Congratulations Class of 2022!

Congratulations Class of 2022!


Your graduation is the first of many proud, successful moments for you. To be of assistance to you, we would like to share important information relating your Kalamazoo College network accounts as you transition into an alum.

Your Network Account

Now that you have completed your course of study at K, you may retain your network account for 10 months after the end of your course of study (graduation, completion of a year as a visiting international student, or completion of the engineering 3/2 program).

Information Services will also send reminders in the months and weeks approaching the end of this period. Please note that your accounts and associated electronic files are then permanently deleted after this 10 month period.

Departure Checklist

Email

  • Review Emails – Be sure that existing emails are reviewed and addressed appropriately. This may mean forwarding emails to a personal account or exporting emails to an external file.
  • Update Subscriptions and Services – If you have services or subscriptions (social media, streaming services, etc.) connected to your kzoo.edu email account, you’ll want to update those services and subscriptions to use a different, personal email address of yours.
  • Contacts and Info – Review information in your email contacts and copy any necessary information before the 10 months is up.

Network Files

  • M: drive – If you’re still on campus and used your M: drive, review files there and delete, move, or copy them as appropriate.
  • Review Files and Folders – Review files in individual OneDrive folders and delete, move, or copy them to others as appropriate.
  • Make Succession Plans – Think about any clubs or organizations you might belong to, and make succession plans with next year’s leadership by reviewing files in other personal cloud based storage (e.g. Google Docs, Dropbox). Be sure to delete, move, or copy them to others as appropriate.
  • Note – Please note that you will no longer have access to Microsoft Teams through K.

Alumni Email Forwarding

Kalamazoo College offers a lifetime e-mail forwarding option to its alumni. All email forwarding addresses are in the format “firstname.lastname.classyear@alumni.kzoo.edu.” To sign up, please complete the Email Forwarding Signup form.

For additional information, please contact the Office of Alumni Engagement at 269.337.7300 or alumni@kzoo.edu.

Frequently Asked Questions about MFA

If your question is not listed below, please contact the Help Desk (helpdesk@kzoo.edu, 269.337.5800), or visit us in the Upjohn Library Commons, room 117.

Basics

What is MFA?

Multi-Factor Authentication (MFA) means using more than one key (e.g. password) to log on to a given service. You are probably familiar with MFA if your bank sends you a text message when you log in.

How does MFA work?

MFA protects your account and protects Kalamazoo College because when you sign in, you prove your identity in two ways: with something you know (a password) and something you have (usually a phone).

Implementation

Why is K implementing MFA?

MFA is a standard practice at most colleges, universities, and businesses that allow access to protected information. It helps protect personal and institutional information from theft, cyberattack, and ransomware. Additionally, K must implement MFA by July 1, 2022 to renew our cybersecurity insurance. Use of MFA will be required for all who use K’s Office 365 apps.

What’s the timeline for implementation of MFA?

All students completed MFA enrollment by May 27. The deadline for staff is June 3, 2022. The deadline for faculty is June 17, 2022.

My email stopped working; what do I do?

After enabling MFA on your account, some users find that their email stops synchronizing on their phone. It’s easy to fix: just remove your email account from your phone and re-add it. You can use our instructions for Connecting Email to a Mobile Device.

Day-to-Day

What applications will use MFA?

We are implementing MFA for all Office 365 apps (like email, Teams, Word, etc.). Notably, this list does not include signing into Windows itself, nor does it include Moodle or HornetHQ.

Briefly, Office 365 applications are Microsoft Forms, Microsoft Teams, Office 365 Exchange Online (our email), Office 365 SharePoint Online (including apps that depend on SharePoint online, like OneDrive, Word, Excel, PowerPoint). 

How often will I have to use MFA?

You should expect to see prompts to authenticate with MFA about once every 90 days.

What if I reboot my computer?

Rebooting your computer does not sign you out of the apps on your computer. You should not expect a reboot to trigger an MFA prompt.

What about Colleague? What about VPN?

MFA for Office 365 apps does not change how you will use Colleague or VPN. Continue to use these services as before.

What about my tablet?

You may choose to install the Microsoft Authenticator app for iOS or the Microsoft Authenticator app for Android on a tablet, and use it in addition to (or instead of) a mobile phone. If you use Office 365 apps on your tablet, you may find it convenient to have the Microsoft Authenticator app on your tablet. Having the Microsoft Authenticator app on a tablet in addition to a phone is a good idea, so you can use your tablet to authenticate in case you get a new phone or new phone number.

What authentication method is recommended for MFA?

Information Services recommend that you add your mobile phone as your authentication phone. For your primary authentication method, we recommend the Microsoft Authenticator app for iOS or the Microsoft Authenticator app for Android. It’s easier, quicker, and more secure than text messages.

Should I register more than one device for authentication?

Yes; Information Services recommends you add at least two authentication methods. For most folks, it makes sense to add a mobile phone and the Microsoft Authenticator app. It’s smart to add another method (like the Microsoft Authenticator app on a tablet) as a backup.

If I use Office 365 apps on multiple devices, do I need Microsoft Authenticator on each device?

No. You only need to download the app on one device to be able to authenticate using the Microsoft Authenticator app. For instance, when you log into Teams on a laptop, you can confirm the logon with the Microsoft Authenticator app on your mobile phone. It’s smart to add the Microsoft Authenticator app for iOS or the Microsoft Authenticator app for Android to a second device, in case you have problems with your main device.

Special Circumstances

What if I forget my mobile phone?

If you have a phone in your office, we suggest you add your office phone as an authentication factor, in case you need to use MFA on a day when your mobile phone is not with you.

What if I’m traveling internationally? What if I don’t have signal or data?

We suggest you download and configure the Microsoft Authenticator app for iOS or the Microsoft Authenticator app for Android. With it you can sign in without receiving a text message. If your phone is connected to the Internet, you can approve sign-ins via notifications. If your phone is not connected to the Internet, the Microsoft Authenticator app can still generate codes that you can use for authentication.

What if I get a new phone number?

If you have configured a second authentication factor (like the Microsoft Authenticator app for iOS or the Microsoft Authenticator app for Android) you can add your new number (and remove your old number) at https://aka.ms/mfasetup. If you have already gotten a new phone number and did not configure a second authentication factor, please contact the Help Desk.

Additional MFA Questions

Please contact the Help Desk (helpdesk@kzoo.edu, 269.337.5800), or visit us in the Upjohn Library Commons, room 117 for additional questions.

Multi-Factor Authentication (MFA) Implementation

The Microsoft Authenticator logo
The Microsoft Authenticator logo

What is MFA?

Multi-Factor Authentication (MFA) means using more than one key (e.g. password) to log on to a given service. You are probably familiar with MFA if your bank sends you a text message when you log in. We are implementing MFA for all Office 365 apps (like email, Teams, Word, etc.).

Why MFA?

MFA is a standard practice at most colleges, universities, and businesses that allow access to protected information. It helps protect personal and institutional information from theft, cyberattack, and ransomware. Additionally, K must implement MFA by July 1, 2022 to renew our cybersecurity insurance. Use of MFA will be required for all who use K’s Office 365 apps.

How do I setup MFA and when?

All Kalamazoo College members who use K’s Office 365 apps will need to setup MFA at https://aka.ms/MFAsetup. The process is easiest if you finish setup before the “completed by” date listed in the MFA implementation schedule. If you don’t complete setup before the “completed by” date, when you next log on to an Office 365 app, you will be presented with a screen with instructions.

MFA implementation schedule

K College MembersCompleted By
Information ServicesMay 6 (6th week)
Pilot groups, President’s Staff, and early adoptersMay 13 (7th week)
Idle accounts (no sign-ins in the last six months), new employee accounts, more pilot groupsMay 20 (8th week)
StudentsMay 27 (9th week)
Staff June 3 (10th week)
FacultyJune 17

MFA Setup

  1. Go to https://aka.ms/MFAsetup before the “completed by” date listed in the MFA implementation schedule.
  2. For the easiest and most secure method of authentication, download either the Microsoft Authenticator app (Apple App Store) or Microsoft Authenticator app (Google Play).

Note: If you don’t complete setup before the deadline, when you next log on to an Office 365 app, you will be presented with a screen with instructions. You will need to complete MFA setup before proceeding.

Using email on a smartphone?

If you use email on a smartphone, you may need to remove and re-add your email account to your mobile device, which will enable modern authentication.

When do I need to use MFA?

Each time you log in to any Office 365 app, you will use a second authentication factor. If you stay logged in to an app, you can use it without reauthenticating for up to 90 days. Each Office 365 app is distinct, so, for example, you’d need to use MFA to log in to email and then again to log in to OneDrive.

Problems or questions?

Please see our Frequently Asked Questions about MFA, or contact the Help Desk at 269.337.5800 or HelpDesk@kzoo.edu.

Subscribe to our Posts

Did you miss the latest IS announcement? Subscribe to receive our posts directly to your inbox!

2022 MISO Survey Results

Understanding the Survey

In January 2022 Kalamazoo College conducted the Measuring Information Services Outcome (MISO) survey which is available to liberal arts colleges with merged library and IT organizations.

The purpose of the survey is to evaluate our services by better understanding the importance and level of satisfaction with the services we offer. Participants were asked to evaluate up to 38 services depending on their role in the College.

Survey Specifics

Faculty, Staff, and Students were asked about a series of Information Services items surrounding the services we offer as a department. The questions related to frequency of use, how informed participants felt about services, participant interest in learning about specific services, and more. The following results focus on participant response to how important an item is, and how satisfied they are with the item.

Responses to these questions were ranked on a four point likert scale:

How ImportantHow Satisfied
1: Not Important1: Dissatisfied
2: Somewhat Important2: Somewhat Dissatisfied
3: Important3: Somewhat Satisfied
4: Very Important4: Satisfied

Response Rates


Who took the survey?

97 Faculty

300 Students

127 Staff

Key Findings

Faculty Top Five

The following information lists the top five IS services in which Kalamazoo College faculty felt were the most important and those that they were most satisfied with. Note that the services are ordered with the highest scores starting at the beginning.

Most Important
  1. Availability of wireless on campus
  2. Performance of wireless on campus
  3. Time it takes to resolve your computing problems
  4. Hornet HQ
  5. Media technology in meeting spaces/classrooms
Most Satisfied
  1. Library circulation services
  2. Library research instruction for academic courses
  3. Physical course reserves
  4. Library reference/research services
  5. Archives/Special Collections

The following information lists the five least important and least satisfied IS department services according to faculty. All items classified as least important or least satisfied still averaged a score of 3 (satisfied) or higher. Note that the services are ordered with the lowest scores starting at the beginning.

Least Important
  1. Digital image collections (e.g. ARTStor)
  2. Archives/special collections
  3. Assistive technologies (screen reader, etc.)
  4. Physical course reserves
  5. Library research guides
Least Satisfied
  1. Assistive technologies (e.g. screen reader)
  2. Overall direction of info tech services
  3. Computing Help Desk
  4. Availability of wireless access on campus
  5. Campus computing labs

Student Top Five

The following information lists the top five IS services in which Kalamazoo College students felt were the most important and those that they were most satisfied with. Note that the services are ordered with the highest scores starting at the beginning.

Most Important
  1. Moodle
  2. Availability of wireless access on campus
  3. Performance of wireless access on campus
  4. Hornet HQ
  5. Campus printers
Most Satisfied
  1. Hornet HQ
  2. Moodle
  3. Library circulation services
  4. Overall library service
  5. Library OneSearch

The following information lists the five least important and least satisfied IS department services according to Kalamazoo College students. All items classified as least important or least satisfied still averaged a score of 3 (satisfied) or higher. Note that the services are ordered with the lowest scores starting at the beginning.

Least Important
  1. Digital image collections (e.g. ARTStor)Moodle
  2. Physical course reserves
  3. Archives/special collections
  4. Interlibrary Loan
  5. Student Computer Consultants
Least Satisfied
  1. Performance of wireless access on campus
  2. Availability of wireless access on campus
  3. Access to free or low cost textbooks/materials
  4. Group study spaces in the library
  5. Your input into computing decisions that affect you

Staff Top Five

The following information lists the top five IS services in which Kalamazoo College staff felt were the most important and those that they were most satisfied with. Note that the services are ordered with the highest scores starting at the beginning.

Most Important
  1. Support when you have a computing problem
  2. Availability of wireless on campus
  3. Performance of wireless access on campus
  4. Hornet HQ
  5. Time it takes to resolve a computing problem
Most Satisfied
  1. Library reference/research services
  2. Overall library service
  3. Web conferencing (e.g. Zoom, Teams)
  4. Information Services website
  5. Library circulation services

The following information lists the five least important and least satisfied IS department services according to Kalamazoo College staff. All items classified as least important or least satisfied still averaged a score of 3 (satisfied) or higher. Note that the services are ordered with the lowest scores starting at the beginning.

Least Important
  1. Assistive technologies (screen reader, etc.)
  2. Library OneSearch
  3. Library Circulation Services
  4. Archives/Special Collections
  5. Library reference/research services
Least Satisfied
  1. Performance of wireless access on campus
  2. Availability of wireless access on campus
  3. E-mail SPAM filtering
  4. Computing Help Desk schedule
  5. Status of information on computing problems

Key Findings Arranged by Level of Importance and Satisfaction

Most Important

The following information lists the top five most important IS department services. Note that the services are ordered with the highest scores starting at the beginning.

Faculty
  1. Availability of wireless on campus
  2. Performance of wireless on campus
  3. Time it takes to resolve your computing problems
  4. Hornet HQ
  5. Media technology in meeting spaces/classrooms
Students
  1. Moodle
  2. Availability of wireless access on campus
  3. Performance of wireless access on campus
  4. Hornet HQ
  5. Campus printers
Staff
  1. Support when you have a computing problem
  2. Availability of wireless on campus
  3. Performance of wireless access on campus
  4. Hornet HQ
  5. Time it takes to resolve a computing problem

Most Satisfaction

The following information lists the top five IS services in which each constituent group was most satisfied with. Note that the services are ordered with the highest scores starting at the beginning.

Faculty
  1. Library circulation services
  2. Library research instruction for academic courses
  3. Physical course reserves
  4. Library reference/research services
  5. Archives/Special Collections
Students
  1. Hornet HQ
  2. Moodle
  3. Library circulation services
  4. Overall library service
  5. Library OneSearch
Staff
  1. Library reference/research services
  2. Overall library service
  3. Web conferencing (e.g. Zoom, Teams)
  4. Information Services website
  5. Library circulation services

Least Important

The following information lists the five least important IS department services according to each participant group. All items classified as “least important” still averaged a score of 3 (satisfied) or higher. Note that the services are ordered with the lowest scores starting at the beginning.

Faculty
  1. Digital image collections (e.g. ARTStor)
  2. Archives/special collections
  3. Assistive technologies (screen reader, etc.)
  4. Physical course reserves
  5. Library research guides
Students
  1. Digital image collections (e.g. ARTStor)Moodle
  2. Physical course reserves
  3. Archives/special collections
  4. Interlibrary Loan
  5. Student Computer Consultants
Staff
  1. Assistive technologies (screen reader, etc.)
  2. Library OneSearch
  3. Library Circulation Services
  4. Archives/Special Collections
  5. Library reference/research services

Least Satisfaction

The following information lists the top five IS services in which each participant group was most least satisfied with. All items classified as “least satisfied” still averaged a score of 3 (satisfied) or higher. Note that the services are ordered with the lowest scores starting at the beginning.

Faculty
  1. Assistive technologies (e.g. screen reader)
  2. Overall direction of info tech services
  3. Computing Help Desk
  4. Availability of wireless access on campus
  5. Campus computing labs
Students
  1. Performance of wireless access on campus
  2. Availability of wireless access on campus
  3. Access to free or low cost textbooks/materials
  4. Group study spaces in the library
  5. Your input into computing decisions that affect you
Staff
  1. Performance of wireless access on campus
  2. Availability of wireless access on campus
  3. E-mail SPAM filtering
  4. Computing Help Desk schedule
  5. Status of information on computing problems

What Next?

  • The IS department will continue to review the rest of the data and comments carefully
  • Compare this year’s results with our 2012 MISO survey results and to other schools
  • Use the data to make changes and improvements not only with IS staff and leadership but with affiliated committees and groups as well.

Questions

If you have questions relating to this survey please contact our Library Director, Stacy Nowicki at stacy.nowicki@kzoo.edu.

IT Tip – Are you being phished by email?

Are you being phished by email?

“A phishing email is an email that appears legitimate but is actually an attempt to get your personal information or steal your money” (Microsoft Support, Phishing and Suspicious Behaviour)

This IT Tip will share ways to identify suspicious emails and how to report a phishing case.

Phishing attacker taking personal data through a laptop.
Photo credit: alwarebytes LABS and shutterstock

Red Flags in Suspicious Emails

The content below has been adapted from KnowBe4 resource, Social Engineering Red Flags.

From:

  • The email is from someone inside K or from a vendor, or partner and the email is very unusual or out of character.
  • You don’t have a business relationship nor any past communications with the sender.
  • The email is from someone outside of K and it’s not related to your job responsibilities.
  • The email is from a suspicious domain (like micorsoft-support.com)

To:

  • You were copied on an email sent to other people, but you don’t personally know the other people it was sent to.
  • The email was also sent to an unusual mix of people within your organization. For example, a group of people who last names start with the same letter.

Date and Subject:

  • The email was sent at an unusual time like 3 a.m. and not during regular business hours.
  • The subject line is irrelevant or does not match the message content.
  • The email message is a reply to something you never sent or requested.

Attachments

  • There is an attachment that you were not expecting or that does not make sense in relation to the email message.
  • There is an attachment with a possibly dangerous file type such as:
    • ZIP and RAR Files
    • DOC and DOCX
    • XLS, XLSX, XLSM
    • PDF
    • IMG, ISO, etc.

Hyperlinks

  • The biggest red flag – When you hover over the hyperlink to preview the URL and the link-to address is for a different website.
  • The email only has long hyperlinks with no other information.
  • The email has a hyperlink with a misspelling of a known website such as www.bankofarnerica.com (in this case the “m” is really two characters, “r” and “n.”
  • The sender asks you to click a link that seems odd and/or illogical.

Content

  • The email is out of the ordinary, has bad grammar, and/or spelling errors.
  • The sender asks you to click a link or open up an attachment that seems odd and/or illogical.
  • The sender asks you to click a link or open an attachment in order to gain something of value or avoid a negative consequence.
  • The email claims to have a compromising or embarrassing picture of yourself or someone you know.

Tips for checking a link without clicking on it

Simply hover over the link and look at the bottom left corner of your computer screen for the full URL the link actually goes to.


How to Report Phishing Attempts

The easiest way to report phishing emails is through the Report message option in Outlook which can be found in different locations depending whether you’re using Microsoft Office Outlook or Outlook.com.

The following information was retrieved from the “How to report a phishing scam” section on Microsoft’s “protect yourself from phishing” documentation.

Microsoft Office Outlook

With the suspicious message selected, do the following:

  1. Choose Report message from the ribbon
  2. Select Phishing.

This is the fastest way to report it and remove the message from your Inbox. It will also help Microsoft improve their filters so that you see fewer of these messages in the future.

Webmail at outlook.office.com

Select the check box next to the suspicious message in webmail. Select the arrow next to Junk, and then select Report phishing.

Note: If you’re using an email client other than Outlook, start a new email to phish@office365.microsoft.com and include the phishing email as an attachment. Please don’t forward the suspicious email; as it needs to be received as an attachment so the headers on the message can be examined.


Have Questions?

For more Microsoft documentation please visit the Phishing and Suspicious Behaviour page through Microsoft Support. Additionally, please feel free to email Help.Desk@kzoo.edu with more specific questions related to phishing emails.


Katrina Frank, Web Services Specialist

Suggest an IT Tip

If you have a topic that you would like us to cover in the future, please complete the IT tip suggestion form or email, Katrina Frank at Katrina.Frank@kzoo.edu directly.

Welcome Back from Break! – Spring 2022

Welcome back Hornets!

We hope you had a great spring break. The IS team is here to help you get ready for Spring quarter. Please view the resources below to get connected, access your accounts, and know who to contact in need.

Please feel free to connect by sending us an email at HelpDesk@kzoo.edu or by visiting the Help Desk. We’re open Monday – Friday: 8:00 a.m. – 5:00 p.m with Student Computer Consultants available during some off hours.


Student Tools

  • Hornet Hive – The Hornet Hive is the campus hub for announcements, event listings, and links to campus web resources.
  • Office 365 – Free access to Office 365 which includes Word, Excel, PowerPoint, OneNote, Sway, Teams, Stream, and online file storage space in OneDrive.
  • Moodle – Where you can access instructor course materials, your grades throughout the quarter, and more.
  • Printing – Information on standard laser printing, color and large format/poster printing, 3D printing, printer locations, cost, print credits allotments, and how to set up wireless printing.
  • Connecting to the Internet – Use the eduroam network! Setup takes a few minutes, but it will work all year, all over campus, and at other campuses all over the world.

Visit the Student Tools page for more resources and student IS news throughout the year.

Faculty Tools

Visit the Faculty Tools page for more information on other resources to utilize throughout the year.

Staff Tools

View the Staff Tools page for more information on other resources to utilize throughout the year.


Reminder: Faculty and Staff Cybersecurity Training

Don’t forget, President’s Staff asks all employees to complete online cybersecurity training by June 30, 2022. See the March 2022 Required Cybersecurity Training post for more information.

Additional Resources Worth Mentioning

Wi-Fi Issues

  1. Visit the Wi-Fi troubleshooting page to assist you in resolving your issue. Please attempt all troubleshooting tips that apply to your circumstance before completing a report.
  1. Due to the complexities of Wi-Fi-related problems, specific details are needed to help resolve Wi-Fi related issues. You must provide the following in order to submit a Wi-Fi Outage Report.
List of Required Information to Complete the Wi-Fi Outage Report Form
  • Name
  • The wireless network you were attempting to connect to
  • Screenshot of the error you encountered or the exact error message as displayed on your device
    • Note: A full screenshot of the error you are encountering is the most reliable way we can assist in resolving your issue
  • Date of occurrence
  • Time of occurrence
  • Location of occurrence
  • If this issue has happened elsewhere on campus. If so, the location(s) it has occurred
  • If the device was able to connect successfully in any other locations on campus. If so, the location(s) it has been successful
  • Type of device experiencing the issue –
    • Note: If you are using a device running on Android 10 or iOS 14 you will need to disable MAC randomization on your device first. See the Wi-Fi Troubleshooting section for instructions.
  • MAC Address – If you are unsure where to locate your MAC Address please see, How to Find Any Device’s IP Address, MAC Address, and Other Network Connection Details article by How-to-Geek.
  • If there were any other apps running on the device while the issue was experienced. If so, which apps

Required Cybersecurity Training for Faculty and Staff

Kalamazoo College Faculty and Staff,

Information security is as important as it’s ever been. To maintain cybersecurity requires a cooperative effort from all of us. In addition to securing IT systems, protecting the network, and reviewing key business practices, each user must be mindful of cybersecurity concepts and must make good information security choices.

To that end, President’s Staff asks all employees to complete online cybersecurity training by June 30, 2022.

Training Details

  • The training is composed of a series of short video modules (approximately 15 minutes total run time) with interactive questions.
  • The training was developed by Beazley Breach Solutions, K’s cybersecurity insurance carrier.
  • We will track completion to ensure that all employees finish this by July 1.

Start your Training!

  1. Visit https://campus.kzoo.edu/is/cybersecurity/
  2. Enter your username and KNET password when you see the prompt (you’ll notice the module is from Beazley Breach Solutions)
  3. Go through the video modules and answer the interactive questions
  4. Upon successful completion of the required module, you’ll receive a certificate of completion.

Difficulty Completing the Training?

Please contact the help desk (helpdesk@kzoo.edu or 269.337.5800) if you are in need of an accommodation due to a disability or have difficulty completing the online training.

Thank you in advance for doing your part to keep K’s community and our information secure.

IT Tip – Using “Focused Inbox” in Outlook

Welcome to our new series, IT Tips!

IT tips are meant to expand your understanding of the technology offered here at K and improve your experience using that same technology. For our first IT tip, you can learn more about the Focused Inbox feature in Outlook.

If you have a topic that you would like us to cover in the future please complete the IT tip suggestion form or by emailing, Katrina Frank at Katrina.Frank@kzoo.edu directly.

Katrina Frank, Web Services Specialist

Katrina Frank, Web Services Specialist

Focused Inbox

IT Tip written by Technical Support Specialist, Stefan Nash and editorial support by Systems & Networking Associate, Peter Zillmann


If you use Outlook to check your email, you may have noticed the new Focused Inbox.

Focused Inbox is a feature that attempts to help with email overflow. When active, it separates your Inbox into two tabs, “Focused” and “Other.” Emails that are considered important are displayed on the Focused tab while the rest are shown in the Other tab. Focused Inbox doesn’t move your emails out of the Inbox folder, but tries to keep less-important email out of your way until you look for it.


“Emails are on the wrong tab…”

Sometimes, Focused Inbox will move an email to Focused when you would prefer it in Other, and vice-versa. You can specify which tab an email should appear in by doing the following:

From your inbox, select the Focused or Other tab, and then right-click the message you want to move.

  • If you’re moving from Focused to Other, select Move to Other if you want only the selected message moved. Select Always Move to Other if you want all future messages from the sender to be delivered to the Other tab.
  • If you’re moving from Other to Focused, select Move to Focused if you want only the selected message moved. Select Always Move to Focused if you want all future messages from the sender to be delivered to the Focused tab.

Turn off Focused Inbox

You may prefer to turn off the feature entirely. Here are the steps to turn off Focused Inbox:

For the Outlook desktop application

  1. Select the View tab.
  2. Select Show Focused Inbox.

The Focused and Other tabs will disappear from the top of your mailbox.

For Outlook on the web

  1. At the top of the page, select Settings icon.
  2. In the Settings pane, move the Focused Inbox toggle to off.

Have More Questions?

See the Focused Inbox for Outlook documentation for more instruction.

The Virtual Reality Lab is Open Again!

We are open!

The Virtual Reality Lab inside the Library’s Center for New Media Design has returned! Students, staff, and faculty are once again welcome to experience our Oculus Rift S headset for education, entertainment, and exploration. We are currently still taking safety precautions so we ask that you limit the number of guests to four individuals per session and clean the VR headset between uses with sanitary wipes. Our staff is available on site to help with any questions.

Book the Lab

The Virtual Reality Lab has a new, easy-to-navigate online booking page where you can reserve up to 50 minutes in the Lab. Walk-in guests are welcome if the Lab is available! Our waiver is now also online. If you plan on visiting the Lab, please complete the waiver on Microsoft Forms before your arrival. We do ask returning users who previously filled out a paper waiver to complete the online form.

Teaching & Learning with Virtual Reality

If you’d like to organize a visit for your class, department, or student organization, please contact Josh Moon, Educational Technology Specialist, at josh.moon@kzoo.edu. We can also discuss options for bringing a mobile VR setup to rooms on campus. In addition, groups may contact us for approval to stream live events using the Kalamazoo College Virtual Reality Lab Twitch account.

3D Printing is Now No-Cost

3D printed purple Octopus sitting on one of the Kalamazoo College 3D printers.

No-Cost 3D Printing

Information Services is pleased to announce that our 3D printing services will be no-cost for students, staff, and faculty effective immediately. We hope this invites new ideas, increased participation, and opens up access across campus. The College reserves the right to limit the size/number of prints for individual use, vet appropriate applications, and prioritize academic projects in the printing queue.

Students in the Center for New Media Design will be operating our MakerBot printers and learning skills in 3D printing. We thank you in advance for your patience as everyone begins training this fall.

Want a Model 3D Printed?

If you’d like to discuss having a model 3D printed, stop into the Center for New Media Design during our business hours or contact Josh Moon, Educational Technology Specialist, at 269.337.7415 or Josh.Moon@kzoo.edu.

3D Printing Questions, Ideas or Problems?

Visit the 3D Printing and Scanning Technology section of our website or contact Josh Moon, Educational Technology Specialist, at 269.337.7415 or Josh.Moon@kzoo.edu.