Instruction manual

Index
IN-4 Issue 9 May 2003 (draft)
Data Privacy
Feature Access Code, 5-9
Data Restriction
Feature Access Code, 5-9
DCS, see Distributed Communication System
default passwords
changing, 4-4
DEFINITY AUDIX Voice Messaging System
automated attendant, 8-18
logins, 7-22
password
changing, 14-4
protecting, 7-22
protecting the system, 7-16
security checklists, 17-4
security considerations, 7-23
DEFINITY Communications System
automated attendant, 8-1
detecting toll fraud, 5-50
restricting unauthorized outgoing calls, 5-13
security goals and tools, 4-10
security measures, 5-28
security tips, 5-2
security tools by release, 18-1
voice mail, 7-4
DEFINITY Communications System G1
password
changing, 14-5
security checklists, 17-14
DEFINITY Communications System G2
password
changing, 14-6
security checklists, 17-20
DEFINITY Communications System G3
password
changing, 14-5
security checklists, 17-14
DEFINITY ECS, see DEFINITY Enterprise Communications
Server
DEFINITY Enterprise Communications Server
detecting toll fraud, 5-50
restricting unauthorized outgoing calls, 5-13
security checklists, 17-14
security measures, 5-28
security tips, 5-2
voice mail, 7-4
Dial Access Code, 5-41, 7-2
dial tone
AAR, 5-43
accessing, 2-5
ARS, 5-20, 5-43
authorization code, 5-8
barrier code, 5-7
Remote Access, 5-3
suppressing, 5-42
switch, 5-43
transferring, 2-5
DID Restriction, 8-4
digit conversion, 5-25, 5-35, 5-36
Digital Port Emulation Mode, 7-30
DIMENSION PBX System
security checklists, 17-24
direct dial access, 5-9, 5-20
Direct Distance Dialing, 2-1
Direct Inward Dialing, 15-1
Direct Inward System Access, 2-4, 2-5, 4-2, 15-2
MERLIN LEGEND Communications System, 6-6
DISA, see Direct Inward System Access
disable remote-access command, 13-7
disabling Remote Access, 12-3
disallowing outside calls, 7-26, 8-3, 8-16
Distributed Communication System, 5-44, 5-57
Trunk Turnaround, 5-44
dumpster diving, 2-6
E
Electronic Tandem Network, 5-20, 5-45
E-mail administration
Viruses, 7-19
employee
abuse, 2-8, 4-8, 9-9
education, 4-8
emulation programs
PC-based, 4-6
enable remote-access command, 13-6
Enhanced Automated Attendant, 7-19, 8-14
Enhanced Call Transfer, 7-24, 7-26, 7-30, 8-2, 8-16
coverage limitations, 7-24
EPSCS network, 5-17
equipment rooms
physical security, 4-9
Escape to Attendant, 7-24
ETN, see Electronic Tandem Network
Extended User Administration of Redirected Calls, 5-27
F
FAC, see Feature Access Code
Facility Restriction Level, 5-18, 5-19, 7-6, 8-2, 8-5
attendant console, 5-32
MERLIN LEGEND System, 6-10
overriding, 5-19
providing individualized calling privileges, 5-31
suggested value, 5-32
Facility Test Call, 5-42
access code, 5-41, 7-2
denying, 5-11
disabling, 5-40
FEAC, see Forced Entry of Account Code