Digitally sign a single message In the message, on the Options tab, in the Permission group, click Sign Message. If you don’t see the Sign Message button, do the following: In the message, click Options. In the More Options group, click the dialog box launcher in the lower-right corner. Click Security Settings, and then select the Add digital signature to this message check box. Click OK, and then click Close. If Read More
Category: Microsoft Office
How to Manage Locations with Microsoft 365
Location Location helps your users find addresses and locate your organization’s buildings by providing an accurate location for offices, campuses, and buildings, along with directions and navigation. Administrators should add all important locations of your organization. Unlike Bookmarks and Q&A, the index is not refreshed immediately, and it can take several hours for new or Read More
How to Mitigate CVE-2023-36884 Security Vulnerability
Mitigations Customers who use Microsoft Defender for Office are protected from attachments that attempt to exploit this vulnerability. In current attack chains, the use of the Block all Office applications from creating child processes Attack Surface Reduction Rule will prevent the vulnerability from being exploited. Organizations who cannot take advantage of these protections can set the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION Read More
How to Create a Scheduling Poll in Outlook
The organizer can send multiple time options through Scheduling Poll and minimize the back-and-forth emails about scheduling. Note: If you need help locating the entry points for Scheduling Poll for the Outlook client you are using, see Access Scheduling Poll. Create a poll Select the meeting settings. View all your polls: Click this link to view and Read More
How to Enable and Configure Phish Alert Button (PAB) in Outlook
Before you install the PAB, you will need to enable and configure the PAB in your Account Settings. To enable and configure the PAB, follow the steps below. Log in to your KnowBe4 console and navigate to your Account Settings screen. This screen will look different depending on your account version. Free Version: If you have a Read More
How to Secure and Restore a Compromised Microsoft 365 Mailbox
Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account. Do all of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure Read More