Instruction manual
Product security checklists
17-6 Issue 9 May 2003
AUDIX Voice Power System
Also see the general security checklist on page 17-2, the security checklist for the
host communications system.
Number of digits on outcalling
minimized, and/or outcalling
destination restricted by host PBX
Voice processing ports
COR-to-COR restricted from dialing
remote access barrier codes (when
host communications system is
System 75, Communication
Manager, MultiVantage™ Software,
DEFINITY ECS, or DEFINITY G1
or G3)
Product Monitoring
Administration log and activity log
checked daily
1. If “NO” (N), provide Note reference number and explain.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 17-2. AUDIX, DEFINITY AUDIX and I
NTUITY AUDIX voice messaging
systems security checklist
Y/N
1
Note N/A
Continued on next page