O'Reilly logo

Microsoft Office 2010 In Depth by Joe Habraken

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

27. Securing and Maintaining Outlook

Outlook’s capabilities for communication are based on the fact that Outlook is connected to a data network. While some Outlook users take advantage of Outlook’s features in controlled and secure corporate network environments, many of us use Outlook as a tool for communicating over the Internet. This potentially opens up our computers to outside attack by viruses and other malware. Even the most secure network environments fail to completely protect Outlook users from malicious email file attachments or junk email.

In this chapter we take a look at some of the ways to secure Outlook. This chapter also discusses some of the maintenance tools that you can use to keep your Outlook environment more organized ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required