General Questions
All computers and software can exhibit odd behavior from time to time. A good first step when this happens is to restart your computer. If the problem persists, and it’s not covered by the rest of the FAQ, feel free to email help@engr.washington.edu
Yes, Sophos is available free for faculty and staff home users.
- Follow Link: http://www.washington.edu/itconnect/wares/uware/sophos-anti-virus-software
- Login with your UWNetID
- Click the Get Software link
- Download and Install software
You will need the computer name of your office computer to be able to remote in. To find that, do the following:
Your computer name will almost always be ENGR-_________.clients.uw.edu
Windows 7:
• Open System by clicking the Start button.
• Right-click on Computer, and then clicking Properties
• Under Computer name, domain, and workgroup settings, you can find your computer name, and its full computer name if your computer is on a domain.
Windows 8:
• Hover the mouse at the top right
• Click the settings cog > PC info.
• Under Computer name, domain, and workgroup settings, you can find your computer name, and its full computer name if your computer is on a domain.
Windows 8.1/10:
• Right click on the Start button
• Click System
• Under Computer name, domain, and workgroup settings, you can find your computer name, and its full computer name if your computer is on a domain.
***** Now from a Windows machine at home: *****
Open Remote Desktop Connection. You can do this by hitting start and searching for it, or going to Start -> Run and typing mstsc in the Open field and hitting OK.
Click Show Options.
Click the Advanced Tab.
Under Connect from anywhere, click Settings.
Select “Use these RD Gateway server settings.
In the server name field, enter “remote.engr.washington.edu” without the “”.
Under Logon Method, select “Ask for password(NTLM)”.
Keep Bypass RD gateway server for local addresses checked.
Under Logon settings, check “Use my RD Gateway credentials for the remote computer”
Under the General tab, for the Computer field, enter your full computer name, including the .clients.uw.edu suffix.
In the Username field, enter “NETID\
It’s up to you if you want to allow it to save the credentials. (If this is your own computer, I would check the box. If it’s a shared computer, leave it unchecked)
Click Save As, and save the RDP file somewhere you can find it later(Desktop, My Documents, or a Dropbox)
From a Mac:
First, you’ll need to download Microsoft Remote Desktop from the Apple store. The one with the red icon, not the old one with the silver icon that came with previous versions of Microsoft Office.
Second, run the Remote Desktop program, and click New in the top left.
For Connect Name, put anything you’d like to help you remember it.
For PC name enter your full computer name, including the clients.uw.edu suffix.
Click the Gateway drop down and click Add Gateway.
Select the Gateway tab, and then click the + sign in the bottom left.
For Gateway Name, put "COE Gateway” without the “”.
For Server, put “remote.engr.washington.edu” without the “”.
For username, enter “NETID\
For password, enter your NETID password.
Then click the red X in the top left corner.
Make sure COE Gateway is now select in the Gateway dropdown.
For username, enter “NETID\
For password, enter your NETID password.
I would keep the resolution native, and colors as True Color.
I keep full screen as OS X native.
You can choose to do full screen, or scale, or use all monitors.
Then hit the red X in the top left corner. You should now see the connection under My Desktops in the main window. Double click it, or click it and select Start on the top.
As we now use NETIDs to login to the computer, you will need to change your NETID password through your MyUW website. You can find the password change page here
The new employee's supervisor or a member of the HR office must complete and submit the following form:http://www.engr.washington.edu/mycoe/computing/newaccount.html
A member of Computing Services staff will contact the new employee with instructions, passwords.
Please Note: Computing Services usually requires at least 1 week notice so to ensure the new employee's computing environment is ready for when he or she starts. This includes temporary workers and student workers. Employees will be unable to login to their computer until they have a netid fully created, and there is usually a 4-8 hour delay between the NETID being created and the NETID service allowing them to login. Please plan ahead accordingly.
UW Facilities provides and installs keyboards. Place a work order with your department’s budget number at FS-Works: http://www.washington.edu/facilities/fsworks/
If your computer is working as expected, then you shouldn’t ever have to reboot it yourself.
All domain computers restart automatically at 1am every Friday morning.
We apply several software updates during this weekly reboot, so please be sure to save your work before you leave for the day on Thursday evenings.
However, please do not shut down your computer when you leave for the night.
Outlook Questions
iPhones/iPads/Android Devices
For directions on how to set up your Apple device to access your Exchange account please visit: Outlook for iOS and Android Help
These directions should cover most devices.
If they don’t, feel free to email: help@engr.washington.edu
- Start typing the address that shows up incorrectly in the To: field in Outlook.
- Hit the Down arrow key on your keyboard to highlight the auto completed address.
- Hit the Delete key on your keyboard to delete the auto complete address
- Open Microsoft Outlook (not the web version)
- Go to Calendar
- Right click on "Calendar" under My Calendar and go to Properties
- Once the Calendar Properties menu appears go to the "Permissions" tab
- Click on "Add... "
- On the Add Users menu click on "Advanced Find" next to the address book drop down menu top right.
- Type in the users name, select the name you'd like to grant calendar permissions to, click on OK
- Once you have selected the name and are back at the "Calendar Properties/Permissions" page, select the user you just added and use the Permission Level dropdown to select the appropriate permission level. This will allow them to see your calendar but not make any changes. It is very important that under the Name, it shows the person's name and not just their email address. If it shows their email address, the permission sharing will fail.
The person trying to gain access to your calendar will need to follow these same steps to allow you to view their calendar as well.
Once the permissions have been granted, you can then add a shared calendar so it shows up in your "Shared Calendar" list.
To set up a spam filter for your Exchange account, follow directions:
Note: If using Gmail, email: help@engr.washington.edu.
- Turn off junk mail handling in all copies of Outlook that connect to your UW email account.
Outlook 2007: Tools -> Options -> Junk E-Mail -> Options tab -> Pick “No Automatic Filtering”
Outlook 2010/2013/2016: Go to your Junk folder, and right click any message, then select Junk, then Junk E-Mail
Options. Make sure “No Automatic Filtering” is selected. - Open Chrome, Firefox, Internet Explorer or Safari
- Navigate to https://outlook.com/owa/uw.edu
- In Outlook Web Access create a rule to handle junk mail filtering:
- Click the Gear icon in the top right corner, and search for the phrase "inbox rules"
- Click the hyperlink from the search results for Inbox Rules
- Click the + icon to start creating a new rule.
- We suggest naming the rule something descriptive like "UW Spam Filter"
- Under "When the message arrives" dropdown, select "It includes these words" and then "in the message header"
- In the resulting popup box, type "X-Uwash-Spam: Gauge=XXX" without the "" and then click the + icon, and then click OK.
- For the dropdown of "Do all of the following", select "Move,Copy, or Delete" and then "Move the message to folder..."
- In the resulting popup box, scroll down to select the folder "Junk E-Mail" and then click OK
- Leave the checkbox for "Stop processing more rules" checked
- Click OK in the top left of the pane.
- If you had any other inbox rules, we suggest keeping the Spam rule at the top. You can do that by selecting the spam rule and hitting the up arrow until it is at the top.
- Click Save in the top left corner of the window.
Note: The UW spam filter judges the probability of any incoming email being spam, and then marks that probability in the email header, represented in roman numerals, using only 'X's and 'I's. In this example, we are catching anything with a 30% or higher probability, as represented by the three roman numeral 'X', of being spam and moving it to the junk folder. You can adjust this by adding and removing 'X's to fit your needs. Be sure to check your Spam folder for a while after making a change. We do not recommend going any lower than 10. 40 and higher still uses Xs and does not use L. So 50% would be XXXXX, 60 would be XXXXXX and so on.
Please go to the UW Identity page: https://identity.uw.edu
- In the Preferred Name field, click the Edit button on the right and fill out your first/last name as you'd like it to show up in outgoing email. Middle Name is not required.
The Directory synchronization process may take up to 24 hours.
Phishing Scams are typically fraudulent email messages appearing to come from legitimate senders.
They are usually carried out by a spoofed email address in hopes of luring you to a fraudulent website or to otherwise get you go share private information such as passwords or other account credentials.
CoE Computing Services or UWIT will never send you emails requesting your password, account username, Social Security number or other confidential personal information.
If it reads like a suspicious email, more than likely it is.
Err on the side of caution; and when you recognize a phishing email, delete the message from your Inbox and then empty it from the deleted items folder.
If you think the message may be legitimate, go directly to the company's web site (i.e., type the real URL into your browser) or contact the individual to see if you really do need to take the action described in the email message.