(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Filters and Labels Help Organize Your Gmail Inbox

Tip of the Week: Filters and Labels Help Organize Your Gmail Inbox

Gmail is an excellent tool for business use, even more than many business owners may realize. Did you know that it even has the capability to keep itself organized? For today’s tip, we’ll go over how to use filters and labels to keep your Gmail inbox organized and easy to use.

An Intro to Labels and Filters
Labels and filters are just a few ways that Gmail can help to keep your messages organized. You can assign rules that are applied to messages as they come in. These rules make a filter, which analyze your incoming messages and ensure that these messages are sent to the right label. These labels allow you to view messages more conveniently, consolidating those that have certain factors in common.

For example, you could create a filter that assigns a particular label to any message that has “Quarterly Reports” in the subject line. That label can then be used to access any and all messages with “Quarterly Reports” in a single, consolidated list.

Creating a Filter
Creating a filter in Gmail is fairly simple.

  • Once in Gmail, click the down arrow in the search bar at the top. This allows you access to greater detail in your search criteria.
  • Fill in the details that you want your filter to pay attention to, whether it is who the email has come from, or if the subject line contains a particular word or phrase.
  • Once your criteria have been established in this window, click in the bottom-right corner of the window, where it says, Create filter with this search.
  • You will be given a list of options, including the option for the message to be automatically ‘starred,’ or marked as important. For our purposes, we are concerned with the option to Apply the label.
  • Next to the ‘Apply the label’ option, there is a drop-down menu labelled Choose label. You have the option to create a new label from here, or select from those you have already made.
  • Once your filter has been properly configured, click the Create Filter button.

Creating a Label
While creating your filter gives you the opportunity to create a label, there are sometimes that you may want to have a label prepared that you can add messages to manually, or to already have one to direct a filter towards. Fortunately, creating a label and adding it to a received message is also fairly simple.

  • In Gmail, click the More option on the left of the screen.
  • From there, click Create new label.
  • Name your label and click Create.

To add this label to a message:

  • Open the appropriate message.
  • At the top, click the Label button. You can also add a label to a group of messages by selecting them before you click the Label button.
  • Select each label to be added. You can also create a new label from this point as well by typing in a new name.

Now you’re ready to take even greater control of your Gmail inbox. For more handy IT tips and tricks, subscribe to the NTConnections blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Innovation Server Data Workplace Tips Network Disaster Recovery Business Continuity Business Management Software Windows Upgrade Communication Saving Money Hardware Browser Smartphone Mobile Device Management Managed IT Services Virtualization Computer Android Save Money communications Smartphones Data Backup User Tips Microsoft Office Cybercrime Holiday BYOD Computers WiFi Windows 10 Outsourced IT Small Business Cloud Computing Social Media Remote Monitoring Hacking Chrome Big Data Operating System Ransomware Mobile Computing Data Recovery Alert Apple Collaboration Proactive IT VPN Managed IT Services Internet of Things Avoiding Downtime Application IT Solutions Automation Employer-Employee Relationship Quick Tips Office Budget Information Technology Passwords Marketing Social Engineering The Internet of Things BDR Bandwidth Gadgets Managed IT Health Mobility Bring Your Own Device Recovery Tech Term Going Green Remote Computing spam Cybersecurity Telephone Systems Vendor Management Private Cloud Compliance How To Vulnerability iPhone Data Security Redundancy Wireless Technology Router IT Support User Error Two-factor Authentication Data Protection Artificial Intelligence Business Intelligence Website Save Time Firewall App Gmail Retail Memory Search Phishing Antivirus Identity Theft Networking Mouse Analytics Office 365 Law Enforcement Data Management Productivity PowerPoint Windows 10 Excel Phone System Office Tips Content Filtering Money Downtime Apps History Tablet Lithium-ion battery Document Management Value Risk Management Online Currency Update Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Printer Human Resources SaaS Training Best Available People Safety HIPAA Current Events Programming Government Cleaning Network Congestion Credit Cards Trending Maintenance Meetings HaaS Fax Server Black Market Solid State Drive Applications Humor Statistics Infrastructure Intranet Data Storage Streaming Media Internet Exlporer Workers Word Data storage Biometrics Comparison Encryption Business Owner Outlook eWaste OneNote Flexibility Hard Drives IT Consultant IT Management Mobile Device Work/Life Balance Facebook Administration Entertainment Smart Tech IT Plan Saving Time Running Cable CES Physical Security DDoS Unified Threat Management Robot Data loss Skype Unsupported Software Sync Laptop Managing Stress Settings Cables Content Management Scam Distributed Denial of Service Virus Virtual Desktop Practices Remote Work Storage LinkedIn Charger Software Tips Telephony Touchpad IT service Unified Communications Virtual Reality Blockchain Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Computer Care Start Menu Print Server Domains Theft Bloatware Staff Spam Blocking Voice over Internet Protocol Audit IaaS PDF Cameras Customer Service Inventory Cache Video Surveillance HBO Mobile Keyboard Consultant Cortana Entrepreneur Digital Signature Net Neutrality Education Multi-Factor Security Computer Repair Screen Mirroring Tech Support Printer Server Access Control Fraud Wireless Internet Frequently Asked Questions Professional Services Hacker Google Apps Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Shadow IT Authentication Amazon Tip of the week Tools User Wireless Files Science Instant Messaging Analysis Touchscreen Licensing FENG Password Wi-Fi Shortcut Nanotechnology Amazon Web Services Samsung Windows Server 2008 SharePoint Colocation Twitter Windows 8 Password Manager Accountants Electronic Medical Records Sports Connectivity Bluetooth Online Shopping Crowdfunding Windows 7 Botnet Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Specifications Data Warehousing Notifications Legal YouTube Devices USB Evernote Regulations Travel Reputation Wearable Technology End of Support Recycling Windows Media Player Social IoT Millennials NarrowBand Wireless Charging Servers Criminal Customers Internet exploMicrosoft Social Networking Hiring/Firing Root Cause Analysis Workforce Thought Leadership Best Practice Flash Chromecast WIndows 7 Fiber-Optic Company Culture Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Windows 8.1 Update Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games