Computerware

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!

Software as a Service Is Helping Small Businesses
Would Your Users Fall For These Social Engineering...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Hackers Business Computing Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Quick Tips Gadgets Business Continuity User Tips Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Innovation Android Server Mobile Device Management VoIP Social Media Smartphone Ransomware Upgrade Windows 10 Miscellaneous Unified Threat Management Windows Operating System Remote Monitoring Passwords BYOD Remote Computing Holiday Collaboration Communication Mobile Computing Managed IT services Vendor Management Apps Cybersecurity WiFi The Internet of Things Marketing Facebook Data Backup IT Support Data Recovery Analytics History Firewall Apple Users communications Automation Productivity Alert Internet of Things Tech Term Data Management BDR IT Consultant Managed IT Services Outsourced IT Save Money App Artificial Intelligence Phishing Bring Your Own Device Gmail Office Bandwidth Content Filtering Going Green Big data Mobile Device Health Spam Budget Hiring/Firing Wireless Technology Hard Drives Antivirus Search Windows 8 Outlook Browser Cybercrime Maintenance Printer Virus Best Practice Information Technology Cost Management Tech Support Lithium-ion Battery Managed IT Encryption Phone System Money Document Management Help Desk Computers Recovery Employer-Employee Relationship Travel Update Hacking IBM Office 365 Business Technology Networking Cloud Computing Legal Customer Service Two-factor Authentication Administration Proactive IT Running Cable Regulations Government Saving Time Website VPN Windows 10 Intranet SaaS Education Humor Law Enforcement Training Risk Management Compliance Data storage Save Time Hard Drive It Management Laptop Mobility PowerPoint User Patch Management Blockchain Current Events Comparison Tablet Business Growth Social Engineering Company Culture Data Loss Wireless Computer Repair DDoS Social Networking Paperless Office Data Breach Fax Server Project Management Twitter Avoiding Downtime Disaster End of Support Word Hosted Solution Robot iPhone Telephone Systems Securty Password Cortana Applications Excel Solid State Drive Access Control Hacker File Sharing Business Intelligence Flexibility Digital Payment Customer Relationship Management Black Market Augmented Reality Data Security Downtime Google Docs Politics Computer Accessories Virtual Reality Gaming Console Emails Specifications Safety Automobile Virtual Desktop Experience Text Messaging Monitors Social Co-managed IT Trending Webcam Cleaning Chromebook User Error Office Tips Documents Mouse Computing Infrastructure Hack Scam How To Redundancy Heating/Cooling Programming YouTube Private Cloud Statistics Download Storage Sports Unified Communications Settings Lifestyle Network Congestion Telephony Digital Vulnerabilities Inbound Marketing Computing Healthcare Machine Learning Websites Taxes Retail eWaste Distributed Denial of Service Start Menu Tech Terms Streaming Media Mobile Technology IT service Value Pain Points Public Cloud Software as a Service Net Neutrality Uninterrupted Power Supply Processors Chrome Bluetooth Identity Theft USB Bitcoin Google Maps Cryptocurrency Data Protection Presentation Router cache Television Human Resources online Currency Software License Trends Visible Light Communication Memory In Internet of Things Application Multi-Factor Security WannaCry Downloads Fraud Tactics Debate IT consulting Devices Harddrive Monitoring GPS Scalability Time Management Freedom of Information LinkedIn UTM Content Motion Sickness Corporate Profile CIO Messenger Tracking Assessment SharePoint Webinar IT Plan Enterprise Resource Planning External Harddrive Advertising Flash Digital Signature Legislation Rental Service Meetings Google Calendar Entertainment Archive email scam Addiction Windows XP Teamwork Tip of the week Skype Accountants Staffing Google Wallet Management 3D Ebay Displays Cabling Touchscreen News Multi-factor Authentication Information Thin CLient Society Web Server VoIP Micrsooft Books Workers Consultation Evernote PDF Migration Connected Devices Smart Phones Wi-Fi Administrator Knowledge Point of Contact Wireless Headphones Drones Supercomputer Technology Tips Network Management Best Available Virtual Assistant Keyboard Equifax Best Practives Adminstration Pirating Information Worker Fake News Device security MSP Leadership Microchip Audit Domains Reading Samsung Data Warehousing Recycling Desktop Finance Permissions Language Public Speaking Analytic Nanotechnology Employer Employee Relationship Access Business Cards Service Level Agreement G Suite Emergency Hard Drive Disposal Shortcut Microserver Product Reviews Startup Read Unified Threat Management Backup and Disaster Recovery switches Writing Licensing Microsoft Excel Entrepreneur Music Hacks Physical Security Computer Care Troubleshooting Upgrades Relocation Tablets Google Drive Windows Server 2008 Environment Gamification Banking Botnet HIPAA Get More Done Screen Reader Spyware Mobile Payment Electronic Payment Printer Server Device Management Piracy Upload LiFi Sync Vulnerability Competition Turn Key Smart Tech Upselling Electricity Printing Business Owner Trojan Content Management Fiber-Optic Database Video Surveillance Business Managemenet HTML Notifications CCTV Conferencing Deep Learning Reliable Computing Windows 7 Organize Mobile Security Saving ZTime Work/Life Balance Business Metrics Computer Malfunction IP Address 3D Printing CrashOverride Capital Username Productuvuty Managing Stress

toner1.7