Remote-access Guide

umb remote access

by Bettye Auer Published 1 year ago Updated 1 year ago
image

Requests for new accounts should be made to the IT Service Desk (ITServiceDesk@umb.edu). ITS offers a VPN (Virtual Private Network) service that allows faculty, staff, and students to remotely access networked equipment as if they were on the campus network.

Full Answer

What is remote access to campus resources?

Remote access to a variety of campus resources is available to all faculty, administration, and authorized staff. As a reminder, you are responsible for the operation and upkeep of your personal computer and home network.

What do I do if remote access is not working?

Remote access to a variety of campus resources is available to all faculty, administration, and authorized staff. As a reminder, you are responsible for the operation and upkeep of your personal computer and home network. If remote access solutions are not working on your personal computer, try performing a general cleanup.

What is the policy for remote access?

All remote access is subject to our Remote Access Policies. Under the direction of the Information Security Office we are requiring Multi Factor Authentication (A.K.A Two-Factor Authentication) for all remote access solutions (Remote Desktop, VPN, Outlook Webaccess , Outlook Phone App and Office 365).

Where do I find Remote Desktop Connection?

Remote Desktop Connection is integrated in the Windows operating system, and is found under Programs -> Accessories. If you are using Mac, please download Microsoft Remote Desktop using the below link.

image

What is remote access?

Remote access is a privilege granted to certain individuals who have a demonstrated need to perform mission-specific activities using enterprise resources while situated off campus. It may not be possible for everyone to receive the privilege of remote access.

Why should remote users log off from their remote connection when they leave the computer?

Remote users should log off from their remote connection when they leave the computer to prevent inadvertent network access by others.

What is the purpose of the campus network policy?

The purpose of this policy is to set standards for connecting to the campus network from remotely situated workstations or devices. These standards are intended to minimize the risk of network disruption and loss or disclosure of sensitive information such as intellectual property, personnel data or patient information.

Can remote access be shared with others?

In particular, Remote access must be strictly controlled through the same on-campus authentication and authorization measures. Logon information may not be shared with others. Unauthorized people (including family and friends) are not allowed to use enterprise resources.

Do remote workstations provide security?

Remote workstations and devices must provide as much security for the enterprise and its information resources as is provided through on-campus workstations and devices. All enterprise acceptable use and security policies that apply to access from on-campus workstations also apply to remotely connecting workstations. In particular,

How to use remote desktop?

Please note that using remote desktop is NOT RECOMMENDED for most users. Access to information/resources stored on your computer is totally dependent on your office computer being powered on and connected to the network. Any interruption to electricity or network services in your area would prevent you from connecting. Some resources that are only available from off campus if you have a VPN connection: 1 Departmental printers — consider sharing files online or distributing PDFs rather than printing 2 Departmental file shares — consider using OneDrive, Teams, or Groups instead 3 Remote Desktop (RDP) connection to a PC in your office (not recommended) — see instructions below:

What are the resources that are only available from off campus if you have a VPN connection?

Some resources that are only available from off campus if you have a VPN connection: Departmental printers — consider sharing files online or distributing PDFs rather than printing.

What are some examples of computers you should never trust when making a VPN connection?

Following are examples of computers you should never trust when making a VPN connection. hotel computers (business centers or in-room supplied laptops) any computer on which you have reason to believe an infection or other compromise may or does exist.

Is remote desktop recommended?

Please note that using remote desktop is NOT RECOMMENDED for most users. Access to information/resources stored on your computer is totally dependent on your office computer being powered on and connected to the network. Any interruption to electricity or network services in your area would prevent you from connecting.

Overview

Your "local" home computer's performance relies on its own hardware -- The physical memory (RAM), hard drive space, and processor (CPU) in your local pc can all be limiting factors in how your computer runs. Cloud PC give you access to a powerful Windows PC that isn't limited by your local pc's actual hardware.

Documentation

Getting Started Guide for CloudPC - Start here to get an overview on how to use CloudPC

Support

CloudPC is new to campus, and with anything new there are bound to be opportunities for improvement. Please provide feedback to cloudpc@umb.edu if you run into any issues or would just like to provide suggestions for improvement.

What is remote access on campus?

Remote access to a variety of campus resources is available to all faculty, administration, and authorized staff. As a reminder, you are responsible for the operation and upkeep of your personal computer and home network. If remote access solutions are not working on your personal computer, try performing a general cleanup.

What is DOM desktop?

This is a generic desktop that provides access to the most commonly used systems/services, including the H and I drives. To use this system please submit an incident ticket including a description of what services you require.

Does UMass Boston have a blackboard?

All courses at UMass Boston have a Blackboard space automatically created at the beginning of the semester, with all students enrolled from WISER. Students and faculty can access Blackboard with the same campus user ID and password they use for WISER.

Do you need a license to host a Zoom meeting?

A Zoom license is only required to host a meeting. Anyone can join a meeting without needing a license. Students, staff, and faculty can collaborate online with Office 365 and Microsoft Teams. Office 365 tools are a part of your University webmail.

image

Policy Statement

  • Members of the campus community and others may require access to networked resources to conduct enterprise mission-related work from home, hotel rooms or off-campus offices. Providing secure remote access makes enterprise computing and information resources available well beyond the physical borders of campus. This greatly expands the universe of threats and risks t…
See more on umaryland.edu

Goal

  • The purpose of this policy is to set standards for connecting to the campus network from remotely situated workstations or devices. These standards are intended to minimize the risk of network disruption and loss or disclosure of sensitive information such as intellectual property, personnel data or patient information.
See more on umaryland.edu

Scope

  • This policy applies to the enterprise workforce (i.e., faculty, staff and students) as well as to vendors, contractors and others who seek access to enterprise or individual computer resources.
See more on umaryland.edu

General Policy

  • Remote access is a privilege granted to certain individuals who have a demonstrated need to perform mission-specific activities using enterprise resources while situated off campus. It may not be possible for everyone to receive the privilege of remote access. A person’s request for remote access to information systems that contain sensitive data m...
See more on umaryland.edu

Guidelines

  • Because they permit unregulated interconnections between two or more networks, split tunneling and dual homing should not be used. Remote users should log off from their remote connection when they leave the computer to prevent inadvertent network access by others. Whenever it is feasible, remote access workstations should employ a personal firewall (software- or hardware-…
See more on umaryland.edu

Auditing and Monitoring

  • Information technology staff will routinely monitor logs of remote access activity and inspect network traffic for evidence of compliance with this policy. Access may be revoked at any time without notice.
See more on umaryland.edu

Violations

  • Failure to follow these principles is a violation of this policy. It is the responsibility of each departmental IT manager to make sure that they are keeping their departmental systems in compliance with the above stated policy. Failure to do so constitutes a violation of policy.
See more on umaryland.edu

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9