Tip of the Week: Highlighting Specific Outlook Messages

Tip of the Week: Highlighting Specific Outlook Messages

Email is a hugely useful business tool, which is what makes solutions like Microsoft Outlook so popular in today’s organizations. Having said that, it can become far too simple for the inbox to be overstuffed with outdated and unnecessary messages that ultimately serve little more than to hide the ones you need to review.

Did you know that there’s a capability built into Outlook that can help you keep track of your important messages? Let’s go over how you can use it.

How to Keep Track of Things in Your Inbox

The typical inbox has a considerable amount of messages, important ones mixed amongst the various group messages, promotional communications, and the others you may have retained. As you can imagine, this can make the important messages challenging to find… particularly as they are pushed further down into your inbox.

This can be an issue, which is why Outlook’s capability to apply conditional formatting to different messages is so useful. Doing so, you can make certain messages stand out so they’re easier to pick out from your list.

Setting the Conditional Formatting on Your Incoming Messages

For our example, let’s say that you routinely communicate with a representative from another business—maybe it’s Saul, the person assigned to your business’ account with one of your vendors. This makes it important that you see all the messages that you have exchanged with him. While setting his messages to stand out in your inbox will take a few minutes of your time, this is basically because of the many options you can select from:

  • In Outlook, locate the View menu and access your View Settings.
  • From there, click into Conditional Formatting. You’ll be given a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • A new rule will be added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Saul.
  • Click the button that says Condition… to establish when this rule comes into play. This can be dictated by any of many different options: whether a word or phrase is included in the message, who the message came from, when it was sent, and even whether the message was sent to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Saul.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Saul rule still selected, click the Font button.
  • You can then adjust the way that the messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re ready until all the dialogue boxes are resolved.

From that point on, your inbox should reflect these changes, with Saul’s messages appearing in green to make it clear which ones came from him. By following these steps for any messages you want to keep closer track of, your Outlook inbox will be far more manageable.

Why don’t you give it a try and subscribe for a notification each time that we post a new blog, formatting these messages to make them stand out? For more information and IT assistance, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 10 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Email Cloud Software Privacy Network Security Hackers Microsoft Workplace Tips Efficiency Business Google Data Computer Hardware Hosted Solutions Malware IT Services Communication Internet Mobile Devices IT Support Mobile Device Small Business Smartphone Phishing Android Innovation Users Cloud Computing Tech Term Ransomware Backup Data Recovery Managed IT Services Windows Smartphones Cybersecurity Information Saving Money VoIP Outsourced IT Quick Tips Passwords Network Upgrade Miscellaneous communications Disaster Recovery Browser Data Backup Facebook Business Management Social Media Microsoft Office Windows 10 Server Office 365 Collaboration Business Continuity Productivity Internet of Things COVID-19 Managed Service Managed IT Services Gadgets Remote Work Data Management Apps Windows 10 Artificial Intelligence Gmail Save Money Infrastructure Vulnerability Remote Monitoring Information Technology Word App Mobile Office Analytics Encryption Money Chrome Spam Managed Service Provider Conferencing WiFi Router Remote Workers Government Paperless Office Tip of the week Settings IT Support Networking Applications Virtual Reality Access Control VPN Data Security Google Drive Holiday Company Culture Website BYOD Employer-Employee Relationship Display Development Big Data Avoiding Downtime Robot Hacker Data storage HIPAA Antivirus Unified Threat Management BDR Automation Computing End of Support Managed Services Operating System Employee-Employer Relationship Social Firewall Compliance Maintenance YouTube IT Management Document Management Business Technology Wi-Fi Content Filtering Bandwidth Risk Management Computers Virtualization Virtual Private Network Wireless Apple Office Tips Education Storage The Internet of Things Password Vendor Management Two-factor Authentication Monitors iOS Chromebook Managed IT Service Downtime Customer Relationship Management Scam Cybercrime Data loss Marketing Telephone Systems Outlook Break Fix Mobile Security IT Bring Your Own Device desktop Search Social Network Free Resource LiFi Budget Remote Computing Hosted Solution Business Intelligence Humor SaaS Best Practice OneNote Images 101 Administration Mouse Data Breach Server Management Windows 7 Touchscreen Regulations Cryptocurrency Software as a Service Solid State Drive Managed IT Going Green Identity Theft How To Augmented Reality Tablet MSP Retail Alert Blockchain Remote Managing Stress Training Printing Vendor Laptop Hard Disk Drive Shortcuts Mobile Management Firefox Superfish Wearable Technology Peripheral Network upgrade Health Private Cloud Legal Monitoring Solid State Drives Dell Bluetooth Comparison Nanotechnology K-12 Education Office Samsung WannaCry Address Permissions Alerts Shadow IT USB Tech Support Unified Communications Drones Employee-Employer Relationships Cabling Motherboard user treats Cables Windows 8 Streaming Processor Hybrid Cloud Google Maps User Error Identity Files Continuity Troubleshooting Business Analysis Patch Management Fraud Memes Cost Management Security Cameras Profiles Management Smart Office Deep Learning Spying National Security Specifications Screen Reader Instant Messaging Charging Social Engineering Mobile Device Management Licensing Gamification Dongle Websites Analysis Students Heating/Cooling Multi-Factor Security Shopping Wires Twitter Human Error Memory Scalability Time Management Printer RMM Solar Alt Codes Virus Assessment Utility Computing Digital Payment Policy Work Updates Black Friday Smart Tech Safety Device Reducing Cost Digital Emergency Cooperation Service Level Agreement Mixed Reality Meetings Disaster Servers Google Calendar Employees Voice over Internet Protocol Internet Exlporer Migration Consulting Network Management Banking Network Congestion Typing Halloween LED Threats Dark Web Hotspot Holidays Laptops IT Technicians Procedure Optimization PowerPoint Cyber Monday Distribution Connectivity Current Events Mobility Batteries Spyware Staff Leominster Uninterrupted Power Supply Legislation Modem Gig Economy FinTech Writing Language Payment Card Value File Sharing SharePoint Reviews Scary Stories Co-Managed IT Computer Care IBM Microsoft Excel Managed Services Provider Techology Mirgation PCI DSS Recycling Dark Data Update Google Docs Running Cable Onboarding GDPR Smart Technology Logistics IoT 2FA IT solutions Print Toner Myths Lenovo K-12 Schools Slack Hard Disk Drives Statistics Cookies FBI Hacks Buisness Computing Infrastructure Inventory Professional Services Politics Google Wallet Virtual Desktop Messaging Downloads Social Networking Bitcoin Sports Content Huawei Corporate Profile Mail Merge Entertainment Automobile VoIP Unified Threat Management Chatbots Battery eWaste Customer Service Business Growth Digital Signage Data Warehouse G Suite Shortcut Distributed Denial of Service Asset Management Star Wars Work/Life Balance Supercomputer CrashOverride Motion Sickness Black Market Staffing Law Enforcement Administrator Taxes IT Budget Electronic Medical Records Web Server what was your? Notifications GPS Physical Security Upgrades Gadget Emoji Printers IT Consultant Cameras Regulation Crowdsourcing Mobile Computing Tracking Personal Information Botnet 3D Printing Cortana Cleaning CCTV Machine Learning Webcam Processors Unsupported Software Financial Error Computer Repair Relocation Point of Sale Ben McDonald shares Mobile Data Travel Recovery How To

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3