- Find the “model text” that you want to use as the AutoText entry and copy it into your Windows clipboard (CTRL+C) (this could be a frequent paragraph or short phrase that you type often in numerous responses. Draft a new email and paste it into the body of the new email. Format it and clean it up to the format you want it in (bullets, numbered, paragraphs, etc). We suggest removing any client names to make it generic.
- Select the text and then select Insert > Quick Parts > AutoText > Save Selection to AutoText to AutoText Gallery

- Give it a name (nickname) with at least 4 characters.
- To use the AutoText entry, simply place your cursor in the body of the email (in the desired location), and then type the first 4 characters of the AutoText name. You will see a pop-up preview of your entry. If you want to insert it, simply hit your Enter key. Another way to insert it is to select Insert > Quick Parts > AutoText > and then select the AutoText entry from the preview gallery.

New Resources In Your Inbox
Get our latest cybersecurity resources, content, tips and trends.
Other resources that might be of interest to you.
Airiam Hires Alan Villaseñor to Build and Manage SOC
Airiam, a managed IT and cybersecurity company with a deep focus and expertise on ransomware recovery, cyber resilience, and immutable backups today announced Alan Villaseñor will lead the company’s security operation center (SOC). Villaseñor holds CIS
Conor Quinlan
>>Read More
Internal Penetration Testing and Small Businesses
Internal Penetration Testing What is Internal Penetration Testing? You may be thinking, “What even is an internal penetration test?” There is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal p
Andy Gritzer
>>Read More
AI in SOCs: Transforming Cybersecurity for Small Businesses
Small businesses face growing cybersecurity threats, yet many lack the resources for a fully staffed Security Operations Center (SOC). Traditionally, SOCs relied on human analysts to monitor, detect, and respond to incidents—a model that struggles unde
webops
>>Read More