Microsoft PnP. Healthcare and Life Sciences. Internet of Things IoT. Enabling Remote Work. Small and Medium Business. Humans of IT. Green Tech. MVP Award Program. Video Hub Azure. Microsoft Business. Microsoft Enterprise. Browse All Community Hubs. Turn on suggestions. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for. Show only Search instead for. Did you mean:. Sign In. Excluding and re-including applications within the Office ProPlus Suite. Outlook includes many security features, some of which are highlighted in the following sections. You can configure virus-prevention and other security settings in Outlook by using Group Policy. You can also use the Outlook Security Template to configure settings, as in earlier releases of Outlook. By using either configuration method, you can, for example, modify the list of file types that are blocked in email messages.
Outlook checks for up-to-date antivirus software to help determine when to display OAB access warnings and other Outlook security warnings. When you plan antivirus scanning for Outlook files and email messages, take precautions to prevent the issues that can arise.
If you use antivirus software to perform file-level scanning on them, while Outlook is in use, data corruption issues might occur. Instead, we recommend that you scan email message attachments on the email server and on the Outlook client computer. To scan email messages that are on an email server, you must use antivirus software that was developed to scan incoming and outgoing email.
To scan the attachments that are included in email messages on the client computer, use antivirus software on the client computer. We recommend this in case an unwanted message reaches your email client because antivirus software on the email server failed to identify it. Outlook includes a junk email filter that replaces the rules that were used in earlier versions of Outlook to filter mail. Messages caught by the filter are moved to the Junk Email folder, where they can be viewed or deleted later.
Junk email senders often add a web beacon in HTML email messages that includes external content, such as graphic images. When users open or view the email, the web beacons verify that their email addresses are valid. This increases the probability that users will receive more junk email messages. Outlook reduces the probability that users will become targets for future junk email by blocking automatic picture downloads from external servers by default.
Outlook helps protect against issues that are created by phishing email messages and deceptive domain names. By default, Outlook screens phishing email messages. These messages seem legitimate but they attempt to trick users to provide personal information, such as a user's bank account number and password.
Outlook also helps prevent the receipt of email messages from deceptive users by warning about suspicious domain names in email addresses. Outlook supports internationalized domain names IDNs in email addresses. IDNs allow people to register and use domain names in their native languages instead of English.
IDN support allows phishers to send homograph attacks, a situation in which a look-alike domain name is created by using alphabet characters from different languages, not just English, with the intention of deceiving users into thinking that they are visiting a legitimate website.
Outlook provides cryptographic features for sending and receiving security-enhanced email messages over the Internet or intranet. You can customize features in an Outlook deployment to set cryptographic options that are appropriate for your organization. You can also implement additional features to help improve security in email messaging. For example, you can provide security labels that match your organization's security policy.
An Internal Use Only label might be implemented as a security label to apply to email messages that should not be sent outside your company. Information Rights Management IRM helps users prevent sensitive email messages and other Office content, such as documents and worksheets, from being forwarded, edited, or copied by unauthorized people. In Outlook , users can use IRM to mark email messages with "Do not forward," which automatically restricts permission for recipients to forward, print, or copy the message.
In addition, you can define customized IRM permission policies in Office for your organization's needs and can deploy the new permission policies for users to use with email messages or other Office documents. Users can use the Contacts, Tasks, and Calendar features in Outlook without being connected to an email server.
You can install Outlook over any previous installation of Outlook. User settings that are stored in the registry are migrated when you upgrade from Office Outlook or later versions to Outlook If a MAPI profile already exists on a user's computer, you typically can configure a deployment to continue to use the profile.
When you upgrade users from an earlier version of Outlook, you must make choices about how to configure user profiles, consider Cached Exchange Mode issues, and be aware of fax and forms changes.
The process of upgrading users who currently have Cached Exchange Mode enabled in Outlook , Outlook , Outlook , or Outlook is straightforward.
If you do not change Cached Exchange Mode settings, the same settings are kept for Outlook By default, when Outlook is installed, a new compressed version of the Outlook data file.
If the previous two guidelines don't help, contact your Antivirus software support for more help. A basic list of the Microsoft Office Online processes that you should be excluding is here. You may have other processes, depending on what is installed. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode.
0コメント