Instruction manual

Voice messaging systems
7-16 Issue 9 May 2003
To review, use list measurements aca.
Administer an aca button on the console or display station to which the
referral will be sent.
For DEFINITY G2 and System 85:
Use PROC285 WORD1 FIELD5 and PROC286 WORD1 FIELD1 to enable
ACA system-wide.
Use PROC120 WORD1 to set ACA call limits and number of calls
thresholds.
Use PROC286 WORD1 FIELD3 to send the alarms and/or reports to an
attendant.
Busy verification
When toll fraud is suspected, you can interrupt the call on a specified trunk group
and monitor the call in progress. Callers will hear a long tone to indicate the call is
being monitored.
For Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY G1, G3, and System 75:
Use change station to display the Station screen for the station that will be
assigned the Busy Verification button.
In the Feature Button Assignment field, enter verify.
To activate the feature, press the Verify button and then enter the trunk
access code and member number to be monitored.
For DEFINITY G2 and System 85:
Administer a Busy Verification button on the attendant console.
To activate the feature, press the button and enter the trunk access code
and the member number.
Protecting the AUDIX, DEFINITY AUDIX, and
Avaya INTUITY voice mail systems
Toll fraud is possible when the application allows the incoming caller to make a
network connection with another person. Thus, bridging to an outbound call, call
transfer, and 3-way-conferencing are vulnerable areas and should be protected.
Unauthorized system use
You can minimize the risk of unauthorized people gaining access to your system
by strictly following the compliance guidelines for, and using the aging feature of,
your voice mail and AUDIX system administration (sa) passwords.