Lucent Technologies DEFINITY User Manual page 12

Pc console
Table of Contents

Advertisement

About This Document
Advise users with special telephone privileges (such as Remote Access,
n
voice mail outcalling, and call forwarding off-switch) of the potential risks and
responsibilities.
Be suspicious of any caller who claims to be with the telephone company and
n
wants to check an outside line. Ask for a callback number, hang up, and
confirm the caller' s identity.
Never distribute the office telephone directory to anyone outside the
n
company; be careful when discarding it.
Never accept collect phone calls.
n
Never discuss your telephone system' s numbering plan with anyone outside
n
the company.
Change passwords frequently (at least quarterly). Set password expiration
n
times and tell users when the changes go into effect. Changing passwords
routinely on a specific date (such as the first of the month) helps users to
remember to do so.
Establish well-controlled procedures for resetting passwords.
n
Limit the number of invalid attempts to access voice mail to five or less.
n
Monitor access to the dial-up maintenance port. Change the access
n
password regularly and issue it only to authorized personnel. Consider using
the Remote Port Security Device (RPSD) — a Lucent Technologies product
that helps protect your administration and maintenance ports from
unauthorized access.
Create a PBX system management policy concerning employee turnover and
n
include these actions:
Delete all unused voice mailboxes in the voice mail system.
If an employee is terminated, immediately delete any voice mailboxes
belonging to that employee.
If a terminated employee had Remote Access calling privileges and a
personal authorization code, remove the authorization code
immediately.
If barrier codes and/or authorization codes were shared by the
terminated employee, these should be changed immediately. Notify
the remaining users as well.
If the terminated employee had access to the system administration
interface, their login ID should be removed (G3V3 or later). Any
associated passwords should be changed immediately.
Back up system files regularly to ensure a timely recovery should it be
n
required. Schedule regular, off-site backups.
Keep the attendant console(s) and supporting documentation in an office that
n
is secured with a changeable combination lock. Provide the combination
only to those individuals having a real need to enter the office.
xii
Issue 2.5 October 1999

Advertisement

Table of Contents
loading

This manual is also suitable for:

Definity pc console 2.5

Table of Contents