Instruction manual
Product security checklists
17-20 Issue 9 May 2003
DEFINITY G2 and System 85
Also see the general security checklist on page 17-2, and the security checklist for
any attached voice mail systems or other adjuncts.
Customer: _________________________________________
Location: _________________________________________
System & Version: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 17-7. DEFINITY G2 and System 85 security checklist
Y/N
1
Note N/A
System Administration Logins
and Procedures
Security code changed from factory
default
PBX Features
Trunk groups have dial access
disabled
COS/miscellaneous trunk
restrictions on dial-accessed trunks
Disable trunk verification access
code
ACA on trunk groups
Alternate FRLs used
Individual and group controlled
restrictions used
Attendant control of trunk group
activated for any trunk groups with
TACs
Continued on next page