How can I tell if an email is a hoax (security)? (link) |
You can search at http://www.snopes.com/ Snope.com or http://www.hoax-slayer.com/ Hoax-Slayer.com.
W&L will never ask you to click a link in an email to verify/update/confirm/etc your account.
If you are still unsure, please contact the help desk at 458-HELP (4357). |
Score: 100.0 - Updated: 7/15/2013 3:53:36 PM - Was this helpful? |
How can I tell if an email is a phishing scam (security)? (link) |
Look at examples of e-mail received by W&L community members, and see if you can tell the difference between legitimate e-mail and "phishing" attempts in this interactive quiz: http://www.wlu.edu/x31191.xml
Phishing is the fraudulent use of e-mail to extract confidential information. Often such messages appear to come from legitimate sources such as your bank, or W&L, and ask for information such as account information and passwords. Information Technology Services will never ask you to divulge your W&L password.
Beware of any e-mail purporting to be from Information Technology Services asking for your W&L password. Any such e-mail is “phishing”: an attempt to steal personal information. ITS staff will never ask you for your password, via email, phone, or any other means. Remember, your password is your secret.
Never respond to e-mails asking for your W&L password or other personal information, such as bank account or social security numbers. Instead, please follow the procedures to report it to our spam filtering vendor, and then delete the email.
Please protect yourself:
* If you disclosed your W&L password in response to a phishing email, change your password immediately at http://password.wlu.edu
* Never disclose your password to anyone.
* Your W&L password should not be used for any service outside the University. |
Score: 85.0 - Updated: 7/15/2013 3:55:46 PM - Was this helpful? |
What is a firewall (security)? (link) |
A firewall is an appliance or software package that can be configured to help protect computer resources from external threats. Most computer operating systems have one (Windows and Mac) as well as other products like McAfee and Symantec. |
Score: 85.0 - Updated: 6/4/2012 2:13:48 PM - Was this helpful? |
What is phishing (security)? (link) |
Phishing is an attempt to steal personal information via email. Never respond to emails asking you to confirm your username and password, credit card number, bank account number, etc. See the ITS web page http://www.wlu.edu/x49702.xml#phish for more information. Report all phishing emails to Digitar by forwarding them to report_spam@spam.digitar.com Students use a separate spam filtering too within their Outlook Live accounts; see details. |
Score: 85.0 - Updated: 6/4/2012 1:17:11 PM - Was this helpful? |
What is a virus (security)? (link) |
A computer virus is a software program that can reproduce itself, and often causes damage to other programs or files. |
Score: 85.0 - Updated: 6/4/2012 2:14:15 PM - Was this helpful? |
Is email secure? (link) |
It all depends on what you’re trying to protect against. So, the simplest answer is 'no'! Email is not secure, unless you have taken extra steps to encrypt the message or the attachments (or both). Therefore, do not put confidential information (i.e., SSN, credit card number, etc.) in any email, unless you know it is encrypted. Briefly, access to your email account is secured by your username and password, so make sure you have a strong password. Email can be secured from network “snooping” by accessing it from a web page using Secure Socket Layers (SSL) – indicated by the “S” in HTTPS. If you access your email from your phone, then security depends on that device. These are just some of the variables/examples, and for more information please contact the Information Security Officer. |
Score: 85.0 - Updated: 7/15/2013 3:50:44 PM - Was this helpful? |
What is a trojan (security)? (link) |
A trojan or trojan horse is non-self-replicating software/malware that appears to be or do one thing, but actually does something different - usually allowing unauthorized use or access to your computer. |
Score: 85.0 - Updated: 6/4/2012 1:19:26 PM - Was this helpful? |
What is malware (security)? (link) |
Malware is short for malicious software - software designed to infiltrate or damage your computer. Malware often arrives as a trojan and may also be spyware. |
Score: 85.0 - Updated: 6/4/2012 1:21:26 PM - Was this helpful? |
What is spyware (security)? (link) |
Spyware (a form of malware) is generally software used to gather your personal information without your knowledge. |
Score: 85.0 - Updated: 6/4/2012 1:26:54 PM - Was this helpful? |
What is encryption (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key. Encryption provides security and privacy, and can be in many forms and uses.
There is encryption software and hardware to encrypt data at rest (e.g., file/folder encryption) and data in motion (e.g., web traffic using SSL) or in any combination. It is very easy and cheap to encrypt files or a whole folder full of files, and both Windows and Mac OS X operating systems include encryption software.
Here are some good resources on encryption: http://www.wisegeek.com/what-is-encryption.htm and http://en.wikipedia.org/wiki/Encryption If you have any questions, please enter a Help Request. |
Score: 85.0 - Updated: 6/7/2012 3:07:32 PM - Was this helpful? |
How can I tell if my computer has a virus (security)? (link) |
There are many possible indications of a computer virus. Here is a helpful link from Microsoft to help determine if your computer has a virus. |
Score: 80.0 - Updated: 6/4/2012 2:14:40 PM - Was this helpful? |
What is confidential data (security)? (link) |
The University Confidentiality Policy covers "any personally-identifiable student and parent records, financial records (including social security and credit card numbers), and health records; contracts; research data; alumni and donor records; personnel records other than an individual's own personnel records; University financial data; computer passwords, University proprietary information/data; and any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy or operations." If you have any questions, contact the ISP Coordinator or the Information Security Officer. |
Score: 80.0 - Updated: 6/4/2012 1:24:45 PM - Was this helpful? |
Where can I find information about IT security? (link) |
More information is available at the ITS Information Security SharePoint site; the University Information Security Program (ISP) site; as well as the ITS site. |
Score: 80.0 - Updated: 8/8/2013 1:53:38 PM - Was this helpful? |
How do I encrypt a file (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key.
Please read the instructions carefully, and make sure you have a backup and recovery plan!
Here are some Windows encryption resources:
http://support.microsoft.com/kb/307877
http://support.microsoft.com/kb/223316
Here are some Mac OS X encryption resources:
http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh1906.html
http://www.macosxtips.co.uk/index_files/encrypt-and-hide-your-private-files.html
There are also many other software and hardware choices for encyption.
If you have any questions, please enter a Help Request.
|
Score: 80.0 - Updated: 6/7/2012 3:07:24 PM - Was this helpful? |
What are my options to use email from off-campus? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 80.0 - Updated: 8/17/2015 10:47:12 AM - Was this helpful? |
Why can't I send email messages? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 77.5 - Updated: 7/15/2013 3:49:10 PM - Was this helpful? |
How can I avoid identity theft (security)? (link) |
This resource from the Federal Trade commission explains identity theft, and what to do if your identity is stolen. |
Score: 77.5 - Updated: 6/4/2012 1:26:20 PM - Was this helpful? |
What is the Information Security Program (ISP) at W&L? (link) |
The ISP and the ISP Committee were organized at the direction of the Provost in 2003 to comply with the Gramm-Leach-Bliley Act (GLBA) and to implement the “Safeguards Rule” issued by the Federal Trade Commission. The ISP Committee is chaired by the ISP Coordinator and the Committee has responsibility, in advising the Provost, for the ISP. The original program scope was intentionally broader than necessary for simple legal compliance, and requires all departments to have written procedures documenting the safeguards used to protect the University’s information assets. |
Score: 76.0 - Updated: 6/4/2012 1:24:10 PM - Was this helpful? |
What is the maximum number of recipients I can send an email message to at one time? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 74.3 - Updated: 4/29/2014 10:45:06 AM - Was this helpful? |
How do I forward an e-mail as an attachment using the full Outlook client? (link) |
-
In Outlook, open up the message (sent or received).
-
In the Message tab at the top of the open E-mail, click on More and select Forward as Attachment.
-
Enter the person’s E-mail address to forward the E-mail as an attachment and send.
|
Score: 70.0 - Updated: 7/12/2013 11:13:58 AM - Was this helpful? |
What is a Bcc or Blind Carbon Copy used in e-mails? (link) |
Bcc is an abbreviation for blind carbon copy. If you add a recipient's name to the Bcc box in an e-mail message, a copy of the message is sent to the recipient, but the recipient's name is not visible to the other recipients of the message. |
Score: 70.0 - Updated: 10/1/2010 3:35:16 PM - Was this helpful? |
How do I add Bcc or blind carpon copy to my e-mails? (link) |
In a new message, on the Message Options tab, in the Fields group, click Show Bcc. |
Score: 70.0 - Updated: 10/1/2010 3:35:44 PM - Was this helpful? |
What steps should ITS staff take when there is a known phish or spam attack? (link) |
( Restricted to authenticated ITS users. ) |
Score: 70.0 - Updated: 10/2/2013 1:45:24 PM - Was this helpful? |
How long do I have access to e-mail after leaving the University? (Faculty/Staff) (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 70.0 - Updated: 7/12/2013 2:35:42 PM - Was this helpful? |
I want a W&L email address for my club or organization. How do I go about getting one(students)? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff, Students |
Score: 40.0 - Updated: 10/2/2013 2:10:07 PM - Was this helpful? |
How do I access my faculty or staff W&L email, calendar and contacts from my iPhone, iPod Touch or iPad? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 37.7 - Updated: 2/15/2013 1:40:21 PM - Was this helpful? |
Can I get an exported list of all contacts at W&L that I can import into my personal address book in another mail client (Thunderbird, Gmail, etc.)? (link) |
We do not provide copies of the address list for two primary reasons. 1 - it becomes a nightmare to troubleshoot issues as more and more out-of-date address lists are in use, 2 - if a machine holding these addresses gets infected with a virus that uses or collects addresses then our whole address list would be compromised. |
Score: 37.1 - Updated: 6/14/2012 10:12:31 AM - Was this helpful? |
What is the URL for accessing my e-mail(Faculty/Staff)? (link) |

|
Score: 35.0 - Updated: 10/2/2013 11:37:29 AM - Was this helpful? |
How do I e-mail the students in my class? (link) |
- You can use the Course Distribution Lists that are available in the Global Address List (GAL) in Outlook or Entourage. The courses are listed alphabetically by discipline. The format is Chem 106_01 Spring 2009-10.
- In Sakai, you can use the Announcements tool to send e-mails. Choose High Priority to send e-mail to all participants of the site.
- In Sakai, use the EMail Archive tool. You will have to add the EMail Archive tool in the Site Info > Edit Tools screen.
- In Sakai, use the Mailtool too. You will have to add the Mailtool tool in the Site Info > Edit Tools screen. Note: The Mailtool has been deprecated by the Sakai Foundation. The tool is no longer supported and may not be included in future releases.
|
Score: 35.0 - Updated: 3/24/2010 2:32:35 PM - Was this helpful? |
How do I create a signature for my e-mail using the Outlook 2010 client? (link) |
-
In Outlook, click on File > Options > Mail.
-
Click on Signatures.
-
Click the New button.
-
Type a name for your signature and click on OK.
-
In Choose Default Signature:
-
Select e-mail signature.
-
Select if you want your signature added to New messages.
-
Select if you want your signature added to Replies/Forwards.
-
In Edit Signature, you have serveral options: Type your signature, insert a picture, insert your business card, or add an hyperlink.
-
Click on OK to return to your Mail.
Applies To: Faculty, Staff |
Score: 35.0 - Updated: 7/12/2013 2:36:10 PM - Was this helpful? |
How do I recover deleted messages in Outlook? (link) |
To recover purged messages from the Deleted Items folder:
- Select the Deleted Items folder.
- Click on the Folder tab.
- Click Recover Deleted Items.
- Select messages to recover.
- Click on mail icon to recover selected message(s).
- Message is restored to Deleted Items folder.
Applies To: Faculty, Staff |
Score: 35.0 - Updated: 7/12/2013 2:10:59 PM - Was this helpful? |
How do I forward my email to a new address? (link) |
-
Log into http:owa.wlu.edu using Internet Explorer you have to use IE on a windows computer to get the full version, not the light version.
-
Go to "Options" in the upper right hand corner of the window.
-
Choose "Rules" on the menu on the left.
-
Choose "New Rule"
-
Create a rule with the conditions that
-
Choose "When my name is" --- check "in the TO or CC Box.
-
Under "Do the following" Choose "Forward Message to people or distribution list"
-
Then click on the little message in the center of the page that says
-
"Apply this rule after the message arrives with ny name in the To or Cc box forward it to People or distribution list"
-
Click on the people or distribution list link and put the forwarding address in the "To:" section of the message recipients window and click OK.
Applies To: Faculty |
Score: 33.3 - Updated: 8/23/2011 8:27:36 AM - Was this helpful? |
How do I access my faculty/staff account using a POP client? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 23.3 - Updated: 10/1/2010 2:31:18 PM - Was this helpful? |
How to I recall an email? (link) |
1. Open the message in your sent folder that you wish to recall.
2. Click on other actions.
3. Click Recall this message.
Please note that the person to whom the message was sent will get the option to not allow the message to be recalled. |
Score: 15.0 - Updated: 7/15/2013 3:47:59 PM - Was this helpful? |
How do I a student access my email? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Students |
Score: 10.0 - Updated: 8/17/2015 11:44:06 AM - Was this helpful? |
How do I email all the members in a Contacts folder? (link) |
Applies to Microsoft Outlook 2007 and 2010
1. Open up a new email message
2. Click on the To... button
3. Click on the down arrow in the box underneath "Address Book"
4. Choose the folder with the contacts you'd like to email (if your personal contact folder is not listed see "How do I make my contacts folder an Address Book?")
5. Select the first name in the list, hold down the shift key, select the last name on the list, click on the To: button again.
6. All of the names should now be in the To: field of the email message. Click OK.
7. Compose and send your message.
Applies To: Faculty, Staff |
Score: 7.5 - Updated: 7/15/2013 3:47:18 PM - Was this helpful? |
I'm an alum and have a NDR error with my email what should I do? (link) |
( Restricted to authenticated ITS users. ) |
Score: 7.5 - Updated: 10/20/2014 1:29:51 PM - Was this helpful? |
In Outlook, how do I increase the font size of a new email message? (link) |
1. In Outlook, on the File menu, click Options.
2. On the Mail tab, click Stationery and Fonts (4th option from the top).
3. On the Personal Stationery tab, under New mail messages, click Font.
4. On the Font tab, under Font, click the font you want to use for all new messages.
5. If you want, select a font style and size.
6. Click OK on the Fonts, the Signatures and Stationery, and the Options dialog boxes.
7. When you create a new message, the new settings should take effect. Applies To: Faculty, Staff |
Score: 6.0 - Updated: 7/15/2013 4:18:41 PM - Was this helpful? |
Will my email address change with Office365 (students)? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Students |
Score: 6.0 - Updated: 4/30/2014 11:36:05 AM - Was this helpful? |
Is there a way to view the department in address books? (link) |
When searching the Global Address List (GAL), click on the Advanced Find link. This allows you to enter search criteria in one or more fields including Department and Title.
Note that the search has to match starting with the first word. Searching on "Library" in the Department field does not work because the department name is "University Library".
This advanced find capability is not available for personal contact lists/address books. With these, though, in your Contacts view you can display the Department column and sort by that. |
Score: 5.0 - Updated: 6/14/2012 10:21:57 AM - Was this helpful? |
How do I set up my Motorola phone for email? (link) |
( Restricted to authenticated ITS users. ) |
Score: 5.0 - Updated: 5/28/2015 3:45:17 PM - Was this helpful? |
How do I create or update a job ticket in WebHelpDesk via email? (link) |
Technology work request tickets can be created simply by emailing your request to helpdesk@wlu.edu from a W&L email address. Your request will automatically be turned into a request ticket, and you will be sent a ticket confirmation.
You can reply to that email to update the job with further details, or simply send a new email to helpdesk@wlu.edu with the subject line Ticket your ticket number . (E.g. Ticket 12345) and your update in the body of the email. Applies To: Faculty, Staff, Students |
Score: 5.0 - Updated: 7/15/2013 3:30:11 PM - Was this helpful? |
How do I find the folder I moved in error in my email when I can still see one of the messages? (link) |
If you can find a message in the folder
Open the message and then hit Control-Shift-F to bring up Advanced Find
At the top right is a ‘Browse’ button
Click browse and it will show you the hierarchical location of the folder your current message resides in
Note the location
Close your search
Go to the folder and drag your lost folder back up to your name@wlu.edu folder Applies To: Faculty, Staff |
Score: 5.0 - Updated: 3/18/2014 10:43:25 AM - Was this helpful? |
Can an Outlook mail merged email from Word be sent on behalf of someone else? (link) |
( Restricted to authenticated ITS users. ) |
Score: 5.0 - Updated: 8/26/2014 11:10:31 AM - Was this helpful? |
How can I restore an archived email in Outlook if I am a Delegate to their mailbox? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 5.0 - Updated: 4/15/2015 3:27:11 PM - Was this helpful? |
Is there an LDAP server that an email client like Thunderbird can connect to for addresses? (link) |
Unfortunately no, there is no LDAP server for address lookup. We have chosen not to expose our GAL or directory to LDAP searches.
|
Score: 4.3 - Updated: 7/15/2013 3:48:37 PM - Was this helpful? |
How do I get Microsoft Security Essentials for my Windows 7 operating system? (link) |
You can download Microsoft Security Essentials at the following site:
http://www.microsoft.com/security_essentials/
Please uninstall any other antivirus software you might have before installing.
|
Score: 4.3 - Updated: 10/1/2010 2:29:31 PM - Was this helpful? |
How do I set up my Faculty or Staff email account on my Android device? (link) |
These instructions provide a general map for configuring your account. If your Android menues offer you different choices than those decribed below try to pick the closest match.
- Go to Settings
- Choose "Accounts & Sync"
- Remove any non-functioning accounts
- Choose "Add Account"
- Choose "Exchange and Active Sync"
- Choose "Manual Setup"
- Enter your email address
- Enter "owa.wlu.edu" as your Server address
- Enter "ad" as your Domain
- Enter your username as "ad.wlu.edu\username" and password
- Check the "This server requires an encrypted SSL connection." Box.
- Choose "Next"
- Select the items you wish to sync.
- Choose "Finish Setup"
- At this point you will be asked to accept the security policy and set a PIN if you do not have one.
Applies To: Faculty, Staff |
Score: 4.3 - Updated: 7/15/2013 3:25:43 PM - Was this helpful? |
How often will I receive the EOP Spam Quarantine Notification Email message? (link) |
The EOP Spam Quarantine Notification email message will come every three days, provided you have received new spam. (Chances are....)
If you want to check for false positives* in your spam quarantine more often than that, you will need to go to http://spam.wlu.edu and log into the EOP spam filter quarantine.
* that is, e-mail you wanted to receive that "got stuck in spam catcher" Applies To: Faculty, Staff |
Score: 4.3 - Updated: 6/3/2014 10:56:13 AM - Was this helpful? |
I (student) clicked on a link in an email and responded to the phishing attempt, what should I do? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Students |
Score: 4.3 - Updated: 6/11/2014 11:16:40 AM - Was this helpful? |
How do I make my contacts folder an Address Book (Outlook 2010)? (link) |
To make a personal contacts folder into an address book that is visible when viewing address books, complete the steps below:
- In the Navigation Pane, click Contacts.
- Under My Contacts, right-click the Contacts folder you want to view in the address book, and then click Properties on the shortcut menu.
- Click the Outlook Address Book tab, and make sure that the Show this folder as an e-mail address book check box is selected. If the check box is unavailable, you need to add the Outlook Address Book to your profile (see instructions below).
- Click OK.
Now when you open a new message, click the To button, and open the dropdown list of address books, this address book will be listed. |
Score: 3.8 - Updated: 7/24/2013 10:57:11 AM - Was this helpful? |
How do I add an email address under "Favorite" for Fax/Scan on the BizHub? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.8 - Updated: 9/17/2015 1:37:16 PM - Was this helpful? |
What are the IMAP settings (for the phone) for faculty and staff email accounts? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.3 - Updated: 7/29/2013 9:16:35 AM - Was this helpful? |
How do I save a file from email to the iPad dropbox (using the Dropbox app and the iAnnotate app?) (link) |
How to Save a File from Email to the Dropbox with iAnnotate
1. On your PC or Macintosh desktop computer, download the Dropbox program from www.dropbox.com
a. As part of the installation process, Dropbox will create a file in your "My Documents" folder. Anything that you save to that folder will viewable from your iPad.
2. Create a Dropbox account for yourself; remember the password because you'll have to enter it every time you access the account from your iPad. It can be the same or different from your University password.
a. You should now have a Dropbox account with 2 GB of free storage.
b. Drag a file into that folder for testing purposes.
3. Download the Dropbox application on your iPad.
a. Log into the dropbox once it's installed.
b. You should see the file you dragged to the Dropbox.
4. You can upload any photos or video files from your iPad to your Dropbox, but not any documents or PDFs. This is where iAnnotate comes in...it communicates between your email and your dropbox, being the 3rd party.
5. Download the iAnnotate application on your iPad.
6. You should now be able to send a PDF from email to iAnnotate, and from iAnnotate to the Dropbox, all from the iPad. |
Score: 3.3 - Updated: 9/1/2010 2:16:11 PM - Was this helpful? |
How do I add an address from an address book or a contacts folder in Outlook? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.3 - Updated: 2/10/2014 10:23:44 AM - Was this helpful? |
How do I add a new contact not in contacts folder or address book in Outlook? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.3 - Updated: 2/10/2014 10:25:38 AM - Was this helpful? |
How do I create a Contact Group by copying names from an email message in Outlook? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.3 - Updated: 2/10/2014 10:35:32 AM - Was this helpful? |
How do I create a Contact Group with new names in the Address Book in Outlook? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 3.0 - Updated: 11/13/2014 11:43:33 AM - Was this helpful? |
How do I add an email address on the top "Favorite" screen for Fax/Scan on the BizHub? (link) |
( Restricted to authenticated ITS users. ) |
Score: 3.0 - Updated: 8/22/2014 11:01:36 AM - Was this helpful? |
Excel formatting of phone/social security columns does not merge to Word - is there a fix? (link) |
Word 2007 and Word 2010
- Start Word, and then open a new blank document.
- Go to Word Options
- In Word 2007, click the Office Button, and then click Word Options.
- In Word 2010, click File, and then click Options.
- On the Advanced tab, go to the General section.
- Click to select the Confirm file format conversion on open check box, and then click OK.
- On the Mailings tab, click Start Mail Merge, and then select Step By Step Mail Merge Wizard.
- In the Mail Merge task pane, select the type of document that you want to work on, and then click Next.
- Under Select starting document, select the starting document that you want to use, and then click Next.
- Under Select recipients, click Use an existing list, and then click Browse.
- In the Select Data Source dialog box, locate the folder that contains the Excel workbook that you want to use as your data source, select the workbook, and then click Open.
- In the Confirm Data Source dialog box, click to select the Show all check box. Click MS Excel Worksheets via DDE (*.xls), and then click OK.
- In the Microsoft Excel dialog box, under Named or cell range, select the cell range or worksheet that contains the data that you want to use, and then click OK.
NOTE: Your data now appears in the Mail Merge Recipients dialog box with the same formatting that appears in the Excel worksheet.
|
Score: 2.7 - Updated: 7/28/2011 3:12:21 PM - Was this helpful? |
If I lost my smart phone not a Blackberry what do I need to do to stop email going to the device? (link) |
If you have a Mobile device connected to W&L email (Outlook) and it has been lost or stolen you will need to do the following ASAP:
- Login to Outlook Web Access (owa.wlu.edu for faculty/staff or mail.wlu.edu for students)
- Put in your user name and password
- Go to Options (this is located in the upper right)
- On the left of page click on Mobile Devices
- Select the device that you have lost
- You may choose to wipe the device to remove all of the emails from it remotely
- Delete the device from the list
- Click Save
Applies To: Faculty, Staff, Students |
Score: 2.5 - Updated: 8/27/2013 1:23:56 PM - Was this helpful? |
I don't have the current class groups in my Outlook address book on my Mac what should I do? (link) |
( Restricted to authenticated ITS users. ) |
Score: 2.1 - Updated: 1/28/2013 10:24:37 AM - Was this helpful? |