Adding an Exchange Email Account to your Android Phone

Jess Watters
Jessica Watters

Below are the instructions for adding your Exchange Email Account to your Android Phone. If you have any questions or problems, please contact us.

  1. Touch Apps.
  2. Touch Settings.
  3. Scroll to and touch Accounts.
  4. Touch Add Account.
  5. Touch Microsoft Exchange ActiveSync.
  6. Enter your workplace email address.
  7. Touch Password.
  8. Enter your email account Password.
  9. Touch Next.
  10. Touch Domain\username.
  11. Leave the Domain blankJust type in \username. This is the first part of your email address before the “@” sign.
  12. Scroll to and touch Exchange Server.
  13. Enter the Server address. (The Server for Office 365 is: outlook.office365.com)
  14. Touch Next.
  15. Touch OK.
  16. Wait while the phone verifies the account.
  17. Touch OK.
  18. Scroll down and touch Next. Some options will be pre-selected. You can change any of the displayed options before proceeding.
    <
  19. Touch Activate.
  20. Edit the Account Name if desired.
  21. Touch Done.
  22. The email account has been added. To view the email account, press the Home button.
  23. Touch Apps.
  24. Touch EmailYour email will sync to your phone once you touch the Email button.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Tips for Human Resilience

New Mini Podcast: Tips for Human Resilience Airiam is excited to announce our new mini podcast, “Tips for Human Resilience”! Alternating with our normal podcast, we’re launching our series focused on helping leaders in the workforce help their organiza
Vivian Lee
>>Read More

Cyber Resilience vs. Cybersecurity: Key Differences

Cyber resilience and cybersecurity get bunched together in discussions around digital protection, but they are two separate philosophies. Both are important to understand and implement in your organization. There are overlaps in the implementation of b
Jesse Sumrak
>>Read More

Webinar: How to Identify Vulnerabilities and Patch Systems

  The exploitation of software vulnerabilities is a top method threat actors use to deploy ransomware, breach data, and commit other illicit activities. Patching your systems is one of the ways to eliminate this threat. Watch the webinar recording
Avatar photo
Bill Bowman
>>Read More