Skip to content

Entra ID External User invitations enabled

The UW Windows Infrastructure has enabled External User invitations in our enterprise Entra ID.

 

What and When:

Entra ID External User invitations can now be initiated by any user in our enterprise Entra ID, i.e. anyone with a UW NetID. This enables the possibility of collaborative sharing with non-UW identities for those applications which rely on Entra ID for identity.

 

What You Need to Do:

No action is required, but if you run an application that relies on Entra ID you can now evaluate whether you want to enable External User sharing in your application. If you do enable External User sharing in your application, we advise the following:

  1. Regularly review access to your application and where no longer necessary, remove any External Users access. We suggest you do this at least once a year.
  2. If there is a setting to distinguish between UW users and External Users, we suggest you enable that setting to help avoid granting access to mistaken identities.

 

More Info:

The External User capability allows a user account in another Entra ID tenant or a Microsoft account to be represented as a guest in our Entra ID tenant. As a guest, they can be granted access to applications and data, but they do not have the same default level of permissions as a UW user. At this time, guests can not invite other External Users. External users authenticate to their Entra ID tenant or the Microsoft Account identity provider.

 

If you’d like to read more about the Entra ID External User capability, we recommend the following:

-See https://msdn.microsoft.com/en-us/library/azure/hh967632.aspx, review the section entitled “Create and use external users”

-See https://support.office.com/en-us/article/Manage-external-sharing-for-your-SharePoint-Online-environment-C8A462EB-0723-4B0B-8D0A-70FEAFE4BE85, for the Office 365 application settings related to External Users.

 

NOTE: Just as other applications may need to do something to take advantage of this change, this change does not enable External User capability for any Office 365 application. The MSCA service will need to separately enable that capability for each Office 365 application, as it deems appropriate.

 

Our enterprise Entra ID is uwnetid.onmicrosoft.com, but has domains such as uw.edu, u.washington.edu, and washington.edu associated with it.

 

The UWWI service is following the guidance of the Entra ID governance team, put into place by the UW Enterprise Architecture program. Many thanks to the sage advice of that team.

 

Brian Arkills

UW Windows Infrastructure Service Manager

Nebula Windows 10 Readiness

Nebula has been hard at work getting ready for Windows 10 for many months. Since this is a popular topic of interest, here’s a status update.

Basic Readiness

If you want to deploy a computer with Windows 10 enterprise, you can do that now. Contact us if you need help with that. The most basic of our processes are ready for that, but at this time, there are significant limitations to our support capabilities (see Full Support below), so we’d suggest you hold off a month.

If you wait a month, the story will improve significantly, and if you wait a couple months, we hope to manage the upgrade for you (see Special New Capabilities below).

Looking further out, we’ll be adjusting the specific operating systems we support (see Consequences of a New Windows OS below).

We plan to have more detailed messaging about Windows 10 support in the future, covering expectations and actions to take if you are ready to upgrade.

Full Support

There are several missing support capabilities which might lead you to delay a little longer:

  1. We do not yet have a Windows 10 image. We plan to have one ready within the next couple of months.
  2. There is not yet a Sophos version (the anti-virus software supported by Nebula ) released in Nebula that is compatible with Windows 10. The vendor has released a compatible version, but Nebula has a policy of not deploying the latest version to avoid “broken” versions (which have happened often enough in the past to justify this). If a newer Sophos version doesn’t come out by 8/30/2015, we’ll manually override our policy to address this.
  3. We have not yet had a chance to evaluate and implement the configuration settings needed to support Windows 10 in a managed environment like ours.
  4. We do not yet support basic computer inventory or software distribution to Windows 10. This capability is blocked by a project to update our software delivery and management system. With the Nebula file service design change complete and more engineering resources available in September, we plan to complete this in September.

With respect to #3, we expect that some of these settings will represent major changes to the status quo. For some of these settings, we are still waiting on information from Microsoft while for others, we simply need time to figure out what’s new and plan our desired design. For example, with Windows 10 Microsoft plans to change how updates work. We know this means our existing mechanism that allows customers to defer IE upgrades has reached its end (Microsoft’s stated end of life for IE8-10 on 1/12/2016 is another reason that mechanism has reached end of life) . But Microsoft hasn’t fully shared the details of the update options it imagines for enterprise customers, so we still need time to evaluate what our approach will be.

If you do choose to deploy Windows 10 in Nebula at this time, you should expect that we will implement settings that will affect you later.

Special New Capabilities

Nebula plans to build a new operating system deployment mechanism. We’re hoping to provide an automated upgrade in place experience as part of this new mechanism, which would save you time and money, cut down on our overall costs, and improve our future agility to new operating system releases. We do not have an estimate for when this capability will be ready–it partially depends on the project to update our software deliver and management system, but also will require additional work. We’re hoping to have this ready in the Fall timeframe.

Consequences of a New Windows OS

Nebula has long had a policy of supporting the most recent OS, plus one prior OS, with a grace period for previous OSes, but hasn’t been especially clear which OSes were specifically supported. That’s been addressed in a new document: https://it.uw.edu/wares/nebula/operating-system-and-browser-support/

The short version with respect to Windows 10 is that it’s supported, but with limited capabilities (see above). We’ll continue to consider Windows 7 supported as the prior OS we will continue to support. After we’ve addressed #1-4 noted above, we’ll consider Windows 8.1 to be in a grace status for a year–in other words, we’d like anyone running Windows 8.1 to upgrade to Windows 10. We’re choosing to drop support for Windows 8.1 instead of Windows 7, following Microsoft’s lead in terms of the support it is providing.

The intention here is not to inconvenience anyone, but to encourage everyone to move to a well-supported operating system, so we’ll tweak our plans as needed to follow that intention. So if for some reason, we don’t provide the automated upgrade capability for quite a long time, we’ll extend the grace period for Windows 8.1.

Changing from Nebula2 to UW NetID login

Changing from Nebula2 to UW NetID login 

The Nebula service has set a goal for its UW-IT customers to stop using their Nebula2 user accounts and switch to using their NETID user accounts before April 2015. This is part of a larger initiative consolidating Windows domains, supports the IM Infrastructure Refresh project, and is a blocker for several other Nebula goals such as splitting off a separate Software Distribution Service.

Any customer can make the switch themselves. Hundreds of other Nebula customers have made the switch to only using a NETID user account, and there is no risk to trying the switch because you can revert back to using the Nebula2 user account. There is helpful documentation to assist customers that want to do this self-service at https://it.uw.edu/wares/nebula/contact-us/news/netid-logins/.

Alternatively, Nebula will provide 30 minutes of assistance (at no additional cost beyond the Nebula core fee) to help customers make the switch. We will have dedicated staff available during a specific period for your UW-IT division, but you can also send a request for help at any time to help@uw.edu. If you believe you are no longer using your Nebula2 user account, you can send a request to disable the account, which will help you ensure you don’t have any hidden lingering dependencies on it.

Entra ID device join

The UW Windows Infrastructure has limited who can join devices to our enterprise Entra ID . This capability is more broadly possible with the release of Windows 10.

 

What and When:

The UWWI service is following the decision/guidance of the Entra ID governance team, put into place by the UW Enterprise Architecture program. Many thanks to the sage advice of that team.

 

Entra ID device join has been put into a limited, exploratory stage. It changed from the default setting where anyone with a user account in our enterprise Entra ID (currently anyone with a UW NetID) could join any capable device, to a very small group.

 

What You Need to Do:

No action is required. If you Entra ID joined one of the 50 devices already Entra ID joined, we’ll be contacting you to ensure you know the implications, our guidance, and that you have the option of disconnecting from Entra ID. See https://cloudpuzzles.net/2015/03/disconnecting-a-windows-10-device-from-azure-ad/ for a walkthrough of disconnecting.

 

More Info:

This notice will be sent to techsupport@uw.edu on the existing Windows 10 thread.

 

Our enterprise Entra ID is uwnetid.onmicrosoft.com, but has domains such as uw.edu, u.washington.edu, and washington.edu associated with it. So when a user enters a username of <uwnetid>@uw.edu in the Entra ID device join experience, they end up in our enterprise Entra ID.

 

The Entra ID device join capability has:

-no delegated administration

-requires InTune licensing or another MDM product to realize the same device management value as AD join

-the ability to centrally do a partial device wipe

-the ability to join mobile devices which are incapable of AD join

 

While there are some new and exciting capabilities here, we believe this represents an immature offering for our environment, so are limiting its availability at this time. We will continue to explore this capability, reviewing it for positive steps in maturity and utility for the UW.

 

NOTE: This capability is different from Workplace Join (which we don’t currently support), and also separate from the Entra ID Conditional Access capability which can use AD joined devices as part of access control decisions.

 

If you’d like to read more about the Entra ID Device Join capability, we recommend the following:

-http://blogs.technet.com/b/in_the_cloud/archive/2015/05/28/managing-azure-active-directory-joined-devices-with-microsoft-intune.aspx

-http://blogs.technet.com/b/ad/archive/2015/05/28/azure-ad-join-on-windows-10-devices.aspx

 

If you have reason to partner with us to explore this capability, please contact UWWI via help@uw.edu.

 

Brian Arkills

UW Windows Infrastructure Service Manager

 

 

1st Nebula billing cycle for FY16

We are approaching the 1st FY16 monthly billing cycle for Nebula. This is an informational update so you have a chance to update information feeding that billing cycle. We are also providing an update on our plans related to removing Nebula resources that are not claimed (paid for).

 

What and When:

Earlier today, Nebula processed all the eligibility groups for departments for the first time, re-assigning users based on the membership of your eligibility group.

 

This was the bulk user “purge” we asked everyone to patiently wait for—thanks for waiting, it saved us a lot of time and kept our costs down. For many reasons, we didn’t actually purge any users—we simply just marked users who no one claimed for their department for later action (more about that below). If you review your users in MyIT, you will see that it reflects your eligibility groups.

 

Nebula will submit billing charges for July 2015 at the end of the month.

 

You can review your expected charges for Nebula file services and Nebula desktops via MyIT. What is represented in MyIT is based on 3 things:

  1. Which desktops are assigned to your department
  2. Which users are in your department’s eligibility group, which by extension determines which Nebula home directories are associated with your department
  3. Which shared file service paths or Windows file service paths are assigned to your department

 

You can expect that what you see in MyIT is what we’ll submit billing charges for.

 

With respect to our plans for Nebula resources who have no one willing to pay for them, here are our intentions:

  • We will remove access to the home directories of users who are no longer in an eligibility group. All Nebula home directories have a snapshot with a 1 year retention beyond deletion, so even if something is undesired now but you later need access, this is a fallback. We plan to delay deletion of undesired home directories for a month to provide a grace period for mistakes.
  • We will remove access to shared file service paths which have no department assigned. Prior to doing so, we plan to contact all users who have access to the file service path to let them know of the impending action, so there is an opportunity for a department to step forward and pay to continue. Again, we plan to delay deletion for a month to provide a grace period.

 

There are other Nebula configuration we will take action on in the future. Future actions we’ll take include removing “unclaimed” user accounts (and by extension access) on the shared file services, removing access to Nebula VPN services, and removing the “Nebula supported” flag which the UW-IT service desk uses in routing requests.

 

What you need to do:

The mechanisms we’ve created over the last 4 months and may not be as accurate as everyone would like. Since there will be billing charges based on these soon as well as the additional actions I mentioned, it would be best to fix up any inaccuracies now.

 

If you are a contact for a Nebula department, here are the specific things you should do to review:

  • Go to MyIT and review the ‘Users in My Department’ report: https://support.nebula.washington.edu/myIT/myNebulaUsers.aspx. This should only include the users in your eligibility group. If there are missing or additional users, you need to update your eligibility group. NOTE: if you visited MyIT this morning, you are very likely to see a different set of users listed now because we processed the eligibility groups for the first time today. We plan to process eligibility groups once daily, so if you do make changes, you should expect MyIT to reflect those changes the following day.
  • Go to MyIT and review the ‘File Services’ report: https://support.nebula.washington.edu/myIT/fileServices.aspx. This should only include those group directories and home directories for your department (i.e. that you will pay for). If there are missing or additional paths, then send a request to help@uw.edu to resolve the file service assignments. If the amount of usage for a given file service path is unexpectedly large, you may want to take action to reduce the use to reduce your cost. If there are home directories you do not want, you can adjust your eligibility group membership. If you do not want to remove a user from your eligibility group, but also don’t want that user to have a Nebula home directory, we have a solution for that, but at this time you’ll need to send a request to help@uw.edu for that solution.

 

We are aware of a number of eligibility groups which have no members, and have separately already contacted departments where this is the case. You may need to take action if you were contacted about that.

 

We are aware of several shared file service paths which have no department assigned to them because our initial assignment was requested to be removed. As noted above, we plan to contact the users with access to these locations. You may need to take action if you are contacted about that in the future.

 

More info:

If you are wondering what a Nebula eligibility group is—see http://www.washington.edu/itconnect/wares/nebula/tools/view-and-manage-nebula-resources/#What.

 

If you are having problems getting your eligibility group to have the right set of users, we can provide a list of which users were associated with your department prior to today.

 

That document includes a variety of assistance for departmental contacts who use MyIT to review their Nebula use. We are happy to help you if you need further assistance or explanation—just send us a request at help@uw.edu.

2015 July

Here’s our semi-annual newsletter update on recent happenings with the UW Windows Infrastructure.

 

==== New Capabilities and Improvements ====

 

* Self-service SPNs for Application UW NetIDs. This allows an application UW NetID to set its own SPN values, just as a gMSA can, and like an OU admin can for a computer object. See https://wiki.cac.washington.edu/display/UWWI/Delegated+Service+Principal+Name+values for more details.

 

* Domain based DFS replication is now supported. This allows replication of file content across non-clustered Windows file servers. See https://wiki.cac.washington.edu/x/obv5Aw for more info.

 

* Active Directory snapshots. We now take a daily snapshot of Active Directory and retain the last 7 days. This provides an additional recovery option on top of Active Directory Recycle Bin, and daily backups of the domain controllers. This solution gives us a better recovery option for some scenarios. When an object is recovered from the recycle bin, not all attributes are recoverable, so we can augment object recovery with snapshot data. We also had an experience several years ago where a domain controller had some corruption in its local AD instance and we had to manually remove it to prevent further damage. If we had another similar experience, but corruption on a subset of all objects was replicated to other DCs, an AD snapshot would help us recover without taking the entire AD offline for an authoritative restore from backup (which would also mean some AD data loss).

 

* Monitoring improvements. We’ve made a broad investment in collecting and reporting performance data from our systems into a visual data platform called Graphite provided by the emerging Monitoring service. This platform is not restricted, so you can access that data, and might want to do so to answer questions you might be shy to ask us like “were the domain controllers really busy just now?” or “is there a problem right now with group sync?” or other questions where additional visibility on operational performance would be useful. Here’s a list of relevant UWWI performance graphs:

-ADFS Stats and Performance: https://graphs.s.uw.edu/dashboard/#services.uwwi.netid.adfs

-Group Sync Stats: https://graphs.s.uw.edu/dashboard/#GroupSync

-DC Performance including LDAP response: https://graphs.s.uw.edu/dashboard/#UWWI-DCs

-Kiwi Stats: https://graphs.s.uw.edu/dashboard/#services.uwwi.netid.kiwi

-Simple Binds: https://graphs.s.uw.edu/dashboard/#simpleBinds

 

Note that you can adjust the time period of data displayed, which can help to show interesting trends. For example, if you view the simple bind graph with the right time period, you can see the drastic effects of our efforts in the next item …

 

* Simple Bind abatement. We’ve created a reporting infrastructure that allows us to identify customers who have misconfigured their systems or application. We’ve also done the work of contacting relevant customers and reduced 99% of all simple binds. We are exploring blocking some misconfigured applications on shared systems who are difficult to identify, as well as notification to UW NetIDs whose password has been exposed.

 

====Spotlights====

 

* UWWI service staffing availability has been down over the past 6 months—this is because other UW-IT services have had higher priority work and staffing shortages. You may notice a smaller amount of new capabilities in this 6 month period, which is partially attributable to this smaller investment. We’re in the process of trying to hire someone who can backfill this staffing gap.

 

* Internal improvements. We’ve deployed a new HyperV cluster, refactored our internal documentation, and made changes to support changes to two services we depend on.

 

* We are in the midst of deploying a new security capability from Microsoft called Advanced Threat Analytics. This leverages machine learning capabilities to evaluate activity on domain controllers to identify anomalous events. This tool was acquired from a company called Aorato, and is capable of identifying pass the hash attacks and persistent “hidden” compromises of highly privileged accounts.

 

* We are also in the midst of deploying an AD-integrated certificate authority (AD Certificate Services). This is a result of exploration work we’ve mentioned in previous newsletters and will enable automatic certificate enrollment for computers in delegated OUs to support specific use cases like web servers for UW only audiences. This new infrastructure will be required to support new “Next Generation Credential” capabilities coming with Windows 10 like Windows Passport.

 

* A new governance team for Azure Active Directory has been created. This team is exploring the diverse capabilities provided by Entra ID, and guiding our direction in terms of which capabilities and configurations we enable.

 

==== Trends ====

 

* Since January, UWWI has: +9 delegated OUs (103 total), -3 trusts (53 total), +~1000 computers (10635 total), +50k users (754k total), -19k groups (108k total).

* UWWI support requests have returned to saner levels. 241 UWWI support records resolved since the last newsletter (vs. 347 in prior period and 188 in the period before that).

 

You can see metrics about UWWI at http://www.netid.washington.edu/dirinfo/stats.

 

==== What’s Next ====

 

Our objectives for the 6 months ahead include:

* Continue deployment of an AD-integrated Certificate Authority to enable a variety of multi-factor scenarios and easy internal website certificate renewal.

* Continue deployment of Advanced Threat Analytics to provide pass the hash and insight into anomalous threats

* Continue Entra ID governance team investment, with possible new objectives generated from that

* Deploy some Azure Rights Management infrastructure to support RMS pilot exploration

* ADMT 3.2 upgrade

* UW firewall GPO template to provide customers with a simple way to leverage Windows Firewall

* Explore privileged user risk mitigation–we’re interested in Microsoft’s “Just In Time” admin capability

* Explore requiring LDAP signing

* Explore providing authentication use restrictions for privileged user accounts in NETID domain

* Preferred Name (assuming this work moves forward as part of the HR/P project and has investment from other services)

* Partner with Nebula to support new Software Deployment Service via SCCM deployment in NETID (assumes depleted Nebula resourcing levels are resolved)

* Support growing Nebula migration efforts into the NETID domain

* Support Authentication service in exploring Multi-factor Authentication solutions for Windows (assumes project is launched)

* Support emerging Monitoring Service by sharing Windows expertise

 

Of the 14 forecasted objectives we listed in the last UWWI News, here’s a review on how they turned out:

  • 5 were successfully completed: Simple Bind, internal doc refactor, AD snapshots, HyperV upgrade, 3y MS tech roadmap
  • 5 were started and continue: AD-integrated CA, ATA, ADMT upgrade, SCCM exploration
  • 1 was started by dependent service, but hasn’t yet reached the point where we can start: Preferred Name

 

Note: Last summer UWWI conducted a customer survey, http://ontheroa.uservoice.com/forums/258239-uwwi. Given our current reduced staffing level, we haven’t pursued a refreshed customer survey this year, but I believe we will get some new customer input via the Entra ID governance team, and will generate a new survey when staffing permits. We will continue to use your input from that survey plus the AAD governance team to guide our investment priorities, limited by dependent service investment decisions. In some cases, lack of investment for long periods of time by dependent services may mean we choose to deploy a tactical solution instead of a strategic solution.

 

==== Your Feedback ====

 

Supporting your needs for UWWI capabilities offered via the Basic Services Bundle is our priority, so we welcome feedback on how we can make the UWWI service more valuable to you.

 

The UWWI service has a backlog or roadmap visible to customers at https://wiki.cac.washington.edu/display/UWWI/UWWI+Roadmap where you can see more details about current and some future work items.

 

You can voice your support for future objectives to help us rank priorities by voting customer surveys when we have them, ask for things that aren’t yet on our radar, or simply contact us via help@uw.edu.

 

Brian Arkills

UW-IT, UWWI Service Manager

 

 

Nebula billable time infrastructure changes and the demise of ‘Budget Approvers’

Changes to the underlying billable time infrastructure Nebula uses to support Nebula consulting charges have occurred. This email outlines some of the consequences for Nebula customers.

 

What and When:

UW-IT began retiring the help request tool called RT a year ago, replacing it with a new system called UW Connect. Up until June 30, 2015, Nebula used RT to report billable time for consulting. On July 1, 2015, UW-IT discontinued the billable time capability of RT and replaced it with a similar capability in UW Connect. The new billable time capability in UW Connect does not work exactly the same as the old billable time capability in RT. The most notable difference is that there is no “budget approver” functionality. This was a functionality that allowed someone previously designated as a “budget approver” for a given budget to be alerted to new billable time records by automatically adding them to the email interactions.

 

What you need to do:

There is no action you must take, this announcement is informational only. You might choose to implement workarounds to meet any lost value due to this change.

 

More info:

Nebula billable time results from consulting charges when a request isn’t covered by the core Nebula desktop rate and we bill for the time spent to bring such a request to resolution. When this is the case, we ask for a valid budget and notify the customer that the request will result in additional charges.

 

For billable time, you should see the same level of detail in the monthly TSE bills that are generated.

 

The billing mechanism is owned by UW-IT Business and Finance. The decision to not provide an authorization/notification mechanism was made by UW-IT Business and Finance due to the lack of a central authority for all UW budgets for billable activities, as well as technical constraints in customizing the new help request system. Nebula’s previous authorization/notification capability was unique among UW-IT billable charges and required a highly customized tool to support it.

 

I recognize that this change represents less functionality, and many customers relied on the notification mechanism to have a higher degree of confidence about charges being incurred or to intercept requests for which your department has special procedures. UW-IT will definitely work with customers on charges that are not appropriate or excessive. If you’d like for us to track specific kinds of requests for your department and redirect those kinds of requests for help to you, please do let us know about those–we do track that kind of information already and are happy to expand this. Another workaround you might consider is to ask your users to copy you on their email to help@uw.edu–you would then be part of the interaction if we need to ask for a budget.

 

On a positive note, this change means Nebula support staff are no longer using two different help request systems to track your requests. Using both for a year has been a strain on us.

Temporary eligibility groups for departments which haven’t provided one

Back on 5/7, Nebula first asked that every department provide an eligibility group to update our records so we can accurately grant access and bill only for your current users. Many departments haven’t yet been able to provide an eligibility group. This has blocked our ability to purge old users, even for those departments that have provided an eligibility group. So Nebula is taking action on some department’s behalf to enable the service to move forward by creating temporary eligibility groups.

 

What and When:

This week we’ll be creating a temporary eligibility group for those Nebula departments which haven’t provided one to us yet. Initial membership for this temporary eligibility group will be based on our existing user department data at the point the group is created.

 

What you need to do:

When your department is ready to provide and assume management of an eligibility group of your Nebula users, we can rename and assign administration of the temporary eligibility group to you. Until that point, the membership and management of that temporary eligibility group will be frozen. Just send in a request when you are ready to do that.

 

Alternatively, you can also supply your own eligibility group and override the temporary eligibility group we’ve created. In that case, our temporary eligibility group will go away. If you’d like to provide your own eligibility group for your department, contacts for Nebula departments should visit https://support.nebula.washington.edu/myIT/myNebulaDepartments.aspx to supply that information. http://www.washington.edu/itconnect/wares/nebula/tools/view-and-manage-nebula-resources/#changeeligibility steps you through the process, if you need additional help.

 

If you are in the process of creating and populating your eligibility group, you’ll know we’ve created a temporary one if you see the field populated when you visit https://support.nebula.washington.edu/myIT/myNebulaDepartments.aspx. Feel free to override the value if that’s the case. J

 

More info:

Creating these temporary eligibility groups will allow Nebula to move forward on purging a large set of old users. This purge won’t be as complete as it could be with department provided eligibility groups from every department, but it will meet the service needs.

 

MyIT budget release

A MyIT release which permits adding budget information for group directories and default budgets for users and desktops is now available.

 

What and When:

As of this morning, MyIT includes new capabilities to set budget information along with some other updates. The changes include:

  • On the “IT Things I Own/Manage -> Nebula File Services” page, aka https://support.nebula.washington.edu/myIT/fileServices.aspx, there is now the ability to set budget on a per file directory basis.
  • On each individual department page accessible from the “IT Things I Own/Manage -> Nebula Departments” page, aka https://support.nebula.washington.edu/myIT/myNebulaDepartments.aspx, there is now the ability to set a default user budget and a default desktop budget. The default user budget applies to any user in your department who doesn’t otherwise have a budget assigned—this would apply to a user home directory. The default desktop budget applies to any desktop in your department that doesn’t otherwise have a budget assigned.
  • On the “IT Things I Own/Manage -> Nebula Users in My Department” page, aka https://support.nebula.washington.edu/myIT/myNebulaUsers.aspx, there is now a column indicating whether the user is a current faculty/staff.

 

What you need to do:

You can now review the budget information assigned to group directories, home directories, and desktops and adjust them as needed. For group directories and home directories, there is no existing budget so you will need to assign a budget to those items. Keep in mind that for home directories you can leverage the default user budget to assign a budget to all user home directories in your department.

 

More info:

Nebula is providing drop-in visit times to help customers navigate what they need to do. The drop-in visit times are listed here:

http://www.washington.edu/itconnect/wares/nebula/news/

More times will be added as necessary.

 

A general page that provides more detailed assistance on how to View and Manage Your Nebula Resources is at http://www.washington.edu/itconnect/wares/nebula/tools/view-and-manage-nebula-resources/.