Skip to main content Skip to navigation
Department of Chemistry Fulmer IT

New Printer in 305

Hello All,

 

We have a new printer(Ricoh MP C307SR) in 305 replacing the Old Marvette(Ricoh 300SR). If you already have the old drivers installed, there is no need to reinstall the drivers instead, the only thing that you will need to do is update the hold print setting. A tutorial to do this can be found in the link below.

https://chem.wsu.edu/FulmerIT/setting-up-the-ricoh-mp-c307sr/

 

Liz Kittisack

Fulmer IT

5-5864

Chem.fulmerit@wsu.edu

UPS Etiquette

Hello Chem Users,

The Uninterruptible Power Supply(UPS)  is a very helpful device. We have created a easy to follow info graphic about UPS’s and their functionality. Learn more about UPS’s and how to properly use them at the link below!

UPS Guide

Thanks for Reading!

  • Liz Kittisack

 

NIST Windows 10

Hello Chem Users,

There has not been an ability to install NIST on Windows 10 until recently. We have created a work around method using VirtualBox and Windows XP Mode. Using VirtualBox is the only way to safely install Windows XP, which is now an antiquated and unsupported operating system. The process is quite involved, but there is a step by step tutorial on the FulmerIT website. Also linked here https://chem.wsu.edu/FulmerIT/nist-installation/.

Liz Kittisack
Fulmer IT
5-5864
Chem.fulmerit@wsu.edu

PSA: HUGE security exploit in latest(Date: 11-29-2017)

Hello AGAIN Chemists,

Today a rather enormous exploit was discovered in MacOS High Sierra.

Long story short, a local user can gain root (full administrative) access without the root password.

 

When we turned on our (High Sierra) Mac it said it had just installed the update, so we know it auto-installs with priority so this should jeopardize very few users, HOWEVER if you have turned that off, are offline, or otherwise blocked automatic updates, PLEASE install Security Update 2017-001 ASAP!

 

Detailed info:

PSA UPDATE: HUGE Intel Management Engine (ME)(Date: 11-29-17)

Greetings Chemical Specialists!

As previously indicated, there is now more info and even patches/fixes for some currently available!

Most of us are running Lenovo or Dell laptops and desktops so I’ve put direct links below.

(This is an expected eMail to a specific audience so I’m going to leave links LIVE)

 

Lenovo Patch/Update for Intel ME/SPS/TXE Vulnerability (fixes for affected systems available NOW!):

https://support.lenovo.com/us/en/solutions/LEN-17297

Respect to Lenovo for being the first/only Intel partner to take this issue as seriously as they do.

 

Dell Patch/Update for Intel ME/SPS/TXE Vulnerability (Dell is a behind on this, rather than posting fixes, they’re posting DATES when a fix SHOULD be available):

http://www.dell.com/support/article/us/en/19/sln308237/dell-client-statement-on-intel-me-txe-advisory–intel-sa-00086-?lang=en

 

SOME Dell servers have patches now:

http://www.dell.com/support/article/us/en/19/qna44242/dell-server-statement-on-intel-me-txe-advisory–intel-sa-00086-?lang=en

 

THANKFULLY Intel has now posted a page that lists most major manufacturers and their corresponding Support sites/pages that deal with this issue SPECIFICALLY!

If you have affected hardware follow the respective link below to see that status of fixes for your hardware:

https://www.intel.com/content/www/us/en/support/articles/000025619/software.html

(the page also has a link to the test tool used to determine vulnerability if you need)

 

REMINDERS:

  • Research Groups: We have very little insight into how many computers you may have, much less how many are vulnerable.  We need your groups to self-check any Intel processor based computer (desktops and laptops both) built (not purchased) in 2015 or later.  We can help guide you through the fix BUT we have to know said help is needed 😉
  • Students: Please keep in mind that university policy dictates that FulmerIT is not allow to work on personal property.  That said, advice is always free J
  • Don’t forget about computers at home and with friends/family!

PSA: Yet another computer hardware(Date: 11-22-17)

This is another HUGE one, so apologies ahead of time for the length.

So let’s start with:

Who is affected? – Pretty much EVERY Intel chip made since 2015.  Atom, Celeron, Pentium, Core, Xeon… nearly all of them, hence HUGE.

Strangely I cannot find any info on if this affects Intel powered Apple computers, so far I can’t find any info either way… reporting is early and poor at this stage.

This is a very new exploit that was only getting wide attention starting last night due to the holiday, I’m sure many additional details will become clear by Monday.

 

What Does It Do?

Long story short/simplified: an attacker could theoretically gain remote access, then elevate themselves to Admin level gaining complete control of the system.

(no compromised organizations are yet known, but now that this has gone public, it’s only a matter of time)

 

Well that IS Huge!  What’s Intel doing about it?!

Thankfully, Intel is treating this as seriously as it should, and Federal protection agencies are backing them up.

Per usual, you don’t need take my word for it, here are a few articles you can read for yourself:

 

FulmerIT will need everyone’s help on this one!

Especially with the PI Groups, we do not have oversight over how many machines are active in the group/building, nor any managed way of bulk testing since there are so many computers that are not Active Directory (AD) members.  Therefore we’re forced to relying on each operator to run the detection tool on their computer(s) and let us know how many computers are affected, their name, physical location, IP address, and test results.

Next week I’ll have a form each operator can fill out in an attempt to make this as organized and painless as possible.

 

The easiest way to see if your systems are affected is to run the detection tool put out by Intel:

Get the Detection Tool here: <a href="https://downloadcenter.intel.com/"
There are versions for both Windows and Linux, so I’m currently running under the assumption that Macs are somehow not affected.  I’ll update if I learn otherwise.

 

PC Folks: download the ZIP file, un-ZIP it to your DOWNLOADS folder, or somewhere else you have easy access to.  Open the sub-dir “DiscoveryTool.GUI” and double-click “Intel-SA-00086-GUI.exe”

You’ll get a report back that looks something like this:

Like me, you’ll probably find that it says, “This system is vulnerable”.  If so, it’s time to hurry up and wait for your motherboard’s manufacturer to publish a patch/fix.

Note how it lists the Motherboard Manufacturer and Model to take at least some of the sting out of this.

 

So I’m Vulnerable… Now What?!

Intel has created fixes, but since the tech affected is on motherboard BIOS chips, they are reliant on the motherboard manufacturers to fit the fix to their boards, test, then publish their updates on their respective support websites.  Do you see the problem here?

Thus far, Lenovo is the only company pushing really hard to deal with this.  If you have a Lenovo laptop/desktop/server, check their website for BIOS updates related to this exploit and follow the directions accordingly.  They claim they’ll have a patch available for all affected systems up between yesterday and Black Friday.

Dell, HP, ASUS, and a few others have indicated that they have fixes in progress and should have updates ready for end-users to download and install by next week.

 

Like the last PSA I had to send out, this is a world-wide problem and will be constantly evolving.

There’s limited action that can be taken currently, as while we can detect what systems are vulnerable, per above, but fixes are just not widely available yet.

This PSA is putting everyone on-notice NOT to forget to deal with this; at home, work, and anywhere else you compute.

 

Many of the articles point out that the tool needs to be far more user friendly if essentially every PC/Linux user in the world should be doing this, hopefully they get there sooner than later….

Keep in mind how many devices in your life this may affect, home, work, family, friends, et all.

More to come.

 

Cliff Notes:

  • HUUUUUUGE Intel exploit discovered affecting nearly all their processors manufactured 2015 and newer.  Evolving issue.
  • Fixes largely NOT available yet –  but the detection tool IS!  Use it!
  • FulmerIT does NOT have oversight over how many computers are running in Fulmer/Troy, we need YOUR help on this endeavor, this is FAR too much for us to handle alone in a reasonable amount of time
    • Faculty and Research Groups need to run the Vulnerability check on ALL PC/Linux computers – a form will go out next week to help organize this
    • Staff: FulmerIT will be scheduling with you to fix your workstations individually once Dell has posted patches
  • Take the Holiday as an opportunity to spread the word to non-technical friends and family – while there’s not much we can do today, by the weekend there should be.

 

Updates to Fulmer IT Website

Hello Everyone!

I have been updating the FulmerIT website! I have been working on the design and updating the content of our website. I have mainly worked on updating the email tutorials and making all of the tutorials look uniform. I am working on designing the website to look more professional and visually. I will  also be working on the main web page starting today. Expect to see many changes to the main chemistry website soon.

  • Liz Kittisack
  • FulmerIT

Migration to Office 365

Hello Chemistry Folks!

As of June 7, 2017 all staff and faculty has been moved from the Connect! servers to the new Office 365 server. For the past 2 years the student have been on this server, and now the staff are currently being migrated over to the Office 365 server. There have been several issues with the migration so far, mainly for mac users. For most users the migration has been successful. For most users all they needed to do is restart Outlook.
One is the key changes is that you must now enter you FULL email address. For example instead of just entering your network ID (eg. butch.cougar) you must enter in butch.cougar@wsu.edu. Also you must make sure that the server details are switched to outlook.office365.com

If neither of these methods work for you:
Recovery/Reconnection Scenarios: IF your Outlook didn’t have a message for you this morning saying it needs to restart to effect changes, it may just need a push.

Outlook 2013/2016 (locally installed) Client
• IF you’ve closed out Outlook when you left yesterday OR shutdown your computer, when you fire both up this morning, your system should automatically move to check the new servers with no changes required on your part.
• IF you left Outlook open last night, you may have arrived this morning to find it giving some sort of error, this is by design.
o Restart Outlook and it SHOULD automatically align itself with the new mail servers and start picking up mail again with only that hiccup…
o That said, so far we have reports of having to restart Outlook upwards of 4 times. Our suggestion would be that if you’ve restarted Outlook a couple of times without it recovering on its own, do a full                       workstation restart.
o If you’re still having trouble after that, please give us a call at 335-5864 and we’ll coordinate getting someone out to help you get back on track manually.
o Manual settings (via ITS):
Office 365 email account settings: Exchange
          Server Config: Microsoft Exchange
          Incoming Server: outlook.office365.com
          Secure Auth Type: SSL
The account should automatically configure the rest of the settings

• The 2010 client MAY work, but is neither supported nor recommended by ITS. Chemistry staff may upgrade to 2013 or 2016 at their leisure by running the installers on Chem-Diamond3

Web-Based Email Client
For those who take advantage of the web-based email interface (hopefully that’s most of you) here’s the new info:
URL:   https://outlook.office365.com  (use this from here on out)
Defunct old URL:   https://connect.wsu.edu don’t use this anymore
The new URL has a slightly redundant login process but does seem very reliable.

Mobile Settings
Here’s a list of server and corresponding specifics to get your mobile device back in sync:
(in most cases you’re just replacing “connect.wsu.edu” with “outlook.office365.com”)

Office 365 email account settings: IMAP
Server Config: IMAP
Incoming Server: outlook.office365.com
Secure Auth Type: SSL
Incoming Port: 993

Outgoing Server: smtp.office365.com
Auth Type: none
Outgoing Port: 25

Alternative Outgoing Server Settings Through WSU’s Server:
Outgoing Server: smtp.wsu.edu
Secure Auth Type: SSL
Outgoing Port: 465
You have to set the server to Secure Authentication (login)
Use your Network ID and Password as the login credentials for the server