User`s guide

Contents xi
Standard 1.0 System Administration Guide January 1998
Section K: Monitoring access to Meridian Mail
mailboxes and features 6-149
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-150
Hacker Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-151
Mailbox Login Monitoring . . . . . . . . . . . . . . . . . . . . . . . . 6-152
Thru-Dial Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-154
CLID Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-157
The Services Summary Traffic report. . . . . . . . . . . . . . . . 6-160
Section L: Equipment security 6-161
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-162
Switchroom access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-163
Administration terminals. . . . . . . . . . . . . . . . . . . . . . . . . . 6-164
Meridian Mail and switch printouts . . . . . . . . . . . . . . . . . 6-165
7 User administration—an overview 7-1
Section A: Introduction to User Administration 7-3
The User Administration menu. . . . . . . . . . . . . . . . . . . . . . . 7-4
Types of users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Distribution lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Limitations and guidelines . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Support for multiple appearance DNs. . . . . . . . . . . . . . . . . 7-12
Section B: New user planning 7-15
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Class of service planning. . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
Distributing local voice users evenly over volumes . . . . . . 7-19
Guidelines for adding users to a system that has
disk shadowing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Guidelines for adding a large number of users . . . . . . . . . . 7-22
How user models in pre-Release 9 systems are
converted to classes of service . . . . . . . . . . . . . . . . . . . . . . 7-23
8 Local voice users 8-1
Section A: Adding local voice users 8-3
Integrated mailbox administration . . . . . . . . . . . . . . . . . . . . 8-4
Before you begin adding local voice users . . . . . . . . . . . . . . 8-5
Adding a local voice user . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6