AT&T 555-601-010ADD 사용자 설명서

다운로드
페이지 136
Introduction
To enhance security for the outcalling feature, you can turn off outcalling on a per-
subscriber basis via the Subscriber Administration screen. You can also restrict the
number of digits that may be used for outcalling on a system-wide basis via the
Outcalling Administration screen. For more information, see the  AT&T AUDIX Voice
Power™/AT&T FAX Attendant System™ Planning and Implementation document
(Document No. 555-601-202).
If your AUDIX Voice Power system is intended to serve only a subset of the
telephone system users, the remaining users may be administered as AUDIX Voice
Power subscribers with restricted mailboxes, so that the possibility of making
transfers to these users is ensured. Restricted mailboxes can be set up by
allocating minimal mailbox space (for example, 1 minute) to each of these
subscribers. Other subscribers may address messages to these users, but the
limited mailbox size will prevent most messages from being delivered.
Protecting your AUDIX Voice Power and FAX Attendant systems is a vital and
important part of your responsibility as a System Manager. You should take every
precaution to protect your company’s assets from both internal and external security
breaches. AT&T does not warrant that these products will prevent (and AT&T will
not be responsible for) unauthorized use (or charges for such use) of common
carrier telecommunication services or facilities accessed through (or connected to)
AUDIX Voice Power or FAX Attendant. The customer is responsible for
administering AUDIX Voice Power and FAX Attendant to prevent such unauthorized
use. Therefore, it is necessary that the person to whom the customer assigns this
responsibility read all documents associated with AUDIX Voice Power and FAX
Attendant and understand all features that enable the administrator to reduce
exposure to unauthorized use.
Detecting Toll Fraud
Once you have instituted the appropriate security measures, monitor call traffic for
the following signals of possible hacker activity:
Employees cannot get outside lines.
Customers have difficulty getting through to your 800 number.
Usage is higher than normal.
Heavy call volume on nights and weekends.
Operators report frequent hangups.
Telephone bill shows calls made to unusual places.
1-9