Installation Overview
Protecting Your System
Octel 50 Installation Guide
12-14
•
Once the \CVR1 directory has been replaced with the backed up files, the Quick
Assist utility is run in Update All mode. This reattaches all messages to their
destination mailbox. For more information on running Quick Assist in Update All
mode, see the topic, “Running an Update on All Mailboxes,” earlier in this
chapter.
Any changes made to the system since the last shutdown after daily maintenance,
excluding prompts and voice/fax message sending and receipt, are lost.
Protecting Your System
Voice messaging toll fraud has risen dramatically in recent years. Now more than ever, it
is imperative that you take steps to secure your system. Callers into the voice
messaging/automated attendant system may transfer to an outgoing trunk if adequate
security measures are not implemented. Callers who have unauthorized access to a voice
mailbox can use it as a message drop for communications at your expense on your 800
numbers. Securing your system means protecting the switch, protecting the voice
messaging system, and protecting any automated attendant applications.
Please review and implement, as appropriate, the following security measures to:
•
Prevent callers from transferring to extensions not assigned system mailboxes
•
Impede callers from gaining access to the Quick Assist maintenance mailbox
•
Require passwords at least one digit longer than mailbox numbers
•
Require subscribers to regularly change their passwords
•
Use extended password security
•
Have subscribers record their Name prompts
•
Delete unused mailboxes immediately
•
Secure the system PC
•
Utilize phone system security features
•
Use supervisor passwords to restrict system management access
•
Logoff from the system when not using it to restrict system management access
It is recommended that these security features be reviewed and implemented as
appropriate. A Security Checklist is provided at the end of the this section to help you
implement these features.
Preventing Callers from Transferring to Extensions Not
Assigned System Mailboxes
On some phone systems, callers can transfer to a system extension and then use that
extension to access an outside line. This is most relevant for system ports used for
outcalls for networking or message notification to a beeper. By preventing callers from
accessing system extensions not assigned system mailboxes, you can substantially
reduce the risk of outside callers accessing an outside line.
The General Transfer parameters in System Setup can prevent callers from accessing
non-assigned extensions for this purpose:
•
Transfer Invalid Mailboxes During Business Hours
•
Transfer Invalid Mailboxes After Business Hours