SlideShare a Scribd company logo
HOW TO CREATE ALIASES
ON
MICROSOFT OUTLOOOK
TO PROTECT YOUR REAL EMAIL
LOG IN TO YOUR
MICROSOFT OUTLOOK ACCOUNT
1.
CLICK ON THE GEAR ICON
2.
THEN CLICK ON "VIEW ALL OUTLOOK SETTINGS"
LOCATED
IN THE TOP
RIGHT CORNER
OF THE SCREEN
CLICK ON THE "MAIL" TAB,
THEN CLICK ON "SYNC EMAIL".
3.
SCROLL DOWN TO THE "ALIAS" SECTION,
THEN CLICK ON "ADD EMAIL".
4.
ENTER THE EMAIL ADDRESS YOU WANT TO USE AS AN ALIAS,
THEN CLICK ON "ADD ALIAS".
5.
IF PROMPTED, ENTER THE VERIFICATION CODE
SENT TO THE EMAIL ADDRESS YOU JUST ADDED.
6.
ONCE VERIFIED, THE NEW EMAIL ADDRESS WILL APPEAR IN THE
"ALIAS" SECTION.
7.
YOU CAN USE IT TO SEND AND RECEIVE EMAILS JUST LIKE YOUR MAIN EMAIL ADDRESS.
FOR MORE, VISIT
HOW TO CREATE ALIASES
TO PROTECT
YOUR REAL EMAIL
ON MICROSOFT
OUTLOOOK
@Cybermaterial @Cybermaterial_

More Related Content

Similar to How to create aliases to protect your real email on Microsoft Outlook

Ծանոթացում Gmail–ին
Ծանոթացում Gmail–ինԾանոթացում Gmail–ին
Ծանոթացում Gmail–ին
Artur Papyan
 
FlexBooks: How To Register
FlexBooks: How To RegisterFlexBooks: How To Register
FlexBooks: How To Register
CK12 Foundation
 

Similar to How to create aliases to protect your real email on Microsoft Outlook (20)

Ծանոթացում Gmail–ին
Ծանոթացում Gmail–ինԾանոթացում Gmail–ին
Ծանոթացում Gmail–ին
 
EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365
 
eMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior CentereMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior Center
 
Time warner cable webmail
Time warner cable webmailTime warner cable webmail
Time warner cable webmail
 
Basic computer class_4
Basic computer class_4Basic computer class_4
Basic computer class_4
 
MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers	MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers
 
Basic computer class_4
Basic computer class_4Basic computer class_4
Basic computer class_4
 
FlexBooks: How To Register
FlexBooks: How To RegisterFlexBooks: How To Register
FlexBooks: How To Register
 
Handling Netcore
Handling  NetcoreHandling  Netcore
Handling Netcore
 
EVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACEEVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACE
 
Introduction to Gmail - Instructions
Introduction to Gmail - InstructionsIntroduction to Gmail - Instructions
Introduction to Gmail - Instructions
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail id
 
Form 1 Term 2 Week 6.0
Form 1   Term 2   Week 6.0Form 1   Term 2   Week 6.0
Form 1 Term 2 Week 6.0
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guide
 
Postcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts AheadPostcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts Ahead
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018
 
InforUMobile User Guide
InforUMobile User Guide InforUMobile User Guide
InforUMobile User Guide
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guide
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018
 

More from Cybermaterial

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
Cybermaterial
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
Cybermaterial
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
Cybermaterial
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
Cybermaterial
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
Cybermaterial
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
Cybermaterial
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
Cybermaterial
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
Cybermaterial
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacy
Cybermaterial
 

More from Cybermaterial (20)

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on Twitter
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google Authenticator
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
 
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacy
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

How to create aliases to protect your real email on Microsoft Outlook

  • 1. HOW TO CREATE ALIASES ON MICROSOFT OUTLOOOK TO PROTECT YOUR REAL EMAIL
  • 2. LOG IN TO YOUR MICROSOFT OUTLOOK ACCOUNT 1.
  • 3. CLICK ON THE GEAR ICON 2. THEN CLICK ON "VIEW ALL OUTLOOK SETTINGS" LOCATED IN THE TOP RIGHT CORNER OF THE SCREEN
  • 4. CLICK ON THE "MAIL" TAB, THEN CLICK ON "SYNC EMAIL". 3.
  • 5. SCROLL DOWN TO THE "ALIAS" SECTION, THEN CLICK ON "ADD EMAIL". 4.
  • 6. ENTER THE EMAIL ADDRESS YOU WANT TO USE AS AN ALIAS, THEN CLICK ON "ADD ALIAS". 5.
  • 7. IF PROMPTED, ENTER THE VERIFICATION CODE SENT TO THE EMAIL ADDRESS YOU JUST ADDED. 6.
  • 8. ONCE VERIFIED, THE NEW EMAIL ADDRESS WILL APPEAR IN THE "ALIAS" SECTION. 7. YOU CAN USE IT TO SEND AND RECEIVE EMAILS JUST LIKE YOUR MAIN EMAIL ADDRESS.
  • 9. FOR MORE, VISIT HOW TO CREATE ALIASES TO PROTECT YOUR REAL EMAIL ON MICROSOFT OUTLOOOK @Cybermaterial @Cybermaterial_