Create AutoText for Frequent Responses in Outlook

Vivian Lee
  1. Find the “model text” that you want to use as the AutoText entry and copy it into your Windows clipboard (CTRL+C) (this could be a frequent paragraph or short phrase that you type often in numerous responses. Draft a new email and paste it into the body of the new email. Format it and clean it up to the format you want it in (bullets, numbered, paragraphs, etc). We suggest removing any client names to make it generic.
  2. Select the text and then select Insert > Quick Parts > AutoText > Save Selection to AutoText to AutoText Gallery
    AutoText in Outlook
  3. Give it a name (nickname) with at least 4 characters.
  4. To use the AutoText entry, simply place your cursor in the body of the email (in the desired location), and then type the first 4 characters of the AutoText name. You will see a pop-up preview of your entry. If you want to insert it, simply hit your Enter key. Another way to insert it is to select Insert > Quick Parts > AutoText > and then select the AutoText entry from the preview gallery.
    AutoText entry in Outlook

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Airiam Hires Alan Villaseñor to Build and Manage SOC

Airiam, a managed IT and cybersecurity company with a deep focus and expertise on ransomware recovery, cyber resilience, and immutable backups today announced Alan Villaseñor will lead the company’s security operation center (SOC). Villaseñor holds CIS
Avatar photo
Conor Quinlan
>>Read More

Internal Penetration Testing and Small Businesses

Internal Penetration Testing What is Internal Penetration Testing? You may be thinking, “What even is an internal penetration test?” There is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal p
Avatar photo
Andy Gritzer
>>Read More

AI in SOCs: Transforming Cybersecurity for Small Businesses

Small businesses face growing cybersecurity threats, yet many lack the resources for a fully staffed Security Operations Center (SOC). Traditionally, SOCs relied on human analysts to monitor, detect, and respond to incidents—a model that struggles unde