Welcome to the ECEE IT Desktop Support website! Here you will find information regarding all of your technology needs, the policies that govern the IT infrastructure within ECEE, information regarding how ECEE IT operates and serves you, and other information that may be useful to the technology needs and desires of ECEE.
The mission of ECEE IT is to support the technological needs of ECEE, including its strong commitment to research, student success, and the pursuit of excellence in all activities. The technology and services of ECEE IT are based on the philosophy that an IT department is more than just computers; it is an essential resource requiring a knowledgeable staff and evolving information technologies.
- Provide fair, courteous, responsive, respectful, and knowledgeable service.
- Provide the fullest possible service at all times, within the constraints of available resources.
- Provide materials and information resources appropriate to your needs.
Our customers include all users of ECEE owned computing equipment, including faculty, staff, visiting professionals, and students.
Monday–Friday, 8AM–4PM (excluding university holidays)
To submit a REQUEST directly to ECEE IT (software installs, computer quotes, etc.): http://links.asu.edu/ECEEIT-REQ
ECEE IT and Other ASU IT Organizations
ECEE IT is an independently functioning group and is a distinctly different entity from both Engineering Technical Services (ETS) and the University Technology Office (UTO). All three organizations are intertwined in their workings, but remain separate in their areas of expertise and services.
An In Depth Explanation
ECEE IT is the first level of contact for all technical needs for the School of Electrical, Computer and Energy Engineering and affiliated centers such as CSSER, QESST, Power1C, SENSIP, WISCA, and PSERC.
ETS handles much of the server, website, database, classroom, and Linux support for all of Fulton College.
UTO is an organization that services all of ASU and provides much of the software licensing, monitoring of network traffic, blackboard support, and help-desk among other things.
If in doubt of which group will best serve you, use the following link to place your ticket: http://links.asu.edu/ECEEIT-REQ
The organizational chart below attempts to visually show the relationship between ECEE IT, ETS, and UTO.
See the sections below for the policies of the ECEE IT department. All persons using ECEE owned computer equipment or requesting service from ECEE IT must adhere to these policies.
Computer Equipment Purchases
Per ASU purchasing policy, all computers, monitors and printers purchased must meet the EPEAT Gold standard (http://www.asu.edu/aad/manuals/pur/pur210.html [items 1 & 2 under “ENERGY”]). You can see a list of EPEAT compliant computers at http://www.epeat.net/. ASU has made a public statement and commitment that 100% of the computers, monitors, and printers purchased are EPEAT Gold certified. This statement can be found here: https://stars.aashe.org/institutions/arizona-state-university-az/report/2014-02-28/OP/purchasing/OP-12/
All Computer Equipment purchases must come through ECEE IT for approval. This is to ensure compliance with mandates from the Information Security Office, ASU’s EPEAT Gold standard policy, and that peripherals are compatible with current system configurations. ECEE IT only purchases enterprise level hardware manufactured by Dell and Apple, Dell being our primary and preferred computer provider, an exception must be granted to purchase computers from other manufactures. For detailed information about Fulton Schools of Engineering computer purchasing standards, see https://ets.engineering.asu.edu/it-support/standards/fse_computer_standards/. After a purchase is made, equipment should be delivered to GWC 208, allowing ECEE IT to install or configure the equipment to comply with ASU’s computing and security policy.
All desktop computers approved by ECEE IT will include a mouse and keyboard. Equipment that has not been approved prior to purchase by ECEE IT will be given limited support.
For computers leaving the Premises, an off campus loan form must be filled out in advance. These forms can be found at http://www.asu.edu/purchasing/forms/temp_off_campus_loan.pdf and must be submitted every two years, or the equipment should be returned to ECEE IT. This is to ensure both ASU and ECEE IT are aware of the general location of ASU purchased and owned computer equipment. Once this information is filed with ECEE IT you may visit the following site to see the information that has been logged for you and your offsite equipment: https://fulton.sp10.asu.edu/ecee/Off%20Campus%20Loan%20Forms/Forms/AllItems.aspx.
Donations of computer equipment to ASU should be handled according to the policies and procedures described on the following website: http://www.asu.edu/aad/manuals/pcs/pcs405.html
Computer Equipment Salvages
Requests for salvage pickup of computer equipment can be submitted at http://links.asu.edu/ECEEIT-REQ. All computer equipment that is to be salvaged should be kept in the room of original location until ECEE IT can remove it. This is in accordance with Fire Marshal regulations, keeps the halls free of clutter, and deters theft of equipment. ECEE IT will fill out all required paperwork.
Software Purchases and Licensing
ECEE IT will default to the licensed software standards that UTO and ETS has put into place and supports through their infrastructure(s). If a tool is already paid for and provided by the University, ECEE IT will standardize on that tool (such as Outlook for email) and provide limited to no support for alternative software solutions.
Purchases and Licensing
Software purchase requests should come through ECEE IT. ECEE IT may already have the requested software (or a comparable alternative) freely available to use on an ASU machine, and in some cases a home/personal computer as well.
Regardless of method of purchase, all software installed on ASU computers must be property of ASU (not the user) or ASU must have license to run the software. If the software is purchased, a copy of the receipt of purchase must be on file with a department admin. Specialized software used for research and licensed to an individual faculty will be handled on a case-by-case basis in consultation with ECEE IT. This is to ensure compliance with technology audits put forth by ABOR and to stay in good standing with the agreements that ASU has with various software manufactures. Additionally, ECEE IT will not provide end users with installation applications.
To have software installed on your ASU computer, please use one of the following methods:
All ASU computers that connect to the network must be on the domain. This ensures a secure login (sans infected computers), network resources are more readily available on demand, and OS updates are managed. These computers are not allowed to have generic or local logins. This means that all students should be logging in through ASUAD and all Faculty and Staff (including student workers) should be logging in through ASURITE. Local accounts on these machines will not be granted.
Computers not connected to the network are not required to be on the domain and may use generic or local computer accounts.
Apple laptops are not connected to the domain and are currently exempt from any restrictions that may have been mentioned on the matter.
The granting of administrative privileges to a user on a specific computer is delegated to the supervisor (the faculty adviser in the case of graduate students). Administrative privileges are not the standard operating mode but are granted on the supervisor’s discretion to enable/facilitate performance of certain ASU-related functions. Both the supervisor and the employee will be held accountable for their actions while these privileges are exercised, ignorance is no excuse. Because of this accountability, there are certain situations that will result in the automatic revocation of administrative privileges and the ability to delegate those privileges, as follows:
Accountability of Employees
Employees, students, postdocs, etc. are accountable for the actions that they take on their computers while having administrative privileges granted. The following, along with a digitally signed form, will be used to enforce that accountability:
PIRACY & MALWARE
Pirating software is illegal and there are very few cases where it isn’t accompanied by malware. If you are found to be pirating digital content or have malware on your computer, you will have your administrative privileges revoked.
Canon Secure Print
Using Canon Secured Printing
*In this example Word is used to print from, though these instructions will work for any program as long as the Printer Properties are set for each print job.
ECEE Canon Copier List
|Building||Room #||Name||Model||Color (Y/N)|
|GWC||208K||GWC208C1||IR ADVANCE C5030||Y|
|GWC||408||GWC408C1||IR ADVANCE 4045||N|
Table 1 – Locations and Capabilities of ECEE Canon Copiers. Double left click on copier name to add copier to a domain joined windows computer.
- Left click on File, and then on Print. Select the Canon Copier from the drop down list shown by box 1.
- Click on Printer Properties, highlighted above in box 2.
- Left click on the dropdown box for Output Method (Box 3) and change to Secured Print (Box 4).
- When presented with the following dialog, click yes. (Box 5)
- Enter your ASUrite into the User Name field, and your release pin into the PIN field. This pin is a number combination that you will enter at the printer in order to release your documents. Think of it like an ATM pin or a password, you can make it any number you want, as long as you remember what it is. Click OK when you are done.
- (Optional) Boxes 6 and 7 are where you are able to choose whether you want your document to print in black/white or color (Box 7), as well as single sided/duplex (Box 6).
- Press Ok. Next press print. A new window will open on your computer asking for a document name, username, and pin. The latter two values should be set from before, but you should set the document name to something you will recognize on the printer. Bear in mind that this will be the name that shows in the release menu viewable by others.
- Congratulations! Your document has now been sent to the printer. All that is left is to use
the touchscreen on the printer to release your document. From the main menu, select the
Secured Print option and you will see the screen below. Tap your print job to highlight it
- (Box 8) and press Secured Print (Box 9).
- The following screen will display, asking for the numeric pin you created in step 5 above. Enter the pin and press OK and your job will print.