Installation Overview
Protecting Your System
Octel 50 Installation Guide
12-18
Security Checklist
It is recommended that the following checklist to be used to ensure that the security measures listed
below are implemented, as appropriate, on the messaging system.
_____1.
(Required) Store the messaging system PC in a secure area.
_____2.
(Required - Toll Fraud) Disable the Transfer Invalid Mailboxes During Hours and Transfer
Invalid Mailboxes After Hours parameters on the Invalid Mailbox tab in System Setup.
_____3.
(Recommended) When Quick Assist is run in recover mode from the Quick Assist icon in the
program folder, specify a Mailbox to Receive Unattached Messages on the Recover Files
dialog box.
_____4.
(Required) Set the Minimum Length of Password parameter on the Subscriber tab in System
Setup at least 1 digit higher than the number of digits system mailboxes.
_____5.
(Recommended) Activate the Enable Password Security parameter on the Subscriber tab in
System Setup to require subscribers to press <#> after they finish entering their passwords.
_____6.
(Recommended) Require that subscribers record their Name prompts so that the system
voices the mailbox owner’s name to callers sending messages to messaging system
mailboxes.
_____7.
(Required) Use at least 6-digit level 2 and level 3 supervisor passwords to prevent
unauthorized system manager access.
_____8.
(Recommended) Write down level 2 and level 3 passwords and keep them in a secure place.
_____9.
(Recommended) Notify the local service provider of any changes to level 2 or level 3
supervisor passwords in case remote maintenance is required.
_____10. (Required) Contact the system representative to determine what security features are
available for the phone system and how to implement them. Before implementing any security
features on the phone system, contact a technical support representative to ensure that the
features you want to implement will not disrupt messaging system performance in any way.
_____11. (Recommended) Logoff from the Octel 50 system when not using it to help prevent
unauthorized access to management features.
_____12. (Required) All remote access logins to the system must be administered to require the use of
a secondary password.
_____13. (Required) The end-user must periodically/frequently change all secondary passwords. After
changing the secondary passwords, the end-user should notify the appropriate support
organization(s) that the passwords have been changed.
_____14. (Required) The modem connection to the system should be “disabled” when it is not required
for use by authorized personnel. This connection should be enabled only by the system
administrator on an “as needed” basis.
Содержание Octel 50
Страница 2: ......
Страница 3: ...Octel 50 Installation Guide 585 313 134 Comcode 108503004 101 1840 000 Issue 1 June 1999 ...
Страница 8: ......
Страница 22: ...Determining System Needs Step 3 Consider Additional Hardware Needs OCTEL 50 INSTALLATION GUIDE 2 6 Notes ...
Страница 36: ...Installing the Hardware Step 10 Installing the Sentinel Octel 50 Installation Guide 3 14 Notes ...
Страница 52: ...Running the SMDI Utility Running SMDI as a Standalone Utility Octel 50 Installation Guide 5 4 Notes ...
Страница 180: ...Integrating with an Uninterruptible Power Supply Running UPS Integration Octel 50 Installation Guide 10 4 Notes ...