Presentation is loading. Please wait.

Presentation is loading. Please wait.

Topics Passwords – Password policy, How to change password

Similar presentations


Presentation on theme: "Topics Passwords – Password policy, How to change password"— Presentation transcript:

1

2 Topics Passwords – Password policy, How to change password
Connecting to wireless Configure on my device Phishing and SPAM s – how to identify, what to do Mapping network drives Office 365 overview – , onedrive, webapps, proplus Microsoft work at home program – Windows / Office Dell discounts 25Live (Jennifer) Quiz Questions

3 Passwords 1/3 Minimum password length - 6 characters –password of 6 characters or more.  Maximum password age – 365 days – users would need to change their password every year.  Enforce password history – 2 – users will not be able to re-use their two previous passwords.  Password must meet complexity requirements – Not contain the user's account name or parts of the user's full name that exceed two consecutive characters Be at least six characters in length Contain characters from three of the following four categories: English uppercase characters (A through Z) English lowercase characters (a through z) Base 10 digits (0 through 9) Non-alphabetic characters (for example, !, $, #, %)

4 Passwords 2/3 What you need to know:
After your password is changed, you will want to update any mobile devices you have.  You will need to specify your new password to connect to the wireless here on campus.  You will also need to update your password so that your device can continue to check your .  Password best practices: Do not use your Montana Tech password on third party websites.  Try to use a unique password on the third party websites.  The reason why you want to avoid doing so - if the third party website is compromised, the person that has the compromised data may try to use your password to authenticate into Montana Tech systems.  Do not write down your password and leave it on your desk.  If you need to write down your password so you can remember it, keep it with you.  Write it down and store it in your wallet or purse.  Once you have your password memorized get rid of the written password.  Do not share your password with anyone.  Montana Tech Network Services will never ask for your password through , over the phone, or in person. 

5 Passwords 3/3 How to change from a domain PC Password Reset tool –
CTRL+ALT+DEL after you login Change Password Password Reset tool – Mtech.edu – Tech Support – Authentication – Password Guides

6 Wireless MTGuest – for guests only – Users that do not have account Eduroam – use your full address as your username and your Montana Tech password Available at many academic affiliate sites MTPodium – Specialized wireless network – this connection will be configured by your support specialist. MTDorms – For use by students in Dorm buildings / Family Housing

7 Wireless How to connect to eduroam on Android
– Tech Support – Wireless – Wireless-Android

8 Wireless How to connect to eduroam on iOS
– Tech Support – Wireless – Wireless-iPhone

9 E-Mail Configuration Built-in E-Mail app Outlook Mobile App Android
iOS

10 Phishing Top 10 tips for spotting a phishing email
Message contains a mismatched URL URLs contain a misleading domain name Message contains poor spelling and grammar Message asks for personal information Offer seems too good to be true You didn’t initiate the action (are you expecting the ?) You’re asked to send money to cover expenses The message makes unrealistic threats Message appears to be from a government agency Something just doesn’t look right (if you are questioning it in the first place, it is probably phishing)

11 What to do with Suspicious Email
Do not forward the suspicious Visit – – Submitting Scam Messages Open new message, drag and drop suspicious into body of new message, send to or

12 Features Clutter – Sorts low priority . Learns based off of your behavior, if you do not read an , it takes messages you’re most likely to ignore and puts into “Clutter” folder. Feature can be turned on or off Clutter is being replaced with Focused Inbox

13 Email Features Focused Inbox –
Uses same learning algorithm as Clutter, instead of moving to a separate folder you are presented with “Focused” and “Other” views in the inbox. This view can be seen in Outlook web access “Focused” and “Other” view is currently not available in Outlook on the desktop. Focused inbox feature is on by default. Feature can be turned off. Outlook OWA – Gear – Mail – Layout – Focused inbox

14 Mapping Network Drives 1/6
Mapping a network drive is a way of connecting to a shared folder or computer on the network It is more efficient to map a network drive that is accessed frequently, rather than typing in the path to the shared network folder or referring to a link in an every time you need to access it Mapping a network drive assigns a drive letter of your choosing (such as M:) and makes the network drive appear as a locally attached drive on your computer

15 Mapping Network Drives 2/6
The syntax used when mapping a network drive is \\servername\foldername This is referred to as a UNC (universal naming convention) and points to a folder on another computer or server Example: \\mtfiles01\netservices The UNC path is what your computer coordinator needs when asking them to give you permission to a network drive, not just the letter

16 Mapping Network Drives 3/6
Steps to map a network drive in Windows Open File Explorer from the taskbar or the Start menu Select This PC from the left pane. On the Computer tab, select ‘Map network drive’

17 Mapping Network Drives 4/6
You must specify a Drive letter of your choosing as well as the Folder path The letter can be any letter that’s not currently being used by another drive. A network drive that is accessed by everyone in a department may always use the same drive letter for easy reference (such as M:)

18 Mapping Network Drives 5/6
Check the box to ‘Reconnect at sign-in’ so the drive automatically remaps on login Click Finish The mapped network drive now appears in Windows Explorer

19 Mapping Network Drives 6/6
Things to remember: You must have been given permission to the network drive in order to view or modify its contents The letter used to map the network drive is of your choosing When asking your computer coordinator for permission to a network drive, refer to the UNC path and not the letter

20 Office 365 Logging into Outlook Web Access Webapps OneDrive
Obtaining ProPlus Login to Outlook Web Access, Click Gear, Your app settings – Office 365, Settings – Software “Install Software”

21 Microsoft Work from Home Program
Faculty / Staff receive discounted Microsoft products for use on their personal device(s)

22 Dell discounts For Personal Purchases only www.dell.com/mtech
Standard configurations Deals, Laptops, Desktops, Electronics

23 Quiz Which password can I use for the user WTQuinn mtech1 Wtquinn1

24 Quiz What should you do if you get a suspicious ?

25 Quiz True or False When asking for permission to a network drive, tell your computer coordinator “I need access to the M drive.” When asking for permission to a network drive, give your computer coordinator the UNC path (\\servername\foldername).

26 25Live

27 Questions?


Download ppt "Topics Passwords – Password policy, How to change password"

Similar presentations


Ads by Google