WVDE Coordinator for / Filtering

Slides:



Advertisements
Similar presentations
Click to edit Master title style Updates Aug updates – SMTPA authenticated server – alias addresses – Rapid Response Notification.
Advertisements

K12 WebMail
JCPS WEBMAIL. Why change now mail services were at end of life Microsoft bid of $0.00 won the contract for the State. Entire State is changing on same.
WVEIS Intranet/Internet Whats new in WVEIS IT. What is an Intranet? A private network within an organization making use of Internet technologies to achieve.
E MAIL CONFIGURATION. 1] Select option from main menu 2] Select account 3] Go to option menu & select New account 4] Start to create new.
Basic Communication on the Internet:
· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less.
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
iRequestManager for MediMizer X3
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Lesson 7: Business, , & Personal Information Management
Asynchronous Communication via Facebook By: Justine Ide.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Yahoo! Mail By: Christina Andrews, Leah Pak, Sook Lee, Heidi Christensen, Diane Ngongang.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
WELCOME Title V Emissions Inventory SPARS Training – Site Management.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Click to edit Master title style RM SafetyNet Plus and RM SafetyNet Universal Important release information for school Network Managers and ICT Coordinators.
Office 365 Bob McCoy
Click to edit Master title style Filtering Update Youtube Proxy (Effective 6/19/12) John Miller June 21, 2012 Office.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
IS 4506 Establishing Microsoft NNTP Service.  Overview NNTP Service benefits How the NNTP Service works Configuring and managing NNTP Service.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
How To Configure Thunderbird For Your Webspace Account.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
ONE® Pages Training Presentation North York General Hospital.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Keeping in touch using the Internet Presented by PSY C&IS.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Overview Concern about free speech issues –One person’s SPAM is another person’s valued Have used a combination of: –policy, –staff follow up, and.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Biosimilar (Insulin) – Competitive Landscape and Market & Pipeline Analysis, 2016 DelveInsight’s, “Biosimilar (Insulin) – Competitive Landscape and Market. Request for sample of this research report:
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
IEEE Alias (Not) IEEE Twin Cities Section Officer & Volunteer Training January, 2014.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Information Technology Overview Welcome to NC State!
Web-RMA Quick Start Guide
Introduction to Operating Systems
Internet Business Associate v2.0
Being CyberSmart! About Online Safety and Security At Schools
Protect Your Computer Against Harmful Attacks!
Business mail account in yahoo
Information Security Session October 24, 2005
What is it? Why do I keep getting from Barracuda? SPAM.
ONE® Pages Training Presentation
نکات بسیار مهم در مورد دانشگاه تبریز
Lesson 2 .
QUALITY PLATFORM (QPF) REGISTRATION PROCESS
Outlook 2007 & Google Apps Sync
Presentation transcript:

WVDE Coordinator for Email / Filtering TSS Training John Miller WVDE Coordinator for Email / Filtering jpmiller@access.k12.wv.us 304.558.7880 Bridgeport, WV April 7, 2011 Office of Instructional Technology

Office of Instructional Technology Email Everyone must agree to adhere to policy 2460 – acceptable use All students and educators must complete application forms Educator forms are mailed to WVDE / student forms are kept on file at school / county Office of Instructional Technology

Office of Instructional Technology http://access.k12.wv.us:1026 Request accounts / make changes Lookup accounts http://access.k12.wv.us:1081 Webmail Interface Office of Instructional Technology

Office of Instructional Technology Oulook Settings POP3 / IMAP: access.k12.wv.us SMTP: smtp.k12.wv.us (always inside intranet) SMTPA: smtpa.k12.wv.us (outside of intranet) Same authentication as incoming mail Port 587 (instead of default 25) Office of Instructional Technology

Office of Instructional Technology Email Storage limitations – 200MB per user IMAP and Webmail Graphics, sent mail, trash Office of Instructional Technology

Office of Instructional Technology Email Upcoming Change All student accounts aligned to WVEIS IDs Search by name or ID on 1026 Site Office of Instructional Technology

Office of Instructional Technology Email Email password security Never give away your password, even if someone asks you really nicely Phishing / scam example Office of Instructional Technology

Office of Instructional Technology Email Spam / abuse reports Abuse complaints are traced to a local IP address The responsible county / school is informed of the abuse Remove the computer from the network until it has been scanned / fixed Office of Instructional Technology

Office of Instructional Technology Filtering Filtering locations Morgantown / Charleston What is filtered E-Rate, CIPA, COPPA Pornography, Profanity and material which may be harmful to minors Requesting blocking / unblocking filtering@access.k12.wv.us Office of Instructional Technology

YouTube Request (Webtop) Office of Instructional Technology

Office of Instructional Technology Filtering Local Filtering (Cymphonix and others) Overlapping blocking Copied deny page Offline Client Same filtering as inside intranet Investigator Accounts Bypass WVDE blocked sites like Facebook and Youtube Office of Instructional Technology

Office of Instructional Technology Contact Info John Miller – jpmiller@access.k12.wv.us Email / spam – abuse@access.k12.wv.us Filtering – filtering@access.k12.wv.us Office of Instructional Technology