Popular Services

Manage the procurement, setup, and maintenance of institution-issued hardware, including custom upgrades.


Provides assistance for IT-related issues that fall outside the scope of defined service categories.
Not sure where to start? Start Here!


Use this form to request administrator rights for specific computers. Only one computer request per submission is allowed.


Manage the installation, deployment, and licensing of institution-approved software.


Enable secure remote access to university systems through VPN.


Request or update access to software, systems, or shared resources based on your role.


Support, troubleshoot, and customize institutional applications to meet user and business needs.


This form is intended for hiring managers to specify technology needs for their new employees.


Submit this form to request renovations or modifications to existing spaces, including painting, finish upgrades, space reconfiguration, wall changes, furniture updates, or utility adjustments (electrical, plumbing, HVAC).


Provide secure, high-speed wired and wireless network access across campus.


Help with password resets, account unlocks, and MFA setup or troubleshooting.


Create reports, dashboards, and consult with analysts to support planning and decision-making.


Set up, update, or troubleshoot email accounts to support reliable communication.


Get help with Teams, SharePoint, OneDrive, or Shared Space to support collaboration and content management.


Assistance with IT service pricing, subscriptions, and vendor coordination.


Provisioning, configuration, and maintenance of institutional virtual machines.


Support and maintain printing services, scanners, and accessories to enhance user workstations.


Support and maintain AV technology across classrooms, lecture halls, and campus spaces.


Create, update, or deactivate user accounts to ensure secure and appropriate access.


Audiovisual setup and live-streaming support for institutional events and presentations.


Report and respond to suspicious activity or security breaches involving accounts or devices.


Secure devices and request special access, including remote access to restricted systems.


Maintenance and troubleshooting of campus emergency communication systems like Blue phones.