Technical information
DEFINITY ECS, DEFINITY Communications Systems,
System 75, and System 85
Issue 7 June 2001
7-15
Unsuccessful call transfer attempts can result in multiple records being created for
a single session. Review these records regularly for the following signs of hacker
activity:
Failed login attempts
Multiple call transfers for a single session
Numerous outbound calls from the same voice mailbox
Calls to strange places
Heavy volume of Transfer Out of AUDIX Voice Mail System calls
The AUDIX Voice Power System tracks traffic data over various timespans.
Reviewing these reports on a regular basis helps to establish traffic trends. If
increased activity or unusual usage patterns occur, they can be investigated
immediately.
Table 7-4. Outgoing Call Type Values
VALUE OUTGOING CALL TYPE
10 Transfer from voice mail with *T or *0
11 Transfer from voice mail via return call
12 Transfer from call answer with *T, *0 or 0
13 Transfer from Automated Attendant via menu
selection
14 Transfer from Automated Attendant via extension
specification
15 Transfer from Automated Attendant via time out
16 Transfer from Automated Attendant via *T
17 Transfer from Bulletin Board via *T, *0 or 0
20 Outcalling for any message
21 Outcalling for priority message
30 Message waiting activation/deactivation
40 Call Delivery