Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

Sign Up For Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *

      Request a Consultation

      Request a
      Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for you!

      Contact Us!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Business Computing Hackers Google Software Backup Windows 10 Malware Microsoft Internet Network Security Email Smartphones Hosted Solutions Browser Productivity Innovation Efficiency Mobile Devices Disaster Recovery Data Ransomware Business User Tips Android VoIP Business Continuity Cybercrime Hardware Computer Office Business Management Alert Smartphone Miscellaneous Automation Managed IT Services Computers Telephone Systems Windows Law Enforcement Collaboration communications Chrome Outsourced IT Virtualization Productivity IT Services Upgrade Small Business Cloud Computing Quick Tips Health Social Engineering How To Cybersecurity App Tech Term Data Backup Money Network Office Tips Save Money Social Media Server Workplace Tips Bring Your Own Device Managed IT Services History Mobile Device Management Remote Computing Router Passwords Communication Work/Life Balance Spam Two-factor Authentication Bandwidth Wi-Fi Artificial Intelligence Operating System Password Facebook Internet of Things Gmail Windows 10 Flexibility Data Protection Marketing Data Breach Data Security Phishing Application Data Recovery Data Management Hacking VPN Vulnerability Office 365 Safety Managed Service Provider Apps Google Drive Private Cloud Holiday HaaS Recovery Scam IT Support Identity Theft Downtime Managed IT Applications Infrastructure Unsupported Software Settings Data storage OneNote PDF Keyboard Retail Redundancy Internet Exlporer BYOD Entertainment Employer-Employee Relationship Best Practice Networking Avoiding Downtime Comparison Spam Blocking Meetings CES Remote Monitoring Microsoft Office Business Intelligence eWaste Gadgets Physical Security End of Support Update Big Data Mobility BDR Electronic Medical Records Mouse The Internet of Things Charger Robot User Error Legal Battery Data Storage DDoS Wearable Technology Mobile Device Black Market Word Hiring/Firing Budget IT Management Patch Management Encryption Cleaning Government Public Cloud Website IT Plan Running Cable Shortcut Scalability IT Consultant Windows 7 Notifications IT Support Tech Support Computer Accessories Fax Server Hybrid Cloud Voice over Internet Protocol Smart Tech Television Politics Transportation Instant Messaging Credit Cards Samsung Flash Apple Botnet Shadow IT Bluetooth Users Password Manager Mobile Computing Multi-Factor Security Connectivity Public Computer Software Tips Streaming Media Benefits Fraud Monitor Leadership Business Mangement iPhone Travel Digital Signature Virtual Reality Information Technology Trending Devices People Experience Sync Firewall Amazon Reputation Recycling Accountants Worker Root Cause Analysis Worker Commute Social Music Biometrics Programming Thought Leadership Going Green Automobile Mobile Office Smart Technology Search Amazon Web Services Customers Criminal Files Sports Rootkit USB Wireless Specifications Laptop IBM HBO webinar Telephony Two Factor Authentication Windows 10s How to Online Shopping Practices Training Data loss Social Networking Troubleshooting Addiction Touchpad Supercomputer Outlook Conferencing Skype IT solutions Evernote Content Management Hosted Computing YouTube Vendor Management Screen Mirroring Millennials Cache Frequently Asked Questions Environment Emails Start Menu Solid State Drive Wireless Charging Blockchain Internet exploMicrosoft Computer Care Inventory Cast Content Books Maintenance Workforce Wireless Internet Current Events Excel Lithium-ion battery Tools Save Time Audit Cortana Relocation HIPAA Advertising Access Control NarrowBand SaaS Audiobook Emergency Techology Telecommuting Knowledge Tip of the week Uninterrupted Power Supply Computer Fan Education Google Apps Humor Customer Relationship Management Human Resources Google Docs Authentication Wireless Technology Distributed Denial of Service Video Games Remote Work Network Congestion Windows Server 2008 Netflix Value Employer Employee Relationship FENG Computing Infrastructure Workers Customer Service Staff Saving Money Nanotechnology Chromecast Assessment Risk Management CrashOverride Twitter Thank You Webinar Congratulations WiFi Wire IT solutions
      QR-Code