Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 18 December 2017

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Cloud Best Practices Hackers Privacy Productivity Business Computing business Malware Microsoft IT Services Internet Backup Hosted Solutions Managed Service Provider IT Support Email Workplace Tips Network Hardware Communication Mobile Devices Computer Smartphones Microsoft Office Disaster Recovery Windows Miscellaneous Windows 10 Business Continuity Mobile Device Management Efficiency Data Holiday Small Business Smartphone network security Server Upgrade Saving Money Business Management Google Virtualization Software Alert User Tips WiFi Remote Computing Operating System Internet of Things Gmail Social Media Ransomware VoIP BYOD Passwords Big Data Office Android The Internet of Things Browser Mobile Computing Apple Spam Innovation Vendor Management Remote Monitoring App Risk Management Budget Apps Analytics Collaboration Wireless Technology Phishing Facebook Artificial Intelligence Save Money Money Going Green Hacker Outsourced IT Gadgets Retail Best Practice Cybersecurity Office Tips Tech Support Bring Your Own Device Data Management IT Solutions Customer Service Information Technology Automation Managed IT Services Business Growth Application Data storage Recovery Presentation Firewall Hacking Content Filtering Hard Drives Running Cable Lithium-ion Battery Document Management Customer Relationship Management Employer-Employee Relationship virus Robot Cost Management End of Support Proactive IT Computers Current Events Avoiding Downtime Managed IT Health IT Consultant Saving Time Hosted Solution Office 365 IT service Outlook communications Work/Life Balance Two-factor Authentication Cybercrime Windows 8 Hacks Update Hiring/Firing Tablet Law Enforcement Social Downtime Business Owner LiFi Cortana Competition Quick Tips Search Humor Trending Antivirus iPhone Education Twitter Analyitcs Network Congestion Safety intranet Mouse Programming Encryption Specifications Net Neutrality User Disaster Website Wireless Settings Laptop Phone System Maintenance Mobile Device Chrome project management USB VPN Virtual Desktop PowerPoint Administration Social Engineering Cryptocurrency Samsung Marketing Statistics Password Save Time Bitcoin Google Docs Compliance Fake News IT Support Augmented Reality Co-managed IT data breaches Excel Travel Sports Television Regulations Microsoft Excel Unified Communications Private Cloud Fun Paperless Office risk Printing Storage Cyber-attacks Blockchain Online Currency Gadget Entrepreneur cyberattack Computing Dark Data Debate Buisness Refrigeration SharePoint Consumers Deep Learning Skype Politics IP Address Memory Public Cloud Knowledge Company Culture eWaste cyberattacks Google Wallet Windows 8.1 Update Printer CIO Black Market Distributed Denial of Service Data loss LinkedIn Telephony Mobile Office Experience security breach Environment businesses Drones Printer Server User Error Evernote IT Management Identities Best Available Training Users People Modern technology Troubleshooting Software as a Service History Processors Undo Display Data Warehousing Google Calendar Mobility Solid State Drive Video Surveillance File Sharing business owners Word Technology Tips Backups Licensing YouTube Notifications Monitors Windows Server 2008 Flexibility Access Control Alt Codes Files Legal Managed Service Providers Mobile Technology Computer Repair Piracy Bandwidth Telephone Systems Domains Writing Windows 7 Wi-Fi Router Typing Websites Productivity bdr Help Desk Mobile Payment Freedom of Information Crowdsourcing Public Speaking Botnet 5G today ’s world Business Intelligence Documents Data Breach Google Drive Halloween Heating/Cooling Touchscreen Patch Management Digital Signature News Government IBM experience downtime PDF Downloads Crowdfunding Scary Stories Comparison Meetings Relocation Physical Security Software Tips Managed IT Services Webcam Motion Sickness Chromebook How To Corporate Profile GPS Error Personal Information Cleaning Emoji Upgrades Tip of the week WannaCry Tracking Electronic Medical Records Computer Care 3D Printing Identity Theft Automobile Data Backup Staffing Unsupported Software Administrator Cloud Computing Taxes Mobile Data test post Sync Cabling Web Server Supercomputer Mobile Device Managment Infrastructure Cameras IT Budget Uninterrupted Power Supply CCTV Digital Payment G Suite Virtual Reality Hard Disk Drive Point of Sale Machine Learning Google Maps Unified Threat Management SaaS