Instruction manual
Large business communications systems
5-60 Issue 9 May 2003
■ On a historical basis, the number of security violations of each type is
collected and reported in the Security Violations Summary Measurement
report. This report shows summary information since the last time the
counters were reset. (See ‘‘Security Violations Measurement reports’’ on
page 5-62.)
For Communication Manager, MultiVantage™ Software, DEFINITY ECS and
DEFINITY G3:
■ Enter change system-parameters feature to display the Feature-Related
System Parameters screen. (For DEFINITY G3V3 and later, enter
change
system-parameters security
to display the System-Parameters Security
screen.)
■ To monitor remote access, enter y in the SVN Remote Access
Violation Notification Enabled?
field.
■ To monitor administration ports, on the same screen, enter y in the SVN
Login Violation Notification Enabled
field.
■ To monitor authorization codes (G3V3 and later), enter y in the SVN
Authorization Code Violation Notification Enabled
field.
■ Enter any valid unassigned extension number in the Originating
Extension
field(s).
■ Enter the extension number of the person who will monitor violations in the
Referral Destination field(s). For releases before DEFINITY G3V3,
this destination must be a station equipped with a display module or an
attendant console. In DEFINITY G3V3 and later, if an announcement
extension is administered, the referral destination does not require a
display module. In G3V3 and later, a violation occurs based on the number
of invalid attempts and is not dependent on a forced disconnect.
NOTE:
If an announcement extension is administered, but no announcement
is recorded, the referral call will not be made.
■ For remote access, enter the number of attempts allowed before a violation
occurs in the
Barrier Code Threshold field, and enter the time interval
in hours or minutes for tracking the number of attempts.
■ For logins, enter the number of login attempts before a violation occurs in
the
Login Threshold field and the time interval in hours or minutes for
tracking the number of attempts. To register as a violation, there must be
three invalid login attempts (resulting in a forced disconnect) within the
assigned time interval.
NOTE:
If you set the Barrier Code Threshold to 1, any unsuccessful
first attempt by authorized users to enter the barrier code will cause a
violation. A suggestion is to set the threshold to allow three attempts
within five minutes to allow for mistakes made by authorized users.