Instruction manual
Index
IN-4 Issue 9 May 2003 (draft)
Data Privacy 
Feature Access Code, 5-9 
Data Restriction 
Feature Access Code, 5-9 
DCS, see Distributed Communication System 
default passwords 
changing, 4-4 
DEFINITY AUDIX Voice Messaging System 
automated attendant, 8-18 
logins, 7-22 
password 
changing, 14-4 
protecting, 7-22 
protecting the system, 7-16 
security checklists, 17-4 
security considerations, 7-23 
DEFINITY Communications System 
automated attendant, 8-1 
detecting toll fraud, 5-50 
restricting unauthorized outgoing calls, 5-13 
security goals and tools, 4-10 
security measures, 5-28 
security tips, 5-2 
security tools by release, 18-1 
voice mail, 7-4 
DEFINITY Communications System G1 
password 
changing, 14-5 
security checklists, 17-14 
DEFINITY Communications System G2 
password 
changing, 14-6 
security checklists, 17-20 
DEFINITY Communications System G3 
password 
changing, 14-5 
security checklists, 17-14 
DEFINITY ECS, see DEFINITY Enterprise Communications 
Server 
DEFINITY Enterprise Communications Server 
detecting toll fraud, 5-50 
restricting unauthorized outgoing calls, 5-13 
security checklists, 17-14 
security measures, 5-28 
security tips, 5-2 
voice mail, 7-4 
Dial Access Code, 5-41, 7-2 
dial tone 
AAR, 5-43 
accessing, 2-5 
ARS, 5-20, 5-43 
authorization code, 5-8 
barrier code, 5-7 
Remote Access, 5-3 
suppressing, 5-42 
switch, 5-43 
transferring, 2-5 
DID Restriction, 8-4 
digit conversion, 5-25, 5-35, 5-36 
Digital Port Emulation Mode, 7-30 
DIMENSION PBX System 
security checklists, 17-24 
direct dial access, 5-9, 5-20 
Direct Distance Dialing, 2-1 
Direct Inward Dialing, 15-1 
Direct Inward System Access, 2-4, 2-5, 4-2, 15-2 
MERLIN LEGEND Communications System, 6-6 
DISA, see Direct Inward System Access 
disable remote-access command, 13-7 
disabling Remote Access, 12-3 
disallowing outside calls, 7-26, 8-3, 8-16 
Distributed Communication System, 5-44, 5-57 
Trunk Turnaround, 5-44 
dumpster diving, 2-6 
E 
Electronic Tandem Network, 5-20, 5-45 
E-mail administration 
Viruses, 7-19 
employee 
abuse, 2-8, 4-8, 9-9 
education, 4-8 
emulation programs 
PC-based, 4-6 
enable remote-access command, 13-6 
Enhanced Automated Attendant, 7-19, 8-14 
Enhanced Call Transfer, 7-24, 7-26, 7-30, 8-2, 8-16 
coverage limitations, 7-24 
EPSCS network, 5-17 
equipment rooms 
physical security, 4-9 
Escape to Attendant, 7-24 
ETN, see Electronic Tandem Network 
Extended User Administration of Redirected Calls, 5-27 
F 
FAC, see Feature Access Code 
Facility Restriction Level, 5-18, 5-19, 7-6, 8-2, 8-5 
attendant console, 5-32 
MERLIN LEGEND System, 6-10 
overriding, 5-19 
providing individualized calling privileges, 5-31 
suggested value, 5-32 
Facility Test Call, 5-42 
access code, 5-41, 7-2 
denying, 5-11 
disabling, 5-40 
FEAC, see Forced Entry of Account Code 










