1. Back to bookshelf
  1. Introduction
  2. Installation
  3. Setup
    1. with Docker
  4. Configuration
  5. System configuration
    1. Reverse proxy configuration
    2. Blocking invites
    3. Report interception
  6. Creating bots
  7. Configuring bots