Step 1: Outlook's S/MIME

Here is a guide to take you step-by-step to easy e-mail encryption focusing on the most common type: Microsoft Outlook's S/MIME.

The most common form of mail encryption used in Microsoft Outlook is Outlook's own S/MIME encryption, which can...

be used to sign or encrypt e-mail (or both). When you sign a message with your key, it can be verified against your key to ensure that you did indeed create and send the message in question. However, S/MIME requires a certificate issued by a proper certification authority to work correctly.

If your organization has Windows 2000 Server or Windows Server 2003 with Certificate Services installed, you can generate certificates yourself for signing e-mail. You can also buy certificates from a certification authority, such as VeriSign. However, many people don't have the option of generating or buying certificates, usually because the cost is prohibitive. In such a case, you can use free tools to sign and encrypt e-mail using a system called public/private keys.

Simple e-mail encryption

 Home: Introduction
 Step 1: Outlook's S/MIME
 Step 2: Public keypairs
 Step 3: GnuPG and WinPT: Setup
 Step 4: Encrypting e-mail in WinPT
 Step 5: Verifying signed e-mail in WinPT
 Step 6: Extras: Symmetric encryption and hotkey commands


More information from

This was first published in November 2005

Dig Deeper on Endpoint security management tools



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: