Using Apple Mail with Your Google Account

Total Page:16

File Type:pdf, Size:1020Kb

Using Apple Mail with Your Google Account Setting Up Apple Mail for IMAP Access to Google Apps Note: To use a desktop client, you must first enable IMAP via the settings in the Web interface. For instructions, see Enable IMAP for Device Syncing under A Guide for Day One: Getting Started on the URI Google home page. You can set up your Apple Mail application to send and receive messages from your Google Apps for Education account. • Open the Mail app on your computer. • Select the Mail menu at the top, and then Preferences. If you are using Yosemite, the most recent operating system, choose Add Accounts. NOTE: If you are using an older operating system, you may need to choose either Preferences or Accounts. If Preferences, choose the Accounts option and then click the + button in the bottom corner. If you choose Accounts option under the Mail menu, click the + button in the bottom corner. A new window will open. ▪ Choose Google. ▪ Type your name. ▪ Type your full email address ([email protected]). ▪ Type your password. ▪ Click Set up. ▪ Make sure Mail is selected and click Done. Choosing Google as the account type will automatically select the correct IMAP and SMTP servers and ports for the application to use with the Google Apps email server. Google recommends the following settings for use with Apple Mail: ▪ From the Mail menu, click Preferences > Accounts > Mailbox Behaviors ▪ Store draft messages on the server > leave unchecked ▪ Store sent messages on the server > leave unchecked ▪ Store junk messages on the server > checked ▪ Delete junk messages when > Never ▪ Move deleted messages to the Trash mailbox > leave unchecked ▪ Store deleted messages on the server > leave unchecked .
Recommended publications
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Apple Has Built a Solution Into Every Mac
    Overview Mac OS X iPhone iPod + iTunes Resources Vision Mac OS X solutions VoiceOver from third parties. Browse the wide variety of To make it easier for the blind and those with low-vision to use a accessibility solutions supported computer, Apple has built a solution into every Mac. Called VoiceOver, by Mac OS X. Learn more it’s reliable, simple to learn, and enjoyable to use. In Depth Device Support Application Support Downloads VoiceOver Application Support VoiceOver. A unique solution for the vision-impaired. Every new Mac comes with Mac OS X and VoiceOver installed and includes a variety of accessible More than 50 reasons to use applications. You can also purchase additional Apple and third-party applications to use with VoiceOver. VoiceOver. Learn more While this page lists a few of the most popular applications, many more are available. If you use an application with VoiceOver that’s not on this list, and you would like to have it added, send email to [email protected]. Unlike traditional screen readers, VoiceOver is integrated into the operating system, so you can start using new accessible applications right away. You don’t need to buy an update to VoiceOver, install a new copy, or add the application to a “white list.” Moreover, VoiceOver commands work the same way in every application, so once you learn how to use them, you’ll be able to apply what you know to any accessible application. Apple provides developers with a Cocoa framework that contains common, reusable application components (such as menus, text fields, buttons, and sliders), so developers don’t have to re-create these elements each time they write a new application.
    [Show full text]
  • Vmware Workspace ONE UEM Ios Device Management
    iOS Device Management VMware Workspace ONE UEM iOS Device Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents 1 Introduction to Managing iOS Devices 7 iOS Admin Task Prerequisites 8 2 iOS Device Enrollment Overview 9 iOS Device Enrollment Requirements 11 Capabilities Based on Enrollment Type for iOS Devices 11 Enroll an iOS Device Using the Workspace ONE Intelligent Hub 14 Enroll an iOS Device Using the Safari Browser 15 Bulk Enrollment of iOS Devices Using Apple Configurator 16 Device Enrollment with the Apple Business Manager's Device Enrollment Program (DEP) 17 User Enrollment 17 Enroll an iOS Device Using User Enrollment 18 App Management on User Enrolled Devices 19 3 Device Profiles 20 Device Passcode Profiles 22 Configure a Device Passcode Profile 23 Device Restriction Profiles 24 Restriction Profile Configurations 24 Configure a Device Restriction Profile 29 Configure a Wi-Fi Profile 30 Configure a Virtual Private Network (VPN) Profile 31 Configure a Forcepoint Content Filter Profile 33 Configure a Blue Coat Content Filter Profile 34 Configure a VPN On Demand Profile 35 Configure a Per-App VPN Profile 38 Configure Public Apps to Use Per App Profile 39 Configure Internal Apps to Use Per App Profile 39 Configure an Email Account Profile 40 Exchange ActiveSync (EAS) Mail for iOS Devices 41 Configure an EAS Mail Profile for the Native Mail Client 41 Configure a Notifications Profile 43 Configure an LDAP Settings Profile 44 Configure a CalDAV or CardDAV Profile 44 Configure a Subscribed Calendar Profile 45 Configure Web Clips Profile 45 Configure a SCEP/Credentials Profile 46 Configure a Global HTTP Proxy Profile 47 VMware, Inc.
    [Show full text]
  • University Email – Connect Apple Mail to Office 365
    University email – Connect Apple Mail to Office 365 To add your University email account to Apple Mail on a Mac it must be running Mac OS 10.14 or above. Click the Apple icon at top left and choose About this Mac to check the Mac OS version on your Mac If it is not on 10.14 or higher then these guides from Apple will help to see if you can upgrade, but IT Services cannot assist with the upgrade of personal equipment: • https://www.apple.com/uk/macos/how-to-upgrade/ • https://support.apple.com/en-gb/macos • https://support.apple.com/en-gb/HT211238 - compatible Macs 1. Remove old Account Settings If you have not previously connected your mac to University email, you can skip this step and go straight to step 2. 1. Click the Apple menu. 2. Click System Preferences… 3. Click Internet Accounts. 4. In the Internet Accounts dialog, highlight your Exchange account from the list on the left. 5. Click on the minus symbol (-) and click OK to confirm the message . 2. Set up a new account 1. Launch the Apple Mail app. 2. Choose a Mail account provider o If this is the first time you have configured an email account in the app, the Choose a Mail account provider screen will appear o if you have already set up another email account in the Mail app, click the Mail menu then click Add Account… 3. Click Microsoft Exchange 4. Enter your Exchange account information: − Name: type your full name eg Joe Bloggs − Email address: type your email address in the format [email protected] eg [email protected] − Click Sign In Click Sign in to sign into your account using Microsoft 5.
    [Show full text]
  • Chapter 13 MAC OS X FORENSICS
    Chapter 13 MAC OS X FORENSICS Philip Craiger and Paul Burke Abstract This paper describes procedures for conducting forensic examinations of Apple Maca running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal. Keywords: Macintosh computers, Mac OS X forensics 1. Introduction Since its introduction in 1984, the Apple Macintosh has an enjoyed a small, albeit vocal, user base. Nevertheless, it is surprising that very little has been published regarding forensic examinations of Macintosh computers. This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. Due to space limitations, certain as- sumptions are made to limit the scope of our coverage. These assump- tions are: (i) The forensic computer and the suspect's computer run version 10.4.3 of Mac OS X, the latest version as of November 2005; (ii) the suspect has not set the Open Firmware password (Open Firmware is a processor and system-independent boot firmware used by PowerPC- based Macs, analogous to the x86 PC BIOS); (iii) the suspect has not used encryption via the Mac OS X FileVault, a virtual volume encrypted with 128-bit AESj and (iv) the suspect's hard drive is formatted with the Hierarchical File System Plus , commonly referred to as HFS+, the default file system since Mac OS X's release in 2000.
    [Show full text]
  • Configure Apple Mail
    Apple Mail Configuring for Office 365 Table of Contents Configuring Apple Mail for Office 365 ....................................................................................... 3 Add an Account ....................................................................................................................... 3 Remove an Account ................................................................................................................ 6 University of Miami Information Technology Configuring Apple Mail Page 2 Configuring Apple Mail for Office 365 Add an Account 1. Open Apple Mail. 2. If the Add Account does not automatically appear, click Mail > Add Account. If it does, skip to step 3. 3. Select Exchange and click Continue. University of Miami Information Technology Configuring Apple Mail Page 3 4. Enter the requested information and then click Sign In 5. Name: Your Name 6. Email Address: Your Email Address 7. On the “Sign in to your Exchange account using Microsoft” screen, click Sign In. University of Miami Information Technology Configuring Apple Mail Page 4 8. The single-sign on screen will appear. Provide your email address and password or your caneID and password. Click Sign in. 9. Uncheck the box next to any application you do not want to use this account with. Click Done. 10. The mailbox will begin downloading and populating. University of Miami Information Technology Configuring Apple Mail Page 5 Remove an Account 1. Open Apple Mail. 2. Select Mail > Accounts…. 3. The Internet Accounts window will open. Select the appropriate account 4. Click – at the bottom of the window. University of Miami Information Technology Configuring Apple Mail Page 6 5. If prompted to either Remove From All or Turn Off Account, select the appropriate option. a. Select Remove From All to remove the account from all machines that use this account. b.
    [Show full text]
  • Mac OS X Server User Management for Version 10.4 Or Later Second Edition
    Mac OS X Server User Management For Version 10.4 or Later Second Edition K Apple Computer, Inc. Apple, the Apple logo, AirPort, AppleShare, AppleTalk, © 2006 Apple Computer, Inc. All rights reserved. FireWire, iBook, Keychain, LaserWriter, Mac, Mac OS, Macintosh, PowerBook, and QuickTime are trademarks The owner or authorized user of a valid copy of of Apple Computer, Inc., registered in the U.S. and other Mac OS X Server software may reproduce this countries. Extensions Manager, Finder, and SuperDrive publication for the purpose of learning to use such are trademarks of Apple Computer, Inc. software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling Adobe and PostScript are trademarks of Adobe Systems copies of this publication or for providing paid-for Incorporated. support services. Java and all Java-based trademarks and logos are Every effort has been made to ensure that the trademarks or registered trademarks of Sun information in this manual is accurate. Apple Computer, Microsystems, Inc. in the U.S. and other countries. Inc., is not responsible for printing or clerical errors. UNIX is a registered trademark in the United States and Apple other countries, licensed exclusively through X/Open 1 Infinite Loop Company, Ltd. Cupertino, CA 95014-2084 408-996-1010 Other company and product names mentioned herein www.apple.com are trademarks of their respective companies. Mention of third-party products is for informational purposes Use of the “keyboard” Apple logo (Option-Shift-K) for only and constitutes neither an endorsement nor a commercial purposes without the prior written consent recommendation.
    [Show full text]
  • Using an Ipad Or Iphone on Apple Ios 14
    Using an iPad or iPhone on Apple iOS 14 Table of Contents Important Icons ................................................ 2 Maps................................................................ 25 Common Gestures ............................................ 3 Calendar .......................................................... 27 Common Buttons.............................................. 3 Recurring Events ............................................ 27 Keyboard ........................................................... 4 Safari ............................................................... 29 Settings ............................................................. 5 Closing Open Tabs .......................................... 30 iOS Version vs Model Version .......................... 5 Files ................................................................. 30 Wireless ............................................................ 6 Moving Files ................................................... 30 Airplane Mode .................................................. 6 AirDrop ............................................................ 31 Screen Timeout / Lock ..................................... 7 Turning on AirDrop .........................................31 Security .............................................................. 7 iCloud .............................................................. 32 Accessibility ...................................................... 9 Siri ..................................................................
    [Show full text]
  • Apple Mail Read Receipts Plugin
    Apple Mail Read Receipts Plugin Blair pacificates posthumously as dissembling Oral fined her luxuriance sandpaper waitingly. Victimized and cylindric Robinson always mangily.smile incuriously and depolarized his havocs. Rory usually sees diligently or undercook hereafter when Samian Allin resettles vowelly and You read mail receipts Respondable off this plugin folder, will slide into an ethical? But some apple mail receipt plugin and memory efficient is in a new items are moving mails from the normal to view source mail? It will examine the incoming message and pineapple the spam messages to arrange separate mailbox. If you got looking due a nice email app that works across iOS Android and Mac. For iOS Brings Read Receipt Functionality To Apple's Default Mail. What's am good email tracking system glad you'd recommend an. Please mind your entries and faith again. Only mail receipt plugin with apple mail stores have more pretty good ways to. Mac mail plugins do apple mail, if you write them should successfully move it to see from home that i sent via imap accounts listed here. Help Boomerang for Outlook. And hearing nothing save the norm. How stun turn is read above in row for mac. NPR built a tool and explore trends around this country. Read Receipts Beta In Airmail you improve use the plugin for. Apple Mail doesn't offer bring in-built impact receipt tracker so to wear who reads your emails and how long a look hang them it requires downloading. If Launch Services cannot fulfil the Eudora application, the installer will now contain some heuristics and stout the user to locate Eudora, rather keep giving up.
    [Show full text]
  • Apple Email App Download Icloud
    apple email app download iCloud. The best place for all your photos, files, and more. iCloud is built into every Apple device. That means all your stuff — photos, files, notes, and more — is safe, up to date, and available wherever you are. And it works automatically, so all you have to do is keep doing what you love. Everyone gets 5GB of free iCloud storage to start, and it’s easy to add more at any time. iCloud Photos. All your photos and videos. Always available. A lifetime of photos on all your devices. With iCloud Photos, you can browse, search, and share all the photos and videos from any of your devices, whether they were taken yesterday or years ago. Take all the photos you want. Without worrying about space on your devices. To save space on your devices, the original, full‑resolution photos you take are automatically uploaded to iCloud. You’ll still always have a lightweight version of every photo on your device, and you can download the originals whenever you need them. The easiest way to share photos with friends and family. Shared Albums lets you create albums for trips, events, or whatever you want. Simply choose the friends and family members who can see, comment, and add their own photos and videos. iCloud Drive. Any type of file. All in one place. All your files available from all your devices. The files you keep safe in iCloud Drive are easy to get to, no matter which device you’re using. You can access all your files from the Files app on iOS and iPadOS, the Finder on your Mac, File Explorer for Windows PCs, or iCloud.com.
    [Show full text]
  • Setting up Mac Mail for Mac OS X
    Setting Up Mac Mail For Mac OS X Setting up Apple Mail (OSX 10.7 or later) 1. Verify that all instances of Apple Mail are closed. 2. In the top-left corner of your screen, select the Apple icon, then select System Preferences. 3. Select Mail, Contact & Calendars. 4. Select the Microsoft Exchange button in the right-hand column. For additional support, call Computer Services at 232-1230 or submit an online help request Setting Up Mac Mail For Mac OS X 5. A popup window will appear. Please provide the information requested: Name: Email Address: Your primary email address (example: [email protected]) Password: Your UT EID Password 6. If AutoDiscover succeeds, please skip to step 8. AutoDiscover may display an error message after attempting to find your settings. Please click Continue. For additional support, call Computer Services at 232-1230 or submit an online help request Setting Up Mac Mail For Mac OS X 7. In the Account Settings popup window, please provide the information requested then hit Continue: Description (Optional): Office 365 Username: Primary Email Address (example: [email protected]) Password: UT EID Password **Server Address: **outlook.office365.com 8. An Account Summary window will show. Verify that your information is correct, then click Continue. For additional support, call Computer Services at 232-1230 or submit an online help request Setting Up Mac Mail For Mac OS X 9. The final screen will allow you to configure other Apple programs to complement Apple Mail: Mail - Configures Apple Mail to use your Exchange account. Contacts- Uses the Contacts application to access your contacts and the Global Address List.
    [Show full text]
  • Security and Spam Mac/PC Compatibility: Quickstart Guide for Business 2
    Security and Spam Mac/PC Compatibility: QuickStart Guide for Business 2 Security and Spam QuickStart Guide for Business The Basics The need to protect against hackers and other threats is a fact of life. Mac OS X features a number of built-in technologies to help you fend off attacks and keep unwanted email out of your employees’ inboxes. User benefit: When users are protected from spam and other computer security threats, they can do their jobs without wasting time deleting spam messages or calling IT to fix a computer that has a virus. Business benefit: Proper computer security—including spam protection—can potentially save huge amounts of money by minimizing lost work time and emergency IT costs. It also keeps outsiders from stealing confidential business information. Standards and Buzzwords Here are some common terms associated with security and spam. AES 128-bit and 256 encryption. Advanced Encryption Standard—cryptography technology recommended by the U.S. government to secure sensitive documents. AES-256, the stronger of the two, is used in Mac OS X features such as FileVault (for protecting home directories) and Disk Utility (for creating encrypted disk images). Firewall. Hardware and/or software that monitors attempts to communicate with your computer over a network, and blocks dangerous traffic. Mac OS X comes with a built-in firewall that can be configured through the Security pane of System Preferences. Keychain. Software in Mac OS X that holds “keys” (passwords and other personal information) you need to access protected network services, decode encrypted disk images, and so on. When you log in to Mac OS X, the system opens your Keychain, so you don’t have to remember user names and passwords.
    [Show full text]