Some examples include: Facebook, Twitter, LinkdIn, Instagram, and Tumblr. What are some advantages of using social media web sites? •EasyInformationExchangeFacebookandsimilarsitesallowuserstogainaccesstopersonalinformationvery quickly, including home and cell phone numbers, addresses, photos, videos, and events.

79

•AbilitytoShareInformationUsersofsocialmediawebsitescanstayincontactwithhundredsof people they have met (or not) and communicate with them by posting interesting things about themselves such as: Statuses, Images, Videos, Events, Locations, and so forth. What are some disadvantages of using social media web sites? •EasyAccessIfprivacysettingsarenotsetpotentialthieves,stalkers,orharasserscanpotentiallyfind personal information through social media web sites very quickly, easily, and anonymously. Overly available personal information can also lead to issues when potential employers try to research you. By posting too much inappropriate information on social media sites, you put yourself to risk of not being hired, or possibly incriminating yourself. •TooMuchInformationVastamountsofinformationcomingfromalargenumberofsourcesisconstantly fed through social media sites to their users. Often this information can be biased, incorrect, or altered. This leads to many misinformed consumers.•ToolforProcrastinatingorWastingTimeSurfingsocialmediawebsitescaneasilytakeuphours of time that could have been used for tasks such as studying, working, or anything else that may be productive. Your Personal Settings/What You Post The following questions are designed to help you make smart choices about your privacy settings, as well as what you decide to post on your site: •WouldIwantsomeoneIdon’tknowtoshowupunannouncedatmyclass,residencehall,orworkplace?•AmIcomfortablegettingphonecalls,e-mails,orotherformsofattentionfromstrangers?•AmIpostinginformationaboutmyselformywhereaboutsthatwouldleavemevulnerabletocrime?•WouldIbecomfortableifapotentialorcurrentemployer,parent,orclosefriendreadwhatIposted?•Whatwouldmyprofilesayaboutmetofutureroommatesorneighbors?Wouldtheyformnegativepreconceptions about me? •AmIpostinginformationorphotosportrayingmeengaginginillegalactivitiesthatareagainstthelaworStudent Code of Conduct? •Onlinephotoscanbeeasilycopied,downloaded,ormanipulated.AmIpostingphotosthatwouldembarrass or incriminate me if they were shown in other venues? Am I willing to take the risk that someone may use my photo in a way in which I would not approve? Manage Your PrivacyHaving secure privacy settings on your social media site accounts is extremely important. All major social media sites have settings that allow the user to choose who can see what on their profile. Consider how you should implement the following options:

•Makeyourcontactinformationprivate(Address,PhonesNumbers,E-mailAddresses).•Limitwhocansearchyourprofileinsearchengines.•Managewhocanviewthephotosyoupost.•Managewhocanviewyourpostedstatuses.•Donotpostlocationsandortimesasthisopensupmanyopportunitiesforcrimesagainstyou.

What Others Post Facebook and similar web sites do not have mechanisms in place to verify information posted in individual profiles. What you see is not always true information. Consider these questions before divulging additional information about yourself or deciding if you want to meet an online acquaintance in person:

•IstheinformationIamreadingfromareliable,verifiablesource?•AmIconsideringmeetingsomeoneforthefirsttimeinapublicsettingwithawaytogetmyselfoutofasituation if it is unsafe? •WouldIbeaiding/abettingacrimeorpolicyviolationifIfollowinstructionsfoundonsomeone’sprofile?•Whatarethepossibleadvantagesofgettingtoknowthispersonbetter?ArethererisksthatIcanreduceoreliminate before we proceed in deepening our involvement with each other?

If you suspect that you have been a victim of a computer crime or abuse while at UC, please report the incident to [email protected]. Give as much detail as possible: who, what, when and where.

80

Who Can Help? You can get help from one of these offices or departments if you become a victim through affiliation with a social web site.

Counseling Center.................................................... Office of Student Life............................................... Resident Education and Development.............. UC 24-Hour Sexual Violence Crisis Line............. UC Ombuds Office..................................................... UC Police Department............................................. UC Women’s Center................................................... UCit Information Security........................................ University Judicial Affairs........................................

Peer-To-Peer (P2P) File SharingUnauthorized peer-to-peer (P2P) file sharing on college and university campuses is receiving increasing attention from the entertainment industry, the media, and the United States Congress. Although P2P file sharing on university networks is not unlawful, such activity could be harmful especially as it can lead to a violation of the federal copyright law. Indeed, many students using popular software such as Limewire, Frostwire, uTorrent, and Gnutella, intentionally or advertently infringe on copyrighted works relating to music, movies, computer software, video games, and photographs. Lawsuit filings indicate copyright owners are taking the offensive against infringements on their protected works. Students need to know their rights and responsibilities, and their potential liability for unlawful P2P activities.

The basis for copyright law is found in Article 1 of the United States Constitution and codified in Title 17 (the “Copyright Act”) of the United States Code. The Copyright Act lists exclusive rights of copyright holders, including reproduction and distribution of the copyrighted work, both of which are implicated in P2P file sharing. There are three types of infringement: direct, contributory, and vicarious. Under direct infringement, a person is liable for his or her own infringing conduct; under contributory infringement, a person may be liable if he or she knows of the infringing activity, and induces, causes, or materially contributes to the infringing conduct of another; under vicarious infringement, a person may be liable if he or she has the right and ability to supervise the infringing activity and also has a direct financial interest in the activity. Most users of P2P networks fall under the direct infringement category. However, even without directly infringing conduct, students who operate or encourage the use of such networks may be open to contributory or vicarious claims.

Downloading, possessing or distributing copyrighted material without the owners’ permission is also a violation of the University’s General Policy on the Use of Information Technology (http://www.uc.edu/ucit/). The University of Cincinnati does not actively monitor illicit or inappropriate activities, nor is it under any obligation to defend or accept responsibility for its students’ illegal actions in the P2P context.

The University of Cincinnati expects our user community to act in a proper and responsible computing manner. If illegal or inappropriate activities are brought to our attention, the University will take all reasonable and appropriate actions. Copyright violations will generate a report to the office of Student Life-University Judicial Affairs as part of the University’s disciplinary action process. This can result in a variety of actions including removal of computer privileges and probation. Additionally, the copyright holder of the material found on your system may take legal action against violators.

What can you do to be part of the solution? Avoid downloading, distributing, or possessing copyrighted material over the Internet and the UC internal network unless you have received explicit permission from the owner, their official representative, or have paid an access or license fee to obtain the material. If you are using a peer-to-peer application you should consider removing it from your system prior to connecting to the University’s network. If you do not remove the application, you should ensure your system is set to prevent the application from acting as a provider of unlicensed materials to other users. Failure to restrict the application, whether you are aware of the violation or not, will result in the University’s Information Technology department (UCIT) removing your machine from the network until the copyright violation is rectified.

513-556-0648513-556-5250513-556-6476513-218-9531513-556-5956513-556-1111 or 911 (Emergencies)513-556-4401513-558-4732513-556-6814

81

Blackboard Learning Systemhttp://blackboard.uc.edu/

Blackboard offers you easy access to course materials, University resources, and personal tools from any computer connected to the Internet. Listed below is some introductory information that can help you successfully use the Blackboard Learning System at UC. Please note that all users must adhere to UC’s General Policy on the use of Information Technology located at http://www.uc.edu/ucit/policies/infotechuse.html .

For detailed instructions on how to use the application, click on the “Help” tab in your Blackboard account or go directly to the documentation page at: http://blackboard.uc.edu/help. If you still have questions about Blackboard or your account, or if you need technical assistance, please call or e-mail the Blackboard Support Team at: 513-556-1602, [email protected].

Password or Login Problems? If you have forgotten your password, click on the “Password Reset Tool” link in the middle of the login box. Fill in your username and click on the “Submit” button. You will be taken to the Password Self-Service website. When using the “Forgot Password?” on this website, you will need to answer your security questions before you are allowed to change your password. If you have not established your security questions or you cannot remember your answers, you will need to contact the UCit Help Desk at 513-556-4357 for assistance with having your password reset.

Using Blackboard Once you log into your Blackboard account, you will see the “My UC” page in your browser window. You can always return to this page by clicking the “My UC” tab at the top of your screen. This screen lists all of the courses you are taking, announcements posted by the University or your instructors, and other information in boxes called “modules” that can be changed or customized by each user. To enter your courses, simply click on the name of the course you wish to enter in the “My Courses” box. From there, navigate through the course by clicking the buttons or text labels on the left side of the screen.

Customizing Your Account Blackboard allows you to customize the way your “My UC” page appears by changing the color scheme and which “modules” (or boxes) display when you first log in. To customize the look of the modules, click the “Add Module” or “Personalize Page” buttons in the upper corners of the My UC page. You can change features of an individual module by clicking on the “wheel” icon in the upper right corner of the module title bar. You can also edit your user profile by clicking the Personal Information link in the Tools section of the “My UC” page on the left side of the screen. From here you can:

• Edit Personal Information – change your name, e-mail address, and other information that appears in your user profile.

• Turn the Visual Text Box editor on and off under the “Change Personal Settings” link. • Set Privacy Options - specify what personal profile information appears in the User Directory. (By

default, settings exclude the user profile from the User Directory.)

Courses Don’t Appear on Blackboard? Your courses should appear in the “My Courses” module on your main My UC page when you first log in. If none of your courses appear, or if some courses are missing, then you are not yet registered for the course. It takes at least 24 to 48 hours after registering for a course before it will appear in your Blackboard account. If the course is listed as “unavailable”, then you will need to contact your instructor directly and ask that they make the course available.

E-mail Not Received Through Blackboard? This problem could happen for several reasons: 1. Your “Personal Information” may have an incorrect e-mail address in Blackboard. 2. You may be over your quota for the e-mail address that you have chosen to use in Blackboard. 3. Your e-mail provider may have anti-spam filters in place that would affect the delivery of mail.

82

If you have an invalid e-mail address in your “Personal Information” within Blackboard, any e-mail that is sent to you through Blackboard will be returned to the sender with an undeliverable message.

To Verify Your E-mail Information Within Blackboard: 1. Click the Personal Information link in the Blackboard Tools section of the “My UC” page on the left side of the screen. 2. Click on Edit Personal Information. 3. Scroll down to the field labeled “e-mail” and enter your e-mail address.

All e-mail providers have a limit (quota) on the amount of mail that you can store on their system at one time. If you reach or exceed this limit, they will no longer accept mail for your account and they will return an undeliverable message to the sender. It is important that you monitor your quota to ensure that your mail will be delivered.

To see the current size of your UConnect mailbox and its quota, navigate to your inbox and place the cursor over your name at the top of the folder list. If you are using a commercial e-mail provider, please contact their technical support for more information about their storage limits.

Filters intended to block unwanted e-mail may mistake e-mail messages sent through Blackboard as “spam.” If you are using an e-mail system other than UConnect, be sure to add @uc.edu to your e-mail system’s “whitelist” or “safe list” and check your “Junk” or “Spam” folder regularly.

Assignments - How to Send to an Instructor Students complete the assignment in a separate file and send it back to the instructor through their Blackboard course menu. To send an assignment to your instructor: 1. Click on the link for the assignment file within your course. 2. Enter any comments for the instructor in the Comments box under Assignment Materials. 3. Click “Browse My Computer” and locate the file to attach. 4. Double-click the file to attach it to your assignment. You can add more files by repeating this process.5. Click “Save as Draft” to submit your assignment later, or 6. Click “Submit” to send your assignment immediately.NOTE: Once an assignment is submitted to your instructor, it is no longer available for editing.

Discussion Board - How to Use The Discussion Board allows students and instructors to post messages and participate in online discussions. To post a message: 1. Click the “Tools” course menu link and then, in the next screen, choose the “Discussion Board” link. 2. Click on the forum title (link) where you want to post a message. 3. Click the “Create Thread” button in the upper left-hand side of the screen. 4. Enter a subject for your post and then type your message in the text box. If you want to attach a file or post a paper with your message, click the “Browse My Computer” link under the Attachments section and select the file you wish to attach. (Please note that your instructor must allow this setting.) 5. Click the “Save Draft” button at the bottom of the screen to save the changes to Blackboard, or 6. Click “Submit” to post your message to the board immediately.

Student Organization on Blackboard - How to Request Requests for student organizations on Blackboard must be submitted to Student Activities and Leadership Development. Approval for a student organization on Blackboard is based on the same criteria required for approval of any official university student group. It must be registered in that office to receive the full rights and privileges of a campus based club or organization. 218 Troubleshooting Tips - Using the Blackboard Software •Useonlyasupportedbrowser.ClickontheHelptabinBlackboardandlocatethelistofsupportedbrowsers under the Resources section.•CheckthebrowsersettingstoensurethatcookiesandJavaareenabled.•Makesurethatyouhave“pop-up”blockersturnedofforadd“uc.edu”toanypopupblocker’s“whitelist”or“safe list.” •Clearyourrecentbrowsinghistorybeforebeginningyoursession.

83

Taking Tests in Blackboard - Important Tips to Follow The most common problem that students encounter when taking an online test is when their computer loses connectivity with the Blackboard server. To help minimize the likelihood of this problem occurring during an online assessment, we recommend using the following checklist:

•DOuseareliableand,ifpossible,fastinternetconnection(DSL,cable,broadband).•DOuseacurrentreleaseofMozillaFirefoxoranothercertifiedbrowser.•DOlogoutandbackintoBlackboardjustbeforebeginningatest.Forsecurityreasons,Blackboardsessionsonly last three hours so this will help insure you have ample time to complete your test.•DOperiodicallyclickthe“Save”buttonduringthetesttorecordyouranswers.•DoNOTresizeorminimizethebrowserwindow.•DoNOTusetheBackbuttononyourbrowser.•DoNOTdoubleclickonthelinktobeginthetestoronanybuttonsorlinksinsidethetest.•DoNOTleavethetestwindowopenandunattendedforanyperiodoftime.

If you do experience technical difficulties during your exam, e-mail your instructor immediately to alert them of the problem. Be as descriptive as possible in your e-mail about what you were doing when the problem occurred, including the date and time in your description.

Blackboard Mobile Learn:Mobile Learn can help users stay connected with push updates and the ability to check announcements, grades or course content wherever they are. Students can publish to journals and blogs, participate in discussion boards and e-mail their instructor or classmates. Mobile Learn is currently `available for Android™, BlackBerry®, HP webOS devices, iPhone®, iPod touch®, and iPad™.

NOTE: Some course content may not be available on mobile devices.

Blackboard Help Center For detailed instructions on how to use the application, click on the “Help” tab within Blackboard, or go

directly to the documentation page at: http://blackboard.uc.edu/help. Or contact us.

Phone: (513) 556-1602Blackboard support during the term: Monday -Friday: 8 a.m. to 11 p.m. ESTSaturday: ClosedSunday: 4 p.m. to 11 p.m. EST

During term breaks: Monday -Thursday: 8 a.m. to 6 p.m. ESTFriday: 8 a.m. to 5 p.m. EST

Email: [email protected] answers couldn’t be easier.

Send us an email!

84

To improve service to our students, the University of Cincinnati Information Technologies department (UCit) utilizes SafeConnect to access the UC Network (UCnet) and the Internet from the dormitory environment.Students will be able to access the network from the dorms once they have gone through the SafeConnect logon procedure. Follow the SafeConnect logon procedure for your corresponding Operating System to access the UCnet. Your computer must have TCP/IP set to DHCP. Game box devices such as the Xbox, Playstation, Wii, etc. will not be required to perform the SafeConnect logon procedure.

Getting Online: SafeConnect

To access the UCNet:Your computer must be equipped with either a Network Interface Card (NIC) or Wireless NIC which supports a/b/g/N connectivity and enabled for a LAN connection.You must have a valid Central Login Service (CLS) username and password.Game box devices such as the XBox, Play Station, or Wii connect directly into a data jack with a Category 5e (or above) ethernet cable.

***Personal Hubs, routers or wireless access points are not allowed on the UCNet.***

For a user to access the UCNet, your computer must be authenticated and verified as having the appropriate security software in place to minimize the vulnerabilities to pass viruses throughout the network. UC uses SafeConnect to provide this service. Please refer to “UCNet and SafeConnect” section of this manual for instructions and additional information on SafeConnect.

SafeConnect Policy Key System Requirements

Component Minimum Requirement

OS Support Windows: XP, Vista and Windows 7 and 8(Other versions of Windows are not supported.)Linux: All versions with a GUI DesktopMac: OSX 10.4 and above

Supported OS Locales Any language supported by the OS

Hard Drive Space 4MB

RecommendedMcAfee VirusScan Enterprise V8.8 for Windows 2000, XP, 2003, Vista, 7 and 8.Download from http://www.uc.edu/ucit/ (if no anti-virus is installed during the SafeConnect Policy Key installation, the notification presented will provide a link to this site): Each room is equipped with a number of data jacks equal to the maximum capacity for that room (e.g., double rooms have two jacks). Each Student Resident is allowed one active computer connection as a condition of his/her residence hall/apartment lease agreement. If additional connectivity is desired, the student may submit a request by completing the Online Data Jack Connectivity form. Information concerning this service is available through the reception area of each residence hall. Housing and Food Services Office must approve all service requests before service will be provided. If the request is approved, there will be an activation fee per school term for each additional data connection that is activated. This fee must be paid before activation.

Requests for Changes or Moveshttps://www.uc.edu/ucit/studentgetit/login.aspx

Requests are not accepted during the first two weeks of school. Changes in your network data jack to another jack within the same room or moving your network connection to another room may be requested by submitting the Data Jack Connectivity Form. To order dormitory connectivity, enter the website shown above. To report dormitory connectivity problems, call the Help Desk at 513-556-HELP (4357).See below for Ethernet card and cable instructions.

85

If you have trouble connecting, call our Help Desk or visit our ResNet support desk for personal assistance.

Help Desk: 556-HELP(4357), Monday - Friday: 6 a.m. – 9 p.m. or Saturday and Sunday: 8 a.m. – 9 p.m.

Visit the ResNet support desk on MainStreet across from the Tangeman University Center (TUC). Hours may vary.

SafeConnect for Windows Vista, Windows 7 and Windows 8This example configuration is using a new install of Windows Vista. Based on your computer’s current status and installed software, some of these steps may not apply to you or some additional steps may need to be taken. You must have Administrator right to the machine for the installation of the SafeConnect client to be installed.

1. Connect your machine to the university’s network via a wireless or wired network connection within an on-campus resident facility.

2. Open a web browser and attempt to connect to a website hosted outside of the university (ex. http://www.google.com, http://www.yahoo.com, http://www.cnn.com)

3. You will be redirected to a sign-on page. Use your Central Login Service username and password.

86

4. Once you log in for the first time, you will be asked to review the Network Usage Policy. If you accept the terms of this policy click on the link that says “Yes, I will install the Policy Key and accept the terms and conditions for Internet use”. If you chose not to accept the policy, you will not be granted internet access.

5. You will now download the key and be prompted to install it.

6. Select “Run” to continue with the installation.

87

7. You may be presented with a Security Warning asking if you want to run the application titled ServiceInstaller.exe. Click “Run” to continue with the installation.

8. You will now be prompted with the SafeConnect Installation window. Click “Install” to continue.

9. Once the installation is complete, you will receive a prompt stating the installation was successful.

10. The SafeConnect client will automatically start a compliancy check on the machine. If at any time the machine becomes noncompliant, follow the onscreen directions to remedy the issue. A warning message will appear notifying you that an anti-virus application was not found and provides links where you can obtain proper software. It is recommended you install the free, University provided McAfee Anti-Virus software.

88

11. Click on the McAfee link to start the download.

12. Click save.

13. Save the zip file to a location of your choice.

14. Once the download is complete, using Windows Explorer, navigate to the directory you downloaded the file.

15. Right click on the zip file and select Extract All...

89

16. The Extraction Wizard will appear. Select Next to continue. 17. Select a location to extract the files to. The default location is the same as the location of the zip file you are extracting. Select ‘Show extracted files when complete’. Click Next to continue.

18. From the list of extracted files, locate the Setupvse.exe file. This is the file you will need to execute to install the application.

90

19. Execute the application by double clicking the file.

20. You may receive a security warning when trying to execute the file. To continue with the installation, click Run.

21. Click Next

22. The default EULA window appears.

91

23. You have to make some changes before you accept the Network Associates License Agreement. Change the License expiry type to ‘Perpetual’ and select the country where you bought the laptop (default is ‘United States’). If you chose to accept the license agreement, select accept and click OK.

24. Select ‘Typical’ and click Next

92

25. Select ‘Standard Protection’ and click Next.

26. Click Install.

93

27. During your anti-virus installation, you may receive a warning that your anti-virus is not running or your definitions are out of date. This is due to SafeConnect noticing the changes in compliancy. Do not attempt to resolve these issues until the anti-virus software installation is complete. If you are installing McAfee, you will be prompted to update at the end of the installation. If you are using another Anti-Virus application, follow their procedures for updating the software once the installation has finished.

28. To finish the McAfee installation, be sure to select ‘Update Now’ and click Finish.

29. McAfee will now check for updates. The updates will be installed if needed and when completed, click Close.

94

30. The Windows Update setting will automatically be set for you as part of using SafeConnect. The setting will automatically download and install recommended updates for your computer from our on-site Windows Update server.

31. This completes instructions on how to get a computer with Windows Vista compliant for the University’s Network. If for any reason you are still receiving warnings of an item that does not pass the compliancy check, please read the screen fully and follow the directions that it provides. If you need further assistance, you may contact the UCit Helpdesk by phone at 513-556-HELP (513-556-4357).

95

SafeConnect for Windows XP

This example configuration is using a new install of Windows XP Professional. Based on your computers current status and installed software some of these steps may not apply to you or some additional steps may need to be taken. You must have Administrator right to the machine for the installation of the SafeConnect client to be installed.

1. Connect your machine to the University’s network via an ethernet cable or with a wireless connection.

2. Open a web browser and attempt to connect to a web site hosted outside of the university (ex. http:// www.google.com, http://www.yahoo.com, http://www.cnn.com)

3. You will be redirected to a sign-on page. Login with your Central Login Service username and password.

Need help?Call the Help Desk 556-HELP(4357)Monday - Friday: 6 a.m. - 9 p.m.Saturday and Sunday: 8 a.m. - 9 p.m.

Visit ResNet on MainStreet across from the Tangeman University Center (TUC). Hours may vary.

96

4. Once you login for the first time, you will be asked to review the Network Usage Policy. If you accept the terms of these policies click on the link that says “Yes, I will install the Policy Key and accept the terms and conditions for Internet Use”. If you chose not to accept the policy, you will not be granted internet access.

5. You will now download the key and be prompted to install it.

6. Select Run to continue with the installation.

97

7. You may be presented with a Security Warning asking if you want to run the application titled ServiceInstaller.exe. Click Run to continue with the installation

8. You will now be prompted with the SafeConnect Installation window. Click Install to continue.

9. Once the installation is complete, you will receive a prompt stating the installation was successful.

10. The SafeConnect client will automatically start a compliancy check. In this example, an anti-virus application is not installed. A warning message will appear notifying you that an anti-virus application was not found and provides links where you can obtain proper software. It is recommended you install the free, University provided McAfee Anti-Virus software.

98

11. Click on the McAfee link to start the download. Save the zip file to a location of your choice.

12. Once the download is complete, using Windows Explorer, navigate to the directory where you downloaded the file.

13. Right click on the zip file and select Extract All...

14. The Extraction Wizard will appear. Select Next to continue.

15. Select a location to extract the files to. The default location is the same as the location of the zip file you are extracting. Click Next to continue.

99

16. Once extraction is complete, open the location of the extracted files. Select “Show extracted files” and click Finish to continue.

17. From the list of extracted files, locate the Setupvse.exe file. This is the file you will need to execute to install the application.

100

18. Execute the application by double clicking the file.

19. You may receive a security warning when trying to execute the file. To continue with the installation, click Run.

20. Click Next.

21. The default EULA window appears.

101

22. You have to make some changes before you accept the Network Associates License Agreement. Change the License expiry type to ‘Perpetual’ and select the country where you bought the laptop (default is ‘United States’). If you chose to accept the license agreement, select accept and click OK.

23. Select ‘Typical’ and click Next.

102

24. Select ‘Standard Protection’ and click Next.

25. Click Install.

103

26. During your anti-virus installation, you may receive a warning that your anti-virus is not running or your definitions are out of date. This is due to SafeConnect noticing the changes in compliancy. Do not attempt to resolve these issues until the anti-virus software installation is complete. If you are installing McAfee, you will be prompted to update at the end if the installation. If you are using another Anti-Virus application, follow their procedures for updating the software once the installation has finished.

27. To finish the McAfee installation, be sure to select ‘Update Now’ and click Finish.

104

28. McAfee will now check for updates. The needed updates will be installed and when completed, click Close.

29. The Windows Update setting will automatically be set for you as part of using SafeConnect. The setting will automatically download and install recommended updates for your computer from our on-site Windows Update server.

30. This completes instructions on how to get a computer with Windows XP compliant for the University’s network. If for any reason you are still receiving warnings of an item that does not pass the compliancy check, please read the screen fully and follow the directions that it provides. If you need further assistance, you may contact the UCit Helpdesk by phone at 513-556-HELP (513-556-4357).

105

SafeConnect Directions for Macintosh

This example configuration is using an Apple Computer.

1. Connect your machine to the University’s’ network via an ethernet cable or with a wireless connection.

2. Open a web browser and attempt to connect to a web site hosted outside of the university (ex. http:// www.google.com, http://www.yahoo.com, http://www.cnn.com)

3. You will be redirected to a sign-on page. Use your Central Login Service username and password

Need help?Call the Help Desk 556-HELP(4357)Monday - Friday: 6 a.m. - 9 p.m.Saturday and Sunday: 8 a.m. - 9 p.m.

Visit ResNet on MainStreet across from the Tangeman University Center (TUC). Hours may vary.

106

4. Once you login for the first time, you will be asked to review the Network Usage Policy. If you accept the terms of these policies click on the link that says “Yes, I will install the Policy Key and accept the terms and conditions for Internet Use”. If you chose not to accept the policy, you will not be granted internet access.

5. The policy key will prompt for download action. Select Open with Archive Utility, and click OK.

107

6. When the download is complete, double click on MacPolicyKeyInstaller.zip.

7. The installation will begin. Click Continue.

8. Select Install for all users of this computer. Click Continue.

108

9. Leave the installation location as default, click Install to continue.’

10. The installation is now complete. Click Close to continue

109

Getting online: Securewireless

UCIT offers a UCGuest internet connection for visitors to campus, such as parents and friends.

But note, students should always use the Securewireless connection because it is faster and safer.

UC’s main campus is 100% wireless! That means you can stay connected in every building on campus, and even many green spaces!

Instructions for attaching your smartphones and tablets to Securewireless and your UConnect e-mail account are available on our website.

www.uc.edu/ucit

Visitors Smartphones & Tablets

All new external, internal and USB wireless cards must have WPA2 Enterprise certification. It is also recommended that all new wireless cards support a/g/N. Wireless cards designated b/g/n will only connect at g speeds on the UC wireless network due to the physical limitations of the b/g band.

Wireless CardsNeed help?Call the Help Desk 556-HELP(4357)Monday - Friday: 6 a.m. - 9 p.m.Saturday and Sunday: 8 a.m. - 9 p.m.

Visit ResNet on MainStreet across from the Tangeman University Center (TUC). Hours may vary.

Securewireless is the Internet connection for students, staff and faculty.

The wireless network at the University of Cincinnati consists of more than 4000 access points that provide coverage in all dorm spaces, buildings and green spaces. Security on the wireless network is incorporated with WPA2 enterprise, which encrypts the data with the Advanced Encryption Standard (AES). Access onto the wireless network requires authentication with your Central Login Credentials.

Instructions for configuring WPA2 on your wireless begin on page 110 or at http://www.uc.edu/ucit/internet/oncampus/wireless_instructions_scripts.html.

110

Configuring Securewireless for Windows 8

1. Move the mouse to the top right corner of your screen to activate the charm bar. Left Click on the settings button.

2. Click on the networks “Available” icon in the charm bar.

111

3. Securewireless should be displayed in the list of Wi-Fi networks. Select Securewireless.

4. Check the “Connect automatically” box. Then select the “Connect” box.

112

5. Enter your Central Login username and password when the Network Authentication box appears.

6. Click Connect to accept certificate.

7. You are online when “Connected” is displayed next to Securewireless.

113

Configuring Securewireless for Windows 7

114

115

116

117

118118

119

120

121

122

Need help?Call the Help Desk 556-HELP(4357)Monday - Friday: 6 a.m. - 9 p.m.Saturday and Sunday: 8 a.m. - 9 p.m.

Visit ResNet on MainStreet across from the Tangeman University Center (TUC). Hours may vary.

123

Configuring Securewireless for Vista

124

125

126

127

128

129

130

131

132

Configuring Securewireless for the MacintoshTo setup your AirPort or Airport Extreme for use with WPA2.

1. In the menu bar, click on the AirPort icon and choose “Open Internet Connect.” 2. In the menu, select “AirPort” under Configuration. Next click on “Turn AirPort On.”

3. Under Network, choose “Other.” 4. Enter Securewireless and select WPA2 Enterprise. Enter username (6+2) and password (this is the same as your Central Login username and password). Click “OK” to proceed.

5. If your connection is successful, your AirPort icon in the menu bar will become bold and show the signal strength (based on how many bars are bold – like this ). Once you have configured this, your computer should recognize when it is in a wireless area at UC and should automatically connect. If you are in a wireless areas and can’t connect, turn AirPort off and then on again (through the AirPort Status Icon). This will usually fix the problem.

133

Configuring Securewireless for LinuxBefore beginning, please note that this was tested on a laptop with Ubuntu 7.04 with Atheros chipset. Please make sure your flavor of Linux and wireless chipset will run WPA2-Enterprise. After any necessary changes are made to your machine, click the “Network Manager” icon in the upper right-hand corner of the window (by default) and the following drop down menu appears. Select “Securewireless” and the Wireless Network Key Required window will appear.

Inthedropdownboxeslisted,pleaseselectthefollowing.Whereitstates<username><password>enterusername (6+2) and password (this is the same as your Central Login username and password). Once done, click the Login to Network button and you will be connected.