Instruction manual

Issue 9 May 2003 5-1
5
Large business communications
systems
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx
and later” include the specified DEFINITY G3 (and more recent) versions,
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
This chapter provides information on protecting the following:
Communications Manager
MultiVantage™ Software
DEFINITY ECS Release 5 and later
DEFINITY communications systems
System 75
System 85
The first section of this chapter, ‘‘Keeping unauthorized third parties from entering
the system’’ details the major ways third parties enter the system and tells how to
keep them from doing so. The second section, ‘‘Tools that restrict unauthorized
outgoing calls’’details features within the system that prevent unauthorized egress
from the system. The third section, ‘‘Security measures’’
tells how to use the tools
described in the preceding section. The final section, ‘‘Detecting toll fraud’’
details
methods for monitoring the system and determining the effectiveness of the
security measures you implemented.
Other chapters detail additional security measures to protect your equipment:
Chapter 7 contains security measures to protect the attached voice
messaging system. For general security measures, refer to ‘‘Protecting
voice messaging systems’’ on page 7-2. For product-specific security
measures, refer to ‘‘Communication Manager, MultiVantage Software,
DEFINITY ECS, DEFINITY communications systems, System 75,and
System 85’’ on page 7-4.