Instruction manual
Product security checklists
17-6 Issue 9 May 2003
AUDIX Voice Power System
Also see the general security checklist on page 17-2, the security checklist for the 
host communications system.
Number of digits on outcalling 
minimized, and/or outcalling 
destination restricted by host PBX
Voice processing ports 
COR-to-COR restricted from dialing 
remote access barrier codes (when 
host communications system is 
System 75, Communication 
Manager, MultiVantage™ Software, 
DEFINITY ECS, or DEFINITY G1 
or G3)
Product Monitoring
Administration log and activity log 
checked daily
1. If “NO” (N), provide Note reference number and explain.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 17-2. AUDIX, DEFINITY AUDIX and I
NTUITY AUDIX voice messaging 
systems security checklist
Y/N
1
Note N/A
Continued on next page










