SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Tutorial #2
Kommbox Administration
sales@kommbox.com
Acism Software Private Limited, Pune
(020) 25380588
Kommbox administration consists of the creation of
kommboxes and users, and the assignment thereof. It also
involves the account level settings. This tutorial will
also cover IT administration – backup and security aspects.
Creating a UserCreating a User
Admin can create a user by
clicking on “Create User”
menu in the right panel.
Creating a KommboxCreating a Kommbox
Admin can create a kommbox by
clicking on “Create Kommbox”
menu in the right panel.
There are two types of kommboxes:
Internally shared Kommboxes are meant for
collaboration between users internal to the
company. All internal users are automatically
given access to such kommbox.
The standard kommbox is where the admin
needs to assign users explicitly. Both internal
and external users may be assigned to a
standard kommbox.
User AssignmentUser Assignment
From a kommbox page, you can click on “users
assigned” link to come to the page to view/ change
the user assignment to the kommbox.
This assignment is possible (and required) for standard
kommboxes only. All internal users are automatically
assigned to an internally shared kommbox.
Account Level SettingsAccount Level Settings
Click on “Account Settings” in the right
panel to access the Account level settings.
Account Level SettingsAccount Level Settings
The branding (name and
logo that appear in the
header) are adjusted here.
Account Level SettingsAccount Level Settings
Emails may be read insecurely. Choose
“Link only” instead of “Message and Link” so
that the message content is NOT sent in an
email notification.
Account Level SettingsAccount Level Settings
These two options are for controlling your server space usage.
Delete old “Thank you” records to ensure that they do not keep ever-growing.
Configure a Dropbox account with Kommbox where the attachments will be
kept. (Dropbox is a third party service which offers online storage space – at
the time of writing, it offers 2GB disk space free.)
Account Level SettingsAccount Level Settings
Configure the
user roles that
are used in your
account.
IT AdministrationIT Administration
(Backup and Security)(Backup and Security)
Kommbox stores the communications for an organization and
securing this data is very important.
The Kommbox data Is stored in an RDBMS (MySql) and file
system at the backend on the server side. It is possible (and
advisable) to back up the data periodically, so that it may be
restored in case of an unexpected crash.
Similarly, the server needs to have a firewall that protects it
from possible attacks of malicious users.
On the hosted instance (on which free, basic and SSL plans are
offered) the backups are taken every week, so that in case of
a crash, the status up to the last week can be restored. The
server is also protected with standard firewall.
In case of an Enterprise instance, these concerns are expected
to be addressed by the infrastructure provider.
Thank youThank you
http://kommbox.com
Sales: sales@kommbox.com
Support: support@kommbox.com
Ph: +91 20 25380588

Weitere ähnliche Inhalte

Ähnlich wie Tutorial #2: Kommbox Administration

Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementationAmit Sharma
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3eSAT Publishing House
 
MacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfMacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfRiya Sen
 
Kommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsKommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsAshish Belagali
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfWhat's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfSandesh Rao
 
What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023Sandesh Rao
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptxMitikuAbebe2
 
ideas.doc
ideas.docideas.doc
ideas.docbutest
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...projjal ghosh
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!projjal ghosh
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayLucy Nader
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campOlav Tvedt
 
Magento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCMagento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCItexus LLC
 

Ähnlich wie Tutorial #2: Kommbox Administration (20)

Lab 14
Lab 14Lab 14
Lab 14
 
Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementation
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3
 
MacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdfMacBook Operating System Replacement.pdf
MacBook Operating System Replacement.pdf
 
Kommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for OrganizationsKommbox - Work Collaboration for Organizations
Kommbox - Work Collaboration for Organizations
 
Clustering overview2
Clustering overview2Clustering overview2
Clustering overview2
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdfWhat's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
What's new in Autonomous Database - OCYatra2023 - Sandesh Rao.pdf
 
What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023What's new in the world of the Autonomous Database in 2023
What's new in the world of the Autonomous Database in 2023
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx
 
ideas.doc
ideas.docideas.doc
ideas.doc
 
Medicine For World
Medicine For WorldMedicine For World
Medicine For World
 
Interanet Mailing
Interanet Mailing  Interanet Mailing
Interanet Mailing
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
Sample work which i prepared to take ahead the Lotus Notes Capabilities to th...
 
Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!Lotus Notes Presentation - Please loo into it!!
Lotus Notes Presentation - Please loo into it!!
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes Essay
 
Building private clouds on IBM Power systems
Building private clouds on IBM Power systemsBuilding private clouds on IBM Power systems
Building private clouds on IBM Power systems
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot camp
 
Magento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCMagento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INC
 

Mehr von Ashish Belagali

Turbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleTurbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleAshish Belagali
 
Make software like they make cars!
Make software like they make cars!Make software like they make cars!
Make software like they make cars!Ashish Belagali
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Ashish Belagali
 
New Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyNew Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyAshish Belagali
 
Achieving Success with IT Projects
Achieving Success with IT ProjectsAchieving Success with IT Projects
Achieving Success with IT ProjectsAshish Belagali
 
The Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachThe Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachAshish Belagali
 
Kommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolKommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolAshish Belagali
 
Xsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareXsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareAshish Belagali
 
The Irresistible Charms of Java
The Irresistible Charms of JavaThe Irresistible Charms of Java
The Irresistible Charms of JavaAshish Belagali
 
Communication Process Consultancy
Communication Process ConsultancyCommunication Process Consultancy
Communication Process ConsultancyAshish Belagali
 
Kommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideKommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideAshish Belagali
 
Kommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsKommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsAshish Belagali
 
Technology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsTechnology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsAshish Belagali
 
Benefit thru-communication-improvement
Benefit thru-communication-improvementBenefit thru-communication-improvement
Benefit thru-communication-improvementAshish Belagali
 
On the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationOn the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationAshish Belagali
 
Tutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationTutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationAshish Belagali
 
Kommbox for Business Communications
Kommbox for Business CommunicationsKommbox for Business Communications
Kommbox for Business CommunicationsAshish Belagali
 

Mehr von Ashish Belagali (20)

Turbo Charge Software Development with Xsemble
Turbo Charge Software Development with XsembleTurbo Charge Software Development with Xsemble
Turbo Charge Software Development with Xsemble
 
Make software like they make cars!
Make software like they make cars!Make software like they make cars!
Make software like they make cars!
 
Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!Xsemble - Make software like they make cars!
Xsemble - Make software like they make cars!
 
New Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble TechnologyNew Opportunities Created By New Xsemble Technology
New Opportunities Created By New Xsemble Technology
 
Achieving Success with IT Projects
Achieving Success with IT ProjectsAchieving Success with IT Projects
Achieving Success with IT Projects
 
The Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary ApproachThe Importance of Multi-disciplinary Approach
The Importance of Multi-disciplinary Approach
 
Kommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management ToolKommbox - Collaborative Project Management Tool
Kommbox - Collaborative Project Management Tool
 
Xsemble: Visual Assembly of Software
Xsemble: Visual Assembly of SoftwareXsemble: Visual Assembly of Software
Xsemble: Visual Assembly of Software
 
The Irresistible Charms of Java
The Irresistible Charms of JavaThe Irresistible Charms of Java
The Irresistible Charms of Java
 
10Xofy Your Business
10Xofy Your Business10Xofy Your Business
10Xofy Your Business
 
Kommbox User Guide
Kommbox User GuideKommbox User Guide
Kommbox User Guide
 
Communication Process Consultancy
Communication Process ConsultancyCommunication Process Consultancy
Communication Process Consultancy
 
Kommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration GuideKommbox: Getting Started and Basic Administration Guide
Kommbox: Getting Started and Basic Administration Guide
 
Kommbox: Minding Your Business Communications
Kommbox: Minding Your Business CommunicationsKommbox: Minding Your Business Communications
Kommbox: Minding Your Business Communications
 
Technology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & ParadigmsTechnology Roundup - Programming Languages & Paradigms
Technology Roundup - Programming Languages & Paradigms
 
Benefit thru-communication-improvement
Benefit thru-communication-improvementBenefit thru-communication-improvement
Benefit thru-communication-improvement
 
On the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business CommunicationOn the Slicing and Dicing of Business Communication
On the Slicing and Dicing of Business Communication
 
Tutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web ApplicationTutorial #1: Using Kommbox Web Application
Tutorial #1: Using Kommbox Web Application
 
Kommbox for Business Communications
Kommbox for Business CommunicationsKommbox for Business Communications
Kommbox for Business Communications
 
Understanding Kommbox
Understanding KommboxUnderstanding Kommbox
Understanding Kommbox
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Tutorial #2: Kommbox Administration

  • 1. Tutorial #2 Kommbox Administration sales@kommbox.com Acism Software Private Limited, Pune (020) 25380588 Kommbox administration consists of the creation of kommboxes and users, and the assignment thereof. It also involves the account level settings. This tutorial will also cover IT administration – backup and security aspects.
  • 2. Creating a UserCreating a User Admin can create a user by clicking on “Create User” menu in the right panel.
  • 3. Creating a KommboxCreating a Kommbox Admin can create a kommbox by clicking on “Create Kommbox” menu in the right panel. There are two types of kommboxes: Internally shared Kommboxes are meant for collaboration between users internal to the company. All internal users are automatically given access to such kommbox. The standard kommbox is where the admin needs to assign users explicitly. Both internal and external users may be assigned to a standard kommbox.
  • 4. User AssignmentUser Assignment From a kommbox page, you can click on “users assigned” link to come to the page to view/ change the user assignment to the kommbox. This assignment is possible (and required) for standard kommboxes only. All internal users are automatically assigned to an internally shared kommbox.
  • 5. Account Level SettingsAccount Level Settings Click on “Account Settings” in the right panel to access the Account level settings.
  • 6. Account Level SettingsAccount Level Settings The branding (name and logo that appear in the header) are adjusted here.
  • 7. Account Level SettingsAccount Level Settings Emails may be read insecurely. Choose “Link only” instead of “Message and Link” so that the message content is NOT sent in an email notification.
  • 8. Account Level SettingsAccount Level Settings These two options are for controlling your server space usage. Delete old “Thank you” records to ensure that they do not keep ever-growing. Configure a Dropbox account with Kommbox where the attachments will be kept. (Dropbox is a third party service which offers online storage space – at the time of writing, it offers 2GB disk space free.)
  • 9. Account Level SettingsAccount Level Settings Configure the user roles that are used in your account.
  • 10. IT AdministrationIT Administration (Backup and Security)(Backup and Security) Kommbox stores the communications for an organization and securing this data is very important. The Kommbox data Is stored in an RDBMS (MySql) and file system at the backend on the server side. It is possible (and advisable) to back up the data periodically, so that it may be restored in case of an unexpected crash. Similarly, the server needs to have a firewall that protects it from possible attacks of malicious users. On the hosted instance (on which free, basic and SSL plans are offered) the backups are taken every week, so that in case of a crash, the status up to the last week can be restored. The server is also protected with standard firewall. In case of an Enterprise instance, these concerns are expected to be addressed by the infrastructure provider.
  • 11. Thank youThank you http://kommbox.com Sales: sales@kommbox.com Support: support@kommbox.com Ph: +91 20 25380588