Author Archives: Chris Norris

Exchange Public Folders Will Be Unavailable 8/30–8/31

The migration of Middlebury’s email services to Microsoft’s Office 365 cloud environment is well underway. As of Friday, August 26th, we have moved 87% of all mailboxes to the cloud. Thank you so much for the help and feedback to date, it wouldn’t be possible without your support. The migration schedule can be found at http://go.middlebury.edu/cloud, updated daily.

For those of you that use Exchange Public Folders for departmental calendars, etc., we have an update. Public Folders will be unavailable for access from Tuesday, August 30th through Noon EST on Wednesday, August 31st. Public Folders are handled differently from mailboxes in Microsoft Exchange, and because of that difference they will be unavailable during their migration to the cloud.

When they are available again on August 31st, some users may need to re-open the Public Folders they normally access. We apologize for any inconvenience this may cause.

Here are the instructions for Outlook 2016 for Windows:

In Outlook, press Ctrl-6 to open the Folder View. You should see something like this:

public_folders

To add a public folder to your Favorites, right-click the folder, then select Add to Favorites…. You should now be able to access it whenever you need it, including in the Calendar screen under “Other Calendars.”

Other platforms:

Thanks again for your support and understanding. Please contact the Helpdesk with concerns or issues.

Email Security Update: New Spam Quarantine Feature Launches 7/22/16

ITS will implement a new “spam quarantine” feature on Friday, July 22, 2016. This change will help keep spam and phishing messages out of your mailbox, better protecting the Middlebury College community from phishing attacks and other email-borne threats. The new quarantine feature will change how you manage messages identified as spam by the mail system. Spam email will now be placed in a separate quarantine area, rather than being directed to your Junk Email folder.

Important: All messages in your quarantine area should be treated with special caution as they are most likely harmful to you and others! Do not click any links in these messages or release them to your Inbox unless you are absolutely sure that the message is legitimate. Be particularly suspicious of messages asking you to update your account, reset your password, expand your email storage quota, etc. Remember, any message that asks for your password or username is not to be trusted. For more information about how to protect yourself from phishing attacks, please see go/phish.

Messages identified as spam will be stored in the Spam Quarantine for 15 days. If you have received suspect messages, Microsoft will send you a daily “Spam Notification” email message. The messages are sent from quarantine@messaging.microsoft.com, once per day.

You can check your Spam Quarantine at any time by logging into go/quarantine (or directly via https://admin.protection.outlook.com/quarantine).

If you are missing a time-critical message, check your Junk E-Mail folder first, then check the Spam Quarantine, via go/quarantine.

For more details on managing the spam with the Spam Quarantine, as well as tips on how to use the the Blocked Senders/Safe Senders tools to allow or block specific email message senders, please visit go/spam.

Sophos Anti-Virus for Home Use

All Middlebury students, faculty, and staff are entitled to a full installation of Sophos anti-virus software for use on a personally-owned computer. ITS has changed the location for virus definition updates and request that all users update their Sophos clients on their personally-owned computers. The latest installers are now available at http://go.middlebury.edu/sophos.

These versions are for student and faculty/staff home-users, on their personally-owned devices. Middlebury provides managed anti-virus software for Middlebury-owned devices that updates automatically. Please do not attempt to install a home-use version of Sophos on a Middlebury-owned system.

Thank you!

AT&T Enables Wi-Fi Calling for iPhone 6 and up w/ iOS 9.x

Following T-Mobile and Sprint, AT&T has just enabled a much-anticipated feature called Wi-Fi Calling for people who have an iPhone 6, 6 plus, 6s, or 6s plus running iOS 9.x on AT&T.

From AT&T’s web site…

With Wi-Fi Calling, you can talk and text over Wi-Fi when cellular coverage is limited or unavailable. For example, some indoor locations may be difficult for even a strong cellular signal to reach. Now, with a Wi-Fi connection, you can talk and text in those hard-to-reach places.

  • Wi-Fi Calling is easy to set up and use.
  • Once you set up Wi-Fi Calling, your phone automatically detects when to use it. Wi-Fi Calling will only be used if cellular coverage is weak or unavailable.
  • It works with your AT&T mobile number and compatible device—no new number or app required.

Once you set up Wi-Fi Calling on your phone, you’ll be able to enjoy the benefits. Just follow the steps in your phone’s settings to get started.

  • Make and receive unlimited domestic calls within the U.S., Puerto Rico, and U.S. Virgin Islands at no additional charge.
  • International long distance rates apply for calls made to international numbers.
  • Text messages sent or received using Wi-Fi Calling are counted and charged under your existing rate plan.

Here is a link to AT&T’s FAQ page on Wi-Fi Calling that should answer any questions that you might have.

Middlebury Google Apps Issues (10/9/2015)

At 3:07pm (ET) Google made us aware they they are investigating issues with Google Drive and related services like Docs, Sheets, and Slides. These issues are affecting all Google Apps customers, not just Middlebury. While it is not yet clear on when these issues will be resolved, in our experience, resolution by Google tends to be fairly quick.

Google’s official Apps status updates can always be found here: http://www.google.com/appsstatus#hl=en&v=status

This post will be updated when the issues have been resolved. Thanks for your patience!

Incoming Email Services Disruption (Resolved)

Please note that there was an unexpected disruption to Middlebury’s incoming email services this morning. The issue has since been resolved. Please see below for more details.

Between 8:30 AM and 10:00 AM (ET), Middlebury’s email system was unable to receive incoming email sent from external addresses. Email messages sent to @middlebury.edu and @miis.edu email addresses from external addresses were rejected by Middlebury’s email servers. External senders would have received a “Non-Deliverable Notice” notifying them of the problem. Internal email messages, i.e. messages sent from @middlebury.edu or @miis.edu addresses, were not impacted.

The problem was corrected at approximately 10:00 AM (ET). External senders should be advised to resend messages that were rejected before the problem was resolved.

Middlebury Security Alert for iOS Users

Middlebury ITS Information Security is currently investigating indications that members of the Middlebury community are using iOS apps infected with the recently discovered XCodeGhost malware.

XCodeGhost-infected apps can potentially steal private information and even launch phony authentication dialogues that can be used to attempt to steal usernames and passwords. Despite this capability, no information has yet come to light indicating that the infected apps were used for malicious purposes, such as harvesting personally identifiable information or stealing passwords

The majority of the XCodeGhost-infected apps were authored by Chinese developers who were tricked into downloading fake Apple development libraries. Therefore, the greatest impact of the XCodeGhost appears to be in China.  Some apps have been identified, however, that have world-wide use, including WeChat, Baidu, and others.

If you have an iOS device, our recommendation is that you remove from the device any apps known to be compromised with XCodeGhost. Download and reinstall the app from the Apple App Store once a fixed version has been made available.

A list of known bad apps can be found here: http://www.apple.com/cn/xcodeghost/#english

Additional details on XCodeGhost can be found here: https://labs.opendns.com/2015/09/21/xcodeghost-materializes/

Questions regarding this security alert may be directed to infosec@middlebury.edu.