- Knowledge Base
- Teaching & Learning
A step-by-step tutorial on how to download the Virtual Desktop Interface complete with video and screen shots.
- Knowledge Base
- Teaching & Learning
Step by step tutorial to download the Virtual Desktop Interface (VDI) for a Windows 10 PC complete with a help video and screen shots.
- Knowledge Base
- Computers, Devices, & Connectivity
- Printing
There are several ways to connect a Mac to a printer on the Mines network. Here are two that work well for most Mac computers on campus.
- Knowledge Base
- Email / Calendar
Information & Technology Solutions (ITS) is pleased to announce this service in response to student demand for a “Mines email address for life.” But be aware: Setting up your new Alumni @mines.edu email address will require your deliberate action and attention prior to departure.
- Knowledge Base
- Computers, Devices, & Connectivity
- Linux
- Knowledge Base
- Teaching & Learning
- Canvas
Schedule of when upcoming and prior Canvas courses are available to access.
- Knowledge Base
- Computers, Devices, & Connectivity
- Networking
- Knowledge Base
- Information Security
- Multi Factor Authentication (MFA)
This document will quickly walk-through the self-service enrollment process for MFA (Multi-Factor Authentication) available at
https://mfa.mines.edu/. The vendor being used to provide this service to Mines is Duo Security.
- Knowledge Base
- Software
If you are prepared to request a new software purchase at Mines, you may use the New Software Request (pilot) Service to begin the submission process. If you would like to review the form questions in the process to better understand the information required prior to submitting your request, you may use the PDF version which accompanies this article.
- Knowledge Base
- Computers, Devices, & Connectivity
- Windows
- Knowledge Base
- Software
Not sure which Software option to choose? No problem! We've put this guide together to help you select the software service that fits you best.
- Knowledge Base
- Information Security
Defining what a support scam is and what to do if there is a possible support scam.
- Knowledge Base
- Information Security
Attackers and scammers often look for ways to steal email addresses, passwords, and other sensitive information.
- Knowledge Base
- Information Security
Guide to using the Phish Alert button that you may see in Exchange Online / Outlook
- Knowledge Base
- Information Security
- Knowledge Base
- Email / Calendar
Mines reserves the right to terminate email and other accounts (among them MultiPass) as soon as any student or employee separates from the institution. In theory, that could be the same day the individual officially leaves Mines, so plan accordingly.
- Knowledge Base
- Information Security
The Security Operation Center (SOC) monitors, assesses, and defends against cybersecurity threats on the Mines’ network.
- Knowledge Base
- Information Security
- Global Protect
- Knowledge Base
- Information Security
- Global Protect
Installation, troubleshooting, and background for Mines' Remote Access (VPN).
- Knowledge Base
- Information Security
- Global Protect
- Knowledge Base
- Information Security
- Global Protect
- Knowledge Base
- Computers, Devices, & Connectivity
- Printing
This KB article is to help users print during the PrintNightmare Situation
- Knowledge Base
- Computers, Devices, & Connectivity
- Mac OS
Setting up the Apple Time Capsule on your home network is generally easy and straightforward -- as is usually the case with Apple products. However, when Time Capsule is attached to the Mines campus network, unforeseen problems arise. This is a guide to setting up Time Capsule on the Mines network in an approved, and secure, fashion.
- Knowledge Base
- Computers, Devices, & Connectivity
- Linux
In this Step-by-Step guide, we review How to use the screen utility on a Linux Machine to remotely run a script and disconnect from the remote computer.
- Knowledge Base
- Computers, Devices, & Connectivity
- Linux