XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Hosted Solutions Mobile Office Data Productivity Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Smartphones Network Security IT Services Server Business Virtualization Upgrade Miscellaneous Innovation Windows Disaster Recovery Communication Microsoft Office Users Managed IT Services Mobile Device Management Computer Communications User Tips Android Passwords Browser Smartphone Marketing WiFi Holiday Alert Save Money Vendor Management Data Backup Cybercrime Mobile Computing Operating System Remote Monitoring Windows 10 Ransomware Information Technology Avoiding Downtime Bring Your Own Device Apple Computers BYOD VPN Telephone Systems Outsourced IT Big Data Cloud Computing Remote Computing Current Events IT Solutions Data Recovery Internet of Things Chrome Best Practice The Internet of Things Going Green History Hacking Automation Social Engineering BDR Firewall Employer-Employee Relationship Spam Phone System Wireless Technology Health Router Application IT Consultant Trending Collaboration Artificial Intelligence Bandwidth Excel App Printer Money Facebook Office Proactive IT Tech Term Cybersecurity Budget Lithium-ion Battery Managed IT Services iPhone Two-factor Authentication Business Managament Business Intelligence Mobility Content Filtering How To Fax Server Recovery Maintenance Windows 8 Phishing Website PowerPoint Unified Threat Management Managed IT Data Protection Value Networking User Error Gmail Customer Relationship Management Private Cloud Humor Redundancy Hard Drives Data Security Outlook Antivirus Law Enforcement Tutorials Mouse Office 365 Virus Analytics Apps Computer Repair Windows 10 Google Drive Tech Support Conferencing Save Time Office Tips Tablet Sports Search Compliance Twitter Vulnerability Document Management Flexibility Word Connectivity Entertainment Streaming Media Risk Management Data Management Identity Theft Retail Inbound Marketing Saving Time Network Congestion Administration Downtime Productivity Memory Mobile Device Social Networking Digital Payment Robot Video Surveillance USB Bluetooth Data storage Content Management People Unsupported Software Samsung Infrastructure Scam IBM OneNote eWaste Piracy Internet Exlporer Update Online Currency Administrator PDF Leadership Recycling Data Storage HaaS End of Support Point of Sale Safety Wi-Fi Comparison Government Computer Accessories YouTube Meetings Work/Life Balance Data Breach Windows 7 Statistics Settings Training Environment Programming Social DDoS Skype Workers Human Resources Biometrics Solid State Drive Black Market Webinar Intranet Encryption Credit Cards IT service Running Cable Wearable Technology Data loss IT Management Touchscreen Hacker Wireless Physical Security Cleaning CES Public Cloud Smart Tech Spam Blocking IT Plan SaaS Best Available Electronic Medical Records Authentication SharePoint Lifestyle Machine Learning Flash Shadow IT Fiber-Optic Debate Software as a Service Entrepreneur Business Owner Smart Office Tip of the week Amazon Hybrid Cloud Insurance Windows 10s Webcam Charger Storage Cast IaaS Telecommuting Computing Infrastructure Analysis Tools Tablets Touchpad Hiring/Firing Nanotechnology Windows Media Player Virtual Desktop Relocation Macro HIPAA IT Support Hiring/Firing Sync Cables Legal Cost Management Monitor Blockchain Co-managed IT Paperless Office Windows Server 2008 Amazon Web Services Practices Computer Care Addiction Software Tips Remote Work Hosted Solution Accountants PC Care Upgrades Analyitcs Password Manager IT Security Education Scheduling Customer Service Keyboard 3D Telephony Unified Communications Google Docs Instant Messaging Reputation Staff eBay Consultant Online Shopping Print Server Hosted Computing Audit Business Mangement Remote Support Cache Internet exploMicrosoft nternet Crowdfunding Netflix Alerts Botnet Devices Root Cause Analysis Data Warehousing Cameras Specifications Start Menu NarrowBand Theft Voice over Internet Protocol Customers Digital Signature Company Culture Supercomputer Text Messaging Licensing Regulations Uninterrupted Power Supply Evernote Law Firm IT Inventory Computer Fan Travel Virtual Reality Criminal Applications Augmented Reality Gaming Console Wireless Internet HBO WIndows 7 Advertising IoT Work Station Thought Leadership Printer Server Distributed Denial of Service Millennials Shortcut Files LinkedIn Mobile Chromecast Cortana FENG Worker Commute Multi-Factor Security Strategy Net Neutrality Knowledge Servers User Wireless Charging Password Help Desk Access Control Bloatware Windows 8.1 Update Wire Frequently Asked Questions Managing Stress Notifications Fraud Domains File Sharing Patch Management Display Content Filter Screen Mirroring Workforce Colocation 360 Emails Professional Services Science Laptop Google Apps Politics Techology Television Congratulations Transportation Troubleshooting Webinar HVAC Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Students Smart Technology Battery Loyalty Books Experience Video Games Content Healthcare Two Factor Authentication Emergency Worker Music Scalability Audiobook Electronic Health Records Assessment Thank You Rootkit How to

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *