If your Outlook Web App looks like the image below , you’re using the light version of Outlook Web App. This could be because you selected the option to use the light version, or because you’re using a web browser that doesn’t support the standard version of Outlook Web App.
The light version of Outlook Web App is simpler in both appearance and function than the standard version of Outlook Web App. In addition, because it is HTML-based, it works better with assistive technologies such as screen readers. However, there are fewer security features available in the light version.
The ability to access your mailbox from a public computer or Internet kiosk can be very useful if you do much traveling. But using public computers can put the privacy of your data, your identity, and your security credentials at risk. There are precautions you can take to help protect your data and your privacy when you access your mailbox from a public computer.
I don't want the light version of Outlook Web App. Where is the standard version?
If you didn't choose the light version, just sign out and then use a supported browser to sign back in.
If you did choose the light version from an option, here's how to get back to the standard version of Outlook Web App:
In the light version, go to Options > Outlook Web App version.
Clear the Use the light version of Outlook Web App check box.
Sign out of the light version, close your browser, and then sign in again using a supported browser. You may need to close all open browser windows before you sign in again.
In this article
Traveling with Outlook Web App
You can use Outlook Web App on any computer that has a web browser and an Internet connection. Internet cafes, libraries, and public access terminals, such as Internet kiosks, offer Internet access to patrons at little or no charge. But because the computers that provide this service are available to the public, you need to take precautions to help protect your data and your privacy.
We strongly recommend that you use Outlook Web App only in locations that you trust.
Sign in and sign out
There are some simple steps you can take to protect your account when using a computer or device other than your own.
Make sure no one watches you type your user name and password when you sign in.
Never select an option that lets you save your name or password for later use. Even if you plan to use the same computer over the course of several days, always type your name and password.
Sign out from your mailbox when you finish using it. Signing out helps prevent someone else from using the computer to access your mailbox.
Close the browser.
What about messages and attachments?
Before you open a message, make sure it's from someone you trust and are expecting an email message from.
Open attachments only from people you trust.
The best option for opening an attachment when you're using a public computer is to click the Open as Web Page (or Open in browser) link next to the attachment name. This protects you from potential virus attacks and prevents a copy of the attachment from being created on the computer.
If you want to open an attachment directly instead of as a web page, save it to a folder or a location that you can easily find, such as the Desktop, and then open it from that location. Most browsers give you an option to open the file or save it to disk when you click the link for the attachment. When you finish using the computer, you can delete the attachment and empty the Recycle Bin or trash.
Junk email and phishing
Junk email, also known as spam, can strain networks, clog email servers, and fill mailboxes with unwanted and possibly offensive messages and images.
Hidden links to external content, also known as web beacons, are automatically blocked. Web beacons can alert junk email senders to your presence and make you the target of even more junk email messages.
For more information about how to manage junk email, see Options > Junk email.
Phishing is a specific kind of junk email that's used to obtain private information for use in identity theft and other scams. A phishing email message appears to come from a trusted source, such as your bank, and frequently includes the business logo and an apparently legitimate reply address for the trusted source. These email messages are designed to trick you into giving confidential information to the sender that you wouldn't ordinarily send over the Internet. This is usually information that a legitimate business would never request through an email message.
Phishing messages are identified on the information bar, regardless of which folder they're located in. You should exercise caution with a message identified as a possible phishing message.
Junk Email folder
Mail identified as possible junk email is automatically moved to the Junk Email folder, and any active content within the message, such as links or executable code, is disabled. Any message in the Junk Email folder can be marked as legitimate by selecting the message and then clicking Not Junk on the toolbar. When this button is clicked on a selected message, the message is moved to the Inbox.
Note: When you click Empty Junk Email, the contents of the Junk Email folder are permanently deleted.