Possible Outlook rule?

Is it possible to set up an outlook rule which will send a pre written message to another address when an email is received with an attachment over 20mb?

I have been racking my brain and the rules wizard with no luck, I can only get the rule to send the message back to the original sender address?

Apologies if this is in the wrong place,


Auto-Reply On Outlook

I get encrypted messages from hospitals as part of my career. Whenever a hospital sends me an encrypted e-mail, it comes through as a no-reply email from like a third-party encrypter. Ex( Email from noreply@somename.com “you’ve recieved a message from sos@gmail.com”. I want to be able to have a Auto-Reply for when i’m out of office. Is this possible to auto reply to the sos@gmail.com if I received the email from noreply@somename.com?

Connect Sharepoint calenders to outlook, can we modify the sharepoint calender from outlook

I have a sub-site inside a sharepoint on-premises 2013 team site, and i have enabled the “Offline Synchronization for External Lists” site feature. now from the sharepoint calendar >> I click on “Connect to outlook” , as follow:-

enter image description here

and i got the calendar inside my out look, as follow:-

enter image description here

but the issue is that i am unable to modify the sharepoint calendar from my outlook, as when hover over a date inside outlook, i did not get the “+ ADD” link. also when i did the connect >> i got this dialog which mentioned that my permission will be Read on the calendar (so is this related to my issue that i can not modify the sharepoint calendar from my outlook):- enter image description here

Outlook rule to forward all emails – is that a common scam?

Recently we had a security problem. One email account which is based on MS Exchange 365 was hacked and the hacker forwarded all emails per rule to a Gmail account.

I checked all relevant PCs and I didn’t find any viruses. And I changed the passwords. But in this case changing the passwords didn’t change anything because the rule which forwarded all the emails also worked after I changed the passwords. The forwarding only stopped once I discovered that such a rule was setup and then I deleted the rule.

How common is this hack? I never heard or read about it before. It is also still a mystery for me how the attacker accessed the email account. Probably he stole the password somewhere but I can’t figure out how.

How to fix send receive error outlook 365? | +1-866-535-7333 in USA

The send receive error outlook 365 has become a common error nowadays. And to fix it takes time as it involves many techniques. To help you not waste your time we have found ways to fix the problem. It is obviously a great ultimatum to repair the outlook PST but still, we would fix it.

We all know that the MS outlook provides support to many functions and is so essential for emailing the…

How to fix send receive error outlook 365? | +1-866-535-7333 in USA

Microsoft Outlook Vulnerability CVE-2018-8587 – How likely is exploitation?

I found an interesting blog post A Deep Analysis of the Microsoft Outlook Vulnerability CVE-2018-8587 about Microsoft Outlook heap buffer overflow vulnerability where is described how Microsoft Outlook can be exploited by using specially crafted mail classification rules file (RWZ).

To reproduce this vulnerability, we need to run Microsoft Outlook, then click “Rules => Manage Rules&Alerts => Options => Import Rules” and select the PoC file which causes Outlook to crash.

enter image description here

In the end they are writing:

Applying this patch is critical since an attacker who successfully exploits this vulnerability could use a specially crafted file to perform actions in the security context of the current user.

But how likely is that someone could exploit this vulnerability? I mean an attacker needs to send this malicious file to a user who needs to actively import this file which exploits this heap buffer overflow bug. It seems to me completely different from such attacks where an attacker sends a malicious PDF document which exploits some vulnerability in Adobe Reader. Here you need to actively hack yourself (similar to self-XSS in web security).

Even Microsoft states:

To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Outlook software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

So this bug seems to be somewhat useless and very unlikely to exploit?