Lotus Notes - iNotes Email
Students can access their email through webmail or forward their email to a client.To access your email from the web, you can go to the university's home page, then choose Email from the navigation bar at the top of the page in the "Login" section. You can also get to your webmail by typing in https://webmail.ncat.edu in your browser address bar. Login using the email user name and password given to you.Be sure to allow pop-ups for the University email page.By clicking on the Mail tab and pulldown menu, you will have access to most of your routine email tasks.
- Log in to your email account.
- From the "Tools" menu on the left-hand side, choose "Rules".
- Give the rule a name (e.g. "Forward Email").
- Click "New Rule".
- From the "Create conditions" dropdown list, choose "send copy to".
- In the "to" box immediately below the "Create conditions" section, enter the email address that you wish to use for forwarding purposes.
- Click "OK" to create the rule.
Students are provided with 500MB of storage space for email messages. You can receive files up to the amount of space you have available in your mailbox. The following items contribute to your mailbox quota:
- Sent Mail
- Deleted Items
- Junk Mail
- Calendar Entries
- Deleted Items
- Additional Subfolders
So that you do not reach your email storage quota, regularly delete messages and save attachments to your hard drive or an alternate storage device such as a CD or jump drive.
- When you reach 80% of your quota, you will receive a warning message in your Inbox
When you reach 100%, you will be able to receive mail but will be unable to send mail until you delete unnecessry messages and empty your Deleted Items folder to free up space.
To be able to view attachments and allow webmail to function fully using the MS Explorer browser, the user must add https://webmail.ncat.edu to the browser's list of trusted sites. To do this:
- Navigate to https://webmail.ncat.edu.
- From your browser menu, click on Tools, then Internet Options.
- On the Internet Options window that comes up, click on the
- Click on the Trusted Sites icon.
- Click the Sites button.
- Click on the Add button to add https://webmail.ncat.edu to Trusted sites.
- Click on the OK button on the Trusted Sites window.
- Click on OK on the Internet Options window.
Good Email Habits
- Delete messages from your InBox and/or your Deleted, Drafts and Sent folders regularly.
- Save large email attachments to your hard drive or on CD.
- Your @ncat.edu email account is an official means of communication from the University. Check it often.
Bad Email Practices
- Do not forward virus hoaxes or chain letters.
- Limit the use of personal and confidential information via email.
- Do not send or reply to SPAM.
- Do not send email containing libelous, defamatory, offensive, racist or obscene remarks or participate in unlawful communications such as threats of violence, obscenity, child pornography or harassment.
What About SPAM?
NC A&T uses one of the highest rated SPAM filtering systems available and our SPAM filters are adjusted almost daily - sometimes more often.
SPAMmers are constantly evolving their message formats in order to fool SPAM filters. Their goal is to develop a format that looks so much like legitimate email that the probability of delivery to the recipient is close to 100%. Because of these ever evolving formats, Aggie Tech Support is faced with the constant dilemma of blocking as much SPAM as possible without blocking legitimate email.
Delete SPAM messages when you receive them. You can also set the Junk E-mail filter in Outlook Web Access to drop the messages upon receipt or automatically file them in a junk folder in case you need to review them at a later time.
We realize that a single SPAM message is a nuisance and more than one is an aggravation, especially when it happens day after day. Unfortunately, SPAM is a fact of email life that will not be resolved as long as SPAMmers can profit and the global Internet community fails to take effective action.
Email and Viruses
Viruses are frequently spread in executable files attached to email messages.
The University prevents the spread of malware within the University network by blocking all incoming email with executable file attachments, including compressed executable attachments. Occasionally additional file formats are blocked if there is a particular outbreak infecting computers. There are no such restrictions for outgoing email messages.
Theft and Phishing
Thieves send thousands of email messages every day posing as legitimate, often well-known companies such as banks, e-retailers, and credit card companies in an attempt to get the recipients to reveal personal information. This information can then be used to steal consumers' personal identity data and financial account credentials.
Legitimate businesses don't send email messages asking you to reveal bank or credit card account information and passwords. It's best to delete these messages. If in doubt check with the business, but do not use any of the Internet links or telephone numbers provided in the suspicious message.