Instruction manual

Communication Manager, MultiVantage Software,
DEFINITY ECS, DEFINITY communications systems,
System 75, and System 85
Issue 9 May 2003
8-13
To activate the feature, press the Verify button and then enter the trunk
access code and member number to be monitored.
For DEFINITY G2 and System 85:
Administer a Busy Verification button on the attendant console.
To activate the feature, press the button and enter the trunk access code
and the member number.
Call Traffic report
This report provides hourly port usage data and counts the number of calls
originated by each port. By tracking normal traffic patterns, you can respond
quickly if an unusually high volume of calls begins to appear, especially after
business hours or during weekends, which might indicate hacker activity.
For Communication Manager, MultiVantage™ Software, DEFINITY ECS,
DEFINITY G1, G3, and System 75, traffic data reports are maintained for the last
hour and the peak hour. For G2 and System 85, traffic data is available via
Monitor I which can store the data and analyze it over specified periods.
Trunk Group report
This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic
is fairly predictable, you can easily establish, over time, what is normal usage for
each trunk group. Use this report to watch for abnormal traffic patterns, such as
unusually high off-hour loading.
Traffic reports
Both the AUDIX Voice Mail System and the AUDIX Voice Power System track
traffic data over various timespans. Reviewing these reports on a regular basis
helps to establish traffic trends. If increased activity or unusual usage patterns
occur, they can be investigated immediately. Beginning with AUDIX Voice Mail
System R1V2, the AUDIX Data Acquisition Package (ADAP) uses a PC to provide
extended storage and analysis capabilities for the traffic data.
Call detail recording
For AUDIX Voice Mail System R1V5 and later, this optional feature provides a
detailed view of the activity associated with each voice mail session, outgoing
calls, and system-wide activity.