Lucent Technologies 107970212 Answering Machine User Manual


 
Overview
Security
The System Manager is responsible for the security of the system. It is important
that you fully understand and appropriately administer this product to reduce
your risk of incurring charges that result from unauthorized use of the system.
Under the law, you, the customer are responsible for paying part or all of those
unauthorized calls.
Be aware that criminals called hackers may attempt to gain unauthorized
access to your communications system and your voice mail system. Hackers
often try to trick a company’s employees into providing them with access to an
outside line or an outside operator. They may also concentrate their activities in
two areas related to the mail system:
They try to dial into a mailbox, then execute a transfer by dialing [
] [
8
].
Then they dial an access code, followed by a digit string to either direct
dial or access a network operator to complete the call.
They try to locate unused or unprotected mailboxes and use them as
drop-off points for their own messages.
System Security Guidelines
To reduce the risk of unauthorized use of your communications and voice mail
systems, you should
require that the System Manager’s Password be changed from the
factory setting. Use a hard-to-guess value.
delete any unused mailboxes immediately.
require all employees who have voice mailboxes to use passwords to
protect their mailboxes.
permit no Outcalling or permit this privilege only for those with legitimate
business need.
advise subscribers to change their passwords (a 4-digit password is
recommended) when they log into the Voice Mail Service for the first time
and frequently thereafter. Subscribers can refer to the instructions for
changing their passwords in Using the PARTNER MAIL VS
®
.
familiarize yourself with the impact of the Outcalling feature on system
performance and security. If Outcalling is not permitted on the system,
Outgoing Call Restriction should be set to Inside Only for the voice mail
system extensions. It is strongly recommended that you use the
communications system Call Restriction features (that is, Outgoing Call
Restriction used with Allowed and Disallowed Lists) to restrict Outcalling
numbers. See “Outgoing Call Restriction” in Chapter 4 for details.
monitor your call reporting system records of outgoing calls to identify
possible system abuse.
1-15