Information Technology


Information Technology (IT) provides a wide range of services and solutions to support the University's mission and vision and enhance the learning experience for Webster University's global community.


Current availability of Webster's main systems:

Current Service Alerts and Outages:

10/18/2023 (09:21 US Daylight Time)

Microsoft has started requiring users to authenticate via the authenticator app.

Please follow these instructions to configure 2FA and the authenticator app. It is important that you continue through the process completely and not start and stop.


Text on screen: How To Set Up Your Account for the First Time

[A voiceover begins with step-by-step instructions on how to set up a account the first time.]


Good job on getting accepted into Webster.

[A screen of the Outlook app is visible, with an email titled “Welcome to Webster University, Please Register Your Connections account” from Webster University Information Technology.]

You should have received a greetings email from Webster University Information Technology. You need this email right now to set up your account as it contains your email address and a default one time-password.

First things first, set up your account.

[The screen opens a new tab, redirecting to Webster’s Microsoft login page.]

Type in and click on use another account. Go back to the email I mentioned in the beginning and find your email, copy and paste it here.

[The mouse highlights the email and pastes it in the  Microsoft login page.]

Press next.

Text on screen: Taking you to your organization’s sign-in page …

[Microsoft loads and redirects to Webster’s organization sign-in page, with an email and password box.]

Copy and paste the one-time password you were provided with in the email. Press “sign in.”

[The page redirects to an “Update Password” page with multiple password boxes.]

Now paste the password again and come up with a new secure password. Click submit.

[The screen returns to the original Microsoft sign-in page.]

Sign in with your new password.

[After signing in, the screen brings up a “More information required” page.]

Text on screen: More information required

Text on screen: Your organization needs more information to keep your account secure.

Now you will see a “More Information Required” page. Click next.

[The page redirects to a page titled “Keep your account secure.”]

Text on screen: Your organization requires you to set up the following methods of proving who you are: App, Microsoft Authenticator

To keep your account safe, you have to download a Microsoft Authenticator app a.k.a MFA on your phone, through App store on iPhone or Google Play on Android.

When you install the MFA, click next.

[The “Keep your account secure” page updates, prompting account set-up.]

Text on screen: If prompted, allow notifications. Then add an account and select “Work or school.”

[A small phone screen appears and opens the Microsoft Authenticator app. The plus sign is clicked and the app gives the choice of “Add work or school account: Sign in, Scan QR Code” in a popup.]

Now open the app on your phone, press on the plus in the top right corner. Pick school or work account and press next on your PC.

[The “Keep your account secure” page updates again with a QR code. The phone screen on shows a demonstration of scanning the QR code.]

Scan the displayed QR code on your PC and click next.

[A final update of “Keep your account secure” page.]

Text on screen: Microsoft Authenticator: Let’s try it out

Now to make sure that it works, you will have to enter the number displayed on your PC to the app and the notification will be approved automatically.

Text on screen: Approve the notification we’re sending to your app by entering the number shown below: 68

[A pop-up asks “are you trying to sign in” on the phone screen. 68 is typed in, “yes” is chosen, and the phone screen disappears. The web page updates with “Notification approved.”

Press next. You've also been provided with a password, which you should remember so that you can regain access to your application if needed

[A “Success!” screen pops up and the mouse clicks “Done.]

Click done.

[The page redirects to the Webster University Connections Portal Homepage.]

Now that you've set up your account, you can log into the Connections and use other tools provided by Webster to learn more about the online tools, such as the World Classroom Canvas.

[The voiceover ends and the Connections page fades to black.]

Text on screen: If you have any IT questions, please email


Scheduled Maintenance and Updates:

-None upcoming, check back soon


Webster University Connections Portal


Information Technology Support Center

The University's IT support center is the single point of contact for all technology issues, including those related to email and online courses. Contact the IT Support Center by phone or email, or submit a technology work order.

Non-Technology Facilities/Maintenance

For non-technology, facilities-related requests at St. Louis campuses, including building repairs, trash removal and office moves, please submit a maintenance work order. Note: If you do not have a SchoolDude password, type your Webster email address in the login field and select Forgot Password?

Contact Information



When emailing with any IT support requests, please be sure to include a complete description of your issue or request, your 7-digit ID number and phone and/or email contact information where you can be reached.

Hours of Operation — Spring 2024 (United States Central Time Zone)

Monday–Thursday: 8 a.m.–7 p.m.

Friday: 8 a.m.–4:30 p.m.

Saturday: Closed

Sunday: Closed

Information Technology News

Beginning with the shift to remote operations, there was an increase in phishing and email scams globally. Webster University Information Technology would like to send this reminder to be cautious in your daily email communications. One scam that's been distributed is the popular Are you available/Gift Card email scam.

Subject lines vary but may include “Quick request” or “URGENT.” They appear to come from a valid Webster University faculty or staff member when viewing the “From” information, however, the email address itself is not an address (example: or These scammers have used a variety of actual faculty, staff and department names in both the “From” and email signature. The body of the message varies, but may include text such as “Are you available?” or “Please send me your cell phone number.”

When individuals reply to these emails or send their phone numbers, the scammers then engage in requests for money and/or gift cards. These emails are fraudulent emails and are not coming from any legitimate Webster constituent. Please do not reply to these messages or send any money/gift cards.

As a reminder, any email that comes from outside of the domain is delivered with the following caution message in a banner at the top of the email that reads “CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.” These messages should also serve as a good flag in determining the legitimacy of an email sender.

While Information Technology does take measures to filter spam and scan emails at the server level and is taking additional action to block these specific messages, these can never be 100% effective in blocking all suspicious emails. Please take a few moments to review the security awareness topics below on phishing and email scams to help ensure your personal data remains confidential and secure.

Phishing is an attempt (usually in the form of an email, web page or phone call) to steal your personal information. These messages often appear to come from a legitimate source and request that you respond with personal information, such as passwords, download an attachment, or direct you to a spoofed website that mimics a login page, or otherwise requests you to divulge login or financial account details. Attachments and phishing web pages may also have the ability to transfer malicious software onto your computer meant to capture login information. The perpetrators behind these scams try to induce panic by threatening account closure or email loss if you do not take action. Their ultimate goal is to steal your account information, finances or even your identity. Please be diligent in protecting yourself from these scams.

Phishing attempts can take several different forms. The most common are ones that ask you to verify your account information for some reason. For instance, they may say there was a security compromise that they need to verify your account is still in use, that you’ve reached your quota, etc. These messages will often say if you don’t respond, your account will be closed or locked. Webster University and all reputable businesses and organizations will never send messages requesting you provide logon and/or financial account credentials. Please treat ALL such messages as fraudulent.

Other phishing attempts can appear to come from a manager or president of an organization asking you to download an attachment with important information (or view a link). These can often contain malicious software or keystroke loggers meant to capture login credentials.

In general, be on the lookout for these red flags that often indicate a phishing message:

  • Incorrect spelling and/or bad grammar.
  • Threats of account shutdown.
  • Promises of money and/or requests for money and bank account transfers.
  • Requests for private or sensitive information.
  • Unexpected email attachments.
  • Unexpected/unsolicited job opportunities.
  • Spoofed links/web pages, such as links that appear to go to a legitimate website but by hovering your mouse over the link, you see they actually point to a different (and malicious) web page.

You are your best resource to prevent becoming a victim of phishing. Here are some general best practices:

  • Keep logon information private and secure. NEVER provide these details to others, especially via email.
  • Choose passwords that contain a mix of upper- and lowercase letters, numbers and special characters.
  • Read email messages in plain text.
  • Never open attachments or click on links that you aren’t expecting. Hover your mouse (without clicking) over links to verify the URL matches the text in the email link. If a message appears to come from someone you know, phone that person directly and ask if they sent you the message/file.
  • Verify the “From” address matches the sender.
  • Only logon to secure web sites. These are sites that begin with “https://” and should show an icon of a closed lock in the address bar. Always logon to your accounts by typing the URL directly into your browser. Links in phishing messages will often take you to a spoofed web page that looks like the real one.
  • Regularly clear your browser cache and cookies. Refer to your browser’s help menu/documentation or contact the IT service desk for assistance with this.
  • Always error on the side of caution.

If you receive a phishing message, please delete it right away and do not click on any provided link or attachment. If your deleted messages go to a secondary “Deleted Items” folder, be sure to delete the message from there, as well, to permanently remove it.

If you are unsure of the legitimacy of an email or if you have replied to a phish by providing your logon details, clicked on any of the provided links or downloaded an attachment in one of these messages, please contact the IT service desk as soon as possible for further assistance. You can reach the service desk by calling 314-246-5995 or toll-free at 866-435-7270. You can also reach the Service Desk via email at