Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Helpful Outlook Tips

Tip of the Week: Helpful Outlook Tips

Many businesses turn to Microsoft Outlook as their email client of choice. Did you know that Outlook comes with certain features that make it an even better business option? To help you get the most use out of Outlook, we’re sharing a few of these features as this week’s tip.

Consolidate Your Email with the Clean Up Tool

Businesses will often use email to communicate between groups of people, which is a really useful practice for keeping people apprised and in-the-know of what’s going on. However, these messages can quickly become repetitive, incoherent messes--especially in chains made up of larger groups--as participants reply to them, duplicating the thread within itself. Outlook includes a utility known as the Clean Up tool to fix these problems in your email conversations, and even in entire email folders.

By finding the Clean Up icon in the ribbon at the top of your Outlook window, you can access a drop-down menu. This menu offers to Clean Up Conversation, Clean Up Folder, or Clean Up Folder & Subfolders. Once you’ve confirmed your choice, you can access Clean Up settings, which allow you more granular control over how the tool sorts through your existing conversations.

Schedule Out a Message with Future Delivery

Sometimes you’ll have an opportune moment to send an email, but it isn’t the right time for this email to be received. For instance, if you want to share something with your employees to keep in mind throughout the next day, it doesn’t make sense to distribute it at the end of the day before for it to be forgotten. Outlook allows you to use your opportunity to your full advantage with Future Delivery.

Once you’ve written an email, click on Options, and then Delay Delivery. This opens a Properties box for that specific message, including Delivery Options that include a checkbox labeled “Do not deliver before.” Selecting this option and specifying a time and date will prevent your recipient from receiving your message before that point. Once you’re satisfied, close the Properties box and send the message just like any other.

Taking Advantage of Shortcuts

Keyboard shortcuts are used to simplify access to commonly-used functions in many computer programs and applications, and Outlook is no exception. For instance, Outlook features shortcuts for a wide range of its functionality - covering the basics (like composing a new message by pressing Ctrl+Shift+M), organizational tools (like moving a message with Ctrl+Shift+V) or annotating your messages (like adding flags to important ones with Ctrl+Shift+G).

This is really just the start of Outlook’s capabilities to help your operations. Subscribe to our blog to find out whenever we post other tips or IT blogs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Social Media Chrome Tech Term Virtualization Saving Money Holiday Gadgets Microsoft Office Managed Service Managed IT Services Automation Operating System Cybercrime Computers Artificial Intelligence Facebook Hacking Health Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Information Remote Spam Office 365 Alert Telephone Systems Covid-19 Managed Service Provider Information Technology Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Big Data Encryption Human Resources Applications Mobile Computing Remote Monitoring Law Enforcement Application App History Password Data Breach Money VPN Remote Computing How To Government Mobile Office Private Cloud Data Storage Patch Management Managed IT Office Tips Blockchain Training Paperless Office Apps Servers Gmail Settings Infrastructure Voice over Internet Protocol Google Drive Flexibility Two-factor Authentication Data Security Marketing WiFi Mouse IT solutions Avoiding Downtime HaaS Entertainment Website Budget Vulnerability Bring Your Own Device Windows 7 Word Wireless Data Management Work/Life Balance Connectivity Remote Work Vendor Management End of Support Education Physical Security Firewall Safety Sports HIPAA Redundancy Virtual Reality Apple Keyboard Social Data Protection User Error USB Meetings Vendor Managed Services Save Time Conferencing Display Risk Management Hacker Scam Cleaning Software as a Service Telephone System The Internet of Things Staff Employee/Employer Relationship Lithium-ion battery Machine Learning RMM Update Computing Battery Shadow IT Customer Service Unsupported Software Google Docs Legal Environment Identity Theft Charger Virus Internet Exlporer Fax Server Digital Signage Compliance Unified Threat Management OneNote Computer Care Current Events PDF SaaS Computer Accessories Telephony Augmented Reality Fraud Samsung Proactive IT Procurement Net Neutrality Workplace Strategy Network Congestion Remote Worker Best Practice Value eWaste Printer YouTube Cryptocurrency Help Desk Bluetooth Spam Blocking Electronic Medical Records Black Market Printing Comparison Hiring/Firing Wearable Technology Managed Services Provider Document Management Solid State Drive Wireless Technology Retail Hard Drives CES Instant Messaging Database IT Consultant How to Downtime Robot Excel Business Technology Remote Workers Content Management Biometrics Access Control Humor Data storage Virtual Desktop Processor Business Intelligence Automobile Virtual Assistant Authentication Audit Worker Computing Infrastructure DDoS Hard Drive IT Management Going Green Botnet SharePoint IT Plan WIndows 7 Workers Techology Ergonomics Benefits Laptop Analyitcs Digital Signature Smartwatch Programming OLED FENG Customers Warranty Development IBM PCI DSS HVAC Virtual Machine Google Apps Audiobook Flash 2FA Smart Technology Touchpad Fiber Optics Analysis Employee Messaging Devices Cabling Antivirus Administrator Supercomputer Advertising Policy Enterprise Content Management Hypervisor Windows 8 Software Tips Politics Sync User Emails PowerPoint Dark mode IT service MSP Windows Media Player Trend Micro Accountants SMS Notifications Thought Leadership Default App Credit Cards Microchip Procedure Password Management Saving Time Tablet Password Manager Google Search Multi-Factor Security Managing Stress Netflix dark theme Two Factor Authentication Domains Shopping AI Twitter IT Infrastructure Root Cause Analysis Relocation Search Engine Knowledge IaaS Cameras FinTech Music Maintenance NIST Business Mangement Bing HBO Skype Trending Video Games Social Network Bloatware Smart Tech Addiction Investment Amazon Data loss Worker Commute Leadership Employees Troubleshooting Employee/Employer Relationships Tablets Recycling Outlook Experience ISP Start Menu Scalability Windows 365 Wiring Entrepreneur Practices Video Conferencing Cache ROI Amazon Web Services Screen Mirroring Business Owner Loyalty Printer Server Sales Books NarrowBand Shortcut Safe Mode Bitcoin Criminal Shortcuts Frequently Asked Questions Hosted Computing Cryptomining Mobile Windows 10s Search Point of Sale GDPR Personal Cost Management Supply Chain Management Social Networking Wireless Internet Online Shopping Cast iPhone webinar Monitoring Emergency File Sharing Batteries Tip of the week Inventory Professional Services Specifications Public Cloud Windows 8.1 Employer Employee Relationship Camera Digitize Running Cable Wire Windows Server 2008 R2 Evernote Assessment Files Travel Customer relationships Chromecast Memory Windows Server 2008 Manufacturing Tools Millennials Email Best Practices Printers IT Assessment Uninterrupted Power Supply Smart Office Wireless Charging Television Colocation Computer Tips Managed IT Service Security Cameras Biometric Security Workforce Virtual CIO Monitor Virtual Private Network OneDrive Peripheral Science Cables Consultant Public Computer Regulations Analytics Digital Security Cameras Transportation Using Data Streaming Media Nanotechnology 5G Telecommuting Computer Fan Rootkit Reputation Project Management Copiers Distributed Denial of Service Quick Tip Tech Support Customer Relationship Management Cortana Content Best Available

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code