The Campus and Classroom Technology Services (CCTS) team provides IT support for administrators, school and college classrooms, and general purpose classrooms (including special events).
The team has support staff across campus to provide personal and customized support to Wayne State schools, colleges, and departments. CCTS manages and supports all Wayne State University-owned computers in all academic and administrative units, including the daily basics of computer maintenance, off-site software updates, additional protection against viruses and malware, and even the supply of new computers every four years as a part of their refresh program.
We pride ourselves in having local and centralized IT resources to strengthen services critical to the success of teaching excellence, including desktop, server and application, classroom, and research support. Our IT support personnel are located locally in all schools, colleges, and departments to provide daily operational support to faculty, staff, and students campuswide. Getting support is as easy as:
The following table describes how computers are managed once migrated into C&IT's well-managed program, including how they are centrally managed, security features that C&IT offers, and additional services related to the desktop.
Customer-focused services and initiatives | Help Desk services (tier-one support to all students, faculty and staff for all enterprise IT systems and services):
Research support:
DirectAccess:
|
User and computer account management services | Account creation and password resets. Uses Identity Management to automatically create, provision and deprovision AccessID accounts. Active Directory spans local and remote sites for high availability, and C&IT-provided naming conventions. DeskTech manages all AD objects and resource access. Custom group policy-based configuration management on objects for unit-specific needs (like research and computer labs). |
Security configuration services | Security consulting and analysis:
Folder redirection:
AppLocker:
BitLocker:
Windows Firewall with advanced security and IPSec:
Screen lock timeout:
User account control:
|
Convenience-based configuration services | Printer mapping:
Unlimited departmental drive mapping:
User Experience Virtualization (UE-V):
|
Inventory management services | Administrative and DeskTech customers - four-year computer subscription program:
Academic units:
|
Application services | Operating system delivery with custom SCCM deployment system:
The current standard image includes:
Print services:
Apple mobile device management with Jamf Pro:
Chromebook management with Google's G-Suite for education:
|
Research hardware managing services | Where possible, C&IT will set up a consulting session and create test machines to see if they can balance the need for secure computing with extremely specific software applications. When older research software cannot run on newer operating systems, C&IT will isolate that computer from the network so that it is not a security risk, but so that you can continue to collect data. Typically, this is on a case-by-case basis and in the past, C&IT has been extraordinarily successful in finding individual solutions. |
The C&IT computer refresh program is a centralized computer replacement program providing eligible employees with the latest computing technology for the demands of higher education. Most academic units are funded centrally from the consolidation of IT resources and participating administrative units are billed annually at $395 per computer per year.
The following employee classes (51%+ FTE) are covered by university funding. Personnel who meet the criteria but are supported by university affiliate groups (Wayne Health, Karmanos, etc.) are not eligible.
Standard devices
Accessories
Warranty
Software
Q: How do I start the refresh process for my device?
A: No action is required on your part. C&IT maintains an accurate inventory of all computing devices on campus and will consult with leadership and/or employees when computers are due for replacement.
Q: Can I request a model outside of the standard offerings?
A: Exceptions to the Apple and Dell standard configurations (alternate manufacturers) will be handled on a case-by-case basis.
Q: Can I upgrade the configuration of the standard devices?
A: If a faculty or staff employee has computer performance needs requiring the standard configuration specifications to be significantly altered, the employee or department will be required to pay the additional costs above the cost of the standard configuration model. For customers of the paid refresh program, should the specification adjustments exceed the cost of the standard configuration, the customer must pay for the device in full.
Q: Can I upgrade to a larger monitor through the refresh program?
A: Larger monitors can be purchased at the department's expense.
Q: What happens to my current device after refresh? Can I keep it?
A: The current device must be returned to C&IT to be used for our trickledown program.
Q: What happens to refresh equipment when an employee transfers to another school, college, or department?
A: Our recommendation is that the computer stays with the current department when an employee transitions to a new school, college, or department.
Q: What happens to refresh equipment when an employee leaves the university?
A: The computer will be collected by C&IT support personnel for secure storage.
Q: What if I have multiple computers?
A: The purpose of the Warrior Refresh Program is to replace the primary device used by eligible faculty and staff. The primary device is the main computer used for daily work.
Q: Can I change from a Dell computer to an Apple?
A: A user can request the change with their management's approval.
Q: Can employees buy back a computer provided via the refresh program?
A: Per university policy, computers are not available for purchase.
Q: Who can I contact if I have additional questions?
A: Please submit a service request.
Typically, administrative rights on a computer are not needed to run and install applications, however, when appropriate, we may grant access per Administrative Rights Policy [PDF] and completion of the Administrative Rights Access Form [PDF].
The delegation of administrative rights is based on whether C&IT can support the special case; If we can efficiently support it and if there is a security need for administrative rights. In the case we cannot (development, research, etc.), administrative access will be granted to the requester assuming their agreement with the policy and approval from their management.
We will not grant administrative rights to shared machines because of the security risk that it poses to many user profiles.