This script is intended for use in one of three scenarios,
- User has called in "I can't log in" or "My password doesn't work" or "My account got scrambled," etc & you find a STEAM-CIRT on their account.
- User calls in "My account got hacked," or "My account is sending out spam, etc. If you can find a STEAM-CIRT for their account, proceed with that one. If not, scramble the account, create a new ticket, and proceed
- You've received a ticket, have called out to contact the compromised user, and have reached them
NOTE: This is the STEAM-CIRT process that I use, it's what works best for me. I go this route to avoid syncing delays, or different steps that users have trouble with that can be speed bumps. Maybe something different will work better for you? It's just a starting point.
96/
1430/
21: UPDATED for next step in MFA rollout22: Updating now that MFA is enforced by default
borderColor | royalblue |
---|---|
titleColor | royalblue |
borderWidth | 2 |
titleBGColor | lightskyblue |
borderStyle | solid |
title | MFA Liaison - Assisting REPs in MFA Enrollment |
CSC SPECIALISTS, since REPS don't have AzureAD access, you may need to back them up and do the MFA enrollment for them.
When you're pinged by a REP for assistance doing MFA enrollment, get the username and be prepared to enroll the user in MFA via these directions, Manual Enrollment Using Azure ADNOTE:But do not turn on MFA at this point, this is just to get it ready.
borderColor | green |
---|---|
titleColor | green |
borderWidth | 2 |
titleBGColor | palegreen |
borderStyle | solid |
title | STEAM-CIRT Call Script (SPECS) |
CSC SPECIALISTS, this is the 'Call Script' that you should be using whenever you are resolving a STEAM-CIRT ticket by phone.
NOTE: Once you're up to speed on this process, you do not have to have this script up on screen every time you're doing it, however, YOU ARE RESPONSIBLE for making sure that EVERY critical step in this process is completed prior to the resolution of the STEAM-CIRT ticket.
1) Verify Identity via PPS
- Verify the User's Identity via the standard PPS Identity Verification Process.
MFA*) Notify an MFA liaison about your call
- During the MFA enrollment rollout, starting September 2021, you may be tasked with assisting your caller with their MFA enrollment
- Be prepared to enroll your user in MFA via these directions, Manual Enrollment Using Azure AD
NOTE: But do not turn on MFA at this point in your call, this is just to get it ready.
2) Complete the STEAM-CIRT Qualtrics Survey
- On your own computer, open the Qualtrics STEAM CIRT survey
NOTE: The link to the survey can also be found in the tech notes of the STEAM-CIRT - Complete the survey, by reading off the questions to the user, and recording their answers.
3) SPEC ONLY Set Temporary Password via Active Directory
NOTE: To save time, I do this in the background after PPS, while going through the Qualtrics survey with the user.
Specs can use AD to set a randomized temporary passwordNOTE:I go this route of tempPW then PW to avoid sync delays, and some speedbumps. Do what works best for you.
NOTE: You can instead use the AccountSetupReset tool to have them set a password here, but you may way up waiting up to half an hour for it to sync to O365.
4) Set Boilerkey PIN# via their Boilerkey Page
- Direct the user to visit their Boilerkey page, www.purdue.edu/boilerkey
- Have them click on the "Manage" button in the middle to get to the CAS login page
- They should log in with the new password from above, they'll need to log in with either:
- PW,push
- PW,6-digit-passcode
- Direct them to set a new Boilerkey PIN# by clicking to click on "Set your BoilerKey PIN" next to the key icon, below the green square.
NOTE: They SHOULD use a different PIN# than before. - Once the PIN# is set, they'll be dropped back on the Boilerkey homepage.
- Have them click on "Test your BoilerKey" next to the key icon.
- Have them test to make sure their Boilerkey is working normally again.
NOTE: Especially due to COVID, it's important than ever that everyone knows how to log in via PIN#,6-digit-passcode - Have the user click on "Boilerkey Self-Serve" under the black bar at the top of the page.
NOTE: To avoid more CSC calls in the future, it's important to make sure everyone has activated the Boilerkey Self-Recovery-Tool, might as well do it while they're here. - Next to the ambulance icon, have them click "Enable BoilerKey Self-Recovery via text messaging"
- They'll need to confirm their cellphone number via text message.
5) Secure their O365 Mailbox
NOTE: Hopefully by this point, their new password will have time to sync to O365... Otherwise, prepare to wait... syncing a PW to O365 via AccountSetupReset can take up to 30 minutes.
NOTE: Do this on the O365 web portal via computer, do not do it via a mail client, app, or mobile device. It MUST be done on a non-mobile browser.
NOTE: If they have a vanity email, their email and username will not match, needs to be their username, followed by @purdue.edu
- Have them review or read off the rules listed. It's usually pretty obvious if a rule is legitimate or not.
- Have them remove any malicious rules
- Have them remove any sweep rules that they didn't create