PARTNER MAIL Voice Messaging System Release 3.0

Form O: Security Checklist

PAGE 1 of 1

Instructions:

To complete this security checklist, for each item, check the Yes column if the item is done or the No column if the item is not done. For more information, see “Form O: Security Checklist Description.”

Mail System

Item

Yes No

1.Create only mailboxes that are necessary.

2.Permit no Outcalling, or permit it only for those requiring it.

3.Change System Administrator’s Mailbox.

4.Set Minimum Password Length to 6 digits or more.

5.Set Security Violation Notification action and number of attempts to the most restrictive values the business allows.

6.Set System Administrator’s Mailbox password to a hard-to-guess value.

7.Set System Administration Password to a hard-to-guess value.

8.Turn off Remote Maintenance Device when it is not in use.

Communications System

 

Item

Yes

 

No

 

 

 

 

 

 

 

 

9. Remove all lines from the Remote Maintenance Device using Line Assignment (#301).

 

 

 

 

 

 

 

 

 

10. Restrict the Remote Maintenance Device to Inside Only using Outgoing Call

 

 

 

 

Restriction (#401).

 

 

 

 

 

 

 

 

 

11. If Outcalling is not permitted, restrict extensions associated with the mail system unit to

 

 

 

 

Inside Only using Outgoing Call Restriction (#401).

 

 

 

 

 

 

 

 

 

12. If Outcalling is permitted:

 

 

 

 

Set extensions connected to ports that are not used for Outcalling to Inside Only

 

 

 

 

using Outgoing Call Restriction (#401).

 

 

 

 

Set extensions connected to ports that are used for Outcalling to the most restrictive

 

 

 

 

value that the business allows.

 

 

 

 

Create Disallowed Phone Number List (#404) and Allowed Phone Number List (#407)

 

 

 

 

and assign them to extensions connected to ports that are used for Outcalling using

 

 

 

 

Disallowed List Assignment (#405) and Allowed List Assignment (#408) respectively.

 

 

 

 

 

 

 

 

 

Security Policy

 

 

 

 

 

 

 

 

 

Item

Yes

No

 

 

 

 

 

 

13.Establish a security policy as described in Chapter 1 of the Planning, Installation,

 

 

 

 

and Use guide.

 

 

 

 

 

 

 

 

For any security checklist item that is not done, on the back of this page, write the number of the item and explain why it is not done.

Page 339
Image 339
AT&T 3 manual Mail System Yes No, Communications System Yes, Security Policy Yes