Information Technology

Remote Desktop Instructions

Remote DesktopRemote Desktop gives you a faster, easier, and more reliable way to connect to the terminal server.

(Note: the Information Technology Department no longer recommends the use of Terminal Services to connect to the terminal server.)

  • Remote Desktop will allow you to connect to your drives and files on the Terminal Server. 


Steps to connect using Remote Desktop

The download way (students only)

  1. Download the MSCST_ST.zip file by clicking the download link (Download 1KB ZIP)
  2. Open the file
  3. Double-click the MSCST_ST.rdp file that is inside
  4. Jump to step 4 under "The Windows way" below

Windows Logo
   For Windows

  1. In Windows, under programs, open the accessories tab.
  2. Click on the “Remote Desktop Connection”
  3. For the computer field enter 134.29.217.45 (Staff should use 134.29.216.1) and click Connect
    • (If Asked) some PCs might  need to click “connect” again, then Yes. 
     
  4. Login ScreenshotYou should now see a "Windows Security/Enter your credentials" screen pop up.
    1. Click on "Use another account"
    2. Enter "STUDENTS\your StarID"
    3. Enter your StarID password
    4. Click "Ok"
        
     
Mac Logo 200x48

  
For Mac

  1. Mac Edit Remote Desktop SettingsDownload the Microsoft Remote Desktop application (free) from the App Store
  2. In the app, click "New" (the big plus sign)
  3. Enter the following credentials
    1. Connection Name = anything you'd like (e.g. Southeast Technical RDT)
    2. PC name = 134.29.217.45 (faculty/staff use 134.29.216.1)
    3. User name = STUDENTS\your StarID
    4. Password = your StarID password
    5. Close the window
     
  4. To log in, choose your new connection from the "My Desktops" list and click "Start"

 

  Note: When you want to leave, close the program you're running (Word, GDP, etc), then click the LOGOFF & DISCONNECT (Orange Button) on the left. 


Having problems connecting? Read the Remote Desktop Help Document

Important:

This system is restricted to authorized users for legitimate business purposes. Unauthorized access is a criminal violation of the law.

You are about to access a private network.
All access to this network is logged.
Violators will be prosecuted to the fullest extent of the law!

Acceptable Use Policy
Acceptable Use Procedure