Using Gmail to read UofS Email

30 09 2010

UPDATE 1/10/2012: These instructions are for the University’s old RoyalMail system, which has been superseded by Microsoft Live@Edu. You can find updated instructions in our January 2012 post on Email Migration for Gmail Users.

————————————–

DISCLAIMER : There are important security and policy issues in regards to storing University of Scranton data on non-University of Scranton hardware.  For more information, please see the end of this document

—————————————–

If you’re like me, you’re an email pack-rat. Who knows when something might be useful? You like to hang on to emails and save them, archive them in folders, and squirrel them away until…. you fill up your email quota and go through all your emails, purging pictures and documents from years ago, shedding a few tears for each one. In this post, I’m going to walk you through what, in my opinion, is your best option: migrating everything into your Gmail account.

Why Gmail? Other than its ubiquity (you probably already have a Gmail account!), the email quota itself is worth the switch. Your email quota on RoyalMail is 200 MB, thoughpower users can increase this quota by request. Gmail’s current quota? 7498MB. That’s about 37 times more storage space, AND it keeps increasing. (Need more than that? You can get it, but Google will charge you a couple bucks a month.)

This FAQ will step you through using Gmail for all your University of Scranton email. Other options exist, of course. For example, you can set up email forwarding in RoyalMail (go to settings, mail, choose “enable mail forwarding,” and provide an address). Thunderbird is also an option, but that leaves the mail locally on your computer. Gmail is a web-based program and accessible from anywhere you can get an internet connection, and it will fetch your email is exactly the same manner as Thunderbird will.

So here’s the ever important question: How can I set up my RoyalMail in Gmail?

  1. First, get a Gmail account.  It’s free, quick, and easy.
  2. Next, once you log in, click “Settings” in the upper right hand corner.
  3. Go to “Accounts and Import” and click the button to “Add a POP3 email account”.
  4. A window will pop up asking for the email address that you would like to check. For me, it’s sepinskyj2@scranton.edu
  5. This will open a new window. Type in your password (don’t worry, it’s secure. Just make sure it says “https” in the address bar, and your browser shows you a closed padlock).
  6. Now you have to check some things and set up a couple of options (click “Learn More” in the Gmail window to get even more info). First, make sure the “POP Server” is set to “royalmail.scranton.edu” Port “110”. Gmail is usually smart enough to set this one automatically.
  7. “Leave a copy of retrieved messages on the server” : Normally, Gmail will download the mail locally and then delete from RoyalMail. Your mail will be in your Gmail account, but that is the only place where it is stored. If you would like to access your mail via royalmail.scranton.edu as well as Gmail, click this box. Be warned though, you will still have to worry about your RoyalMail quota!
  8. “Always use a secure connection (SSL) when retrieving mail.”: The University’s servers do not appear to support SSL. Make sure this box is unchecked.
  9. “Label incoming messages”: You have the option to automatically put a label on all the mail coming in from this account. Labels in Gmail are like folders in other mail applications. This will help you keep your “work email” separate from your personal email, if you want to make this distinction.
  10. “Archive incoming messages”: Gmail allows you the option to simply not put the messages in your main inbox. Chances are, you don’t want this button checked.
  11. Click “Add Account” and you should be set to check your mail! It will attempt to access the account and give you an error if you cannot.
  12. Next, you want to make sure that you can send email as your Scranton self, as opposed to your Gmail self. I definitely recommend this, as it looks much more professional. Starting from the same page: Settings -> Accounts and Import, under “send mail as”, click on the button to “send mail from another account”.
  13. Type in your name if it’s not already there, and add your Scranton email address. Click Next Step.
  14. Now you have an option:
  • “Send through Gmail (easier to set up)” : This is easier. BUT, it just looks like the mail is sent from you. It’s doesn’t actually get sent through the university servers. The only place you’ll see a difference is in the email header. If you use this method, it’ll say something like sent by you@scranton.edu, but the actual electronic breadcrumbs will be myaccount@gmail.com. If you’re ok with that, go ahead and click there. They’ll send you a verification email, click the link, and you’re good to go.
  • “Send through yahoo.com SMTP servers (recommended for professional domains)” : This will make sure that it’s not Gmail that’s sending your mail. Gmail will connect to the University’s web server, and literally tell the University’s server to send the mail – so your mail will literally be coming from the University’s computers. When you select this, you’ll be given a set up other options to type in. Simply set: SMTP Server to royalpo.scranton.edu, Port: 465, and make sure you type in your username and password. (Here, you can select SSL if you would like). Click Next, and you’ll get a confirmation e-mail that you’ll need to click. Once you get it, and follow the instructions there, you’re good to go!

Did you try it? Did it work? Let us know in the comment section below!

P.S. Anyone have any tips and tricks for how they manage their mail in Gmail?

———————————————————————————–

Follow-up from Anthony Maszeroski, Information Security Manager at The University of Scranton:

Regarding your most recent post about using Google to read your
university mail:

a.) We really should emphasize that individuals shouldn’t, in general,
be storing their University my.scranton credentials on external systems.
Some institutions have gone as far as writing this into policy.

b.) There are HUGE potential issues with storing University email on
external systems that end users need to be aware of (FERPA,
Court-ordered eDiscovery, Business continuity (access to separated
employee’s email accounts), International legal jurisdiction, PATRIOT
act requests, etc.) See attached draft.

I know that your intentions were good in publishing this article, but it
isn’t sound advice to do this for University-provided email accounts
that are used to conduct official business.

Draft of Potential Security Issues





Software updates and access control (and a tutorial on the network structure of the University)

2 09 2010

MAJOR EDITS 9:35PM, 09-02-2010

Jim Franceschelli posted an update to the university community regarding the newest round of updates that will be coming to campus computers from Information Resources (IR; website). Here is a brief summary of how this will affect faculty and staff at the university.

0) This is the first apparent step (from the faculty point of view) of the more virtualized, transparent interaction between faculty machines and the campus network. While it may not appear so from our point of view, it makes the organization much cleaner on the server-side, i.e., the network administration becomes simpler and less complex, compartmentalizing the network by user type. This is coming right off the heels of a major network rebuild by IR, which means fewer network down times, and shorter network outages (which is a very good thing).

1) Previously, faculty computers did not need to “authenticate” to get access to the university network. This means that any computer plugged into a wall port that was designed for faculty use was allowed full access to the faculty network. This was then controlled on a port-by-port basis: Any computer plugged into the port in your office was connected to the faculty network, regardless of who the computer actually belonged to. And, if you plugged your computer into a port normally relegated for student use, you were relegated to the student network space, which left you unable to access certain network resources (departmental printers, for example). With the recent upgrades to the campus network, each network port now has the ability to be assigned to any virtual network. This means that, when you plug in your computer, you can be assigned to any of the on-campus networks (wireless, student, faculty, staff, dining services, etc., all have their own designated “network space”). Thus, instead of making the decision as to what network you belong to based on where you are connecting your computer, the decision as to what network you belong to is based on who you are and what community you are a part of (e.g., administration, faculty, dining services, etc.). So… where does this new update fit into the whole scheme?

2) The key in the previous point is that your digital identity is now the factor in deciding what network resources you have access to. Over and above that, for security purposes, IR would really like to allow you access to those resources, making sure that you are the one using it, not someone else who has somehow managed to get onto your computer. At the present time, there is no additional level of authentication, i.e., anyone using your computer looks like you. The first and foremost reason for requiring you to install Cisco Network Admission Control is to make sure that the only person accessing your network resources is you. Thus, this piece of software will require you to log in with your my.scranton username and password (which no one else other than you knows anyway, right?). But what about this “up to date packages” part of it all? Well…

3) As we said, this is the first apparent step in the upgrade of our campus network. With the installation of Cisco Network Admission Control, not only does it allow you to authenticate* to the network, this software has some additional advantages over a simple password-only based authentication. Cisco Network Admission Control, when running, has the ability to look at your critical software components (e.g., windows system files, web-browser updates, critical system patches, etc.) and make sure that no identified security vulnerabilities are present. This is not currently implemented into the installation configuration. It will be implemented in the near future (there is a possibility for an October timeline, but this is still in flux), with the added benefit of eventually prompting and directing you through the install of these critical software updates (eventually even doing so automatically) and patches to make sure your computer is safe, protected, and able to get onto the internet.** So where do you fit into the picture?

4) In order to implement this level of security, you will need to have Cisco Network Admission Control installed on your computer. Starting on 09/08/2010 in the first and second floor, west wing of St. Thomas (and following the schedule posted here), IR will be converting the behind-the-scenes infrastructure such that you will not be able to log on to the campus network without Cisco Network Admission Control installed! Once they have implemented this change, your internet browser will alert you of the required software and will (painlessly) step you through the installation procedure to install Cisco Network Admission Control on your machine. You will then be able to log in with your my.scranton username and password*** and continue to access the campus network and the world wide web at your leisure! So… what comes next?

5) As the behind-the-scenes updates from IR progress, you will be periodically required to re-authenticate to the network. This will simply provide some additional security, and allow Cisco Network Admission Control to periodically make sure everything is still A-OK on your computer, look for any flaws or critical system components that have been compromised or are in need of updating, and, eventually, even perform those updates for you! This exciting feature is coming soon to a computer near you!

Please see the below post e-mailed to the faculty today. If you have any questions or comments, please post them below. You can also join the discussion at tag-discussion@royallists.scranton.edu (see this post for instructions on how to sign up!).

* By “authenticate”, I mean “be recognized by”. This is just like showing an ID badge, swiping your Royal Card, or typing in your password at an online shopping site. You are proving your authenticity to the program, and it is allowing you access to whatever resources you are requesting, provided you have met all of its criteria.

** The extra time spent installing the updates is far shorter than the time it takes to fix your computer if it becomes infected with a virus. Currently, it takes nearly 3 full days of analysis whenever a computer is infected by a virus to make sure that no restricted information was passed to an outside source. This is a much more detailed and rigorous process than most are aware of, stemming from federal regulations regarding privacy laws. Hopefully we can post something about this is a future blog entry.

*** The login information for your computer will not change! Thus, your preferred username and password needed to start windows will not change. This will only affect your ability to access network resources (i.e., software not directly installed on your machine).

To All University of Scranton Faculty and Staff:

The University of Scranton provides our campus community with a robust environment consisting of over 2,000 desktop and laptop machines. Managing and ensuring the security of these machines has become increasingly challenging. In order to improve our services to you and increase our information security posture, we will be making changes to the way that desktop systems look and how they operate. Upcoming changes include a move to Internet Explorer 8.0 for using services found @scranton.edu sites, use of Firefox as the default internet browser, automation of additional third party application updates, a change in our anti-virus protection, and the deployment of Windows 7.

The next change that you will experience starting on September 7th is the deployment of the Cisco Network Access Control (CNAC) system for all computers connecting to the University network. This system will require end-users to go through a process similar to the one currently used to connect to the wireless network (RoyalAir); meaning that you will be required to authenticate — enter your username and password — before gaining access to the network. The CNAC system will help us to validate that only individuals who should have access to our network resources will have access and, eventually, will help us to monitor the “health” (up-to-date patches, operating systems, etc) of the desktops that are connecting to our network. Collectively, this will insure a more robust and secure electronic working environment for all of us.

The implementation of CNAC will begin on September 7th and is expected to take 30 days for campus wide implementation. The implementation will occur in small network segments that are grouped by building and by floor. Network changes will be made overnight and users of the segment will notice the change the following morning. To assist end-users, information about the planned schedule for deployment can be found at www.scranton.edu/CNAC-Deployment . IT Services staff will be available and located in each of the affected areas as we work our way across campus.

We appreciate your patience and understanding as we continue to improve. If you have any questions or concerns, please contact the Technology Support Center at 941-Help or at Techsupport@scranton.edu

Special thanks to Jim Franceschelli and Tony Maszeroski for their help in writing and correcting the above tutorial.





IT Forum on Mobile Devices

30 08 2010

IR is hosting an IT Forum on mobile devices next month… here’s the ad:

Would you like to know more about using and getting support for mobile devices?

Come to the IT Forum on September 21st from 11:30 am to 1:00pm in BRN 509 and learn about purchasing, configuring and getting support for some of the latest Droids and the iPad.

Presentation by
Diane M.  Jachimowicz, Senior Technology Services Analyst and
Kathy Boock, Customer Support Specialist

Lunch will be served and there will be prizes!! All members of our community are encouraged to attend. Registration is required by September 17th, by emailing  ITServices@scranton.edu.

 

—-UPDATE: Slides for the Forum are here (.ppsx).





Computer Training

23 08 2010

Just a reminder that Library systems specialist Vince Yanusauskas provides basic computer training workshops for University faculty and staff.  He’s just posted his September schedule, which includes workshops on Oracle Calendar, Excel 2007, Word 2007, and Royal Drive 7.0.





Technology on Your Own Terms Fall 2010

13 08 2010

Faculty members interested in learning more about emerging technologies might be interested in Technology on Your Own Terms, a training series offered each semester by the Weinberg Memorial Library and the Center for Teaching & Learning Excellence (CTLE).  The series introduces University faculty and staff to emerging technologies in a hands-on environment, in order to encourage innovation in the workplace and in the classroom.  The Fall 2010 series is themed “Get to Know Google” and features workshops on four different Google services.  All faculty are welcome, but seats are limited, so please register for sessions you plan to attend at www.scranton.edu/ctleregistration (select Special Event).

Just Google It!
Tuesday, September 14 from 12pm – 1pm

One billion results in 0.27 seconds! When you need information, chances are you use Google™ to find it.  In this workshop, you will learn how Google’s Web search engine works.  You will also learn some tips to help you improve your search experience as well as some of Google’s special features, such as Google Books and Google Scholar. (Taught by Bonnie Oldham, Weinberg Memorial Library)

Google Docs: An Excellent Way to Create, Collaborate on, and Securely Store Documents
Friday, October 1 from 12pm – 1pm

This workshop will introduce you to Google Docs, a service that allows you to create documents that parallel Microsoft Office:  Word, Excel, and Powerpoint. It also allows for the creation of online surveys and the storage of any type of document in a very secure environment. Google Docs offers excellent collaborative opportunities for working on any supported document type with both peers and students, meaning that the tool can be used for course paper submissions, faculty feedback, collaborative student projects, club, or research purposes. (Taught by Dr. Tim Cannon, Psychology/Neuroscience)

Get Where You’re Going with Google Maps
Tuesday, October 12 from 12pm – 1pm

Many people know that you can use Google Maps to get driving directions from one place to another. But did you know that you can also use Maps to scope out a vacation destination, find the closest Italian restaurant, or make a custom map for a friend or a project?  In this workshop, you’ll explore specialized features and tools available in Google Maps to help you get where you want to go.  (Taught by Kristen Yarmey, Weinberg Memorial Library)

Does Google Give You A Voice?
Thursday, November 4 from 12pm – 1pm

In this workshop, we will explore Google Voice, a recently-made-public service of the search giant.  Google Voice offers one central phone number, which can be setup to call your other phones based on caller, time of day, etc.  Other features of the service include visual voicemail, personalized greetings, voicemail transcription, international calling, and a lot more.  It is easy to set up… Learn how! (Taught by Eugeniu Grigorescu, CTLE)