
Feature Reference
Malicious Call Trace
1604
Administrator’s Guide for Avaya Communication Manager
November 2003
•
Conference
A user can use conferencing to place a malicious caller on hold. The user can initiate conferencing
and enter the MCT-Activate FAC, then stop conferencing and return to the malicious caller’s
appearance.
MCT-Activate can be generated for a member of a conference and is not affected by the number
of parties on the conference.
•
Centralized Attendant Service
MCT-Activate, MCT-Control, and MCT-Deactivate must be performed by telephones within the
same PBX.
•
Distributed Communications System (DCS)
If a telephone in a DCS network is involved in a malicious call, the extension is recorded and
displayed with the MCT information. MCT notification passes over ISDN-PRI DCS trunks but
MCT-Activate, MCT-Control, and MCT-Deactivate must be performed by telephones within the
same DCS node.
•
Emergency Access to the Attendant
Ordinarily, during MCT-Control no other feature can access the controlling telephone’s display.
However, MCT gives up control of the display until the Emergency Access call has completed.
•
ISDN
ISDN notification of an MCT activation takes place if either the originator of the call is an ISDN
trunk group with Country Protocol 2 or any trunk on the call is an ISDN private network trunk
with Country Protocol 1 and Protocol Version “a” or Peer Protocol q-sig. When the ISDN trunk
group is Country Protocol 2, notification is sent only to the public network.
•
Make-Busy/Position-Busy/Send All Calls
Communication Manager attempts to activate Make-Busy or Position-Busy for phones or
consoles that activate MCT-Control. If a user has a SAC button administered but not active for the
primary extension on the phone, SAC activates when the user activates MCT-Control. When the
user deactivates MCT, SAC stays active until it is deactivated by the user.
•
Music-On-Hold
If an agent places a malicious call on hold that is being recorded and the call goes to
music-on-hold, the music-on-hold port and the MCT Voice Recorder port can lock. In this case,
the MCT Voice Recorder continues to record the music-on-hold and is unavailable for recording
subsequent malicious calls. You must perform a busy-out/release on the MCT Voice Recorder
port to drop the connection.
•
Priority Calling
A priority call to an MCT recipient is denied.
•
QSIG Global Networking
MCT notification passes over the following ISDN QSIG trunk groups: tandem, tie, access, and
DMI-BOS. QSIG supplementary services name and number ID provide a malicious caller’s name
and telephone number.
•
Transfer
If a user transfers a malicious call, the MCT information displayed on the controlling telephone
identifies the transferring party as the MCT recipient.
A user transfers a malicious caller to hold. The user initiates a Transfer, receives the second dial
tone, enters the MCT-Activate FAC, then halts the remainder of the Transfer operation and returns
to the malicious caller’s appearance.