New Help Desk Ticketing System

WhatNew Help Desk Ticketing System
WhenWednesday, January 3, 2024
Who is AffectedAll Users
ActionAwareness Only

The Office of Information Technology has replaced our service request/ticket software to address the many issues we have with Footprints and to improve services for all university users.

Wednesday, January 3, 2024 is the day of the campus cutover to TOPdesk

Key things for you to know: 

  • Our old ticketing system, Footprints, is now offline
  • Tickets, resolutions, and FAQs will be transferred to our new TOPdesk system found at capital.topdesk.net. Please bookmark capital.topdesk.net for future use.
  • If you have an open, unresolved service request, it will be transferred to the new system and work will continue on the issue
  • You can continue to autogenerated a ticket by emailing helpdesk@capital.edu, but the new portal will allow you to more accurately direct your request to the proper department

You can access the new system at capital.topdesk.net, select “Log in to Self Service Portal” and use your Capital username and password.

Faculty and Staff will see this view:

Students will see this view:.

From your Home screen, you can view All IT Services, and select the service you need so that the ticket is routed correctly for the fastest service:

From your Home screen, you can check the status of your open tickets:

IT will send additional communications out over the coming weeks to highlight different features of this new system. 

Thank you, 
Capital University Help Desk 

IT Services Holiday Updates – 2022

During the Holiday break – Wednesday, December 21, 2022 through Tuesday, January 3, 2023 – the IT Department will be performing system updates for various services outside of our normal maintenance windows. Many of these updates are simple and will just require a server reboot or two and outages will be brief and intermittent. However, there are a few key systems that will require extended outage time. For those services we will communicate the status below.

 

 
Service Update Status Planned Start Time
Main website Completed Monday 12/19/2022
Skype for Business Completed Thursday 12/22/2022*
File Share Drives Completed Thursday 12/22/2022
Authentication & VPN services Completed Wednesday 12/21/2022
Colleague (myCap, Colleague UI, etc.) Completed Thursday 12/22/2022*
* May carryover to next day

IT Services Holiday Updates – 2021

During the Holiday break – Monday, December 20, through Friday, December 31 – the IT Department will be performing system updates for various services outside of our normal maintenance windows. Many of these updates are simple and will just require a server reboot or two and outages will be brief and intermittent. However, there are a few key systems that will require extended outage time. For those services we will communicate the status below.

 
Service Update Status Planned Start Time
Main website Completed Monday 12/20/2021
Skype for Business Completed Evenings of 12/19/2021*
File Share Drives Completed Tuesday 12/21/2021
VPN services Completed Thursday 12/23/2021
Colleague (myCap, Colleague UI, etc.) Completed Wednesday 12/29/2021*
* Starting after 7pm
* May carryover to next day

 

 

Email: Auto forwarding from your Capital account to your personal account

This week, IT was made aware that Microsoft recently activated a global security enhancement feature with all O365 email accounts in which they blocked your ability to forward email messages from your internal O365 account (capital.edu) to any of your external accounts such as Gmail or Yahoo. Internal forwarding, from one capital.edu account to another capital.edu was not affected.

Although Microsoft made this global change, they have allowed an option for IT to enable the external forwarding capabilities again, so we have re-enable this feature as of this morning, which should allow you to continue to forward messages from your internal account to any external accounts.

Please note: Since this change was made this morning, you may not have all your email in your personal account, you will have to log in to your Capital mailbox and see what messages you have received over the last few days that did not forward.

 

IT Services Holiday Updates – 2020

During the Holiday break the IT Department will be performing system updates for various services outside of our normal maintenance windows. Many of these updates are simple and will just require a server reboot or two and outage will be brief and intermittent. However, there are a few key systems that will require extended outage time. For those services we will communicate the status below.

 
Service Update Status Planned Time Frame
Main website Completed Morning of 12/23/20
Skype for Business Completed Morning of 12/23/20
File Share Drives Completed Morning of 12/24/20
Colleague (myCap, Colleague UI, etc) Completed Evening* of 12/29/20
* Starting at 5pm

 

One other change to happen during the week of the 21st is that the login page for Office 365 will change to the same login page with the “Gate” that you see with MyCap.

Update: This has been completed.

Spam/Phishing Attacks on Campus

DATE:                 Thursday, November 11, 2021

TO:                      All Capital University Faculty, Staff and Students

FROM:               The Department of Information Technology

SUBJ:                  Spam/Phishing Attacks on Campus

Recently there has been a sharp increase in email phishing scams due to compromised Capital user accounts.  A compromised account is one that is accessed by a cybercriminal who is not authorized to use that account.  When student or employee accounts become compromised, those accounts are used to send spam and phishing emails to people on and off campus.

The latest phishing scam on campus involves the circulation of an email message for a “dog sitting” job opportunity.  This overpayment scam plays out roughly the same way as with the “nanny or caregiver scams,” but with some slight variation.

  • The scammer will reach out to you online or via text once you give them your personal contact information stating they want to hire you. Typically this is without them interviewing or seeing you in person
  • An upfront financial advance offer is made by the scammer for your services, typically in the form of a money order from some type of “business” the scammer claims to work for, or a government “embassy”.  They may also ask you to accept deliveries or make purchases on their behalf with promises of reimbursement
  • The amount of the money order will always be written for more than the amount needed, and the recipient will be asked to keep a portion of the funds and either send the extra funds to a third party, or if they have changed their mind, return all the money as soon as possible
  • If you were asked to accept deliveries or purchase items in preparation for the dog sitting position, you may be asked to forward an upfront payment to a third party (via check, wire transfer, gift cards, etc.) to cover the cost of the materials

Although the money orders from the scammer are all fake and fraudulent, many banks will still cash them and place the funds into the pet sitter’s account within a few days.  However, usually within a month, the money order is returned as fraudulent, and the bank will withdraw the money from the pet sitter’s account.  The bank may also charge extra fees, and may pursue the pet sitter with criminal charges for cashing a fake check.

Please be aware and cautious when reviewing and/or responding to email messages with job opportunities that require you to send money up front as a condition of employment or offer to pay you in advance.  Trust your instincts and remember if it sounds too good to be true, it probably is a scam.  Never offer your birth date, SSN, username, bank, or other private information to anyone online.  Especially if they are asking you to “confirm” something for security reasons which is a red flag of a spam.  Educate yourself and read through previous email scams to get a feel for how the spam messages work.

Key Points and Red Flags in Identifying Scams

  • Paying close attention to the “From” and “Reply-to” in the email address to see if it’s a valid address you recognize
  • Check the body of the message to see if the English wording is awkward  or if there are lots of misspellings in the sentence structure
  • Be cautious if someone wants to only communicate with you via email or text messaging. Scammers do not want to talk to you over the phone or video chat
  • Most job postings like this will state that they are “moving to your area”, however, they will not be able to tell you where your area is if you question them
  • If someone is very keen on sending you money before meeting you, this is likely a scam!  Never accept a pet-sitting assignment or payment until you’ve met a potential client in person at the initial consultation.  No legitimate employer will ask you for your banking information or give you money without meeting with you
  • If a potential client urges you to transfer money using a service like Western Union or MoneyGram, it’s probably a scam. Don’t send money to someone you don’t know, either in cash or through a money transfer service. Likewise, don’t deposit a check from someone you don’t know and then transfer the money

IT works diligently to help prevent and counteract spam and phishing scams through various security appliances such as Barracuda which scans every incoming email message for spam and phishing exploits. Barracuda will catch majority of exploits, however, nothing is fool-proof and it takes the cooperation from all of our campus users to help keep the infrastructure and user accounts safe at all times.

What Do I Do If I’ve Been Scammed

  • If you or someone you know was tricked into transferring money for any reason, the Federal Trade Commission (FTC) wants to know about it: https://www.ftccomplaintassistant.gov/#crnt&panel1-1 so please report it
  • Next you should report the incident to the money transfer company.  The two common companies are MoneyGram: 1-800-666-3947 (1-800-955-7777 for Spanish) or com and Western Union: 1-800-448-1492
  • Make a report and work with your bank
  • Notify and report it to the caregiver web site you were contacted through so they can stop the scammer from targeting anyone else on the site. The scammer is likely trying to prey on others who are looking for work
  • Finally, file a complaint with the Internet Crime Compliance Center (IC3) which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center.

Visit the IT Status Page for detail information on other forms of email phishing scams:  https://inside.capital.edu/ITStatus/index.php/category/spam-phishing/.  Questions, inquiries and concerns can be directed to the IT Help Desk, helpdesk@capital.edu or 614-236-6508.  If you suspect that you have received a phishing scam, please report it abuse@capital.edu.

 

Spotting Phony Capital Emails

The following was a phishing email – please find some key warning signs below to look for in order to help you determine if the email is dangerous.

Phishing – is an unsolicited email message trying to get you to give up something. Typically they are trying to get your username and password. Sometimes they try and get you to click on a link or run an attachment that will infect your computer with a virus. To learn more about phishing attacks and tactics, visit phishing.org for more information.

The email above shows 5 things that tell us this is a fake email and should be deleted. It is important to note that not all bad emails will have all 5 things wrong in them, some may only have 1 or 2 of these things and/or may have a few more not listed in this article. These are the most grievous and common red flags that you can spot and use to determine if a message you received is safe or not.

Before we get into the 5 individual red flags you can also see that the overall message itself is a red flag… it is very short and does not say much of anything but is about an important topic that may be of a concern to you. However, the only option for you to learn more is by clicking on a link. A proper announcement should have more content in the email helping you to understand why the email is of importance to you.

1. The email’s friendly name displays Capital University but the email address is not of @capital.edu.
This is a big clue; if this email is “Regarding your Payroll” then why would someone at ccri.edu be emailing people at capital.edu? This by itself should tell you to just delete the email but you can also contact the appropriate person, in this case someone in Payroll, by phone or by forwarding this email to them (DO NOT reply to unknown/untrusted senders) and as ask if this is legitimate.

Sometimes, instead of Capital University,  you may see the name of someone that you know from Capital but still with a non-capital email address such as gmail.com or yahoo.com… that is still not from the person named. The spammer likely looked at our website and picked a name that would bolster your trust of their spam; but it is still not legitimate.

Important: You may get an email that is from a person from Capital and it has their capital.edu email address… That alone should not cause you to trust a message like this. These other red flags should still be checked as the named person’s account may have been compromised and the spammer is logged in to this person’s account and sending the emails from it.

2. The Barracuda Spam Appliance was suspicious of this email and has tagged the subject line with [POSSIBLE SPAM].
Emails are scored and the higher the score the more likely it is spam, there are four ranges of scores; not spam, possible spam, quarantine, and spam. This email did not score high enough to be outright blocked or quarantined but it was suspicious so it was tagged. That tag should alert you to treat the email with extra caution and examine it to see if you can trust it. Things you should ask yourself – Were you expecting this? Do you know the sender? Can you verify this email with the sender without replying to it?

3. The greeting does not contain your name.
The use of a form letter or generalized greetings can aid in determining the trustworthiness of an email. With the ease of mail merge, many of the key offices here at Capital work to personalize their emails to you. For example: the IT password expiration notices are automated but they use your first and last name as we have that in our system, the spammers do not know what your first and last names are so they cannot do that. Should an email use you email address in the greeting then that is a dead giveaway that it could be dangerous.

4. The enclosed link does not point to where it says it does.
Hover your mouse cursor over the link (do not click!) and a pop-up should appear showing the true destination of the link. You can see the link text said it was a www.capital.edu site but the pop-up is tiruleta.es (the ‘es’ is the country code for Spain). If you click on this link then you are taken to a server at tiruleta.es in Spain, not a server with Capital.

ALSO note: the end of the weblink listed that it was a pdf file… but the end of the pop-up shows that you are going to a PHP page.

5. The signature text does not tell you who from Capital sent the message.
Based on this message alone, you do not know who sent it nor do you know who to call to verify its validity or to ask questions. That is because the real sender, the spammer, does not want you to verify it. They only want you to click on the link, fill out a form, and give away your password and possibly many other personal pieces of information. If this was really from payroll you would have had a Capital person’s name and phone number on it so that you could contact them.

There are many other methods that can be used to identify suspicious emails not seen in this email and thus not listed in this article. For a good search with Google look at this link:
https://goo.gl/P50y4X (this is a google shortened URL much like tiny url).

 

RESOLVED–Zoom issue: Issue with joining meetings and webinars – August 24, 2020

Zoom has finished fixing and rolling out the issue fix to all services and has confirmed that all Zoom services are back operational.  https://status.zoom.us/

———————————–

—————–

There is currently a partial outage with Zoom Meetings, Zoom video webinars, as well as accessing the zoom website at this time which is preventing access to meetings.

Zoom is aware of the issue and are working to resolve this as soon as possible.  As we receive confirmation that this has been resolved, we will let you know.

For more information and subscribe to Zoom Status updates, please go to: https://status.zoom.us/

 

 

Update: University Email system

8/10/20

The Department of Information Technology is working diligently to establish full functionality to the institution’s email and telephone infrastructure due to a virus attack.

As of today, all faculty and staff have new Office 365 email accounts in the cloud which can be accessed online for now at https://outlook.com/capital.edu. We will be working with the campus soon in sending out information on how to setup and access your email message through the Microsoft Office program on your computer.

 

We have released and redirected all inbound email messages to your cloud account which was previously stored on our Barracuda spam server as of Friday, August 7th.

Below are our next implementation steps this week for your awareness.  Please be advise that this process is complicated and timely and we appreciate your continued patience as we work out the kinks to establish a successful email work flow.

  • PST Files: A PST file is a personal storage table that stores copies of messages, addresses, attachments, calendar events, contact cards and other personal information used in Microsoft Outlook and/or Microsoft Exchange. Your old PST file will hold information prior to the email outage. IT technicians are currently working on extracting and moving all faculty/staff PST files to your email account in the cloud this week.  This is a new procedure that will need to be tested and vetted prior to full implementation, so we appreciate once again, your patience and understanding as we diligently work out the kinks to this process. We will keep you updated as we get closer to implementation.
  • Resource Mailboxes: Now that the email system is officially migrating to the cloud, setup for resource mailboxes will need to be recreated for cloud usage and accessibility. This is due to the way Microsoft currently configures resource mailboxes to run on their servers in their data centers in the cloud. If you had a resource mailbox that you would like for us to recreate and setup in the cloud with permissions, we kindly ask that you submit a request immediately to helpdesk@capital.edu. When sending your request, we ask that you give us the following information:
    • Name of mailbox(es) you need created;
    • Name of all personnel who needs access to it;
    • Info for a primary contact person (prefer cell phone) so that we can work with that person to ensure the mailbox has been created properly and functioning correctly
  • Distribution Groups: A distribution list allows a user to maintain a list of email addresses and send messages to all of them at once. There are two types of distribution lists—static and dynamic:
    • Static: Members of a static distribution list are added and removed manually by the group administrator(s). During the migration process from on premises to cloud, static distribution lists should not need any reconfiguration or changes. However, we ask that you test your list to see if you get a bounce back message and seek assistance with any issues by contacting helpdesk@capital.edu.
    • Dynamic: Dynamic distribution groups are mail enabled active directory group objects that contains a list of users based on a filter/criteria and the number of users can change automatically at any time based on the filter/criteria. Dynamic lists are best for emailing a list of contacts within the organization such as specific majors, minors, alumni or employees.

If you had a dynamic distribution list, you will need to contact IT, helpdesk@capital.edu to have it recreated and deployed to the cloud.  Please provide the following information:

    • Name of your group;
    • Name of primary contact person (prefer cell phone) so that we can work with that person to ensure mailbox has been created properly and functioning correctly;
    • Contact IT if you are unsure of whether your group is static or dynamic

We apologize for the inconvenience and thank you for your patience.  Please forward any questions, inquiries or concerns to helpdesk@capital.edu and one of our IT professionals will connect with you.

 

8/5/20

We have upgraded and converted Capital’s on-premise email system to the cloud and created new Microsoft Office365 email accounts for all Capital faculty and staff!

You can access your new email account online at: https://outlook.com/capital.edu and login with your Capital username and password. Upon entering your new account, you will notice that you will not have your previous messages, files, documents and folders yet.

As we continue the conversation process, we will begin migrating all email account information that is currently being stored on our Barracuda spam server, to the mailboxes in the cloud. You do not have to do anything and you will automatically start seeing your emails appear in your inbox.

Email messages can be sent out internally, as well as to external email platforms such as gmail, yahoo, however, you will not be able to receive any incoming external email reply messages at this moment. We are currently working on resolving this.

We are continuously working on resource mailboxes and voicemail to email functionality. For those who are in departments that had access and permissions to specific resource mailboxes, these will need to be setup again.  Please email helpdesk@capital.edu for such requests, along with the name(s) of the resource mailbox needed.

We will send out instructions on how to setup Outlook computer software to your Office365 mailbox at a later time, as we are still working on the back end processes of the email system conversion from on-premise to the cloud system.

We thank you for your patience as we work to improve and enhance Capital’s unified communication platform.  Questions and inquiries can be directed to helpdesk@capital.edu.

 

8/4/20

Information Technology is currently working to restore full functionality to Capital’s email system and the Law School webpage this week after a virus attack. Please be assured that all email messages and file system databases are safe and secure as this is our top priority.

Faculty and staff accounts are not able to receive or send emails at this time. Student accounts are still accessible via 0365 and can send email messages to other external email platforms such as gmail, yahoo, however, they cannot receive any incoming email messages. Our spam server, Barracuda, scans all incoming email messages for spam and once cleared, delivers messages to student accounts up in the cloud.

Messages received from outside the university are currently being kept and stored on our Barracuda email protection system server. Those messages will be delivered to all faculty, staff and students once the email system has been repaired and restored.

As part of the email system resolution plan, O365 email accounts for faculty and staff will be created and moved up to the cloud. Faculty and staff O365 accounts will not have any current email messages, files and other archived content until IT migrates this information from the current email system into the cloud. This is a very large project with a short timeframe for implementation, so we ask for your understanding and patience.

Capital phones are working, but because the email service also handles voicemail, this function is not available. Busy signals are normal, as we are seeing a high call volume to certain lines. Departments with specific voicemail and telephone forwarding needs should email helpdesk@capital.edu for assistance.  Our telephone support team will contact you.

We understand the inconvenience this has caused everyone; however, we feel the final results will be very beneficial.  Again, thank you for your patience and understanding.

 

8/2/20

Work is still being done on the email exchange server this morning. Email is not accessible at this time.

 

8/1/2020 9:30am

We are experiencing technical issues with our Exchange server email system this morning.  This affects all faculty and staff accessing email.  We currently do not have an estimated time of resolution to the issue and are working with consultants to resolve the issue as soon as possible.

Law School website is back online

8/10/20

Law School website is back online.  There are some more back-end website configuration and settings that we need to work on, but website is online.

8/5/20

Website files have been retrieved from the server and we are currently working on getting the law school website back online.

8/1/20

The law school website is temporarily unavailable.  We are aware of this and are working to bring the site back up as soon as we can.