094 90 48200    Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Highlighting Certain Outlook Messages

Tip of the Week: Highlighting Certain Outlook Messages

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call Aniar IT Services for any of your IT-related questions at 094 90 48200.

Examining the FCC’s Efforts to Fix Internet Access...
How to Improve Your Business with Solid IT Practic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Google Email Cloud Efficiency Privacy User Tips Internet Network Security Workplace Tips Data IT Support Mobile Device Hosted Solutions Hackers Innovation Communication Software Microsoft Business Hardware Collaboration Android VoIP Small Business Users Data Recovery Smartphones Data Backup Smartphone Phishing IT Services Managed IT Services Computer Cybersecurity Windows 10 Tech Term Cloud Computing Mobile Devices Network Communications Backup Managed Service Malware Gadgets Quick Tips Miscellaneous Windows Outsourced IT Business Continuity Business Management Browser Disaster Recovery Saving Money Internet of Things Artificial Intelligence Passwords Covid-19 Upgrade Facebook Spam BDR Information Holiday Social Media Save Money Chrome Server Microsoft Office Office 365 Paperless Office Router Wi-Fi How To Operating System Blockchain Automation BYOD Word Ransomware Cybercrime Data Security Computers Data Storage Applications Encryption Infrastructure Apps Human Resources Windows 7 Government Networking Patch Management Mobile Office Data Breach Remote Monitoring Health Mobile Device Management Settings Virtualization Two-factor Authentication Connectivity Telephone System Money Vendor Machine Learning Managed IT Display Software as a Service Managed Services Vulnerability Information Technology Bandwidth Staff Big Data History Remote Work Data Protection Remote HIPAA Printing Audit Avoiding Downtime Identity Theft WiFi Vendor Management Wireless Private Cloud IT Plan OneNote Hard Drive Comparison Servers Net Neutrality Google Docs Office Unsupported Software Access Control Law Enforcement Sports Education Managed Services Provider Augmented Reality Help Desk Telephony CES Fraud Scam Compliance Digital Signage Procurement Update Cryptocurrency Spam Blocking Business Intelligence Keyboard Content Management Training VPN Employee/Employer Relationship Botnet Bring Your Own Device Conferencing Password IT Management App Managed IT services Redundancy Meetings Voice over Internet Protocol Website Telephone Systems Virtual Assistant Google Drive Processor Social Engineering Business Technology Search Engine Investment Virtual Desktop Employer-Employee Relationship Sync Multi-Factor Security Criminal Twitter Proactive IT Peripheral Physical Security Digital Signature Printers Virtual Reality Professional Services Employees Root Cause Analysis Business Mangement Smart Tech Going Green Millennials Excel Google Apps Password Management Social Development Cast Electronic Medical Records Wire Firewall Managed IT Service Procedure Online Shopping Bing ROI Personal Mobile Addiction MSP Project Management Quick Tip Credit Cards PDF Entertainment Warranty Cabling Fiber Optics Sales Flash Gmail Employee Saving Time Public Cloud Value Workforce Tip of the week Workers NIST Messaging Specifications Data Management Unified Threat Management FinTech Computer Fan Evernote Cleaning HVAC GDPR Digitize Data loss Trending File Sharing ISP Bitcoin Regulations Printer Cables Trend Micro SharePoint HaaS Recycling Devices Supply Chain Management 5G Software Tips Using Data Apple Windows Server 2008 Authentication SMS Mobile Computing OLED The Internet of Things HBO FENG Practices Remote Computing IT Assessment Hacker Cortana Alert Cache Cryptomining Batteries PCI DSS Amazon YouTube Mouse Default App Shopping End of Support eWaste Thought Leadership Google Search Telecommuting Biometric Security Computer Care Safe Mode Security Cameras Virtual Machine AI Smart Office Outlook Charger Hosted Computing Shortcuts Windows Server 2008 R2 OneDrive Skype Wireless Internet Remote Worker Database Virtual Private Network Amazon Web Services Accountants Microchip IT Infrastructure Social Network Customer relationships Legal Save Time Solid State Drive Travel Document Management Camera Manufacturing Computing RMM Customer Service Downtime Password Manager Nanotechnology Smartwatch Hypervisor Windows 10s Tools Work/Life Balance Frequently Asked Questions Recovery Wireless Charging Inventory Enterprise Content Management Mobility Copiers Start Menu Screen Mirroring USB Wiring Remote Workers Policy Managing Stress Domains Windows 10 Public Speaking Hard Drives Presentation Search Personal Information Lithium-ion battery Tech Support Wireless Technology IBM CrashOverride Financial Safety Productivity Marketing Budget Regulation Customer Relationship Management Managed Service Provider Competition Emergency IP Address Company Culture Hiring/Firing Fun