Current IT Alerts

Most Recent Outages

Dec
19




  •  
  • Subject: Hyperion will be permanently demised on 12/19/2014.

    Hyperion has been retired from public use for 1 year and has been completely replaced by MyReports reporting solution. On Friday 12/19/2014 Hyperion server will be permanently shut down."
    Period: 12/19/2014.
  •  
  • LoboWeb & INB Unavailable,12/20/14, 6:30 – 9:30 A M

    To ensure UNM remains compliant with Federal tax form changes for 2015, LoboWeb (SSB) and INB will be unavailable on Saturday, Dec. 20th between 6:30 AM – 9:30 AM while IT applies a regulatory upgrade to Banner.

    During the upgrade the following services will be unavailable:

    LoboWeb
    LoboTrax
    Internet Native Banner
    FAMIS
    Bursar Account Suite (TouchNet)
    Xtender"
    Period: 12/20/14, 6:30 – 9:30 A M
  •  
  • ePrint unavailable Saturday morning, Dec. 20th from 5:00 AM - 7:00 AM

    To ensure continued availability of ePrint services and to stay current with vendor patches, ePrint services will be unavailable Saturday , December 20th between 5:00 AM and 7:00 AM while the server software is upgraded."
    Period: Dec. 20th from 5:00 AM - 7:00 AM

    Dec
    18




  •  
  • Wireless network authentication maintenance, 12/22/2014, 8:00 - 9:00 AM

    To improve the security and performance of UNM WiFi networks, UNM IT is modifying the authentication process for Lobo-Guest on Monday, Dec. 22nd between 8:00 AM and 9:00 AM that morning. No outage is expected."
    Period: 12/22/2014, 8:00 - 9:00 AM

    Dec
    17




  •  
  • DSS (demographic self service) change 12/17/2014, 3:00 – 5:00 PM

    In order to resolve a naming (DNS) conflict and allow HSC users to access DSS (demographic self service), UNM IT is adding a new URL for accessing it (http://dssmain.unm.edu). The change will occur Wednesday, December 17 between 3:00 PM and 5:00 PM. No outage is expected.

    HSC users should use the new URL to access DSS.

    "
    Period: 12/17/2014, 3:00 – 5:00 PM
  •  
  • Planned Wireless Network Downtime at Gallup campus, 12/22/14, 7:00 - 7:30 AM

    To improve network security and performance, the code on the wireless network controllers at the UNM Gallup campus will be upgraded on Monday, Dec 22nd. There will be no wireless connectivity between 7:00 AM and 7:30 AM that morning."
    Period: 12/22/14, 7:00 - 7:30 AM
  •  
  • Wireless network authentication maintenance, 12/22/2014, 6:30 - 7:00 AM

    To improve the security and performance of UNM WiFi networks, UNM IT is upgrading the authentication server (Clearpass) on Monday, Dec. 22nd between 6:30 AM and 7:00 AM that morning. No outage is expected."
    Period: 12/22/2014, 6:30 - 7:00 AM
  •  
  • UNM Learn planned outage on 1/3/15, 5:30 AM – 12:00 PM

    UNM Learn will be unavailable on Saturday, January 3rd, from 5:30 AM until 12:00 PM (noon), for system updates. This outage is taking place during the UNM Learn routine maintenance window (http://it.unm.edu/availability).

    Please note times are best estimates and may vary depending on issues encountered when carrying out the scheduled work.

    Thank you for your patience as we work to improve the UNM Learn service."
    Period: 1/3/15, 5:30 AM – 12:00 PM
  •  
  • Network security upgrade, 1/6/15, 6:30 – 8:00 AM

    To ensure the continued security and stability of the UNM network, UNM IT will upgrade intrusion prevention systems Tuesday, January 6th between 6:30 AM and 8:00 AM. No outage is expected."
    Period: 1/6/15, 6:30 – 8:00 AM

    Dec
    10




  •  
  • Voice Mail Maintenance Thursday, December 11 8:00 p.m.


    There will be no access to the Voice mail system Thursday, December 11 beginning at 8:00 p.m. for approximately 15 minutes while IT restarts the servers to apply Windows Updates. Critical departments with auto attendants will be temporarily re-routed.

    If you experience any issues with your voice mail services after the maintenance window please contact the IT Support Center at 277-5757."
    Period:

    Dec
    8




  •  
  • Symantec End Point protection error message - Ongoing

    Symantec End Point users MAY receive the following message, ""Browser Intrusion Prevention is malfunctioning. Check the System logs for details.” IT is aware and working to resolve the issue. There is no ETA for resolution at this time,
    "
    Period: 12/04/14 Ongoing

    Dec
    4




  •  
  • IT is aware of connectivity issues related to Lobo-Sec.

    The current solution for connectivity issues is to forget the network, and rejoin it using the known Lobo-Sec passphrase. For information about how to connect to Lobo-Sec, please see
    FastInfo# 6515 for PCs, or
    FastInfo# 4744 for Macintosh computers. "
    Period: current

    Dec
    3




  •  
  • UPDATE: Intermittent LoboMail login issues, possible work around

    If you are experiencing this issue please try to log in here: https://outlook.office365.com
    You will provide your email address and then will be redirected to the Lobomail login.

    We have been seeing intermittent issues with LoboMail login. Users will get the following error when trying to login:

    There was a problem accessing the site. Please try again.

    If the problem persists, please contact the service desk of this site and provide the reference number to identify the problem

    Reference number:

    ALSO some users getting the following error:

    sorry, we can't process your request
    We're investigating right now. Please try again later.
    Support information
    Correlation ID: (long string of number and letters changes each time)
    Error Code: 0

    Collaborative Apps is working with WES to try to identify and troubleshoot the issue, but the fact that it is intermittent and not easily reproducible is presenting a challenge. If users call in to report this issue, it would help us if we could have the time that this error was received if possible. In the cases where we have seen it occurring, the users can log in with no problems after a few minutes.

    Thank you!

    John R Paez
    Technical Support Analyst I
    IT Applications: Collaborative Applications Team"
    Period: problem 10108 10/18/2014
  •  
  • Adding Attachments to LoboMail issues

    UNM IT has identified a LoboMail issue affecting Google Chrome, Firefox, and Safari users. In certain circumstances, users are not able to add attachments to emails. When email is being composed in a separate pop-up window, attachments can be added to the first message composed, but cannot be added to subsequent new emails. Changing LoboMail settings to compose email in the reading pane will remedy the problem.

    To fix the issue with adding attachments more than once, change the setting
    ‘Gear’ > Options > Settings > reading pane > When writing email messages: > Type in a new window
    To
    ‘Gear’ > Options > Settings > reading pane > When writing email messages: > Type in the reading pane

    UNM IT has opened a service request with Microsoft to develop a permanent solution.
    "
    Period: 10/30/14-ongoing

    Dec
    2




  •  
  • Microsoft Office ProPlus software is now available to all UNM Faculty and Staff at no cost.

    All UNM faculty and staff with LoboMail accounts have been licensed for Microsoft Office ProPlus software as of December 2, 2014 and can be downloaded from the Software section of their Office 365 web page. Office ProPlus is a fully functional copy of Microsoft Office that uses Cloud technologies to enable web distribution and a license to the user. UNM IT FastInfo 7233 has information on installing Office ProPlus on your computer or mobile device.
    "
    Period: 12/02/2014

    Nov
    25




  •  
  • New Tool, EvaluationKIT to Replace IDEA, 11/25/2014

    In order to improve the overall experience of faculty course evaluation, UNM has chosen EvaluationKIT to replace the existing IDEA (Individual Development & Educational Assessment) tool. EvaluationKIT will be active in production for a pilot release on Tuesday, 11/25/2014 with plan to release to campus over the Spring and Summer of 2015.

    Some benefits of EvaluationKIT (over IDEA) include:
    - Eliminate paper-based evaluations,
    - Easier to understand reports, and
    - Lower administrative support and overhead.

    For more information regarding EvaluationKIT, please visit: http://coursefeedback.unm.edu"
    Period: 11/25/2014

    Nov
    21




  •  
  • LoboMobile v2 Released to App Stores, 11/21

    In order to keep up with vendor updates and patches, LoboMobile will be upgraded to version 2 and released to the Apple and Google Play app stores on 11/21. Users of LoboMobile are encouraged to download the update from the app stores once it is available. Older versions of LoboMobile are expected to stop working on 12/11."
    Period: 11/21/14

    Nov
    18




  •  
  • Critical Out-of-Band Microsoft Patch

    Earlier today Microsoft released an out-of-band patch for a vulnerability in Kerberos Key Distribution Center (KDC). Kerberos is the mechanism used to exchange the cryptography keys in Active Directory Authentication (AD). The vulnerability allows a person with a valid AD credentials to escalate those privileges to those of a domain administrator. Microsoft strongly encourages customers to apply this update as soon as possible. Information Technologies and the UNM Information Security team are working together to test, patch, and verify core UNM enterprise services at this time.
    References
    Microsoft Security Bulletin MS16-068
    blogs.technet.com/b/msrc/archive/2014/11/18/out-of-band-release-for-security-bulletin-ms14-068.aspx CVE-2014-6324

    "
    Period: 11/18/14

    Nov
    3




  •  
  • Microsoft changes to lobomail attachment feature

    Microsoft has changed the attachment feature in LoboMail to include the option to attach OneDrive files. We will be updating our documentation to reflect this change. To attach a document from your computer, open the ‘Insert’ pulldown, choose ‘Attachments or OneDrive files,’ and choose ‘Computer’ from the pane on the left hand side. Once you locate the file and click ‘Open,’ choose the ‘Send as Attachment’ option."
    Period:

    Oct
    18




  •  
  • IT Security Team is addressing current system security vulnerabilities

    This week, two new significant computer security vulnerabilities were discovered, called Poodle and Sandworm. The UNM IT Security Team is addressing this now. See below for more information.
     
    The Poodle vulnerability affects Macs and PCs through web servers and browsers.  If you are on UNM IT’s managed workstation service, you do not need to make changes to browser settings, otherwise, please ensure you update and patch your operating system and browsers to the latest versions.

    The Sandworm vulnerability affects only current Windows products, up to and including Windows 8.1 and Server 2012. Microsoft released a patch (MS14-060) for Sandworm earlier this week as part of its “Patch Tuesday” updates. Please ensure this is installed.
    "
    Period: 10/17/14 Ongoing

    Oct
    8




  •  
  • Meeting Free/Busy information for HSCLink users is not available for LoboMail Office 365 users

    Meeting Free/Busy information for HSCLink users (email addresses “@salud.unm.edu”) is not available for LoboMail Office 365 users at this time. This functionality will be added as part of HCSLink/LoboMail integration work in progress."
    Period: October 8, 2014

    Sep
    26




  •  
  • Shellshock Bug

    As you may have heard, there is a new, potentially widespread, vulnerability affecting computers, but more commonly servers, dubbed Shellshock.

    What UNM is doing
    The Information Technology department is aware of the Shellshock bug and has been actively scanning and updating our servers, where appropriate, to address any vulnerabilities. Many UNM services, including Lobomail and MyUNM, have not been affected. While the threat is serious, the impact is not yet known. However, UNM IT already has multiple layers of protection in place to prevent the exploitation of these types of vulnerabilities.

    What you should do
    Don't panic. Not all systems are vulnerable, and many websites are already installing patches on their systems.
    The best defense against vulnerabilities like this one would be to adhere to these security best practices:
    1. Routinely change passwords.
    2. Using different passwords for different websites, especially your financial websites.
    3. Use your UNM NetID and password combo only for UNM sites and business. Do not use this combination of username and password on 3rd party sites, trusted or not.
    4. Use multifactor authentication when possible. Many sites, like banks, credit unions and even Facebook, now offer this service but do not require it.
    5. Expect new email phishing and social engineering campaigns to take advantage of this wave of fear many users may now have in the wake of this announcement.

    To find out more about this bug, visit https://www.us-cert.gov/ncas/alerts/TA14-268A.

    For a comprehensive, updated list of consumer sites affected by Shellshock, please visit http://www.pcworld.com/article/2687857/bigger-than-heartbleed-shellshock-flaw-leaves-os-x-linux-more-open-to-attack.html.
    The UNM Security Team continues to ensure the University's data is protected and we will keep you updated.
    "
    Period:

    Jun
    30




  •  
  • "OneDrive rollout begins today, June 30"

    OneDrive for Business will begin rolling out to UNM students, staff and faculty today, Monday June 30. OneDrive for Business will provide 25 GB of storage space to all users. For more information please search for "OneDrive" in Fastinfo or see this answer: https://unm.custhelp.com/app/answers/detail/a_id/7207/
    The complete rollout may take until July 9. If you do not have access to OneDrive after that date, please contact the IT Service Desk."
    Period: June 30

    Apr
    15




  •  
  • THIS IS A CRITICAL INTERNET SECURITY BULLETIN

    To all UNM Students, Staff and Faculty:

    THIS IS A CRITICAL INTERNET SECURITY BULLETIN

    As the news or social media may have informed you, there is a widespread bug affecting the Internet, dubbed Heartbleed.

    To find out more about this bug, please visit http://www.us-cert.gov/ncas/alerts/TA14-098A.

    What UNM is doing:
    The Information Technology department is aware of the Heartbleed bug and has been actively scanning and updating our servers, where appropriate, to address any vulnerabilities. Many UNM services, including Lobomail and MyUNM, are unaffected.

    What you should do:
    Don't panic. Not all systems are vulnerable, and many websites are already installing patches on their systems.

    The best defense against vulnerabilities like this one would be to adhere to these security best practices:
    1. Routinely change passwords.
    2. Using different passwords for different websites, especially your financial websites.
    3. Use your UNM NetID and password combo only for UNM sites and business. Do not use this combination of username and password on 3rd party sites, trusted or not.
    4. Use multifactor authentication when possible. Many sites, like banks, credit unions and even Facebook, now offer this service but do not require it.
    5. Expect new email phishing and social engineering campaigns to take advantage of this wave of fear many users may now have in the wake of this announcement.

    For a comprehensive, updated list of consumer sites affected by Heartbleed, please visit:
    http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/

    We continue to ensure the University's data is protected and we will keep you updated.

    Thank you,
    UNM Information Security Team
    "
    Period: 4/11/2014

    Mar
    19




  •  
  • Microsoft end of support for Windows XP

    March 10, 2014
    Microsoft has announced that Windows XP, originally released in 2001, will reach 'end of support' on April 9, 2014. End of support means what its name implies, that Microsoft will no longer support this version of Windows, but a more critical issue is that Microsoft will stop issuing security or system updates that will continue to protect your computer from viruses, malware, and other potential security risks.
    Because Microsoft has announced this, you can also expect other software manufacturers to abandon support and development for Windows XP software, making it more difficult to use that particular version of Windows.
    There are 2 recommended actions that you can take if you are using a computer running Windows XP:
    1. Upgrade your PC to either Windows 7 or Windows 8. Please contact your departmental IT representative to get information on upgrading or contact UNM Information Technologies Customer Support at 277-5757 for further assistance.
    2. Purchase a new PC capable of running Windows 7 or Windows 8. LoboMart has a selection of Dell computers available to purchase.
    "
    Period: April 9, 2014

    Jul
    3




  •  
  • Phishing emails targeting UNM Learn users

    Please be aware that some users are receiving phishing e-mails purporting to be from Blackboard. A sample message is below. If you receive one of these e-mails, you should delete it immediately. Do not reply, click any links, or submit any personal information.

    UNM IT Security has been notified of the phishing attempt and are taking steps to minimize the impact as much as possible.

    UNM Learn Support

    New Media & Extended Learning

    --------------------------------------------------------------

    Sample Phishing Message (text may vary):

    Subject: New Post: Course Information

    *** Blackboard Post Notification ***

    Information regarding a course has been posted to you on the Blackboard Learning System.
    Kindly click on the "View Information" button below immediately:

    View Information (link omitted)

    Thank you,

    Blackboard Learning System."
    Period: 7/3/2013

    Computing General Issues

    ↑ Top



    Nov
    25




  •  
  • Access to External Websites Redirecting to Incorrect Site

    Some users are reporting external websites such as CraigsList are redirecting to an incorrect site. To resolve this error, users should clear their browser cache by shutting down and restarting their browser."
    Period:

    Computing Other

    ↑ Top



    Nov
    25




  •  
  • Access to External Websites Redirecting to Incorrect Site

    Some users are reporting external websites such as CraigsList are redirecting to an incorrect site. To resolve this error, users should clear their browser cache by shutting down and restarting their browser."
    Period:

    Sep
    26




  •  
  • Shellshock Bug

    As you may have heard, there is a new, potentially widespread, vulnerability affecting computers, but more commonly servers, dubbed Shellshock.

    What UNM is doing
    The Information Technology department is aware of the Shellshock bug and has been actively scanning and updating our servers, where appropriate, to address any vulnerabilities. Many UNM services, including Lobomail and MyUNM, have not been affected. While the threat is serious, the impact is not yet known. However, UNM IT already has multiple layers of protection in place to prevent the exploitation of these types of vulnerabilities.

    What you should do
    Don't panic. Not all systems are vulnerable, and many websites are already installing patches on their systems.
    The best defense against vulnerabilities like this one would be to adhere to these security best practices:
    1. Routinely change passwords.
    2. Using different passwords for different websites, especially your financial websites.
    3. Use your UNM NetID and password combo only for UNM sites and business. Do not use this combination of username and password on 3rd party sites, trusted or not.
    4. Use multifactor authentication when possible. Many sites, like banks, credit unions and even Facebook, now offer this service but do not require it.
    5. Expect new email phishing and social engineering campaigns to take advantage of this wave of fear many users may now have in the wake of this announcement.

    To find out more about this bug, visit https://www.us-cert.gov/ncas/alerts/TA14-268A.

    For a comprehensive, updated list of consumer sites affected by Shellshock, please visit http://www.pcworld.com/article/2687857/bigger-than-heartbleed-shellshock-flaw-leaves-os-x-linux-more-open-to-attack.html.
    The UNM Security Team continues to ensure the University's data is protected and we will keep you updated.
    "
    Period:

    Jul
    23




  •  
  • Popejoy telephone system (PBX)

    UNM IT Telephone System (PBX) received a lightning strike last evening at 9:30 pm and lost part of the telephone system. We rolled and triaged but seeing intermittent issues this morning - we started working on this at 6:30 am again this morning

    Key buildings effected

    SUB - student union building
    Woodward - MTS
    Parking Structure
    Arch and planning
    Bookstore

    Will update once we triage the lightning strike effect."
    Period:

    Jul
    3




  •  
  • UNM's security is currently blocking heroku.com and all Heroku's hosted websites/web apps.

    UNM's security product vendor identified heroku.com and Heroku's hosted websites/web apps as potential security risk and is currently blocking heroku.com and all Heroku's hosted websites/web apps from being accessible from the UNM networks. The block will remain until heroku.com and Heroku's hosted websites/web apps are identified as safe again."
    Period:

    Nov
    12




  •  
  • LoboMail error message that attachments have been quarantined by pmexchsvc@unm.edu

    Users are getting an error message stating that an attachment has been quarantined by pmexchsvc@unm.edu.

    Work around: The work around is to check the attachment name. There can be only one dot in any attachment's file name. If it is filename.something.docx then the . need to be changed to - or be removed. The system is reading it as a double extension. Example: Copy.1. xlsx. should be changed to copy-1.xlsx


    "
    Period:

    Feb
    12




  •  
  • MAC Book network issues 2/12/10

    We are experiencing system issues that are preventing some MAC book clients from connecting. We are working with our vendor to resolve the issue.
    "
    Period: