Instruction manual
Voice messaging systems
7-12 Issue 9 May 2003
Detecting voice mail fraud
Table 7-3 shows the reports that help determine if a voice mail system used with
the Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY communications systems, System 75, or System 85 is being used for
fraudulent purposes.
See ‘‘Security tips’’ on page 7-3 for additional ways to detect voice mail fraud.
NOTE:
The system administrator can also view a logfile to see if a mailbox is being
hacked. For the AUDIX Voice Mail System R1, the administrator can view
the logfile by typing
system:log:display. For the DEFINITY AUDIX and
Avaya I
NTUITY Voice Mail Systems, the administrator can view the logfile by
typing
display administration-log.
Table 7-3. Reports and monitoring techniques for voice mail
Monitoring Technique Switch Page #
Call detail recording (SMDR) All 7-13
Traffic measurements and
performance
All 7-14
Automatic circuit assurance All 7-15
Busy verification All 7-16
Call Traffic report All 7-14
Trunk Group report G1, G3, System 75 7-14
Traffic reports Any with the AUDIX
Voice Mail System
7-16
Call detail recording Any with the AUDIX
Voice Mail System
R1V5 with Digital
Networking
7-19