When using 2-step verification with Gmail, Outlook.com, or other email provider, Outlook (and most other mail clients), you need to use the App password.
When the Facebook provider is installed in Outlook, status updates are visible based on the kind of Public Search settings selected in the Facebook profile. Everyone with a Facebook account needs to check these settings, not just Outlook users!
A virus infected email is making the rounds, purportedly from Microsoft, updating their service agreement. It looks like the real message but the URLs point to another site, typical of a phishing scheme. At least one version of the infected message includes an embedded external HTML file. The problem? When you download external content, either automatically or per message, that file will be saved to the hard drive and it will be rendered in Outlook. In this case, the HTML file is going to be rendered.
Use a VBA macro to delete the SecureTemp Folder used by Microsoft Outlook.
Error message: The server you connected to is using a security certificate that cannot be verified. A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the file
Some Microsoft Outlook users are concerned that the People Pane is sharing their private email with other users.
Using a mailbox policy to prevent users from opening certain file types using OWA.
How to change Outlook's programmatic access options in the Trust Center.
Viruses can involve current versions of Microsoft Outlook in one way: A user open a virus-infected attachment received via an Outlook e-mail message. Because this is the most common way viruses spread, many system administrators block certain attachments at the server or use the Outlook Email Security Update to block such attachments at the client.
Microsoft Outlook Outlook Email Security Update disables many of the features that allow viruses to spread quickly. The security update is integrated into all versions of Outlook beginning with Office 2000 Service Pack 2. In later versions, users can modify which attachments are blocked and easily bypass the security features,