User`s guide

Navigating through system administration 2-11
Voice administration
Standard 1.0 System Administration Guide January 1998
Defining voice
security options
Defining voice security options is extremely important in order
to safeguard your system from unauthorized use and abuse by
hackers and users. You can do the following to secure your
Meridian Mail system:
Make mailbox passwords more secure by
- defining the password prefix
- specifying the minimum password length
- forcing users to change their passwords the first time
they log on
- suppressing the display of passwords on the telset
Specify the maximum number of invalid logon attempts
that are allowed before a mailbox is disabled or a session is
terminated.
Set up monitoring periods for
- system accesses
- thru-dials
- specific internal or external calling line IDs (CLIDs), or
both
Defining restriction/
permission lists
Restriction/permission lists are another very important part of
ensuring system security. A restriction/permission list specifies
which dialing codes are not allowed, thereby preventing users
or callers from placing calls to unauthorized numbers such as
domestic long distance numbers or international numbers.
You can define up to 80 different restriction/permission lists
that can then be applied to different features that place outcalls
such as call sender, Thru-Dial, Remote Notification, and AMIS
networking.