Microsoft Outlook: Security Features. and Vulnerabilities
|
|
- Milton Powell
- 8 years ago
- Views:
Transcription
1 Microsoft Outlook: Security Features and Vulnerabilities ECE478 Report By: Mohammad Al-Fares Fares Al-Osaimi
2 Abstract: Microsoft Outlook has been a favorite victim of virus makers for its relatively easy access to the user's address book. The "Love Bug" and the "Melissa" viruses were mainly perpetuated using Outlook. The Preview pane's default setting allows the execution of attached code, which is most likely a virus which would send itself to the user s contact list. This paper discusses the security features and vulnerabilities of Microsoft Outlook. We examine the structure of the address book, and the method in which most viruses spread. We will suggest ways to prevent these security holes.
3 Introduction: It seems in recent years that the Microsoft monopoly trials have not stopped the almost cancerous-like proliferation of their products in the marketplace. Nine in ten home computers in the United States uses the Windows operating system. Microsoft Office is the most widespread suite of programs which offer word processing, spreadsheets, schedule management, slide presentations, and the client Microsoft Outlook among other uses. Outlook s availability and ease of use made it surpass its leading competitor, Qualcomm s Eudora, which was the dominating client on the market in the mid 1990 s. The recent versions of the Windows operating system come with Outlook Express, a free and fully functional version of Outlook. Approximately 84 million people use Outlook or Outlook Express in the United States as their main client. And of course, since Microsoft doesn t believe in the open-source philosophy, the weaknesses of the program are fully exploited by hackers and virus makers to no end. The patches that Microsoft releases for the program can barely keep up fixing the latest loopholes. In this paper, we will discuss the security features and vulnerabilities in Microsoft Outlook which hackers use to spread specific viruses. We will mention the different kinds of attacks and possible ways to prevent them. We ll analyze the structure of the user s address book, which most viruses use to spread themselves, and provide information on the latest security alerts. As a case study, we will discuss the workings of the I LOVE YOU virus in detail as an example.
4 About Microsoft Outlook: Microsoft Outlook provides a solution for organizing and managing digital communication tools such as , newsgroups, and instant messaging, along with all day-to-day organizational information from calendars and contacts to task lists and notes. Outlook controls the deluge of e- mail, appointments, and contacts, helping the user to manage his time and tasks more effectively, while making it easier to share information and communicate with others. The new version of Outlook also works as a web and FTP browser, eliminating the need for a separate Internet browser program. Beyond the many features included in it, Outlook can access web-based services, such as Hotmail. It can also initiate instant chat sessions using Microsoft s instant messaging program MSN Messenger. Furthermore, the mailbox cleanup tool Figure 2 identifies messages by age and can easily find and delete older messages. Another feature automatically reformats HTML code to plain-text , just in case the receiver cannot read e- mails with HTML. On the other hand, Outlook security futures are not as impressive. As a counter measure for the Melissa and I Love You viruses, Outlook won't let the user receive certain file formats which may be virus carriers. Although Outlook notifies the user about such attachments, they can't be seen, opened, or saved. The default user of this program cannot change this behavior. Therefore, if your job
5 requires that you receive these kinds of files, it is recommended that you look for another software package to handle your e- mail. The ability to handle add-ins is a feature or vulnerability, depending on the way you look at it. There are many outside add- ins for Outlook such as Inbox Protector, which detects spam and moves it to the deleted messages folder. Screen Shots: Figure 3: The Application Interface lets you access most of the features.
6 Figure 4: Integration of Internet Explorer by placing the Favorites menu in Outlook Figure 5: Outlook features the ability to manage different accounts for different users
7 Security Features: Microsoft has responded to the market s demand for encryption, signature services, and virus protection. To use these extra security services (which most users don t bother with), Outlook requires a Digital ID which the user needs to purchase from a company like VeriSign (the most popular of several similar companies). It uses the RSA scheme of a private-public key combination and binds the user s address to that pair. The public key is openly published in their Public key directory. To encrypt a message to someone, the user must find that person s public key (which is in the directory). In the option pane (Figure 1), the user can modify his security settings like so: Figure 6: The Security tab in the Options screen
8 Encryption: If the encryption box is checked and the user marks the message for encryption when writing new mail, Outlook will use the public key of the receiver to encrypt it. The receiver s client will then use his private key to decrypt the message and display it. This way confidentiality is assured because no one without the receiver s private key can decrypt the message. Digital Signature: If the user wishes to digitally sign his message, Outlook will encrypt it with the sender s private key, then append the sender s public key to the message so the receiver need not bother look it up in the directory. But to prevent impersonation, the public key is signed by the certificate authority (VeriSign in this case) so that the reader can be sure this is the correct public key. Attachment Screening: Outlook automatically blocks s with attachments of certain exec utable extensions known to possibly carry viruses (*.exe, *.scr, *.vbs etc). It issues warnings to the users when they try to open suspect attachments or read HTML mail containing scripts directing them to restricted areas. This sort of blind discrimination is annoying to many users who think security should be left to the discretion of the intelligent user. An extended list of the screened extensions is in Appendix A.
9 Spam Protection: Whenever an outside program tries to use the Send feature without the knowledge of the user, a flag is raised and the user is automatically prompted if he d allow this possible outgoing spam. Also, to counter the ever increasing efficiency of dictionary attacks on E- mail addresses, Outlook also has a Junk-filter feature which deletes incoming spam which wastes the time of the user.
10 Outlook Vulnerabilities: Microsoft Outlook has been criticized by many reviewers as being too insecure and a hotbed of spreading viruses. There were two main reasons for this criticism. The first being the relative ease of access to the user s address book by any outside program, and the second is the default feature of the Preview pane, which automatically opens s along with any attachment. Most users don t bother changing the defa ult settings, which were not chosen carefully by Microsoft in the early versions of Outlook. The Address Book: Access restrictions to the user s list of contacts were somewhat slack in the past. A virus would copy the list of all the addresses in the user s address book, and use the send feature to send copies of itself to all these addresses. Every recipient would in turn do the same thing, and the virus would spread exponentially. With the recent security patch to Outlook, Microsoft has fixed this problem by detecting whenever a program is trying to access the address book and prompting the user about allowing access. The Preview Panel: The default setting of the preview panel opens every attachment, which is inherently unsafe. The recent patch offers the option to block certain attachment types. It also prevents unsigned (thus non-trusted) scripts from running in Preview.
11 Case Study: An I Love You Virus Short Story: It is the most destructive virus yet, causing damage to at least 45 million computers in 20 countries and making an overall loss of over ten billion dollars. I did not know that when I opened Microsoft Outlook to check my E- mail that day. I received an from someone named Jessica with the subject line I Love You. The body of the simply said kindly check the attached love letter coming from me. My mouse pointer raced across the screen and opened the attached file, named letter-for-you.txt.pif, and nothing happened, at least that is what I thought. I tried to remember if I knew anyone with the name Jessica while the file I just ran started to make copies of itself in a few folders of my computer and installed the following keys in the registry in order to run itself automatically at system start up; HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ MSKernel32=WINDOWS\SYSTEM \MSKernel32.vbs HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices \ Win32DLL=WINDOWS\Win32DLL.vbs It turned out that I have unwittingly participated in the distribution of this virus because I ed pictures to my friends. The virus searched my hard drive for *.JPG files and replaced them with copies of itself. It kept the original filename and added a VBS extension to it. It also overwrote files with the following extensions with copies of itself: VBS, VBE, JS, JSE, CSS, WSH, SCT, and HTA.
12 This Love Bug was smart enough to spread over the internet by itself. It creates a file called letter-for- you.htm which contains the virus and this is then sent to IRC channels if the chat client mirc is installed on the user s computer. This is accomplished by replacing the file script.ini in the mirc directory My computer geek friend told me to notify all the people in my Outlook address book because the worm uses Microsoft Outlook to send copies of itself to all entries in the address book. These s will be of the same format as the one I received from the still unknown Jessica. He also advised me to download Microsoft s security update for Outlook to prevent such viruses in the future. Another advice was to remove the preview panel feature in Outlook so that incoming E- mails do not open automatically and I can delete suspicious s without opening them. I didn t use mirc lately so Outlook was the spread point of this worm from my computer. I would advise those who are afraid of using Outlook to use web based services and forward their all their mail to it, and never open executable files in attachments. Finally, Jessica if you are out there, E- mail me. I guess my address is in your Outlook address book already.
13 Bibliography: Microsoft Corp. Outlook 98/2000 Security Update. May 28, < e/ork/2000/download/outsecwp.doc> Microsoft Corp. Outlook Security Features. May 25, < Slipstick Systems, The Microsoft Outlook and Fax Guide. May 22, < VeriSign Inc. Authentication & Nonrepudiation: The VeriSign Digital ID. June 1, <
14 Appendix A Restricted File Types File Extension File Description. ADE Microsoft Access Project Extension. ADP Microsoft Access Project. BAS Visual Basic Class Module. BAT Batch File. CHM Compiled HTML Help File. CMD Windows NT Command Script. COM MS-DOS Application. CPL Control Panel Extension. CRT Security Certificate. EXE Application. HLP Windows Help File. HTA HTML Applications. INF Setup Information File. INS Internet Communication Settings. ISP Internet Communication Settings. JS JScript File. JSE JScript Encoded Script File. LNK Shortcut. MDB Microsoft Access Application. MDE Microsoft Access MDE Database. MSC Microsoft Common Console Document. MSI Windows Installer Package. MSP Windows Installer Patch. MST Visual Test Source File. PCD Photo CD Imag e. PIF Shortcut to MS-DOS Program. REG Registration Entries. SCR Screen Saver. SCT Windows Script Component. SHS Shell Scrap Object. URL Internet Shortcut (Uniform Resource Locator). VB VBScript File. VBE VBScript Encoded Script File. VBS VBScript Script File. WSC Windows Script Component. WSF Windows Script File. WSH Windows Scripting Host Settings File
Microsoft Outlook 2003 Quick Reference
Microsoft Outlook 2003 Quick Reference Table of Contents Creating Messages 3 Using the Address book 3 Sending messages 3 Saving unfinished messages 4 Adding attachments 4 Using automatic signatures 5 Reading
More informationGuidance for recipients of an encrypted NHSmail email
Guidance for recipients of an encrypted NHSmail email January 2015 V.03 Copyright 2013, Health and Social Care Information Centre. 1 Contents Introduction 3 Receiving an encrypted email 3 Reply to and
More informationAnti-Virus Policy. Computing and Networking Services (CNS).
Anti-Virus Policy Reference: CNS-P-I-ANTIVIRUS Revision: A Supersedes: Purpose: Source: None CNS is to provide a computing network that is virus-free. The purpose of this policy is to provide instructions
More informationBARRACUDA. N e t w o r k s SPAM FIREWALL 600
BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine
More informationARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7
United States Army Records Management and Declassification Agency (USARMDA) ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7 Prepared by October 17, 2013 Table of Contents 1 Overview...1 2 Using
More informationNow select Properties and click the Folder Size button. This will show the size of all the folders in your mailbox and a grand total.
How do I Email & use Calendars with Outlook September 2014 How do I find someone s e-mail address? In order to e-mail almost anyone in the university you can simply type their name in the TO: box and Outlook
More informationUQconnect Email+ for Life Basics
UQconnect Email+ for Life Basics Course Objectives Read, Send, Reply to and Delete e-mail Locate and use addresses in an address book Send receive and open attachments Use folders to manage e- mail University
More informationNITB Public & Partner File sharing Websites. User Guide
NITB Public & Partner File sharing Websites User Guide SharePoint Online Page 1 of 23 Computer Services Table of Contents Table of Contents... 2 Introduction... 3 Accessing the Website... 4 Public Content...
More informationProtecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment
Protecting computers from hidden threats Implementation Guide PestPatrol In a Networked Environment TABLE OF CONTENTS Implementation Guide INTRODUCTION 3 PESTPATROL: A BRIEF OVERVIEW 3 PESTPATROL IN A
More informationANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
More informationTrust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy
Document Control Trust Informatics Policy Information Governance Department Computer Antivirus Management Policy Document Title Author/Contact Computer Antivirus Management Policy Pauline Nordoff-Tate,
More informationPC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
More informationOUTLOOK 2013 - GETTING STARTED
OUTLOOK 2013 - GETTING STARTED Information Technology September 1, 2014 1 GETTING STARTED IN OUTLOOK 2013 Backstage View Ribbon Navigation Pane View Pane Navigation Bar Reading Pane 2 Backstage View contains
More informationTROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE Page 1 OVERVIEW This document is intended to provide the following 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications https://ishare.nielsen.com
More informationConfiguring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
More informationAUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION OUTLOOK INTRODUCTION. (9 hours) ITNW 3012 COURSE SYLLABUS
Course Description: An introduction to using the many features of this software package including the contact manager, electronic mail, calendar, tasks, journal, and note. Prerequisites: Fundamentals of
More informationNOAA Unified Messaging System Policy
NOAA Unified Messaging System Policy NOAA Unified Messaging System Enterprise Messaging Committee February 2010 Table of Contents 1. Purpose... 4 2. Roles and Responsibilities... 5 2.1. Enterprise Messaging
More informationWINDOWS LIVE MAIL FEATURES
WINDOWS LIVE MAIL Windows Live Mail brings a free, full-featured email program to Windows XP, Windows Vista and Windows 7 users. It combines in one package the best that both Outlook Express and Windows
More informationMicrosoft Outlook 2010. Reference Guide for Lotus Notes Users
Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing
More informationChapter 2 Copyright Statement
Chapter 2: Protection at the Client Level...19 Virus Entry Points...19 Securing the Desktop Client Protection 101...20 Choosing Antivirus Client Software...20 Common Vendors of Antivirus Client Software...21
More informationMicrosoft Outlook 2010 Hints & Tips
IT Services Microsoft Outlook 2010 Hints & Tips Contents Introduction... 1 What Outlook Starts Up In... 1 Sending Email Hints... 2 Tracking a Message... 2 Saving a Sent Item... 3 Delay Delivery of a Single
More informationEntourage - an Introduction to E-mail
Entourage - an Introduction to E-mail Version 2004 for Macintosh Table of Contents What is Entourage Starting Entourage The Navigation Pane Getting Help Creating and Sending a Message Using the UI Exchange
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationMS OUTLOOK 2007 E-MAIL
MS OUTLOOK 2007 E-MAIL CREATE, SEND, READ, AND RESPOND TO E-MAIL MESSAGES An e-mail address consists of a user ID and a host name, separated by the @ symbol (userid@host name). You can SEND AND RECEIVE
More informationUsing Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
More informationComputer Viruses. What is a virus? Participating With Safety Briefing no. 5
Participating With Safety Briefing no. 5 Written by Paul Mobbs for the Association for Progressive Communications, March 2002. This briefing is one of a series on Information Security. It looks at: What
More informationUsing Outlook Securely
CHAPTER Using Outlook Securely In this chapter Storing and Sharing Information 592 Securing Outlook Items 592 Sending Secure Messages 598 Sending and Receiving Signed Messages 603 Sending and Receiving
More informationCountermeasures against Computer Viruses
Countermeasures against Computer Viruses How to protect your computer from computer viruses!! Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ Note: A poster showing
More informationWhere do I find? Global Outlook options and features
Where do I find? Changed Outlook version and can now no longer find your favorite feature? Feel like test driving Outlook 2010? Or have you heard of a feature but don't know where to find it in Outlook?
More informationOutlook XP Email Only
Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:
More informationOutlook Web Access User Guide
Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19
More informationUSING MICROSOFT OUTLOOK 2013
USING MICROSOFT OUTLOOK 2013 Staff Development Technology 0 P a g e TABLE OF CONTENTS Outlook 2013 Ribbon... 1 Viewing Inbox... 1 Background Color and Themes... 2 INBOX... 3 Reading Pane... 3 Turn off/on
More informationModule One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...
2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17
More informationOUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES
OUTLOOK 2010 TIPS TABLE OF CONTENTS 1.Send a Blind Carbon Copy... 1 2. Change the view of the Outlook window... 2 3. Use Out of Office Assistant... 2 4. Create Rules... 4 5. Use Autocomplete... 5 6. Request
More informationOutlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500
Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...
More informationRev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs
Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationOWA User Guide. Table of Contents
OWA User Guide Table of Contents 1. Basic Functionality of Outlook Web Access... 2 How to Login to Outlook Web Access (OWA)... 2 Change Password... 3 Mail... 3 Composing Mail... 5 Attachments - Web Ready
More informationThe online email environment
The online email environment These are the options for the selected application. Navigation Pane is comprised of a folders list and oneclick access to your Inbox, Calendar, Contacts, and Tasks folders
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationMicrosoft Outlook 2013 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2013 Part 1: Introduction to Outlook Fall 2014, Version 1.0 Table of Contents Introduction...3 Starting Outlook...3
More informationUsing Microsoft Office 2013: Outlook. Gerry Kruyer
Using Microsoft Office 2013: Outlook Table of Contents Outlook 2013 Ribbon... 4 Viewing Inbox... 4 Folders... 4 Home Tab... 5 Background Colour and Themes... 5 Inbox... 6 Reading Pane... 6 Turn off/on
More informationLesson 7: Maintenance
Lesson 7: Maintenance This lesson introduces you to processes that will help you with the overall maintenance of Outlook 2007. The processes outlined in this section are: Mailbox Cleanup: Helps you focus
More informationOutlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
More informationMicrosoft Outlook Web Access User Guide to Basic E-mail Features
Microsoft Outlook Web Access User Guide to Basic E-mail Features These notes provide the new user with the information necessary to use the basic E-Mail functions of Outlook s online Web Server. Information
More informationMicrosoft Outlook Quick Reference Sheet
Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders
More informationOutlook Web App OWA Quick Guide. Getting you up to speed quickly.
Outlook Web App OWA Quick Guide Getting you up to speed quickly. Information Services 8-1-2014 Contents Exploring the OWA (Outlook Web App) User Interface... 2 Getting Started... 2 Mail... 6 Creating and
More informationMICROSOFT OUTLOOK TIPS AND TRICKS
Materials Provided by Tim McCurdy MICROSOFT OUTLOOK TIPS AND TRICKS Tips for Outlook Mail 1. Set a reminder to reply to a message 2. Add your own words to a follow-up flag for a new message 3. Send a message
More informationOutlook 2010 Essentials
Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...
More informationOutlook Managing Your Items
Course Description Managing your items is essential if you want Outlook to run as efficiently and effectively as possible. As with any filing system the longer you put off doing anything the larger the
More informationMicrosoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App
Microsoft Exchange 2010 Email Training Microsoft Outlook 2007 Outlook Web App Table of Contents INTRODUCTION 1.1 What Does Microsoft Exchange Do? 1.2 Advantage/Disadvantage 1.3 Outlook 2007 vs. Outlook
More informationOutlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com
Outlook Today Microsoft Outlook a different way to look at E-MailE By Microsoft.com What to do, What to do How many times have you received a message from your system administrator telling you that you're
More informationNeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
More informationTCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
More informationOutlook Web Access End User Guide
Outlook Web Access End User Guide Page 0 Outlook Web Access is an online, limited version of an Outlook client which can be used to access an exchange account from a web browser, without having an Outlook
More informationCore Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org
Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing
More informationCloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
More informationOutlook. Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane
Outlook Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane Composing & Sending Email Reading & Sending Mail Messages Set message options Organizing Items
More informationMicrosoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365
1 C H A P T E R Microsoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365 1 MICROSOFT OUTLOOK 2013 AND OUTLOOK WEB ACCESS (OWA) Table of Contents Chapter 1: Signing Into the Microsoft Email System...
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationSetting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
More informationLotus Notes Client Version 8.5 Reference Guide
Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging
More informationTitles. unexpected. video; learn. messages. When. responses. ugust 2013. Page 1
Microsoft Outlook 2010 learningg assets Simply type the id# in the search mechanism of ACS Skills Online too access the learning assets outlined below. Titles Microsoft Outlook 2010 Backing Up Outlook
More informationPolyU Staff Email Service. Outlook Web App (OWA) User Guide
PolyU Staff Email Service Outlook Web App (OWA) User Guide Version 2.2 Last Update: 23 December 2014 PolyU Staff Email: www.polyu.edu.hk/email ITS HelpCentre Support: www.polyu.edu.hk/hots ITS HelpCentre
More informationOutlook 2010 Desk Reference Guide
Outlook 2010 Desk Reference Guide Version 1.0 Developed by OR/WA IRM Please remember to print back-to-back. July 12, 2011 Microsoft Outlook 2010 This document has been developed by OR/WA IRM staff to provide
More informationHow to access a Functional Mailbox via Outlook Web Access (OWA)
How to access a Functional Mailbox via Outlook Web Access (OWA) 1. Please ensure that the Functional Mailbox you are trying to access has already been configured for access via Outlook Web Access (OWA).
More informationOutlook E-mail Security in the Midst of Malicious Code Attacks
C43-017R-2003 Outlook E-mail Security in the Midst of Malicious Code Attacks By: Trent Pitsenbarger and Paul Bartock of the Systems and Network Attack Center (SNAC) W2Kguides@nsa.gov Dated: 30 Dec. 2004
More informationIntroduction. POP and IMAP Servers. MAC1028 June 2007
MAC1028 June 2007 Getting Started with Thunderbird 2.0 For Macintosh OS X Author: John A. Montgomery Adapted to OS X by: Peter Lee Revised by Mitchell Ochi and Deanna Pasternak Introduction...1 POP and
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationWebmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email
Webmail User Guide Rev: November, 2012 Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox 2,
More informationMailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
More informationWhat browsers can I use to view my mail?
How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationEMAIL QUICK START GUIDE
IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new
More informationUsing the City of Stamford / Stamford Public Schools. Web Email System
Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like
More informationUser Guide for the VersaMail Application
User Guide for the VersaMail Application Copyright and Trademark 2004 palmone, Inc. All rights reserved. palmone, HotSync, the HotSync logo, Palm, Palm OS, the Palm logo, and VersaMail are among the trademarks
More informationO UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail
O UTLOOK 2003 HELP SHEET MAIL Opening the program At Work Double-click the icon on your desktop. Or click the Start button. If this icon is displayed, click on it. If it is not displayed, click Start,
More informationTable of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started
Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...
More informationMail tips. Set a reminder to reply to a message. Right-click the message you want to set the reminder for, point
Mail tips Set a reminder to reply to a message Right-click the message you want to set the reminder for, point to Follow Up, and then click Add Reminder. In the Due By list, click the date when you have
More informationLife after Microsoft Outlook Google Apps
Welcome Welcome to Gmail! Now that you ve switched from Microsoft Outlook to, here are some tips on beginning to use Gmail. Google Apps What s Different? Here are some of the differences you ll notice
More informationhttps://mail.wheelock.edu
The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document
More informationNew Features in Outlook Web Access
New Features in Feature and functionality Logon Screen Navigation Description User logon screen for Navigation in resembles navigation in Microsoft Office Outlook 2007. Drag-and-Drop Move items by dragging
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationIntroduction to Outlook 2007. Information Technology Services Education and Development The University of Texas at Austin training@its.utexas.
Introduction to Outlook 2007 Information Technology Services Education and Development The University of Texas at Austin training@its.utexas.edu 2008 Information Technology Services The University of Texas
More informationMicrosoft Outlook 2010 Part 1: Introduction to Outlook
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2015, Version 1.4 Table of Contents Introduction...3 Starting Outlook...3
More informationVodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
More informationCITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),
More informationTechnical Documentation SEPPmail Outlook Add-In v1.5.3
Technical Documentation SEPPmail Outlook Add-In v1.5.3 This document describes how the SEPPmail Outlook Add-in works and the settings that can be configured. Page 2 Content 1 Introduction... 3 2 System
More informationMicrosoft Office 365 Outlook Web App (OWA)
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Office 365 Outlook Web App (OWA) Winter 2015, Version 2.0 Table of Contents Introduction...3 Logging In...3 Navigation
More informationMicrosoft Outlook 2003 Basic Guide
Microsoft Outlook 2003 Basic Guide Table of Contents Introduction... 2 Getting Help... 2 Exploring Outlook... 3 Drop-Down Menus... 3 Navigation Pane... 4 Folder Pane... 7 Reading Pane... 7 Toolbars...
More informationOutlook Tweaks and Tips
Outlook Tweaks and Tips Outlook Tweaks and Tips...1 The Basics...2 Using Run...2 Opening and Using the Registry Editor...2 The Registry Editor...3 Backup the Vista Registry...5 Outlook Settings...6 Change
More informationUser Guide Using Certificate in Microsoft Outlook Express
CERTIFYING AUTHORITY User Guide Using Certificate in Microsoft Outlook Express CONTACT TATA CONSULTANCY SERVICES - [E-SECURITY: PKI SERVICES] 6TH FLOOR, 5-9-62, KHAN LATEEF KHAN ESTATE FATEH MAIDAN ROAD,
More informationOutlook 2010 Email Computer Training Solutions Student Guide Version Revision Date Course Length
Outlook 2010 Email Computer Training Solutions Version 0.3 Revision Date Course Length 2013-Mar-05 3.5 hours Table of Contents Quick Reference... 3 Outlook 2010 Main Window... 3 Icons in the Guide...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationAccessing your e-mail using a web browser
Accessing your e-mail using a web browser The web address for the PTS e-mail site is. http://mailserver.pts.edu Type that web address in the address bar and press . The screen below appears Next,
More informationIf you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
More informationMicrosoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
More informationNielsen Extranet - Troubleshooting Guide March 25, 2015
OVERVIEW This document is intended to provide the following: 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications: https://extranet.nielsen.com https://myextranet.nielsen.com
More informationMicrosoft Outlook 2010
Microsoft Outlook 2010 Prepared by Computing Services at the Eastman School of Music July 2010 Contents Microsoft Office Interface... 4 File Ribbon Tab... 5 Microsoft Office Quick Access Toolbar... 6 Appearance
More informationWhat is e-mail? (using Outlook Express)
What is e-mail? (using Outlook Express) 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes
More information