SlideShare uma empresa Scribd logo
1 de 38
USING
EXCHANGE
ONLINE
New user tutorial
Spring
2014
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
ANNOUNCEMENT
Beginning XXXX, 2014
All employees will have access to company email.
The purpose of this training is to provide you with instruction for accessing
email on a kiosk, smartphone or tablet according to company policy.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
While some communication will continue being made
available on the company bulletin board, internal emails
allow us to alert you to new posts.
Why use email?
In addition to this, email will be used for daily
communications to send and receive information about:
• Projects
• Reports
• Communications about your timesheet and vacation
requests
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Recently our company adopted Microsoft Exchange
Online because of it’s security & reliability protecting
company information.
Adopting Exchange Online
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Goals of this training
Given valid login credentials and internet access, you
should be able to:
• Access the email service on your own
• Read and reply to email communications
• Forward email in accordance with acceptable use
policy
• Discern the difference between personal and
business use
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Who can use this training?
To benefit from this training, the user should already
be familiar with the device they will be using to access
their account. Both new and experienced email users
will receive the information needed to perform the
task.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
A screen like this will be displayed:
Type your username and password
in the appropriate boxes. Then click
the sign in box.
Technical - Email kiosks
Email kiosks are generally located in high traffic areas and will allow
you access to the company’s internal website and internet.
You will access your email account using Outlook Web App
through your browser. In the browser Url type:
login.microsoftonline.com. Then, press enter.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
The Office 365 start page
will be displayed. A
screen similar to the one
right will appear. Select
Outlook from the top
menu bar.
Technical
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical
The Outlook Web App screen displays. On the left panel you will see your
username (blanked out in this this shot). The Inbox, Drafts and Sent
Items folders are located under your username. The contents of your
inbox is presented in the middle pane when the program opens. Use the
scroll bar to find messages by date. The search bar (magnifying glass
icon) allows the user to search mail and people.
*Deleted messages are kept in the
Delete folder until the folder is
emptied.
Ask your supervisor about
retention policies.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Click New Mail.
Technical – Create message
A box like this
will display.
On the line labeled To:, enter the email address of the person to receive this
email, for example, johnsmith@xyc.com. If copies of this email should be
sent to other individuals in the company, add their address in the CC: section.
Always include a Subject line.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical
Type your message in the space
provided. Click inside the box to access
the cursor.
*Check your spelling and grammar
before sending.
To send, select the icon above
your message.
Wait a few seconds after
sending, then, verify your message has
been sent by clicking Sent Items on the
left panel.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical - iPhone, iPad and IPod access
Microsoft provides the following instructions assuming Exchange is the first
email client on the device.
• Tap Mail or tap Setting > Mail, Contacts, Calendars > Add Account.
• Tap Microsoft Exchange
• Leave the domain box as is.
Type your full Username and Password in the boxes, for
example, johnsmith@xyc.com or johnsmith@xyc.onmicrosoft.com.
• Tap Next. Your mail program will try to find the settings needed to set up
the account.
If the device can’t identify the correct settings, see your manager for
instructions on manually setting up your account.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical – Android phone or tablet
• From the applications menu, select Email (note: the application may be
named Mail).
• Type your full email address and password, for
example, johnsmith@yxccom or johnsmith@xyc.onmicrosoft.com then
select Next.
• Select Exchange account..
• Enter your DomainUsername in the box. Then select, Next.
Note: Leave the domain box empty if your device uses two separate boxes
• Enter your password.
• Under Exchange Server, use outlook.office365.com
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical – Viewing email
A list of your emails by date is
presented in the center pane once
the program is opened.
Double-click (click twice quickly) on
the email you want to read.
If you wish to delete the
message, select Delete. Messages
are kept until you empty the
Deleted Item bucket.
Ask your supervisor about
retention policies.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical – Replying to email
To reply to the message, click on
the Reply button located in the top
left corner. The screen below will
be displayed.
The space above the contents of
the original message can be
used to enter your response to
the message.
Once your response has been
typed, check the spelling, then
click Send.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Technical - Forwarding
To forward your message when its
already open, select Forward on
the top bar of the sent message.
You’ll then see a screen similar to
the one you created.
In most cases you will not forward messages to other employees.
NEVER forward confidential company email to anyone outside of the
company.
Forwarding confidential information may cost the company money and
cause you to lose your job.
Consult with your manager if you have questions regarding forwarding.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Our company recognizes
the need for occasional
personal use of email.
Generally, email should only
be used for company
business. Under no
circumstances should your
account be used for:
POLICY - Personal and Business Use
• Harassing or intimidating others
• Sending spam
• Spoofing – constructing a message so that it appears to be from
someone else
• Snooping
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
You are responsible for the security of your
email account.
Keep passwords private and do not share
information with anyone including other
employees, managers, family members or
friends.
Deliberately providing access to others is a
violation of this policy.
POLICY - Sharing account information
& privacy
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
“Email harassment is a form of
stalking, and often includes
consistent, unwanted electronic
communications sent to a recipient
with the intention of
intimidating, frightening, or
harassing someone.”
Wisegeek.org
Our company has a zero tolerance
of email harassment.
POLICY - Harassment
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
You will access your account using
Outlook Web App through your browser.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
When accessing email through your browser
type: login.outlook.com
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Correct answer: login.microsoftonline.com.
Your supervisor replied to your vacation request, but
you cannot find the email in your inbox. Where will
you look for it?
WHAT YOU WILL DO?
Check your Deleted Items folder. If the folder
hasn’t been emptied since the message was
deleted, it should be in there. If you still cannot
find it, ask your supervisor to resend it.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
A list of your emails by date is presented in the
center pane once the program is opened.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
When replying to a message, a blank space above the
original message is provided for your reply to be
added.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
You will forward emails from your supervisor to other
employees regularly.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Correct answer: Rarely will you forward emails.
Which type of message can be forwarded to people
outside of the organization?
CHECK YOUR LEARNING
• Confidential business
• Non-confidential business
• Personal
Avoid forwarding any messages unnecessarily.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Another employee who currently is on vacation asks
you to forward him/her a copy of the most recent
communication from your supervisor about the
company picnic. Will you forward it?
WHAT YOU WILL DO?
Forwarding this message would not be a violation of
company policy.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Sending SPAM from your account to people outside
of th the company is NOT a violation of policy.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Correct answer: Sending spam violates the acceptable use policy.
Which activity would NOT be a violation of company
policy?
CHECK YOUR LEARNING
• Spoofing – sending messages that appear to be from someone else
• Spamming
• Harassing and intimidating others
• Sending a message to your communications service provider about an
outage at home.
Sending a message to your communications service provider about an
outage at home.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Your friend just broke up with his girlfriend and
wants to send a message to her through your email
account.
WHAT YOU WILL DO?
What will you do?
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Who is responsible for the security of your email
account?
CHECK YOUR LEARNING
You are !!!
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
If your supervisor asks for the password to your
account, you should give it to them.
CHECK YOUR LEARNINGCHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Correct answer: Do not give your password to anyone.
Which action is in line with company policy?
CHECK YOUR LEARNING
• Giving your spouse access to your account
• Asking an employee to login to your account
while you are away
• Keeping your login credentials confidential
Keeping your login credentials confidential!!!
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
A coworker asks you to check his/her email while
they are on vacation.
WHAT YOU WILL DO?
Will you do it?
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Our company has a zero tolerance of email harassment.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
Sending an old love interest a message regarding
their new partner is inappropriate.
CHECK YOUR LEARNING
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
YOU HAVE
COMPLETED
THE COURSE
YOU ARE NOW A
QUALIFIED
EXCHANGE
ONLINE USER
Congratulations!!
Prepared by Anita Y. Mathis, Business & IT Continuity Planner
RECEIVE CREDIT FOR THIS COURSE
Click the box below .
Type your Name and ID No.
Then SEND the email.
Prepared by Anita Y. Mathis, Business & IT Continuity Planner

Mais conteúdo relacionado

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Free Acceptable Use Training - Exchange Online Email

  • 1. USING EXCHANGE ONLINE New user tutorial Spring 2014 Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 2. ANNOUNCEMENT Beginning XXXX, 2014 All employees will have access to company email. The purpose of this training is to provide you with instruction for accessing email on a kiosk, smartphone or tablet according to company policy. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 3. While some communication will continue being made available on the company bulletin board, internal emails allow us to alert you to new posts. Why use email? In addition to this, email will be used for daily communications to send and receive information about: • Projects • Reports • Communications about your timesheet and vacation requests Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 4. Recently our company adopted Microsoft Exchange Online because of it’s security & reliability protecting company information. Adopting Exchange Online Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 5. Goals of this training Given valid login credentials and internet access, you should be able to: • Access the email service on your own • Read and reply to email communications • Forward email in accordance with acceptable use policy • Discern the difference between personal and business use Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 6. Who can use this training? To benefit from this training, the user should already be familiar with the device they will be using to access their account. Both new and experienced email users will receive the information needed to perform the task. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 7. A screen like this will be displayed: Type your username and password in the appropriate boxes. Then click the sign in box. Technical - Email kiosks Email kiosks are generally located in high traffic areas and will allow you access to the company’s internal website and internet. You will access your email account using Outlook Web App through your browser. In the browser Url type: login.microsoftonline.com. Then, press enter. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 8. The Office 365 start page will be displayed. A screen similar to the one right will appear. Select Outlook from the top menu bar. Technical Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 9. Technical The Outlook Web App screen displays. On the left panel you will see your username (blanked out in this this shot). The Inbox, Drafts and Sent Items folders are located under your username. The contents of your inbox is presented in the middle pane when the program opens. Use the scroll bar to find messages by date. The search bar (magnifying glass icon) allows the user to search mail and people. *Deleted messages are kept in the Delete folder until the folder is emptied. Ask your supervisor about retention policies. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 10. Click New Mail. Technical – Create message A box like this will display. On the line labeled To:, enter the email address of the person to receive this email, for example, johnsmith@xyc.com. If copies of this email should be sent to other individuals in the company, add their address in the CC: section. Always include a Subject line. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 11. Technical Type your message in the space provided. Click inside the box to access the cursor. *Check your spelling and grammar before sending. To send, select the icon above your message. Wait a few seconds after sending, then, verify your message has been sent by clicking Sent Items on the left panel. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 12. Technical - iPhone, iPad and IPod access Microsoft provides the following instructions assuming Exchange is the first email client on the device. • Tap Mail or tap Setting > Mail, Contacts, Calendars > Add Account. • Tap Microsoft Exchange • Leave the domain box as is. Type your full Username and Password in the boxes, for example, johnsmith@xyc.com or johnsmith@xyc.onmicrosoft.com. • Tap Next. Your mail program will try to find the settings needed to set up the account. If the device can’t identify the correct settings, see your manager for instructions on manually setting up your account. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 13. Technical – Android phone or tablet • From the applications menu, select Email (note: the application may be named Mail). • Type your full email address and password, for example, johnsmith@yxccom or johnsmith@xyc.onmicrosoft.com then select Next. • Select Exchange account.. • Enter your DomainUsername in the box. Then select, Next. Note: Leave the domain box empty if your device uses two separate boxes • Enter your password. • Under Exchange Server, use outlook.office365.com Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 14. Technical – Viewing email A list of your emails by date is presented in the center pane once the program is opened. Double-click (click twice quickly) on the email you want to read. If you wish to delete the message, select Delete. Messages are kept until you empty the Deleted Item bucket. Ask your supervisor about retention policies. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 15. Technical – Replying to email To reply to the message, click on the Reply button located in the top left corner. The screen below will be displayed. The space above the contents of the original message can be used to enter your response to the message. Once your response has been typed, check the spelling, then click Send. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 16. Technical - Forwarding To forward your message when its already open, select Forward on the top bar of the sent message. You’ll then see a screen similar to the one you created. In most cases you will not forward messages to other employees. NEVER forward confidential company email to anyone outside of the company. Forwarding confidential information may cost the company money and cause you to lose your job. Consult with your manager if you have questions regarding forwarding. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 17. Our company recognizes the need for occasional personal use of email. Generally, email should only be used for company business. Under no circumstances should your account be used for: POLICY - Personal and Business Use • Harassing or intimidating others • Sending spam • Spoofing – constructing a message so that it appears to be from someone else • Snooping Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 18. You are responsible for the security of your email account. Keep passwords private and do not share information with anyone including other employees, managers, family members or friends. Deliberately providing access to others is a violation of this policy. POLICY - Sharing account information & privacy Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 19. “Email harassment is a form of stalking, and often includes consistent, unwanted electronic communications sent to a recipient with the intention of intimidating, frightening, or harassing someone.” Wisegeek.org Our company has a zero tolerance of email harassment. POLICY - Harassment Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 20. You will access your account using Outlook Web App through your browser. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 21. When accessing email through your browser type: login.outlook.com CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner Correct answer: login.microsoftonline.com.
  • 22. Your supervisor replied to your vacation request, but you cannot find the email in your inbox. Where will you look for it? WHAT YOU WILL DO? Check your Deleted Items folder. If the folder hasn’t been emptied since the message was deleted, it should be in there. If you still cannot find it, ask your supervisor to resend it. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 23. A list of your emails by date is presented in the center pane once the program is opened. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 24. When replying to a message, a blank space above the original message is provided for your reply to be added. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 25. You will forward emails from your supervisor to other employees regularly. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner Correct answer: Rarely will you forward emails.
  • 26. Which type of message can be forwarded to people outside of the organization? CHECK YOUR LEARNING • Confidential business • Non-confidential business • Personal Avoid forwarding any messages unnecessarily. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 27. Another employee who currently is on vacation asks you to forward him/her a copy of the most recent communication from your supervisor about the company picnic. Will you forward it? WHAT YOU WILL DO? Forwarding this message would not be a violation of company policy. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 28. Sending SPAM from your account to people outside of th the company is NOT a violation of policy. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner Correct answer: Sending spam violates the acceptable use policy.
  • 29. Which activity would NOT be a violation of company policy? CHECK YOUR LEARNING • Spoofing – sending messages that appear to be from someone else • Spamming • Harassing and intimidating others • Sending a message to your communications service provider about an outage at home. Sending a message to your communications service provider about an outage at home. Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 30. Your friend just broke up with his girlfriend and wants to send a message to her through your email account. WHAT YOU WILL DO? What will you do? Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 31. Who is responsible for the security of your email account? CHECK YOUR LEARNING You are !!! Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 32. If your supervisor asks for the password to your account, you should give it to them. CHECK YOUR LEARNINGCHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner Correct answer: Do not give your password to anyone.
  • 33. Which action is in line with company policy? CHECK YOUR LEARNING • Giving your spouse access to your account • Asking an employee to login to your account while you are away • Keeping your login credentials confidential Keeping your login credentials confidential!!! Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 34. A coworker asks you to check his/her email while they are on vacation. WHAT YOU WILL DO? Will you do it? Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 35. Our company has a zero tolerance of email harassment. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 36. Sending an old love interest a message regarding their new partner is inappropriate. CHECK YOUR LEARNING Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 37. YOU HAVE COMPLETED THE COURSE YOU ARE NOW A QUALIFIED EXCHANGE ONLINE USER Congratulations!! Prepared by Anita Y. Mathis, Business & IT Continuity Planner
  • 38. RECEIVE CREDIT FOR THIS COURSE Click the box below . Type your Name and ID No. Then SEND the email. Prepared by Anita Y. Mathis, Business & IT Continuity Planner