User`s guide

Chapter 6
Setting up Meridian Mail
security
In this chapter
Overview 6-2
Section A: Telecommunication criminals and the problems
they pose
6-3
Section B: Using Basic Access Restrictions features 6-9
Section C: Features that modify access restrictions 6-21
Section D: Controlling remote access to calling privilege 6-39
Section E: Controlling access through Least Cost Routing
(BARS/NARS)
6-47
Section F: Controlling access to PBX administration programs 6-73
Section G: Controlling Direct Inward System Access 6-83
Section H: Restriction/Permission lists 6-89
Section I: Controlling access to Meridian Mail services and
features
6-103
Section J: Controlling access to Meridian Mail mailboxes 6-123
Section K: Monitoring access to Meridian Mail mailboxes and
features
6-149
Section L: Equipment security 6-161