session 5 - managing microsoft outlook and more

Post on 01-Nov-2014

2.401 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

West Chester Borough Employee Technology Training - Session 5March 29, 2012

TRANSCRIPT

Microsoft Outlook – Inside Out

Microsoft 365 UpdateManaging Your Passwords

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 1

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

2

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

3

The story of the blind carbon copy function is an example of old real world processes continuing into the virtual world.

The simple term "carbon copy" comes from the days of manual typewriters, when copies were made by typing on paper with several layers. Between each layer of paper was a thin sheet with carbon on the bottom side, so that when the typewriter keys hit the paper, the impact made a "carbon copy" of the letter on the paper sheet underneath. When you were finished typing a page, you would separate out the paper and throw away the carbon sheets. Anyone who is older than 40 surely remembers this and that you usually got some of the black carbon all over your hands.

You could get two, three, and four layer carbon copy paper, and even some very thin six layer paper. The top paper got the typewriter ink and looked the best. The top carbon copies always looked much crisper than the lower copies, as the force of the typewriter key strike dissipated through the layers.

Occasionally, an extra carbon copy would be given to someone not on the official CC carbon copy address list. Because there was no way the official addressees could know about these extra copies, they were called "blind carbon-copies" (BCC).

It turned out that people liked this feature so much it has survived into our virtual world and has been built into email. If you put addresses in the BCC field of an email it will be secretly copied to those addresses, and none of the other addresses in the To, CC, or BCC fields will know about it because the BCC field is not displayed on incoming messages.

The exciting history of CC and BCC

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

4

There are many reasons that the BCC field can be used.

Secret Squirrel: You can blind copy an email to someone without the other addresses knowing that you did so to make a third party aware of an important issue, or to establish an independent confidential record of your email. Be aware that you should have a good and ethical reason for not letting the primary addressee know that the email is being copied to someone else. Be aware that blind copying can be looked as a form of deception.

Copying yourself: You can blind copy yourself. For example you may want to copy an important email from your home address to your work address, or vice versa.

Network diagnostics: You can double-check that an important email makes it out onto the internet by blind copying yourself on the email at another address, preferably at a different domain name. If the blind copied email to yourself arrives at your other address, then you can be reasonably sure that the copy of the email to the main addressee you are concerned about made it from your Internet service provider.

Broadcasting: You can blind copy several email addresses at once in the BCC field if you are sending the email to more than one person. This feature of the blind copy is useful when for privacy reasons you don't necessarily want all of the recipients to know the addresses of the others. Information. You can surreptitiously copy one friend on a joke email to another friend.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

• Spelling (demonstrate various spelling

grammar skills.)

• Thesaurus (demonstrate the thesaurus function.)

5

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

• Creating a Signature (demonstrate creating a

signature.)

• Creating a Folder (demonstrate creating folders.)

6

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

• Reading Pane Options (demonstrate reading

panes.)

• Find (demonstrating searching email.)

7

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

• Organizing Your Inbox (demonstrate

organizing mail.)

• Creating Rules (demonstrate various rule

creations.)

8

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 1Microsoft Outlook – Email Skills

9

• Creating a calendar event or add a new contact with an email message.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 2Microsoft Outlook – Calendar Skills

10

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 2Microsoft Outlook – Calendar Skills

• Scheduling & Modifying Activities

• Create activity from email

11

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 2Microsoft Outlook – Calendar Skills

• Planning a Meeting

• Inviting Attendees

12

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 2Microsoft Outlook – Calendar Skills

• Organizing Your Events

(colors!)

• Viewing Other (Shared) Calendars

13

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 3Microsoft Office 365 – Update

14

Survived 365

We Our organization was migrated to

Microsoft 365 between March 16 & 18, 2012.

What does this mean to you?

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 3Microsoft Office 365 – Update

15

The Microsoft Online Services login client is no longer needed and can be uninstalled.

This can be uninstalled through the Add/Remove Programs in the control panel.

Do NOT uninstall the “Microsoft Online Services Sign-In Assistant”. This is the new 365 application.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 3Microsoft Office 365 – Passwords Just Got Easier

16

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 17

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 18

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 19

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 20

After the 365 Integration I was able to make all

passwords “non-expireable”. ……

however……..

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 21

It is still recommended that your email passwords are changed at least twice a year. You can do this by logging into your Microsoft 365 portal at portal.micrososftonline.com or login.microsoftonline.com & selecting “options” under Outlook.

Choose “change your password” on the right taskbar.

Remember to change your password on any mobile devices as well.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer 22

What’s Next with 365?

During the next couple of months many of us will be upgraded to the next level of 365.

This will include access to Team SharePoint Sites, My SharePoint Sites, Microsoft Office Web Apps.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 4Managing Your Passwords

Managing your technology passwords can be over whelming.

However passwords are very important because they protect your personal information and the information of your employer.

There are some good & bad ways of managing your passwords.

23

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 4Managing Your Passwords

• Sticky notes on your computer monitors is VERY BAD.

• Word documents listing all your passwords is BAD. If you insist on this please password the WORD document.

• Password lists in your smartphone’s “notepad” is VERY BAD.

24

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 4Managing Your Passwords

25

There are many free excellent services where you can manage your passwords. I recommend exploring these services, choosing one and managing all of your documents there.

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Part 4Managing Your Passwords

26

Here are just some password management sites I recommend. Passpack.comLastpass.comRoboform.com

There are countless other excellent solutions out there. Check them out!

Borough of West ChesterInformation Technology Training – Session 5 – March 29,

2012

William Mann, Chief Information Officer

Open Discussion / Q & A

27

top related