Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!

Software as a Service Is Helping Small Businesses
Would Your Users Fall For These Social Engineering...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Small Business Efficiency Quick Tips Network Security Smartphones Gadgets User Tips Mobile Devices Business Continuity Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Unified Threat Management Ransomware Smartphone Windows Innovation Android Remote Monitoring Passwords Holiday Operating System Remote Computing WiFi Vendor Management BYOD Mobile Computing Communication Apps The Internet of Things Marketing Collaboration Facebook Analytics Firewall Managed IT services History Cybersecurity Users Apple IT Support Data Management Alert communications Outsourced IT IT Consultant Managed IT Services Phishing Productivity Save Money Big data Content Filtering Health BDR Bring Your Own Device Office App Internet of Things Automation Gmail Data Recovery Best Practice Information Technology Spam Going Green Budget Outlook Managed IT Wireless Technology Data Backup Search Maintenance Virus Lithium-ion Battery Hiring/Firing Hard Drives Windows 8 Antivirus Browser Artificial Intelligence Tech Support Cost Management IBM Mobile Device Update Hacking Phone System Money Office 365 Bandwidth Help Desk Encryption Recovery Printer Employer-Employee Relationship Risk Management Document Management Cloud Computing Law Enforcement Two-factor Authentication Customer Service Data storage Saving Time Travel Website Intranet Administration Education Legal It Management Hard Drive Save Time SaaS Running Cable Proactive IT Computers VPN Government Humor Cybercrime Networking Avoiding Downtime iPhone Cortana Data Security Telephone Systems Password Training Business Intelligence Hacker Downtime Disaster End of Support Current Events Excel Tablet Company Culture Securty Computer Repair Project Management Solid State Drive Wireless Flexibility Laptop Digital Payment Mobility Hosted Solution Robot Comparison User Augmented Reality PowerPoint Windows 10 Social Engineering Social Networking Fax Server Black Market DDoS Twitter Business Growth Word Bitcoin Data Protection Net Neutrality YouTube Patch Management Settings Google Maps Unified Communications Blockchain Pain Points Processors Data Loss USB User Error Redundancy Presentation Trending Hack Data Breach Politics Virtual Desktop Private Cloud Documents Statistics Gaming Console Programming Heating/Cooling Webcam Cryptocurrency Google Docs Distributed Denial of Service Streaming Media Public Cloud Inbound Marketing Retail eWaste Office Tips Experience Value Business Technology Paperless Office Chrome Sports Computing Router Computer Accessories Automobile Scam Identity Theft Customer Relationship Management Co-managed IT IT service Mouse How To Safety Virtual Reality Specifications Social Digital Compliance Lifestyle Websites Text Messaging Start Menu Vulnerabilities Network Congestion Computing Infrastructure Taxes Mobile Technology Software as a Service Uninterrupted Power Supply Access Control Telephony Monitors Adminstration Get More Done Public Speaking Flash Tablets Advertising Pirating Information Smart Phones Google Wallet Piracy Sync Printer Server Entrepreneur cache Displays HTML CCTV Television Content Management HIPAA Business Managemenet Corporate Profile Drones Software License In Internet of Things Banking Electronic Payment File Sharing Assessment Emails SharePoint Scalability IP Address Language Permissions Video Surveillance Tip of the week VoIP IT Plan Upselling Saving ZTime Webinar Human Resources Business Metrics LinkedIn Consultation Writing Meetings switches Evernote Skype Archive Cabling Debate Virtual Assistant Migration Administrator Audit Chromebook Messenger Point of Contact Teamwork Supercomputer Data Warehousing Machine Learning Best Practives Emergency Work/Life Balance Storage Worker Hard Drive Disposal PDF Desktop Thin CLient Computer Care Download Books Keyboard Google Drive Best Available Employer Employee Relationship IT consulting Windows Server 2008 Microserver Unified Threat Management Product Reviews Domains Vulnerability Licensing Cleaning Electricity Applications Read Botnet CIO Leadership Printing Microchip Reading Shortcut Regulations Windows XP Windows 7 Turn Key Device Management Fiber-Optic Trojan Troubleshooting Society Environment WannaCry Micrsooft Mobile Security Computer Malfunction Organize Staffing Downloads Hacks Relocation Competition Time Management Freedom of Information Fraud online Currency Business Owner UTM Motion Sickness Google Calendar Notifications Reliable Computing Application Touchscreen Tracking News email scam Knowledge Music Technology Tips Upgrades Multi-factor Authentication Web Server GPS Bluetooth Digital Signature Workers LiFi Fake News Harddrive Tech Terms Entertainment Rental Service Access Deep Learning Device security 3D Memory Samsung Visible Light Communication Ebay Microsoft Excel External Harddrive Recycling Business Cards Analytic G Suite Wi-Fi Spyware Tech Term Physical Security Mobile Payment Devices Capital Productuvuty 3D Printing CrashOverride