Integrations
/
Outlook Add-in
Integrations
/
Outlook Add-in
Integrations
/
Outlook Add-in

Integrations

Outlook Add-in

Written by

Toni Barthel

Published

Jan 4, 2025

Integrations

Outlook Add-in

Written by

Toni Barthel

Published

Jan 4, 2025

Integrations

Outlook Add-in

Written by

Toni Barthel

Published

Jan 4, 2025

Our Outlook extension offers a seamless way to analyze emails for potential data leaks and protect sensitive information before sending. Every component of your email—including recipient addresses (To, CC, BCC), subject line, message body, and attached files—is thoroughly scanned for potential security violations.

After the analysis is complete, you retain full control over your email. For each element (recipient, subject, message body), you can choose to either use the redacted (cleaned) version or keep the original content. When it comes to attachments, you can decide whether to retain the file or remove it from the email entirely. This granular control allows you to make informed decisions on a case-by-case basis for each part of the email and its attachments.

If you choose to send original content containing sensitive information despite receiving a warning, the extension requires you to provide a justification comment. This comment is mandatory for every field or file where sensitive content is retained, ensuring transparency and accountability whenever sensitive information is shared.


Configuring the Outlook Add-In

To activate and use the Outlook Add-In, administrators must configure it as part of the integration process. As detailed in the Integration Setup Guide, the add-in follows the standard steps for adding integrations within the platform. The integration also requires specific policies to function correctly, which can be established by referring to the Policy Guide.

Once installed, the Outlook Add-In mandates user authentication. If a user does not sign in after installation, the add-in blocks outgoing emails until authentication is completed. This ensures that all email activity is monitored and controlled within the security framework of 1Protection.AI.


Installation

Administrators can access the latest manifest.xml file for the Outlook Add-In from the Integrations page within the platform. The installation process may vary slightly depending on the operating system (Windows or Mac). Below are detailed instructions for both environments.


Windows Installation

  1. Launch Outlook on your Windows PC.

  2. In the Outlook ribbon, locate and click the Get Add-Ins button under the Home tab.

  3. If the button is not visible, navigate to File > Options > Add-Ins and click Manage Add-Ins.

  4. In the Add-Ins management screen, select + Add a custom add-in.

Option A: Add via URL

  • In the Manage Add-Ins screen, click + Add from URL.

  • Enter the following URL for the manifest file:
    https://outlook.1protection.ai/manifest.xml

Option B: Add via File

  • Download the manifest.xml file from the Integrations page.

  • In the Manage Add-Ins screen, click + Add from File and select the downloaded manifest file.

  • Click Install and wait for the add-in to install.

  • Restart Outlook to ensure the add-in is correctly loaded.


Mac Installation

  1. Launch Outlook on your Mac.

  2. In the top menu bar, click Tools.

  3. From the dropdown, select Get Add-Ins to open the management screen.

  4. Select + Add a custom add-in.

Option A: Add via URL

  • In the Manage Add-Ins screen, click + Add from URL.

  • Enter the following URL for the manifest file:
    https://outlook.1protection.ai/manifest.xml

Option B: Add via File

  • Download the manifest.xml file from the Integrations page.

  • In the Manage Add-Ins screen, click + Add from File and select the downloaded manifest file.

  • Click Install and wait for the add-in to install.

  • Restart Outlook to ensure the add-in is correctly loaded.


Deployment at Scale

For larger organizations, deploying the Outlook Add-In across multiple clients is recommended. This method ensures consistency and simplifies the management process. Deployment can be handled centrally through IT departments using group policy or enterprise-level deployment tools. Since every organization’s IT environment is different, administrators are advised to consult with their IT teams for the most efficient deployment method.

For further assistance or if your organization requires tailored deployment support, please contact our team. We are happy to provide guidance and help streamline the installation process to fit your organization’s unique infrastructure.