Contents
■ | Entering the Business Schedules | |
■ | Entering the Holiday Schedules | |
■ | Entering the Routing Table | |
■ | Other Administration |
A | System Security and Toll Fraud | ||
| ■ | Protecting Your System | |
|
| Switch Security | |
|
| Security Tips | |
|
| Voice Messaging System Security | |
|
| Security Tips | |
|
| Automated Attendant System Security | |
|
| Security Tips | |
| ■ | Subscriber Password Guidelines | |
| ■ | Switch Administration | |
|
| Restrict Outward Dialing | |
|
| Restrict Toll Areas | |
|
| Create Disallowed Number Lists | |
|
| Create Allowed Number Lists | |
|
| Restrict AMIS Networking Number Ranges | |
| ■ | Intuity AUDIX Administration | |
|
| Outcalling | |
|
| Mailbox Administration | |
|
| Basic Call Transfer | |
| ■ | Detecting Toll Fraud | |
|
| Call Detail Recording | |
|
| Intuity AUDIX Traffic Reports | |
| ■ | AT&T’s Statement of Direction | |
|
| AT&T Security Offerings | |
|
| AT&T Toll Fraud Crisis Intervention | |
|
| AT&T Corporate Security |
Issue 2.0 December 1995 ix