Customer Support Information

responsibility to take appropriate steps to implement the features properly, evaluate and administer the various restriction levels, protect and carefully distribute access c o d e s .

Under applicable tariffs, you will be responsible for payment of toll charges. AT&T cannot be responsible for such charges and will not make any allowance or give any credit resulting from unauthorized access.

To reduce the risk of unauthorized access through your Voice Mail system, please observe the following procedures:

Employees who have voice mailboxes should be required to use the passwords to protect their mailboxes.

Have them use random sequence passwords.

Impress upon them the importance of keeping their passwords a secret.

Encourage them to change their passwords regularly.

The administrator should remove any unneeded voice mailboxes from the

system immediately.

.

AUDIX Voice Power™ has the ability to limit transfers to subscribers only. You are strongly urged to limit transfers in this manner.

Use the PBX or Key system administration capability to do the following:

Block direct access to outgoing lines and force the use of account codes/authorization codes.

Disallow trunk-to-trunk transfer unless required.

Assign toll restriction levels to all AUDIX Voice Power ports.

If you do not need to use the Outcalling feature, completely restrict the outward calling capability of the AUDIX Voice Power ports.

Monitor SMDR reports or Call Accounting System reports for outgoing calls that might be originated by AUDIX Voice Power ports.

Remote Administration and Maintenance

The Remote Administration and Maintenance feature of your telecommunications system, if you choose to use it, permits users to change the system features and capabilities from a remote location.

The Remote Administration and Maintenance feature, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, telephone numbers and authorization codes can be compromised when overheard in a public location, are lost through theft of a wallet or purse containing access information, or through carelessness (writing codes on a piece of paper and improperly discarding them). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges

Customer Support Information xxv

Page 27
Image 27
AT&T Release 2.0 manual Remote Administration and Maintenance