KCC > Information Services > I.S. Help Desk
I.S. Help Desk Home
Using computers, phones, and other technology can be frustrating if things do not work the way you expect them to work. Our staff members provide technology support and offer several resources and services that will allow you to resolve problems on your own if you choose. In addition, if you want to learn to use new software, applications, or systems or just want to further your technical knowledge, you can take advantage of our training opportunities. We strive to assist with and resolve all technology-related issues.
Forwarding your Email automatically to another email address can be useful when you are going away on vacation or using a different email address. http://helpdesk.kellogg.edu/is/helpdesk/forward.html
Ellucian Go helps you stay connected to your college or university like never before. You’ll have access to great features that make your campus experience more effective, more efficient, and more fun. To learn more, click here: Ellucian Go Support Pages
KRIS - Kellogg Registration Information System
The KRIS system has been relocated inside the Web Portal. You will find this on the left side of the screen as the third object down. For help with the Web Portal and the KRIS system please visit: http://helpdesk.kellogg.edu/is/helpdesk/portal-support.html
Last Date of Attendance
Based on our current policy, and in order to comply with federal regulation, all full time and adjunct faculty are required to submit the last date of attendance for any student receiving an “F” grade, please visit http://helpdesk.kellogg.edu/is/employee/web-applications/kris/Last-Date-of-Attendance.html
Please contact Ron Coller x.2387 or firstname.lastname@example.org with all your technology questions.
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.
For more information, please visit: Email phishing/spam
For information about Email Storage limits and phishing, please visit: Email Storage Limits