The Capacity Rules window enables you to set Capacity Rules for various operations in your environment. For example, you may choose to set Capacity Rules for how many voice interactions or email interactions, or a combination of both, can be processed at one time.
Click Display Options below to learn more about the list and how it can be sorted or searched; or, click Actions to learn more about possible actions you can perform in this window.
The Capacity Rules list displays the Capacity Rules in your environment. The list is organized in a hierarchy, starting with Tenants, configuration units, sites, and folders.
This list respects tenancy permission settings. You can access only those objects that you have been granted permission to access.
You can filter the contents of this list in two ways:
- Type the name or partial name of an object in the Quick Filter field.
- Click Tenant Filter to open the Tenant Filter window. In this window, click the check box beside each Tenant that you want to select. Use the Quick Filter field in this panel to filter the Tenant list.
You can sort the items in the list by clicking a column head. Clicking a column head a second time reverses the sort order.
Click a Capacity Rule to view more details about the rule in a new panel that opens to the right. From this panel, you can also edit Access Control. You can perform the following actions:
Creating Capacity Rules[+] Show Procedure
Media Types[+] Show Procedure
Validating Capacity Rules[+] Show Procedure
Deleting Capacity Rules[+] Show Procedure
Copying Capacity Rules[+] Show Procedure
Enabling or Disabling Capacity Rules[+] Show Procedure
The Access Control panel lists the access groups and users that have been configured explicitly with permissions for this object. When you are setting permissions, it is normally performed with the user(s) or access group(s) for which you want to grant access. This feature improves the manner in which permissions are set, and the scope is limited to managing permissions for a single database object. For additional instructions about granting, modifying, and removing permissions, refer to the Genesys 8.1 Security Deployment Guide. You can perform the following actions: