Better Music Builder VM-82U G3 Instruction Manual Page 246

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 245
Voice messaging systems
7-44 Issue 9 May 2003
Do not create voice mailboxes before they are needed.
Avoid or closely monitor the use of “guest” mailboxes (mailboxes without a
physical extension that are loaned to outsiders for the duration of a
project). If you need a guest mailbox, assign it when it is needed and
deactivate or change its password immediately after it is no longer needed.
Do not reassign a guest mailbox without changing the password.
Restrict outcalling
Outcalling uses the voice messaging ports. If mailbox security is broken,
unauthorized persons can use outcalling to transfer messages at your expense. If
you need outcalling, restrict it as far as possible to eliminate the possibilities for
theft of services.
Do not enable outcalling at all if you do not need it. Do not enable outcalling
for any subscribers who do not need it.
If outcalling is used only to ring in-house telephones that do not have
message waiting lights, restrict the number of digits to the maximum length
of extension.
If possible, restrict outcalling to the local area (7 digits), or North American
(10 digits).
If outcalling must be done to pagers, use pagers that have individual DID
numbers so that pager identification digits are not required and restrict any
additional digits for call identification to the minimum possible.
If a limited number of pagers are in use, consider putting the pager
numbers on all unrestricted calling list so that outcalling can be effectively
limited to only those numbers.
Detecting toll fraud
With SMDR activated for incoming calls, you can check the calls into your voice
mail ports. A series of short holding times may indicate repeated attempts to enter
voice mailbox passwords.
Review SMDR reports for the following symptoms of voice messaging abuse:
Short holding times on calls where voice messaging is the originating
endpoint or terminating endpoint
Calls to international locations not normal for your business
Calls to suspicious destinations
Numerous calls to the same number
Undefined account codes
NOTE:
The MERLIN LEGEND system only records the last extension on the call.
Internal toll abusers transfer unauthorized calls to another extension before
they disconnect so that the SMDR does not track the originating station. If
the transfer is to your voice messaging system, it could give a false
indication that your voice messaging system is the source of the toll fraud.
Page view 245
1 2 ... 241 242 243 244 245 246 247 248 249 250 251 ... 483 484

Comments to this Manuals

No comments