User`s guide

6-154 Setting up Meridian Mail security
Thru-Dial Monitoring
Standard 1.0 System Administration Guide January 1998
Thru-Dial Monitoring
Introduction
Possible hacker activity may be detected by monitoring selected
or all Thru-Dial services used either during the system access
monitoring period or at all times.
How to do it
Use the Voice Security Options screen and the Thru-Dial
Definition screen to set up Thru-Dial Monitoring.
Note:
The monitoring period is determined by the values
entered in the System Access Monitoring Period from (hh:mm)
field on the Voice Security Options screen.
Field descriptions
You will find descriptions of the Voice Security Options fields
on page 6-125. For descriptions of the fields in the Thru-Dial
Definition screen, see Chapter 26, “Class of Service
administration”.
IF you want to
monitor
THEN in the Voice
Security Options
screen
AND in the
Thru-Dial Definition
screen
all Thru-Dials set the Monitor all
Thru-Dials during
Monitoring Period
field to Yes or
Always_Monitor
no action is required.
specified Thru-
Dials
set the Monitor all
Thru-Dials during
Monitoring Period
field to No
for the desired
service, set the
Monitor this Service
during Monitoring
Period field to Yes.