Skip to main content

I AM LOOKING FOR INFORMATION ABOUT:

ONYEN

Just go to onyen.unc.edu and click on the Create or Manage Onyen button.
Visit the password management page. This is the only authorized method for changing your password (i.e., don’t change it from a login screen!)  Don’t forget to set up your challenge-response answers!
First, log out and log back in! Your Windows desktop, e-mail program (Mac or PC), iPhone or Android, and anything else that saves your ONYEN password will continue to hit campus servers with your old password until you’ve updated each of them. When the campus servers see a bunch of failed login attempts, they will dutifully lock your account for a cooling-off period of 15 minutes. Here’s what to do:

  • Make sure your e-mail program knows and stores the new password, then close your e-mail program.
  • Make sure your iPhone, iPad, Android, or anything else that you use to check your e-mail has been updated.
  • If you’re running Windows, sign out and back in to update the stored copy that Windows keeps.
  • If you suspect that your account has been locked, call us at 919-962-4800 to have it unlocked.
  • The campus help desk is also available for 24/7/365 support at 962-HELP.
  • Usually, the first three steps above will clear up any password problems.
Changing your ONYEN password kicks a Rube Goldberg contraption into gear that can sometimes miss a beat. In this case, the only thing left to do is to change it again.
Head over to our Keychain Issues page.
Dina Sikora can help!

IT Security

Please review this article for help on identifying a phishing email (scroll down).

Key highlights from the above article:

How to spot phishing
Many phishing emails follow similar patterns. Here are a few things to watch out for:

  • The “from” address doesn’t match the sender name or is an attempt to look like someone affiliated with the University, like Chancellor.unc.edu@gmail.com.
  • The “to” field includes a bunch of other people, or it’s blank and you are blind carbon copied (bcc’ed).
  • The email has poor spelling and grammar. It may also feel stilted or like it’s written by AI.
  • There’s a sense of urgency or emotional manipulation. Common ploys are you must act now or bad things will happen or that you’ll miss out on an opportunity if you wait.

Anatomy of a phishing email: View Infographic

For Outlook online (Heelmail) and desktop Outlook on Windows and Mac, first select the phishing email, then click the Report button in your toolbar. You can find the toolbar directly above your inbox — it includes commonly used actions like deleting or marking items as read.

According to University policy, sensitive information is defined as Tier 2 and Tier 3 information as outlined here: Information Classification Standard

Some Tier 2 and 3 information is in defined categories because it is covered by a specific law, regulation, or industry standard. These include:

  • Personally Identifying Information, as defined by the North Carolina Identity Theft Protection Act of 2005
  • Protected Health Information, as defined by the Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • Student education records, as defined by the Family Educational Rights and Privacy Act (FERPA)
  • Customer record information, as defined by the Gramm Leach Bliley Act (GLBA)
  • Confidential personnel information, as defined by the State Personnel Act
  • Information that is deemed to be confidential in accordance with the North Carolina Public Records Act

If you have access to sensitive information because of your role with the University, you share a responsibility to protect that information.  If you are unsure whether information you have is “sensitive” there are people responsible for Data Governance who can help. The Data Governance Oversight Group can provide guidance. Information on University Data Governance is available at Data Governance at UNC.

If you believe that University sensitive information may be compromised, call 919-962-HELP and request a critical ticket for an Information Security Analyst.

If you have questions about how to appropriately secure information, please consult Hussman IT by submitting a ticket via help.unc.edu.  Information is available on the University SafeComputing web site to help with specific topics.  The University’s Privacy Office is a good resource for information on many types of sensitive information.

In general, sensitive information may be stored in the Office 365 environment (e.g., OneDrive) provided by the University.  If you have storage needs beyond the Office 365 environment please consult Hussman IT.

Equipment Room

For gear required for production classes such as cameras, lights and tripods, your instructor will provide information about what you need and how to borrow it from the Park Library’s Equipment Room. The Park Library will not lend ANY “accessories” like phone or laptop chargers, classroom clickers or headphones. Other campus libraries will not lend equipment either, due to safety concerns.

Printing / Classrooms / Building Access

  • Hussman-owned computers may print directly to any Xerox Multi-function Device (MFD).
    • Windows users may install the printer queues via the Software Center app.
    • Mac users may install the printers via the Self Service app.
  • You may retrieve your print job from any Xerox MFD in Carroll Hall.
  • Faculty/staff/instructors may print from personal computers via Mobile Print.
  • For students, there are CCI printers available throughout campus. Visit CCI Printing for more information.
See this Mobile Print page for information.
There are boxes of printer paper (letter, legal, and tabloid) in the mailroom. Submit a help request if you need more paper or if the MFD needs toner or other supplies.
Submit a help request if you need more printing funds added to your account.
Visit the Labs and Classrooms page.
Carroll Hall will be unlocked from 7:30 a.m. to 8:30 p.m. Monday through Friday. Student swipe access will not be available to access the building outside of these times.
See these mobile One Card instructions as to how to use your Apple mobile device for building and classroom access.

Access: Data and Services On/Off Campus

Have your ONYEN and password ready, then check out ITS wi-fi registration instructions. If you need to re-enroll, go to wifi.unc.edu on your device.
Follow these VPN instructions and select the platform you use off campus.
If you would like to request access to the file server, please follow these server instructions.
File Server Access Requests
ITS has information about 2-step verification for Duo and Office 365.

If you’re still having trouble after going through those steps, you’ll want to contact 962-HELP directly (or submit a ticket).

We can attempt to help you if you are in Carroll Hall, but Hussman IT won’t be able to resolve any issues that may exist with the service since this is a central ITS supported service. We can only act as a support liaison for you.

The recommended method to authenticate is to use the Duo app on your smartphone as that is the most ubiquitous device for everyone. However, there are several other modes available and a second backup option is also recommended such as your office landline phone.

The Duo app works by prompting you to confirm your login, whenever you try to access a service that it is configured to secure. The process looks something like this…

* Attempt to log on to a service configured to be secure by Duo, such as the UNC VPN
* You will log on in the usual way, using your ONYEN credentials
* Once you submit your credentials, Duo is triggered
* If you have the app setup on your smartphone, you’ll receive a push notification to confirm that it is you
* If configured for a landline or cell number, you’ll receive an automated phone call
* Once confirmed, you’ll be able to immediately log in

The ITS helpdesk is available to answer any questions with this service and at your disposal (24/7) if you ever run into an access issue. They can be reached at 962-HELP or help.unc.edu.

Applications

This is at ITS Self Service. When you sign in with your ONYEN, ITS will determine whether you use Exchange or HeelMail according to your affiliation. If you think they’re discerning wrong, please let us know and we’ll open a ticket.
The ShareLinks in Carroll Hall enable anyone to present content from a laptop, smartphone, or tablet on a shared display, transforming any room into a collaboration space. ShareLink™ technology provides simultaneous presentation of different types of content from up to four personal devices. For technical support, to request a room demo, or with questions, contact Hussman IT by phone at 919-962-4800 or email at help@help.mj.unc.edu.
Access the room schedules for each room by clicking on the appropriate “View Schedule” link on the Room Reservations page.
Complete FERPA training in Carolina Talent.
Sakai help is available.
Sakai will be replaced by Canvas after Spring 2024.
Canvas help is available.
First, check to see if it’s already been reported to UNC. If the same email you just received is on that list, then just delete it from your inbox!

If it has not been reported, forward your email as an attachment to phish@unc.edu so it can be reviewed and blocked by security. Make sure you’re forwarding the email as an attachment!

View these Zoom instructions.
Media Resources Help is available from UNC Libraries.

Telephone Services

You cannot access voicemail without the correct passcode. If you have lost or forgotten your voicemail passcode, or you are a new employee and don’t know the passcode, ITS Telecom will reset the voicemail box, deleting any existing messages. Submit a request to ITS through our online portal or call 962-HELP.
ITS Telecom can make basic telephone changes for you. Submit a request through our online portal. ITS Telecom will send voicemail instructions when they complete the request. Reset requests are usually completed in one (1) business day.