Get Help

Get Help

AskIT is here to help. Submit a ticket though this form or email us at This email address is being protected from spambots. You need JavaScript enabled to view it..

Find Answers

Find Answers

Browse our knowledge base for documentation, FAQs, setup guides, and more.

Order Services

Order Services

See our service catalog of all the services UAB IT provides.

Quick Resources


Microsoft, Adobe, File Storage, Classrooms: UAB IT is here to support you.


2-Factor Authentication is required for all UAB students, faculty and employees.


See UAB IT's entire catalog of software available for free and reduced prices.

Security Awareness

Arm yourself with security knowledge to protect your personal data.

Policies & Guidance

Policies help keep everyone safe from malware, data thieves, and identity theft.


Purchase laptops and accessories for personal use with educational discounts.

Check out the 2021 Annual Report and visit our Champions of Excellence page where we are tracking our successes for 2022.



Follow us on Twitter


  • Campus role management application helps track changes

    Every role in UAB can be defined: Researcher, executive, assistant; the list goes on and on. How can someone be expected to keep up with the well-defined roles? HR Information Systems and UAB IT worked together to find a way[…]

  • Finding simplicity: Why I like Lightroom more than Photoshop

    As a photographer, I have never been the one to heavily edit a photo. I always strive to “catch” the moment as it is, which is why I prefer to edit in Adobe Lightroom.   Lightroom is the cousin of Photoshop.[…]

  • Teams popout window for multi-tasking

    Teams is giving you more options for meetings when a colleague shares their screen — a pop-out window will allow you to view both the meeting attendees and the shared screen.   Users can access multiple screens and still see meetings[…]

  • Phone and voice scams are on the rise

    Everyone knows about phishing, but have you heard of “vishing”?   Vishing is the act of scammers using fraudulent calls to gain access to accounts. Callers may use fake phone numbers, voice-altering software, and even fear tactics to influence others to[…]

More News