Instruction manual
Large business communications systems
5-60 Issue 9 May 2003
■ On a historical basis, the number of security violations of each type is 
collected and reported in the Security Violations Summary Measurement 
report. This report shows summary information since the last time the 
counters were reset. (See ‘‘Security Violations Measurement reports’’ on 
page 5-62.)
For Communication Manager, MultiVantage™ Software, DEFINITY ECS and 
DEFINITY G3:
■ Enter change system-parameters feature to display the Feature-Related 
System Parameters screen. (For DEFINITY G3V3 and later, enter 
change 
system-parameters security
 to display the System-Parameters Security 
screen.)
■ To monitor remote access, enter y in the SVN Remote Access 
Violation Notification Enabled?
 field.
■ To monitor administration ports, on the same screen, enter y in the SVN 
Login Violation Notification Enabled
 field.
■ To monitor authorization codes (G3V3 and later), enter y in the SVN 
Authorization Code Violation Notification Enabled
 field.
■ Enter any valid unassigned extension number in the Originating 
Extension
 field(s).
■ Enter the extension number of the person who will monitor violations in the 
Referral Destination field(s). For releases before DEFINITY G3V3, 
this destination must be a station equipped with a display module or an 
attendant console. In DEFINITY G3V3 and later, if an announcement 
extension is administered, the referral destination does not require a 
display module. In G3V3 and later, a violation occurs based on the number 
of invalid attempts and is not dependent on a forced disconnect.
NOTE:
If an announcement extension is administered, but no announcement 
is recorded, the referral call will not be made.
■ For remote access, enter the number of attempts allowed before a violation 
occurs in the 
Barrier Code Threshold field, and enter the time interval 
in hours or minutes for tracking the number of attempts.
■ For logins, enter the number of login attempts before a violation occurs in 
the 
Login Threshold field and the time interval in hours or minutes for 
tracking the number of attempts. To register as a violation, there must be 
three invalid login attempts (resulting in a forced disconnect) within the 
assigned time interval.
NOTE:
If you set the Barrier Code Threshold to 1, any unsuccessful 
first attempt by authorized users to enter the barrier code will cause a 
violation. A suggestion is to set the threshold to allow three attempts 
within five minutes to allow for mistakes made by authorized users.










