Please note that UNC Virtual Lab now requires you to sign in with UNC Office 365 authentication. If you are not registered for 2-Factor authentication, you can register here. You will be asked to log in with your UNC (onyen@ad.unc.edu) account:
Help Articles – Citrix Login – Virtual Lab and UNCApps (service-now.com)Running Virtual Lab
- Open a Firefox or Chrome Internet browser
- Go to virtuallab.unc.edu
- Log in with your UNC Onyen and password
- You will be asked to choose an authentication method.
- Once you have approved your authentication, you will see a security message. Click Accept
- It will show you a Citrix Receiver screen. Click on the Detect Receiver button
- Check the box that says “I agree with the Citrix license agreement”
- Click on Download, then click Save File
- Citrix Workspace app will how in the downloaded files. In the upper-right corner (Firefox) or at the bottom of the screen (Chrome)
- Follow the instructions below to install the Citrix Workspace app.
Installing Citrix Workspace
- In the Welcome to Citrix Workspace screen, click on the Start button
- Check the box to accept the license agreement, click next
- Click Install (do not enable single sign-on)
- Once you see the installation is successful, click Finish (not add account)
- Search for Citrix Workspace on your computer, and run the app
- Click add account
- It will ask for a username. Enter virtuallab.unc.edu
- It will then ask for a username and password. Enter your UNC Onyen and password
- There is a second password box. This is for 2-factor authentication. You can enter “push” to send a push to your Duo app on your phone, or you can open your Duo Mobile app, and enter the current six digit code (with no spaces) in the second password box.
- You should then be able to access the Virtual Lab virtual desktop, and run applications
Arena
Arena simulation uses Microsoft’s Virtual Desktop in UNC’s Microsoft 365 environment, which will require you to sign in using your UNC-Chapel Hill username of onyen@AD.UNC.EDU, Onyen passphrase, and register for two-factor if you have not, already. Refer to the following instructions:
Note: Create a separate browser profile for accessing UNC’s account before proceeding:
Create browser profile:
UNC-CH Multifactor Registration: Help Articles – 2-Step for Office 365 – MFA (unc.edu)Errors while connecting:
Article – Virtual Lab: Error – Admini…Access Microsoft Virtual Desktophttps://rdweb.wvd.microsoft.com/arm/webclient/index.html- Under ITSD-AVD click “Desktop – CLICK HERE TO FIND APPS” to begin session
- Under Access Local Resources, select Clipboard and printer, then Allow and select Don’ task me again for connections to this computer
- Under the Enter your credentiials screen, sign in with your onyen@AD.UNC.EDU and Onyen passphrase
Before opening Arena: Set up your Kenan-Flagler OneDrive- Open Search bar at the bottom, type “OneDrive”, click OneDrive (App) under Best Match
- It should say Connecting and Launching OneDrive
- OneDrive email address field:
- Enter kfusername@business.unc.edu, KFBS passphrase, and second factor
*This connects the OneDrive on the Virtual Desktop to your UNC KF account
Open Arena- Click on the Arena icon to open the application
Save a Test File to your OneDrive- To save a file, click on File > Save As
- Select OneDrive – UNC Kenan-Flagler Business School
- When you need to go back to Arena, you can re-open the file from OneDrive
Opening a previously saved file- When you log back into Arena in a future session, you may see a “recent documents” list. That will not work
- Click Open > Browse then and browse to your Kenan-Flagler OneDrive in This PC
- Open the file
The IT Service Desk recommends antivirus software as well as an antispyware solution to combat today’s viruses/malware. Both Windows and Macs can get infections. Depending on what product you’re using for virus/spyware removal we recommend that you run monthly security scans with products like System Endpoint Protection Center, Windows Defender, or Avast antivirus. Often these scans can slow down your PC and occasionally take lengthy amounts of time to complete, however they can remove unwanted viruses and spyware which can cause pop-ups and security threats.
Typically, these products will allow you to run a scan and then prompt for the removal of infections. In addition, if they remove something which was necessary for your PC there are often a quarantine area where you can restore files from.
- Faculty and staff have computers that are managed by the IT Department, the updates and scanning are done automatically. We do not encourage sensitive users or users with sensitive data (such as social security numbers, passport photos, etc.) to remove viruses themselves. If you’re experiencing a virus/spyware infection please contact the IT Service Desk immediately, do not attempt virus removals yourself.
- Students must install their own software if it did not come installed when the computers was purchased. If you have any older antivirus software you must uninstall it prior to installing a new A/V product. If a virus or spyware is found on your computer, you can remove it yourself by following the instructions on the vendor’s website. You can also contact the IT Service Desk for assistance.
If you have questions regarding virus/spyware removal please contact the IT Service Desk at
(919)962-0792 or
itservicedesk@kenan-flagler.unc.edu and we will be happy to assist you.
The Data Integration and Analytics (DIA) team is about all things data. We are responsible for the identification, evaluation, and integration of all business data at UNC Kenan-Flagler. Our mission is to provide faculty and staff a single stop for insightful data, reporting and analytics to support their business needs.
Enterprise Data and Integration
Our team has built and are managing an enterprise data warehouse (EDW). This is a central data repository housing historical and current data in one system that can be used for reporting, data analytics, and business intelligence (BI). Using our ETL tool, we pull, cleanse, consolidate and store data from over 22 sources. Our EDW is the foundation upon which operational reporting, data visualization, AI and BI can now sit.
Data Visualization
We provide consultation and development support for your data visualization needs. Data visualization is the term used to describe all of the ways people transform data into visual representations. Patterns, trends and correlations that might go undetected in text-based data can be exposed and recognized easier with data visualization software.Tableau is the visualization tool we have deployed for use at Kenan-Flagler. With interactive visualization, faculty and staff will be able to use Tableau to create dashboards and infographics. If you have Data Visualization needs or would like to explore the possibilities on new and advanced ways to visualize and dashboard your business data, please reach out to our team.
Open access to Tableau is not available at this time, but if you would like to request access, please follow the link below:
How To Request Access to Tableau DashboardsData Analytics and Business Intelligence (BI)
Business Intelligence is a set of methodologies, processes, architectures and technologies that transform raw data into meaningful and useful information used to enable more effective strategic, tactical and operational insights and decision-making. By helping our staff apply BI to their dataset, our team hopes to offer new levels of insight around that dataset leading our programs in better decision-making. Stay tuned to exciting services soon to be released in this area.
Enterprise CRM Management
The DIA team, in collaboration with our program partners, is responsible for managing some of our core enterprise level CRMs. We assure production readiness, security and accessibility to these applications. We are happy to consult with key stakeholders of these systems to assist with dashboards, reporting, or other custom functionality your team. Examples of these tools are Salesforce, Slate, and 12Twenty.
Our Business Systems and Development team provides custom software development to support school operations.
Custom Business Operational Systems
In support of a complex organization with unique business practices, we have developed several online business processes and workflows that help to improve workflow and communications across the various business units. Examples of this are the MyKE:Admin modules for our registration staff, an advising system, financial tracking systems, and soon to come employee onboarding.
System Integration
Through the development and use of ETL tools and data integration services, we offer enterprise system integration to help with systems such as Connect Carolina, Canvas and 2U.
Web Services
Offering in-house web development for operational systems, we specialize in online business processes and custom responsive design.
Personal Websites
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
https://tarheels.live/.This is a web publishing service that allows anyone with a main campus Onyen account to create a website at no charge. WordPress is the platform that main campus has selected for creating sites quickly and customizing the look and feel. Support is provided by ITS at
https://digitalservices.unc.edu/selfservice/.
Operational Reporting
Operational reporting is intended to support the day-to-day activities in the traditional reporting formats. The DIA team will to continue offering support of existing operational reports well as provide consultative services and guidance to stakeholders who have new or modified reporting needs.
The UNC Research Computing group offers a variety of resources that UNC Kenan-Flagler faculty and staff can leverage. Research Computing for UNC-Chapel Hill is developed, supported and maintained by the ITS Research Computing group.
UNC Research ComputingGetting Access to Research Computing clusters
Wireless projection is available in our upgraded classrooms and is provided through AirMedia. This allows easy presentation wirelessly using laptops and mobile devices. No additional software is needed if you are using a laptop, but mobile devices must download an app. Projecting is as simple as selecting AirMedia on the classroom touch panel and typing the displayed IP address into your web browser. If you have any questions, issues, or would like to request a demo please contact the IT Academic Technologies team by email or phone
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
http://tarheels.live.
This is a
self-service web publishing platform that allows anyone with a main campus Onyen account to create a website at no cost. WordPress is the platform that main campus has selected, it allows sites to be created quickly, has advanced content management, and allows for customization of the look and feel.
Wordpress is best for publicly accessible webpages.
If you are a faculty member who needs to share a lot of documents with your students, your Canvas course website is best location for that.
Getting Started
More information on how to
get started with campus-hosted WordPress websites is available if needed. Review the TarHeels.live
Terms of Service before getting started.
Need more assistance with editing a WordPress site? Tutorials are available at
WordPress.org. The Undergraduate Library also has guidance for
editing a TarHeels.live website.
Information Security is essential to prevent those with malicious intent from accessing data. Practices may include: Changing your online account passwords, avoiding unsolicited emails, locking or logging off your PC as you walk away, all of these things help prevent data loss from anyone who might wish to compromise accounts.
INSTRUCTIONS
Do not store any personally identifiable information on your computer
Do not store any personally identifiable information (such as Social Security Number, date of birth, Driver’s License Number, credit card information and home addresses) on your computer or removable media (such as disks, tapes, USB drives)
Create Complex Passwords
- at least 8 characters
- at least one letter
- at least one digit
- at least one special character, such as !, #, $, %, ^, etc. Do not use @, /, <, or ?
- cannot contain all or part of your username or be one of your previous five passwords
Regularly Change Passwords
- Change on a Monday so you have all week to remember
- Change all passwords at the same time
- Use different passwords for each account
- Do not write down passwords
- Do not share passwords
- Shred papers and destroy CD/DVDs that contain confidential information (use cross-cut shredder)
- Delete or move information off-line that is no longer needed
- Old computers should have data completely erased before being discarded.
Password protect computers and use password protected screen savers
All computers should have login passwords
- Lock your computer when you leave your office (on a PC, press Ctrl+Alt+Delete and select “Lock Computer” on a Mac)
- Set your computer to automatically lock after 15 minutes of Inactivity
- Set automatic updates for your computer
- Your computer should be set with Windows/Mac OS automatic updates option enabled
- Operating system firewalls should be enabled
Anti-virus and anti-spyware software
- Anti-virus and anti-spyware software on your computer should be configured to update definitions at least once per day
- Computers should be scanned daily for new viruses/spyware missed by active protection
- Viruses/spyware are commonly distributed by websites, screen savers, game software, and other “free” programs
Review our information regarding spyware and viruses or
anti-virus software for more information.
Do not click links in unsolicited e-mails
Links in unsolicited emails can appear safe but can actually link to websites with malicious content. If you don’t recognize the sender or are not expecting the email the best action is to not click on any links at all. If you must click on a link:
- Type the URL address in the browser
- Follow a link from a trusted web page
- Use a previous bookmark
Report phishing or spam emails to Kenan-Flagler IT
Outlook has a Report button which allows you to identify phishing or spam emails, use this instead of emailing the Service Desk unless you happen to have acted upon one:
- In Outlook
- Windows – Report button appears on right side of ribbon.
- macOS – Report button appears in the middle of the ribbon.
- Outlook Webmail – Report button appears on the left side of the ribbon.
- When reporting use “Phishing” or “Junk” options.
Tips for securing laptops & other mobile devices
- Store all passwords, account names, access codes, login instructions, and authentication tools separately from laptops (not in the pockets of the carrying case)
- Lock up laptops when not attended (cable lock during the day, in a locked drawer or cabinet when you leave for the day)
- Keep laptops out of sight when temporarily stored in a car, hotel room, or home
- When traveling always keep laptop in your possession
- Record make/model & serial number of your device
- If a device is stolen or missing contact the IT Service Desk immediately