ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Outlook Quick Steps to Breeze Through Your Email

b2ap3_thumbnail_outlook_mail_400_20150220-055732_1.jpgOne of the best reasons to use Microsoft Outlook is the little-known Quick Steps feature. With Quick Steps, you can apply multiple actions at the same time to your email messages. Users that feel bogged down by their inbox will especially appreciate this email management tool.

The advantage of Quick Steps is that it’s customizable, letting you select a number of actions of your choosing into one easy click. For example, you can use Quick Steps in Outlook to create your own Send and Archive button and have it archive into a specified Outlook folder. You can also make a Send and Delete action, and you can bulk-forward messages with a subject of “IT Department.” One more handy aspect about Quick Steps is that you can display six of your favorite Quick Step actions in your Outlook ribbon.

To get started with Quick Steps, determine how exactly you want to use the feature from a path of three different options:

  • Change an existing, pre-made Quick Step.
  • Create a new Quick Step that starts you off with an action.
  • Create a new Quick Step from scratch.

If you want to use the default Quick Steps provided by Outlook, here’s a rundown of what you have to work with provided by the Microsoft Office support website.

  • Move to: Moves the selected message to a mail folder that you specify and marks the message as read.
  • To Manager: Forwards the message to your manager. If your organization uses Microsoft Exchange Server, your manager's name is detected in the Global Address List and inserted in the "To" box, or you can specify the recipient.
  • Team E-mail: Forwards the message to others in your team. If your organization uses Microsoft Exchange Server, your team members names are detected in the Global Address List and inserted in the "To" box.
  • Done: Moves the message to a specified mail folder, marks the message complete, and then marks it as read.
  • Reply & Delete: Opens a reply to the selected message, and then deletes the original message.
  • Create New: Create your own Quick Step to execute any sequence of commands, name it, and then apply an icon to help you identify it.

How to Change an Existing Quick Steps
Go to Mail > Home tab > Quick Steps group, and then click the More arrow at the side of the Quick Steps box, and then click Manage Quick Steps.

 

quick step

In the Quick Step box, click the Quick Step that you want to change, and then click Edit.

manage quick steps

  • Under Actions, change or add the actions that you want this Quick Step to do.

How to Create a New Quick Step

  • Go to Mail > Home tab > Quick Steps group > Quick Steps gallery, and then click the Create New Quick Step.
  • Click an action type from the list or click Custom.
  • In the Name box, type a name for the new Quick Step.
  • Click the icon button next to the Name box, click an icon, and then click OK.
  • Under Actions, choose an action that you want the Quick Step to do. Click Add Action for any additional actions.
  • To create a keyboard shortcut, in the Shortcut key box, click the keyboard shortcut that you want to assign.

Creating a customizable Quick Step is as easy as that. Take full advantage of this feature to spend less time in your Outlook inbox and more time doing what you love. Isn’t that the whole point of email anyway?

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 Windows 10 Apps IT Support Browser Managed Service Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Blockchain Bandwidth Business Technology Encryption WiFi Mobile Device Management Information App Server Virtualization Remote Spam Information Technology History Budget Gmail Office Two-factor Authentication Apple Employee/Employer Relationship Office 365 Health BDR Cybercrime Analytics Wi-Fi Conferencing Big Data Access Control Data Security Employer-Employee Relationship Remote Monitoring Hacker Document Management Voice over Internet Protocol Save Money Compliance IT Management Remote Computing Training Help Desk Hacking Vendor Patch Management Cost Management Best Practice Project Management Legal Money Retail Data storage Customer Service Alert Unified Threat Management Firewall Mobile Office Hiring/Firing Outlook Augmented Reality Data loss Word Managed Services Password IBM Website BYOD Computing Vendor Management Hard Drive Applications Search... Vulnerabilities Law Enforcement Maintenance Monitoring End of Support Storage Printer Healthcare Social Sports DDoS SaaS Websites Remote Workers Mobility Meetings User Travel Windows 7 Virtual Reality iPhone Social Engineering Free Resource Cortana Google Maps Education Cryptocurrency Black Market Scam Content Filtering Windows 11 How To Cleaning Chrome Robot VPN Router Update The Internet of Things Data Breach YouTube Mobile Computing Marketing Twitter Running Cable Laptop Paperless Office Antivirus Video Conferencing Microchip Downtime Multi-factor Authentication Physical Security Flexibility Safety Virtual Machines Computer Repair Virtual Desktop Saving Time Professional Services Experience Start Menu Hack Identity Theft Notifications Downloads Computer Care Computers Bitcoin Unified Communications Vulnerability Google Docs HIPAA Telephone Managed Services Provider Bluetooth Software as a Service Disaster Data Protection Distributed Denial of Service Virtual Private Network Office Tips Excel Private Cloud Memory Lithium-ion battery Current Events Solutions Politics Processors Virtual Assistant Machine Learning Settings Integration Tech Terms Images 101 Display PowerPoint Managed IT Solid State Drive Administration Digital Presentation Processor Employees Specifications Chromebook IT Consultant Avoiding Downtime Drones Taxes Wireless Technology Automobile Holidays Customer Relationship Management eWaste Co-Managed IT Cooperation How To Entertainment Teamwork Cache Heating/Cooling 2FA Environment Shortcuts Emails Workers Social Networking Data Storage Fake News Hypervisor Windows XP Proxy Server Unified Threat Management Medical IT Service Level Agreement Shopping Computing Infrastructure In Internet of Things Hacks SQL Server Network Congestion Printing Management Paperless Device security CCTV Be Proactive Wireless Headphones PCI DSS Microsoft Excel Reliable Computing Licensing Writing Touchscreen Tech Emergency Going Green Gig Economy Business Cards Computer Malfunction Humor Internet Service Provider Azure Error Vendor Mangement Business Communications Workplace Strategies Samsung Regulations Compliance Scalability Managed IT Service Troubleshooting Bookmark Proactive IT Term Staffing Download Uninterrupted Power Supply Piracy Administrator Webcam Memes Text Messaging Net Neutrality Bring Your Own Device Business Mangement IP Address Human Resources HTML Nanotechnology Tablets Financial Data Browsers Music Google Play Upload Risk Management Software License IT Google Calendar Social Network Google Apps Supercomputer Virus Smart Technology Screen Reader Telework Business Owner Data Analysis Microsoft 365 Security Cameras Recovery Trends Competition Smartwatch Mobile Technology Botnet Motion Sickness Communitications Procurement Rental Service Micrsooft Comparison Customer Resource management Google Drive Devices Entrepreneur FinTech Tip of the week Flash LiFi Fileless Malware Business Growth Knowledge Documents Gamification Corporate Profile Application CES Company Culture IT Assessment Telephone Systems Employer Employee Relationship Business Intelligence Supply Chain Management Value Television Telephone System Telephony Regulations Directions Supply Chain Backup and Disaster Recovery Cabling Organization Cyber security Inbound Marketing Google Wallet Securty Content Tablet Desktop G Suite Smart Devices Banking Accountants Tracking Remote Working Messenger Deep Learning Mouse Electronic Medical Records VoIP Domains Workplace Database AI Trend Micro Business Metrics Electronic Payment Transportation Hosted Solution Digital Security Cameras Web Server Electronic Health Records Equifax Digital Payment Books Wasting Time SharePoint Health IT Society Scams Tactics Worker Hard Drive Disposal eCommerce Language Modem Surveillance Phone System Username Access Public Speaking Videos Startup Public Cloud Freedom of Information Reading Managing Costs Monitors Streaming Media Visible Light Communication Time Management SSID Windows 8 Navigation Cables Addiction Keyboard email scam Development Employer/Employee Relationships Audit Spyware Hard Drives Media Mobile Security Legislation File Sharing intranet News Relocation Virtual Machine Displays Advertising User Tip Tech Support Evernote Redundancy Wireless Computer Accessories Point of Sale Network Management Shortcut Reviews Optimization Work/Life Balance

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?