Instruction manual
Voice messaging systems
7-16 Issue 9 May 2003
■ To review, use list measurements aca.
■ Administer an aca button on the console or display station to which the 
referral will be sent.
For DEFINITY G2 and System 85:
■ Use PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable 
ACA system-wide.
■ Use PROC120 WORD1 to set ACA call limits and number of calls 
thresholds.
■ Use PROC286 WORD1 FIELD3 to send the alarms and/or reports to an 
attendant.
Busy verification 
When toll fraud is suspected, you can interrupt the call on a specified trunk group 
and monitor the call in progress. Callers will hear a long tone to indicate the call is 
being monitored.
For Communication Manager, MultiVantage™ Software, DEFINITY ECS, 
DEFINITY G1, G3, and System 75:
■ Use change station to display the Station screen for the station that will be 
assigned the Busy Verification button.
■ In the Feature Button Assignment field, enter verify.
■ To activate the feature, press the Verify button and then enter the trunk 
access code and member number to be monitored.
For DEFINITY G2 and System 85:
■ Administer a Busy Verification button on the attendant console.
■ To activate the feature, press the button and enter the trunk access code 
and the member number.
Protecting the AUDIX, DEFINITY AUDIX, and
Avaya INTUITY voice mail systems
Toll fraud is possible when the application allows the incoming caller to make a 
network connection with another person. Thus, bridging to an outbound call, call 
transfer, and 3-way-conferencing are vulnerable areas and should be protected.
Unauthorized system use
You can minimize the risk of unauthorized people gaining access to your system 
by strictly following the compliance guidelines for, and using the aging feature of, 
your voice mail and AUDIX system administration (sa) passwords. 










