incoming student tech requirements · there are several antivirus options that are free and others...

19
Page 1 of 19 Incoming Student Tech Requirements Contents Introduction .................................................................................................................................................. 2 Minimum Laptop/Desktop Requirements .................................................................................................... 2 Minimum Antivirus Requirements................................................................................................................ 3 Antivirus for Phones and Tablets .............................................................................................................. 3 Choosing an Antivirus Product .................................................................................................................. 3 Minimum Virtual Privacy Network Requirements ........................................................................................ 4 General ...................................................................................................................................................... 4 Virtual Private Network (VPN) .................................................................................................................. 4 Virtual Desktop Infrastructure (VDI) ......................................................................................................... 4 Desktop Client ....................................................................................................................................... 4 Web Client ............................................................................................................................................ 4 Encryption ..................................................................................................................................................... 5 What is Encrypting Your Personal Device? ............................................................................................... 5 Why Isn’t a Login Password Enough? ....................................................................................................... 5 Verify That Your Version of Windows Supports Encryption ..................................................................... 5 Encrypt Your Windows Device .................................................................................................................. 7 Take a Screenshot of Your Device ID (Windows) ...................................................................................... 9 Take a Screenshot of Your Proof of Encryption (Windows) .................................................................... 10 Encrypt Your Apple Device ...................................................................................................................... 14 Take a Screenshot of Your Serial Number (Apple) .................................................................................. 16 Take a Screenshot of Your Proof of Encryption (Apple) ......................................................................... 17 Tufts-Approved Tools for Staying Connected ............................................................................................. 19 Zoom Recommendations ........................................................................................................................ 19 How to Log in to Your Tufts Zoom Account ............................................................................................ 19 Tufts Zoom User Guide ........................................................................................................................... 19 Zoom Help Center ................................................................................................................................... 19 Cisco Webex Recommendations............................................................................................................. 19 Cisco Jabber Recommendations ............................................................................................................. 19

Upload: others

Post on 22-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 1 of 19

Incoming Student Tech Requirements Contents Introduction .................................................................................................................................................. 2 Minimum Laptop/Desktop Requirements .................................................................................................... 2 Minimum Antivirus Requirements ................................................................................................................ 3

Antivirus for Phones and Tablets .............................................................................................................. 3 Choosing an Antivirus Product .................................................................................................................. 3

Minimum Virtual Privacy Network Requirements ........................................................................................ 4 General ...................................................................................................................................................... 4 Virtual Private Network (VPN) .................................................................................................................. 4 Virtual Desktop Infrastructure (VDI) ......................................................................................................... 4

Desktop Client ....................................................................................................................................... 4 Web Client ............................................................................................................................................ 4

Encryption ..................................................................................................................................................... 5 What is Encrypting Your Personal Device? ............................................................................................... 5 Why Isn’t a Login Password Enough? ....................................................................................................... 5 Verify That Your Version of Windows Supports Encryption ..................................................................... 5 Encrypt Your Windows Device .................................................................................................................. 7 Take a Screenshot of Your Device ID (Windows) ...................................................................................... 9 Take a Screenshot of Your Proof of Encryption (Windows) .................................................................... 10 Encrypt Your Apple Device ...................................................................................................................... 14 Take a Screenshot of Your Serial Number (Apple) .................................................................................. 16 Take a Screenshot of Your Proof of Encryption (Apple) ......................................................................... 17

Tufts-Approved Tools for Staying Connected ............................................................................................. 19 Zoom Recommendations ........................................................................................................................ 19 How to Log in to Your Tufts Zoom Account ............................................................................................ 19 Tufts Zoom User Guide ........................................................................................................................... 19 Zoom Help Center ................................................................................................................................... 19 Cisco Webex Recommendations ............................................................................................................. 19 Cisco Jabber Recommendations ............................................................................................................. 19

Page 2: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 2 of 19

Introduction

As an incoming member of the Tufts University School of Dental Medicine (TUSDM) Class of 2024, you begin your matriculation at a very interesting time. The COVID-19 pandemic has forced TUSDM to re-evaluate and re-examine the ways our students engage with faculty, the ways students engage with patients, and the ways students engage with one another. The school’s faculty and administrators have been reviewing how we have traditionally provided instruction to our students, especially first year dental students, with the hope of adjusting to the environment in which we find ourselves.

No doubt you have increasingly relied on technology to participate remotely in academic and social activities. As the current situation evolves, we must prepare for the likelihood that a substantial amount, if not all, of your upcoming fall semester academic experience will occur online. In addition to online classes, you will be expected to communicate with your classmates and instructors through Tufts-approved applications and conduits. Security, of course, is one of our main concerns as we adopt and adapt to these new technologies. Therefore, TUSDM will require your personal devices to meet certain security and encryption requirements. In other cases, TUSDM will recommend certain verified applications/tools for connecting and communicating with peers and school representatives.

Minimum Laptop/Desktop Requirements

To conduct any Tufts-related business (e.g., classes, exams, email, axiUm, and other dental-related applications) your personal device must meet the following minimum specifications (see Table 1):

Table 1: Minimum Laptop/Desktop Requirements

Specification Minimum Recommended

Operating System Mac OSX 10.14 or Windows 10 Mac OSX 10.15 or Windows 10

Processor Intel i5 Intel i5

Screen Size (inches) 13 15

RAM (GB) 8 16

Hard Drive Capacity (GB) 256 512

For any Windows operating system, the release date must be March 2018 as a minimum, but a release date of 2019 or later is recommended. Here are some links for purchasing personal devices:

Apple: https://www.apple.com/us_edu_53153/shop?afid=p224%7C6759139&cid=AOS-US-CAMPUS-ShopNow

Dell: http://www.dell.com/us/eep/p/?cs=2236&scat=root&link_number=17970622&isredir=true

Lenovo: https://www.microsnelaptops.com/tufts/store_main.aspx

Page 3: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 3 of 19

Minimum Antivirus Requirements

Faculty, students, and staff must have antivirus software installed and running on their personal devices. There are several antivirus options that are free and others that are available for purchase:

Trend Micro: Faculty, students, and staff may purchase a version of Trend Micro through the university at a discount. Instructions are located at https://access.tufts.edu/antivirus.

Other Inexpensive or Free Antivirus Options: Many of the vendors listed below offer both free and for-purchase versions of their software. We recommend downloading or purchasing these directly from the vendor’s website or through a reputable retailer, such as Amazon, Best Buy, etc. Make sure when downloading software, that the website is a trusted site like download.cnet.com, support.apple.com, or the primary vendor: Avast: www.Avast.com AVG: www.AVG.com Avira: www.Avira.com Bitdefender: www.Bitdefender.com Malwarebytes: www.malwarebytes.com McAfee: www.mcafee.com Panda: www.pandasecurity.com Sophos: www.Sophos.com Symantec Norton: www.Norton.com

Never purchase or load antivirus software from a pop-up dialog box or from a link sent to you in an email (unless you just ordered it and it is the installation message). If you want that vendor’s product, always go to the original vendor site or a known distribution site. Why? Criminals often use pop-ups or emails to trick people into downloading files embedded with malicious software in order to steal credit card information through a fake purchase process.

Antivirus for Phones and Tablets

There are antivirus applications for phones and tablets. Always purchase these products through vendor-approved and -tested phone/tablet software sites. We recommend these websites:

iOS/Apple Devices: iTunes, Apple App Store, or www.apple.com

Android/Google Devices: Google Play Store play.google.com/store

Windows Devices: www.microsoftstore.com

Choosing an Antivirus Product

Choosing an antivirus product can seem overwhelming. There are so many choices available, and not all products maintain their effectiveness. When deciding, consider aspects such as your operating system,

Page 4: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 4 of 19

budget, features, and ease of use. In addition to vendor sites, here are some other sites to that provide good product information:

AV Test: https://en.wikipedia.org/wiki/AV-TEST https://www.av-test.org/en/about-the-institute/

The best antivirus software for Android: https://www.av-test.org/en/antivirus/mobile-devices/android/

The best antivirus software for Windows Home User: https://www.av-test.org/en/antivirus/home-windows/

12 Security Suites for Mac OS X: https://www.av-test.org/en/news/news-single-view/12-security-suites-for-mac-os-x-put-to-the-test/

Minimum Virtual Privacy Network Requirements

General

https://it.tufts.edu/training-working-and-teaching-remotely

Install Webex, Jabber, and VPN applications on your phone if possible.

Virtual Private Network (VPN)

https://tufts.app.box.com/v/vpnsoftware

After downloading, make sure the Uniform Resource Locator (URL), i.e., the website address, you are connecting to is vpn.tufts.edu/duo. Then log in using your Tufts username and password. The second password is how you authenticate using Duo. You can type “push,” “phone1,” or the six-digit passcode that Duo Mobile generates every minute, e.g., “123 456.”

Virtual Desktop Infrastructure (VDI)

Desktop Client

https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user_computing/vmware_horizon_clients/5_0#win64

Web Client

https://vdi.it.tufts.edu/portal/webclient/index.html#/

Page 5: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 5 of 19

Encryption

Personal devices such as iPhones and iPads already come encrypted.

When working with sensitive data on your personal device, such as HIPAA-regulated information or student research, your computer must be encrypted. Encryption protects such data if your personal device is lost or stolen. Follow the instructions to encrypt your specific operating system below. If you have any questions or problems, email [email protected]. When you send an email, please format it in the following manner:

1. In the Subject line, type “dental school boston desktop support for encryption issues”.

2. In the body of the email, include which kind and version of operating system you are using and a detailed explanation of the encryption issue you are having.

What is Encrypting Your Personal Device?

Encrypting your personal device, such as your laptop, is like locking all your files in a language only you know. You can log in and use your laptop normally and not see a difference, but if you are not logged in, the files are unreadable to anyone else.

Why Isn’t a Login Password Enough?

To prevent someone else from gaining access to your laptop, setting a password is a great first step! However, a password only stops someone from logging in to your laptop. This would not stop a hacker from copying all your laptop’s data onto their computer. Imagine that your laptop is like a filing cabinet. Setting a password is the same as protecting the filing cabinet with a lock and key. But this won’t stop someone from picking the lock. This is where encryption comes in. It’s a step above and beyond protecting your laptop with a password. Encryption makes all your data unreadable and therefore useless to anyone, no matter how they access your laptop. Encryption protects your data even if your laptop breaks. Even if no one can log in, the data is still there, fully encrypted.

Verify That Your Version of Windows Supports Encryption

Microsoft Windows comes in various versions and editions. Versions of Windows are Windows 7, Windows 8, Windows 10, and Windows 11 (as of July 2020); editions of Windows are Home, Education, Pro, and Enterprise. For example, you might have Windows 10 Home or Windows 10 Pro. Windows versions 10, 11, or higher Pro, Enterprise, and Education editions support encryption using a program called BitLocker.

In this section, we will check that you have Windows 10+ Pro, Enterprise, or Education. If you don’t, we’ll upgrade your version of Windows to Windows 10 Education.

1. On the task bar, click Start . The Start menu is displayed.

Page 6: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 6 of 19

2. On the Start menu, click the Settings icon (it looks like a gear). The Settings dialog box is displayed.

3. On the Settings dialog box, click System (it’s typically located on the upper left-hand side). The System dialog box is displayed.

4. On the System dialog box, on the left-hand side, scroll to the to the bottom of the System menu and click About.

5. On the right-hand side, you will see information about Device specifications and Windows specifications. Scroll to the Windows Specifications section to see which edition of Windows you have. This will be to the right of the heading “Edition.”

6. If you see you have Windows 10 or Windows 11, either Pro, Enterprise, or Education, you’re set! Close this section and follow the instructions in the section Encrypt Your Windows Device on page 7.

7. If you have Windows 10+ Home, Windows 7, or Windows 8, you will have to upgrade to Windows 10 Education, which you can do for free through Tufts. Continue with these instructions. If you need to upgrade an additional device, you will probably need to pay for it. If you have Windows 7 or Windows 8, and the below upgrade instructions don’t work because

your laptop does not permit the upgrade, we strongly recommend you purchase a new laptop with a newer version of Windows. Microsoft (and many accompanying software and applications) no longer support Windows 7 or 8.

8. If you currently have Windows 7, 8, or 10 Home—continue with these instructions and let’s upgrade you to Windows 10 Education—it’s free! This is going to restart your computer, so save and close any open files.

9. Go to https://tufts.onthehub.com and log in using your Tufts credentials.

10. Select Windows 10 Education. If you don’t see the purple Windows 10 Education icon on the first screen, please type Microsoft

Windows Education in the Product Search bar.

11. Click Add to Cart, then go to Check Out.

12. Enter your UTLN and name (type it in exactly as listed in the example box on the screen). Select Accept.

13. Select the Agree button and make sure to copy the product key information from the screen (usually right click > Copy). Don’t close this window in case you don’t successfully copy the key.

Page 7: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 7 of 19

14. Enter the product key into Windows. Click on the Search icon on the bottom task bar.

15. In the search bar, type in the words Control Panel; when it displays, click it to open it.

16. Click on the System and Security option, then click System (usually the third item on the list).

17. Select Change Product Key (usually on the bottom right).

18. Paste in the new product key that you copied from the On the Hub website.

19. The upgrade will take about 10 minutes, then there will be a restart, after which you have completed the upgrade and are now running Windows 10 Education.

Encrypt Your Windows Device

Now that you have a version of Windows that supports encryption, let’s encrypt your device. You should currently be running Windows 10+ Pro, Enterprise, or Education. If you aren’t sure what Windows version and edition you have, close this section and go through the steps in the above section, Verify That Your Version of Windows Supports Encryption.

1. Head to Windows Control Panel > System and Security > BitLocker drive encryption (it might also be called Manage BitLocker).

2. If you aren’t sure where the Control Panel is, search for it using the Search icon on the Task bar.

Page 8: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 8 of 19

3. The BitLocker drive encryption application displays the status of the drives attached to the system. Your operating system drive is (C:), which is what you need to encrypt.

4. If encryption for the C: drive is on, you’re done! If you see “Turn on BitLocker,” continue with these instructions.

5. Select the C: drive and click Turn on BitLocker. Follow the prompts to create a password that will function as your encryption key. This key is a backup unlocking method in case you forget your password. Keep it somewhere private and safe, such as tufts.box.com.

If you turn on BitLocker and then forget both your log in password and your recovery key, you will not be able to log in to your laptop. Your files and settings will be lost forever as we cannot recover encrypted drives—so save that key!

Do not send your recovery key. Tufts will not save or store your recovery key. Save your recovery in a safe spot that is not within your device for future reference.

You're done encrypting! The next step is to send us proof. See Take a Screenshot of Your Device ID (Windows) on page 9 and Take a Screenshot of Your Proof of Encryption (Windows) on page 10.

Page 9: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 9 of 19

Take a Screenshot of Your Device ID (Windows)

In this procedure, you will need to have the About dialog box displayed. The About dialog box contains your laptop’s device ID.

1. In the Search bar, type “About.” The Search results are displayed.

2. From the Search results, click on About your PC. The About topic from the Settings dialog box is displayed.

3. On the About topic, scroll down to Device specifications and look for Device ID. That’s the number we need.

Page 10: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 10 of 19

4. Take a screenshot of the Device ID. Press Ctrl+Alt+PrtScn and paste (Ctrl+V) the screenshot into a blank Word document.

Take a Screenshot of Your Proof of Encryption (Windows)

We cannot accept screenshots that show that encryption is in progress (it must be complete).

Page 11: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 11 of 19

1. In the Search bar, type “Encryption.” The Search results are displayed.

2. From the Search results, click on Device encryption settings. The Device encryption topic from the Settings dialog box is displayed.

3. Take a screenshot of the Device ID. Press Ctrl+Alt+PrtScn and paste (Ctrl+V) the screenshot into the Word document you pasted your Device ID into.

Page 12: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 12 of 19

4. In the Word document, under the two screenshots, type your Tufts email address.

Page 13: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 13 of 19

5. Save the Word file using the naming convention “firstname.lastname.ENC.” For example, nadeem.karimbux.ENC.

6. Send the Word file to [email protected].

Page 14: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 14 of 19

Encrypt Your Apple Device

This section applies to Apple computers—MacBooks, iMacs, Mac Pros, etc. If you have an iPad, it comes encrypted! Make sure your passcode is set and Find My iPad is turned on—then, if you only have an iPad, you're done! On Apple computers, Mac OS X comes with an encryption feature called FileVault, so you don’t need to download any extra software. You just need to turn FileVault on. Here’s how to do that:

1. Open the Apple menu.

2. Select System Preferences.

3. Select Security & Privacy.

Page 15: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 15 of 19

4. Click FileVault.

5. There is a large button on the right-hand side. If that button is grayed out and says, Turn Off FileVault, then your Mac is already encrypted. You

can now take and send us some screenshots. See Take a Screenshot of Your Serial Number (Apple) on page 16 and Take a Screenshot of Your Proof of Encryption (Apple) on page 17.

If instead the button reads “Turn on FileVault”, continue with these instructions.

6. The Security preferences pane is locked by default, so click the lock icon in the bottom left.

7. You’ll be prompted for an administrator name and password—since you’re on your personal laptop, this is likely your regular username and password you use to log in to the computer.

8. Select Turn on FileVault. If your Mac has multiple user accounts, you will be asked to identify the user accounts that will

be allowed to unlock the encrypted drive (to start the computer or recover from sleep or hibernation). If you’re not sure, select all users.

Page 16: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 16 of 19

Explanation: Users not enabled for FileVault unlock will only be able to log in to that Mac after an unlock-enabled user has started or unlocked the drive. Once unlocked, the drive remains unlocked and available to all users, until the computer is shut down.

9. After enabling users for disk unlock, you will be shown your recovery key. It likely looks like a series of numbers and capital letters, in groups of four, separated by hyphens. This key is a backup unlocking method in case you forget your password. Keep it somewhere private and safe, such as tufts.box.com.

If you turn on FileVault and then forget both your log in password and your recovery key, you will not be able to log in to your laptop. Your files and settings will be lost forever as we cannot recover encrypted drives—so save that key!

Do not send your recovery key. Tufts will not save or store your recovery key. Save your recovery in a safe spot that is not within your device for future reference.

10. FileVault will take between 10–80 minutes to turn on. When you've completed the process of turning on FileVault, you may be prompted to restart your Mac.

You’re done encrypting! Now send us proof. See Take a Screenshot of Your Serial Number (Apple) on this page and Take a Screenshot of Your Proof of Encryption (Apple) on page 17.

Take a Screenshot of Your Serial Number (Apple)

1. On the Main menu, click Apple > About This Mac. The About This Mac dialog box is displayed.

2. Press Command+Shift+4 to take a screenshot of a specific section, i.e., the About This Mac dialog box.

3. Paste the screenshot into a blank Word document.

Page 17: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 17 of 19

Take a Screenshot of Your Proof of Encryption (Apple)

We cannot accept screenshots that show that encryption is in progress (it must be complete).

1. With the FileVault tab displayed, press Command+Shift+4 to take a screenshot of a specific section, i.e., the FileVault tab.

2. Paste the screenshot into the Word document you pasted the About This Mac dialog box into.

3. In the Word document, under the two screenshots, type your Tufts email address.

Page 18: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 18 of 19

4. Save the Word file using the naming convention “firstname.lastname.ENC.” For example, nadeem.karimbux.ENC.

5. Send the Word file to [email protected].

Page 19: Incoming Student Tech Requirements · There are several antivirus options that are free and others that are available for purchase: ... support.apple.com, or the primary vendor: Avast:

Page 19 of 19

Tufts-Approved Tools for Staying Connected

Zoom Recommendations

tufts.zoom.edu

https://sites.tufts.edu/ets/zoom/

https://it.tufts.edu/guides/audio-and-virtual-conferencing-zoom (Pushed out to Tufts-managed workstations. Users should get the install once they log in to VPN.)

How to Log in to Your Tufts Zoom Account

http://tuftsedtech.screenstepslive.com/s/19028/m/94934/l/1217401-how-do-i-log-into-zoom

Tufts Zoom User Guide

https://it.tufts.edu/guides/audio-and-virtual-conferencing-zoom/audio-and-virtual-conferencing-zoom

Zoom Help Center

https://support.zoom.us/hc/en-us

https://support.zoom.us/hc/en-us/articles/201362283-Testing-computer-or-device-audio

Cisco Webex Recommendations

https://tufts.webex.com/webappng/sites/tufts/dashboard/home (Use computer audio when possible.)

Cisco Jabber Recommendations

Download Jabber https://access.tufts.edu/jabber.

On the website, you will be able to find helpful tips. Once Jabber is installed, click on the app, and Jabber will ask you to first enter your [email protected] (e.g., you would enter your UTLN [first letter of your first name followed by the first five letters of your last name] and then 01 -- [email protected]). The you will enter your Tufts username (e.g., jsmith01) and Tufts password. Once doing so, you should be in.