Applying a forward to your Mailbox

Applying a forward to your Mailbox

Following recent communications from the InfoSec team concerning data privacy and securing access to colleagues’ email, access to other staff members’ email accounts will only be granted in exceptional cases by the HR and DPO departments. Alternative and effective methods of accessing important message during periods of absence can be achieved with clear out of office messages or setting up email forwarding to a required recipient within your department. To configure email forwarding:

 

  1. Open Outlook and select File > Manage Rules & Alerts

 

 

  1. Click New Rule.
  2. Under Start from a blank rule, choose Apply rule on messages I receive

 

A screenshot of a computer

AI-generated content may be incorrect.

 

  1. Click Next, then Next again to apply the rule to all messages
  2. Select Forward it to people or public group

 

 

  1. Click the underlined link to choose the recipient
  2. Click Finish and then Apply 

    • Related Articles

    • Using Search Folders to Identify Large Email Messages

      Managing your mailbox space is crucial to ensure smooth email operations. One effective way to free up space is by identifying and deleting large email messages; deleting larger emails can be more efficient and beneficial compared to deleting many ...
    • Setting an Out of Office on a Shared Mailbox

      1.0 Overview The purpose of this document is to explain how an Out of Office message can be enabled for a shared mailbox. Shared mailboxes are mailboxes that can be accessed by more than one user and is not their primary mailbox. The following rules ...
    • Signatures for Shared Mailboxes

      Outlook email signatures are provided by Exclaimer. This solution dynamically allocates your signature depending on a number of variables, most critically is the email address which your message is originating from. This inherently means when sending ...
    • How to spot Phishing

      Phishing is most common by email, but it can also come by text or phone call. There are ways to spot phishing attempts, look at the examples below to find out how. There are common tactics that a hacker will use to trick you, these tend to be: A ...
    • Lidar Unit Troubleshooting

      1.0 Introduction This document will detail common issues with Lidar units and how to resolve them. All Lidars are segregated onto a separate network for security purposes, this is done via software called Forescout. The mac addresses of the Lidars ...