Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Size: px
Start display at page:

Download "Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology"

Transcription

1 getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on ( ) March 2010

2 Contents 1 Introduction to Symantec Endpoint Encryption Storing a file on removable USB drive (e.g. memory stick, external hard drive, etc.) Saving to USB Drive for storage or sharing internally Saving to USB Drive for Sharing Externally Sending a File securely via Receiving an Encrypted File via Access an encrypted file on a USB drive, on a RMG computer with SEE installed Access an encrypted file on a USB drive on a computer without SEE installed Accessing a Self-Extracting file on a Removable USB Drive Storing and Accessing files on CD/DVD Saving to CD/DVD for storage or internal transfer Saving to CD/DVD for External Transfer Accessing Files on a Secure CD/DVD Accessing on a RMG computer with SEE installed Accessing on a computer without SEE installed Accessing a Self-Extracting file on a CD/DVD Drive...21 Appendix A. Using the SEE User Client Console...23 Appendix B. Exchanging information securely our policies...27

3 1 Introduction to Symantec Endpoint Encryption Symantec Endpoint Encryption (SEE) software ensures that only authorised users are allowed to access removable devices such as memory sticks or CD/DVDs and that any information written to these devices is secure. When SEE is installed on your PC or laptop, you ll be automatically registered as an authorised user. This will mean that any file you save to a removable device will be automatically encrypted. This process will be seamless and you will be able to open documents on your PC as normal without noticing any difference. However, when sharing files with RMG users without SEE installed or with external users, you will need to create a separate file with a password. For details, go to section 2 - Storing a file on removable USB drive When SEE is installed, you ll also get an application for burning files to a CD/DVD, ensuring they are always encrypted. This application will replace all other CD burning software in RMG. Full details are in section 7. Symantec Endpoint Encryption (SEE) supports the RMG information security policies, further details of which can be found in Appendix B.

4 2 Storing a file on removable USB drive (e.g. memory stick, external hard drive, etc.) 2.1 Saving to USB Drive for storage or sharing internally Step 1 Whenever you save a file to a USB removable device, that file will now be automatically saved as an encrypted file. This means the file can only be accessed or shared internally within RMG. Step 2 The file icon displayed in Windows Explorer now includes a padlock, indicating the file is encrypted. Step 3 You can now remove the USB drive from your computer. All RMG computers will have Symantec Endpoint Encryption (SEE) installed by the end of July While the rollout takes place, only computers with SEE installed will be able to access files saved in this manner. The file won t open on RMG PC s without SEE installed or on external computers such as your home computer or one belonging to an external partner. If you need to share the information in the file with external third parties, or anyone in RMG who has not yet had the software installed, you will need to use a password to encrypt the file. See section 2.2 below.

5 2.2 Saving to USB Drive for Sharing Externally When sharing information on a removable USB drive with external third parties, or anyone in RMG yet to have the software installed, you will need to create a Self Extracting Archive (.exe) file encrypted with a password that you supply. The information will only be accessible to a third party by using that password. Step 1 Insert the removable USB drive into your computer. Step 2 Select the file(s) to be encrypted. Using Windows Explorer, browse to the location of the file(s) that you want to encrypt. A single file or multiple files can be encrypted to a self extracting file. Right-click the selected file(s), point to Symantec, and select Encrypt to self-extracting file.

6 The SEE Removable Storage Self-Extracting Archive dialogue box appears Step 3 Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file or use the default archive name that is displayed. The archive name can be different to the names of the files contained within it, however, it makes it easier for the recipient if you name the archive file with the same name as the original file. If you do use a different name ensure you advise the recipient of the names of the individual files so they can find the files when they extract them to their computer. Select the file path for the removable USB drive in the Encrypt to field, or browse to the appropriate folder in the Folders/Drives box. You need to save the archive directly to the removable device. If moved to the device later, the recipient won t be able to view it. To create a new folder or subfolder, select an existing folder then click the New folder button. The Create Folder dialogue appears. In the new folder field, type the name of the new folder and click OK. Your folder is created and you are returned to the SEE Removable Storage Self- Extracting Archive box to complete. If you have already saved a self-extracting file of the same name to this location and want to replace it with this one, tick the Overwrite existing files box.

7 Tick the Password to allow you to enter a password in the Password and Confirm boxes. Click Encrypt Step 4 When the encryption is complete you ll get this message: Step 5 Click OK to confirm Step 6 Send the removable device to the external third party Step 7 Send the password to the third party separately and securely via , or over the telephone. You should never send a password with the removable media on which it is encrypted. Ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

8 3 Sending a File securely via (Please be aware that the functionality in this section may not work whilst our systems are prepared for the migration from Lotus Notes to Microsoft Outlook) If you need to send a file to someone outside RMG using , you ll need to create a Self Extracting Archive file, encrypted with a password that you supply. The information will only be accessible to a third party by using that password. Step 1 Select the file(s) to be encrypted and ed Using Windows Explorer, browse to the location of the file(s) that you want to encrypt. A single file or multiple files can be encrypted to a self extracting file. Right-click the selected file(s), point to Symantec, and select Encrypt, rename and The SEE Encrypt, rename and dialog box appears

9 Step 2 Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file or use the default archive name that is displayed. The archive name can be different to the names of the files contained within it. It makes it easier for the recipient if you rename the archive. If you do use a different name ensure you advise the recipient of the names of the individual files. This will enable them to find the files when they extract them to their computer. Tick the Password to allow you to enter a password in the Password and Confirm boxes Click Step 3 Complete the Message details When the encryption is complete a New Mail is displayed with the encrypted file attached and a message telling the recipient how to access the file is included in the Mail Body Add the Recipient details and Subject and Send the message Step 4 Send the password to the third party separately and securely via a separate , or over the telephone. You should never send a password with the containing the encrypted file. Ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

10 4 Receiving an Encrypted File via (Please be aware that the functionality in this section may not work whilst our systems are prepared for the migration from Lotus Notes to Microsoft Outlook) When the recipient receives the encrypted file as an attachment, they save the attachment to their computer, and rename the attachment so that it has.exe as the file extension, instead of.rse. They then double click on the renamed file to display the SEE Removable Storage Extractor screen. They complete this by choosing the location on their computer in the Extract to field and the password you gave them in the password box. The file is extracted to the specified location and can be accessed by the recipient in the normal way. When looking for the extracted files, keep in mind that they might have different names to the archive file. If you are unsure you will need to contact the sender of the file.

11 5 Access an encrypted file on a USB drive, on a RMG computer with SEE installed In the screen shot below, a USB Drive containing an encrypted file has been plugged into your computer and is accessible as Drive F: The encrypted files appear in the folder listing in Windows Explorer. The padlock symbol which can be gold or red - indicates that the file is encrypted. A gold padlock means you can copy or open the file without a password. A red padlock means you will need to enter the password to decrypt the file when you try to copy or open it. When sharing encrypted files with other RMG users with SEE installed, this will not occur. If a file is displayed with the extension.exe and a padlock symbol, it has been saved as a self extracting executable archive. For details on accessing the files in the archive, refer to the next section.

12 6 Access an encrypted file on a USB drive on a computer without SEE installed Files encrypted and copied by SEE in the normal way (as described in section 2.1) cannot be opened automatically on a computer without SEE installed. If anyone tries to access the files using Windows Explorer they will see files with XML added to the end of the file name. If they try to access one of the files by double clicking it, this message will appear If this occurs because the user is waiting for SEE to be installed on their computer, the originator of the file should copy the file as a self extracting file as described in section 2.2 and send them the password separately and securely.

13 7 Accessing a Self-Extracting file on a Removable USB Drive Files that are to be securely transferred externally will be encrypted and should be saved as a self extracting file (as described in section 2.2) Step 1 To access these files, open Windows Explorer. The files will be displayed with a padlock symbol as shown here. To extract an unencrypted version of the file to your hard disc so you can access the file as normal. Double-click the self-extracting file name to start the process. A dialog box is displayed and you need to fill in the details. Step 2 Extract to: Type the name of folder on your hard disc where you want to save the extracted file to or Press to select the folder Password Enter the password provided by the originator, in the box (this is the password that was used when the self extracting file was originally created). Press Extract Note the number of remaining password attempts. Step 3 If the password is correct you will see this message and a normal unencrypted file will be placed on your hard drive that you can access as normal When looking for the extracted file(s), keep in mind that they may have different names to the archive file. The person who created the self-extracting file will be able to advise the original file names.

14 If you enter the wrong password, you see this message and will be able to try again to re-enter the password After five wrong passwords, you ll see this message You will not be able to try to decrypt the file again for a period of five minutes (the screen shot above was taken with one minute remaining).

15 8 Storing and Accessing files on CD/DVD 8.1 Saving to CD/DVD for storage or internal transfer When SEE is installed on your computer, it installs a program to burn files to a CD or DVD. This program will replace all other versions of CD burning Software in RMG. Follow the process below to burn files to a CD or DVD. Step 1 To launch the CD-DVD Burner, click Start - All Programs - Symantec Endpoint Encryption - SEE-RS Edition CD-DVD Burner, as shown below. Alternatively you can right click on the SEE User Client icon in the system tray (bottom right hand corner of your screen) and select Symantec Endpoint Encryption - SEE-RS CD-DVD Burner

16 Step 2 Complete the following dialogue box. An explanation of the fields and how you complete them follows: The Destination Drive drop-down list displays all of the available CD/DVD drives. Select your CD/DVD Drive. The Policies box is for information and indicates that files burned to disc will be encrypted. The Disc Information box gives you information about the disc currently in the selected drive. The Files and/or Folders to be burned box displays a list of files and folders that you select for burning. As you add files and folders using the buttons at the bottom of the screen they are added to this list. Add Files - This button allows you to select individual files from your computer to be added to the CD/DVD. Add Folders - This button allows you to select folders from your computer to be added to the CD/DVD.

17 Remove files - If you have added a file or folder to the list and change your mind before burning the CD/DVD you can remove it by selecting it from the list box and clicking this button. If you want to add a label to the CD/DVD before type the name in the Disc Volume Label box. burning, Step 3 Burn when you have selected all the files to be burned, press this button. The files are prepared, encrypted and finally written to the CD/DVD. The progress of each stage can be monitored in the Progress bar and the Activity Details box Step 4 When all files have been written successfully, this message appears. If you need to create a another CD/DVD with the same files, put a new disc in the CD/DVD writer and click Yes If you are finished, click No to end the Burner program.

18 8.2 Saving to CD/DVD for External Transfer Any files, which will be transferred to a Third party, must be stored on the CD/DVD as self extracting executables, using a password which must be supplied to the third party. The self extracting files will have to be created on your hard drive first, before copying to the CD using the CD/DVD writer. Step 1 The process for creating a self extracting archive on the hard disc is almost identical to the process for creating a self extracting archive on a Removable device as detailed in section 2.2. The only difference is in Step 3, when you are completing the Encrypt To part of dialog box. You need to save the self extracting file to a location on your hard drive. Complete the fields in the Dialog box as follows: In the Archive Name field, type a name for the self-extracting file - or use the default archive name that is displayed. The archive name can be different to the names of the files contained

19 within it. It makes it easier for the recipient if you name the archive file with the same name as the original file. If you do not use a different name ensure you advise the recipient of the names of the individual files. This will enable them to find the files when they extract them to their computer. Type the file path for the location on your hard drive where you want to save the file, in the Encrypt to field, or browse to the appropriate folder in the Folders/Drives box. You need to save the archive directly to the hard drive for copying to the CD at a later date. To create a new folder or subfolder on your hard disc, select an existing folder then click the New folder button. The Create Folder dialogue appears. In the new folder field, type the name of the new folder and click OK. Your folder is created and you are returned to the SEE Removable Storage Self-Extracting Archive box to complete. If you have already saved a self-extracting file of the same name to this location and want to replace it with this one, tick the Overwrite existing files box. Tick the Password to allow you to enter a password in the Password and Confirm boxes Click Encrypt Step 2 Once you have saved the self extracting file to your hard disc, you use the CD/DVD writer utility to copy that archive to your CD following the instructions in section 8.1 of this guide.

20 9 Accessing Files on a Secure CD/DVD 9.1 Accessing on a RMG computer with SEE installed If you are accessing a CD/DVD on an authorised workstation in RMG, then the files will appear with the gold padlock icon (described in section 5) and can be accessed as described for files on a removable USB device also detailed in section 5 of this guide. 9.2 Accessing on a computer without SEE installed If you try to access encrypted CD/DVD files from an RMG computer without SEE installed or any external computer, you won t be able to, unless the files have been saved as self extracting files. If not, when you access the CD/DVD files in Windows Explorer, you will not icons and the file names will end in and look at the see the padlock XML. If you try to access one of the files by it, you get this message: double clicking

21 10 Accessing a Self-Extracting file on a CD/DVD Drive A self extracting archive that has been saved to CD/DVD can be accessed using the same steps detailed for accessing a self extracting archive on a removable USB device. The process is explained in section 7 of this guide.

22 Appendix - Additional Information

23 Appendix A. 1. Reviewing SEE account Settings Using the SEE User Client Console The User Client Console can be launched at any time from the Start Menu, to review and modify your SEE settings, if required. The User Client Console displays your user name in the top right corner of screen, as you are the user currently logged on to the workstation. The Left column contains a menu of the options available to you. They include an option to change/review Account Settings You can only make changes to the settings of your own account. If any check boxes are greyed-out, this means you do not have the necessary privileges to change this setting. The majority of settings in the console will be greyed-out. To review or modify your account settings, select the appropriate option under the Account Settings portion in the left column. For example, you can review the One Time Password settings by clicking the One Time Password option, under Account settings. Since RMG are using SEE for Removable Storage only, the option for One Time Password is not used, so selecting that option displays this message

24 A similar message is displayed if Authenti-Check is selected, as that feature is not used with Removable storage either. Selecting the Password option displays this message, because your registered SEE account uses the same password as your normal Windows User account. Use the Quick Help icon to display the Quick Help pane, then move your mouse over to the option on the left hand pane on which you want help. 2. Reviewing SEE Removable Storage Policies You can review the SEE policies in place on your computer. Removable Storage is enabled on your computer, so to review the policies in relation to Removable devices, click on the Removable Storage option on the left hand side to see a description of those policies on the right hand side. In the example shown below, you are allowed to read and write to removable devices. Any new files you write to the removable device will be encrypted automatically by SEE. 3. Setting or Changing your Default Password

25 When you want to securely transfer a file to a third party via a removable device(described on page 7 of this guide), you have to supply a password. You will need to share the password with the authorised third party, who can then use the password to decrypt the file and access the information. To simplify the process, you can specify a default password. The default password can be used for every file you are going to share, avoiding the need to type a password for every individual file. You can change that default password from the SEE User Client console. Step 1 Select the Default Password option in the console Step 2 Enter the new password in the Password and Confirm Password boxes Step 3 Click OK to save the new password. Note on Passwords:

26 The Default Password panel displays the password length that is required by RMG policy, the symbols that are allowed in your password, and any requirements for the number of symbols, uppercase letters, lowercase letters, and/or digits that your password must contain. The RMG password policy requires you to ensure the password is at least eight characters long and is a mix of upper and lower case letters, numbers and symbols.

27 Appendix B. Exchanging information securely our policies Our policies covering the secure exchange of electronic information are: 1. Information Classification Policy - How to exchange information securely Royal Mail Group information must be classified according to the sensitivity of the content of the data. We have four levels of classification: Level PUBLIC INTERNAL CONFIDENTIAL STRICTLY CONFIDENTIAL Description Information that has been created for external distribution, or released under the Royal Mail Publication Scheme, to meet the requirements of the Freedom of Information Act (2000). Information accessible to all employees, agents and contractors relating to the ongoing business of the Royal Mail Group. Information that has been assessed to be of a sensitive nature and likely to cause damage following unauthorised disclosure. Information meeting the classification standards of government departments, the security services or clients, or assessed to be so sensitive that unauthorised disclosure would cause acute organisational damage. All data that isn t rated Public as described above i.e. Internal, Confidential or Strictly Confidential, must be encrypted when copied from your PC or laptop to a form of removable media, such as CD, DVD, USB drive (memory stick, external hard drive, etc.) or any other removable media. For more information, please see: Information Classification Policy-v1.1.pdf 2. Encryption Policy Exchanging removable media with external third parties When exchanging files with a third party, you must ensure that the information is protected during the exchange. If using mobile media, you need to create a self-decrypting file (see page 7 of this guide). The password for decrypting the file should never be sent with the mobile media on which it is encrypted. Always send the decrypting password separately in an or over the telephone. For more information, please see Encryption Policy-v1.1.pdf 3. User Access Management Policy

28 When choosing a password for your third party encrypted file, ensure it s at least eight characters long and contains a mix of numbers, upper and lower case letters, and symbols. To access the file, the third party will need to enter the password you created. They will have five attempts to input the correct password before the file becomes locked. For more information, please see - User Access Management Policy-v1.1.pdf To see our policies and supporting guidelines in full, go to

Managing Contacts in Outlook

Managing Contacts in Outlook Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ---------------------- USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15

More information

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------ USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark

More information

How to use Office 365 with your OneDrive File Storage Facility

How to use Office 365 with your OneDrive File Storage Facility How to use Office 365 with your OneDrive File Storage Facility As a student at Pembrokeshire College you will have access to Microsoft s Office 365 and the OneDrive file storage facility. Microsoft Office

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

The Information Security Tool Kit Think secure

The Information Security Tool Kit Think secure The Information Security Tool Kit Think secure Password Protecting Your Printing - Aficio MP C5000 To ensure your print job is not lying around the printer and to keep your information secure, you can

More information

Backing Up and Deleting Files

Backing Up and Deleting Files CHAPTER 5 Backing Up and Deleting Files Video files can be copied from the hard disk to external storage media, such as CD-R, DVD, MO, or ZIP drives. Video files saved on the hard disk can be easily deleted

More information

Migrating From WVWC Mail to Google Apps

Migrating From WVWC Mail to Google Apps Migrating From WVWC Mail to Google Apps This document is intended for those users moving from WVWC s old mail server to the new Google Apps mail system. If you DO NOT have bobcats in your email address,

More information

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7 INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

User Guide. Digital Signature

User Guide. Digital Signature User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this

More information

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...

More information

Outlook Web Access (OWA) 2010 Email Cheat Sheet

Outlook Web Access (OWA) 2010 Email Cheat Sheet June 9, 2014 Outlook Web Access (OWA) 2010 Email Cheat Sheet Outlook Web Access 2010 allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet

More information

You can also get to OWA by typing https://mymail.saisd.net. You have now entered the new and improved Web Outlook.

You can also get to OWA by typing https://mymail.saisd.net. You have now entered the new and improved Web Outlook. Access E-Mail from Anywhere through the Internet Start your Internet Browser i.e. Internet Explorer Go to www.saisd.net Refer to Quick Links on the right side of the page Click on Web Outlook Were it shows

More information

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

Steps for using MagicConnect

Steps for using MagicConnect Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,

More information

Instructions for Creating an Outlook E-mail Distribution List from an Excel File

Instructions for Creating an Outlook E-mail Distribution List from an Excel File Instructions for Creating an Outlook E-mail Distribution List from an Excel File 1.0 Importing Excel Data to an Outlook Distribution List 1.1 Create an Outlook Personal Folders File (.pst) Notes: 1) If

More information

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box:

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box: Signatures An email signature is a block of information which is added to the bottom of an email to give the recipient information about the sender. It functions in a similar way to using headed paper

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

How to: Using archive files in Microsoft Outlook

How to: Using archive files in Microsoft Outlook How to: Using archive files in Microsoft Outlook Preface This 'How To' will guide you in archiving or making a backup of your Outlook folders. Keep in mind that these are two different actions: A backup

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

How to manage the Adaptive Call Recorder (v.9-50)

How to manage the Adaptive Call Recorder (v.9-50) How to manage the Adaptive Call Recorder (v.9-50) The Adaptive Hybrid Call Recorder records all telephone calls that are made and received. Recording calls provides an audit of what was said in every conversation.

More information

Online Backup by Mozy. Restore Common Questions

Online Backup by Mozy. Restore Common Questions Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

Video Manager Quick Reference

Video Manager Quick Reference Video Manager Quick Reference Video Manager Overview You can use Video Manager (also called the Viewer ) to record, view, replay, search for, and archive recorded video, audio, and GPS data. Starting the

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

WSDOT ProjectWise V8i Training 101

WSDOT ProjectWise V8i Training 101 WSDOT PROJECTWISE V8I TRAINING 101 ABOUT THIS TRAINING This training is intended to give a user the ability to open ProjectWise and access working files. Once you become comfortable working within the

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Email Archiving. Follow these steps to archive your email:

Email Archiving. Follow these steps to archive your email: Email Archiving Archiving is a process by which your email messages and attached files are moved from the database on our email server to a location on your computer. This document contains step-by-step

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER Last Edited: 2012-07-10 1 Introduce Windows Explorer... 3 Navigate folders and their contents... 5 Organize files and folders... 8 Move or copy files

More information

NHS Mail Basic Training Guide

NHS Mail Basic Training Guide Royal Derby Hospital 2011 Education, Training and Development I.T. Training Department NHS Mail Basic Training Guide Version 3.1 ND 05/11 No amendments should be made to the document without the Authors

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

Working with SQL Server Integration Services

Working with SQL Server Integration Services SQL Server Integration Services (SSIS) is a set of tools that let you transfer data to and from SQL Server 2005. In this lab, you ll work with the SQL Server Business Intelligence Development Studio to

More information

Creating and Sharing Contact Groups in Outlook Client

Creating and Sharing Contact Groups in Outlook Client Creating and Sharing Contact Groups in Outlook Client If you frequently address messages to groups of contacts you may find it helpful to create contact groups that can be addressed rather than having

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

https://mail.wheelock.edu

https://mail.wheelock.edu The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document

More information

Why the need for set of rules in Microsoft Outlook?

Why the need for set of rules in Microsoft Outlook? Why the need for set of rules in Microsoft Outlook? Rules are used in Microsoft Outlook to organize incoming Emails. Setting up rules in Outlook automates various actions that can be taken on incoming

More information

Installing the VPN Client for Microsoft Windows OS

Installing the VPN Client for Microsoft Windows OS Installing the VPN Client for Microsoft Windows OS 1. Go to the VPN Information Center web site and click on the Cisco VPN Client for Microsoft Windows OS link. 2. A File Download window will appear. Click

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

How To Configure CU*BASE Encryption

How To Configure CU*BASE Encryption How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE

More information

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS Last Edited: 2012-07-09 1 Access to Outlook contacts area... 4 Manage Outlook contacts view... 5 Change the view of Contacts area... 5 Business Cards view... 6

More information

Outlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA.

Outlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA. Welcome to the City of Sarasota s Outlook Web Access (OWA). As a member of the Board you are required to use your City-issued email address for correspondence that is related to the business of the Advisory

More information

Guide to Office 365 on OWA and Samsung Galaxy 4

Guide to Office 365  on OWA and Samsung Galaxy 4 This guide provides easy instructions for the most commonly used email features for Outlook Web App (OWA) and Samsung Galaxy 4. Click on any topic heading to jump to that section in the document. Topics

More information

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects Page 1 HOW TO BURN A CD/DVD IN WINDOWS XP There are two ways to burn files to a CD or DVD using Windows XP: 1. Using Sonic RecordNow! Plus or 2. Using the Windows Explorer CD Burning with Sonic Recordnow!

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Introduction to Files and Folders

Introduction to Files and Folders Introduction to Files and Folders In this course we will look at how to store and organise files (such as letters, pictures or music tracks) on your computer. Lesson 1. The Basics of File Storage All the

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Using Outlook WebAccess

Using Outlook WebAccess Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required

More information

HI-SPEED INTERNET USER GUIDE

HI-SPEED INTERNET USER GUIDE HI-SPEED INTERNET USER GUIDE Connecting to a Wireless Network (Wi-Fi) 2012-10 VERSION 1-800-360-8555 TABLE OF CONTENTS 4. Connecting to a Wireless Network (Wi-Fi)...3 Before you connect to a wireless network...3

More information

How to access your email via Outlook Web Access

How to access your email via Outlook Web Access How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+

More information

Infoview XIR3. User Guide. 1 of 20

Infoview XIR3. User Guide. 1 of 20 Infoview XIR3 User Guide 1 of 20 1. WHAT IS INFOVIEW?...3 2. LOGGING IN TO INFOVIEW...4 3. NAVIGATING THE INFOVIEW ENVIRONMENT...5 3.1. Home Page... 5 3.2. The Header Panel... 5 3.3. Workspace Panel...

More information

Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and

Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and Phone Manager FAQ s Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and has a cross on it. 5 Q. Some options

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

Netmail Search for Outlook 2010

Netmail Search for Outlook 2010 Netmail Search for Outlook 2010 Quick Reference Guide Netmail Search is an easy-to-use web-based electronic discovery tool that allows you to easily search, sort, retrieve, view, and manage your archived

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

Using Outlook Web Access Mail Basics

Using Outlook Web Access Mail Basics Using Outlook Web Access Mail Basics Starting Outlook First, start Internet Explorer. Enter the address http://mccmail.muskegoncc.edu/exchange. your MCC network username, and password. Enter If you have

More information

Outlook Web Access. PRECEDED by v\

Outlook Web Access. PRECEDED by v\ Outlook Web Access Logging in to OWA (Outlook Web Access) from Home 1. Login page http://mail.vernonct.org/exchange 2. To avoid these steps each time you login, you can add the login page to your favorites.

More information

Excel will open with the report displayed. You can format and/or save the report as desired.

Excel will open with the report displayed. You can format and/or save the report as desired. SI5 User and Administration Guide 553 Excel Reports Excel reports provide a powerful way to view data across projects. To run an Excel report, first select the projects you would like to use for your report

More information

Microsoft Exchange Hosted Archive (MEHA)

Microsoft Exchange Hosted Archive (MEHA) Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed

More information

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

UC Express Quick Start Guide

UC Express Quick Start Guide UC Express Quick Start Guide Programming IP Phone Keys Guide for Installation, Registration, Configuring & Programming Keys Carleton University 0 Unified Communicator Express Quick Start Guide The Unified

More information

NEW WEBMAIL QUESTIONS & INFO

NEW WEBMAIL QUESTIONS & INFO NEW WEBMAIL QUESTIONS & INFO QUESTIONS/ANSWERS Will I lose my mail? No Will I lose my contacts? No Will my calendars event be lost? No Will my user name and password stay the same? Yes Will I still be

More information

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2 Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first

More information

Sharing CD/DVDs using StarWind and Nero

Sharing CD/DVDs using StarWind and Nero Sharing CD/DVDs using StarWind and Nero StarWind iscsi Target for Microsoft Windows Rocket Division Software Copyright Rocket Division Software 2006. All rights reserved. Page 1 of 20 October 9, 2006 Table

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

SensiGuard User Manual

SensiGuard User Manual SensiGuard User Manual Version 3.5 Table of Contents About SensiGuard... 2 Installing SensiGuard... 2 Configuring SensiGuard... 2 Viewing Files and Folders... 4 Locking and Unlocking Files... 5 Lock and

More information

Outlook Web App (OWA) To create a new message:

Outlook Web App (OWA) To create a new message: What you ll see in Mail 1. Create a new message by clicking New mail. 2. Folder list. The folder list includes the folders in your mailbox. It may include other folders, such as Favorites and archive folders.

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Email User Manual. [Outlook Web App 2013]

Email User Manual. [Outlook Web App 2013] [Outlook Web App 2013] Central Information Systems Division March 2014 Table of Contents 1. To Login... 4 2. To Logout... 5 3. Change Password... 5 4. Email Messaging... 6 4.1 Create a New Mail... 6 4.2

More information

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu 25 UTILITIES PastPerfect provides a variety of utilities to help you manage your data. Two of the most important are accessed from the Main Menu Backup and Reindex. The other utilities are located within

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

Installing Pixela VideoBrowser and Network Utility

Installing Pixela VideoBrowser and Network Utility With VideoBrowser, you can edit and write video files after importing from the camcorder. Network Utility can transfer videos in the camcorder to the computer via Wi-Fi (wireless LAN) instead of connecting

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection

How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure

More information

Mail in Outlook Web App

Mail in Outlook Web App Page 1 of 7 Mail in Outlook Web App When you open Outlook Web App, the first thing you ll see is your Inbox. This is where messages sent to you arrive, and this is where you ll probably spend the most

More information

IT Quick Reference Guides Using Windows 7

IT Quick Reference Guides Using Windows 7 IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the

More information

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista There are many occasions, where you will want to copy (sometimes called burn ) photo files to a CD. You may be creating

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade About this guide /transformation Who should use it This guide is intended for those DBHDD (Department of

More information