KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

First, look to Gmail’s search bar at the top of the window and click the down arrow it has on its right side. A drop down will appear with numerous fields, allowing you to narrow your search. These fields include:

  • From, or the sender of the message
  • To, or the recipient of the message
  • Subject
  • Has the words
  • Doesn’t have

These fields end with checkboxes allowing you to include messages with attachments in your search, and the ability to omit chat messages. You can also search based on message size and the date received.

Once these fields are filled out, you’ll be given the option to Create filter with this search, from which you can further customize the filter with more options. Once you’ve finished, click Create Filter.

You can also use a specific message to create a filter. Use the checkbox to identify the message that will inform the filter and click the More button that is above the message. You’ll be given the option to Filter messages like these and a few additional properties to assign to the filter.

If you need to return to a filter to edit it, access Settings via the gear icon in the right corner of the window to find Filters and Blocked Addresses. Out of the list of every filter you’ve created, select the one you’re ready to edit and make your changes, or delete the filter outright.

How likely is it that you’ll start to use these filters? Let us know in the comments, and make sure you subscribe to this blog for more tips!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email malware Business Computing Cloud Internet Network Security Google software Business Efficiency User Tips Ransomware Backup Data Computer IT Support Microsoft Android Money Managed IT Services Facebook Hardware Small Business Smartphone cybersecurity VoIP Windows Hosted Solutions Mobile Device Management Productivity IT Support Network Gmail Operating System Business Continuity Artificial Intelligence Mobile Devices Phishing Cloud Computing communications Data Management Microsoft Office IT Management Outsourced IT Data storage Upgrade Encryption security cameras Business Management Alert Disaster Recovery BDR Nextiva Windows 10 Bandwidth End of Support data breach Apple Windows 10 Antivirus Smartphones Unified Communications Social Media Outlook Internet of Things Update IT Services Passwords Communication security solutions Google Wallet Browser Firewall Collaboration Google Docs IoT Legal Save Money Productivity SaaS Saving Money Server Document Management Remote Monitoring Information Technology Customer Service Search IBM Drones Networking History Big Data Google Maps Politics The Internet of Things Scam Lunch and Learn Apps Data Recovery App Gadgets Start Menu vulnerability Office 365 BYOD Innovation Managed IT Services Law Enforcement WiFi News Robot Events Data Backup YouTube Access Control Word Event Marketing Best Practice Patch Management Local Buzz Automation South Dakota Spam Hard Drive Cost Management Analytics Project Management Maintenance Virtual Machines Telephony Local Technology media experience Vendors Tech Support Physical Security Office Advertising SharePoint IoT Devices Law IT Workers IT Assessment Internet 101 Cache Password Social Engineering Tips and Tricks Microsoft Office 365 features Managed Service Provider How To Virtual Desktop Fortinet Risk Creep VoIP Sales Tax information Community Involvement Printer Vendor Management IT Security Lawyers Samsung IT Strategy face Internet Connected Devices Emergency Business Security IT for Oil Companies Flash Download Monitors Freedom of Information Laptop IT Solutions Tablets Administration enterprise productivity software surveillance cameras Communications Cryptocurrency Hosted Solution Business Technology Content Filtering Printing Risk Management Time Management Mobility Settings healthcare Displays Fake News Tablet Attorneys Trend Micro Phone System password manager LastPass AtomBombing Cleaning Disaster Managed IT Downloads Distributed Denial of Service Kaseya Unified Threat Management tool Hacking Workplace Tips Proactive IT Microsoft Excel SOX Managed Services Fast food Google Play Store Hardware as a Service user confidence Bluetooth appointment Quick Tips Google Calendar Kaseya Connect Information Security Office Tips Computer Care Social Music Sarbanes-Oxley Act HaaS Safety Knowledge Education Business Communications Webcam Conference Business Comunications Email Security Chamber of Commerce Writing Experience End User Testing VPN botnet attack Running Cable Press Release Government camera Uninterrupted Power Supply Vendor Mangement LastPass Microsoft Bookings Tech Terms Comparison Touchscreen Budget communication device Remote Computing Black Market Sports botnet Cabling Digital Virtual Reality macbook Hack Data Protection Business Mangement booking process Wireless Technology LiFi Specifications Websites Penetration Testing business owner Retail DDoS attacks Access Data Security Corporate Profile Memory Event Society Streaming Media Visible Light Communication Television Programming Software as a Service Solid State Drive Phishing Scams communication solutions Spyware vulnerabilities DDoS Rebrand Business Growth Redundancy Worker Audit Cloud Backup Google Drive Virtualization security precautions identity theft Mixer Windows 8 Network Congestion Windows XP Deep Learning Website Mouse Rapid City Virus File Sharing IT Consultation Web Servers Dell ’s Sonicwall Global Management System Applications Microsoft Office 365 Compliance security solution Marketing Unified Threat Management Work/Life Balance Notifications Business Metrics end-of-support date CCTV holiday season Phone Systen Wi-Fi Rental Service collaboration capabilities Chromebook UTM Flexibility IT service Web Server holidays Meetings Documents Cortana Threat management Reliable Computing Ordinary Computers Emails scammers CrashOverride Text Messaging PDF Twitter Scalability Tracking Computing quantum computers scams Supercomputer G Suite Computer Malfunction Travel Language Processors Employer-Employee Relationship Messenger IT Consultant Sync Private Cloud Miscellaneous Microchip network security professionals Users Books Training In Internet of Things Motion Sickness Playbook Telephone Systems Reading Employer Employee Relationship Machine Learning Digital Payment Hiring/Firing breach methods Health Bring Your Own Device Administrator Banking Relocation Public Cloud Hacker Taxes 3D Printing base infrastructure Hacks Paperless Office Holiday Automobile