Summary Introduction Installation Setup with Docker Configuration System configuration Reverse proxy configuration Blocking invites Report interception Creating bots Configuring bots