Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Highlighting Certain Outlook Messages

Tip of the Week: Highlighting Certain Outlook Messages

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call Total Tech Care for any of your IT-related questions at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Virtualization Tech Term Social Media Saving Money Holiday Gadgets Chrome Managed Service Automation Managed IT Services Microsoft Office Computers Facebook Cybercrime Artificial Intelligence Operating System BYOD Internet of Things Mobile Device Management Health Networking IT Support Wi-Fi Hacking Information Telephone Systems Information Technology Remote Alert Managed Service Provider Spam Office 365 Covid-19 Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Encryption Applications App Data Breach History Mobile Computing Law Enforcement Application Human Resources Password Remote Monitoring Big Data Money Office Tips Training Government VPN Private Cloud How To Remote Computing Managed IT Mobile Office Apps Blockchain Paperless Office Data Storage Patch Management Windows 7 Word Flexibility Google Drive Marketing Wireless Infrastructure Servers Voice over Internet Protocol WiFi IT solutions Entertainment Website Gmail Avoiding Downtime Budget Settings Data Security Two-factor Authentication Bring Your Own Device Data Management Mouse Work/Life Balance HaaS Vulnerability Education Physical Security Scam Connectivity Remote Work Safety Risk Management Hacker Employee/Employer Relationship HIPAA Sports Redundancy RMM Keyboard The Internet of Things Vendor Management Lithium-ion battery USB Data Protection Firewall Save Time Virtual Reality Apple Social Cleaning Vendor User Error Meetings Managed Services Staff Conferencing Software as a Service Display Telephone System End of Support Machine Learning Excel Update Robot Unified Threat Management Audit Internet Exlporer Worker Computer Accessories Biometrics IT Management Hard Drive Google Docs Virtual Desktop Botnet PDF Identity Theft IT Plan Computing DDoS Proactive IT SharePoint Printer Unsupported Software Best Practice Bluetooth Augmented Reality Fraud YouTube Charger Black Market Digital Signage Compliance Remote Worker Customer Service Environment OneNote Computer Care Current Events Cryptocurrency Document Management Telephony IT Consultant Fax Server Solid State Drive Wireless Technology Samsung Downtime How to Procurement Comparison Net Neutrality SaaS Workplace Strategy Humor Value Data storage Help Desk CES Automobile Printing Spam Blocking Electronic Medical Records Network Congestion eWaste Business Technology Content Management Access Control Computing Infrastructure Hiring/Firing Managed Services Provider Going Green Virtual Assistant Authentication Database Battery Remote Workers Wearable Technology Retail Hard Drives Shadow IT Virus Instant Messaging Legal Business Intelligence Processor Digital Signature Managed IT Service Windows Media Player Security Cameras User Running Cable Computer Tips PowerPoint Warranty Virtual CIO Politics OneDrive Memory Advertising Biometric Security Public Computer HVAC Peripheral Google Apps Regulations Analysis Using Data Notifications Transportation Managing Stress Digital Security Cameras Administrator Devices Copiers Computer Fan 5G Rootkit Enterprise Content Management Quick Tip Cameras Accountants Science Relocation Workers Smartwatch Benefits MSP Ergonomics Microchip Thought Leadership Development FENG Credit Cards OLED IBM Password Management PCI DSS Video Games Password Manager Virtual Machine Worker Commute Flash Fiber Optics Multi-Factor Security Employee Smart Technology Distributed Denial of Service 2FA Customer Relationship Management Search Engine Experience Twitter Messaging Analyitcs Cabling Supercomputer NIST Policy Printer Server Programming Scalability Software Tips Business Mangement Hypervisor Business Owner Sync Smart Tech Trend Micro Emails Trending Dark mode Addiction SMS Amazon Default App NarrowBand Antivirus Procedure Search Recycling Saving Time Practices Shopping Windows 8 iPhone Netflix Google Search Two Factor Authentication Wiring dark theme IT service Cache AI Root Cause Analysis Amazon Web Services IT Infrastructure Knowledge Bing Music Safe Mode FinTech HBO Criminal Skype Hosted Computing Social Network Tablet Files GDPR Domains Wireless Internet Data loss Online Shopping Investment Chromecast Leadership Troubleshooting File Sharing Employees Outlook Employee/Employer Relationships Start Menu Inventory Colocation Specifications ISP Uninterrupted Power Supply IaaS Camera Windows 365 Maintenance Consultant Wire Video Conferencing Bloatware Screen Mirroring Evernote ROI Loyalty Monitor Travel Shortcuts Books Sales Analytics Frequently Asked Questions Bitcoin Mobile Personal Tablets Windows 10s Millennials Cryptomining Printers Point of Sale Best Available Smart Office Supply Chain Management Entrepreneur Cast Wireless Charging Reputation webinar Streaming Media Emergency WIndows 7 Monitoring Tip of the week Batteries Virtual Private Network Windows 8.1 Shortcut Content Professional Services Digitize Public Cloud Workforce Tech Support Employer Employee Relationship Cost Management Techology Cables Windows Server 2008 R2 Laptop Assessment Windows Server 2008 Customers Customer relationships Social Networking Project Management Email Best Practices Audiobook Tools Nanotechnology IT Assessment Telecommuting Manufacturing Touchpad Television Cortana

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code