Skip to main content

Cornell University

Content (1289)

Meeting invitations look a lot like any other email message. The difference is that they control what appears on your calendar; don’t ignore or delete them.  You’ll notice that a meeting invitation includes buttons for Accept Tentative Decline Propose a New Time Click the button that…
AUDIX deletes messages after 10 calendar days. If a longer storage time is required, contact the IT Service Desk: Voice, Video, Data for assistance. Reach your AUDIX Dial 44444 (from a campus phone) or 607-254-4444 (from off campus or your cell phone). Enter your 5-digit extension followed by…
Activity Menu for Voice Mail (AUDIX) Activity Menu Record Messages Get Messages Administer Greetings
The following companies offer On-Demand and Operator Assisted Conference Services to meet your conferencing needs.  Syntela*  1-866-503-1666 Verizon Business*
Conference Calling allows you to have a group audio conversation on your campus analog, digital, or VoIP phone.  Analog phones allow up to 3 parties per session and digital or VoIP phones allow up to 6 parties per session.
The ProblemJoe User sets up Exchange’s auto-reply feature on his account.Joe User receives a message from an e-list.Exchange dutifully sends the auto-reply to the reply-to address specified.This auto-reply doesn’t do anybody any good. In fact, it might trigger additional automated messages and,…
The following link takes you to a Microsoft help page: Create an email signature
Sharing of mail folders or mailboxes between regular users is not supported in the Cornell Microsoft 365 environment. You can use an Exchange Group Account (EGA) to share email for Cornell business purposes. EGAs allow multiple people to work with email in a shared mailbox and can be…
To send a message, click New Email in the Home ribbon. A new message window will open. You can either click the  To, Cc, or Bcc buttons to select names, or type email addresses in the desired field(s). After you’ve typed a few characters, Outlook will display a list of matches. Click a match…
The following link will take you to a Microsoft help page: Create a Search Folder But before you go, here’s some additional information you may find helpful.
We recommend that you use Outlook on the Web to create and manage your rules. Learn more about why we recommend Outlook on the web.Rules are a way to have incoming messages sorted, filed, marked, or otherwise handled automatically. You teach Outlook what to look for and what to do when it sees a…
The following link takes you to a Microsoft help page: Recover deleted items in Outlook for Windows
The following link will take you to a Microsoft help page:Create a Folder in OutlookBut before you go, here’s some additional information you may find helpful.
Delegation of email and folders is not supported for Cornell Microsoft 365 accounts, though delegation of calendaring activity is.If your manager has granted you delegate access, you have the ability to act “on behalf of” them. (It may not be your manager, but to keep things simple, we’ll pretend…
Voice Mail When My Extension Everywhere is enabled, voicemail can still be received. If you find that voicemails are being received on your alternate phone and you would like them to be received on your campus phone, please have your Telecommunications Coordinator contact the IT Service Desk…
Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the Recording Industry Association of America send these notices to the Internet Service Provider from…
SoftwareThe following utilities meet industry best practices for data sanitization on common read/write media including:
Data discovery and cleanup is much more than simply deploying a data discovery tool and reacting to its search results. Other necessary components include:
Implementing a data cleanup process is more involved than just choosing the proper scan tool. Use the information in this section to help you prepare for data cleanup.
The compromise of an administrative account represents two major risks unless specific steps are taken. The first risk, of course, is access to all data and resources on the compromised system. The second is disclosure of credentials to other accounts, including those for other systems, which can…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.