Skip to main content

Cornell University

Content (1150)

As you create a meeting invitation you are able to see whether others are free or busy, but you aren’t able to see any other information about their schedule (such as the meeting title, who is invited, or where it’s taking place).
Meeting invitations look a lot like any other email message. The difference is that they control what appears on your calendar; don’t ignore or delete them.  You’ll notice that a meeting invitation includes buttons for Accept Tentative Decline Propose a New Time Click the button that…
AUDIX deletes messages after 10 calendar days. If a longer storage time is required, contact the IT Service Desk: Voice, Video, Data for assistance. Reach your AUDIX Dial 44444 (from a campus phone) or 607-254-4444 (from off campus or your cell phone). Enter your 5-digit extension followed by…
Activity Menu for Voice Mail (AUDIX) Activity Menu Record Messages Get Messages Administer Greetings
The following companies offer On-Demand and Operator Assisted Conference Services to meet your conferencing needs.  Syntela*  1-866-503-1666 Verizon Business*
Conference Calling allows you to have a group audio conversation on your campus analog, digital, or VoIP phone.  Analog phones allow up to 3 parties per session and digital or VoIP phones allow up to 6 parties per session.
The following link takes you to a Microsoft help page: Create an email signature
Sharing of mail folders or mailboxes between regular users is not supported in the Cornell Microsoft 365 environment. You can use an Exchange Group Account (EGA) to share email for Cornell business purposes. EGAs allow multiple people to work with email in a shared mailbox and can be…
To send a message, click New Email in the Home ribbon. A new message window will open. You can either click the  To, Cc, or Bcc buttons to select names, or type email addresses in the desired field(s). After you’ve typed a few characters, Outlook will display a list of matches. Click a match…
The following link will take you to a Microsoft help page: Create a Search Folder But before you go, here’s some additional information you may find helpful.
We recommend that you use Outlook on the Web to create and manage your rules. Learn more about why we recommend Outlook on the web.Rules are a way to have incoming messages sorted, filed, marked, or otherwise handled automatically. You teach Outlook what to look for and what to do when it sees a…
The following link takes you to a Microsoft help page: Recover deleted items in Outlook for Windows
The following link will take you to a Microsoft help page:Create a Folder in OutlookBut before you go, here’s some additional information you may find helpful.
Delegation of email and folders is not supported for Cornell Microsoft 365 accounts, though delegation of calendaring activity is.If your manager has granted you delegate access, you have the ability to act “on behalf of” them. (It may not be your manager, but to keep things simple, we’ll pretend…
Voice Mail When My Extension Everywhere is enabled, voicemail can still be received. If you find that voicemails are being received on your alternate phone and you would like them to be received on your campus phone, please have your Telecommunications Coordinator contact the IT Service Desk…
You will be given a security code when your My Extension Everywhere service is set up. We recommend that you change the security code. Your security code must be 4 to 8 digits long. You may use only numbers and you cannot use the # (pound) or * (asterisk) character as part of your…
Use Any Phone to Enable/Disable My Extension Everywhere You can turn on (enable) or turn off (disable) My Extension Everywhere from any phone, anywhere. You'll need to know your My Extension Everywhere security code. If you've forgotten it, you can ask the IT Service Desk to reset your security…
Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the Recording Industry Association of America send these notices to the Internet Service Provider from…
SoftwareThe following utilities meet industry best practices for data sanitization on common read/write media including:
Spoofing is when the "from" address is forged by the sender so the message appears to come from someone else. Practice extra caution:

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.