Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Configuring the Junk filter in Outlook 2010/2013

no junkEveryone hates seeing an inbox full of spammed junk email. This takes time to clean up and to ensure that no important messages are missed. Using the following steps, you can mitigate the amount of junk mail that gets delivered to your inbox via Microsoft Outlook.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupWorkplace TipsUser TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityIT ServicesHardwarewindowsProductivityUpgradeComputerCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationWindows 10AppsSmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityBrowserVoIPServerMicrosoft OfficeMobile Device ManagementHealthSocial MediaMobile ComputingTech TermAndroidInformation TechnologyQuick TipsPasswordsCybersecurityMobile OfficeWindows 10Going GreenOffice 365HolidayData BackupOperating SystemChromeData RecoverycommunicationsOfficeSave MoneyAppUsersAlertBest PracticeCybercrimeOutsourced ITCollaborationBYODApplicationInternet of ThingsEmployer-Employee RelationshipspamData SecurityIT SupportMarketingRansomwareSearchLaw EnforcementManaged IT ServicesThe Internet of ThingsFacebookAppleVendor ManagementWiFiPhishingBring Your Own DeviceRemote ComputingTabletWirelessWearable TechnologyBDRMoneyHackingHistoryUser ErrorRemote MonitoringUnified Threat ManagementAntivirusAvoiding DowntimeiPhoneMobilityRisk ManagementCost ManagementAutomationMaintenanceSaving TimeRouterWireless TechnologyOffice TipsOneNotePasswordGovernmentCloud ComputingCustomer Relationship ManagementComputersData ManagementBandwidthSocialTelephone SystemsArtificial IntelligenceHard DrivesIT SolutionsTech SupportBig DataEncryptionUpdatePowerPointUnsupported SoftwareAnalyticsProactive ITFirewallWi-FiShortcutInformationVulnerabilityLithium-ion batteryCurrent EventsNetworkingGoogle DriveVPNHumorWebsiteNet NeutralityBudgetEducationPhone SystemPrinterOutlookSocial NetworkingTwo-factor AuthenticationGmailManaged IT ServicesUSBVirusBlockchainadministrationWork/Life BalanceExcelStreaming MediaTrendingMobile DeviceMeetingsDisasterAuditTravelWordTelephonyPoliticsIntranetAugmented RealityLaptopContent FilteringManaged ServiceSocial EngineeringManaged ITEntertainmentIT COnsultantTelevisionRetailBatteryRecoveryPaperless OfficeComputer RepairPersonal InformationApplicationsIdentity TheftStoragehackerHard DriveUninterrupted Power SupplySalesLegalTransportationHosted SolutionEnd of SupportPrintingBusiness IntelligenceCommerceData ProtectionOnline CurrencyFlexibilityCustomer ServiceGoogle AssistantBiometricsConferencingIT ManagementWindows 8Virtual RealityPrivate CloudScamData StorageHIPAADevicesPoint of SaleInternet ExlporerHuman ResourcesPrinter ServerPatch ManagementDDoSInstant MessagingEmailsWannaCryTwitterProgrammingTouchscreenFraudGoogle DocsSportsDisplaySamsungBenefitsAmazoneWasteBusiness TechnologyComputer AccessoriesWireless ChargingOneDriveAccess ControlValueSaaSAutomobileMobile SecurityFile SharingFax ServerCleaningYoutubeData BreachProject ManagementComputingHaaSCortanaSave TimeComputer CareHybrid CloudManaging StressEvernoteIT budgetKeyboard ShortcutsjunkLicensingSolid State DriveWorker CommuteProjectsAdministratorData PrivacyEmployeesCamerasLegislationSettingsKeyboardSharePointVideo GamesVirtual AssistantUserWorkersPayrollfilterTablets3D PrintingHard Disk DriveWindows 7AccessHiring/FiringWebinarSurge ProtectorVirtual DesktopImagesChromebookVoice over Internet ProtocolPresentationComparisonHBOTeamworkAlexa for BusinessBest AvailableUpdatesScienceIdentitiesSecurity CamerasNFLCo-Managed ServicesSmart TechnologySabotageSpecificationsMicrosoft WordRobotLanguageMachine LearningTelephoneDebateBuisnessAdvertisingHelp DeskPCRunning CableScalabilitySoftware as a ServiceDevice SecurityData storageDowntimeWindows InkiOSCommunityExperienceHyperlinkPDFComputer ForensicsSmartwatchNear Field CommunicationGiftsISPWIndows Server 2008UpgradesHow ToIntrantetProactiveE-CommerceGoogle MapsComputer FanMusicWasting TimeEmployer Employee RelationshipTutorialText MessagingManagementServer MaintenanceIT consultingCredit CardsScreen MirroringBloggingConsultantVendorSpywareTouchpadWebsitesPayment CardsData LossLifestyleBooksAccessoryWireless InternetInvestmentReliable ComputingFAQCastComplianceSyncDistributed Denial of ServiceBlack MarketEmployee-Employer RelationshipBloatwareData TheftEmployeeMonitorsCo-managed ITElectronic Medical RecordsPeripheralGamificationROIChargerInbound MarketingWebinarEdgeOperating SysytemApp storeBreak/FixMicrosoft ExcelNanotechnologyFilesSafetyTrainingPrint ServerBrandingMemoryCiminalAdobeIT solutionsNokiaTestingMouseMedical ITRoot Cause AnalysisGift GivingChromecastEbayCompany CultureFinancialWIndows 7AdminWindows 10sCameraNetwork CongestionReputationIdentity5GRegulationsMicrobloggingBluetooth