My Recently Visited Services

Request a different software version.


Request training for a lab or group on research-related technologies including HPC clusters and tools like Globus


Request assistance with broken hardware.


Get help with or request a consultation on the creation of an internal web application for campus data analysis, work improvement or reporting. Also get assistance with implementation of purchased software data feeds or integration of an API.


Request for help with all Multi-Factor Authentication (MFA) problems


Assistance with Zoom or Zoom access.


Request a tour of a classroom on campus to learn how to use the technology.


Make a change to or cancel being billed for a particular software.


S&T IT Security provide expert guidance to assess, document, and process exceptions when necessary to support business objectives while minimizing risks. Each request undergoes a thorough review to ensure that appropriate compensating controls are in place, ensuring both compliance and operational flexibility. Let us help you navigate the balance between security requirements and business needs with a seamless exception handling process.


Requests for data and phone jack activations, network cable or fiber, and network hardware.


Please provide as much information as possible for IT to route this request to the proper team. Note IT may follow up via email for more details.


Assistance with desk phones including activations, display names, voicemail, and troubleshooting.


Request support using or accessing or changing access to an HPC resource.


Request purchase of computers, printers, equipment, etc.


Request support using or accessing or changing access to a research data storage resource.


Request Assistance with Virtual Private Network access


S&T IT Security provide a streamlined process for identifying, analyzing, and addressing phishing attempts and spam to protect your organization from cyberattacks. Use the following steps to report it https://it.mst.edu/services/email/report-phishi... If you are unsure it is phishing, leverage our expert support to safeguard your email environment and maintain a proactive defense against phishing and spam threats


Change the computer and/or person who is licensed for a particular software.


Request for used/surplus/broken equipment to be removed.


Requests to increase Microsoft 365 Quotas for OneDrive, SharePoint and Exchange, and Google Drive.


S&T IT Security will respond to cyber security incidents involving malware, ransomware, and viruses.


Request support selecting, configuring, or modifying instrument-attached computers or devices.