System information

Contents
Issue 1 October 1997 iii
About This Book xi
Purpose xi
Intended Audiences xi
Release History xi
Conventions Used in This Book xi
Terminology xii
Keyboard and Telephone Keypad
Representations xiv
Screen Displays xv
Data Entry Conventions xv
Safety and Security Alert Labels xvi
Trademarks and Service Marks xvi
Related Resources xviii
Documentation xviii
Training xviii
Technical Assistance xviii
How to Comment on This Book xix
System Security and Toll Fraud xxi
Protecting Your Voice Messaging System xxi
Voice Messaging xxi
Automated Attendant xxii
Switch Administration xxii
Restrict Outward Dialing xxii
Assign Low Facilities Restriction Level (FRL) xxii
Restrict Toll Areas xxiv
Block Subscriber Use of Trunk Access Codes xxv
Restrict AMIS Networking Number Ranges xxv
Subscriber Password Guidelines xxv
INTUITY AUDIX Administration xxvi
Outcalling xxvi
Mailbox Administration xxvi
Enhanced Call Transfer xxvii
Coverage Limitations with Enhanced Call
Transfer xxviii
Detecting Voice Mail Fraud xxviii