Information Technology


Information Technology (IT) provides a wide range of services and solutions to support the University's mission and vision and enhance the learning experience for Webster University's global community.


Current availability of Webster's main systems:

Current Service Alerts and Outages:

10/18/2023 (09:21 US Daylight Time)

Microsoft has started requiring users to authenticate via the authenticator app.

Please follow these instructions to configure 2FA and the authenticator app. It is important that you continue through the process completely and not start and stop.


Text on screen: How To Set Up Your Account for the First Time

[A voiceover begins with step-by-step instructions on how to set up a account the first time.]


Good job on getting accepted into Webster.

[A screen of the Outlook app is visible, with an email titled 鈥淲elcome to Webster University, Please Register Your Connections account鈥 from 51小黄车 Information Technology.]

You should have received a greetings email from 51小黄车 Information Technology. You need this email right now to set up your account as it contains your email address and a default one time-password.

First things first, set up your account.

[The screen opens a new tab, redirecting to Webster鈥檚 Microsoft login page.]

Type in and click on use another account. Go back to the email I mentioned in the beginning and find your email, copy and paste it here.

[The mouse highlights the email and pastes it in the  Microsoft login page.]

Press next.

Text on screen: Taking you to your organization鈥檚 sign-in page 鈥

[Microsoft loads and redirects to Webster鈥檚 organization sign-in page, with an email and password box.]

Copy and paste the one-time password you were provided with in the email. Press 鈥渟ign in.鈥

[The page redirects to an 鈥淯pdate Password鈥 page with multiple password boxes.]

Now paste the password again and come up with a new secure password. Click submit.

[The screen returns to the original Microsoft sign-in page.]

Sign in with your new password.

[After signing in, the screen brings up a 鈥淢ore information required鈥 page.]

Text on screen: More information required

Text on screen: Your organization needs more information to keep your account secure.

Now you will see a 鈥淢ore Information Required鈥 page. Click next.

[The page redirects to a page titled 鈥淜eep your account secure.鈥漖

Text on screen: Your organization requires you to set up the following methods of proving who you are: App, Microsoft Authenticator

To keep your account safe, you have to download a Microsoft Authenticator app a.k.a MFA on your phone, through App store on iPhone or Google Play on Android.

When you install the MFA, click next.

[The 鈥淜eep your account secure鈥 page updates, prompting account set-up.]

Text on screen: If prompted, allow notifications. Then add an account and select 鈥淲ork or school.鈥

[A small phone screen appears and opens the Microsoft Authenticator app. The plus sign is clicked and the app gives the choice of 鈥淎dd work or school account: Sign in, Scan QR Code鈥 in a popup.]

Now open the app on your phone, press on the plus in the top right corner. Pick school or work account and press next on your PC.

[The 鈥淜eep your account secure鈥 page updates again with a QR code. The phone screen on shows a demonstration of scanning the QR code.]

Scan the displayed QR code on your PC and click next.

[A final update of 鈥淜eep your account secure鈥 page.]

Text on screen: Microsoft Authenticator: Let鈥檚 try it out

Now to make sure that it works, you will have to enter the number displayed on your PC to the app and the notification will be approved automatically.

Text on screen: Approve the notification we鈥檙e sending to your app by entering the number shown below: 68

[A pop-up asks 鈥渁re you trying to sign in鈥 on the phone screen. 68 is typed in, 鈥測es鈥 is chosen, and the phone screen disappears. The web page updates with 鈥淣otification approved.鈥

Press next. You've also been provided with a password, which you should remember so that you can regain access to your application if needed

[A 鈥淪uccess!鈥 screen pops up and the mouse clicks 鈥淒one.]

Click done.

[The page redirects to the 51小黄车 Connections Portal Homepage.]

Now that you've set up your account, you can log into the Connections and use other tools provided by Webster to learn more about the online tools, such as the World Classroom Canvas.

[The voiceover ends and the Connections page fades to black.]

Text on screen: If you have any IT questions, please email


Scheduled Maintenance and Updates:

-None upcoming, check back soon


51小黄车 Connections Portal

Information Technology Support Center

The University's IT support center is the single point of contact for all technology issues, including those related to email and online courses. Contact the IT Support Center by phone or email, or submit a technology work order.

Non-Technology Facilities/Maintenance

For non-technology, facilities-related requests at St. Louis campuses, including building repairs, trash removal and office moves, please submit a maintenance work order. Note: If you do not have a SchoolDude password, type your Webster email address in the login field and select Forgot Password?

Contact Information



When emailing with any IT support requests, please be sure to include a complete description of your issue or request, your 7-digit ID number and phone and/or email contact information where you can be reached.

Hours of Operation 鈥 Spring 2024 (United States Central Time Zone)

惭辞苍诲补测鈥揟丑耻谤蝉诲补测: 8 a.m.鈥7 p.m.

Friday: 8 a.m.鈥4:30 p.m.

Saturday: Closed

Sunday: Closed

Information Technology News

Beginning with the shift to remote operations, there was an increase in phishing and email scams globally. 51小黄车 Information Technology would like to send this reminder to be cautious in your daily email communications. One scam that's been distributed is the popular Are you available/Gift Card email scam.

Subject lines vary but may include 鈥淨uick request鈥 or 鈥淯RGENT.鈥 They appear to come from a valid 51小黄车 faculty or staff member when viewing the 鈥淔rom鈥 information, however, the email address itself is not an address (example: or These scammers have used a variety of actual faculty, staff and department names in both the 鈥淔rom鈥 and email signature. The body of the message varies, but may include text such as 鈥淎re you available?鈥 or 鈥淧lease send me your cell phone number.鈥

When individuals reply to these emails or send their phone numbers, the scammers then engage in requests for money and/or gift cards. These emails are fraudulent emails and are not coming from any legitimate Webster constituent. Please do not reply to these messages or send any money/gift cards.

As a reminder, any email that comes from outside of the domain is delivered with the following caution message in a banner at the top of the email that reads 鈥淐AUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.鈥 These messages should also serve as a good flag in determining the legitimacy of an email sender.

While Information Technology does take measures to filter spam and scan emails at the server level and is taking additional action to block these specific messages, these can never be 100% effective in blocking all suspicious emails. Please take a few moments to review the security awareness topics below on phishing and email scams to help ensure your personal data remains confidential and secure.

Phishing is an attempt (usually in the form of an email, web page or phone call) to steal your personal information. These messages often appear to come from a legitimate source and request that you respond with personal information, such as passwords, download an attachment, or direct you to a spoofed website that mimics a login page, or otherwise requests you to divulge login or financial account details. Attachments and phishing web pages may also have the ability to transfer malicious software onto your computer meant to capture login information. The perpetrators behind these scams try to induce panic by threatening account closure or email loss if you do not take action. Their ultimate goal is to steal your account information, finances or even your identity. Please be diligent in protecting yourself from these scams.

Phishing attempts can take several different forms. The most common are ones that ask you to verify your account information for some reason. For instance, they may say there was a security compromise that they need to verify your account is still in use, that you鈥檝e reached your quota, etc. These messages will often say if you don鈥檛 respond, your account will be closed or locked. 51小黄车 and all reputable businesses and organizations will never send messages requesting you provide logon and/or financial account credentials. Please treat ALL such messages as fraudulent.

Other phishing attempts can appear to come from a manager or president of an organization asking you to download an attachment with important information (or view a link). These can often contain malicious software or keystroke loggers meant to capture login credentials.

In general, be on the lookout for these red flags that often indicate a phishing message:

  • Incorrect spelling and/or bad grammar.
  • Threats of account shutdown.
  • Promises of money and/or requests for money and bank account transfers.
  • Requests for private or sensitive information.
  • Unexpected email attachments.
  • Unexpected/unsolicited job opportunities.
  • Spoofed links/web pages, such as links that appear to go to a legitimate website but by hovering your mouse over the link, you see they actually point to a different (and malicious) web page.

You are your best resource to prevent becoming a victim of phishing. Here are some general best practices:

  • Keep logon information private and secure. NEVER provide these details to others, especially via email.
  • Choose passwords that contain a mix of upper- and lowercase letters, numbers and special characters.
  • Read email messages in plain text.
  • Never open attachments or click on links that you aren鈥檛 expecting. Hover your mouse (without clicking) over links to verify the URL matches the text in the email link. If a message appears to come from someone you know, phone that person directly and ask if they sent you the message/file.
  • Verify the 鈥淔rom鈥 address matches the sender.
  • Only logon to secure web sites. These are sites that begin with 鈥渉ttps://鈥 and should show an icon of a closed lock in the address bar. Always logon to your accounts by typing the URL directly into your browser. Links in phishing messages will often take you to a spoofed web page that looks like the real one.
  • Regularly clear your browser cache and cookies. Refer to your browser鈥檚 help menu/documentation or contact the IT service desk for assistance with this.
  • Always error on the side of caution.

If you receive a phishing message, please delete it right away and do not click on any provided link or attachment. If your deleted messages go to a secondary 鈥淒eleted Items鈥 folder, be sure to delete the message from there, as well, to permanently remove it.

If you are unsure of the legitimacy of an email or if you have replied to a phish by providing your logon details, clicked on any of the provided links or downloaded an attachment in one of these messages, please contact the IT service desk as soon as possible for further assistance. You can reach the service desk by calling 314-246-5995 or toll-free at 866-435-7270. You can also reach the Service Desk via email at