MXArhiveViewerBasics

MXArhiveViewerBasics


Call Recording Queries


DiagramDescription automatically generated Launch MXArchive.


Graphical user interface, text, applicationDescription automatically generated Begin your Search.


Choose your data Content, (calls, Texts, or recordings) Choose the person and execute.

Graphical user interface, application, WordDescription automatically generated



Your selection will appear.

Graphical user interface, text, application, emailDescription automatically generated


Choose the specific recording your want to listen to.

Play, Pause, or Stop the recording.


Graphical user interface, text, application, emailDescription automatically generated

When you are done. 

Close your query and Exit the application.

    • Related Articles

    • Make a call with WiFi

      Make a call with Wi-Fi Calling With Wi-Fi Calling, you can make or receive a phone call if you have a Wi-Fi connection in an area with little or no cellular coverage. Learn how to make a voice call using Wi-Fi Calling. To use Wi-Fi Calling, you need ...
    • Mxie Softphone

      Mxie Softphone You may answer calls on your computer. From the File menu > Bind to… Select Bind to Softphone. Next. Success window. Choose Finish. Setup your Audio. File menu > Preferences Choose Audio Preferences. Here you can set how you want to ...
    • Mxie Bind plus VoiceMail

      From within Mxie use the bind menu in the lower left. Choose Bind to... Choose bind to an external. Enter your cell. Finish. Your now bound to your cell. You'll see your cell# in the bottom left corner of mxie now. Calls will go to your Cell. ...
    • Zultys Advanced Communicator (ZAC) User Guide

      Introduction Zultys Advanced Communicator (ZAC) is an all-in-one Unified Communications and Integrated Contact Center platform designed to enhance communication and collaboration. This guide provides step-by-step instructions for customer service ...
    • 🚨 Security Guidance: Avoiding Phishing & Adversary-in-the-Middle (AiTM) Attacks

      We’ve seen a rise in phishing campaigns that use tools like “Axios” or similar to trick users into giving away their Microsoft 365 credentials. These are called Adversary-in-the-Middle (AiTM) attacks — attackers create fake Microsoft login pages that ...