Silent Intrusion - Avaya INDeX 9.1 Programming Manual

Hide thumbs Also See for INDeX 9.1:
Table of Contents

Advertisement

System Services

Silent Intrusion

Programming Manual
INDeX 9.1
Silent intrusion is the same as forced intrusion except that the parties in the call do
not hear any warning pips during the intrusion. The use of silent intrusion requires
entry of a Silent Intrusion licence key.
The use of silent intrusion is subject to national regulations. Avaya will
not provide the licence key for silent intrusion until satisfied that the
requirements of those regulations have been met.
A. Enter the silent monitoring licence key :
1. From the Administration menu, select System and then Switch Licences.
2. Select Silent Intrusion and enter the INDeX's licence key for the feature.
B. Create the monitor group :
1. Create a group (see "Groups" on page 88) containing the users to be
monitored.
2. Check that the Secure from intrusion (Users > Personal Status > Secure
from intrusion) of each user in the group is set to no.
C. Set up the monitoring user :
1. From the Administration menu select User and enter the user's directory
number.
2. Select Monitor group and enter the directory number of the group to be
monitored.
3. Select Type and set this to either supervisor or system manager.
– supervisor : Use for ACD terminals.
– system manager : Use for non ACD user. Also provides the user with
controls to set date, time, night service and ACA options.
4. From Personal Status, select Allowed to intrude and set this to yes.
D. Invoking silent intrusion from a Station :
1. Whilst free, press •LISTEN and enter the target number. If the target is free
you will hear a repeated tone. If the target is involved in a call you will
immediately be able to overhear that call.
2. Whilst listening to a call, the terminal has several options:
– •INTRUDE: Operates as a normal forced intrusion.
– •REVIEW: Connects you with the monitored extension once it finishes the
monitored call.
3. Another terminal can also overhear the call by listening to the first intruder.
Their •INTRUDE and •REVIEW function act on the first intruder and not the
monitored extension. To do this the first intruder must be in the second
intruder's monitor group.
WARNING
Use of Silent Intrusion
38DHB0002UKDJ – Issue 3 (12/00)
Silent Intrusion - Page 87
System Services - Page 87

Advertisement

Table of Contents
loading

Table of Contents