Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Step-By-Step Guide to Customize Your Windows 10 Notifications

Tip of the Week: A Step-By-Step Guide to Customize Your Windows 10 Notifications

Windows 10’s updates have provided users with entirely new ways to receive notifications, including the ability to sync their notifications via Android’s Cortana app. However, you’ll be happy to hear that you can control how these notifications appear. We’ll walk you through some basic steps on how to customize your Windows 10 notifications.

On the Lock Screen
Notifications will appear on your Windows 10 lock screen, which is great for when you don’t want to log into your device, but a privacy concern otherwise. If you want to remove all notifications from the lock screen, go to Settings > System > Notifications & actions > Notifications. Then, turn off the switch for Show notifications on the lock screen. Or, if you’d rather just hide certain notifications from appearing on the lock screen, go through System > Notifications & actions > Get notifications from these senders. Select the app that you want to change and select On under the Keep notifications private on the lock screen option.

Set Priority Notifications
You’re a busy person, so you understand that not all app notifications should have priority. Thankfully with Windows 10, you can set certain apps to different priority levels to better manage how you receive their notifications. To do so, go to Settings > System > Notifications & actions > Get notifications from these senders. Select the app that you want to configure and, under Priority of notifications in the action center, assign it a priority level. You can choose from Top, High, or Normal.

Additionally, you can choose how many of an app’s notifications will appear in the action center at any given time. The default is set to three, but you can have it go all the way up to 20. You can change this setting under Number of notifications visible in action center.

Change the Sounds of Your Notifications
You can remove and change the sounds that your notifications make, and it’s as easy as going to Settings > System > Notifications & actions > Get notifications from these senders > Your Chosen App > Play a sound when a notification arrives. Next, right-click the Start button and open up the Control Panel. Select Sound, which will open up a menu. In the Program Events box, scroll down to Notification and select it. Underneath the Sounds dropdown, you can change the sound that you want to play for your notifications; or, select None to turn them all off.

Turn Off Notifications
If you’re not a fan of notifications, you can turn all of them off, or just those of a select few. Go through Settings > System > Notifications & actions > Notifications > Get notifications from apps and other senders. You can then select the apps that you want to receive notifications from under: Get Notifications from These Senders.

For more great tips and tricks, reach out to us at 800.618.9844, and don’t forget to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Bandwidth Blockchain Virtualization Business Technology Wi-Fi Windows 10 Data Security Vendor Apps Mobile Office Two-factor Authentication Budget WiFi Apple BYOD Employer-Employee Relationship App Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail BDR HIPAA Physical Security Applications Access Control Hacker Computing Avoiding Downtime Information Technology Conferencing Marketing Office 365 How To Storage Password Big Data Bring Your Own Device Router Virtual Private Network Health 2FA Computers Operating System Help Desk Risk Management Website Retail Healthcare Analytics Office Tips Managed IT Services Augmented Reality Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Social Display Printer Going Green Paperless Office Customer Service Windows 11 Infrastructure Monitoring Cybercrime Excel Document Management Managed IT Service Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Images 101 Safety Multi-Factor Authentication Robot Mobility Telephone System Sports Cost Management Mouse Administration IT Management Meetings VPN Employees Integration Modem Customer Relationship Management User Tip Processor Computer Repair Mobile Security Holidays Settings Wireless Hacking Printing Presentation Data Storage Content Filtering Smart Technology Supply Chain YouTube Video Conferencing Wireless Technology Machine Learning Managed Services Provider Virtual Machines Professional Services Cryptocurrency Saving Time Virtual Desktop Maintenance Downloads Word Data storage LiFi Antivirus iPhone Licensing Outlook Vulnerabilities Entertainment Money Data Privacy Humor Data Analysis Scary Stories Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hacks Gamification Flexibility Fun Notifications Staff Value Business Intelligence Undo Travel Social Networking Legislation Shortcuts Deep Learning Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Education Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Application Mobile Computing Search Wasting Time Threats Trend Micro IBM Network Congestion Specifications Security Cameras Workplace Strategies Best Practice User Error Microchip Buisness Internet Exlporer Software as a Service Fraud Meta Legal IT solutions Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Business Growth Database Surveillance Virtual Assistant Outsource IT Media Network Management Cortana Tech Support IT Technicians Virtual Machine Environment Competition Cookies Monitors Cyber Monday Medical IT Alt Codes Proxy Server Reviews Downtime Tactics Development Hotspot Transportation Small Businesses Hosted Solution Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint User Typing Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Google Drive Management PCI DSS Knowledge Chatbots Screen Reader IP Address Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider 5G Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Docs Unified Communications Server Management Regulations Compliance Experience Private Cloud Identity Running Cable Identity Theft Smart Tech Memes Co-managed IT Recovery Bitcoin Superfish Bookmark Google Wallet Download Net Neutrality Twitter Alerts SQL Server Technology Care Hard Drives Domains Business Communications Financial Data Error History Laptop Connectivity IT Social Engineering Break Fix Scams Windows 8 Browsers Smartwatch Drones Upload Procurement Remote Computing Azure Hybrid Work Refrigeration Public Speaking Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Halloween Tablet IoT Communitications Lithium-ion battery Dark Web Cables CES Entrepreneur Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations

Blog Archive