Outlook supports both POP and IMAP accounts. To learn more about each account type, see POP account basic settings and IMAP account basic settings. Set up an Exchange account. Open Outlook for Mac 2011. On the Tools menu, click Accounts. If this is the first account you're creating in Outlook 2011, under Add an Account, click Exchange Account. Jul 02, 2014 Re: Problems with Outlook Express settings « Reply #1 on: July 02, 2014, 03:07:59 PM » In Avast! 8 and 9 you don't have to deactivate SSL in the email client anymore, just configure it like Avast wasn't there. Computers How to set up Mac Mail to use IMAP for Outlook.com. Microsoft just added IMAP support to Outlook.com e-mail, which allows you to keep your e-mail synchronized when using third-party clients. Mail Shield is an additional layer of active protection in Avast Antivirus. It scans your incoming and outgoing email messages in real-time for malicious content such as viruses. It scans your incoming and outgoing email messages in real-time for malicious content such as viruses.
Manage these settings from: Settings ▸ Components ▸ Anti-spam ▸ Customize
The Main settings screen enables you to customize how Anti-spam filters spam emails and updates the spam filtering rules. After making any changes, click OK to save Anti-spam settings.
Note: Anti-spam is only available as an additional installable component in Avast Premier and Avast Internet Security.
The following settings apply to all email clients:
- Sensitivity: use the orange bars to indicate how carefully you want Anti-spam to analyze your incoming emails for potential spam. The default setting is Medium (two bars). With higher sensitivity, the component is more likely to detect unwanted emails, but also more likely to mark legitimate messages as spam.
- Mark in subject of spam messages: marks junk emails with the subject line *** SPAM ***, or modify the text as preferred. This option is ticked by default.
- Mark in subject of phishing messages: marks scam emails with the subject line *** PHISHING ***, or modify the text as preferred. This option is ticked by default.
- Add recipients of outbound emails to whitelist automatically: adds email addresses that you contact to a list of trusted emails (known as a whitelist) so that replies from these email addresses are not treated as spam.
- Add only domains of the recipient: tick to automatically 'whitelist' the domains of your email recipients, rather than their individual email addresses. For example, if you send an email to someone@company.com when this option is ticked, the entire company.com domain is whitelisted.
- Retrieve new rules: continuously updates the Anti-spam detection filter with the latest criteria for identifying spam. By default, Anti-spam checks for new rules every 300 seconds (five minutes).
- Enable LiveFeed: configures Anti-spam to check all incoming emails against an online database of global spam messages before executing other checks. The amount of transferred data is small, so we recommended you keep this service enabled.
Manage the following settings if you use Microsoft Outlook as your email client:
- Automatically move spam messages to the junk folder: sends all spam emails directly to your junk folder. New messages that are identified as spam or phishing emails do not appear in your inbox. This option is ticked by default.
- Add entries from address book to whitelist automatically: adds all contacts from your Outlook address book to your Anti-spam whitelist, which is a list of known and trusted email addresses. Messages from whitelisted email addresses are never treated as spam.
- Send samples of incorrectly marked e-mails: occasionally Anti-spam may misjudge messages, for example, when a legitimate email is incorrectly marked as spam (false positive spam), or a spam message is not marked as spam when it should be (missed spam). This setting determines whether samples of these messages are sent to us for further analysis. Select from the following options for false positive spam and missed spam:
- Ask (default): to decide on a case-by-case basis.
- Yes: to send samples.
- No: to never send samples.
Other Anti-spam settings
Use the tabs on the left-side of the window to manage different aspects of Anti-spam behavior.
The Whitelist allows you to manage a list of senders whose emails are never treated as spam and are always delivered as normal.
- To add a single email address, click Add, then provide the specific email address. For example, someone@company.com.
- To add an entire domain, click Add, then provide the domain name only. For example, company.com.
To add another email address or domain to the whitelist, click Add. To remove an email address or domain from the whitelist, click the relevant row, then click Remove.
Individual email addresses take priority over entire domains. For example, if the domain company.com is on your whitelist but the individual email address someone@company.com is on your blacklist, emails from this sender are blocked.
Note: Wildcard characters (for example, * and ?) are not supported.
The Blacklist allows you to manage a list of senders whose emails are always treated as spam.
- To block a single email address, click Add, then provide the specific email address. For example, someone@company.com.
- To block an entire domain, click Add, then provide the domain name only. For example, company.com.
To add another email address or domain to the blacklist, click Add. To remove an email address or domain from the blacklist, click the relevant row, then click Remove.
Individual email addresses take priority over entire domains. For example, if the domain company.com is on your blacklist but the individual email address someone@company.com is on your whitelist, emails from this sender are delivered normally.
Note: Wildcard characters (for example, * and ?) are not supported.
Firewall is a component of Avast Premium Security and Avast Omni, which creates rules each time an application or process starts for the first time. These rules determine how Firewall behaves toward each application or process when it connects to the internet or to another network. Although advanced users can manage these rules or create new ones, we recommend you only modify your Application Rules if absolutely necessary. In most cases, Firewall formulates optimal rules without your input.
Create a new application rule
Default rules are created automatically for applications from known and trusted sources the first time you start the application after Avast Premium Security or Avast Omni is installed. Application Rules are organized into groups, predefined according to application vendor. To add an application to an existing group:
- Open the Avast user interface and go to Protection ▸ Firewall.
- Click Application settings at the bottom of the screen.
- Click New application rule and select a group (vendor).
- Locate and select the executable file of the application you want to add.
- Click the group name, then use the orange bars to indicate the level of access you want to allow.
To create a new group, click New Group and provide a name for the group.
Adjust access restrictions
You can set connection allowances for each application or process to determine how strictly Firewall monitors incoming or outgoing communication.
Click a group (or vendor name) in the Application column, then use the orange bars in the Allowed connections column to set the authorization level for a specific application:
- One bar (Friends out): outgoing connections with Friends networks only.
- Two bars (Friends in/out): incoming and outgoing connections with Friends networks only.
- Three bars (Internet out): all outgoing connections to the internet.
- Four bars (Friends in and Internet out): incoming connections with Friends networks only, and all outgoing connections to the internet.
- Five bars: (All connections): all incoming and outgoing connections to the internet.
- To Block all connections for an application, hover your cursor over the orange bars and click the red block symbol that appears.
Set actions for unauthorized connections
In addition to defining the types of connections you authorize for applications or processes, you can also specify how Firewall behaves when it detects a non-authorized connection. To define Firewall behavior for a non-authorized connection:
- Click a group (or vendor name) in the Application column to open the list of applications or processes in that group.
- Select an application or process to expand its individual communication settings.
- Use the drop-down menu to manage the program's behavior. The following behaviors are available:
- Default rule: Firewall decides to allow or block connections based on the settings of the active Firewall Network profile (Private or Public).
- Auto-decide: Firewall allows connections with verified applications, but blocks connections from unknown or suspicious applications.
- Block: Firewall blocks all other connections.
- Ask: Firewall asks you to decide if you want to allow or block a connection each time a new request is received. Selecting this option may result in frequent and potentially obtrusive alerts.
- Private: a lower level of security suitable for when your PC is connected to a trusted network such as your home or work network. This profile enables better connectivity, and permits all communication within the network.
- Public: a higher level of security suitable for when your PC is connected to a public network such as in a cafe or airport. Because public networks present greater security risks, no incoming communication is permitted when this profile is set.
Specify authorized ports
Tighten rule restrictions even further by specifying the network ports each application uses for communication when an incoming or ongoing connection is allowed. To specify authorized ports:
- Click a group (or vendor name) in the Application column to open the list of applications or processes in that group.
- Select an application or process to expand its individual communication settings.
- Specify the Outbound ports and Inbound ports that you allow the application or process to communicate with. Specify ports in the following ways:
- Type specific port numbers into the text box. For multiple ports, separate each port number with a comma.
- Select All from the drop-down menu to authorize communication with all ports.
- Select a predefined port number from the drop-down menu.
- Optionally, configure Packet rules from the Application rules screen by following steps 1-2 above, then clicking Packet rules. While Firewall uses Application Rules to control traffic according to individual rules for programs or services, Packet rules can also be configured to control network traffic using specified connection parameters. Packet rules enable you to view and manage Firewall rules according to the information contained in network packets, such as network protocols, source or destination IP addresses, or local and remote ports.
443,80
. For information about the correct network port to specify for an application, contact the application vendor or refer to the application's documentation or support pages.Mac Settings For Projector
- Avast Premium Security 19.x
- Avast Omni 1.x
- Avast Premier 19.x
- Avast Internet Security 19.x
Server Settings For Outlook
- Microsoft Windows 10 Home / Pro / Enterprise / Education - 32 / 64-bit
- Microsoft Windows 8.1 / Pro / Enterprise - 32 / 64-bit
- Microsoft Windows 8 / Pro / Enterprise - 32 / 64-bit
- Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate - Service Pack 1, 32 / 64-bit