Remote-access Guide

mmu remote access

by Obie Moore Published 3 years ago Updated 2 years ago
image

What is the MMU VPN service?

This service allows users to access the university's network-based resources while off campus using a Virtual Private Network (VPN). Several services are available to staff via our web-based VPN service: We also offer a VPN client for MMU-owned devices.

How do I move from QLs back to MMU remote access service?

To move from QLS back to the MMU Remote Access Service area either shut down via the ‘X’ or switch between the screens via the tabs Author Stephanie Wright Created Date

How can Michigan Tech IT Help Me work from a remote location?

Michigan Tech IT is taking proactive steps to help you during the suspension of face-to-face instruction. This document outlines things to consider while working from a remote location. If you need any assistance with the areas discussed below, we can help. The campus VPN gives you a secure connection from your remote location to campus.

How do I mount my Home Drive and Multidrive remotely?

You can mount your home drive and multidrive remotely once you’ve connected to the VPN. Learn how to at: Mounting H: and M: Drives on Windows Machines . We can help. Michigan Tech IT will continue to monitor email to it-help@mtu.edu and phone calls to 906-487-1111.

image

Policy statement

This control procedure defines the University’s approach to mobile and remote access, and directly supports the following policy statement from the Information Security Policy:

Audience

This procedure is intended to be read and understood by all staff who access University information from remote locations or using mobile devices.

Control statements

It is the University’s preference that remote access to University systems is achieved using a University-managed device connecting over a University-managed channel. In practice this means a University laptop connecting over a certificate-based Virtual Private Network (VPN), administered by ISDS.

Compliance

Failure to comply with this procedure could result in action in line with the University’s Disciplinary Procedure or Capability Procedure.

Related documents

This control procedure needs to be understood in the context of the other policies and procedures constituting the University’s Information Security Management System.

Review

A review of this policy will be undertaken by the Information Security team annually or more frequently as required, and will be approved by the Information Governance Board.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9