Installation Overview
Protecting Your System
Octel 50 Installation Guide
12-16
the subscriber to press <#> or allows immediate mailbox access after successful
password entry.
This parameter helps prevent unauthorized users from determining the number of digits in
system mailbox passwords.
It is recommended that this feature be enabled. For additional information on using this
parameter, see Chapter 8, “Setting Up the System.”
Having Subscribers Record Their Name Prompts
When subscribers record their Name prompts, those prompts are voiced as confirmation
to callers sending messages to system mailboxes. This ensures that messages will be
sent to the correct mailboxes. If a Name prompt is not recorded for a subscriber mailbox,
only the mailbox number is voiced to callers sending messages to that mailbox.
Deleting Unused Mailboxes Immediately
If a mailbox is no longer being used, it is recommended that you immediately delete that
mailbox from the system. This prevents anyone from gaining unauthorized system access
through the mailbox. If a mailbox is being reassigned to a new mailbox owner, it is
strongly recommended that you delete, then re-create the mailbox.
For additional information on deleting system mailboxes, see the topic, "Delete a
Mailbox," in Chapter 3, “
The Mailbox Menu
,” in the
Supervisor’s Guide
.
Securing the System PC
It is very important the system PC be protected from unauthorized system management
access. Unauthorized access to the system PC could result in system setup changes,
loss of mailboxes and messages, and database corruption. The best way to prevent
unauthorized system management access to the system PC is to store the PC in a secure
area, such as a locked room.
If you cannot store the system PC in a secure area, consider using security features of
the PC, such as passwords, to provide a degree of protection. See the PC documentation
for information on available security features.
Before implementing security features on the PC, contact a technical support
representative to review the security features you intend to use to ensure they will not
disrupt system performance in any way.
Utilizing Phone System Security Features
Most phone systems have security features that help prevent unauthorized access to
system ports. Contact your phone system representative to determine what security
features are available and how to implement them.
Before implementing security features on the phone system, contact a technical support
representative to review the security features you intend to use to ensure they will not
disrupt system performance in any way.