Email Setup for Android

This tutorial is for anyone that wants to set up their Dartmouth email on an Android-powered device (phone, tablet, etc). The images used are from a Google Nexus 7 running Android OS KitKat (4.4.4). If you have questions or issues, please contact us.

  • NOTE: Because of the varying “skins” applied by manufacturers of Android devices, your screens may appear different than what is in this tutorial.
  • From your Home Screen, tap the center icon that allows you to see all of your apps.
  • Screenshot_2014-08-21-13-45-16

  • Select the Email app.
  • Screenshot_2014-08-21-13-48-04

  • Type in your full Dartmouth email address and tap Manual Setup.
  • Screenshot_2014-08-21-13-48-53

  • Select Exchange as the Account Type.
  • Screenshot_2014-08-21-13-49-12

  • Enter your Dartmouth password and tap the arrow to continue.
  • Screenshot_2014-08-21-13-49-22

  • On this next screen, change your username from your email address to Your password should be what you entered on the previous screen, so you can leave it alone. The server name is Change the Security Type to SSL/TLS (Accept all certificates). Finally, change the port to 993. Tap the arrow to continue.
  • Screenshot_2014-08-21-13-54-42

  • A popup will appear regarding Remote Security Administration. This is due to the fact that Exchange is an enterprise-level email system and has the capability of remote wiping your phone if it were to be lost or stolen. It may sound extreme or invasive, but no more so than the remote wipe feature of ‘Find my iPhone’ and various security tools for Android like Lookout. Select OK


  • Select which Account Options you’d like regarding what to sync, how often, and from how far back in time.
  • Screenshot_2014-08-21-14-27-47

  • This next screen is the scary looking one. It’s the one that actually asks for your permission to do what I described above. It asks if you will allow the Exchange server to be able to control some of the security features of your phone like being able to remotely erase the data, set up password rules, monitor failed login attempts, etc. There’s nothing wrong with this, but it’s always up to you in how you want to proceed with your device and security.


  • If you accepted the provision above, you’ll receive a screen stating that you are all done.
  • Screenshot_2014-08-21-14-33-24