What is changing?
Network access controls are being implemented by Michigan Medicine over the course of this year for devices connecting to the wired and wireless networks. This is part of the effort Dr. Runge announced to increase the security of our Michigan Medicine network connections. See the most recent update.
As of April 27, 2017 access to the secure wireless network is only be accessible to "privileged" devices configured with appropriate security protocols:
- Personally-owned laptops, smartphones, and tablets enrolled in AirWatch (these will be able to connect to the Michigan Medicine 8021X wireless network).
- Institutionally-owned/managed smartphones and tablets enrolled in AirWatch (these will be able to connect to the Michigan Medicine 8021X network).
- Institutionally-owned/managed laptops and desktops configured with the CoreImage management system (computers configured and managed by Health Information Technology & Services have the "CoreImage" platform and set of applications). These will be able to connect to the Michigan Medicine "MFleet" wireless network).
Restrictions for devices connecting to the wired network by Ethernet cable are being implemented gradually over the course of this year. Access to the wired network will only be available to CoreImage devices and those inventoried by HITS teams. For more information about protecting the security of our networks, visit michmed.org/nac or contact the Service Desk: 734-936-8000.
Get ready for the change
1. Identify your device
- Is your Michigan Medicine-provided device a CoreImage device? This can be a laptop or desktop, a PC or a Mac.
- If you are not sure, visit the CoreImage webpage to determine if your device is a CoreImage device.
- If it is a CoreImage device, you do not need to do anything.
- If it is not a CoreImage device, you will need to have it reconfigured to access secure Michigan Medicine networks.
- If you have a personally-owned device (smartphone, laptop, or tablet), it must be enrolled in AirWatch to connect to the UMHS-8021X wireless network. Visit the AirWatch information page. You can self-enroll or HITS can assist. Visit one of our Help Me Now locations or pop-up clinics in your area.
2. Prepare your device
- Check your storage
Having under 50 GB of data stored on your laptop or desktop will help minimize the time it takes to migrate your computer to the CoreImage.
- Back up your device (recommended)
It is recommended that you back up your device whether you are installing AirWatch on your personal device or preparing to migrate your Michigan Medicine computing device to the CoreImage. While HITS will back up and restore the data on your computer, it is a good idea for you to make a copy. U-M Box has unlimited data storage available and is safe for sensitive and regulated data.
- Still need help?
Deployment teams will be reaching out to departments to get institutionally-owned, unsecured devices configured to the CoreImage or inventoried. If you have questions, you can send an email to firstname.lastname@example.org and someone will assist you. You may also contact the HITS Service Desk at (734) 936-8000 or email email@example.com.
3. Schedule to have your institutionally-owned device managed by HITS
- If you have questions, you can email firstname.lastname@example.org.
- If you are ready to schedule to have your device inventoried or configured, you can use this same email address or contact the Service Desk.
How do I know if my personal computer is enrolled in AirWatch?
Use the search feature on your mobile device or computer to locate the AirWatch software.
How do I know if my computer is already on the CoreImage?
Core workstations are assigned a unique eight character terminal ID (TermID). Generally, Core workstations have a physical tag attached to the outside of the computer featuring the TermID. More info
What does it mean to reimage my computer?
Once you prepare and schedule your computer migration, one of our staff will back up the data stored on your computer. Reimaging the computer includes installation of basic management tools that allow your computer to receive software and security updates. The process timing varies depending on the complexity of your setup and the amount of data stored on your device. It could take as few as four hours or up to a few days to complete. Loaner computers may be available upon request.
What does the CoreImage look like? What will be different?
There are a few changes you will notice:
- You will be required to log in using your uniqname and Level-2 password.
- Your computer will restart every night to install software and security updates. This can be delayed upon request. Laptops will receive maintenance updates when reconnected to the network.
- Standard software will be installed, including the Microsoft Office suite.
Contact the Service Desk: 734-936-8000 or email@example.com