facebook linkedin twitter

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!

Software as a Service Is Helping Small Businesses
Would Your Users Fall For These Social Engineering...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Disaster Recovery Innovation Android Microsoft Office Mobile Office Virtualization Network Social Media Mobile Device Management Server VoIP Collaboration Smartphone Communication Miscellaneous Ransomware Windows 10 Upgrade Data Backup Unified Threat Management Data Recovery Windows Operating System Passwords Remote Monitoring Tech Term IT Support Productivity Holiday Vendor Management BYOD Remote Computing Mobile Computing Managed IT services WiFi Cybersecurity Apps Facebook communications Marketing BDR The Internet of Things Analytics History Apple Firewall Users Automation Alert Outsourced IT Internet of Things Data Management Mobile Device Managed IT Services Phishing Artificial Intelligence IT Consultant Browser Save Money App Big data Antivirus Gmail Health Office Content Filtering Bandwidth Spam Going Green Maintenance Encryption Bring Your Own Device Search Cybercrime Best Practice Information Technology Windows 8 Cost Management Lithium-ion Battery Outlook Managed IT Hiring/Firing Office 365 Hard Drives Budget Printer Tech Support Help Desk Virus Wireless Technology Two-factor Authentication VPN Travel Phone System Recovery Training Update Employer-Employee Relationship Hacking Business Technology Money IBM Document Management Cloud Computing Saving Time Computers Networking Legal Administration Intranet Education Government Regulations Website SaaS Access Control Risk Management Save Time Hard Drive Law Enforcement It Management Compliance Data storage Humor Proactive IT Running Cable Windows 10 Customer Service Wireless Project Management Twitter Information DDoS Machine Learning Paperless Office Telephone Systems Current Events Avoiding Downtime Sports Word Computing Disaster End of Support iPhone Hosted Solution File Sharing Business Intelligence Password Cortana Robot Data Security Applications Digital Payment Securty Excel Fax Server Hacker Downtime Patch Management Blockchain Mobility Solid State Drive Social Engineering Data Loss Comparison Tablet Customer Relationship Management Augmented Reality Flexibility Black Market Company Culture PowerPoint User Computer Repair Data Breach Social Networking Laptop Business Growth Documents Monitors Cleaning Digital Network Congestion Telephony Management Heating/Cooling Entertainment Office Tips Websites Start Menu Tech Terms Storage Taxes YouTube Vulnerabilities Mobile Technology Distributed Denial of Service Streaming Media Healthcare Inbound Marketing Unified Communications Settings Software as a Service Co-managed IT Uninterrupted Power Supply Public Cloud User Error Retail eWaste Net Neutrality Bitcoin Chrome Value Identity Theft Pain Points Data Protection IT service Google Maps Vendor Lifestyle Router Processors Politics Computer Accessories Virtual Reality Managed Service Emails Conferencing USB Bluetooth Automobile Scam Trending Presentation Chromebook Redundancy Mouse Cryptocurrency Computing Infrastructure Hack Gaming Console Monitoring Virtual Desktop How To Specifications Safety Google Docs Programming Text Messaging Social Private Cloud Statistics Webcam Experience Download Printer Server Virtual Assistant Books email scam Workers Addiction External Harddrive Turn Key Digital Signature Technology Tips Wi-Fi Administrator Accountants Point of Contact A.I. Supercomputer Teamwork Advertising Flash Audit Multi-factor Authentication Trojan CIO Fake News Wireless Headphones Telephone 3D Ebay Organize Windows XP Migration Worker Connected Devices Thin CLient Proxy Server Staffing Google Wallet Data Warehousing Microchip PDF Displays Emergency Hard Drive Disposal Reading Samsung Recycling Network Management Smart Phones Electronic Medical Records Society Access Equifax Fleet Tracking Analytic Employer Employee Relationship Best Available Keyboard Computer Care G Suite Device security MSP Product Reviews Micrsooft Microsoft Excel Physical Security Nanotechnology Social Network Read Adminstration Pirating Information Desktop Licensing Finance Leadership Dark Web Domains Drones Google Drive Windows Server 2008 Hacks Webinar Vulnerability Relocation Business Cards Tablets Service Level Agreement Health IT Public Speaking Spyware Mobile Payment Banking Botnet Startup Asset Tracking Unified Threat Management Device Management Backup and Disaster Recovery Shortcut Permissions Electricity Language Printing Sync Username Notifications CCTV Screen Reader Content Management Customer Resource management Entrepreneur Gamification Business Managemenet Bookmark Troubleshooting Windows 7 Environment switches Writing Reliable Computing Piracy Upload HIPAA Music cache Television Business Metrics Computer Malfunction Smart Tech Distribution Upgrades Fiber-Optic Database online Currency Competition WannaCry Downloads In Internet of Things HTML Upselling Electronic Payment Telephone System Video Surveillance LiFi Corporate Profile Mobile Security Browsers Best Practives Business Owner Time Management Freedom of Information Scalability Software License Trends LinkedIn Saving ZTime User Tip IP Address Assessment SharePoint Motion Sickness Multi-Factor Security Cost Human Resources Deep Learning Tip of the week Messenger Fraud Tracking Tactics Microserver Application Work/Life Balance Google Calendar Devices Rental Service Meetings Archive Debate Visible Light Communication VoIP Memory UTM Content Skype Harddrive Data Analysis Touchscreen News GPS IT consulting Knowledge IT Plan Cabling Enterprise Resource Planning Get More Done Consultation Evernote Web Server Legislation Error Capital Fileless Malware Productuvuty Managing Stress CrashOverride Regulation 3D Printing Printers

toner1