Instruction manual
Large business communications systems
5-2 Issue 9 May 2003
■ Chapter 8 contains security measures to protect the Automated Attendant 
feature of your communications system. See ‘‘Unless specifically stated 
otherwise, references in this document to “G3Vx and later” include the 
specified DEFINITY G3 (and more recent) versions, DEFINITY ECS, 
MultiVantage™ Software, and Communication Manager.’’ on page 8-1.
■ Chapter 13 provides instructions for administering the features of the 
DEFINITY G3V3 and later, specifically designed to provide protection from 
toll fraud.
■ Chapter 16 describes ‘‘Securing DEFINITY systems (Release 7.2 and 
Later) with Access Security Gateway’’ on page 16-4.
Keeping unauthorized third parties
from entering the system
The major ways in which unauthorized third parties gain entry into the system are 
as follows:
■ Remote access
■ Remote maintenance port
■ Vectors
■ Transfers from adjunct systems, including voice mail systems, call 
prompters, and voice response systems
Protecting the Remote Access feature
Remote access, or direct inward system access (DISA), allows callers to call into 
the PBX from a remote location (for example, a satellite office or while traveling) 
and use the system facilities to make calls. When properly secured, the Remote 
Access feature is both cost-efficient and convenient. However, every security 
measure has an offsetting level of inconvenience for the user. These 
inconveniences must be weighed against the possible risk of toll fraud.
Security tips
■ Evaluate the necessity for remote access. If this feature is not vital to your 
organization, consider deactivating the feature. If you need the feature, use 
as many of the security measures presented in this chapter as you can.
■ Use a unpublished telephone number for this feature. Professional hackers 
scan telephone directories for local numbers and 800 numbers used for 
remote access. Keeping your remote access number out of the phone 
book helps prevent it from getting into the wrong hands. Avoid 
administering a night service destination to remote access on any 
published number.
■ Keep an authorized user list and reevaluate it on a need-to-have basis.










