Advanced Search
Search Results
139 total results found
Cloud PBX Phone System
IT Policies
Standard IT Policies to govern how to interact with tech in the workplace and how to react in case of breach or disaster.
Agreements
Common Q&A
Common Questions and Answers
Printers
CloudPBX Phone System User Guide
Welcome to the Cloud PBX User Guide. Your Cloud PBX combines the best in traditional phone system features with modern Internet Protocol (IP) capabilities. In this guide, you will learn how to perform many common tasks on your phone, as well as make full use o...
Daily Operating Policies
Normal day to day operating policies.
Planning
Precision Computer Agreements
Contains up to date Agreements for Precision Computer Services and Products
Employees
Computer or Internet Issues
Common Computer and Networking Issues
E-Mail Options, Issues, Spam, or Hacked
Phone service forms and info
HP
Cloud PBX - Tips and Tricks
Tips and Tricks and Recommended Setup
Xerox AltaLink C80XX
Remote Access
Working from Home or on the Go, you need to access company resources or your office computer.
How to...?
BulkSMS
BulkSMS application is used to place outbound calls, send SMS, and send appointment reminders to a list of targeted recipients. This application is not intended to be used as a marketing tool, but instead as a communication tool for the user's active customer ...
SMS - 10DLC Documentation
USING YOUR DESK PHONE
While there are many different models of desk phones, they largely all work the same way. In this chapter, you will learn how to use common functions of your phone.
USING THE USER WEB PORTAL
Each extension of your Cloud PBX system has access to a powerful web portal for managingvoicemail, call routing, and more.
Porting
Service Order
Drivers
Drivers that are more unique and harder to acquire
HP Scan
Schedule
Mobile and Desktop Apps
Duo Authenticator
Duo Security's two-factor authentication service to make logins more secure. The application generates passcodes for login and can receive push notifications for easy, one-tap authentication.
Remote Desktop
Use Microsoft Remote Desktop to connect to Azure Virtual Desktop, Windows 365, admin-provided virtual apps and desktops, or remote PCs. With Microsoft Remote Desktop, you can be productive no matter where you are.
Edge/Chrome Browsers
Business SMS
Brand and Campaign Registration
Connect to an Overhead Paging System / Intercom
HIPAA Media Destruction SOP (Step-by-Step)
Records: Retain forms, logs, approvals for 6 years. (Printable Checklist)
HIPAA_Data_Recovery_SOP
Change Preferences
Making Calls
Making a call with your phone does not require a leading 9. You can dial on-hook or offhook. ➢ To dial on-hook1. Dial the phone number.2. Pick up the handset, headset, or speaker.➢ To dial off-hook1. Pick up the handset, headset, or speaker.2. Dial the phone n...
Making International Calls
➢ To dial an international call1. Dial the international call code 011.2. Dial the country code.3. Dial the local number.International calling is commonly disallowed to prevent toll fraud.
Extension Dialing
Extensions on your system can be dialed using their 3-to-4 digit extension or by pressing the button on your phone corresponding to the desired extension.
Intercom
VoIP phones provide an intercom feature that allows you to instantly connect to other phones within your office. Intercom functionality is ideal for announcing visitors or asking a quick question.When one phone intercoms another extension, it does not ring the...
Receiving Calls
When a call comes in, you can answer it via a headset, speakerphone, or handset.➢ To answer a call using a handset– Lift the handset off-hook.➢ To answer a call using a speakerphone– Press the Speaker button.➢ To answer a call using a headset– Usage depends on...
Voicemail
Accessing Voicemail➢ To access voicemail1. Press the Messages button on your phone to access your voicemail box, or dial 5001 ifyou can not identify the voicemail button.2. If you subscribe to multiple mailboxes, a list of mailboxes may appear. Select the mail...
Handling Calls
Your cloud PBX features various ways to move calls around, including attended transfer, unattended (blind) transfer, voicemail transfer, park, and more. In this section, references toBLFs are the 1-touch buttons to extensions common at front-desk phones. Blin...
Accessing the Portal
To access the web portal1. Start a web browser.2. Go to https://pbx.precision-computer.com 3. At the login page:• Enter your Login Name (ext@customerpbxname) and Password. If you do not know your Login Name or Password use the applicable Forgot Lin...
Desktop Call Control
Desktop call controls appear when making or receiving a call. These controls allow you to see who is calling and manage a current call. Incoming CallsIncoming calls appear in a window in the portal. This window shows the caller ID name and number, along with...
Home
The Home page of your portal provides an at-a-glance view of everything going on with your extension. Table 2 1 describes the areas on the Home page. Figure 2 3. Example of Home Page Table 2 1. Fields in the Home Page Field Description ...
Voicemail
You configure voicemail using the Messages page. This page has two tabs for handling voicemail:• Messages — see “Messages” below.• Settings — see “Voicemail Settings” on the next page.To display the Messages page, click the Messages icon at the top of th...
Answering Rules
After you set up your time frames, you can create different answering rules for your time frames. You configure answering rules using the Answering Rules page. To display this page, click the Answering Rules icon at the top of the page: The left side of ...
Time Frames
Time frames allow you to control the scheduling of the system. You configure time frames using the Time Frames page. To display this page, click the Time Frames icon at the top of the page: Three common time frames are:• Open Hours (for example, M-F 9am-5pm)•...
Remote Access Policy
1.0 Purpose Remote access to the organization's network is crucial for operational efficiency and productivity. However, connections originating from external networks, which may have lower security standards or potential compromises, introduce inherent risks...
Wireless Communication Standard
1.0 Purpose This standard defines the minimum technical requirements that wireless infrastructure devices (e.g., access points, routers) must meet to be authorized for connection to the organization's network. The objective is to ensure the security and integ...
Workstation Security (For HIPAA) Policy
1.0 Purpose The purpose of this policy is to establish security standards and provide guidance for the use of all workstations accessing organizational resources. The objectives are to ensure the confidentiality, integrity, and availability of information pro...
Acceptable Encryption Policy
1.0 Purpose The purpose of this policy is to establish standards for the use of cryptographic algorithms and technologies within the organization. This policy aims to ensure that only strong, publicly vetted encryption algorithms are employed to protect the c...
Acceptable Use Policy
1.0 Purpose This policy outlines the acceptable use of the organization's information technology resources. Its purpose is to ensure these resources are used for legitimate business purposes, to protect employees, partners, and the organization from illegal, ...
Acquisition Assessment Policy
1.0 Purpose The purpose of this policy is to establish the framework and minimum security requirements for assessing and integrating newly acquired companies into the organization's environment. Integrating acquisitions can significantly impact the security p...
Bluetooth Baseline Requirements Policy
1.0 Purpose The proliferation of Bluetooth-enabled devices presents potential security risks if connections are not properly secured. Insecure Bluetooth usage can expose organizational devices and networks to unauthorized access, data leakage, or malware intr...