Mitel Version 5.7 SP1 Telephone User Manual


 
174 Chapter 6 Configuration
Figure 6-10 Security flow chart
Creating security lists
You can use advanced security to restrict user access to sites, reporting, and real-time functions.
Before you can specify advanced security, you must create security lists (device lists, real-time monitor lists,
report lists, site lists, and/or user lists). Each list must contain the devices, real-time monitors, reports, sites,
and/or users to which employees are granted access. You can combine these lists when you assign a security
role. For example, you can specify advanced security that permits users to create Employee Group
Performance by Employee reports (specific report list) on Kanata employees (specific device list) only.
Use the following security lists to define advanced security:
Device list—Device lists specify devices for which employees may view real-time information. You
create device lists to restrict access to statistics on specific employees. For example, you might want
a manager to view certain employees only (specific device - Kanata employees). The device list must
contain the device (employee group - in this case, Kanata employees) to which the user may gain
access.