Popular Services
Manage the procurement, setup, and maintenance of institution-issued hardware, including custom upgrades.
Manage the installation, deployment, and licensing of institution-approved software.
Support, troubleshoot, and customize institutional applications to meet user and business needs.
Provides assistance for IT-related issues that fall outside the scope of defined service categories.
Not sure where to start? Start Here!
Request or update access to software, systems, or shared resources based on your role.
Use this form to request administrator rights for specific computers. Only one computer request per submission is allowed.
Provide secure, high-speed wired and wireless network access across campus.
Submit this form to request renovations or modifications to existing spaces, including painting, finish upgrades, space reconfiguration, wall changes, furniture updates, or utility adjustments (electrical, plumbing, HVAC).
Support and maintain printing services, scanners, and accessories to enhance user workstations.
Create, update, or deactivate user accounts to ensure secure and appropriate access.
Enable secure remote access to university systems through VPN.
Get help with Teams, SharePoint, OneDrive, or Shared Space to support collaboration and content management.
This form is intended for hiring managers to specify technology needs for their new employees.
Support and maintain AV technology across classrooms, lecture halls, and campus spaces.
Secure devices and request special access, including remote access to restricted systems.
Create reports, dashboards, and consult with analysts to support planning and decision-making.
Audiovisual setup and live-streaming support for institutional events and presentations.
Assistance with IT service pricing, subscriptions, and vendor coordination.
Set up, update, or troubleshoot email accounts to support reliable communication.
Help with password resets, account unlocks, and MFA setup or troubleshooting.
Maintenance and troubleshooting of campus emergency communication systems like Blue phones.
Provisioning, configuration, and maintenance of institutional virtual machines.
Report and respond to suspicious activity or security breaches involving accounts or devices.