Please always send enquiries to ICBM-IT via email to
- these will only be read by the team members named on the left.
We request the return of borrowed ICBM laptops (unless they are currently in use after consultation with us).
We are service-oriented contacts for all questions and problems in the area of IT infrastructure. We see our central tasks in
- advising on the purchase of IT hardware and the use of central IT services at the university,
- setting up and maintaining an operational software environment,
- monitoring and analysing the IT infrastructure in order to avoid problems in advance and ensure security, and
- providing support for IT solutions to questions of scientific computing and data management as well as online teaching and presentation technology.
Our goals are good communication and transparency as well as sustainable solutions and security.
Please always send your request by email to (ticket system). You will receive an email reply as soon as possible from the IT team member who has dealt with your request. To prioritise requests that arrive at the same time, please describe the importance and urgency of your request in your request.
Just some Links:
- BSI Phishing erkennen
- Phishing im Netz erkennen und vorbeugen
- UOL- DSM FAQ
- Verbraucherzentrale Phishing erkekennen
Und doch noch mal ein eigener Text:
Due to recent incidents we would like to remind you how to take care of spam and phishing mails.
Since even in hacker circles there is a shortage of skilled workers, most spam/fraud is not too intelligent (=dangerous), but thanks to DeepL and ChatGPT at least it looks not that bad anymore. That means it's getting more difficult to detect, On the other hand: looking at the mail is usually still without danger and most of the time clicking on links is not harmful either. Entering anything on the linked pages is FATAL in case of a phishing site.
There are a few basic rules you should follow within EVERY mail:
No matter where the mail comes from and in which program you look at it: BEFORE you click on any link, look in the mails header for the full sender (if you can see it) but that's just a first clue. After that, look at the exact link you want to click on. To do so hover your mouse over the link and the real destination should usually be displayed in the lower left corner (on cell phones, usually long-click the link). After you have clicked on a link, look at the top of the browser address page to see if this is really the institution you want to go to. A few examples to try out:
None of these links directs to an ICBM or other university page! Last one has to be copied by hand, but obviously it is 'uni-oldenburg.de' between the first slashes after https ;)
This practice of checking links BEFORE and AFTER clicking also applies to clicking links in web pages.
- Instructions for setting up MS Teams (as part of Office365) at university account level can be found at: Register Microsoft account for Teams ...
Bitlocker is a programme to further protect unauthorised access to hard disk data. Normally, this protection is completely unnoticed, but under some conditions a Bitlocker key file is required. If this is not present, access to the data is no longer possible or at least considerably more difficult...
Please check if the Bitlocker is active and inform us if it is by following the steps below:
- Go to the Windows settings (cogwheel in the start menu).
- Search for 'Bitlocker
- Go to 'Manage Bitlocker' and one of the two alternatives should appear: