SlideShare uma empresa Scribd logo
1 de 11
Tutorial #2
Kommbox Administration
sales@kommbox.com
Acism Software Private Limited, Pune
(020) 25380588
Kommbox administration consists of the creation of
kommboxes and users, and the assignment thereof. It also
involves the account level settings. This tutorial will
also cover IT administration – backup and security aspects.
Creating a UserCreating a User
Admin can create a user by
clicking on “Create User”
menu in the right panel.
Creating a KommboxCreating a Kommbox
Admin can create a kommbox by
clicking on “Create Kommbox”
menu in the right panel.
There are two types of kommboxes:
Internally shared Kommboxes are meant for
collaboration between users internal to the
company. All internal users are automatically
given access to such kommbox.
The standard kommbox is where the admin
needs to assign users explicitly. Both internal
and external users may be assigned to a
standard kommbox.
User AssignmentUser Assignment
From a kommbox page, you can click on “users
assigned” link to come to the page to view/ change
the user assignment to the kommbox.
This assignment is possible (and required) for standard
kommboxes only. All internal users are automatically
assigned to an internally shared kommbox.
Account Level SettingsAccount Level Settings
Click on “Account Settings” in the right
panel to access the Account level settings.
Account Level SettingsAccount Level Settings
The branding (name and
logo that appear in the
header) are adjusted here.
Account Level SettingsAccount Level Settings
Emails may be read insecurely. Choose
“Link only” instead of “Message and Link” so
that the message content is NOT sent in an
email notification.
Account Level SettingsAccount Level Settings
These two options are for controlling your server space usage.
Delete old “Thank you” records to ensure that they do not keep ever-growing.
Configure a Dropbox account with Kommbox where the attachments will be
kept. (Dropbox is a third party service which offers online storage space – at
the time of writing, it offers 2GB disk space free.)
Account Level SettingsAccount Level Settings
Configure the
user roles that
are used in your
account.
IT AdministrationIT Administration
(Backup and Security)(Backup and Security)
Kommbox stores the communications for an organization and
securing this data is very important.
The Kommbox data Is stored in an RDBMS (MySql) and file
system at the backend on the server side. It is possible (and
advisable) to back up the data periodically, so that it may be
restored in case of an unexpected crash.
Similarly, the server needs to have a firewall that protects it
from possible attacks of malicious users.
On the hosted instance (on which free, basic and SSL plans are
offered) the backups are taken every week, so that in case of
a crash, the status up to the last week can be restored. The
server is also protected with standard firewall.
In case of an Enterprise instance, these concerns are expected
to be addressed by the infrastructure provider.
Thank youThank you
http://kommbox.com
Sales: sales@kommbox.com
Support: support@kommbox.com
Ph: +91 20 25380588

Mais conteúdo relacionado

Semelhante a Tutorial #2: Kommbox Administration

Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementationAmit Sharma
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3eSAT Publishing House
 
MacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfMacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfRiya Sen
 
Kommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsKommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsAshish Belagali
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfWhat's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfSandesh Rao
 
What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023Sandesh Rao
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptxMitikuAbebe2
 
ideas.doc
ideas.docideas.doc
ideas.docbutest
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...projjal ghosh
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!projjal ghosh
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayLucy Nader
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campOlav Tvedt
 
Magento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCMagento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCItexus LLC
 

Semelhante a Tutorial #2: Kommbox Administration (20)

Lab 14
Lab 14Lab 14
Lab 14
 
Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementation
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3
 
MacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfMacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdf
 
Kommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsKommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for Organizations
 
Clustering overview2
Clustering overview2Clustering overview2
Clustering overview2
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfWhat's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
 
What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx
 
ideas.doc
ideas.docideas.doc
ideas.doc
 
Medicine For World
Medicine For WorldMedicine For World
Medicine For World
 
Interanet Mailing
Interanet Mailing  Interanet Mailing
Interanet Mailing
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes Essay
 
Building private clouds on IBM Power systems
Building private clouds on IBM Power systemsBuilding private clouds on IBM Power systems
Building private clouds on IBM Power systems
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot camp
 
Magento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCMagento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INC
 

Mais de Ashish Belagali

Turbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleTurbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleAshish Belagali
 
Make software like they make cars!
Make software like they make cars!Make software like they make cars!
Make software like they make cars!Ashish Belagali
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Ashish Belagali
 
New Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyNew Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyAshish Belagali
 
Achieving Success with IT Projects
Achieving Success with IT ProjectsAchieving Success with IT Projects
Achieving Success with IT ProjectsAshish Belagali
 
The Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachThe Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachAshish Belagali
 
Kommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolKommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolAshish Belagali
 
Xsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareXsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareAshish Belagali
 
The Irresistible Charms of Java
The Irresistible Charms of JavaThe Irresistible Charms of Java
The Irresistible Charms of JavaAshish Belagali
 
Communication Process Consultancy
Communication Process ConsultancyCommunication Process Consultancy
Communication Process ConsultancyAshish Belagali
 
Kommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideKommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideAshish Belagali
 
Kommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsKommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsAshish Belagali
 
Technology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsTechnology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsAshish Belagali
 
Benefit thru-communication-improvement
Benefit thru-communication-improvementBenefit thru-communication-improvement
Benefit thru-communication-improvementAshish Belagali
 
On the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationOn the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationAshish Belagali
 
Tutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationTutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationAshish Belagali
 
Kommbox for Business Communications
Kommbox for Business CommunicationsKommbox for Business Communications
Kommbox for Business CommunicationsAshish Belagali
 

Mais de Ashish Belagali (20)

Turbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleTurbo Charge Software Development with Xsemble
Turbo Charge Software Development with Xsemble
 
Make software like they make cars!
Make software like they make cars!Make software like they make cars!
Make software like they make cars!
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!
 
New Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyNew Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble Technology
 
Achieving Success with IT Projects
Achieving Success with IT ProjectsAchieving Success with IT Projects
Achieving Success with IT Projects
 
The Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachThe Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary Approach
 
Kommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolKommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management Tool
 
Xsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareXsemble: Visual Assembly of Software
Xsemble: Visual Assembly of Software
 
The Irresistible Charms of Java
The Irresistible Charms of JavaThe Irresistible Charms of Java
The Irresistible Charms of Java
 
10Xofy Your Business
10Xofy Your Business10Xofy Your Business
10Xofy Your Business
 
Kommbox User Guide
Kommbox User GuideKommbox User Guide
Kommbox User Guide
 
Communication Process Consultancy
Communication Process ConsultancyCommunication Process Consultancy
Communication Process Consultancy
 
Kommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideKommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration Guide
 
Kommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsKommbox: Minding Your Business Communications
Kommbox: Minding Your Business Communications
 
Technology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsTechnology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & Paradigms
 
Benefit thru-communication-improvement
Benefit thru-communication-improvementBenefit thru-communication-improvement
Benefit thru-communication-improvement
 
On the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationOn the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business Communication
 
Tutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationTutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web Application
 
Kommbox for Business Communications
Kommbox for Business CommunicationsKommbox for Business Communications
Kommbox for Business Communications
 
Understanding Kommbox
Understanding KommboxUnderstanding Kommbox
Understanding Kommbox
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Tutorial #2: Kommbox Administration

  • 1. Tutorial #2 Kommbox Administration sales@kommbox.com Acism Software Private Limited, Pune (020) 25380588 Kommbox administration consists of the creation of kommboxes and users, and the assignment thereof. It also involves the account level settings. This tutorial will also cover IT administration – backup and security aspects.
  • 2. Creating a UserCreating a User Admin can create a user by clicking on “Create User” menu in the right panel.
  • 3. Creating a KommboxCreating a Kommbox Admin can create a kommbox by clicking on “Create Kommbox” menu in the right panel. There are two types of kommboxes: Internally shared Kommboxes are meant for collaboration between users internal to the company. All internal users are automatically given access to such kommbox. The standard kommbox is where the admin needs to assign users explicitly. Both internal and external users may be assigned to a standard kommbox.
  • 4. User AssignmentUser Assignment From a kommbox page, you can click on “users assigned” link to come to the page to view/ change the user assignment to the kommbox. This assignment is possible (and required) for standard kommboxes only. All internal users are automatically assigned to an internally shared kommbox.
  • 5. Account Level SettingsAccount Level Settings Click on “Account Settings” in the right panel to access the Account level settings.
  • 6. Account Level SettingsAccount Level Settings The branding (name and logo that appear in the header) are adjusted here.
  • 7. Account Level SettingsAccount Level Settings Emails may be read insecurely. Choose “Link only” instead of “Message and Link” so that the message content is NOT sent in an email notification.
  • 8. Account Level SettingsAccount Level Settings These two options are for controlling your server space usage. Delete old “Thank you” records to ensure that they do not keep ever-growing. Configure a Dropbox account with Kommbox where the attachments will be kept. (Dropbox is a third party service which offers online storage space – at the time of writing, it offers 2GB disk space free.)
  • 9. Account Level SettingsAccount Level Settings Configure the user roles that are used in your account.
  • 10. IT AdministrationIT Administration (Backup and Security)(Backup and Security) Kommbox stores the communications for an organization and securing this data is very important. The Kommbox data Is stored in an RDBMS (MySql) and file system at the backend on the server side. It is possible (and advisable) to back up the data periodically, so that it may be restored in case of an unexpected crash. Similarly, the server needs to have a firewall that protects it from possible attacks of malicious users. On the hosted instance (on which free, basic and SSL plans are offered) the backups are taken every week, so that in case of a crash, the status up to the last week can be restored. The server is also protected with standard firewall. In case of an Enterprise instance, these concerns are expected to be addressed by the infrastructure provider.
  • 11. Thank youThank you http://kommbox.com Sales: sales@kommbox.com Support: support@kommbox.com Ph: +91 20 25380588