Rogue Community College
Rogue Community College
Phone Search Menu Search

Wireless FAQs

  • Connect to the college wireless network.
  • Open your Internet browser (Internet Explorer, Firefox, etc).
  • Within a minute or so, you will be prompted to log in.
  • Authenticate to the network using your RCC username and password.
  • Click on the link to acknowledge acceptance of the policy and install the policy key.
  • A few seconds after the installation is complete, you will receive a Web page informing you of steps required to ensure your system's security.
  • After finishing steps to secure your system, reboot your computer.
  • After rebooting, start your Web browser.
  • You will now be free to access the network.

Microsoft Windows:

  • Authentium
  • Avast
  • AVG
  • AVGuard (includes Avira)
  • Bitdefender
  • EZ Antivirus
  • F-Secure
  • Kaspersky
  • Malwarebytes
  • McAfee
  • Microsoft OneCare (Forefront and Security Essentials)
  • NOD 32
  • Panda
  • Sophos
  • SpySweeper AV
  • Symantec/Norton
  • TrendMicro
  • Vipre
  • Zone-Alarm

Apple Macintosh:

  • Avast
  • Intego
  • Kasperksy
  • McAfee
  • Norton/Symantec
  • Sophos
  • TrendMicro
What is NAC?
NAC is network access control used to mitigate risks inherent in improperly protected computers. It also provides a mechanism of login, which is necessary to comply with regulatory requirements
Why does the college use NAC?
Taking advantage of unpatched computers is one of the most commonly used methods for spreading viruses and malware. This presents a risk not only to the individual computer user but to others through the network. Using tools such as NAC to help identify these issues is another step in minimizing risks.
Do I have to use the policy key?
Generally, yes. All Microsoft Windows PCs and Macintosh OS X are required to use the policy key in order to maintain network access. Mobile devices do not need the policy key installed.
How do I set it up?
What happens if I uninstall the policy key?
You can uninstall the policy key at any time. However, within minutes you will no longer be able to access RCC's wireless internet. You will be required to reinstall the policy key as if you are a new user in order to regain access.
How do I know the policy key is running?
On Windows, you can right-click any blank space on the task bar at the bottom of your screen and select the option "Task Manager." When the Windows Task Manager appears, click the "Processes" tab, then "Show Processes from All Users" and look for the process "SCClient.exe" and "scManager.sys." On Macintosh machines, open the Activity Monitor, click "Show All Processes" and look for "SafeConnect" and "scManagerD."
What does the policy key actually do?
The policy key continuously validates that your system is running the minimum security software and is up to date. It will provide occasional warnings when certain conditions occur, such as antivirus definitions becoming outdated or Windows update or AV protection being disabled.
What antivirus software do I need?
The following AV clients are currently supported.
NOTE: As a rule, only install a single AV client as system problems may otherwise arise.
What are the benefits?
The policy key is part of an effort to help keep your computers free from viruses, spyware, and operating system security vulnerabilities. Machines protected in this way generally perform better and are less likely to experience downtime due to damage caused by malicious software.
What about my privacy?
Your privacy is very important to us. The policy key scans only for Windows update services compliance, anti-virus and anti-spyware status. No user data is collected or stored.

Impulse Point, the company that created the Safe-Connect product, has released a privacy statement which is available here: