IT Orientation
A warm welcome from the IT team. We are thrilled to be partnering with you as you participate in an exciting educational journey.
Our mission as the business enablers is to facilitate high-quality teaching, learning and research for the community, through reliable, effective, secure, accessible and scalable IT solutions.
We offer a wide range of IT services to students, faculty and staff. Our primary functions include the operations of:
- The IT helpdesk user support, to help you with all your IT incidents and requests.
- The classrooms audio visual technologies, to ensure non-disruptive delivery of online/hybrid/in-class teaching.
- Supporting teaching and learning strategies.
- Business and collaboration applications, such as, Zoom, Google Apps, etc.
- IT infrastructure and security, to ensure you have secure and non-disruptive connectivity to the information resources
We have put together a very useful IT orientation content for you which will enable you to learn about the IT services on offer with best practice advice on their use. We are here to support you with all your IT needs.
Thank you
Farukh Zeeshan – Chief Information Officer
The IT User and Audio Visual (AV) Support team is responsible for providing first line support and serves as a single point of contact for the community to gain assistance in IT and AV issues and all your IT needs.
All IT incidents and requests must be reported to IT via email guqhelpcenter@georgetown.edu or telephone +974 4457 8130. Our office is based in the lower ground floor, room LE09, next to the Mailroom.
We provide technical support to staff, faculty and students on the use of the technology, such as, Zoom, Box, Google Apps, VPN, Wireless, NetID, Printing, Microsoft Windows/Office, MacOS etc.
We also provide training to faculty in the use of technology in the classrooms for in-person and hybrid teaching and students can also request training.
The GU-Q IT website contains useful help pages on IT services https://it.qatar.georgetown.edu you can also visit the University Information Services website at https://uis.georgetown.edu.
A Short Video by Farukh Zeeshan (CIO) describing the AUP, its principle and key points
What is it?
The AUP establishes the appropriate use of computing and network resources and embodies the principles of respect and reverence for every person that are at the core of Georgetown’s Catholic, Jesuit identity. Applies to anyone using the University’s information technology resources.
Guiding Principles
You are encouraged to make innovative and creative use of information technologies in support of education and research. The computing and network facilities of the University are limited and should be used wisely and carefully with consideration for the needs of others. This policy is intended to respect the rights and obligations of academic freedom.
https://security.georgetown.edu/it-policies-procedures/computer-systems-aup
Key Points:
- Fair use allows you to enjoy legally acquired music, movies and software, but you must avoid unauthorized redistribution or use of copyright content.
- Digital Millennium Copyright Act (DMCA)
- Don’t conduct activities that tie up network resources, these include:
- Using the network to transfer large media files, such as downloading or uploading music or movies using a file sharing service
- Unauthorized modification, alteration, and deletion of computers, networks, software, applications or files.
- You are responsible and accountable for the use and security of the electronic devices you own or the GU-Q computers (e.g. library)
- You should be cautious about making information about yourself and others available on the Internet (e.g. Social Media etc.)
Password Management
Password management is about Locking Down Your Login with long, unique passphrases, using a password manager, and using two-factor authentication
Password management is critical for the security of your work and personal accounts. Check out our videos and other information about how to navigate password security and management!
According to the Center for Internet Security (CIS), length is the most important aspect of a good password. Passwords that are longer in length are statistically harder to guess than those with 8 or fewer characters. Sophisticated hacking tools can crack a short password in fewer than 3 microseconds. As part of Georgetown’s ongoing effort to protect the University’s members and its data, UIS is requiring the use of multi-word passphrases rather than passwords.
For further information on the NetID Password Standard, please visit password standard website.
Password Tips
- Never tell your password to anyone, you are responsible for your own password!
- The more random your password, the better.
- Never reuse passwords on different websites or across accounts
- Report compromises immediately: If you suspect your account or password has been compromised, report the incident to the IT help center guqhelpcenter@georgetown.edu or +974 4457 8130 and change the password immediately.
A compromised password not only puts your own information at risk—it may also expose sensitive University data and systems.
Remember: University representatives will never ask for your password: It is against University policy for a technology service provider to request a user’s password.
Two-Factor Authentication
Georgetown University has implemented Duo two-factor authentication for all NetID Single Sign On applications. Two-factor authentication provides added password security by requiring a unique code in addition to your password before successful authentication to an application. This unique code is usable only once and can be pushed to your mobile or desk phone. If your password credentials become hacked, the chances that someone will be able to use them maliciously is reduced when using two-factor authentication.
It is mandatory to enrol in Duo, the University’s solution for two-factor authentication. It’s a great way to protect your NetID password and to ensure the security of University data and your own information.
Phishing is a malicious message attempt to obtain sensitive information by disguising as a trustworthy website, person, or company. Phishing is the most common way attackers illegally access systems or commit financial fraud. In all phishing messages, the attacker pretends to represent a legitimate organization, such as a university leader, bank manager/staff, senior executive, institutional department, governmental agency, or employee.
Top 5 Common Phishing Attacks
- Email Phishing: The most widespread form of phishing. Cybercriminals send deceptive emails that appear to come from a trusted source (e.g., your university, bank, or cloud service provider) to trick you into clicking malicious links or downloading infected attachments.
- Spear Phishing: A more targeted form of email phishing where attackers personalize the message using your name, department, or recent activities to appear more credible and increase the chance of success.
- Whale Phishing (Whaling): This is a highly targeted form of spear phishing aimed at senior executives or high-profile individuals within an organization. The attackers craft convincing messages related to executive tasks, like wire transfers, legal documents, or board communications, to manipulate recipients into taking high-impact actions.
- Smishing (SMS Phishing): These attacks use text messages to lure you into clicking on harmful links or calling fraudulent numbers. Often, the message claims to be from a delivery service, your bank, or the IT user support team.
- Vishing (Voice Phishing): Attackers impersonate a trusted authority (like IT support or the Ministry of Interior etc.) over the phone to pressure you into giving up sensitive information, such as your QID, OTP code.
Tips to avoid fraudulent cyber scams/attacks:
- Exercise caution with unsolicited communications: Be wary of unsolicited emails, calls, or text messages from unknown senders, particularly those requesting sensitive information or urging immediate action.
- Verify sender identities: Before responding to any communication, carefully verify the sender’s identity and authenticity. Look for signs of suspicious activity, such as unfamiliar email addresses or phone numbers.
- Beware of urgent requests: Exercise caution when receiving urgent requests for personal information, financial transactions, or account credentials. Cybercriminals often use urgency as a tactic to pressure individuals into making hasty decisions.
- Scrutinize URLs and links: Take extra care when clicking on links embedded in emails or text messages. Hover your cursor over the link to preview the URL and ensure it directs to a legitimate and secure website. Beware of pop-up messages asking you to install software or provide personal information.
- Avoid sharing sensitive information: Refrain from sharing sensitive information such as passwords, financial details, or personal ID numbers (e.g. QID or US Social Security) via email or text messages. If it is absolutely necessary to share this type of information, use a secure channel after verifying recipient identity.
What are IT Services doing to protect me?
We have deployed sophisticated filters, including AI technologies that attempt to protect you from receiving malicious emails and spam emails. All computers supported by IT have antivirus and Anti-Malware software installed which acts as a second line of defence. Unfortunately, the perpetrators of malicious email are aware of these defences and are constantly innovating.
Report a phish
To help combat phishing attacks and better protect your data, you have access to the Cofense Phishing Reporter tool as an add-on to the Georgetown University Google mail interface. The Cofense Reporter add-on (Report Phishing button) appears as a fish icon () on the right-hand side toolbar of your Gmail screen.
You’ll see the Cofense Reporter add-on when you log in to your Georgetown Gmail client on your desktop or laptop computer, or when you’re using the Gmail app on your iOS or Android mobile device.
The Cofense phishing reporter application is only compatible with Georgetown Gmail apps.georgetown.edu and Gmail apps on the Android and Apple smartphones/tablets.
To help safeguard yourself and our community, please take a moment to review the following tips for identifying cyber threats and adopting best practices:
- Banking frauds: The bank will not ask for personal information via phone. If you get a call or message from someone claiming to be your bank, go to a branch or call the phone number on the back of your bank card to confirm it is a valid request.
- One-Time Passcodes (OTP): Never share your OTP with anyone. Always confirm that you personally initiated the request that generated the OTP and that you entered it yourself for any purchase. Remember, once you share your OTP, your money may be at risk.
- Unsolicited communications: Be wary of unsolicited emails, calls, or text messages from unknown senders, particularly those requesting sensitive information or urging immediate action.
- Sender identities: Before responding to any communication, carefully verify the sender’s identity and authenticity. Look for signs of suspicious activity, such as unfamiliar email addresses or phone numbers.
- Sensitive information: Refrain from sharing sensitive information such as passwords, financial details, or personal ID numbers (e.g. QID or US Social Security) via email or text messages. If it is absolutely necessary to share this type of information, use a secure channel after verifying recipient identity.
For more comprehensive information on cybersecurity, how to safeguard Georgetown data, and personal security measures, please click here. By staying informed and adhering to best practices, we can collectively strengthen our cybersecurity posture and safeguard against potential threats.
Georgetown brings the power of Google to your fingertips no matter where you teach, work, and learn. Georgetown Google Apps accounts come with most of the apps (see list below) that are included with a personal Google account, so you can do pretty much anything in your Georgetown Google Apps account that you can in a personal Google account.
Sign in by going to https://apps.georgetown.edu.
Google Apps Features
With Georgetown Google Apps, you can:
- Send and receive email using Google Mail
- Set up calendar appointments and personal reminders using Google Calendar. View other GU users Google calendars
- Maintain a list of your favourite contacts
- Meet with classmates and colleagues using Google Meet
- Create, upload and share documents (text, spreadsheets, presentations, and forms) using Google Drive
- Access Google Drive from your computer using Google Drive
You can find out more about Google Apps features and much more here.
The University provides two options for storing and sharing files with colleagues and collaborators.
Google Drive is a file sharing and storage service that enables you to securely store your documents “in the cloud” and to access those documents anywhere you can connect to the Internet. You can also share your documents with any of your classmates or colleagues.
In addition to accessing the Google Drive files through its website, Google offers offline capabilities for Windows and macOS computers using Google Drive software. Google also offers Google Drive app for iOS and Android devices.
Georgetown Box is a file sharing and storage service that enables you to securely store your documents “in the cloud” and to access those documents anywhere you can connect to the Internet. You can also share your documents with any of your classmates or colleagues. Box cloud storage is acceptable for use for certain types of FERPA, HIPAA/PHI and Financial data (Data protected by PCI is not generally allowed).
In addition to accessing the Box files through its website, Box offers offline capabilities for Windows and macOS computers using Box Drive software. Box also offers Box Drive app for iOS and Android devices.
Microsoft OneDrive is a file sharing and storage service that enables you to securely store your documents “in the cloud” and to access those documents anywhere you can connect to the Internet.
You can also share your documents with any of your classmates or colleagues.
In addition to accessing the OneDrive files through its website, Microsoft offers offline capabilities for Windows and macOS computers using Microsoft OneDrive software. Microsoft also offers OneDrive app for iOS and Android devices.
A short video by Farukh Zeeshan (CIO) on the Zoom best practices
Zoom web conferencing software is designated by the University for teaching, learning and business use and is governed by the University’s existing Acceptable Use and Privacy policies.
The following material will help you get started with Zoom and protect your meetings.
- A Student’s guide to Zoom
- Installing Zoom
- Signing in to Zoom
- Scheduling and Hosting Zoom Meetings
- Zoom Scheduler Plugin Chrome, Firefox and Zoom for GSuite
- Do not publicly share the URL of your class or meeting – keeping the meeting ID# private is one of the easiest ways to keep your meeting from being Zoombombed.
- How can you make your Zoom meeting more secure?
Microsoft Teams is Microsoft’s enterprise communication tool. Teams combines persistent chat rooms, video/voice, file sharing, meetings, and many other features into one application.
Please visit the Microsoft Teams webpage to learn more about the service.
Zoom is the University’s designated service for conducting business meetings and remote instruction, however, University offers a choice of communications tools, such as Google Meet, Microsoft Teams.
The Software Webstore allows students, faculty, and staff of Georgetown University to download software for free or at discounted prices. We hope this site will be the first place you visit when seeking software for use as a faculty, staff, or student of Georgetown University.
As part of the University’s Office 365 subscription, all staff, faculty and students are entitled to download, install and activate up to 5 copies of Microsoft’s Office applications on personal computers or mobile devices for as long as they remain members of the University.
Install the latest version of Microsoft Office and get the latest updates of applications like Word, Excel, PowerPoint, OneNote, and more on your devices.
Please note, if you have been issued with a GU-Q laptop then Microsoft Office is already installed on your laptop, you do not need to take any action.
Full instructions to install Office on up to 5 personal computers (PCs, Macs and Mobile Devices) can be found HERE.
Eduroam (educational roaming), is a single, secure, wireless internet service available at the GU-Q and many other participating institutions worldwide.
GU-Q students can use the wireless at any institution that participates in the eduroam service using the same username and password they use to log onto the wireless on the GU-Q campus. Once your wireless device is setup for use at the GU-Q, it will work at any eduroam location.
Please visit the eduroam website to learn more about the service and how to access setup instructions.
Georgetown University in Qatar provides secure Print, Photocopy and Scan using your NetID or GUQ ID card. To get started, you must register your GUQ ID card on the printer and install the printers onto your computer. It is important to complete the printer setup in the order listed below.
Full instructions on How to register your GUQ ID card and setup printers on your computers can be found HERE.
Following are some of the key feature of the printing service:
- Follow-You Printing
- Reduces print waste
- Mobility
- Enhances security
- Protects confidential documents
- GUQ ID Card Logon
- Multi-function
- Scan
- Copy
- USB
- 25 locations
- 24 hours save
The GU-Q VPN service provides secure communication back to the campus network. VPN servers employ encryption and other security measures to ensure that any data sent on the Internet will not be intercepted.
The VPN service is currently available for students use, however, all the student systems are securely accessible online and students do not require VPN service to access student systems.
If you require the VPN service, then please get in contact with IT user support at guqhelpcenter@georgetown.edu.
We continues to improve the University’s learning spaces to ensure excellent standards for teaching and learning are maintained, by promoting the educational benefit of all classroom technologies. This includes systems/practices such as Hybrid Learning, Zoom, lecture capture (Panopto), 4K projection, document camera and height adjustable lecterns that support latest presentation sources such as, HDMI, USB-C and wireless presentation (AirPlay, Miracast).
All Classrooms are equipped with identical AV systems and intuitive controls that allow for consistent and reliable user experience.
The following Classrooms are equipped with identical Audio Visual (AV) systems and intuitive controls that allow for consistent and reliable user experience:
LA12,LD03, 0A03, 0A04, 0A07, 0A08, 0A11, 0A12, 0A13, 0A19, 1A03, 1A04, 1A07, 1A08, 1A11, 1A12, 0B07, 1B09, 2B01, 2A24, 2A25, Auditorium.
- 4K Ultra High Definition AV Systems
- Two Large Front Projector Screens
- Two Rear Confidence/Repeater Screens
- Height Adjustable Lectern With Lectern PC
- Support for Apple, Android and Windows Wireless Presentation
- Support for HDMI And USB-C Sources
- Document Camera
- Front and Rear 4K Cameras
- Lecture Capture (Panopto)
- Zoom Video Conferencing
Please visit the University’s Audio Visual website to gain further insight into the classrooms technologies.