Instruction manual
Contents
Issue 9 May 2003 15
Unauthorized system use 7-16
Traffic reports (AUDIX Voice Mail System only) 7-19
Call detail recording (AUDIX Voice Mail
System only) 7-19
Protecting passwords 7-22
Security features 7-23
Security measures 7-26
Security tips 7-30
Protecting the AUDIX Voice Power System 7-30
Traffic reports 7-30
Protecting passwords 7-31
Security tips 7-31
Security measures 7-32
Protecting the CONVERSANT Voice Information
System 7-33
Protecting passwords 7-33
Security measures 7-34
Security tips 7-35
■ MERLIN II Communications System 7-35
Protecting the MERLIN MAIL Voice Messaging
System 7-35
Protecting passwords 7-36
Security tips 7-36
■ MERLIN LEGEND Communications System 7-38
Protecting the AUDIX Voice Power System 7-39
Protecting passwords 7-39
Security tips 7-39
Security measures 7-40
Protecting the INTUITY Voice Messaging System 7-41
Protecting passwords 7-42
Security tips 7-42
Security measures 7-42
Protecting the MERLIN MAIL, MERLIN
MAIL-ML, MERLIN MAIL R3, and MERLIN
LEGEND Mail voice messaging systems 7-45
Protecting automated attendant 7-45
Protecting passwords 7-46