Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Highlighting Certain Outlook Messages

Tip of the Week: Highlighting Certain Outlook Messages

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call Total Tech Care for any of your IT-related questions at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Passwords Windows 10 Chrome Virtualization Tech Term Social Media Gadgets Saving Money Holiday Microsoft Office Managed Service Managed IT Services Automation Operating System Computers Facebook Artificial Intelligence Cybercrime IT Support Hacking Internet of Things BYOD Mobile Device Management Health Wi-Fi Networking Managed Service Provider Spam Covid-19 Information Office 365 Telephone Systems Information Technology Alert Remote Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Data Breach Money Big Data Remote Monitoring Encryption Applications App History Law Enforcement Mobile Computing Application Human Resources Password Remote Computing Apps Blockchain Mobile Office Paperless Office How To Government Office Tips Training Private Cloud VPN Data Storage Patch Management Managed IT Servers Mouse HaaS Google Drive Data Security Flexibility Infrastructure Marketing Avoiding Downtime Voice over Internet Protocol Wireless WiFi IT solutions Entertainment Gmail Website Budget Settings Vulnerability Bring Your Own Device Windows 7 Word Data Management Two-factor Authentication Work/Life Balance Apple Social Vendor Management Vendor End of Support User Error Managed Services Education Physical Security Display Telephone System Staff Software as a Service Safety Meetings Machine Learning Sports HIPAA Remote Work Redundancy Connectivity Employee/Employer Relationship Keyboard Risk Management Hacker RMM The Internet of Things Lithium-ion battery USB Save Time Data Protection Conferencing Firewall Scam Cleaning Virtual Reality Botnet Business Technology Content Management IT Plan Network Congestion Access Control eWaste Battery Managed Services Provider Shadow IT Virtual Assistant Unsupported Software Legal Database Authentication Charger Internet Exlporer Remote Workers Compliance Wearable Technology OneNote Computer Care Processor PDF Retail Hard Drives Update Current Events Instant Messaging Virus Telephony Robot Excel Samsung Hard Drive Unified Threat Management Proactive IT Google Docs Biometrics Identity Theft Computer Accessories Best Practice Virtual Desktop Value Computing YouTube Spam Blocking Electronic Medical Records Black Market DDoS Augmented Reality Fraud Printer Hiring/Firing SharePoint Bluetooth Document Management Solid State Drive Digital Signage Wireless Technology Remote Worker How to Downtime Cryptocurrency Customer Service Environment Data storage IT Consultant Fax Server Business Intelligence Automobile Procurement Comparison Net Neutrality Workplace Strategy Audit Worker Help Desk SaaS CES IT Management Humor Computing Infrastructure Printing Going Green Wire Evernote Computer Fan Video Conferencing Rootkit ROI Reputation Streaming Media Shortcuts Tech Support IaaS Maintenance Sales Content Travel Bitcoin Bloatware Millennials Workers Personal Techology Benefits Cryptomining Laptop Printers Consultant Point of Sale Smart Office Wireless Charging FENG Analytics Supply Chain Management Customers Monitoring Audiobook Tablets IBM Batteries Entrepreneur Workforce Digitize Smart Technology Touchpad Virtual Private Network Flash Best Available Windows 8.1 WIndows 7 Cables Windows Server 2008 R2 Shortcut Software Tips Customer relationships Politics Supercomputer Advertising Email Best Practices Cost Management Telecommuting Emails IT Assessment Manufacturing Project Management Nanotechnology Sync Social Networking Cortana Notifications Managed IT Service Security Cameras Digital Signature Computer Tips Virtual CIO Netflix OneDrive Two Factor Authentication Biometric Security Warranty Running Cable HVAC User Google Apps Root Cause Analysis PowerPoint Peripheral Windows Media Player Relocation Using Data Music Analysis HBO Digital Security Cameras Memory Knowledge Copiers Video Games 5G Administrator Devices Skype Enterprise Content Management Managing Stress Data loss Quick Tip Worker Commute Troubleshooting Smartwatch MSP Accountants Outlook Ergonomics Experience Leadership Start Menu Credit Cards Cameras Development Scalability OLED Microchip Thought Leadership Password Management Password Manager Screen Mirroring PCI DSS Business Owner Science Loyalty Virtual Machine Fiber Optics Books Employee NarrowBand Frequently Asked Questions 2FA Multi-Factor Security Twitter Mobile Windows 10s Messaging Search Cabling Search Engine Distributed Denial of Service NIST Customer Relationship Management Business Mangement Cast Policy Hypervisor iPhone Trending webinar Trend Micro Emergency Smart Tech Tip of the week Dark mode Analyitcs Addiction Professional Services Programming Amazon Public Cloud Printer Server SMS Employer Employee Relationship Default App Recycling Procedure Assessment Saving Time Files Shopping Google Search Chromecast Wiring Practices Windows Server 2008 dark theme Cache Tools Amazon Web Services AI IT Infrastructure Antivirus Bing Uninterrupted Power Supply Safe Mode Criminal FinTech Windows 8 Television Colocation Social Network GDPR IT service Hosted Computing Wireless Internet Online Shopping Investment Monitor File Sharing Employees Tablet Public Computer Employee/Employer Relationships Specifications Transportation ISP Camera Domains Inventory Regulations Windows 365

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code