ELA Administration
Issue 1 July 1997
7
The IMAPI password is an optional, secondary level of security used to prevent
an unauthorized source external to AUDIX from starting an IMAPI session. We
strongly recommend
that you take advantage of this extra protection.
If you choose to administer an IMAPI password, we recommend that you change
it on a regular basis, for example, monthly. (If you have set your administrator’s
password to age automatically, the system prompts you to change your
password. You can use this prompt to remind you to change the IMAPI password
as well.)
NOTE:
If you change an IMAPI password in AUDIX, all trusted servers must be
administered with the new IMAPI password. For example, if your I
NTUITY
AUDIX R4 supports an e-mail server, the e-mail administrator must also
administer the e-mail trusted server to reflect the new IMAPI password.
In addition to trusted server security, there is the possibility that an administered
e-mail or remote AMIS Analog user could use an ELA mailbox in an unauthorized
manner. One example is to send “mail bombs” to an Enhanced List. Mail bombs
are harassing messages that do not serve your business needs, and impose
unnecessary traffic on your system. ELA mailboxes are no more vulnerable to
unauthorized use than other voice mailboxes. However, the impact on system
performance can be many times greater than the potential for harassment when
sending messages to an individual mailbox. Sending to an enhanced list that
forwards a message to 1500 recipients will obviously have much farther reaching
consequences than that of a handful of messages sent to individual mailboxes.
To prevent unauthorized access to an ELA mailbox from an external source such
as e-mail users or remote AMIS Analog users, you can place those users in a
community with sending restrictions. See:
■ "Setting Up ELA and Shadow Mailbox Community IDs" on page 3-19 for
information about administering ELA community sending restrictions
■ “Setting Up Community Sending Restrictions” in Chapter 3 of your
I
NTUITY
Messaging Solutions Administration
guide for information about the
implications of administering Community IDs
Internal Security
INTUITY AUDIX R4 allows the transmission of 2 new message components, text
(originating from Message Manager or e-mail) and binary file attachments
(software files, such as a spreadsheet or word processing file). With these new
components come new security considerations, namely, the inadvertent delivery
of a virus that may be embedded in a file attachment. This can occur in any
system that supports the delivery of software files. While the AUDIX machine