Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Helpful Outlook Tips

Tip of the Week: Helpful Outlook Tips

Many businesses turn to Microsoft Outlook as their email client of choice. Did you know that Outlook comes with certain features that make it an even better business option? To help you get the most use out of Outlook, we’re sharing a few of these features as this week’s tip.

Consolidate Your Email with the Clean Up Tool

Businesses will often use email to communicate between groups of people, which is a really useful practice for keeping people apprised and in-the-know of what’s going on. However, these messages can quickly become repetitive, incoherent messes--especially in chains made up of larger groups--as participants reply to them, duplicating the thread within itself. Outlook includes a utility known as the Clean Up tool to fix these problems in your email conversations, and even in entire email folders.

By finding the Clean Up icon in the ribbon at the top of your Outlook window, you can access a drop-down menu. This menu offers to Clean Up Conversation, Clean Up Folder, or Clean Up Folder & Subfolders. Once you’ve confirmed your choice, you can access Clean Up settings, which allow you more granular control over how the tool sorts through your existing conversations.

Schedule Out a Message with Future Delivery

Sometimes you’ll have an opportune moment to send an email, but it isn’t the right time for this email to be received. For instance, if you want to share something with your employees to keep in mind throughout the next day, it doesn’t make sense to distribute it at the end of the day before for it to be forgotten. Outlook allows you to use your opportunity to your full advantage with Future Delivery.

Once you’ve written an email, click on Options, and then Delay Delivery. This opens a Properties box for that specific message, including Delivery Options that include a checkbox labeled “Do not deliver before.” Selecting this option and specifying a time and date will prevent your recipient from receiving your message before that point. Once you’re satisfied, close the Properties box and send the message just like any other.

Taking Advantage of Shortcuts

Keyboard shortcuts are used to simplify access to commonly-used functions in many computer programs and applications, and Outlook is no exception. For instance, Outlook features shortcuts for a wide range of its functionality - covering the basics (like composing a new message by pressing Ctrl+Shift+M), organizational tools (like moving a message with Ctrl+Shift+V) or annotating your messages (like adding flags to important ones with Ctrl+Shift+G).

This is really just the start of Outlook’s capabilities to help your operations. Subscribe to our blog to find out whenever we post other tips or IT blogs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Phishing Upgrade Outsourced IT Data Backup Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Tech Term Chrome Virtualization Gadgets Saving Money Holiday Social Media Microsoft Office Managed IT Services Automation Managed Service Cybercrime Operating System Computers Artificial Intelligence Facebook Health Hacking Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Managed Service Provider Covid-19 Spam Office 365 Alert Telephone Systems Information Technology Remote Information Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Bandwidth Encryption Human Resources Applications Data Breach Big Data Remote Monitoring Law Enforcement Mobile Computing App Application History Password Money Remote Computing Government Mobile Office Private Cloud How To Managed IT Office Tips Blockchain Training Paperless Office Data Storage Apps Patch Management VPN Infrastructure Voice over Internet Protocol Google Drive Two-factor Authentication Servers Mouse Avoiding Downtime HaaS Data Security Flexibility Marketing WiFi IT solutions Entertainment Website Budget Bring Your Own Device Wireless Data Management Work/Life Balance Gmail Vulnerability Windows 7 Settings Word Education Physical Security Firewall Safety Vendor HIPAA Managed Services Sports Vendor Management Redundancy Display Virtual Reality Apple Keyboard Social Employee/Employer Relationship Data Protection User Error RMM Meetings Save Time Risk Management Hacker USB Cleaning Telephone System The Internet of Things Staff Software as a Service Lithium-ion battery Conferencing Machine Learning Connectivity Remote Work End of Support Scam Identity Theft IT Management Fax Server Managed Services Provider Internet Exlporer Botnet IT Plan Database PDF SaaS Remote Workers Augmented Reality Fraud Unsupported Software Processor Proactive IT Charger Network Congestion Remote Worker eWaste Best Practice Virus Cryptocurrency Hard Drive Compliance YouTube Computer Care Black Market Unified Threat Management OneNote Current Events Computer Accessories Telephony Computing Samsung Comparison Document Management Wearable Technology Retail Hard Drives CES Solid State Drive Wireless Technology Value Downtime Instant Messaging How to Printer Excel Robot Bluetooth Business Technology Content Management Spam Blocking Electronic Medical Records Data storage Digital Signage Biometrics Access Control Automobile Virtual Desktop Virtual Assistant Hiring/Firing Authentication Computing Infrastructure DDoS Going Green IT Consultant Procurement Net Neutrality SharePoint Workplace Strategy Help Desk Humor Update Business Intelligence Battery Printing Shadow IT Customer Service Worker Environment Google Docs Audit Legal Personal Public Computer Cryptomining Antivirus Administrator Consultant Devices Point of Sale Enterprise Content Management Analytics Windows 8 Regulations Politics Supply Chain Management Advertising Transportation Rootkit IT service MSP Accountants Monitoring Computer Fan Batteries Windows 8.1 Credit Cards Digitize Microchip Notifications Best Available Thought Leadership Password Management Tablet Password Manager Workers Windows Server 2008 R2 Benefits WIndows 7 Domains Customer relationships Multi-Factor Security FENG Email Best Practices IT Assessment IBM Relocation Manufacturing Search Engine Twitter Maintenance NIST Business Mangement Flash IaaS Smart Technology Managed IT Service Security Cameras Bloatware Smart Tech Computer Tips Trending Video Games Virtual CIO Amazon Software Tips Worker Commute OneDrive Supercomputer Biometric Security Addiction PowerPoint Tablets Recycling Sync Experience Windows Media Player Peripheral Emails User Using Data Wiring Entrepreneur Practices Digital Security Cameras Scalability Amazon Web Services Business Owner Copiers 5G Cache Managing Stress Shortcut Safe Mode Criminal Quick Tip Netflix Two Factor Authentication NarrowBand Smartwatch GDPR Cost Management Hosted Computing Ergonomics Root Cause Analysis Search Cameras Online Shopping HBO Development Knowledge iPhone OLED Music Social Networking Wireless Internet File Sharing Skype PCI DSS Virtual Machine Fiber Optics Employee Camera Inventory 2FA Specifications Data loss Evernote Outlook Messaging Leadership Files Cabling Running Cable Troubleshooting Wire Memory Start Menu Policy Travel Hypervisor Chromecast Trend Micro Loyalty Printers Dark mode Millennials Screen Mirroring Printer Server Wireless Charging Frequently Asked Questions SMS Colocation Default App Books Uninterrupted Power Supply Smart Office Mobile Procedure Windows 10s Saving Time Cast Shopping Monitor Google Search Virtual Private Network dark theme Workforce Science Cables Tip of the week AI webinar IT Infrastructure Emergency Employer Employee Relationship Bing Professional Services FinTech Public Cloud Social Network Assessment Reputation Project Management Streaming Media Nanotechnology Telecommuting Cortana Windows Server 2008 Content Investment Distributed Denial of Service Tech Support Customer Relationship Management Laptop Analyitcs Digital Signature Tools Employees Techology Employee/Employer Relationships Television Customers ISP Warranty Programming Windows 365 HVAC Google Apps Audiobook Video Conferencing ROI Touchpad Shortcuts Analysis Sales Bitcoin

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code