Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Business Computing Productivity business Malware Microsoft Internet IT Services Backup IT Support Hosted Solutions Managed Service Provider Email Network Mobile Devices Workplace Tips Communication Hardware Smartphones Disaster Recovery Computer Mobile Device Management Microsoft Office Holiday Windows Miscellaneous network security Efficiency Software Data Windows 10 Business Continuity Small Business Smartphone Server Google Alert Virtualization Internet of Things Upgrade Saving Money Business Management User Tips Remote Monitoring Innovation Ransomware Social Media WiFi VoIP Passwords Remote Computing Operating System Big Data Android Gmail Cybersecurity BYOD App Mobile Computing The Internet of Things Office Browser Apps Apple Spam Vendor Management Wireless Technology Facebook Collaboration Information Technology Budget Artificial Intelligence Business Growth Risk Management Hacking Phishing Analytics Bring Your Own Device Office 365 IT Solutions Managed IT Services Cybercrime Customer Service Automation Save Money Hacker Going Green Robot Money Cost Management Outsourced IT Office Tips Gadgets Data Management Retail Best Practice Tech Support Mobile Device Hosted Solution Maintenance Social Engineering IT service Bitcoin Laptop communications Two-factor Authentication Data storage VPN IT Consultant Recovery Health Saving Time Hard Drives Cortana Outlook Employer-Employee Relationship Application Presentation Content Filtering Firewall Document Management Downtime Computers Lithium-ion Battery Running Cable End of Support Antivirus Customer Relationship Management virus Website Proactive IT Current Events intranet Avoiding Downtime Managed IT Websites Specifications Data Security Disaster Productivity User Mobile Technology Google Docs project management Augmented Reality Phone System Piracy Hacks Marketing Chrome USB Data Breach Work/Life Balance Data Recovery Social PowerPoint Samsung Statistics LiFi Update Law Enforcement Windows 8 Password Save Time IT Support Private Cloud Excel Tablet Hiring/Firing Quick Tips Blockchain Safety Vulnerabilities Mouse Company Culture Business Owner Encryption Competition Twitter iPhone eWaste Wireless Search Settings Humor Trending Bandwidth Education Cloud Computing Net Neutrality Virtual Desktop Analyitcs Network Congestion Administration Programming Cryptocurrency Google Drive Video Surveillance Halloween Computer Repair Heating/Cooling Windows Server 2008 Access Control Help Desk IBM Crowdsourcing Software License Licensing Router Botnet Scary Stories today ’s world Multi-factor Authentication Windows 7 Hard Drive Disposal Managed Service Providers Virtual Reality Government Redundancy Mobile Payment Touchscreen Sports experience downtime Device security Freedom of Information Unified Threat Management Unified Communications Fun Compliance Patch Management Printing Storage Tech Term Documents News Fiber-Optic Digital Signature Downloads Travel Regulations IT Plan Entrepreneur Comparison Computing Dark Data Crowdfunding Buisness Paperless Office HTML Refrigeration PDF Fake News Fraud data breaches Deep Learning IP Address Google Wallet Gadget Knowledge Migration Television Managed IT Services CIO Data Protection Co-managed IT Microsoft Excel Mobile Office email scam risk Online Currency Drones Politics Experience Business Technology Cyber-attacks Public Cloud User Error cyberattack Identities Black Market Telephony Desktop SharePoint Identity Theft Windows 8.1 Update security breach Undo Printer Tip of the week Computing Infrastructure cyberattacks Debate Solid State Drive Backups Skype Training Applications Word Consumers Distributed Denial of Service Digital Data loss Memory YouTube Modern technology Printer Server Processors Display Vulnerability businesses Alt Codes Mobility Legal LinkedIn File Sharing Mobile Security Users Evernote Virtual Assistant IT Management business owners Domains Environment Notifications Wi-Fi Monitors Networking Software as a Service Typing Best Available Files bdr Flexibility Data Warehousing Hard Drive History Google Calendar People Public Speaking Troubleshooting Telephone Systems 5G Writing Business Cards Business Intelligence Technology Tips Cabling IT Budget UTM CCTV Infrastructure Digital Payment G Suite Point of Sale Uninterrupted Power Supply Google Maps Machine Learning Unified Threat Management SaaS Meetings Hard Disk Drive Software Tips Relocation Physical Security Webcam Motion Sickness Chromebook How To GPS Error Personal Information Cleaning Emoji Upgrades Tracking Corporate Profile Electronic Medical Records Devices Computer Care 3D Printing WannaCry Automobile test post Staffing Unsupported Software Administrator Taxes Data Backup Mobile Data Sync Web Server Supercomputer Value Mobile Device Managment Cameras