My Recently Visited Services

This service protects specific network activities to and from specific projects, systems, and information housed in university data centers (e.g., sensitive research projects, Wolverine Access transactions, MiServer instances, and others).


This service provides a single source for information about students and the administrative data that supports learning and teaching at U-M. The system shares the information contained in the integrated. database across the administrative and academic units on the Ann Arbor campus.


This service is an advanced, offensive form of security testing designed to provide a deep technical analysis of a target environment’s vulnerability to exploitation and attack, also called pen testing and ethical hacking. A skilled security professional will explore a combination of approaches to discover weaknesses that a hacker could exploit.


This service is an ethical and privacy-preserving platform designed to:
- Enable researchers to ask aggregate questions across multiple data sets in a ethical, privacy-preserving manner. Allow for a privacy and ethics body review to ensure that only appropriate, aggregate questions are asked.
- Allow researchers to ask aggregate questions across multiple data sets while no researcher has direct access to the data sets.
- Enable ITS to support such queries in a scalable, effective manner.


This Service provides assistance with real time, walk-in support at no cost to you. Our student team partners with you to solve issues, find resources, and diagnose problems. Our goal is to help you feel informed and empowered to get the most from your technology.


This form is to request an API be promoted from Test to Prod, or to update an existing API in production.


This form is Internal to ITS. This form is used by MiWorkspace as a subprocess of the refresh process. If a customer reports a different locationof their computer, this workflow gets kicked off to update the asset record for that computer. This form should only be used by that automated process


This service supports UMROOT, which is the largest of several Windows Active Directory (AD) forests on campus. UMRoot is where users are created and both central and local units place their Active Directory (AD) objects for using the Windows infrastructure.


This Service is a suite of products & services that includes application hosting, cloud computing, database services and more.

Google Cloud Platform (GCP) at U-M is offered to current faculty and staff only


This form is for MiWorkspace and MPrint customers to request recommendation from the MPrint Team on what type of hardware might be best suited for new or replacement printers


This service makes InCommon server certificates and Active Directory (UMROOT) certificates available for U-M use, as well as roll-up certificate bundles supports the use of InCommon SSL certificates, which are recommended for university websites. They are free through U-M's membership in InCommon and trusted by all popular web browsers and operating systems.


This service is an open source web application designed to help manage and document computer networks.NetBox was developed specifically to address the needs of network and infrastructure engineers.


This service is a risk assessment methodology developed for use at U-M.

- RECON assessments are part of U-M's ongoing Information Security Risk Management process.
- Information Security (SPG 601.27) requires every unit to periodically conduct RECONs.
- Information Security Risk Management (DS-13) defines which systems must be assessed, the frequency of those assessments, and who must perform the RECON.


Internal to ITS. This Service is the MiWorkspace Service, which has special support provided to U-M executive officers, including a dedicated oncall


This form is used to request a exception access to Campus Computing Sites Software.  Software access at Campus Computing Sites is granted based on university affiliation. You may request access to additional software titles even if that title is not eligible based on your affiliation.

Software licenses and your role at the University of Michigan, determine what software you can access on a Sites workstation. There are circumstances where an individual of an excluded role does have a legitimate reason for using a software title that is not in conflict with the intent of the licensing terms. You can use this form to request we make an exception. Sites staff review and approved exceptions on a case by case basis.

Exceptions are valid for a single academic year. After the end of summer term, and before the start of fall term, the exceptions will expire.


This service is for both Exception and Standard DNS requests.


University community members use their UMICH password when logging in to many services and systems at U-M. ITS operates the systems and provides support for this password. Previously this password has been known as the U-M Kerberos password, or the Level-1 password.


This form is for account requests for the Microsoft Azure service. Available to all UM Faculty and Staff.


This service, in conjunction with Turbo Research Storage, provides a secure, scalable, and distributed computing environment that aligns with HIPAA privacy standards.


This service is for those who need to access ServiceNow archive data, or who need assistance locating archived ServiceNow data


This service is for preserving electronic data generated from research activities. It is a low-cost, highly durable storage system and is the largest storage system operated by Advanced Research Computing (ARC).


This service is the University of Michigan’s web-based learning and information center, it offers a variety of learning activities to support operational users, compliance requirements, and professional development. The learning catalog includes training from ITS, Organizational Learning, Environment, Health and Safety (EHS), PEERRS, the Shared Services Center, Treasurer’s Office, and more.


This Service is an access management tool with current institutional data available to create groups and automatically sync them where they are needed to control access to services

Group membership can be created using available institutional data in Grouper.
Your service is able to read group membership to control access from either UMROOT Active Directory or eDirectory (MCommunity) targets.
Identities external to U-M without a uniqname do not need access to your service. People entitled to access your service must all have a uniqname.
Grouper is the authoritative source for group membership.


This service is an interface to allow delegation of specific IT infrastructure management tasks to IT teams outside of a central IT team. This is implemented with a suite of extensible Django apps and core Django project that seamlessly integrate new modules and customizations without requiring code changes.


This form can be used to request a new group or remove an existing group. A new group will be created in both TeamDynamix and MCommunity.  The two groups will be synced.  Removal of an existing group only applies to TeamDynamix and group owner(s) are responsible for removing the group from MCommunity.