Search7 Results

There are times when people need temporary access to the network, but they are not regular students or instructors.   Typically, people making a presentation or running short-term course need to use the machines but have no login available, so a temporary login is created with an expiry in the near future. These logins have much the same rights as Student logins, including access to Lab machines, licenses for Office365, or access to eduroam WiFi
Students-Getting started, the first steps for new Students.
Microsoft 365 (M365) is a subscription based suite of applications available via the cloud or for download to a local device. Okanagan College employees and currently enrolled students have access to this service. This educational subscription includes access to the core Office products (Word/Excel/PowerPoint/OneNote) as well as cloud based services such as Outlook, Teams and OneDrive. Additional products may be available for download. Both staff and student email services are through M365.
M365's Outlook / Exchange Online Protection will automatically scan incoming email for bulk, spam, phishing and malware (viruses) and automatically quarantine suspicious emails preventing them from appearing in your Inbox. The system will notify you of these suspicious packages and give you opportunity release items the algorithm may have misidentified or permanently block the sender.
Teams has all the features you're used to using with telephones, including voicemail, call forwarding, and much more. Teams calling is calibrated to work with the OC switchboard. Wherever you have Internet access this service allows you to connect to your phone local from any device, desktop, laptop or cell phone that you can connect to Teams with; on or off campus.
When you accidentally delete an email message in Outlook on the web you can recover the message if it's still in your Deleted Items folder. In some cases, you can even recover items after the Deleted Items folder is emptied.
Use the Block or Allow settings to help control unwanted and unsolicited email messages by creating and managing lists of email addresses and domains that you trust and those that you don’t.