You are here

Frequently Asked Questions

Cyber Security

A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant, and intentional or accidental. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory’s mission.

Examples of such activities include the possibility of:

  • Loss, theft, or missing data, equipment, or IT resources;
  • Denial of Services (DoS) intentional or unintentional;
  • Compromise of computer security;
  • Phishing attempts to acquire sensitive information such as usernames, passwords, and credit card numbers for malicious reasons, by masquerading as trustworthy in an electronic communication.
  • Unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or
  • A public relations embarrassment.
  • Reporting Process

All employees and users are required to immediately report any suspicious incidents involving the security of Ames Laboratory computers or networks, including apparent attempts to unauthorized access. Incidents must be reported to the EIS Cyber Security Incident Response Team (CSIRT) at 4-8348, or to the Assistant Cyber Security Manager (ACSM) if immediately available. ACSMs are expected to report incidents immediately that do not have a simple explanation based on normal routine operation of the system.

If there is clearly no urgency, incidents may be reported in ServiceNow at amesprod.service-now.com/sp

Investigation Process

CSIRT will investigate all reported incidents and may assume full administrative control of affected systems until the incident is resolved. The CSIRT may call on other technical experts for priority assistance.

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

What are the rules of behavior for using the Ames Laboratory network?

The Rules of Behavior for employees and visitors wishing to use the Ames Laboratory network.

Desktop Procedures

Effective October 3, 2016, Ames Laboratory staff within Iowa State University’s ‘Ames Laboratory Active Directory group’ are required to change their ISU password associated with their ISU Net-ID.   Ames Laboratory staff in this group will receive a notification message.

Password guidelines:

  • The password will need to be changed every 180 days.
  • The minimum length of the password is eight characters and requires three character classes (upper/lower case, digit, punctuation).

  • The system will remember the past five passwords and reject previously used passwords.

  • If an incorrect password is entered after five attempts, the account will be locked out for one minute.

Go to this site to change your password:

https://asw.iastate.edu

You will be prompted for your ISU Net-ID and current password. 

On the next page select 'Change Password' to change your password.

Click the ‘Logout’ button to exit the system.

After submitting your new password, set a Password Reset Challenge phrase or a Cell Phone Number for a text-based password reset. If you forget your password, these options will enable you to reset your password without calling for help.

If you have problems changing your ISU password, please contact the ISU Solution Center at 294-4000 or solution@iastate.edu.

An alternate link is:  https://www.it.iastate.edu/howtos/password_net-id

 

The following systems are what IS recommends for use in the lab. All the systems are EPEAT compliant.

Desktop: Dell OptiPlex 7040 minitower (6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Zero-client: HP t310 Zero Client

Laptop (option 1): Dell Latitude E7270 (12.5” screen, 6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Laptop (option 2): Dell Latitude E7470 (14” screen6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Tablet: Surface Pro 4 (6th Generation i7, 256GB SSD, 8GB RAM),

Surface Dock: If you need wired network access or want to use additional monitors you will need this dock.

 


 

What do I need to know about software or applicatrions that have reached end of life?

Systems with out of date software must have the software removed or upgraded as soon as possible.  If this is not possible the system must be removed from the network.  The system can be placed in a protected Virtual Local Area Network (VLAN) with no internet access.

 

What desktop software or applications have reached end of life?

The attached document contains the list of software and the end of life date for each version.

 

What option is available for updating software to a supported version?

Software is available from ISU at discounted cost for use on personal systems.  Use this link:

https://iastate.onthehub.com

You will need to logon with your iastate.edu username and password.

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

The instructions for setting the pagefile size are located here.

Email

What is the new G-Suite GMail interface and how do I access it?

Google G-Suite will be rolling out a new interface for the Gmail web application in the coming weeks.  Ames Laboratory staff can try the interface by clicking the Gear button and selecting "Try the new Ames Laboratory Mail" as shown below.
 
More information regarding the new Gmail interface can be found here:
 
 

What attachments are prohibited in G-suite?

Google provides an answer on prohibited file types:

https://support.google.com/a/answer/6590?hl=en

 

To work around this limitation, either compress the file or provide the file with an extension that is not banned.  Alternatively, link to the file through CyBox or Dropbox.

China is one country that has restricted Google.

Google restricts access to some of its business services (YouTube, Gmail, Blogger, Maps) in certain countries or regions, such as Crimea, Cuba, Iran, North Korea, Sudan, Syria and almost all Arab countries. If you plan to visit these countries and need to access Ames Laboratory email, VPN will need to be used (as long as VPN is not blocked in that country). The traveler should be aware of this issue so other arrangements can be made prior to the trip. It may be good practice for those traveling to plan to use VPN when using their laptop and or other devices to connect to Ames Laboratory computing services.

For VPN information and to obtain an account, please use this link:
https://www.ameslab.gov/operations/faq/how-do-i-obtain-remote-access-my-office/lab-computer

What are G-Suite's size limitations for sending and receiving email?

G-Suite currently limits email sending and receiving to the following sizes:
  • Receiving: 50 MB
  • Sending: 25 MB
Anyone that sends email to an ameslab.gov account that exceeds 50 MB will receive a bounceback stating the following:
Your message exceeded Google's message size limits. Please visit 552-5.2.3 https://support.google.com/mail/?p=MaxSizeError to view our size 552 5.2.3 guidelines.
 
If there is a need to attach files that are greater than 25 MB, there are a couple of options:
  1. Use CyBox to share the file out.
  2. Use Google Drive*

*There are current limitations with using Google Drive to share files with people outside of the organization.  If you wish to use Google Drive for this purpose, please contact EIS at 4-8348.  EIS will need to whitelist the domain of the person you are collaborating with.

 

How do I import Calendars into G-Suite?

Export from Thunderbird:

1.  Open Thunderbird and go to "Events and Tasks", then Calendar

2.  Right-Click on the Calendar to export, then click "Export Calendar..."

3.  Save the calendar as an .ics file, then click Save

4. Repeat as needed for other calendars.

 

Import into G-Suite Calendar:

 

 

How do I import contacts into G-Suite?

Export from Thunderbird:

1. Select Tools, then Address Book

2. Select the address book to export

3. Click Tools then Export

4. Save the file as a Comma Separated (system Charset) (*.csv), Click Save.

Import in to G-Suite Contacts:

1. Go to Contacts in G-Suite

2. Click "Go to the old version" link on the left had side of the screen

3. Click "Import Contacts"

4. Click "Choose File" and select the csv file created from the export.

5. Click Import

6. Click "Try Contacts preview" to go back to the previous interface

 

To configure Ames Lab email on the iPhone.

  • Find 'Settings'
  • Find 'Accounts & Passwords'
  • Select 'Add Account'
  • Select 'Google'
  • Enter your email address... ***@ameslab.gov
  • Tap 'NEXT'
  • Enter your password
  • Tap 'NEXT'
  • Choose which features to sync... 
  • Tap 'Save'

If you have any trouble with these steps, please call Ames Lab EIS at 4-8348.

  • Open your email client
  • Enter your Email Address
  • Enter your Password
  • Click next
  • Select 'IMAP' for the account type
  • Click Next
  • Enter your username
  • Enter your password
  • For 'IMAP server' enter: 'imap.ameslab.gov'
  • For 'Security type' select 'SSL'
  • For 'Port' enter '993'
  • Click Next
  • For SMTP server enter: 'mailhub.ameslab.gov'
  • For 'security type' select 'SSL'
  • For 'Port' enter '465'
  • Enter your username
  • Enter your password
  • Click Next

If you have any trouble with Email setup on an android phone, please call Ames Lab IS at 294-8348 and someone will assist you.

  • Open Apple Mail
  • For 'Choose a mail account to add…' select 'Add other Mail Account…'
  • Click 'continue'
  • Enter your Name
  • Enter your email address
  • Enter your password
  • Click 'next', it will say your account needs to be setup manually, Click 'next' again
  • For 'Incoming Mail Server' info select 'IMAP'
  • For 'Mail Server' enter: 'imap.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Next', it will say additional information is required, click 'next' again
  • For 'port': enter '993' and check the box for 'Use SSL'
  • For 'authentication' select: 'Password'
  • Click 'next'
  • For 'Outgoing Mail Server' info for 'SMTP server' enter: 'mailhub.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Create', it will say additional information is required, click 'create' again
  • For 'Port' enter: '465' and check the box next to 'Use SSL'
  • For 'authentication' select 'Password'
  • Click 'Create'
  • Click on 'File'
  • Under the 'Info' tab click on 'Account settings' and select 'Account settings…'
  • Under the 'Email' tab, Click on 'New…'
  • Select 'Manual setup or additional server types' and click 'Next'
  • Select 'Pop or Imap' and click 'next'
  • Enter your name
  • Enter your Email Address
  • For 'account type' select 'imap'
  • For 'Incoming mail server' enter: 'imap.ameslab.gov'
  • For 'Outgoing mail server (smtp)' enter: mailhub.ameslab.gov
  • Enter your username
  • Uncheck the box next to 'Remember password'
  • Click on 'More Settings…'
  • Click on the 'Advanced' tab
  • Under server port numbers, For 'Incoming server' enter '993'
  • For 'use the following type of encrypted connections' under Incoming server select 'SSL'
  • For 'Outgoing server' enter '465'
  • For 'use the following type of encrypted connections' under Outgoing server select 'SSL'
  • Click 'OK'
  • Click 'Next'
  • Enter Password
  • If it successfully connects to the server Click 'Close'
  • Click 'finish'
  • Open Thunderbird
  • Click on 'Tools'
  • Click on 'Account Settings'
  • Click on 'Account Actions' and select 'Add Mail Account'
  • Enter your Name
  • Enter your Email address
  • Enter your password
  • Uncheck the box next to 'Remember password'
  • Click on Continue
  • For Incoming 'Server Hostname' enter: 'imap.ameslab.gov'
  • For incoming 'Port' select '993'
  • For Incoming 'SSL' select 'SSL/TLS'
  • For Incoming 'Authentication' select 'Normal Password'
  • For Outgoing 'Server hostname' enter: 'mailhub.ameslab.gov'
  • For Outgoing 'Port' select '587'
  • For Outgoing 'SSL' select 'STARTTLS'
  • For Outgoing 'Authentication' select 'Normal Password'
  • Click on 'Done'
  • Click on the Inbox in the top left and it will sync all your mail from the server

 

  • Two important Settings to check:
  • Click on 'tools'
  • Click on 'Account settings'
  • Under your @ameslab.gov email on the left select 'Composition & Addressing'
  • Uncheck the box next to 'Compose messages in HTML format'
  • Click on 'Synchronization & Storage'
  • Uncheck the box next to 'Keep messages for this account on this computer' (Note: If you do not uncheck this box it will download a copy of all your email to your local computer and take up a lot of space on your hard drive)

 

 

Networking

What are recommended unmanaged network switches for use in an office, lab, or other regular room?

The following makes and models of unmanaged network switches are recommended by Information Technology for use in an office, lab, or other regular rooms.





Manufacturer Num Ports Model Description
Cisco 5 SG100D-05 5-Port Gigabit Small-Business-Class Desktop Switch
Cisco 8 SG100D-08 8-Port Gigabit Small-Business-Class Desktop Switch
Netgear 5 GS605 5-Port Gigabit Ethernet Switch
Netgear 8 GS608 8-Port Gigabit Ethernet Switch
Netgear 5 GS105 5-Port Gigabit Business-Class Desktop Switch
Netgear 8 GS108 8-Port Gigabit Business-Class Desktop Switch
Netgear 16 GS116 16-Port Gigabit Business-Class Desktop Switch
Netgear 5 GS105NA ProSafe 5-Port 10/100/1000 Gigabit Ethernet Switch
Netgear 8 GS108NA ProSafe 8-Port 10/100/1000 Gigabit Ethernet Switch
Netgear 5 GS105E 5-Port 10/100/1000 Gigabit Ethernet Switch
Netgear 8 GS108E 8-Port 10/100/1000 Gigabit Ethernet Switch
Netgear 16 GS116E 16-Port 10/100/1000 Gigabit Ethernet Switch
TrendNet 5 TEG-S50G 5-Port Gigabit GREENnet Switch
TrendNet 8 TEG-S80G 8-Port Gigabit GREENnet Switch
TrendNet 8 TEG-S81G 8-Port Gigabit GREENnet Switch
TrendNet 8 TEG-S82G 8-Port Gigabit GREENnet Switch
TrendNet 16 TEG-S16DG 16-Port Gigabit GREENnet Switch
D-Link 5 DGS-1005G 5-Port 10/100/1000 Mbps Gigabit Switch
D-Link 5 GO-SW-5G 5-Port Unmanaged Gigabit Switch
D-Link 8 GO-SW-8G 8-Port Unmanaged Gigabit Switch
Rosewill 5 RC-415 10/100/1000Mbps 5-Port Gigabit Switch
Rosewill 8 RC-416 10/100/1000Mbps 8-Port Gigabit Switch
Rosewill 16 RGS-1016 10/100/1000Mbps 16-Port Gigabit Rackmount Switch
Linksys 5 SE3005 Gigabit 5-Port Ethernet Switch
Linksys 8 SE3008 Gigabit 8-Port Ethernet Switch
Linksys 16 SE3016 Gigabit 16-Port Ethernet Switch
Linksys 5 EG005W Gigabit 5-Port Workgroup Switch
Linksys 8 EG008W Gigabit 8-Port Workgroup Switch

Operating Systems

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

For a Windows remote computer, install an SSH client which supports X-Forwarding.  For help with this, contact Enterprise Information Services at 4-8348 or is@ameslab.gov

Recommended software for Windows includes:

Passwords and Accounts

Effective October 3, 2016, Ames Laboratory staff within Iowa State University’s ‘Ames Laboratory Active Directory group’ are required to change their ISU password associated with their ISU Net-ID.   Ames Laboratory staff in this group will receive a notification message.

Password guidelines:

  • The password will need to be changed every 180 days.
  • The minimum length of the password is eight characters and requires three character classes (upper/lower case, digit, punctuation).

  • The system will remember the past five passwords and reject previously used passwords.

  • If an incorrect password is entered after five attempts, the account will be locked out for one minute.

Go to this site to change your password:

https://asw.iastate.edu

You will be prompted for your ISU Net-ID and current password. 

On the next page select 'Change Password' to change your password.

Click the ‘Logout’ button to exit the system.

After submitting your new password, set a Password Reset Challenge phrase or a Cell Phone Number for a text-based password reset. If you forget your password, these options will enable you to reset your password without calling for help.

If you have problems changing your ISU password, please contact the ISU Solution Center at 294-4000 or solution@iastate.edu.

An alternate link is:  https://www.it.iastate.edu/howtos/password_net-id

 

How do I change my password?

If you need to change your password, visit https://al-iproxy.ameslab.gov/pwm/

Remote Access Assistance

For a Windows remote computer, install an SSH client which supports X-Forwarding.  For help with this, contact Enterprise Information Services at 4-8348 or is@ameslab.gov

Recommended software for Windows includes:

Solutions to Common Problems

Effective October 3, 2016, Ames Laboratory staff within Iowa State University’s ‘Ames Laboratory Active Directory group’ are required to change their ISU password associated with their ISU Net-ID.   Ames Laboratory staff in this group will receive a notification message.

Password guidelines:

  • The password will need to be changed every 180 days.
  • The minimum length of the password is eight characters and requires three character classes (upper/lower case, digit, punctuation).

  • The system will remember the past five passwords and reject previously used passwords.

  • If an incorrect password is entered after five attempts, the account will be locked out for one minute.

Go to this site to change your password:

https://asw.iastate.edu

You will be prompted for your ISU Net-ID and current password. 

On the next page select 'Change Password' to change your password.

Click the ‘Logout’ button to exit the system.

After submitting your new password, set a Password Reset Challenge phrase or a Cell Phone Number for a text-based password reset. If you forget your password, these options will enable you to reset your password without calling for help.

If you have problems changing your ISU password, please contact the ISU Solution Center at 294-4000 or solution@iastate.edu.

An alternate link is:  https://www.it.iastate.edu/howtos/password_net-id

 

Ames Laboratory building addresses:

Carver Co-Lab

1111 WOI Road, 50011-1085

 

Harley Wilhelm Hall

2332 Pammel Drive, 50011-1025

 

Maintenance Shops

2409 Kooser Drive, 50011-3608

 

Metals Development

2415 Pammel Drive, 50011-1015

 

Sensitive Instrument Facility

1901 Scholl Road, 50011

 

Spedding Hall

2416 Pammel Drive, 50011-2416

 

TASF – 2408 Pammel Drive, 50011-1015

Zaffarano Physics Addition – 2334 Pammel Drive, 50011-1025

 

The shipping address for small packages should be sent to the Spedding Hall Dock.  

Please use the following “Ship To” address:

 Ames Laboratory CC – (your name)
 2416 Pammel Drive
 Spedding Hall Dock
 Ames, IA 50011-2416

 

Warehouse address and information:

https://www.ameslab.gov/operations/materials/shipping-and-receiving-services

Visitors

How does a visitor access the AL Guest wireless network?

 

  1. Connect to the AL Guest via wi-fi.
  2.  Open a browser and navigate to www.ameslab.gov or www.iastate.edu.
    •  Doing this will actually navigate you to the Ames Lab Cyber Fence site where you will be able to create a temporary account.
  3.  Once on the Cyber Fence website click "Sign Up".
  4.  Once on the next page fill out the following information.
    • Firstname
    • Lastname
    • Company / Organization
    • Fill out either Phone number and Provider or Email.
    • Read the Ames Laboratory Network Rules and Behavior, and accept the terms of use checkbox.
    • Select either the "Register by Email" or the "Register by SMS" option.
      • If you choose to receive your access code by email, you will be given temporary network access for 10 minutes during that time:
        • Login to the email account you referenced;
        • Click on the link emailed to you to validate network access for the next 3 days.
      • If you choose to receive your access code by SMS, you will be able to enter it on the next page.
      • Note that either option may take a couple of minutes for link / code to be sent.
  5. Once confirmation has been received, your network will be enabled.
  6. After it is finished enabling, Close your current browser and open a new one to start browsing.

Note: Registrations on the guest network expire after 72 hours.

Web Services

How do I reserve a room in G-Suite Calendar?

Reserving a Room
  1. Open the G-Suite Calendar app (http://calendar.ameslab.gov) and login if required.
  2. Create an event by clicking the "+" symbol in the lower right corner of the screen.
  3. Click "Rooms" and select "Available Rooms only" from the selection box.
  4. Select a room from the dropdown.
  5. Fill out the rest of the event as normal. (Add people, description, etc.)
  6. Click Save.

In most cases, the room is automatically reserved through this method.  There are a couple of rooms that require additional approval before they are offically reserved: TASF 315 and SP 301A/B.  Please contact the Director's office for more information on these rooms.

Viewing a Room's Calendar

  1. Open the G-Suite Calendar app (http://calendar.ameslab.gov) and login if required.
  2. Click the "+" next to "Add a coworker's calendar"
  3. Click "Browse Resources"
  4. Select the room calendars to view

Room Status

Room status can be determined a couple of ways.  When creating an invitation, if the room is not crossed out, it is available for that time period.  If viewing the Room's calendar, a solid color indicates that the room is reserved for that time.  An outline indicates the the room has not been reserved for that event at that time and is either awaiting approval (SP 301A/B) or was not the first to reserve the room.

2016

How do I install Microsoft Office 2016 on my computer?

Please follow these instructions to install Microsoft Office 2016 on your computer

account

How do I change my password?

If you need to change your password, visit https://al-iproxy.ameslab.gov/pwm/

Acrobat

How do I install and update Adobe Acrobat DC?

Please follow these instructions to install and update Adobe Acrobat DC on an Ames Lab Windows computer

 

 

addresses

Ames Laboratory building addresses:

Carver Co-Lab

1111 WOI Road, 50011-1085

 

Harley Wilhelm Hall

2332 Pammel Drive, 50011-1025

 

Maintenance Shops

2409 Kooser Drive, 50011-3608

 

Metals Development

2415 Pammel Drive, 50011-1015

 

Sensitive Instrument Facility

1901 Scholl Road, 50011

 

Spedding Hall

2416 Pammel Drive, 50011-2416

 

TASF – 2408 Pammel Drive, 50011-1015

Zaffarano Physics Addition – 2334 Pammel Drive, 50011-1025

 

The shipping address for small packages should be sent to the Spedding Hall Dock.  

Please use the following “Ship To” address:

 Ames Laboratory CC – (your name)
 2416 Pammel Drive
 Spedding Hall Dock
 Ames, IA 50011-2416

 

Warehouse address and information:

https://www.ameslab.gov/operations/materials/shipping-and-receiving-services

adobe

How do I install and update Adobe Acrobat DC?

Please follow these instructions to install and update Adobe Acrobat DC on an Ames Lab Windows computer

 

 

ames lab

How do I change my password?

If you need to change your password, visit https://al-iproxy.ameslab.gov/pwm/

Android

  • Open your email client
  • Enter your Email Address
  • Enter your Password
  • Click next
  • Select 'IMAP' for the account type
  • Click Next
  • Enter your username
  • Enter your password
  • For 'IMAP server' enter: 'imap.ameslab.gov'
  • For 'Security type' select 'SSL'
  • For 'Port' enter '993'
  • Click Next
  • For SMTP server enter: 'mailhub.ameslab.gov'
  • For 'security type' select 'SSL'
  • For 'Port' enter '465'
  • Enter your username
  • Enter your password
  • Click Next

If you have any trouble with Email setup on an android phone, please call Ames Lab IS at 294-8348 and someone will assist you.

Apple Mail

  • Open Apple Mail
  • For 'Choose a mail account to add…' select 'Add other Mail Account…'
  • Click 'continue'
  • Enter your Name
  • Enter your email address
  • Enter your password
  • Click 'next', it will say your account needs to be setup manually, Click 'next' again
  • For 'Incoming Mail Server' info select 'IMAP'
  • For 'Mail Server' enter: 'imap.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Next', it will say additional information is required, click 'next' again
  • For 'port': enter '993' and check the box for 'Use SSL'
  • For 'authentication' select: 'Password'
  • Click 'next'
  • For 'Outgoing Mail Server' info for 'SMTP server' enter: 'mailhub.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Create', it will say additional information is required, click 'create' again
  • For 'Port' enter: '465' and check the box next to 'Use SSL'
  • For 'authentication' select 'Password'
  • Click 'Create'

avecto

How do I uninstall programs using Avecto Defendpoint?

Please follow these instructions to uninstall a program using Avecto Defendpoint

banned

China is one country that has restricted Google.

Google restricts access to some of its business services (YouTube, Gmail, Blogger, Maps) in certain countries or regions, such as Crimea, Cuba, Iran, North Korea, Sudan, Syria and almost all Arab countries. If you plan to visit these countries and need to access Ames Laboratory email, VPN will need to be used (as long as VPN is not blocked in that country). The traveler should be aware of this issue so other arrangements can be made prior to the trip. It may be good practice for those traveling to plan to use VPN when using their laptop and or other devices to connect to Ames Laboratory computing services.

For VPN information and to obtain an account, please use this link:
https://www.ameslab.gov/operations/faq/how-do-i-obtain-remote-access-my-office/lab-computer

bitlocker

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

building

Ames Laboratory building addresses:

Carver Co-Lab

1111 WOI Road, 50011-1085

 

Harley Wilhelm Hall

2332 Pammel Drive, 50011-1025

 

Maintenance Shops

2409 Kooser Drive, 50011-3608

 

Metals Development

2415 Pammel Drive, 50011-1015

 

Sensitive Instrument Facility

1901 Scholl Road, 50011

 

Spedding Hall

2416 Pammel Drive, 50011-2416

 

TASF – 2408 Pammel Drive, 50011-1015

Zaffarano Physics Addition – 2334 Pammel Drive, 50011-1025

 

The shipping address for small packages should be sent to the Spedding Hall Dock.  

Please use the following “Ship To” address:

 Ames Laboratory CC – (your name)
 2416 Pammel Drive
 Spedding Hall Dock
 Ames, IA 50011-2416

 

Warehouse address and information:

https://www.ameslab.gov/operations/materials/shipping-and-receiving-services

change

How do I change my password?

If you need to change your password, visit https://al-iproxy.ameslab.gov/pwm/

change password

Effective October 3, 2016, Ames Laboratory staff within Iowa State University’s ‘Ames Laboratory Active Directory group’ are required to change their ISU password associated with their ISU Net-ID.   Ames Laboratory staff in this group will receive a notification message.

Password guidelines:

  • The password will need to be changed every 180 days.
  • The minimum length of the password is eight characters and requires three character classes (upper/lower case, digit, punctuation).

  • The system will remember the past five passwords and reject previously used passwords.

  • If an incorrect password is entered after five attempts, the account will be locked out for one minute.

Go to this site to change your password:

https://asw.iastate.edu

You will be prompted for your ISU Net-ID and current password. 

On the next page select 'Change Password' to change your password.

Click the ‘Logout’ button to exit the system.

After submitting your new password, set a Password Reset Challenge phrase or a Cell Phone Number for a text-based password reset. If you forget your password, these options will enable you to reset your password without calling for help.

If you have problems changing your ISU password, please contact the ISU Solution Center at 294-4000 or solution@iastate.edu.

An alternate link is:  https://www.it.iastate.edu/howtos/password_net-id

 

configuration

The following systems are what IS recommends for use in the lab. All the systems are EPEAT compliant.

Desktop: Dell OptiPlex 7040 minitower (6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Zero-client: HP t310 Zero Client

Laptop (option 1): Dell Latitude E7270 (12.5” screen, 6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Laptop (option 2): Dell Latitude E7470 (14” screen6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Tablet: Surface Pro 4 (6th Generation i7, 256GB SSD, 8GB RAM),

Surface Dock: If you need wired network access or want to use additional monitors you will need this dock.

 

countries

China is one country that has restricted Google.

Google restricts access to some of its business services (YouTube, Gmail, Blogger, Maps) in certain countries or regions, such as Crimea, Cuba, Iran, North Korea, Sudan, Syria and almost all Arab countries. If you plan to visit these countries and need to access Ames Laboratory email, VPN will need to be used (as long as VPN is not blocked in that country). The traveler should be aware of this issue so other arrangements can be made prior to the trip. It may be good practice for those traveling to plan to use VPN when using their laptop and or other devices to connect to Ames Laboratory computing services.

For VPN information and to obtain an account, please use this link:
https://www.ameslab.gov/operations/faq/how-do-i-obtain-remote-access-my-office/lab-computer

DC

How do I install and update Adobe Acrobat DC?

Please follow these instructions to install and update Adobe Acrobat DC on an Ames Lab Windows computer

 

 

defendpoint

How do I uninstall programs using Avecto Defendpoint?

Please follow these instructions to uninstall a program using Avecto Defendpoint

desktop

How do I install Microsoft Office 2016 on my computer?

Please follow these instructions to install Microsoft Office 2016 on your computer

How do I uninstall programs using Avecto Defendpoint?

Please follow these instructions to uninstall a program using Avecto Defendpoint

How do I install and update Adobe Acrobat DC?

Please follow these instructions to install and update Adobe Acrobat DC on an Ames Lab Windows computer

 

 

The following systems are what IS recommends for use in the lab. All the systems are EPEAT compliant.

Desktop: Dell OptiPlex 7040 minitower (6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Zero-client: HP t310 Zero Client

Laptop (option 1): Dell Latitude E7270 (12.5” screen, 6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Laptop (option 2): Dell Latitude E7470 (14” screen6th Generation Intel Core i7, M.2 128GB SSD, 8GB DDR4 ram)

Tablet: Surface Pro 4 (6th Generation i7, 256GB SSD, 8GB RAM),

Surface Dock: If you need wired network access or want to use additional monitors you will need this dock.

 

desktop; software; applications; end of life


 

What do I need to know about software or applicatrions that have reached end of life?

Systems with out of date software must have the software removed or upgraded as soon as possible.  If this is not possible the system must be removed from the network.  The system can be placed in a protected Virtual Local Area Network (VLAN) with no internet access.

 

What desktop software or applications have reached end of life?

The attached document contains the list of software and the end of life date for each version.

 

What option is available for updating software to a supported version?

Software is available from ISU at discounted cost for use on personal systems.  Use this link:

https://iastate.onthehub.com

You will need to logon with your iastate.edu username and password.

email

To configure Ames Lab email on the iPhone.

  • Find 'Settings'
  • Find 'Accounts & Passwords'
  • Select 'Add Account'
  • Select 'Google'
  • Enter your email address... ***@ameslab.gov
  • Tap 'NEXT'
  • Enter your password
  • Tap 'NEXT'
  • Choose which features to sync... 
  • Tap 'Save'

If you have any trouble with these steps, please call Ames Lab EIS at 4-8348.

  • Open your email client
  • Enter your Email Address
  • Enter your Password
  • Click next
  • Select 'IMAP' for the account type
  • Click Next
  • Enter your username
  • Enter your password
  • For 'IMAP server' enter: 'imap.ameslab.gov'
  • For 'Security type' select 'SSL'
  • For 'Port' enter '993'
  • Click Next
  • For SMTP server enter: 'mailhub.ameslab.gov'
  • For 'security type' select 'SSL'
  • For 'Port' enter '465'
  • Enter your username
  • Enter your password
  • Click Next

If you have any trouble with Email setup on an android phone, please call Ames Lab IS at 294-8348 and someone will assist you.

  • Open Apple Mail
  • For 'Choose a mail account to add…' select 'Add other Mail Account…'
  • Click 'continue'
  • Enter your Name
  • Enter your email address
  • Enter your password
  • Click 'next', it will say your account needs to be setup manually, Click 'next' again
  • For 'Incoming Mail Server' info select 'IMAP'
  • For 'Mail Server' enter: 'imap.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Next', it will say additional information is required, click 'next' again
  • For 'port': enter '993' and check the box for 'Use SSL'
  • For 'authentication' select: 'Password'
  • Click 'next'
  • For 'Outgoing Mail Server' info for 'SMTP server' enter: 'mailhub.ameslab.gov'
  • Enter your username
  • Enter your password
  • Click 'Create', it will say additional information is required, click 'create' again
  • For 'Port' enter: '465' and check the box next to 'Use SSL'
  • For 'authentication' select 'Password'
  • Click 'Create'
  • Click on 'File'
  • Under the 'Info' tab click on 'Account settings' and select 'Account settings…'
  • Under the 'Email' tab, Click on 'New…'
  • Select 'Manual setup or additional server types' and click 'Next'
  • Select 'Pop or Imap' and click 'next'
  • Enter your name
  • Enter your Email Address
  • For 'account type' select 'imap'
  • For 'Incoming mail server' enter: 'imap.ameslab.gov'
  • For 'Outgoing mail server (smtp)' enter: mailhub.ameslab.gov
  • Enter your username
  • Uncheck the box next to 'Remember password'
  • Click on 'More Settings…'
  • Click on the 'Advanced' tab
  • Under server port numbers, For 'Incoming server' enter '993'
  • For 'use the following type of encrypted connections' under Incoming server select 'SSL'
  • For 'Outgoing server' enter '465'
  • For 'use the following type of encrypted connections' under Outgoing server select 'SSL'
  • Click 'OK'
  • Click 'Next'
  • Enter Password
  • If it successfully connects to the server Click 'Close'
  • Click 'finish'
  • Open Thunderbird
  • Click on 'Tools'
  • Click on 'Account Settings'
  • Click on 'Account Actions' and select 'Add Mail Account'
  • Enter your Name
  • Enter your Email address
  • Enter your password
  • Uncheck the box next to 'Remember password'
  • Click on Continue
  • For Incoming 'Server Hostname' enter: 'imap.ameslab.gov'
  • For incoming 'Port' select '993'
  • For Incoming 'SSL' select 'SSL/TLS'
  • For Incoming 'Authentication' select 'Normal Password'
  • For Outgoing 'Server hostname' enter: 'mailhub.ameslab.gov'
  • For Outgoing 'Port' select '587'
  • For Outgoing 'SSL' select 'STARTTLS'
  • For Outgoing 'Authentication' select 'Normal Password'
  • Click on 'Done'
  • Click on the Inbox in the top left and it will sync all your mail from the server

 

  • Two important Settings to check:
  • Click on 'tools'
  • Click on 'Account settings'
  • Under your @ameslab.gov email on the left select 'Composition & Addressing'
  • Uncheck the box next to 'Compose messages in HTML format'
  • Click on 'Synchronization & Storage'
  • Uncheck the box next to 'Keep messages for this account on this computer' (Note: If you do not uncheck this box it will download a copy of all your email to your local computer and take up a lot of space on your hard drive)

 

 

encryption

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

filevault

What do I need to know about laptop encryption?

 

Why do we need to encrypt our laptops?

Department of Energy Laboratories are required to implement guidelines consistent with the National Institute of Standards and Technology (NIST).   NIST guidelines that discuss laptop encryption include NIST Special Publication (SP) 800-53 Security and Privacy Controls for Federal Information System and Organizations; NIST 800-111 Guide to Storage Encryption Technologies for End User Devices; and NIST 800-12 An Introduction to Computer Security:  The NIST Handbook.

Who encrypts the laptops?

IS will encrypt the laptop. This way, we can ensure compliance and make sure the recovery keys are stored in a safe place on the file server.

My laptop has been encrypted; do I need to do anything else?

No, the user does not need to take any more steps to make the encryption work.

What is encryption?

Encryption is an electronic process to protect data.  Encryption is now a generally accepted practice in information security for protection of confidential data.

How does encryption work?

Encryption uses a formula to transform readable data into unreadable data.    The formula is an algorithm (called a cipher), the readable data is called plaintext, and the unreadable data is called ciphertext. Decryption is the reverse process that uses a key to transform the encrypted data back to readable data. As long as the decryption key is protected, the data is unreadable and secure.

What encryption software is used?

Each operating system uses its own native application to encrypt the drives. Windows machines use BitLocker. Macintosh machines use FileVault.

Is my entire hard drive encrypted?

Yes, BitLocker, and FileVault, encrypts the entire hard drive.

Will this affect the performance of the computer?

No, the user shouldn’t notice any performance issues due to encryption.

Do personal computers require encryption?

No, it is not a requirement of the Ames Laboratory.

Why do I need a USB key for BitLocker encryption?

This method of storing the key is the most secure and preferred for Ames Laboratory laptops. The other method, TPM, is not very secure because the key is stored locally and an unauthorized user would gain access to the system easier.

Where should I store the USB key after initial boot up?

The user should not store the USB flash drive in the same place as the PC, especially during travel.  For example if both the PC and the recovery items are in the same bag, it would be very easy for access to be gained to the PC by an unauthorized user.

What do I do if I lose my USB key or require IS assistance?

During normal business hours, contact IS@ameslab.gov or call 294-8348, with the hostname of the machine, for the recovery key and instructions on what the next steps will be.   If you require assistance after normal business hours, please contact the AL Guard Desk at 294-3483

Please indicate this is a 'laptop encryption' issue and provide the following information to the Guards:

- Your name and employee number.

- Phone number that you can be reached.

- The hostname and property number of the device.  

The Guards will contact IS staff.

G-suite calendar conference room reserve

How do I reserve a room in G-Suite Calendar?

Reserving a Room
  1. Open the G-Suite Calendar app (http://calendar.ameslab.gov) and login if required.
  2. Create an event by clicking the "+" symbol in the lower right corner of the screen.
  3. Click "Rooms" and select "Available Rooms only" from the selection box.
  4. Select a room from the dropdown.
  5. Fill out the rest of the event as normal. (Add people, description, etc.)
  6. Click Save.

In most cases, the room is automatically reserved through this method.  There are a couple of rooms that require additional approval before they are offically reserved: TASF 315 and SP 301A/B.  Please contact the Director's office for more information on these rooms.

Viewing a Room's Calendar

  1. Open the G-Suite Calendar app (http://calendar.ameslab.gov) and login if required.
  2. Click the "+" next to "Add a coworker's calendar"
  3. Click "Browse Resources"
  4. Select the room calendars to view

Room Status

Room status can be determined a couple of ways.  When creating an invitation, if the room is not crossed out, it is available for that time period.  If viewing the Room's calendar, a solid color indicates that the room is reserved for that time.  An outline indicates the the room has not been reserved for that event at that time and is either awaiting approval (SP 301A/B) or was not the first to reserve the room.

g-suite calendar import gmail

How do I import Calendars into G-Suite?

Export from Thunderbird:

1.  Open Thunderbird and go to "Events and Tasks", then Calendar

2.  Right-Click on the Calendar to export, then click "Export Calendar..."