UK Home Academics Athletics UK's Chandler Medical Center Research Site Index Search UK
IT Customer Service Center banner graphic
       Contact Us
CSC Site Index
IT Departments & Service
CSC Home


Getting Unblocked from the UK Network

Computers connected to the UK Network should be secured against viruses and other attacks. UK's Patch Management Policy ( requires that all networked computers use operating systems with all appropriate security updates and use virus protection software. You are responsible for ensuring that your computer is as secure as possible. If your computer is insecure or becomes compromised by a virus or other attack, your computer may be blocked from using the UK Network.

When blocked your computer will be unable to access the Internet or other networking resources using the UK Network. You also may receive a message from your networking service indicating that your computer has been blocked. If your believe that your computer is blocked, please follow the steps below to reconnect your computer.

Contact Your Networking Support

Your first step will be to contact support for your networking service. They will be able to assist you with your computer's networking problems. Please consult the table below to determine the appropriate support for the networking access you use.

UK Networking Help
Networking Access Who to Contact for Help
Direct Connection (Ethernet) Contact your System Administrator or local Desktop Support.

In absence of System Administrator or local Desktop Support, contact the IT Customer Service Center by phone (859 257-1300) or email ( Medical Center users should contact the MCIS Helpdesk by phone (859 323-8586).
Modem Pool Contact the IT Customer Service Center by phone (859 257-1300) or email (
ResNet ( Contact ResNet by phone (859 257-1591).
Wireless ( Contact the IT Customer Service Center by phone (859 257-1300) or email (

Secure Your Computer

To prevent your computer from being blocked in the future, you will need to ensure that your computer is protected from further viruses or other attacks. Please review the Keeping Your Personal Computer Secure article ( for step-by-step instructions.


Comments to CSC Webmasters
© 2000-2005 This site is maintained by University of Kentucky Information Technology.

File last modified January 12, 2005