631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: Filters Can Improve Your Experience with Gmail

Tip of the Week: Filters Can Improve Your Experience with Gmail

How many emails do you get a day? It can be overwhelming at times, but it’s important that you don’t lose hope. Gmail, in particular, offers a solution to this issue through the use of filters. We’ll show you how to do it so that you can get right to work with finding important messages and filtering your inbox.

The first step is to click on the down arrow that you see in Gmail’s search bar at the top of the screen. You will see various search fields that you can customize depending on your search. Some of the most important are the following:

  • Sender
  • Recipient
  • Subject line
  • Words included
  • Words omitted
  • Attachments
  • Exclude chats with Hangouts
  • Message size
  • Receipt date

Once you enter your desired information into the fields, you’ll see a selection at the bottom of the window that says Create filter with this search. Once you click on this, you can then select more information about what you want the filter to do. Finalize your selections and select Create Filter.

If you want to make a filter based on one specific message, that’s also a possibility. Click the checkbox of the message you want to base the filter on and select the More button at the top of Gmail. You’ll then see the option to Filter messages like these. All you have to do is then select the properties of the filter and you’ll be all set.

What if you want to edit filters that you’ve created? This is where you need to access Settings, which is the gear-shaped icon in the right corner. The setting that you’re looking for is Filters and Blocked Addresses. This will display a list of all of your filters. Select the one that you’d like to edit or delete and make your changes.

How will you use Gmail filters to benefit your organization? Let us know in the comments, and be sure to subscribe for more great tips and tricks.

Managed IT Can Give Your Business a Bundle of Bene...
Do You See This Technology Hitting Your Office in ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Backup Smartphones Microsoft Communication Productivity Business Hardware Passwords Hackers Hosted Solutions Ransomware User Tips Internet VoIP Email Google Business Management Efficiency Small Business Android Software Outsourced IT Browser Save Money Social Media Alert Wi-Fi Innovation Miscellaneous Twitter Saving Money Data Backup Smartphone Bandwidth Data Recovery Windows 10 Cloud Computing Business Intelligence Employer-Employee Relationship Computer Applications Data Collaboration Router Microsoft Office Internet of Things Office Users Network Automation Analytics Government IT Services VoIP Mobile Devices Data Management Settings Patch Management Data Breach Vulnerability Managed IT Services Phishing Virtualization Apps BDR Marketing Mobile Device IT Support Gadgets Blockchain Workplace Tips Access Control Excel Password Compliance Website Office 365 Cortana Computers Word App Artificial Intelligence Hacking Company Culture Wireless How To Politics Spam Mobile Device Management Networking Paperless Office IT Support Cost Management Wireless Charging Data Protection Windows Physical Security Managed IT Service Remote Monitoring Gmail Information Law Enforcement Business Continuity Tech Terms Holiday Dark Web WiFi Cybercrime Retail Productivity Scam Virtual Assistant Tip of the week Remote Computing Chrome VPN Battery Workers Virus Spam Blocking Business Technology Server Management Downloads eCommerce WannaCry Environment Antivirus Apple Ink BYOD Telecommuting Backup and Disaster Recovery Plug-In Copy Document Management Tactics Education Smart Technology Error Multi-Factor Security Conferencing Websites Microsoft Teams Phone System Spotify Cables News Email Management Sales Trends Licensing Online Shopping HIPAA e-waste Paste iPhone IT budget PowerPoint SaaS Hiring/Firing Troubleshooting Millennials SSD Proactive IT Digital Internet Explorer Touchscreen Content Filtering Managing Stress Voice over Internet Protocol Telephone System Reporting Tablet Machine Learning A.I. Staffing Work/Life Balance Travel Hard Drive disposal IT Management Sports Managed IT Update Inventory Two-factor Authentication Remote Monitoring and Management Edge Threat Information Technology Botnet Microsoft Office 365 Dongle G Suite Gadget Office Tips Automobile Medical IT Knowledge Telecommute Movies Live Streaming Processors Value Analysis Telephone Systems File Sharing Connectivity Printer Server Outlook Files Telephony Lead Generation Mobile Security Tech Support Laptop Printing Entertainment Biometrics Safety Hard Drives Authentication User Tip Bring Your Own Device Facebook Shortcut Amazon Remote Support Disaster Recovery GDPR Google Drive Comparison Data loss Unified Communications Recovery WhatsApp Spyware Managed Service Remote Control User Security Network Attached Storage Streaming Media Cleaning Printers Server Voice over IP Operating System Maintenance Paper Access Authorization Technology Tips Hybrid Cloud CrashOverride Google Maps Hosted Solution HP Database Storage Specifications Staff RAM Big Data Dark Data Computer Care Scheduling Emergency Personal Information Quick Tips Net Neutrality Customer Service Samsung Mobile Office Managed Service Provider Upgrade DDoS Regulation Gaming Console Domains Instagram Money Scalability Windows 10 Employer Employee Relationship Fun Video Games Public Speaking Synergy IaaS Presentation Worker Freedom of Information Television Lithium-ion battery Credit Cards Emoji Augmented Reality Yahoo HaaS Wireless Technology 5G Encryption Printer IBM Unified Threat Management Hacker Search The Internet of Things Vendor Management Budget Leadership Competition Autocorrect Current Events Customer Relationship Management IP Address Avoiding Downtime

Newsletter Sign Up