User`s guide

6-160 Setting up Meridian Mail security
The Services Summary Traffic report
Standard 1.0 System Administration Guide January 1998
The Services Summary Traffic report
Introduction
This report provides statistics for each of the voice services
installed on your system. It records the number of times a user
dials a service (the number of accesses) during the reporting
period and the average length of each access. The report records
both direct and indirect accesses.
Direct accesses occur when a user dials the DN of the menu,
announcement, or fax item.
Indirect accesses occur when a service is accessed from another
service through a menu selection or a time-of-day controller.
For more information, see “Services Summary report” on
page 31-12.
Report availability
This report is available on all systems.
Report frequency
Run this report regularly to check for unusually long Thru-Dial
sessions or for unusual numbers of after-hours Thru-Dial
sessions. These may be a sign that hackers are present on your
system.
What to do
If you suspect hackers are accessing the Thru-Dial feature, first
check how the Thru-Dial service is set up to see whether the
Operational Measurements (OM) data are unusual. For
example, if executives call in and access a Thru-Dial service,
then you can expect an average number of calls. If this average
is exceeded, it may be an indication of hacker activity.
If your research still suggests the presence of hackers, review
the dialing restrictions for Thru-Dial. For details, refer to the
Voice Services Application Guide (NTP 555-7001-325).
If you are using an access password for Thru-Dial, change the
access password, and continue to monitor the Thru-Dial usage.