My Recently Visited Services
Students will use PaperCut to view their print activity, WebPrint to print on campus, and Mobility Print to install printers onto their computers.
Add a monitor, move from a desktop to a laptop, etc
Laptops and desktops that are issued to employees of Anderson University as either permanent or loaned equipment.
Schedule delivery and set-up of food and drinks to your university meeting or event.
Includes information on technology training for individuals and departments
Need some help with technology? Have a question? Click on the link above to contact ITS.
Faculty and staff working from off campus locations such as home, a hotel, or the local coffee shop, should use a VPN to keep data secure while working from those locations.
PaperCut is software that works with the printers across campus.
Request proofreading or editing of digital marketing materials. We will proof digital recruiting materials or communication to the public such as newsletters, PowerPoint presentations, etc.
Faculty and staff information for Canvas, AU's learning management system. Use this form for asking questions, reporting problems, requesting extra courses, merging course sections, and requesting training or consultations.
Training information on classroom technology for faculty and staff
Update website pages on anderson.edu, such as general content corrections, broken links, faculty/staff directory, and website forms.
Standards for writing and grammar for AU related digital and print materials.
Let ITS know if you need help with your AU account, password, or Okta.
An outage is a service interruption that affects multiple people. If you suspect there is an outage of any ITS service, please let us know.
ITS provides Sophos anti-virus software on all university-owned computers.
The majority of AU classrooms have a simple technology setup, but even this can sometimes cause problems.
If you're having problems with a video conference, ITS is ready to help.
This service request concerns specific issues with university-owned computers and hardware, including requesting computers for new employees.
Security Consultation to facilitate security best practices for business use cases or for risk assessment and data security considerations