Enhanced-List Application

cannot be infected with viruses embedded in these software files, client machines may become infected when a user launches the application associated with the software file.

! CAUTION:

ELA does not perform any virus detection. Your company should evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an e-mail application supported by INTUITY AUDIX R4.

At a minimum, you should advise your users that file attachments should be detached (not launched) and scanned for viruses before use.

IMAPI Session Requirements

An IMAPI session is invoked when an e-mail trusted server, Message Manager, or the ELA trusted server needs to communicate with the AUDIX server. The AUDIX server must have a sufficient number of IMAPI sessions administered to provide adequate access for all IMAPI requests. Additionally, the ELA server must be registered as an AUDIX trusted server.

Shadow Mailbox

The shadow mailbox is a special mailbox that ELA uses to distribute messages. The use of a shadow mailbox prevents replies to ELA-delivered messages from being sent back to the entire Enhanced List. However, you can administer enhanced lists such that recipients can reply to the person who originally sent the message. The shadow mailbox must belong to a community that cannot receive messages.

8Issue 1 July 1997

Page 18
Image 18
Lucent Technologies 585-310-575 manual Imapi Session Requirements, Shadow Mailbox