Email

Office 365 is a feature rich solution that keeps people connected to one another, and to documents and data. Intuitive tools for online meetings, file storage and sharing, and team collaboration make it easy to connect and collaborate with students, faculty and staff whenever, wherever.

First Time Logging In

Navigate to https://portal.office.com
Enter your full Detroit Mercy email address and password provided from Admissions.  
Follow the instructions to set up an authentication phone number, an authentication email address, or security questions.

Online Guides

Outlook Web App Guide
Email Encryption
Office 365 Learning Center

Open All | Close All

  •  

    Policies

  •  

    Email Etiquette

    Users new to email may not be familiar with some of the commonly accepted practices of email etiquette.

    First, most people do not appreciate forwarding of many messages. Often referred to as "spam," many “special messages” circulate around the internet and are more an annoyance than helpful.

    Messages that warn of certain activities should be validated prior to taking any external action. Most warnings and threats are false. Most attempts to validate personal information are a part of an attempt to collect information for identity theft purposes. Never click on a link from an email that is pressuring. Never provide any personal data at the request of another. Close a window by using the “X” box.

    If doubtful of the authenticity of a request, ask the webmaster of the company website to verify the request. Never simply click on a provided link as many spam messages contain false websites used to collect personal data. 

    Never include SSNs, a mother's maiden name, or any password within an email message. Email messages travel across public networks and are susceptible to interception along the way. 

    Never type a message in all capital letters. Typing in all capital letters is considered an electronic method of shouting at someone.

    Verifying email attachments are virus free is important. Many viruses generate email messages that spoof accounts (or appear to come from a different email address). Locating the computer or user doing this can be difficult. The ITS department suggests reviewing the headers of the message to analyze the route the message traveled and to contact the postmaster at the original domain account to request assistance.

  •  

    Data Transfer