Adding an Exchange Email Account to your Android Phone

Vivian Lee

Below are the instructions for adding your Exchange Email Account to your Android Phone. If you have any questions or problems, please contact us.

  1. Touch Apps.
  2. Touch Settings.
  3. Scroll to and touch Accounts.
  4. Touch Add Account.
  5. Touch Microsoft Exchange ActiveSync.
  6. Enter your workplace email address.
  7. Touch Password.
  8. Enter your email account Password.
  9. Touch Next.
  10. Touch Domain\username.
  11. Leave the Domain blankJust type in \username. This is the first part of your email address before the “@” sign.
  12. Scroll to and touch Exchange Server.
  13. Enter the Server address. (The Server for Office 365 is: outlook.office365.com)
  14. Touch Next.
  15. Touch OK.
  16. Wait while the phone verifies the account.
  17. Touch OK.
  18. Scroll down and touch Next. Some options will be pre-selected. You can change any of the displayed options before proceeding.
    <
  19. Touch Activate.
  20. Edit the Account Name if desired.
  21. Touch Done.
  22. The email account has been added. To view the email account, press the Home button.
  23. Touch Apps.
  24. Touch EmailYour email will sync to your phone once you touch the Email button.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Airiam Partners with UnderDefense to Set a New Benchmark for Cyber Resilience

[March 28, 2024] – Airiam, a leader in cybersecurity and resilience solutions has today announced its partnership with an innovative Managed Detection and Response (MDR) provider, UnderDefense, to set a new benchmark for cyber resilience in businesses.
Vivian Lee
>>Read More

Cyber Resilience vs. Cybersecurity: Key Differences

Cyber resilience and cybersecurity get bunched together in discussions around digital protection, but they are two separate philosophies. Both are important to understand and implement in your organization. There are overlaps in the implementation of b
Jesse Sumrak
>>Read More

Pentesting: What It Is, How It Works & Ways to Do It (Right)

Cyber attacks happen every 39 seconds. Sure, most business leaders know they need protection, but too many still operate in reaction mode: wait for a breach, then scramble to fix it. That approach is becoming downright dangerous as attackers get more s
Vivian Lee
>>Read More