Q: How can I set up my e-mail client to check my UWM account?
A: UITS maintains guides for setting up recent versions of popular e-mail clients for UWM e-mail at the UITS Documentation page. We recommend Microsoft Outlook (Windows) and Mozilla Thunderbird (Windows, Linux, or Mac OS X) for best results with UWM e-mail; however, any mail client that supports IMAP should work with UWM e-mail.
If you would like to set up a mail client that is not documented by UITS, you will need to consult that product's documentation. You will need the information below to configure your e-mail client:
Server Type: IMAP
E-mail Address: [your ePantherID]@uwm.edu
Incoming Mail Server: mail.uwm.edu
Outgoing Mail Server: mail.uwm.edu (only works on-campus)
Q: How can I securely access my UWM services on a public wireless network?
A: UWM provides VPN access to students and faculty. VPN stands for Virtual Private Network, a method of securely providing access to a local network over an untrusted connection (such as the public internet). When you connect to the VPN, your network traffic is encrypted and routed through a UWM server. To the computers within UWM's network, you are seen to have an address on the UWM network. In addition, the encryption helps protect your network traffic when you are using an open wireless access point like you find at businesses or conference centers.
UITS provides a free VPN client along with an installer that automatically configures the program to access UWM's network. After installing and configuring the client, you can log in using your ePantherID and password.
You can download OpenVPN for Mac or Windows at the UWM OpenVPN site. If you are using Windows Vista, be sure to download both the Client Installer and the appropriate 32- or 64-bit configuration package. Mac users will only need to download the disk image for their installed version of OS X.
Q: How can I use my portable device to check my UWM e-mail?
A: We do not support e-mail on portable devices. However, you should be able to check your UWM e-mail with any e-mail client that supports IMAP. UITS maintains documentation for configuring Palm, Active Sync, and iPhone/iPod Touch devices on the UITS Documentation page. Most handheld devices are capable of checking IMAP mail, but the behavior of individual devices may be unpredictable or unreliable. Only advanced users should use these devices to check school e-mail.
Refer to the section on e-mail client setup for more information about configuring a mail client.
Q: How do I set up my computer to use the PROWLnet wireless network?
A: PROWLnet is only available to current students, faculty, and staff. If you are not currently enrolled in classes or working for the university, you will not be able to use PROWLnet.
You will need a device that supports WiFi (either 802.11b or 802.11g) and has a reasonably modern web browser. This includes laptop computers and some cell phones and handheld devices. WiFi devices that do not have a web browser (such as some VOIP handsets) or whose web browser is very simplistic or outdated (including some PDAs) will not be able to access PROWLnet.
Most devices are set by default to automatically connect to an open WiFi network and obtain an address automatically. If you are using a handheld device, refer to the product information for details about how to connect to a wireless network. If you are unable to connect properly using your Windows or OS X laptop, the following guides will walk you through the process manually:
Once you are connected to PROWLnet, open a web browser and navigate to any page. You should automatically be redirected to the UWM PROWLnet login page. You will be unable to use any Internet services on your computer (including browsing, e-mail, and chat) until you have entered your ePantherID and password into this form.
If you continue to have trouble connecting to PROWLnet, call the Help Desk at 229-4040 to speak to a technician.
Q: What should I do if I'm the victim of a "phishing" attempt?
A: "Phishing" is an Internet scam utilizing e-mails which urgently request personal information under the guise of updating or confirming existing information, typically from a bank or other service provider. Designed to look like official correspondence, the e-mails actually transmit your data to hackers and can compromise your identity.
The most important rule to remember is that you should never respond to unsolicited requests for any kind of personal information via e-mail. If you receive a "phishing" e-mail, forward it to email@example.com as soon as possible. Further information about "phishing" scams and tips for protecting your personal information can be found at http://security.uwm.edu.