Solved

Rules in Outlook

Posted on 2004-10-01
4
293 Views
Last Modified: 2010-04-10
I need to create a rule in Outlook 2000 that runs against the sent items folder.

It has to move all the emails sent to anyone at my company.
In other words, all emails containing @mycompany.com  in the email address need to be move, not copied, to a folder already created.
I am having a hell of time.
THis is quite urgent and I'll apreciate any input ASAP.

thanks,
Juan
0
Comment
Question by:jibarra
  • 2
4 Comments
 
LVL 2

Accepted Solution

by:
TeeSeePeeEyePee earned 500 total points
Comment Utility
Within Outlook:

First, highlight "Sent Items" in the folder list, then:

Go to Tools, then Rules and Alerts

Choose "New Rule"

Choose "Start from a blank Rule"

Choose "Check Messages When they arrive" (I know this sounds wrong, but you can't delete or move messages if you choose "after sending")

Choose "With specific words in the recipient's address"

Click "specific words"

Type "@mycompany.com"


Click "OK" and "Next"

Choose "Move it to the specified folder", and then specify your destination.

If there are no exceptions, choose "Next"

Check "Run this rule now on messages already in "Sent Items" to process existing messages.

Check/Uncheck "Turn on this rule" if you want it to continue to run going forward.

Click "Finish" - that should do it.

0
 
LVL 2

Expert Comment

by:lyle-granger
Comment Utility
TeeSeePeeEyePee

Excellent instructions, very well put.  

Lyle
0
 

Author Comment

by:jibarra
Comment Utility
That is it.  That's what I was doing wrong.

Choose "Check Messages When they arrive" (I know this sounds wrong, but you can't delete or move messages if you choose "after sending")

I really appreciate the promt response.

juan

0
 
LVL 2

Expert Comment

by:TeeSeePeeEyePee
Comment Utility
You got it, Juan - if it works for you, please accept the answer.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now