Configuration

Updated date: 23 May 2017
When you manage a service, it is important to measure it to find out what are its strengths and weaknesses. From the information that is gathered, you can make changes to processes, give training or coaching to employees, communicate more information to the customers, etc. to improve on what the...
Updated date: 17 October 2018
It is possible to integrate and track all the changes implying the IT Department in an efficient and centralised manner by using the Octopus Changes module. This article describes the functional use of the module. 
Updated date: 12 July 2017
ITIL recommends that an incident priority is derived from the Impact and the Urgency, based on the context of an organization. Octopus can derive automatically an incident priority by selecting the impact and urgency of a incident.
Updated date: 18 March 2020
Related articles Activities in Octopus Introduction The activity types are used to standardize the information entered into Octopus by the Octopus users.
Updated date: 23 October 2020
Octopus can send automated emails to keep the users, internal and external assignees, and more informed of different situations. Therefore it is important that the information communicated be pertinent. But as most companies have their own terms and procedures, we allow the configuration of most...
Updated date: 31 October 2018
Related Articles Custom field library Why this conversion is important for you
Updated date: 9 September 2020
Octopus’ Automated Approvals Solution enables you to effectively implement the global execution process of a request when an approval is required.  This document will run you through the concepts that support this solution. It was developed in order to consider several approval modes that...
Updated date: 10 April 2017
Related Articles Reservation Management User Management
Updated date: 10 April 2017
From Octopus interface, all incident templates and service request types are accessible. However, to put them available on the Web Portal, they must be designated visible to users. 
Updated date: 8 May 2017
It is possible to restrict access to your Web portal to a range of IP addresses. Only people using the IP address included in the range will be able to access the Web Portal, and people outside the range would be access denied. 

Pages

Subscribe to Configuration