Information Technology Training – Session 5 – March 29, 2012




                                      Microsoft Outlook – Inside Out
                                                Microsoft 365 Update
                                          Managing Your Passwords


William Mann, Chief Information Officer                               1
Information Technology Training – Session 5 – March 29, 2012



            Part 1
            Microsoft Outlook – Email Skills




William Mann, Chief Information Officer                               2
Information Technology Training – Session 5 – March 29, 2012
The exciting history of CC and BCC
The story of the blind carbon copy function is an example of old real world processes continuing into the virtual world.
The simple term "carbon copy" comes from the days of manual typewriters, when copies were made by typing on paper
with several layers. Between each layer of paper was a thin sheet with carbon on the bottom side, so that when the
typewriter keys hit the paper, the impact made a "carbon copy" of the letter on the paper sheet underneath. When you
were finished typing a page, you would separate out the paper and throw away the carbon sheets. Anyone who is older
than 40 surely remembers this and that you usually got some of the black carbon all over your hands.

You could get two, three, and four layer carbon copy paper, and even some very thin six layer paper. The top paper got the
typewriter ink and looked the best. The top carbon copies always looked much crisper than the lower copies, as the force
of the typewriter key strike dissipated through the layers.

Occasionally, an extra carbon copy would be given to someone not on the official CC carbon copy address list. Because
there was no way the official addressees could know about these extra copies, they were called "blind carbon-copies"
(BCC).

It turned out that people liked this feature so much it has survived into our virtual world and has been built into email. If
you put addresses in the BCC field of an email it will be secretly copied to those addresses, and none of the other
addresses in the To, CC, or BCC fields will know about it because the BCC field is not displayed on incoming messages.


                                                                                                                                3
Information Technology Training – Session 5 – March 29, 2012

There are many reasons that the BCC field can be used.

  Secret Squirrel: You can blind copy an email to someone without the other addresses knowing that you did so to
  make a third party aware of an important issue, or to establish an independent confidential record of your email. Be
  aware that you should have a good and ethical reason for not letting the primary addressee know that the email is
  being copied to someone else. Be aware that blind copying can be looked as a form of deception.

  Copying yourself: You can blind copy yourself. For example you may want to copy an important email from your
  home address to your work address, or vice versa.

  Network diagnostics: You can double-check that an important email makes it out onto the internet by blind
  copying yourself on the email at another address, preferably at a different domain name. If the blind copied email
  to yourself arrives at your other address, then you can be reasonably sure that the copy of the email to the main
  addressee you are concerned about made it from your Internet service provider.

  Broadcasting: You can blind copy several email addresses at once in the BCC field if you are sending the email to
  more than one person. This feature of the blind copy is useful when for privacy reasons you don't necessarily want
  all of the recipients to know the addresses of the others. Information. You can surreptitiously copy one friend on a
  joke email to another friend.



                                                                                                                         4
Information Technology Training – Session 5 – March 29, 2012

        Part 1
        Microsoft Outlook – Email Skills



          • Spelling (demonstrate various spelling grammar skills.)

          • Thesaurus (demonstrate the thesaurus function.)




William Mann, Chief Information Officer                               5
Information Technology Training – Session 5 – March 29, 2012

         Part 1
         Microsoft Outlook – Email Skills



     •     Creating a Signature (demonstrate creating a signature.)

     •     Creating a Folder (demonstrate creating folders.)




William Mann, Chief Information Officer                                 6
Information Technology Training – Session 5 – March 29, 2012

        Part 1
        Microsoft Outlook – Email Skills



        •   Reading Pane Options (demonstrate reading panes.)

        •   Find (demonstrating searching email.)




William Mann, Chief Information Officer                               7
Information Technology Training – Session 5 – March 29, 2012

          Part 1
          Microsoft Outlook – Email Skills



      •      Organizing Your Inbox (demonstrate organizing mail.)

      •      Creating Rules (demonstrate various rule creations.)




William Mann, Chief Information Officer                               8
Information Technology Training – Session 5 – March 29, 2012

        Part 1
        Microsoft Outlook – Email Skills


      • Creating a calendar event or add a new contact with an email
        message.




William Mann, Chief Information Officer                                9
Information Technology Training – Session 5 – March 29, 2012



            Part 2
            Microsoft Outlook – Calendar Skills




William Mann, Chief Information Officer                               10
Information Technology Training – Session 5 – March 29, 2012

        Part 2
        Microsoft Outlook – Calendar Skills



       •    Scheduling & Modifying Activities

       •    Create activity from email




William Mann, Chief Information Officer                               11
Information Technology Training – Session 5 – March 29, 2012

        Part 2
        Microsoft Outlook – Calendar Skills



       •    Planning a Meeting

       •    Inviting Attendees




William Mann, Chief Information Officer                               12
Information Technology Training – Session 5 – March 29, 2012

        Part 2
        Microsoft Outlook – Calendar Skills



          •   Organizing Your Events (colors!)

          •   Viewing Other (Shared) Calendars




William Mann, Chief Information Officer                               13
Information Technology Training – Session 5 – March 29, 2012


     Part 3
     Microsoft Office 365 – Update


Our organization was migrated to Microsoft
365 between March 16 & 18, 2012.



               What does this mean to you?




William Mann, Chief Information Officer                               14
Information Technology Training – Session 5 – March 29, 2012


     Part 3                                      This can be uninstalled
     Microsoft Office 365 – Update               through the Add/Remove
                                                 Programs in the control
              The Microsoft Online Services      panel.
              login client is no longer needed
              and can be uninstalled.                    Do NOT uninstall
                                                         the “Microsoft
                                                         Online Services
                                                         Sign-In Assistant”.
                                                         This is the new 365
                                                         application.




William Mann, Chief Information Officer                                        15
Information Technology Training – Session 5 – March 29, 2012


     Part 3
     Microsoft Office 365 – Passwords Just Got Easier




William Mann, Chief Information Officer                               16
Information Technology Training – Session 5 – March 29, 2012




William Mann, Chief Information Officer                               17
Information Technology Training – Session 5 – March 29, 2012




William Mann, Chief Information Officer                               18
Information Technology Training – Session 5 – March 29, 2012




William Mann, Chief Information Officer                               19
Information Technology Training – Session 5 – March 29, 2012




                                                    ……however……..
William Mann, Chief Information Officer                               20
Information Technology Training – Session 5 – March 29, 2012

   It is still recommended that your email
   passwords are changed at least twice a year.
   You can do this by logging into your
   Microsoft 365 portal at
   portal.micrososftonline.com or
   login.microsoftonline.com & selecting
   “options” under Outlook.

                                                  Choose “change your
                                                  password” on the right
                                                  taskbar.

                                                  Remember to change
                                                  your password on any
                                                  mobile devices as well.
William Mann, Chief Information Officer                                     21
Information Technology Training – Session 5 – March 29, 2012

                                                 What’s Next with 365?

                                                  During the next couple
                                                  of months many of us
                                                  will be upgraded to the
                                                  next level of 365.

                                                  This will include access
                                                  to Team SharePoint
                                                  Sites, My SharePoint
                                                  Sites, Microsoft Office
                                                  Web Apps.



William Mann, Chief Information Officer                                  22
Information Technology Training – Session 5 – March 29, 2012



            Part 4
            Managing Your Passwords

             Managing your technology passwords can be over whelming.

             However passwords are very important because they protect your
             personal information and the information of your employer.

             There are some good & bad ways of managing your passwords.




William Mann, Chief Information Officer                                       23
Information Technology Training – Session 5 – March 29, 2012



            Part 4
            Managing Your Passwords

             • Sticky notes on your computer monitors is VERY BAD.

             • Word documents listing all your passwords is BAD. If you
               insist on this please password the WORD document.

             • Password lists in your smartphone’s “notepad” is VERY BAD.




William Mann, Chief Information Officer                                     24
Information Technology Training – Session 5 – March 29, 2012



            Part 4
            Managing Your Passwords

      There are many free excellent services where you can manage your
      passwords. I recommend exploring these services, choosing one and
      managing all of your documents there.




William Mann, Chief Information Officer                                   25
Information Technology Training – Session 5 – March 29, 2012



            Part 4
            Managing Your Passwords

    Here are just some password
    management sites I recommend.

     Passpack.com
     Lastpass.com
     Roboform.com

     There are countless other excellent
     solutions out there. Check them out!

William Mann, Chief Information Officer                               26
Information Technology Training – Session 5 – March 29, 2012


                   Open Discussion / Q & A




William Mann, Chief Information Officer                               27

More Related Content

PDF
IBM Connections vs. Office 365
PDF
IBM Notes 9.0 vs MICROSOFT Outlook 2013
PDF
Domino85 vs Exchange 2010
PDF
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
PDF
Socialize your ERP, and collaborate with him!
PPTX
How to Use Outlook Within Office 365
PPSX
蔡東銘:Office 365經驗分享(基督門徒訓練中心)
DOCX
Handout for Outlook 365 Email and Outlook Calendar
IBM Connections vs. Office 365
IBM Notes 9.0 vs MICROSOFT Outlook 2013
Domino85 vs Exchange 2010
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
Socialize your ERP, and collaborate with him!
How to Use Outlook Within Office 365
蔡東銘:Office 365經驗分享(基督門徒訓練中心)
Handout for Outlook 365 Email and Outlook Calendar

Similar to Session 5 - Managing Microsoft Outlook and More (20)

PPTX
Microsoft 365 Overview- how to manages MS acoount
PPTX
Office 365 Productivity Tips "February Fray"
PDF
Surfing Microsoft 365 waves: a Microsoft 365 roadmap analysis with Power BI -...
PPTX
Teaching Prompting and Prompt Sharing to End Users.pptx
PPTX
Copy of Co pilot ai all about it.pptxxxxx
PDF
Microsoft Copilots Microsoft Artificial Intelligence.pdf
PDF
Insights into Windows 10 in the Enterprise (October)
PPTX
Microsoft Office Outlook & Outlook.com
PPTX
Operations at big scale inside the microsoft enterprise
PPTX
Office 365 Productivity Tips "September Scrimmage"
PDF
Microsoft365-Copilot-Partner-Guide
DOCX
Microsoft's Generative AI: The Game Changer in Modern Collaboration
PPTX
Introduction to Microsoft 365 (Office 365).pptx
PDF
introductiontomicrosoft365office365-240205113426-afed31bb.pdf
PDF
Uni Systems Copilot event_05062024_C.Vlachos.pdf
PPTX
Rebuilding for the cloud: Reinventing revenue reporting at Microsoft
PPTX
05_09_23_DrivingGrowthwithSecurityManagedServices_M365v561EXT (1).pptx
PPTX
Microsoft 365 User Group 6th March 2019
PPTX
Global Security and Compliance Community conference 2021
PPTX
Presentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptx
Microsoft 365 Overview- how to manages MS acoount
Office 365 Productivity Tips "February Fray"
Surfing Microsoft 365 waves: a Microsoft 365 roadmap analysis with Power BI -...
Teaching Prompting and Prompt Sharing to End Users.pptx
Copy of Co pilot ai all about it.pptxxxxx
Microsoft Copilots Microsoft Artificial Intelligence.pdf
Insights into Windows 10 in the Enterprise (October)
Microsoft Office Outlook & Outlook.com
Operations at big scale inside the microsoft enterprise
Office 365 Productivity Tips "September Scrimmage"
Microsoft365-Copilot-Partner-Guide
Microsoft's Generative AI: The Game Changer in Modern Collaboration
Introduction to Microsoft 365 (Office 365).pptx
introductiontomicrosoft365office365-240205113426-afed31bb.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Rebuilding for the cloud: Reinventing revenue reporting at Microsoft
05_09_23_DrivingGrowthwithSecurityManagedServices_M365v561EXT (1).pptx
Microsoft 365 User Group 6th March 2019
Global Security and Compliance Community conference 2021
Presentation-PracticalGuideToHavingACustomerConversationOnSecurity (1).pptx
Ad

More from William Mann (20)

PPSX
Security Awareness Training
PPSX
Ransomware 101
PPSX
Technology Training - Security, Passwords & More
PPTX
Technology Training for Staff - April 6, 2017
PPSX
Why Digital Document Management?
PPSX
Technology Training 11-10-2016
PPSX
Tech training 19 Skype for Business
PPTX
Introducing Microsoft's Cloud - Session 16
PPTX
Technology Training - Session 15
PPSX
West Chester Staff Technology Training - Website,LastPass and Tips!
PPSX
Heartbleed Explained & LastPass Demo
PPSX
West Chester - Tech Training Session 11
PPSX
What is West Chester Connect?
PPSX
West Chester Tech Blog - Training Class - Session 10
PPTX
Tech Training - Session 9
PPTX
Tech Training - Session 8
PPTX
SharePoint & More
PPTX
Holiday scams
PPSX
Cloud computing 102711 - ccap
PPTX
Cloud computing presentation
Security Awareness Training
Ransomware 101
Technology Training - Security, Passwords & More
Technology Training for Staff - April 6, 2017
Why Digital Document Management?
Technology Training 11-10-2016
Tech training 19 Skype for Business
Introducing Microsoft's Cloud - Session 16
Technology Training - Session 15
West Chester Staff Technology Training - Website,LastPass and Tips!
Heartbleed Explained & LastPass Demo
West Chester - Tech Training Session 11
What is West Chester Connect?
West Chester Tech Blog - Training Class - Session 10
Tech Training - Session 9
Tech Training - Session 8
SharePoint & More
Holiday scams
Cloud computing 102711 - ccap
Cloud computing presentation
Ad

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
The various Industrial Revolutions .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
August Patch Tuesday
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
Module 1.ppt Iot fundamentals and Architecture
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
CloudStack 4.21: First Look Webinar slides
The various Industrial Revolutions .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Developing a website for English-speaking practice to English as a foreign la...
Final SEM Unit 1 for mit wpu at pune .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Web Crawler for Trend Tracking Gen Z Insights.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Getting Started with Data Integration: FME Form 101
Benefits of Physical activity for teenagers.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
August Patch Tuesday
sustainability-14-14877-v2.pddhzftheheeeee
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting started with AI Agents and Multi-Agent Systems

Session 5 - Managing Microsoft Outlook and More

  • 1. Information Technology Training – Session 5 – March 29, 2012 Microsoft Outlook – Inside Out Microsoft 365 Update Managing Your Passwords William Mann, Chief Information Officer 1
  • 2. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills William Mann, Chief Information Officer 2
  • 3. Information Technology Training – Session 5 – March 29, 2012 The exciting history of CC and BCC The story of the blind carbon copy function is an example of old real world processes continuing into the virtual world. The simple term "carbon copy" comes from the days of manual typewriters, when copies were made by typing on paper with several layers. Between each layer of paper was a thin sheet with carbon on the bottom side, so that when the typewriter keys hit the paper, the impact made a "carbon copy" of the letter on the paper sheet underneath. When you were finished typing a page, you would separate out the paper and throw away the carbon sheets. Anyone who is older than 40 surely remembers this and that you usually got some of the black carbon all over your hands. You could get two, three, and four layer carbon copy paper, and even some very thin six layer paper. The top paper got the typewriter ink and looked the best. The top carbon copies always looked much crisper than the lower copies, as the force of the typewriter key strike dissipated through the layers. Occasionally, an extra carbon copy would be given to someone not on the official CC carbon copy address list. Because there was no way the official addressees could know about these extra copies, they were called "blind carbon-copies" (BCC). It turned out that people liked this feature so much it has survived into our virtual world and has been built into email. If you put addresses in the BCC field of an email it will be secretly copied to those addresses, and none of the other addresses in the To, CC, or BCC fields will know about it because the BCC field is not displayed on incoming messages. 3
  • 4. Information Technology Training – Session 5 – March 29, 2012 There are many reasons that the BCC field can be used. Secret Squirrel: You can blind copy an email to someone without the other addresses knowing that you did so to make a third party aware of an important issue, or to establish an independent confidential record of your email. Be aware that you should have a good and ethical reason for not letting the primary addressee know that the email is being copied to someone else. Be aware that blind copying can be looked as a form of deception. Copying yourself: You can blind copy yourself. For example you may want to copy an important email from your home address to your work address, or vice versa. Network diagnostics: You can double-check that an important email makes it out onto the internet by blind copying yourself on the email at another address, preferably at a different domain name. If the blind copied email to yourself arrives at your other address, then you can be reasonably sure that the copy of the email to the main addressee you are concerned about made it from your Internet service provider. Broadcasting: You can blind copy several email addresses at once in the BCC field if you are sending the email to more than one person. This feature of the blind copy is useful when for privacy reasons you don't necessarily want all of the recipients to know the addresses of the others. Information. You can surreptitiously copy one friend on a joke email to another friend. 4
  • 5. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills • Spelling (demonstrate various spelling grammar skills.) • Thesaurus (demonstrate the thesaurus function.) William Mann, Chief Information Officer 5
  • 6. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills • Creating a Signature (demonstrate creating a signature.) • Creating a Folder (demonstrate creating folders.) William Mann, Chief Information Officer 6
  • 7. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills • Reading Pane Options (demonstrate reading panes.) • Find (demonstrating searching email.) William Mann, Chief Information Officer 7
  • 8. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills • Organizing Your Inbox (demonstrate organizing mail.) • Creating Rules (demonstrate various rule creations.) William Mann, Chief Information Officer 8
  • 9. Information Technology Training – Session 5 – March 29, 2012 Part 1 Microsoft Outlook – Email Skills • Creating a calendar event or add a new contact with an email message. William Mann, Chief Information Officer 9
  • 10. Information Technology Training – Session 5 – March 29, 2012 Part 2 Microsoft Outlook – Calendar Skills William Mann, Chief Information Officer 10
  • 11. Information Technology Training – Session 5 – March 29, 2012 Part 2 Microsoft Outlook – Calendar Skills • Scheduling & Modifying Activities • Create activity from email William Mann, Chief Information Officer 11
  • 12. Information Technology Training – Session 5 – March 29, 2012 Part 2 Microsoft Outlook – Calendar Skills • Planning a Meeting • Inviting Attendees William Mann, Chief Information Officer 12
  • 13. Information Technology Training – Session 5 – March 29, 2012 Part 2 Microsoft Outlook – Calendar Skills • Organizing Your Events (colors!) • Viewing Other (Shared) Calendars William Mann, Chief Information Officer 13
  • 14. Information Technology Training – Session 5 – March 29, 2012 Part 3 Microsoft Office 365 – Update Our organization was migrated to Microsoft 365 between March 16 & 18, 2012. What does this mean to you? William Mann, Chief Information Officer 14
  • 15. Information Technology Training – Session 5 – March 29, 2012 Part 3 This can be uninstalled Microsoft Office 365 – Update through the Add/Remove Programs in the control The Microsoft Online Services panel. login client is no longer needed and can be uninstalled. Do NOT uninstall the “Microsoft Online Services Sign-In Assistant”. This is the new 365 application. William Mann, Chief Information Officer 15
  • 16. Information Technology Training – Session 5 – March 29, 2012 Part 3 Microsoft Office 365 – Passwords Just Got Easier William Mann, Chief Information Officer 16
  • 17. Information Technology Training – Session 5 – March 29, 2012 William Mann, Chief Information Officer 17
  • 18. Information Technology Training – Session 5 – March 29, 2012 William Mann, Chief Information Officer 18
  • 19. Information Technology Training – Session 5 – March 29, 2012 William Mann, Chief Information Officer 19
  • 20. Information Technology Training – Session 5 – March 29, 2012 ……however…….. William Mann, Chief Information Officer 20
  • 21. Information Technology Training – Session 5 – March 29, 2012 It is still recommended that your email passwords are changed at least twice a year. You can do this by logging into your Microsoft 365 portal at portal.micrososftonline.com or login.microsoftonline.com & selecting “options” under Outlook. Choose “change your password” on the right taskbar. Remember to change your password on any mobile devices as well. William Mann, Chief Information Officer 21
  • 22. Information Technology Training – Session 5 – March 29, 2012 What’s Next with 365? During the next couple of months many of us will be upgraded to the next level of 365. This will include access to Team SharePoint Sites, My SharePoint Sites, Microsoft Office Web Apps. William Mann, Chief Information Officer 22
  • 23. Information Technology Training – Session 5 – March 29, 2012 Part 4 Managing Your Passwords Managing your technology passwords can be over whelming. However passwords are very important because they protect your personal information and the information of your employer. There are some good & bad ways of managing your passwords. William Mann, Chief Information Officer 23
  • 24. Information Technology Training – Session 5 – March 29, 2012 Part 4 Managing Your Passwords • Sticky notes on your computer monitors is VERY BAD. • Word documents listing all your passwords is BAD. If you insist on this please password the WORD document. • Password lists in your smartphone’s “notepad” is VERY BAD. William Mann, Chief Information Officer 24
  • 25. Information Technology Training – Session 5 – March 29, 2012 Part 4 Managing Your Passwords There are many free excellent services where you can manage your passwords. I recommend exploring these services, choosing one and managing all of your documents there. William Mann, Chief Information Officer 25
  • 26. Information Technology Training – Session 5 – March 29, 2012 Part 4 Managing Your Passwords Here are just some password management sites I recommend. Passpack.com Lastpass.com Roboform.com There are countless other excellent solutions out there. Check them out! William Mann, Chief Information Officer 26
  • 27. Information Technology Training – Session 5 – March 29, 2012 Open Discussion / Q & A William Mann, Chief Information Officer 27