Instruction manual

Detecting toll fraud
Issue 9 May 2003
5-53
Login permissions for a specified login can be set by the superuser to block any
object that can affect the health of the switch. Up to 40 administration or
maintenance objects (commands) can be blocked for a specified login. When an
object (administrative or maintenance command) is entered in the blocked object
list on the Command Permissions Categories Restricted Object List screen, the
associated administrative or maintenance actions cannot be performed by the
specified login.
Commands for the DEFINITY G3V3 or later are grouped into three categories:
common, administration, and maintenance. Each category has a group of
subcategories, and each subcategory has a list of command objects that the
commands act on. A superuser can set a user’s permissions to restrict or block
access to any command in these categories.
NOTE:
DEFINITY G3V3 and later releases allow for unique logins to be assigned
(for example, MARY83, B3V3RLY, etc.). This eliminates the need to use
cust, rcust, browser, and bcms. The list login command shows the
assigned logins, and the state of the login (for example, VOID, disabled,
etc.).
For information on administering Forced Password Aging and Administrable
Logins for DEFINITY G3V3 and later, see Chapter 14
.
Call detail recording/station message
detail recording
This feature creates records of calls that should be checked regularly. A series of
short holding times may indicate repeated attempts to decode remote access
barrier codes or authorization codes. Call records can be generated for Remote
Access when CDR/SMDR is activated for the remote access trunk group.
Authorization codes, if required, are recorded by CDR/SMDR; barrier codes are
not. When you set the
Suppress CDR for Ineffective Call Attempts
field to
no, calls that fail because the caller does not have adequate calling
privileges print a condition code in the report to reflect the failed attempt. (See the
CDR description in the Administrator’s Guide for Avaya™ Communication
Manager.) Review the report for these condition codes, which might indicate
hacker activity.