Application Support
-
Canvas Login
Canvas Login How to Login to Canvas General Information This guide will walk you through how to log into Canvas using single sign on. Getting Started Go to https://web.wvm.edu/#/canvas Click ‘Sign in with Single Sign On’ 3. A Microsoft prompt will appear and ask for your email address and password. Enter your information and proceed to Canvas. If you have Microsoft Authenticator setup, you will need to be sure to approve the sign in request/
-
Adobe Login - Single Sign-On
Adobe Login Using Single Sign-On General Information Adobe products used by the district also use the single sign-on process. You will need to be sure to have your email credentials to gain access to these applications. Getting Started Your WVM provided computer should already have Adobe DC installed. Click on the Windows icon on the bottom left of your screen, then click on Adobe Acrobat DC listed and open the application. **If you do not have this application installed on your device, you can also access Adobe HERE ** Your email credentials are formatted as follows: District Employees: firstname.lastname@wvm.edu West Valley Employees: firstname.lastname@westvalley.edu Mission College Employees: firstname.lastname@missioncollege.edu Alternatively, you can sign in by clicking this icon in the top right of the application: When the sign in prompt appears, you will be given several options. You will need to manually enter your email address. Do not select any of the options X’d below. If you receive a prompt regarding a ‘Shared Device’ you will need to select “Company or School Account”. Enter your password and select “Sign in” Mission College Employees: firstname.lastname@missioncollege.edu Alternatively, you can sign in by clicking this icon in the top right of the application: When the sign in prompt appears, you will be given several options. You will need to manually enter your email address. Do not select any of the options X’d below. If you receive a prompt regarding a ‘Shared Device’ you will need to select “Company or School Account”. Enter your password and select “Sign in”
-
Office365 Apps for Students
Office365 Apps for Students Using Microsoft Apps With Your Student Email General Information As a student at West Valley-Mission Colleges, you have access to Office365 apps, such as: Word, Excel, Outlook, and PowerPoint. Getting Started There are a few ways to access your Microsoft applications. Below you will find instructions on each access method. West Valley and Mission College Portal: 1. Go to your school’s homepage West Valley College: www.westvalley.edu Mission College: www.missioncollege.edu 2. Locate the portal login option, then enter your student email address & password. (If you do not know your student email and/or password, please refer to THIS list) West Valley: Mission College: 3. Locate the Features section on your portal Dashboard and click on the Office 365 option. From here you can use the web-based applications, as shown on the left, or download the apps to your computer. Sign in through Office directly: 1. Navigate to www.office.com 2. Enter your student email address and password. (If you do not know your student email and/or password, please refer to THIS list) 3. Begin using web-based apps (on the left) or download Office365 Apps to your computer. Additionally, West Valley and Mission Colleges have Laptop Loaner programs in which Office365 is pre-loaded to the devices. If you need a device, please submit a form to your respective institution. West Valley College: Spring 2021 Books/Calculators/Surface Go Mission College: Laptop Hotspot Request
-
Install Office 365 from the WVC Portal
The Office versions available in the browser, Microsoft Online, are not the full versions. Students will need to download and install Office 365, then sign in with their student email credentials to access the full versions of the applications. Start here to get the full version of Office 365: https://portal.office.com/account/?ref=MeControl#installs Sign in with West Valley College student email credentials when prompted. After you log into the Portal you will see the following screen. Click on Install Office. This will download the Office setup.exe. When it is finished downloading, click on the Officesetup.exe. It will walk you through the installation process. Downloading Office might take a while. Good News for Mac Users Students on Macs can download the Office 365 applications from the Apple App Store and only need to sign in with their student emails to license the application(s). Still Not Working Properly? Remember, different devices (i.e. Macs, PCs, iPads) have different capabilities and the versions of the software. While you might see additional functionality, you still might not be able to do everything described in the book (or find it in the same place that described in the book).
-
Handling Messages in Quarantine
General Information Our email security system, quarantine@messaging.microsoft.com, may occasionally send you an email telling you that you have messages in quarantine. This document will briefly review what actions you can take after receiving one of these emails. Review Message Clicking the Review Message link in the email will take you to our security.microsoft.com portal in your browser. You may have to sign in with your work email to view the page. From here, you can see all messages that the suspicious sender has sent to you and the reason that the quarantine filter caught them. In this case, Microsoft believes that these messages are spam. If you check the box on a message, you can select to preview it, release it, or delete it. Take some caution when previewing a message here. If it is indeed malicious, then links within the previewed message may be fraudulent. In this example, I do not believe this email to be malicious, but I also don't find it relevant to me and would consider it spam. I have no issue with simply deleting the messages. If the messages were instead relevant to me, I might release them instead so that they could be delivered to my inbox.
-
Zoom Sign-in Process
Zoom Sign-in Process About Faculty and staff are given Zoom accounts using Single Sign-On (SSO). This document will show you show to sign in to Zoom with SSO from the web and from the desktop app. Desktop App Open the desktop app and select "Sign in." Ignore the "Enter your email" field! Instead, hit the SSO button below that. It has a key icon. You will see a window asking you to enter your company domain. Ours is "wvm-edu". Type it in and hit the Continue button. Your browser will open and have you sign in. Use your work email and password. Once signed in, hit the Launch Zoom button and the Zoom desktop app will open and sign you in automatically. Web Navigate to https://wvm-edu.zoom.us/ and select "Sign in". From there, log in with your work email and password.
-
Identifying Phishing Red Flags and Reporting Phishing
Identifying Phishing Red Flags General Info Phishing is a type of social engineering scam in which an imposter tries to fool people into giving away their personal information, such as passwords or credit card numbers. Sometimes this is done by simply posing as an important figure such as a CEO or chancellor and asking for it. Often this is done by making a fake website designed to look like one of our login pages, then sending the link out to everyone they can with messages that indicate that clicking it and logging in is urgent. These sorts of messages often have tells that give them away. We call these red flags. This document will cover what to look out for when it comes to identifying these red flags so that you can keep yourself safe from phishing scams. Identifying Red Flags Here is one example of a phishing email: The email address that the message comes from is a generic one that the scammer is spoofing. When a message asks you to click a link or open an attachment or even scan a QR code, always consider who the sender is. Ask yourself: Does HR typically send out mass emails from a generic address like this? Note the ambiguous salutation. Lazy phishing scams will often use these as they are simply sending a template email to as many people as possible. The call to immediate action is perhaps one of the biggest red flags. Scammers don't want to give you time to think about what you're reading. They will ask you to complete it today, ASAP, urgently, etc. so as to put you into a panic and get you to click before you can consider that the email may not be legitimate. If an email gives you a very tight deadline and asks you to open a link or an attachment, be suspicious of it. The link itself is another one of the biggest red flags. If you have a way to check what the link is without clicking it, such as hovering your mouse over it, you can check to see if it will really take you to the link that it claims to be. If the email says it will go to the West Valley site but the link says it will go somewhere else, that is an immediate cause to not click it. Some of these red flags on their own aren't necessarily suspicious, such as the ambiguous salutation. Taken together with other red flags, however, gives you a better chance of spotting a phishing email before clicking anything or giving up any info. Some other red flags not seen in this example: Obvious typos or grammatical errors: If an email appears to be a template from a company like Microsoft or Google (or even from our internal departments), it will typically have been reviewed by several employees for grammar mistakes. Phishing scammers on the other hand are prone to putting strange formatting or obvious errors in their messages. If you spot amateurish mistakes in what appears to be a template message, that is often cause for suspicion. Account you never created: A common phishing scam is to make it seem as though an account was created on a website with your email and without your permission. If you get an email from a site like for example Yahoo or Amazon to your work email address when you know you've never used those sites with your work email, that is cause for suspicion. Unrequested generosity: Phishing scammers may tell you you've won a free cruise or some raffle for money. These are usually obvious, but it's possible to be blinded by the thought of free stuff. Always be weary of generosity that you were not expecting and did not request. Unknown carbon copies: If other users were Cc'd on an email but you don't know them and they aren't in your department, that may be cause for suspicion. Mass internal emails are usually done through mailing lists and won't show Ccs, but scammers who don't have access to those mailing lists may simply drop tons of people into the Cc field. Out of character: If you get a message from a personality that you know, but the message is seemingly out of character, that is cause for suspicion. If Brad Davis himself suddenly emails you asking for a credit card number, that may not actually be Brad Davis. Unusual hours: Was a message from HR sent at 3 AM? We're not open then, so that message likely isn't from HR at all. Blackmail: If an email claims to have something incriminating on you and tries to threaten you with it, that is immediate cause for suspicion, especially if they do not immediately present whatever it is they claim to have. This is a common alternative to the "urgency" method of inducing panic, and can blind otherwise sensible people to the dangers of clicking on whatever link they send you. Reporting Phishing When you receive what you believe to be a phishing email, don't do any of the following: Reply to it Open any attachments, QR codes, or links Forward it to any colleagues Instead, DO: Show it to a colleague in person if you're not certain Send a separate, new email to a known internal email. For example if they are impersonating HR, you could send a new email to someone you know is in HR to ask if the phishing message was legitimate. Whether or not you are able to confirm for certain that something is a phishing email, you should always err on the side of caution and report it if it makes you particularly suspicious. To report an email the proper way, look for the Phish Alert Report button in Outlook when you're viewing the email. It will have an icon of a mail envelope with an orange hook attached to it. In the old Outlook, it's near the top right of the screen: In the new Outlook and Outlook on the web, it's near the Reply and Forward buttons (and sometimes inside of the "..." button if your screen is too narrow to display everything on one line): After reporting a phishing email, it will delete itself from your inbox. Someone from IS will verify whether it was legitimate or not. Phishing emails that are reported and identified are usually mass-deleted from our mail server from the inboxes of everyone that received them, so reporting a phishing email is important as a way of protecting your colleagues from potentially falling for the scam.