NEC UNIVERGE UM8000 User Manual page 27

Hide thumbs Also See for UNIVERGE UM8000:
Table of Contents

Advertisement

Following Recommended Security Practices
In addition to performing the procedures described in
recommendations on an ongoing basis.
WARNING!
F
AILURE TO FOLLOW THESE RECOMMENDATIONS CAN RESULT IN UNAUTHORIZED ACCESS TO THE SYSTEM AND A POTENTIAL CORRUPTION OR
.
LOSS OF DATA
Limit the number of system managers. System managers can change the system in many important ways.
Only assign system manager status to subscribers who need it to perform system management tasks.
Delete any unused mailboxes.
Immediately reassign or delete subscribers' mailboxes when they leave the organization. This precaution is
particularly important if a subscriber is a system manager.
Create subscriber directory reports. Check regularly for any unused mailboxes and delete them as necessary.
Verify that the correct subscribers are assigned system manager status. Delete any unknown subscribers.
Create system usage and system log reports.
messaging system activity. Check the reports regularly for unusual activity, particularly during late night or early
morning hours. Check for calls that are unusually long in duration. Check the reports for activity by
do not recognize.
Emphasize the importance of following recommended security practices. Distribute security policies in
writing to all employees. Train subscribers to:
avoid security codes that match their birthday, child birth date, or social security number.
never program a speed-dial key with their security code.
never write down a security code or share the code with others.
Related Topics
Configuring System Security
Assigning System Manager Status
Creating Fax Reports
System Reports
Creating Directory Extension Reports
Call Report Log Reports
System Overview
Configuring System
When you add a range of mailboxes, add only the number of boxes you need.
System usage and system log reports show patterns of
Security, follow these security
system IDs
you
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents