Instruction manual
Messaging 2000 System
Issue 9 May 2003
7-53
The Mailbox Lock-Out Option on the Class of Service dialog box 
determines whether this feature is enabled. The Mailbox Lock-Out option 
on the Subscriber Settings dialog box controls this feature by individual 
mailbox. The Consecutive Login Failures Before Lock-Out parameter on 
the Subscriber Parameters tab in the System Setup utility determines the 
number of failed login attempts allowed before the mailbox is locked, if the 
Mailbox Lock-Out option is enabled for the mailbox.
NOTE:
It is recommended that this feature be enabled for all mailboxes.
■ Monitoring failed login attempts
The Login Failure report provides a list of all unsuccessful login attempts to 
system mailboxes. This report should be reviewed periodically to 
determine if there are a lot of failed login attempts to a particular mailbox 
and when the failed attempts occur. A high number of failed login attempts 
may indicate the mailbox owner requires additional training or that an 
unauthorized user is attempting to gain access to the mailbox.
■ Having subscribers record their name prompts
When subscribers record their name prompts, those prompts are voiced as 
confirmation to callers sending messages to system mailboxes. This 
ensures that messages will be sent to the correct mailboxes. If a name 
prompt is not recorded for a subscriber mailbox, only the mailbox number is 
voiced to callers sending messages to that mailbox.
■ Deleting unused mailboxes immediately
If a mailbox is no longer being used, it is recommended that the mailbox be 
immediately deleted from the M2000 system. This will prevent anyone from 
gaining unauthorized system access through the mailbox. If a mailbox is 
being reassigned to a new mailbox owner, it is strongly recommended that 
the mailbox be deleted, then re-created.
■ Requiring callers to enter passwords to proceed in v-trees
If v-trees are used to distribute or collect sensitive information, such as 
pricing data or customer data, it is strongly recommended that you use the 
Require Password to Proceed to Next Level option. This option requires 
callers to a v-tree to correctly enter a predefined password before they are 
allowed to proceed in the v-tree. You can use this option on multiple levels 
to protect individual options, or it can be used on the first level of the 
v-trees to limit access to the entire v-tree. This ensures that only authorized 
callers can gain access to the information provided in the v-tree.










