User`s guide

6-124 Setting up Meridian Mail security
Overview
Standard 1.0 System Administration Guide January 1998
Overview
Introduction
Mailboxes are a potential source of unauthorized system use if
proper safeguards are not put in place.
The kind of damage a
hacker can do
The damage a hacker can do depends on what has been
accessed:
A personal mailbox without thru-dial capabilities
This causes minimal damage as the hacker has only gained
access to the personal mailbox. In this case, the hacker
would have access to all of the mailbox and message
commands and could record obscene greetings, listen to
messages, and so on.
A personal mailbox with thru-dial capabilities
This can cause significant damage to your PBX and
Meridian Mail system, especially if the hacker is able to
break in to the system.
The business or Meridian Mail system
This can cause significant damage to your PBX and
Meridian Mail system since this mailbox usually allows
users calling in access to the thru-dial feature.
Proactive mailbox
security measures
Meridian Mail provides four ways that you can control the level
of security for users’ mailboxes:
1. Use the password prefix and increase the minimum
password length to make passwords harder to guess.
2. Force users to change their passwords regularly.
3. Control the number of maximum invalid logon attempts.
4. Disable external logon to mailboxes (when the highest
level of security possible is required).