Instruction manual
Voice messaging systems
7-12 Issue 9 May 2003
Detecting voice mail fraud
Table 7-3 shows the reports that help determine if a voice mail system used with 
the Communication Manager, MultiVantage™ Software, DEFINITY ECS, 
DEFINITY communications systems, System 75, or System 85 is being used for 
fraudulent purposes.
See ‘‘Security tips’’ on page 7-3 for additional ways to detect voice mail fraud.
NOTE:
The system administrator can also view a logfile to see if a mailbox is being 
hacked. For the AUDIX Voice Mail System R1, the administrator can view 
the logfile by typing 
system:log:display. For the DEFINITY AUDIX and 
Avaya I
NTUITY Voice Mail Systems, the administrator can view the logfile by 
typing 
display administration-log.
Table 7-3. Reports and monitoring techniques for voice mail
Monitoring Technique Switch Page #
Call detail recording (SMDR) All 7-13
Traffic measurements and 
performance
All 7-14
Automatic circuit assurance All 7-15
Busy verification All 7-16
Call Traffic report All 7-14
Trunk Group report G1, G3, System 75 7-14
Traffic reports Any with the AUDIX 
Voice Mail System
7-16
Call detail recording Any with the AUDIX 
Voice Mail System 
R1V5 with Digital 
Networking
7-19










