What is the MMU VPN service?
This service allows users to access the university's network-based resources while off campus using a Virtual Private Network (VPN). Several services are available to staff via our web-based VPN service: We also offer a VPN client for MMU-owned devices.
How do I move from QLs back to MMU remote access service?
To move from QLS back to the MMU Remote Access Service area either shut down via the ‘X’ or switch between the screens via the tabs Author Stephanie Wright Created Date
How can Michigan Tech IT Help Me work from a remote location?
Michigan Tech IT is taking proactive steps to help you during the suspension of face-to-face instruction. This document outlines things to consider while working from a remote location. If you need any assistance with the areas discussed below, we can help. The campus VPN gives you a secure connection from your remote location to campus.
How do I mount my Home Drive and Multidrive remotely?
You can mount your home drive and multidrive remotely once you’ve connected to the VPN. Learn how to at: Mounting H: and M: Drives on Windows Machines . We can help. Michigan Tech IT will continue to monitor email to it-help@mtu.edu and phone calls to 906-487-1111.
Policy statement
This control procedure defines the University’s approach to mobile and remote access, and directly supports the following policy statement from the Information Security Policy:
Audience
This procedure is intended to be read and understood by all staff who access University information from remote locations or using mobile devices.
Control statements
It is the University’s preference that remote access to University systems is achieved using a University-managed device connecting over a University-managed channel. In practice this means a University laptop connecting over a certificate-based Virtual Private Network (VPN), administered by ISDS.
Compliance
Failure to comply with this procedure could result in action in line with the University’s Disciplinary Procedure or Capability Procedure.
Related documents
This control procedure needs to be understood in the context of the other policies and procedures constituting the University’s Information Security Management System.
Review
A review of this policy will be undertaken by the Information Security team annually or more frequently as required, and will be approved by the Information Governance Board.