Instruction manual
Voice messaging systems
7-30 Issue 9 May 2003
Security tips
■ Require callers to use passwords.
■ Have the application verify that long distance numbers are not being 
requested, or verify that only permitted numbers are requested.
■ Use appropriate switch translation restrictions.
■ Administer all appropriate switch restrictions on the voice mail system 
voice ports.
■ You may determine whether to allow transfer only to another system 
subscriber or to any extension of the correct extension length (that is, the 
number of digits for extensions administered through the switch). For 
example, your system may be configured to support the 4-digit plan, the 
5-digit plan, and so on. The most secure approach, which is the default, is 
to only allow transfers to other system subscribers. If you decide to allow 
transfers to any extension, then you should check the switch COR on the 
voice ports for proper restrictions.
■ Administer the voice mail system to use the Enhanced Call Transfer 
feature if the switch software allows.
NOTE:
When configured to operate in Digital Port Emulation mode, the 
DEFINITY AUDIX System does not support Enhanced Call Transfer.
Protecting the AUDIX Voice Power System
The AUDIX Voice Power System provides both automated attendant and voice 
mail functionality. The Automated Attendant feature answers incoming calls and 
routes them to the appropriate department, person, or mailbox. The voice mail 
feature provides call coverage to voice mailboxes along with a variety of voice 
messaging features.
Unauthorized persons concentrate their activities in two areas with the AUDIX 
Voice Power System:
■ They try to transfer out of the AUDIX Voice Power System to gain access to 
an outgoing trunk and make long distance calls.
■ They try to locate unused or unprotected mailboxes and use them as 
dropoff points for their own messages.
Traffic reports
The AUDIX Voice Power System tracks traffic data over various timespans. 
Reviewing these reports on a regular basis helps to establish traffic trends. If 
increased activity or unusual usage patterns occur, such as heavy call volume on 
ports assigned to outcalling, they can be investigated immediately.










