Microsoft Outlook: Security Features. and Vulnerabilities

Size: px
Start display at page:

Download "Microsoft Outlook: Security Features. and Vulnerabilities"

Transcription

1 Microsoft Outlook: Security Features and Vulnerabilities ECE478 Report By: Mohammad Al-Fares Fares Al-Osaimi

2 Abstract: Microsoft Outlook has been a favorite victim of virus makers for its relatively easy access to the user's address book. The "Love Bug" and the "Melissa" viruses were mainly perpetuated using Outlook. The Preview pane's default setting allows the execution of attached code, which is most likely a virus which would send itself to the user s contact list. This paper discusses the security features and vulnerabilities of Microsoft Outlook. We examine the structure of the address book, and the method in which most viruses spread. We will suggest ways to prevent these security holes.

3 Introduction: It seems in recent years that the Microsoft monopoly trials have not stopped the almost cancerous-like proliferation of their products in the marketplace. Nine in ten home computers in the United States uses the Windows operating system. Microsoft Office is the most widespread suite of programs which offer word processing, spreadsheets, schedule management, slide presentations, and the client Microsoft Outlook among other uses. Outlook s availability and ease of use made it surpass its leading competitor, Qualcomm s Eudora, which was the dominating client on the market in the mid 1990 s. The recent versions of the Windows operating system come with Outlook Express, a free and fully functional version of Outlook. Approximately 84 million people use Outlook or Outlook Express in the United States as their main client. And of course, since Microsoft doesn t believe in the open-source philosophy, the weaknesses of the program are fully exploited by hackers and virus makers to no end. The patches that Microsoft releases for the program can barely keep up fixing the latest loopholes. In this paper, we will discuss the security features and vulnerabilities in Microsoft Outlook which hackers use to spread specific viruses. We will mention the different kinds of attacks and possible ways to prevent them. We ll analyze the structure of the user s address book, which most viruses use to spread themselves, and provide information on the latest security alerts. As a case study, we will discuss the workings of the I LOVE YOU virus in detail as an example.

4 About Microsoft Outlook: Microsoft Outlook provides a solution for organizing and managing digital communication tools such as , newsgroups, and instant messaging, along with all day-to-day organizational information from calendars and contacts to task lists and notes. Outlook controls the deluge of e- mail, appointments, and contacts, helping the user to manage his time and tasks more effectively, while making it easier to share information and communicate with others. The new version of Outlook also works as a web and FTP browser, eliminating the need for a separate Internet browser program. Beyond the many features included in it, Outlook can access web-based services, such as Hotmail. It can also initiate instant chat sessions using Microsoft s instant messaging program MSN Messenger. Furthermore, the mailbox cleanup tool Figure 2 identifies messages by age and can easily find and delete older messages. Another feature automatically reformats HTML code to plain-text , just in case the receiver cannot read e- mails with HTML. On the other hand, Outlook security futures are not as impressive. As a counter measure for the Melissa and I Love You viruses, Outlook won't let the user receive certain file formats which may be virus carriers. Although Outlook notifies the user about such attachments, they can't be seen, opened, or saved. The default user of this program cannot change this behavior. Therefore, if your job

5 requires that you receive these kinds of files, it is recommended that you look for another software package to handle your e- mail. The ability to handle add-ins is a feature or vulnerability, depending on the way you look at it. There are many outside add- ins for Outlook such as Inbox Protector, which detects spam and moves it to the deleted messages folder. Screen Shots: Figure 3: The Application Interface lets you access most of the features.

6 Figure 4: Integration of Internet Explorer by placing the Favorites menu in Outlook Figure 5: Outlook features the ability to manage different accounts for different users

7 Security Features: Microsoft has responded to the market s demand for encryption, signature services, and virus protection. To use these extra security services (which most users don t bother with), Outlook requires a Digital ID which the user needs to purchase from a company like VeriSign (the most popular of several similar companies). It uses the RSA scheme of a private-public key combination and binds the user s address to that pair. The public key is openly published in their Public key directory. To encrypt a message to someone, the user must find that person s public key (which is in the directory). In the option pane (Figure 1), the user can modify his security settings like so: Figure 6: The Security tab in the Options screen

8 Encryption: If the encryption box is checked and the user marks the message for encryption when writing new mail, Outlook will use the public key of the receiver to encrypt it. The receiver s client will then use his private key to decrypt the message and display it. This way confidentiality is assured because no one without the receiver s private key can decrypt the message. Digital Signature: If the user wishes to digitally sign his message, Outlook will encrypt it with the sender s private key, then append the sender s public key to the message so the receiver need not bother look it up in the directory. But to prevent impersonation, the public key is signed by the certificate authority (VeriSign in this case) so that the reader can be sure this is the correct public key. Attachment Screening: Outlook automatically blocks s with attachments of certain exec utable extensions known to possibly carry viruses (*.exe, *.scr, *.vbs etc). It issues warnings to the users when they try to open suspect attachments or read HTML mail containing scripts directing them to restricted areas. This sort of blind discrimination is annoying to many users who think security should be left to the discretion of the intelligent user. An extended list of the screened extensions is in Appendix A.

9 Spam Protection: Whenever an outside program tries to use the Send feature without the knowledge of the user, a flag is raised and the user is automatically prompted if he d allow this possible outgoing spam. Also, to counter the ever increasing efficiency of dictionary attacks on E- mail addresses, Outlook also has a Junk-filter feature which deletes incoming spam which wastes the time of the user.

10 Outlook Vulnerabilities: Microsoft Outlook has been criticized by many reviewers as being too insecure and a hotbed of spreading viruses. There were two main reasons for this criticism. The first being the relative ease of access to the user s address book by any outside program, and the second is the default feature of the Preview pane, which automatically opens s along with any attachment. Most users don t bother changing the defa ult settings, which were not chosen carefully by Microsoft in the early versions of Outlook. The Address Book: Access restrictions to the user s list of contacts were somewhat slack in the past. A virus would copy the list of all the addresses in the user s address book, and use the send feature to send copies of itself to all these addresses. Every recipient would in turn do the same thing, and the virus would spread exponentially. With the recent security patch to Outlook, Microsoft has fixed this problem by detecting whenever a program is trying to access the address book and prompting the user about allowing access. The Preview Panel: The default setting of the preview panel opens every attachment, which is inherently unsafe. The recent patch offers the option to block certain attachment types. It also prevents unsigned (thus non-trusted) scripts from running in Preview.

11 Case Study: An I Love You Virus Short Story: It is the most destructive virus yet, causing damage to at least 45 million computers in 20 countries and making an overall loss of over ten billion dollars. I did not know that when I opened Microsoft Outlook to check my E- mail that day. I received an from someone named Jessica with the subject line I Love You. The body of the simply said kindly check the attached love letter coming from me. My mouse pointer raced across the screen and opened the attached file, named letter-for-you.txt.pif, and nothing happened, at least that is what I thought. I tried to remember if I knew anyone with the name Jessica while the file I just ran started to make copies of itself in a few folders of my computer and installed the following keys in the registry in order to run itself automatically at system start up; HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ MSKernel32=WINDOWS\SYSTEM \MSKernel32.vbs HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices \ Win32DLL=WINDOWS\Win32DLL.vbs It turned out that I have unwittingly participated in the distribution of this virus because I ed pictures to my friends. The virus searched my hard drive for *.JPG files and replaced them with copies of itself. It kept the original filename and added a VBS extension to it. It also overwrote files with the following extensions with copies of itself: VBS, VBE, JS, JSE, CSS, WSH, SCT, and HTA.

12 This Love Bug was smart enough to spread over the internet by itself. It creates a file called letter-for- you.htm which contains the virus and this is then sent to IRC channels if the chat client mirc is installed on the user s computer. This is accomplished by replacing the file script.ini in the mirc directory My computer geek friend told me to notify all the people in my Outlook address book because the worm uses Microsoft Outlook to send copies of itself to all entries in the address book. These s will be of the same format as the one I received from the still unknown Jessica. He also advised me to download Microsoft s security update for Outlook to prevent such viruses in the future. Another advice was to remove the preview panel feature in Outlook so that incoming E- mails do not open automatically and I can delete suspicious s without opening them. I didn t use mirc lately so Outlook was the spread point of this worm from my computer. I would advise those who are afraid of using Outlook to use web based services and forward their all their mail to it, and never open executable files in attachments. Finally, Jessica if you are out there, E- mail me. I guess my address is in your Outlook address book already.

13 Bibliography: Microsoft Corp. Outlook 98/2000 Security Update. May 28, < e/ork/2000/download/outsecwp.doc> Microsoft Corp. Outlook Security Features. May 25, < Slipstick Systems, The Microsoft Outlook and Fax Guide. May 22, < VeriSign Inc. Authentication & Nonrepudiation: The VeriSign Digital ID. June 1, <

14 Appendix A Restricted File Types File Extension File Description. ADE Microsoft Access Project Extension. ADP Microsoft Access Project. BAS Visual Basic Class Module. BAT Batch File. CHM Compiled HTML Help File. CMD Windows NT Command Script. COM MS-DOS Application. CPL Control Panel Extension. CRT Security Certificate. EXE Application. HLP Windows Help File. HTA HTML Applications. INF Setup Information File. INS Internet Communication Settings. ISP Internet Communication Settings. JS JScript File. JSE JScript Encoded Script File. LNK Shortcut. MDB Microsoft Access Application. MDE Microsoft Access MDE Database. MSC Microsoft Common Console Document. MSI Windows Installer Package. MSP Windows Installer Patch. MST Visual Test Source File. PCD Photo CD Imag e. PIF Shortcut to MS-DOS Program. REG Registration Entries. SCR Screen Saver. SCT Windows Script Component. SHS Shell Scrap Object. URL Internet Shortcut (Uniform Resource Locator). VB VBScript File. VBE VBScript Encoded Script File. VBS VBScript Script File. WSC Windows Script Component. WSF Windows Script File. WSH Windows Scripting Host Settings File

Microsoft Outlook 2003 Quick Reference

Microsoft Outlook 2003 Quick Reference Microsoft Outlook 2003 Quick Reference Table of Contents Creating Messages 3 Using the Address book 3 Sending messages 3 Saving unfinished messages 4 Adding attachments 4 Using automatic signatures 5 Reading

More information

Guidance for recipients of an encrypted NHSmail email

Guidance for recipients of an encrypted NHSmail email Guidance for recipients of an encrypted NHSmail email January 2015 V.03 Copyright 2013, Health and Social Care Information Centre. 1 Contents Introduction 3 Receiving an encrypted email 3 Reply to and

More information

Anti-Virus Policy. Computing and Networking Services (CNS).

Anti-Virus Policy. Computing and Networking Services (CNS). Anti-Virus Policy Reference: CNS-P-I-ANTIVIRUS Revision: A Supersedes: Purpose: Source: None CNS is to provide a computing network that is virus-free. The purpose of this policy is to provide instructions

More information

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

BARRACUDA. N e t w o r k s SPAM FIREWALL 600 BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine

More information

ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7

ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7 United States Army Records Management and Declassification Agency (USARMDA) ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7 Prepared by October 17, 2013 Table of Contents 1 Overview...1 2 Using

More information

Now select Properties and click the Folder Size button. This will show the size of all the folders in your mailbox and a grand total.

Now select Properties and click the Folder Size button. This will show the size of all the folders in your mailbox and a grand total. How do I Email & use Calendars with Outlook September 2014 How do I find someone s e-mail address? In order to e-mail almost anyone in the university you can simply type their name in the TO: box and Outlook

More information

UQconnect Email+ for Life Basics

UQconnect Email+ for Life Basics UQconnect Email+ for Life Basics Course Objectives Read, Send, Reply to and Delete e-mail Locate and use addresses in an address book Send receive and open attachments Use folders to manage e- mail University

More information

NITB Public & Partner File sharing Websites. User Guide

NITB Public & Partner File sharing Websites. User Guide NITB Public & Partner File sharing Websites User Guide SharePoint Online Page 1 of 23 Computer Services Table of Contents Table of Contents... 2 Introduction... 3 Accessing the Website... 4 Public Content...

More information

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment Protecting computers from hidden threats Implementation Guide PestPatrol In a Networked Environment TABLE OF CONTENTS Implementation Guide INTRODUCTION 3 PESTPATROL: A BRIEF OVERVIEW 3 PESTPATROL IN A

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy Document Control Trust Informatics Policy Information Governance Department Computer Antivirus Management Policy Document Title Author/Contact Computer Antivirus Management Policy Pauline Nordoff-Tate,

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

OUTLOOK 2013 - GETTING STARTED

OUTLOOK 2013 - GETTING STARTED OUTLOOK 2013 - GETTING STARTED Information Technology September 1, 2014 1 GETTING STARTED IN OUTLOOK 2013 Backstage View Ribbon Navigation Pane View Pane Navigation Bar Reading Pane 2 Backstage View contains

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE TROUBLESHOOTING GUIDE Page 1 OVERVIEW This document is intended to provide the following 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications https://ishare.nielsen.com

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

AUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION OUTLOOK INTRODUCTION. (9 hours) ITNW 3012 COURSE SYLLABUS

AUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION OUTLOOK INTRODUCTION. (9 hours) ITNW 3012 COURSE SYLLABUS Course Description: An introduction to using the many features of this software package including the contact manager, electronic mail, calendar, tasks, journal, and note. Prerequisites: Fundamentals of

More information

NOAA Unified Messaging System Policy

NOAA Unified Messaging System Policy NOAA Unified Messaging System Policy NOAA Unified Messaging System Enterprise Messaging Committee February 2010 Table of Contents 1. Purpose... 4 2. Roles and Responsibilities... 5 2.1. Enterprise Messaging

More information

WINDOWS LIVE MAIL FEATURES

WINDOWS LIVE MAIL FEATURES WINDOWS LIVE MAIL Windows Live Mail brings a free, full-featured email program to Windows XP, Windows Vista and Windows 7 users. It combines in one package the best that both Outlook Express and Windows

More information

Microsoft Outlook 2010. Reference Guide for Lotus Notes Users

Microsoft Outlook 2010. Reference Guide for Lotus Notes Users Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing

More information

Chapter 2 Copyright Statement

Chapter 2 Copyright Statement Chapter 2: Protection at the Client Level...19 Virus Entry Points...19 Securing the Desktop Client Protection 101...20 Choosing Antivirus Client Software...20 Common Vendors of Antivirus Client Software...21

More information

Microsoft Outlook 2010 Hints & Tips

Microsoft Outlook 2010 Hints & Tips IT Services Microsoft Outlook 2010 Hints & Tips Contents Introduction... 1 What Outlook Starts Up In... 1 Sending Email Hints... 2 Tracking a Message... 2 Saving a Sent Item... 3 Delay Delivery of a Single

More information

Entourage - an Introduction to E-mail

Entourage - an Introduction to E-mail Entourage - an Introduction to E-mail Version 2004 for Macintosh Table of Contents What is Entourage Starting Entourage The Navigation Pane Getting Help Creating and Sending a Message Using the UI Exchange

More information

johnireland@eircom.net

johnireland@eircom.net Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network

More information

MS OUTLOOK 2007 E-MAIL

MS OUTLOOK 2007 E-MAIL MS OUTLOOK 2007 E-MAIL CREATE, SEND, READ, AND RESPOND TO E-MAIL MESSAGES An e-mail address consists of a user ID and a host name, separated by the @ symbol (userid@host name). You can SEND AND RECEIVE

More information

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox

More information

Computer Viruses. What is a virus? Participating With Safety Briefing no. 5

Computer Viruses. What is a virus? Participating With Safety Briefing no. 5 Participating With Safety Briefing no. 5 Written by Paul Mobbs for the Association for Progressive Communications, March 2002. This briefing is one of a series on Information Security. It looks at: What

More information

Using Outlook Securely

Using Outlook Securely CHAPTER Using Outlook Securely In this chapter Storing and Sharing Information 592 Securing Outlook Items 592 Sending Secure Messages 598 Sending and Receiving Signed Messages 603 Sending and Receiving

More information

Countermeasures against Computer Viruses

Countermeasures against Computer Viruses Countermeasures against Computer Viruses How to protect your computer from computer viruses!! Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ Note: A poster showing

More information

Where do I find? Global Outlook options and features

Where do I find? Global Outlook options and features Where do I find? Changed Outlook version and can now no longer find your favorite feature? Feel like test driving Outlook 2010? Or have you heard of a feature but don't know where to find it in Outlook?

More information

Outlook XP Email Only

Outlook XP Email Only Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

USING MICROSOFT OUTLOOK 2013

USING MICROSOFT OUTLOOK 2013 USING MICROSOFT OUTLOOK 2013 Staff Development Technology 0 P a g e TABLE OF CONTENTS Outlook 2013 Ribbon... 1 Viewing Inbox... 1 Background Color and Themes... 2 INBOX... 3 Reading Pane... 3 Turn off/on

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

OUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES

OUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES OUTLOOK 2010 TIPS TABLE OF CONTENTS 1.Send a Blind Carbon Copy... 1 2. Change the view of the Outlook window... 2 3. Use Out of Office Assistant... 2 4. Create Rules... 4 5. Use Autocomplete... 5 6. Request

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

OWA User Guide. Table of Contents

OWA User Guide. Table of Contents OWA User Guide Table of Contents 1. Basic Functionality of Outlook Web Access... 2 How to Login to Outlook Web Access (OWA)... 2 Change Password... 3 Mail... 3 Composing Mail... 5 Attachments - Web Ready

More information

The online email environment

The online email environment The online email environment These are the options for the selected application. Navigation Pane is comprised of a folders list and oneclick access to your Inbox, Calendar, Contacts, and Tasks folders

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Microsoft Outlook 2013 Part 1: Introduction to Outlook

Microsoft Outlook 2013 Part 1: Introduction to Outlook CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2013 Part 1: Introduction to Outlook Fall 2014, Version 1.0 Table of Contents Introduction...3 Starting Outlook...3

More information

Using Microsoft Office 2013: Outlook. Gerry Kruyer

Using Microsoft Office 2013: Outlook. Gerry Kruyer Using Microsoft Office 2013: Outlook Table of Contents Outlook 2013 Ribbon... 4 Viewing Inbox... 4 Folders... 4 Home Tab... 5 Background Colour and Themes... 5 Inbox... 6 Reading Pane... 6 Turn off/on

More information

Lesson 7: Maintenance

Lesson 7: Maintenance Lesson 7: Maintenance This lesson introduces you to processes that will help you with the overall maintenance of Outlook 2007. The processes outlined in this section are: Mailbox Cleanup: Helps you focus

More information

Outlook Web Access 2003 Remote User Guide

Outlook Web Access 2003 Remote User Guide UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view

More information

Microsoft Outlook Web Access User Guide to Basic E-mail Features

Microsoft Outlook Web Access User Guide to Basic E-mail Features Microsoft Outlook Web Access User Guide to Basic E-mail Features These notes provide the new user with the information necessary to use the basic E-Mail functions of Outlook s online Web Server. Information

More information

Microsoft Outlook Quick Reference Sheet

Microsoft Outlook Quick Reference Sheet Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders

More information

Outlook Web App OWA Quick Guide. Getting you up to speed quickly.

Outlook Web App OWA Quick Guide. Getting you up to speed quickly. Outlook Web App OWA Quick Guide Getting you up to speed quickly. Information Services 8-1-2014 Contents Exploring the OWA (Outlook Web App) User Interface... 2 Getting Started... 2 Mail... 6 Creating and

More information

MICROSOFT OUTLOOK TIPS AND TRICKS

MICROSOFT OUTLOOK TIPS AND TRICKS Materials Provided by Tim McCurdy MICROSOFT OUTLOOK TIPS AND TRICKS Tips for Outlook Mail 1. Set a reminder to reply to a message 2. Add your own words to a follow-up flag for a new message 3. Send a message

More information

Outlook 2010 Essentials

Outlook 2010 Essentials Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...

More information

Outlook Managing Your Items

Outlook Managing Your Items Course Description Managing your items is essential if you want Outlook to run as efficiently and effectively as possible. As with any filing system the longer you put off doing anything the larger the

More information

Microsoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App

Microsoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App Microsoft Exchange 2010 Email Training Microsoft Outlook 2007 Outlook Web App Table of Contents INTRODUCTION 1.1 What Does Microsoft Exchange Do? 1.2 Advantage/Disadvantage 1.3 Outlook 2007 vs. Outlook

More information

Outlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com

Outlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com Outlook Today Microsoft Outlook a different way to look at E-MailE By Microsoft.com What to do, What to do How many times have you received a message from your system administrator telling you that you're

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings

More information

Outlook Web Access End User Guide

Outlook Web Access End User Guide Outlook Web Access End User Guide Page 0 Outlook Web Access is an online, limited version of an Outlook client which can be used to access an exchange account from a web browser, without having an Outlook

More information

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Outlook. Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane

Outlook. Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane Outlook Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane Composing & Sending Email Reading & Sending Mail Messages Set message options Organizing Items

More information

Microsoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365

Microsoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365 1 C H A P T E R Microsoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365 1 MICROSOFT OUTLOOK 2013 AND OUTLOOK WEB ACCESS (OWA) Table of Contents Chapter 1: Signing Into the Microsoft Email System...

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT

More information

Lotus Notes Client Version 8.5 Reference Guide

Lotus Notes Client Version 8.5 Reference Guide Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging

More information

Titles. unexpected. video; learn. messages. When. responses. ugust 2013. Page 1

Titles. unexpected. video; learn. messages. When. responses. ugust 2013. Page 1 Microsoft Outlook 2010 learningg assets Simply type the id# in the search mechanism of ACS Skills Online too access the learning assets outlined below. Titles Microsoft Outlook 2010 Backing Up Outlook

More information

PolyU Staff Email Service. Outlook Web App (OWA) User Guide

PolyU Staff Email Service. Outlook Web App (OWA) User Guide PolyU Staff Email Service Outlook Web App (OWA) User Guide Version 2.2 Last Update: 23 December 2014 PolyU Staff Email: www.polyu.edu.hk/email ITS HelpCentre Support: www.polyu.edu.hk/hots ITS HelpCentre

More information

Outlook 2010 Desk Reference Guide

Outlook 2010 Desk Reference Guide Outlook 2010 Desk Reference Guide Version 1.0 Developed by OR/WA IRM Please remember to print back-to-back. July 12, 2011 Microsoft Outlook 2010 This document has been developed by OR/WA IRM staff to provide

More information

How to access a Functional Mailbox via Outlook Web Access (OWA)

How to access a Functional Mailbox via Outlook Web Access (OWA) How to access a Functional Mailbox via Outlook Web Access (OWA) 1. Please ensure that the Functional Mailbox you are trying to access has already been configured for access via Outlook Web Access (OWA).

More information

Outlook E-mail Security in the Midst of Malicious Code Attacks

Outlook E-mail Security in the Midst of Malicious Code Attacks C43-017R-2003 Outlook E-mail Security in the Midst of Malicious Code Attacks By: Trent Pitsenbarger and Paul Bartock of the Systems and Network Attack Center (SNAC) W2Kguides@nsa.gov Dated: 30 Dec. 2004

More information

Introduction. POP and IMAP Servers. MAC1028 June 2007

Introduction. POP and IMAP Servers. MAC1028 June 2007 MAC1028 June 2007 Getting Started with Thunderbird 2.0 For Macintosh OS X Author: John A. Montgomery Adapted to OS X by: Peter Lee Revised by Mitchell Ochi and Deanna Pasternak Introduction...1 POP and

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Webmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email

Webmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email Webmail User Guide Rev: November, 2012 Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox 2,

More information

MailEnable Web Mail End User Manual V 2.x

MailEnable Web Mail End User Manual V 2.x MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61

More information

What browsers can I use to view my mail?

What browsers can I use to view my mail? How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Using the City of Stamford / Stamford Public Schools. Web Email System

Using the City of Stamford / Stamford Public Schools. Web Email System Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like

More information

User Guide for the VersaMail Application

User Guide for the VersaMail Application User Guide for the VersaMail Application Copyright and Trademark 2004 palmone, Inc. All rights reserved. palmone, HotSync, the HotSync logo, Palm, Palm OS, the Palm logo, and VersaMail are among the trademarks

More information

O UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail

O UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail O UTLOOK 2003 HELP SHEET MAIL Opening the program At Work Double-click the icon on your desktop. Or click the Start button. If this icon is displayed, click on it. If it is not displayed, click Start,

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

Mail tips. Set a reminder to reply to a message. Right-click the message you want to set the reminder for, point

Mail tips. Set a reminder to reply to a message. Right-click the message you want to set the reminder for, point Mail tips Set a reminder to reply to a message Right-click the message you want to set the reminder for, point to Follow Up, and then click Add Reminder. In the Due By list, click the date when you have

More information

Life after Microsoft Outlook Google Apps

Life after Microsoft Outlook Google Apps Welcome Welcome to Gmail! Now that you ve switched from Microsoft Outlook to, here are some tips on beginning to use Gmail. Google Apps What s Different? Here are some of the differences you ll notice

More information

https://mail.wheelock.edu

https://mail.wheelock.edu The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document

More information

New Features in Outlook Web Access

New Features in Outlook Web Access New Features in Feature and functionality Logon Screen Navigation Description User logon screen for Navigation in resembles navigation in Microsoft Office Outlook 2007. Drag-and-Drop Move items by dragging

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

Introduction to Outlook 2007. Information Technology Services Education and Development The University of Texas at Austin training@its.utexas.

Introduction to Outlook 2007. Information Technology Services Education and Development The University of Texas at Austin training@its.utexas. Introduction to Outlook 2007 Information Technology Services Education and Development The University of Texas at Austin training@its.utexas.edu 2008 Information Technology Services The University of Texas

More information

Microsoft Outlook 2010 Part 1: Introduction to Outlook

Microsoft Outlook 2010 Part 1: Introduction to Outlook CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Outlook 2010 Part 1: Introduction to Outlook Spring 2015, Version 1.4 Table of Contents Introduction...3 Starting Outlook...3

More information

Vodafone Text Centre User Guide for Microsoft Outlook

Vodafone Text Centre User Guide for Microsoft Outlook Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

Technical Documentation SEPPmail Outlook Add-In v1.5.3

Technical Documentation SEPPmail Outlook Add-In v1.5.3 Technical Documentation SEPPmail Outlook Add-In v1.5.3 This document describes how the SEPPmail Outlook Add-in works and the settings that can be configured. Page 2 Content 1 Introduction... 3 2 System

More information

Microsoft Office 365 Outlook Web App (OWA)

Microsoft Office 365 Outlook Web App (OWA) CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Office 365 Outlook Web App (OWA) Winter 2015, Version 2.0 Table of Contents Introduction...3 Logging In...3 Navigation

More information

Microsoft Outlook 2003 Basic Guide

Microsoft Outlook 2003 Basic Guide Microsoft Outlook 2003 Basic Guide Table of Contents Introduction... 2 Getting Help... 2 Exploring Outlook... 3 Drop-Down Menus... 3 Navigation Pane... 4 Folder Pane... 7 Reading Pane... 7 Toolbars...

More information

Outlook Tweaks and Tips

Outlook Tweaks and Tips Outlook Tweaks and Tips Outlook Tweaks and Tips...1 The Basics...2 Using Run...2 Opening and Using the Registry Editor...2 The Registry Editor...3 Backup the Vista Registry...5 Outlook Settings...6 Change

More information

User Guide Using Certificate in Microsoft Outlook Express

User Guide Using Certificate in Microsoft Outlook Express CERTIFYING AUTHORITY User Guide Using Certificate in Microsoft Outlook Express CONTACT TATA CONSULTANCY SERVICES - [E-SECURITY: PKI SERVICES] 6TH FLOOR, 5-9-62, KHAN LATEEF KHAN ESTATE FATEH MAIDAN ROAD,

More information

Outlook 2010 Email Computer Training Solutions Student Guide Version Revision Date Course Length

Outlook 2010 Email Computer Training Solutions Student Guide Version Revision Date Course Length Outlook 2010 Email Computer Training Solutions Version 0.3 Revision Date Course Length 2013-Mar-05 3.5 hours Table of Contents Quick Reference... 3 Outlook 2010 Main Window... 3 Icons in the Guide...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Accessing your e-mail using a web browser

Accessing your e-mail using a web browser Accessing your e-mail using a web browser The web address for the PTS e-mail site is. http://mailserver.pts.edu Type that web address in the address bar and press . The screen below appears Next,

More information

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods: ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

Nielsen Extranet - Troubleshooting Guide March 25, 2015

Nielsen Extranet - Troubleshooting Guide March 25, 2015 OVERVIEW This document is intended to provide the following: 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications: https://extranet.nielsen.com https://myextranet.nielsen.com

More information

Microsoft Outlook 2010

Microsoft Outlook 2010 Microsoft Outlook 2010 Prepared by Computing Services at the Eastman School of Music July 2010 Contents Microsoft Office Interface... 4 File Ribbon Tab... 5 Microsoft Office Quick Access Toolbar... 6 Appearance

More information

What is e-mail? (using Outlook Express)

What is e-mail? (using Outlook Express) What is e-mail? (using Outlook Express) 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes

More information