The IMAPI password is an optional, secondary level of security used to prevent an unauthorized source external to AUDIX from starting an IMAPI session. We strongly recommend that you take advantage of this extra protection.
If you choose to administer an IMAPI password, we recommend that you change it on a regular basis, for example, monthly. (If you have set your administrator’s password to age automatically, the system prompts you to change your password. You can use this prompt to remind you to change the IMAPI password as well.)
NOTE:
If you change an IMAPI password in AUDIX, all trusted servers must be administered with the new IMAPI password. For example, if your INTUITY AUDIX R4 supports an e-mail server, the e-mail administrator must also administer the e-mail trusted server to reflect the new IMAPI password.
In addition to trusted server security, there is the possibility that an administered e-mail or remote AMIS Analog user could use an ELA mailbox in an unauthorized manner. One example is to send “mail bombs” to an Enhanced List. Mail bombs are harassing messages that do not serve your business needs, and impose unnecessary traffic on your system. ELA mailboxes are no more vulnerable to unauthorized use than other voice mailboxes. However, the impact on system performance can be many times greater than the potential for harassment when sending messages to an individual mailbox. Sending to an enhanced list that forwards a message to 1500 recipients will obviously have much farther reaching consequences than that of a handful of messages sent to individual mailboxes.
To prevent unauthorized access to an ELA mailbox from an external source such as e-mail users or remote AMIS Analog users, you can place those users in a community with sending restrictions. See:
■"Setting Up ELA and Shadow Mailbox Community IDs" on page 3-19 for information about administering ELA community sending restrictions
■“Setting Up Community Sending Restrictions” in Chapter 3 of your INTUITY Messaging Solutions Administration guide for information about the implications of administering Community IDs
Internal Security
INTUITY AUDIX R4 allows the transmission of 2 new message components, text (originating from Message Manager or e-mail) and binary file attachments (software files, such as a spreadsheet or word processing file). With these new components come new security considerations, namely, the inadvertent delivery of a virus that may be embedded in a file attachment. This can occur in any system that supports the delivery of software files. While the AUDIX machine