Instruction manual
Product security checklists
17-20 Issue 9 May 2003
DEFINITY G2 and System 85
Also see the general security checklist on page 17-2, and the security checklist for 
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 17-7. DEFINITY G2 and System 85 security checklist
Y/N
1
Note N/A
System Administration Logins 
and Procedures
Security code changed from factory 
default
PBX Features
Trunk groups have dial access 
disabled
COS/miscellaneous trunk 
restrictions on dial-accessed trunks
Disable trunk verification access 
code
ACA on trunk groups
Alternate FRLs used
Individual and group controlled 
restrictions used
Attendant control of trunk group 
activated for any trunk groups with 
TACs
Continued on next page










