Take Action


ITS Locations

Help Desk

Teaching Learning Center Room 128
Monday-Friday, 8am-5pm
Phone: (208) 885-4357 (HELP) 


ITS Administration Offices
Administration Building
Room 140
875 Perimeter Drive MS 3155
Moscow, ID 83844-3155
Phone: (208) 885-6721
Fax: (208) 885-7539

Media Center

Teaching Learning Center 131 
Phone: (208) 885-6411
Fax: (208) 885-0566

Records Management

Office of Records Management
Pitman Center (SUB)
Room 53
875 Perimeter Drive MS 4247
Moscow, ID 83844-4247
phone: (208) 885-2580

Current Hours of Operation
Mon: 7:30-4:30pm
Tue: 7:30-11:30am
Wed: 7:30-11:30am
Thur: 7:30-11:30am

Vandal Cards

Pitman Center (SUB)
Room 124
875 Perimeter Drive MS 4256
Moscow, ID 83844-4256
Phone: (208) 885-7522
Fax: (208) 885-9208

Telephone Services

Administration Building 
Room 133
875 Perimeter Drive MS 3155
Moscow, ID 83844-3155
Phone: (208) 885-5800
Fax: (208) 885-7539


Spam is the electronic equivalent of junk mail sent to the "Current Resident" of a house. Some people and business indiscriminately send large amounts of unsolicited commercial e-mail (UCE). In recent years, spam content has expanded to include offensive advertising, malicious content and computer viruses.

What steps has the University of Idaho taken to reduce unwanted e-mail?

The University of Idaho uses border e-mail anti-spam gateways provided by Microsoft to filter spam before it reaches our system. Additionally, ITS actively engages in rouge spam messages, and you can set personal spam filtering to block senders.

How do I create block and safe lists?

Office 365 allows easy creation of block lists and safe-sender lists by clients. To add a message to your block list, simply right click on the message in Outlook or OWA to bring up a menu and click junk->Block Sender. This will automatically create a new rule to always block messages from this user.

From the same menu, you can select Never Block Sender to add them to your whitelist, meaning all messages from this sender will go to your inbox without being affected by spam filter rules.

How do I report incorrectly identified messages?

You can report messages incorrectly identified as spam to the ITS Help Desk at helpdesk@uidaho.edu. Please include full email headers with your spam messages

What spam classification system is the UI using?

ITS uses the Microsoft Exchange Online Protection (EOP) anti-spam and email filtering system.

How will this affect legitimate mass mailings from my group, department or college?

Extra care needs to be taken if you are sending out mailings to large numbers of users. It may be possible for legitimate messages to be blocked depending on how the messages are formatted, the text they contain, and the number of recipients. Here are some steps we recommend to ensure your mailings are not affected:
  • Make sure a copy of the message you send out is also delivered to your email account and/or others in your office. This is a good way to ensure the messages went through the system properly.
  • Send a test message to yourself prior to sending it out to everyone. Each message will contain an X-SpamDetails: header that includes information about how the message scored by the anti-spam software.
  • If you have a very large number of recipients (over 2000), contact ITS for assistance in sending out the message.
  • Report to ITS any legitimate messages that are blocked. Please send an email to abuse@uidaho.edu and include the entire received message including complete headers. You can find instructions on how to obtain email headers through our header recovery tutorial.

What steps can be used to keep my address safe?

  1. Do not provide your e-mail address to any companies or web pages you do not trust. It is a good idea to read their “privacy statement” as well to see how your contact information will be used.
  2. Make sure your e-mail address doesn’t appear on any web pages (e.g. search the web for your address).
  3. Start using spam filtering by following the instructions provided above.
  4. Delete spam messages without reading them. Many messages include web links to “phone home” to track active accounts.
  5. Do not respond to removal links or reply with “remove” to these messages. This is another technique used to verify e-mail addresses.