------
The MicroStrategy platform supports interactive dashboards, scorecards, highly formatted reports, ad hoc query, thresholds and alerts, and automated report distribution. The application helps to analyze internal and external data in order to make informed business decisions.
MicroStrategy Access
As of June 1, 2025, MicroStrategy has a provisioning process independent of the Banner account request process.
To gain or modify access for a reporting user, please follow the following steps:
- The Requester (may be the Employee or Supervisor):
- Downloads the Mason Reporting Account Request form, or download from Attachments in right hand column.
- Fills the form in using Adobe Acrobat with the following information:
- Name, Title, Department, etc., for the person who will receive the account (Employee)
- Employee’s Supervisor
- Appropriate Departmental Banner Liaison
- Access being requested for the Employee
- Directs any questions about how to fill-out the form to their Departmental Banner Liaison
- Sends the form by e-mail to the Employee’s Supervisor
- The Supervisor:
- Approves or disapproves the request
- Signs the form
- Sends it by e-mail to the Employee
- The Employee:
- Agrees to the confidentiality statement
- Signs the form
- Sends it by e-mail to the Banner Liaison
- The Banner Liaison:
- Reviews the form for accuracy and approves or denies the request
- Signs the form
- Sends approved requests by e-mail to the appropriate Reporting Security Officer (RSO) in the list below:
- The Reporting Security Officer (RSO):
- Grants access to the recipient
- Reviews the access that was granted
- Sends an e-mail to the Requester, Supervisor, and Employee notifying them that the access is available
- Includes in the e-mail a link to the New MicroStrategy User Orientation webpage, which contains resources for new users
NOTE: If anyone has questions about the status of a request, please go to the last person in this chain who you know received the form to see if it is waiting on someone.
Reporting Security Security Officers (RSOs)
MicroStrategy Login
- Wired Network or connected to Mason's VPN: Users accessing MicroStrategy from a computer connected to George Mason's wired network (except Mason Korea) or VPN may log in to MicroStrategy directly.
- Remote/Wi-Fi Networks: Users accessing MicroStrategy from off-campus or while connected to George Mason's Wi-Fi networks will be required to use the Virtual Private Network (VPN) with Two-Factor Authentication (2FA) before they can log in to MicroStrategy.
- If you are already a VPN user, log in to Cisco Secure Client with your NetID and Patriot Pass Password. Once connected, visit the MicroStrategy site to log in with your NetID and Patriot Pass Password.
- If you need VPN access, see the instructions on Virtual Private Network (VPN) to download the Cisco Secure client from the Related Downloads box on this page. Once you have the client installed, log in to the VPN with your NetID and Patriot Pass Password and then MicroStrategy.
MicroStrategy Specifications
George Mason is currently running MicroStrategy version 2021.
IMPORTANT:
MicroStrategy 2021 does not support Microsoft Internet Explorer.
MicroStrategy supports and works best with the latest version of the following Web browsers:
- Apple Safari
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
Note: Web users will be timed out after 30 minutes idle time.
Availability
The Data Warehouse and MicroStrategy are available, in general, seven days a week, 365 days a year, 8 a.m.–10 p.m. EST.
Systems will be unavailable during the following weekly maintenance windows:
- Every day 8 – 8:15 p.m.
- Saturdays 7 – 7:15 a.m.
- Sundays 7 a.m. – 6 p.m.
Users can submit a request for assistance 24 x 7. However, the BI Group is only available for support 8:30 a.m.– 5 p.m., Monday – Friday.
Data Mart Refresh Statuses
View near real-time data mart load statuses. You must be on the VPN and log in with your George Mason email username/password before the report will be displayed.
Overnight Maintenance
- Data Mart Loads: Fresh data is loaded each day:
- Overnight 12:05 – 7:00 a.m.
- The Finance Data Mart is also refreshed at noon
- MicroStrategy is available during refresh windows, but some data may be incomplete or performance may be slow
- Security Scripts: These scripts automatically create user accounts and assign permissions to users based on database permissions
- Overnight 8:30 p.m.–4:00 a.m.
Note: If maintenance is required outside of these hours, it will be announced on the Alerts & Bulletins page.
Training
George Mason has many options available for MicroStrategy training: in-person training and business process training, as well as a multitude of quick guides for specific purposes. Information on these training options can be found on the Business Intelligence's Training & Workshops page.
Policy
All MicroStrategy users must adhere to the following George Mason policies:
In addition, all users must adhere to the following policies pertaining to specific data.
Academic Data Mart
The Academic Data Mart contains sensitive and confidential information protected by FERPA and/or University policy. It is designed to provide unofficial data to authorized university employees for internal departmental use in support of their academic and administrative duties. The unauthorized use of this system and its material is strictly forbidden and may constitute a violation of state and/or federal law.
Data obtained from the Academic Data Mart may not be disclosed or used for reasons other than specifically set forth in your position responsibilities. The data cannot be shared with anybody outside of the university. Persons not adhering to FERPA and university policies (listed above) regarding protecting sensitive and confidential information will be subject to disciplinary measures, up to and including termination. If you are unclear about your responsibilities when obtaining data from MicroStrategy, contact the FERPA Compliance Specialist for more details.
HR/Payroll Data: MicroStrategy Access Terms of Agreement
Employees granted access to MicroStrategy HR/Payroll data have visibility to university-wide employee and financial information. All users must adhere to the terms below.
Employees may NOT:
- Access or run reports on data that are not directly related to your job duties at George Mason, including financial, employee compensation, or other employee-related data within or outside of your division or unit.
- Access data or run reports to conduct comparative compensation analyses of individuals outside of your division or unit, acknowledging official compensation analyses are conducted by the classification and compensation team within HR & Payroll.
- Disclose to any other person who does not have a business “need to know,” or allow any other person access to any information related to employee records. Disclosure of information includes, but is not limited to, verbal discussions, FAX transmissions, electronic mail messages, voice mail communication, written documentation, “loaning” computer access codes and passwords, and/or any other transmission or sharing of data.
Employees MUST:
- Comply with or seek official exceptions to applicable policies and procedures.
- Arrange for automatic updates of your computer's antivirus protection and operating system patches.
- Identify and manage work-related risks (strategic, financial, compliance, operations, and hazards).
- Assist the agency or state government generally in the event of an emergency declaration by the Governor.
By not following these terms, George Mason and its employees, students, or others may suffer irreparable harm by disclosure of confidential or proprietary information. George Mason may seek legal remedies available should such disclosure occur. Failure to comply with applicable policies, procedures, and regulations may result in a loss of resources, and that George Mason may seek legal remedies available to it should such losses occur. Violations of this agreement may result in disciplinary action appropriate to the severity of the offense.