Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Labels and Filters
Gmail helps you keep your messages organized through the use of labels and filters. Basically, you can assign rules that will apply to any messages that you receive. By effectively using filters, you can make browsing your inbox more efficient, as well as consolidate similar messages with little effort.

For example, a filter could be used to assign a label to any message that holds “quarterly report” in the subject line. These labels would then be applied to any incoming messages that have that specific criteria.

Creating a Filter
To create a filter in Gmail, just follow these steps:

  • Click the down arrow in the search bar. You can then select specific details that you want to include in your search criteria.
  • Select the criteria that you want your filter to look for. Once you’ve done so, click on Create filter with this search.
  • You’ll then be provided with several options, one of which will automatically mark your conversation as important. Be sure to select the option to Apply the label.
  • Next, select the drop-down menu that’s labeled Choose label. You can then create a new label or one that has already been made.
  • Once the filter has been configured, select the Create Filter button.

Creating a Label
You can also apply labels to your messages, but in order to do so, you first need to make the label. You’ll be able to both apply labels as you receive messages, or apply them to existing messages. We’ll walk you through the process:

  • In Gmail, click on the More option on the left side of the screen.
  • Next, select Create new label.
  • Provide a name for your label and create it.

Now all you have to do is apply the label to your messages.

  • First, open up the message you want to apply the label to.
  • At the top of your screen, select the Label button. You can add a label to any group of messages provided you have selected them all before you click the label button.
  • You must then select each label you want to add. You can also create a new label at this point if you need to.

To learn more about how to take full control of your Gmail inbox, be sure to keep a lookout for similar articles from Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Phishing Email Workplace Tips IT Services Hosted Solutions Collaboration Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Passwords Cybersecurity Backup Saving Money Communication Data Backup Smartphone Managed Service Android Smartphones VoIP Productivity Upgrade Business Management Mobile Devices communications Data Recovery Disaster Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Gadgets Information Covid-19 Cloud Computing Holiday Miscellaneous Remote Work Server Training Managed Service Provider Outsourced IT Spam Encryption Employee/Employer Relationship Compliance Office Windows 10 Government IT Support Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Apps Data Security Vendor Mobile Office Two-factor Authentication Apple Networking Employer-Employee Relationship App BYOD Managed Services Mobile Device Management Voice over Internet Protocol Gmail Tip of the week Chrome Budget How To HIPAA BDR Applications Hacker Computing Avoiding Downtime Information Technology Marketing Conferencing Access Control Office 365 WiFi Managed IT Services Router Computers Operating System 2FA Help Desk Website Virtual Private Network Risk Management Health Healthcare Analytics Office Tips Augmented Reality Retail Storage Big Data Password Bring Your Own Device Solutions Customer Service Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Monitoring Physical Security Excel Display Printer Paperless Office Infrastructure Remote Workers Firewall Telephone Document Management Cooperation Free Resource The Internet of Things Project Management Windows 7 Scam Social Microsoft 365 Data loss Administration Customer Relationship Management Employees Integration Robot Modem Hacking User Tip Processor Mobile Security Presentation Settings Wireless Printing Holidays Content Filtering Wireless Technology IT Management VPN YouTube Meetings Data Storage Smart Technology Supply Chain Video Conferencing Cryptocurrency Managed Services Provider Virtual Machines Professional Services Computer Repair Saving Time Word Virtual Desktop Data storage Managed IT Service LiFi Downloads Outlook iPhone Machine Learning Licensing Money Safety Humor Vulnerabilities Entertainment Data Privacy Maintenance Images 101 Sports Antivirus Mouse Mobility Telephone System Multi-Factor Authentication Cost Management Content Remote Working Wearable Technology Memory Vendors IBM Mobile Computing Comparison Google Play Be Proactive Tablet Search Health IT Motherboard Data Breach Directions Videos Assessment Electronic Health Records Permissions Workforce Best Practice Alert Buisness File Sharing Dark Data Wasting Time Threats Managed IT Trend Micro Legal Specifications Security Cameras Workplace Strategies IT solutions How To Microchip Internet Exlporer Software as a Service Fraud Meta Competition Business Growth Notifications Travel Username Managing Costs Amazon eCommerce Techology Black Friday SSID Google Maps Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes Media User Downtime Unified Threat Management IT Technicians Virtual Machine Environment Cookies Unified Threat Management Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Typing Network Congestion Mirgation Hypervisor Displays IP Address Nanotechnology Optimization Google Drive User Error PowerPoint Knowledge Shopping Addiction Language Employer/Employee Relationships Outsourcing Navigation Recovery Point of Sale 5G Management PCI DSS Chatbots Screen Reader Google Docs Distributed Denial of Service Workplace Hard Drives Unified Communications Experience Gig Economy Running Cable Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Domains Bitcoin Network Management Google Wallet Evernote Paperless Monitors Regulations Compliance Identity Smart Tech Memes Co-managed IT Refrigeration Bookmark Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care Public Speaking Windows 8 Drones Business Communications Financial Data History Lithium-ion battery Connectivity IT SharePoint Break Fix Scams Entrepreneur Electronic Medical Records Browsers Smartwatch Halloween Upload Procurement Azure Hybrid Work Lenovo Multi-Factor Security Tech Human Resources Writing Social Network Telework Cyber security IoT Communitications Dark Web Cables Undo Virtual Reality CES Scary Stories Private Cloud Trends Supply Chain Management Hacks Server Management Superfish Google Calendar Term Google Apps Identity Theft Fun Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Twitter Data Analysis Error Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Application Education Social Engineering Organization Social Networking Smart Devices Ransmoware Remote Computing Fileless Malware Digital Security Cameras

Blog Archive