Wayne State University

Aim Higher

Knowledge Base

Filter:

Identity Management

  • What is a Preferred Name and how do I create one?

    Starting in winter of 2017, Wayne State University will adopt a system to allow a student to record a Preferred Name with the university. This enhancement is designed to create a safe and welcoming environment on campus, where everyone knows that their...

  • When do users gain and lose access to Wayne State IT services?

    IT service access is controlled by your student and/or employee status and by certain authorization from managers or other approvers. Below are explanations of when access to most IT services are granted and removed for different classes of users (information...

Security

  • What is Security Access Management?

    Security Access Management administers connection to Enterprise Applications such as Banner, Xtender/Imaging, Cognos, ODS, Workflow and STARS. A Wayne State University AccessID is required to access Enterprise Applications. Visit the Enterprise Applications...

  • How do I use Two Factor Authentication without a phone?

    The C&IT Help Desk sells the YubiKey 4, a USB authentication key that may be used in lieu of a phone call, text message or pin number to satisfy Two-Factor Authentication. The authentication key is designed to stay plugged in to a user's computer...

  • How do I Setup and Use Two-Factor Authentication?

    Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents someone other than you logging in with your credentials. Two-factor refers...

  • How do I report phishing messages or suspicious emails?

    One way to catch a fish is to trick it with bait — phishing on the web works the same way. Most phishing scams ask you to reply to a message and send your password. As an example, you may receive an email claiming to be from an official (but...

  • What is a data breach?

    A data breach occurs when sensitive, protected or confidential information has potentially been viewed, stolen or used by an unauthorized individual. Data breaches may involve personal health information, personally identifiable information or intellectual...

  • What is the WSU VPN?

    The Wayne State University Virtual Private Network (VPN) uses the Secure Sockets Layer (SSL) protocol (which provides secure communications on the internet and is found in standard web browsers) to allow access to WSU resources that are blocked by a firewall....

  • Who can use the VPN?

    Only Wayne State University students, staff and registered guests may use the VPN (Virtual Private Network) gateway at vpn.wayne.edu. A WSU AccessID and password is required to log in. Learn more about the WSU VPN at computing.wayne.edu/vpn.

  • How can I use the SSL Virtual Private Network (VPN) to access restricted WSU resources?

    C&IT recommends accessing the VPN using the Pulse Secure client. Learn how to download and use Pulse Secure on the C&IT Knowledge Base: How do I use the Wayne State VPN without visiting the website? You may also access the WSU VPN via a web browser,...

  • What are computer operating system updates? Why do I need them?

    Apple and Microsoft frequently release updates for their Operating Systems. You must keep your computer current with these updates to protect against vulnerabilities. Many viruses and worms spread rapidly because this essential task is overlooked or postponed....

  • How do I create or change a password for the user account on my computer?

    Windows Users of any University-owned machines are required to change their passwords on a regular basis. You are responsible for the security of your computer. (For personal computers, learn how to change your password manually at support.windows.com.)...

  • Where can I find guidelines for creating a secure password?

    A secure password may be the only line of defense your computer possesses. If you have a weak password, a hacker may easily crack it and gain access to all the information that resides on your computer. This is just one of the reasons Wayne State University...

  • How do I protect my computer from malware?

    Malware is malicious software that gets installed on your computer. Malware programs: Gather information about your web browsing habits and pass the information on to advertisers. Cause severe damage to your system, such as pop-up advertisements,...

  • How can I lock my computer?

    It is very important to lock your computer any time that you step away from it. Doing so is an easy and effective way to protect the information on your computer system while it's unattended. When you lock your computer, you safeguard your data without...

  • How do I protect my Windows computer when using Internet Explorer (IE)?

    C&IT recommends Mozilla Firefox and Google Chrome web browsers. If you need to use Internet Explorer for a specific application, protect your computer with the security precautions below. Open up a session of Internet Explorer. Click Tools and...

  • How often do I need to back up the data on my computer?

    Backing up your data is one of the most important steps you can perform in practicing safe computing. Unfortunately, this step is often overlooked. If your computer hard drive malfunctions or if your computer gets compromised by a virus or hacker, the...

  • What are Microsoft Office updates? Why do I need them?

    Microsoft Office has been — and still is — a target for hackers and viruses because of its security vulnerabilities. To combat this, Microsoft is continuously working to fix these vulnerabilities by offering updates, patches and service packs....

  • What is a firewall? Why do I need one for my computer?

    A firewall is a protective barrier that prevents unwanted sources such as viruses, worms, trojans and other malicious code from accessing your computer or network. Firewalls can be either hardware-based or software-based. These two types of solutions...

  • What do I do if Symantec Endpoint Protection installation fails due to "pending system changes that require a reboot have been detected" or rolls back during installation?

    There are several reasons why the Symantec Endpoint Protection (SEP) installation progress bar may revert during installation. Anti-virus One possibility is conflicting anti-viruses. To resolve this issue, uninstall and remove any anti-viruses. You...

  • How do I access the WSU Virtual Private Network (VPN) on iOS devices?

    Wayne State University does not officially support a mobile VPN client, but C&IT has successfully tested the Pulse Secure app with the network. Follow the steps below to access the WSU VPN on iOS devices. If you have not set up two-factor authentication,...

  • How do I access the WSU Virtual Private Network (VPN) on Android devices?

    Wayne State University does not officially support a mobile VPN client, but C&IT has successfully tested the Pulse Secure app with the network. Follow the steps below to access the WSU VPN on Android devices. If you have not set up two-factor...

  • What are the system requirements for the VPN?

    Find the most current information on system requirements and support in the VPN client release notes (provided by the vendor Pulse Secure). Pulse Connect Secure Supported Platforms Guide (PDF)

  • As a department, what do I have to be concerned about when somebody leaves or transfers out?

    Access to administrative systems When human resources paperwork is processed and an employee is terminated from Wayne State University, there is an automatic process to remove the Banner, Application Xtender, Cognos, WayneBuy and any direct Oracle access...

  • What should I do if my files or browser are suddenly locked?

    Ransomware is an especially dangerous form of malware. If you receive a notification that you must pay a certain amount of money to use your computer, access files or more, you may be infected with ransomware. Some ransomware will encrypt your files and...

  • Where can I get up-to-date, trustworthy security information?

    Cyber security Check out these resources to learn more about cyber security and get the latest news to protect yourself. Security News on computing.wayne.edu Wayne State University's IT Security Blog IT security Check out these resources to get...

  • How can I protect my computer with antivirus software?

    One of the most important ways you can protect your personal computer (PC) is to download antivirus software and run regular scans. While no antivirus is 100 percent foolproof, there are now many free and often operating system-integrated products that...

  • How can I keep my mobile device safe?

    As mobile devices have become increasingly important in our everyday lives, they have also become a primary target of thieves and hackers. Follow the few easy tips below to keep your device and your information safe. Built-In security features ...

  • How do I encrypt common Microsoft Office documents?

    You may have sensitive data in Microsoft Office documents that you would like to have extra protection for. While you may be storing these documents in a secured location (such as a network drive), they may still be vulnerable to attack and disclosure...

  • How do I encrypt individual files?

    You may have sensitive data in your files and/or documents that you would like to encrypt for extra security. While you may be storing your files in a secured location (such as a network drive), they may still be vulnerable to attack and disclosure if...

  • What should I know about the C&IT Security Awareness Program?

    What is C&IT Security Awareness training? Computing & Information Technology (C&IT) has developed a suite of training materials dealing with the ever-changing security concerns of the information age. This material helps establish a baseline...

  • Why does Accelerate not say my Security Awareness PhishProof course is complete?

    There is a conflict between the C&IT Security Awareness videos and Wayne State University's training platform that may result in your course showing as incomplete even when you have successfully completed it. Accelerate Employee Development only...

  • What should I know about Duo Two Factor Authentication?

    What is two-factor authentication? Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in to your...

  • How do I log in to the VPN using Two-Factor Authentication?

    Two-factor authentication may be used to securely log in to the Wayne State University VPN. You may sign up for two-factor authentication by going to vpn.wayne.edu/secure and following the prompts. Follow the steps below to log in to the WSU VPN using...

  • How do I SSH using Two-Factor Authentication

    As part of C&IT's continued efforts to protect critical campus resources, we are beginning the next phase of two-factor authentication deployment. Specifically, this will involve protecting Secure Shell (SSH) logins on our production Linux servers....

  • How do I manage my Two Factor Authentication in Academica?

    Two Factor Authentication offers a second layer of security when accessing secure services. Two Factor Authentication devices and methods may be managed at any time through Account Management in Academica. In Account Management, you may manage device...

  • Where can I find information about legislation regarding IT security and data privacy?

    The following is a non-exhaustive list of official government or national association websites (as of December 2014) that deal with federal and state legislation regarding IT security and data privacy. Family Educational Rights and Privacy Act (FERPA):...

  • How do I securely encrypt a USB flash drive using a Mac?

    Encrypting a portable USB flash drive is a great way to prevent sensitive data falling into the wrong hands, preventing data breaches and security incidents. This guide will demonstrate how to securely encrypt a USB flash drive within macOS so that the...

  • How do I securely encrypt a USB flash drive using Windows?

    Encrypting a portable USB flash drive is a great way to prevent sensitive data falling into the wrong hands via data breaches and security incidents. This guide will demonstrate how to securely encrypt a USB flash drive within Windows so that the data...

  • What do I need to know about legal and illegal downloads?

    Don’t share content illegally The United States Copyright law (1967), the Digital Millennium Copyright Act (1998) and the Higher Education Opportunity Act (HEOA) (2009) state that distributing copyrighted material to which you do not own the copyright...

  • How do I contact the C&IT security team?

    Wayne State University takes IT security very seriously. If you are a victim of a security breach, please report it. Remember, if you lose a laptop, smartphone, tablet or other device to access WSU email or information, you are possibly the victim of...

  • What security settings are available on my Android mobile device?

    Android runs on the majority of smartphones across the globe. Due to its popularity, it is also the most targeted. Here are some tips to keep your Android device secure. However, please keep in mind that your Android device may differ slightly, as every...

  • What security settings are available for my iOS mobile device?

    iOS is Apple’s popular mobile operating system that runs on the iPhone and iPad. Here are some tips to keep your iOS device secure. However, please keep in mind that your iOS device may differ slightly, as previous generations of hardware may not...