SlideShare a Scribd company logo
1 of 9
Download to read offline
HOW TO CREATE ALIASES
ON
MICROSOFT OUTLOOOK
TO PROTECT YOUR REAL EMAIL
LOG IN TO YOUR
MICROSOFT OUTLOOK ACCOUNT
1.
CLICK ON THE GEAR ICON
2.
THEN CLICK ON "VIEW ALL OUTLOOK SETTINGS"
LOCATED
IN THE TOP
RIGHT CORNER
OF THE SCREEN
CLICK ON THE "MAIL" TAB,
THEN CLICK ON "SYNC EMAIL".
3.
SCROLL DOWN TO THE "ALIAS" SECTION,
THEN CLICK ON "ADD EMAIL".
4.
ENTER THE EMAIL ADDRESS YOU WANT TO USE AS AN ALIAS,
THEN CLICK ON "ADD ALIAS".
5.
IF PROMPTED, ENTER THE VERIFICATION CODE
SENT TO THE EMAIL ADDRESS YOU JUST ADDED.
6.
ONCE VERIFIED, THE NEW EMAIL ADDRESS WILL APPEAR IN THE
"ALIAS" SECTION.
7.
YOU CAN USE IT TO SEND AND RECEIVE EMAILS JUST LIKE YOUR MAIN EMAIL ADDRESS.
FOR MORE, VISIT
HOW TO CREATE ALIASES
TO PROTECT
YOUR REAL EMAIL
ON MICROSOFT
OUTLOOOK
@Cybermaterial @Cybermaterial_

More Related Content

Similar to How to create aliases to protect your real email on Microsoft Outlook

Ծանոթացում Gmail–ին
Ծանոթացում Gmail–ինԾանոթացում Gmail–ին
Ծանոթացում Gmail–ինArtur Papyan
 
EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365Siddharth Goyal
 
eMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior CentereMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior CenterSnowSugar Video
 
MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers	MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers Mafel Gorne
 
FlexBooks: How To Register
FlexBooks: How To RegisterFlexBooks: How To Register
FlexBooks: How To RegisterCK12 Foundation
 
EVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACEEVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACEMafel Gorne
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail idakhila prasanth
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com Amirul Islam
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guideinforumobile
 
Postcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts AheadPostcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts AheadMafel Gorne
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018inforumobile
 
InforUMobile User Guide
InforUMobile User Guide InforUMobile User Guide
InforUMobile User Guide inforumobile
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guideinforumobile
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018inforumobile
 

Similar to How to create aliases to protect your real email on Microsoft Outlook (20)

Ծանոթացում Gmail–ին
Ծանոթացում Gmail–ինԾանոթացում Gmail–ին
Ծանոթացում Gmail–ին
 
EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365EduNxt V2 for GNU - Email using Office 365
EduNxt V2 for GNU - Email using Office 365
 
eMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior CentereMail 101 (2) Class for Selfhelp Virtual Senior Center
eMail 101 (2) Class for Selfhelp Virtual Senior Center
 
Time warner cable webmail
Time warner cable webmailTime warner cable webmail
Time warner cable webmail
 
Basic computer class_4
Basic computer class_4Basic computer class_4
Basic computer class_4
 
MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers	MAILCHIMP: A tool for Newbies and Expert Email Marketers
MAILCHIMP: A tool for Newbies and Expert Email Marketers
 
Basic computer class_4
Basic computer class_4Basic computer class_4
Basic computer class_4
 
FlexBooks: How To Register
FlexBooks: How To RegisterFlexBooks: How To Register
FlexBooks: How To Register
 
Handling Netcore
Handling  NetcoreHandling  Netcore
Handling Netcore
 
EVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACEEVERNOTE: Collect it all in ONE PLACE
EVERNOTE: Collect it all in ONE PLACE
 
Introduction to Gmail - Instructions
Introduction to Gmail - InstructionsIntroduction to Gmail - Instructions
Introduction to Gmail - Instructions
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail id
 
Form 1 Term 2 Week 6.0
Form 1   Term 2   Week 6.0Form 1   Term 2   Week 6.0
Form 1 Term 2 Week 6.0
 
How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com How to create Email at Gmail.com and Yahoo.com
How to create Email at Gmail.com and Yahoo.com
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guide
 
Postcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts AheadPostcron: Automate and Plan Posts Ahead
Postcron: Automate and Plan Posts Ahead
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018
 
InforUMobile User Guide
InforUMobile User Guide InforUMobile User Guide
InforUMobile User Guide
 
InforUMobile UK User Guide
InforUMobile UK User GuideInforUMobile UK User Guide
InforUMobile UK User Guide
 
InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018InforUMobile IE user guide Nov. 2018
InforUMobile IE user guide Nov. 2018
 

More from Cybermaterial

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysisCybermaterial
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malwareCybermaterial
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterCybermaterial
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media AccountsCybermaterial
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorCybermaterial
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber AttackCybermaterial
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email Cybermaterial
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security TipsCybermaterial
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNCybermaterial
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsCybermaterial
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyCybermaterial
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption Cybermaterial
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCybermaterial
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint Cybermaterial
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTCCybermaterial
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedCybermaterial
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cybermaterial
 
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...Cybermaterial
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCybermaterial
 

More from Cybermaterial (20)

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on Twitter
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google Authenticator
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
 
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacy
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

How to create aliases to protect your real email on Microsoft Outlook

  • 1. HOW TO CREATE ALIASES ON MICROSOFT OUTLOOOK TO PROTECT YOUR REAL EMAIL
  • 2. LOG IN TO YOUR MICROSOFT OUTLOOK ACCOUNT 1.
  • 3. CLICK ON THE GEAR ICON 2. THEN CLICK ON "VIEW ALL OUTLOOK SETTINGS" LOCATED IN THE TOP RIGHT CORNER OF THE SCREEN
  • 4. CLICK ON THE "MAIL" TAB, THEN CLICK ON "SYNC EMAIL". 3.
  • 5. SCROLL DOWN TO THE "ALIAS" SECTION, THEN CLICK ON "ADD EMAIL". 4.
  • 6. ENTER THE EMAIL ADDRESS YOU WANT TO USE AS AN ALIAS, THEN CLICK ON "ADD ALIAS". 5.
  • 7. IF PROMPTED, ENTER THE VERIFICATION CODE SENT TO THE EMAIL ADDRESS YOU JUST ADDED. 6.
  • 8. ONCE VERIFIED, THE NEW EMAIL ADDRESS WILL APPEAR IN THE "ALIAS" SECTION. 7. YOU CAN USE IT TO SEND AND RECEIVE EMAILS JUST LIKE YOUR MAIN EMAIL ADDRESS.
  • 9. FOR MORE, VISIT HOW TO CREATE ALIASES TO PROTECT YOUR REAL EMAIL ON MICROSOFT OUTLOOOK @Cybermaterial @Cybermaterial_