Information, help and advice

Information, help and advice


The Full version of WebMail runs on Internet Explorer (IE) and the Light version runs on all other browsers (Firefox, Safari, Chrome etc). See also: Web access

Note: this does not remove you from University email lists.

Help and Support


The University uses Microsoft Exchange as its email server system in order to meet its requirements for email and collaboration, with Microsoft Outlook as its primary preferred corporate client.

Windows: Outlook 2007 and Outlook 2010. Outlook is the preferred client as it is designed for Exchange, it provides all of the functions and features that our email system offers. Outlook is part of the Microsoft Office.

Mac: Outlook 2011. Providing slightly less functionality than Outlook but  still makes use of many of the Exchange features. This is the preferred client for Mac.

Internet Clients/Browsers: The University provides Outlook Web Access (OWA) as its internet-based client for Exchange  This provides most of the functionality of Exchange, but through a web-client instead, which can be accessed from any platform from any computer.

Smartphone and Tablet security advice

Smartphone and Tablet security advice

Use a PIN to protect your devices from casual unauthorised use.
(do this right now)

Smartphones and tablets may contain a lot of confidential information, possibly including banking details.

Treat a smartphone like your wallet or purse.
Treat a  tablet like your laptop.

Steps that can be taken to increase the security of your smartphone:

  • Use a PIN to protect the phone/tablet from casual unauthorised use. (do this right now)
  • Set a timeout to lock the device.
  • Consider configuring remote wiping. Some manufacturers provide remote wiping as a service. Contact your supplier for details

DID YOU KNOW?  Devices which use 'Activesync' (iOS, Windows mobile, some Androids) to connect to your University email can be remotely wiped using the appropriate email web interface
(at ) under options > mobile

  • Be careful which apps you install and the permissions you give them.
  • If you configure GPS location services, be aware of what information they share.
  • Email security rules apply for smartphones and tablets.
  • Keep a copy of your IMEI number (if applicable)in case of loss or theft.
  • Backup the information on your devices.
  • Ensure secure disposal of your devices at end of life.