Content (611)
Sharing of mail folders or mailboxes between regular users is not supported in the Cornell Microsoft 365 environment. You can use an Exchange Group Account (EGA) to share email for Cornell business purposes. EGAs allow multiple people to work with email in a shared mailbox and can be…
To send a message, click New Email in the Home ribbon.
A new message window will open.
You can either click the To, Cc, or Bcc buttons to select names, or type email addresses in the desired field(s). After you’ve typed a few characters, Outlook will display a list of matches. Click a match…
The following link will take you to a Microsoft help page:
Create a Search Folder
But before you go, here’s some additional information you may find helpful.
We recommend that you use Outlook on the Web to create and manage your rules. Learn more about why we recommend Outlook on the web.Rules are a way to have incoming messages sorted, filed, marked, or otherwise handled automatically. You teach Outlook what to look for and what to do when it sees a…
The following link takes you to a Microsoft help page:
Recover deleted items in Outlook for Windows
The following link will take you to a Microsoft help page:Create a Folder in OutlookBut before you go, here’s some additional information you may find helpful.
Delegation of email and folders is not supported for Cornell Microsoft 365 accounts, though delegation of calendaring activity is.If your manager has granted you delegate access, you have the ability to act “on behalf of” them. (It may not be your manager, but to keep things simple, we’ll pretend…
Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the Recording Industry Association of America send these notices to the Internet Service Provider from…
SoftwareThe following utilities meet industry best practices for data sanitization on common read/write media including:
Spoofing is when the "from" address is forged by the sender so the message appears to come from someone else. Practice extra caution:
From Merriam-Webster online:
unsolicited, usually commercial email sent to a large number of addresses
etymology: from a skit on “Monty Python’s Flying Circus” (link goes to YouTube) in which chanting of the word “Spam” (referring to the Hormel meat product) overrides the other dialogue…
You can edit Microsoft Office documents stored in Box either online using the Word, Excel, and PowerPoint Online apps, or on your computer desktop using the full version of Word, Excel, or PowerPoint. Groups can simultaneously edit and collaborate on Microsoft Office files…
We recommend that you use an EGA address as the sender when sending Cornell bulkmail.
One-Time Mailing
Situation: You have a message to be sent to a large number of people. You have the list of email addresses. You are NOT sending to a pre-defined group, such as all students or all faculty.
University Policy 5.2 applies if you want to send a message to ALL members of one or more of the following groups:
Alumni
Students
Academics
Staff
Allow at least two business days to complete this process.
You can connect to an SMB (sometimes called CIFS) Share using any of the following methods:
Using a UNC Path: Windows or Mac OS X
Net Use: Windows (recommended for non-Cornell AD joined computers)
Note for Linux: SFS does not offer support for Linux accessing CIFS, however,…
Confirm the SourceVerify that the message is coming from the person's real email address. In email readers and devices that do not display the actual address, hover over the Sender’s name to reveal what follows the @ symbol. Scammers frequently attach a real person's name to a fraudulent email…
You can learn information about web addresses (URLs) by looking at some of their components.
Finding the Important Parts of a Complex Address
In a complicated address, like http://cornell.astromundo.com/Lcons/small/emailchange/, the real domain is always positioned before the first slash.
It is easy to fake what appears in the From or Reply-to line of an email message. Check the message headers to discover the message's real origin. Message headers are the material that comes before the body of a message.Quick CheckSometimes information in the headers contradicts the From line. For…
Web browsers are often used for day-to-day work and study. As web browsers have grown increasingly complex, featureful, and essential to many tasks, they have become one of the most common avenues for bad actors to compromise your security.
Follow these guidelines to enhance your web browser…