User`s guide

Setting up Meridian Mail security 6-157
CLID Monitoring
Standard 1.0 System Administration Guide January 1998
CLID Monitoring
Introduction
Possible hacker activity may be detected by monitoring mailbox
logins or thru-dials that have been attempted from a specified
calling line ID (CLID).
You can specify the type of CLID (Internal or External) and a
string of digits (up to 15) of a CLID. That is, you can specify the
complete CLID, the area code only, or the area code and office
code. Up to 12 CLIDs can be entered for each type of CLID
format. For more information on CLID, see Chapter 17,
“Dialing translations”.
How to do it
Use the Voice Security Options screen to set up CLID
Monitoring.
Monitoring a subset of
a CLID
If a subset of a CLID is to be monitored (an office code, for
instance), this string of digits will be compared only to the
beginning of the CLID and not with the number. Thus, if you
want to monitor the office code, you must also specify the area
code.
Remote notification of
mailbox logons
When this feature is combined with the SEER Trigger Message
feature, you can be notified through Remote Notification when
a suspected unauthorized user attempts to access Thru-Dial or
enters a particular mailbox.
IF you want to
monitor
THEN in the Voice
Security Options
screen
AND in the Voice
Security Options
screen
CLIDs set the Monitor
CLIDs during
Monitoring Period
field to Yes or
Always_Monitor
enter the numbers in
the CLIDs to
Monitor field.