Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Highlighting Certain Outlook Messages

Tip of the Week: Highlighting Certain Outlook Messages

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call Total Tech Care for any of your IT-related questions at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Chrome Tech Term Virtualization Saving Money Gadgets Holiday Social Media Managed IT Services Automation Managed Service Microsoft Office Cybercrime Computers Artificial Intelligence Facebook Operating System Health Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Hacking Remote Spam Alert Office 365 Telephone Systems Covid-19 Information Managed Service Provider Information Technology Recovery Employer-Employee Relationship Router BDR Bandwidth Social Engineering Mobility Applications Human Resources Data Breach Mobile Computing Law Enforcement Remote Monitoring Application Password App History Money Big Data Encryption Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Managed IT Blockchain How To Paperless Office Office Tips Apps Training VPN Voice over Internet Protocol Google Drive Settings Vulnerability Flexibility Windows 7 Word Two-factor Authentication Marketing WiFi Avoiding Downtime Servers IT solutions Entertainment Mouse HaaS Website Budget Data Security Bring Your Own Device Data Management Work/Life Balance Wireless Gmail Infrastructure Safety Conferencing HIPAA Sports Firewall Redundancy Scam Keyboard Virtual Reality Apple Data Protection Social Vendor Management USB User Error Save Time Meetings Vendor Cleaning Risk Management Managed Services Telephone System Staff Hacker Software as a Service Display Machine Learning The Internet of Things Remote Work Connectivity End of Support Lithium-ion battery Employee/Employer Relationship Physical Security Education RMM Customer Service Computing Virus Environment PDF Augmented Reality Fax Server Business Intelligence Unified Threat Management Computer Accessories Fraud Audit Proactive IT Worker SaaS Remote Worker IT Management Digital Signage Best Practice Cryptocurrency Botnet YouTube IT Plan Black Market Printer Network Congestion Bluetooth eWaste Procurement Workplace Strategy Unsupported Software Comparison Net Neutrality Document Management CES Solid State Drive Help Desk Wireless Technology Charger Printing How to Downtime Compliance IT Consultant Wearable Technology Business Technology Content Management OneNote Computer Care Data storage Current Events Retail Access Control Hard Drives Automobile Telephony Instant Messaging Managed Services Provider Virtual Assistant Humor Robot Excel Samsung Authentication Database Biometrics Computing Infrastructure Virtual Desktop Remote Workers Going Green Value Processor Spam Blocking Electronic Medical Records DDoS Update Battery SharePoint Hard Drive Shadow IT Hiring/Firing Legal Google Docs Identity Theft Internet Exlporer MSP Ergonomics Accountants Smartwatch Assessment Credit Cards OLED Notifications Microchip Thought Leadership Development Windows Server 2008 User Antivirus Password Management PCI DSS Tools PowerPoint Password Manager Virtual Machine Windows Media Player 2FA Fiber Optics Windows 8 Multi-Factor Security Employee Television Cabling Relocation Search Engine IT service Twitter Messaging Managing Stress NIST Policy Business Mangement Hypervisor Dark mode Smart Tech Trend Micro Video Games Tablet Trending Public Computer Regulations Cameras Amazon Default App Transportation Domains Addiction SMS Worker Commute Procedure Experience Recycling Saving Time Computer Fan Rootkit IaaS Wiring dark theme Maintenance Practices Shopping Scalability Google Search Bloatware Amazon Web Services IT Infrastructure Workers Benefits Cache AI Business Owner Safe Mode FinTech Criminal FENG Bing NarrowBand IBM GDPR Hosted Computing Social Network Search Tablets Flash Printer Server Entrepreneur Online Shopping Investment iPhone Smart Technology Wireless Internet File Sharing Employees Employee/Employer Relationships Supercomputer Camera Windows 365 Shortcut Inventory Software Tips Specifications ISP Sync Cost Management Evernote ROI Files Emails Wire Video Conferencing Sales Social Networking Bitcoin Travel Shortcuts Chromecast Printers Point of Sale Personal Millennials Cryptomining Wireless Charging Colocation Netflix Uninterrupted Power Supply Two Factor Authentication Smart Office Supply Chain Management Running Cable Monitoring Batteries Root Cause Analysis Monitor Knowledge Music Virtual Private Network Windows 8.1 Digitize HBO Memory Workforce Skype Cables Windows Server 2008 R2 Customer relationships Data loss Reputation Leadership Streaming Media Troubleshooting Project Management Email Best Practices Consultant Nanotechnology IT Assessment Outlook Telecommuting Manufacturing Content Start Menu Analytics Cortana Tech Support Computer Tips Digital Signature Managed IT Service Techology Screen Mirroring Science Security Cameras Laptop Loyalty Biometric Security Customers Books Warranty Virtual CIO Best Available OneDrive Frequently Asked Questions HVAC Peripheral Audiobook Mobile Google Apps Windows 10s WIndows 7 Distributed Denial of Service Digital Security Cameras Customer Relationship Management Analysis Using Data Cast Touchpad Analyitcs 5G webinar Emergency Administrator Devices Copiers Tip of the week Enterprise Content Management Quick Tip Politics Professional Services Programming Advertising Public Cloud Employer Employee Relationship

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code