Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Highlighting Certain Outlook Messages

Tip of the Week: Highlighting Certain Outlook Messages

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call Total Tech Care for any of your IT-related questions at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Cloud Computing Server Save Money Passwords Windows 10 Social Media Gadgets Saving Money Holiday Chrome Tech Term Virtualization Automation Managed Service Microsoft Office Managed IT Services Artificial Intelligence Cybercrime Operating System Computers Facebook Internet of Things BYOD Mobile Device Management Networking Health Wi-Fi IT Support Hacking Information Technology Alert Covid-19 Information Managed Service Provider Spam Office 365 Telephone Systems Remote Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Application Human Resources Password Money Big Data Encryption Remote Monitoring Applications Data Breach App Mobile Computing History Law Enforcement Private Cloud VPN How To Managed IT Blockchain Paperless Office Remote Computing Apps Data Storage Patch Management Mobile Office Government Office Tips Training Data Security Website Budget Gmail Settings Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Mouse Vulnerability HaaS Infrastructure Windows 7 Voice over Internet Protocol Word Google Drive Flexibility Servers Marketing Avoiding Downtime WiFi Wireless IT solutions Entertainment Lithium-ion battery USB Save Time Vendor Firewall Managed Services Telephone System Staff Software as a Service Display Cleaning Machine Learning Virtual Reality Apple Remote Work Connectivity Social Conferencing Employee/Employer Relationship End of Support RMM Scam User Error Education Physical Security Safety Meetings Sports HIPAA Redundancy Vendor Management Keyboard Risk Management Hacker Data Protection The Internet of Things SharePoint CES Current Events Help Desk Document Management Telephony Printing Solid State Drive Wireless Technology Samsung Business Technology How to Content Management Downtime Customer Service Access Control Environment Managed Services Provider Value IT Consultant Virtual Assistant Data storage Spam Blocking Database Electronic Medical Records Fax Server Automobile Authentication Humor Remote Workers Computing Infrastructure Hiring/Firing SaaS Processor Going Green Update Hard Drive Network Congestion eWaste Battery Google Docs Identity Theft Shadow IT Legal Business Intelligence Computing Audit Internet Exlporer Worker IT Management Wearable Technology Virus Augmented Reality PDF Fraud Retail Botnet Hard Drives Unified Threat Management Instant Messaging IT Plan Computer Accessories Remote Worker Robot Excel Digital Signage Proactive IT Cryptocurrency Biometrics Unsupported Software Best Practice Virtual Desktop YouTube Charger Procurement Black Market Compliance DDoS Printer Workplace Strategy Comparison Net Neutrality OneNote Computer Care Bluetooth File Sharing Employees Search Employee/Employer Relationships Two Factor Authentication Distributed Denial of Service Printer Server Camera Windows 365 Customer Relationship Management Inventory iPhone Netflix Specifications ISP Analyitcs Root Cause Analysis Evernote ROI Wire Video Conferencing Sales Programming HBO Bitcoin Knowledge Travel Shortcuts Music Printers Point of Sale Skype Personal Files Millennials Cryptomining Smart Office Supply Chain Management Data loss Wireless Charging Chromecast Antivirus Monitoring Outlook Batteries Leadership Troubleshooting Colocation Workforce Uninterrupted Power Supply Virtual Private Network Windows 8.1 Start Menu Digitize Windows 8 Screen Mirroring Cables Windows Server 2008 R2 Loyalty IT service Books Customer relationships Frequently Asked Questions Monitor Windows 10s Telecommuting Manufacturing Project Management Email Best Practices Mobile Nanotechnology IT Assessment Tablet Cast Cortana Domains Streaming Media Emergency Consultant Computer Tips Tip of the week Digital Signature Managed IT Service Reputation webinar Security Cameras Public Cloud Biometric Security Tech Support Employer Employee Relationship IaaS Analytics Warranty Virtual CIO Maintenance Content Professional Services OneDrive HVAC Peripheral Bloatware Techology Google Apps Laptop Assessment Best Available Digital Security Cameras Windows Server 2008 Analysis Using Data Customers 5G WIndows 7 Administrator Audiobook Tools Devices Copiers Tablets Enterprise Content Management Quick Tip Entrepreneur Touchpad Television MSP Ergonomics Accountants Smartwatch Advertising Credit Cards OLED Microchip Shortcut Politics Thought Leadership Development Password Management PCI DSS Cost Management Password Manager Virtual Machine Public Computer Notifications Transportation 2FA Social Networking Regulations Fiber Optics Multi-Factor Security Employee Computer Fan Cabling Rootkit User PowerPoint Search Engine Windows Media Player Twitter Messaging NIST Policy Business Mangement Hypervisor Benefits Running Cable Dark mode Smart Tech Trend Micro Relocation Workers Trending Memory FENG Amazon Default App Managing Stress Addiction SMS Procedure Video Games Recycling Saving Time IBM Smart Technology Cameras Wiring dark theme Worker Commute Flash Practices Shopping Google Search Amazon Web Services IT Infrastructure Experience Cache AI Safe Mode FinTech Scalability Software Tips Criminal Supercomputer Bing GDPR Business Owner Sync Hosted Computing Social Network Science Emails Online Shopping Investment NarrowBand Wireless Internet

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code