Home > Amanda > Answering Machine > Amanda Work Group Administration Guide

Amanda Work Group Administration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Amanda Work Group Administration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 32 Amanda manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Administering
    Am
    [email protected]/
    Windows
    Version 3.xx
    Administ rato r’s Guide : 7/01  Edition 
    						
    							ii Administering [email protected]/Windows
    Copyright and Trademark Notices
    Copyright  1998–2001 The Amanda Company. All Rights Reserved. This guide and the 
    software described herein are copyrighted with all rights reserved. No part of this 
    publication may be reproduced, transmitted, stored in a retrieval system, or translated into 
    any language in any form by any means without the prior written permission of The 
    Amanda Company.
    Amanda and Amanda@ are registered trademarks and sales trademarks of The Amanda 
    Company. Other brand names and product names are trademarks or registered trademarks 
    of their respective owners.
    Limited Warranty on Software
    The Amanda Company warrants the media on which the software is recorded to be free 
    from defects in materials and faulty workmanship for a period of 90 days from the date the 
    software is delivered. If a defect in the media should occur during this period, you may 
    return the media to The Amanda Company and The Amanda Company will replace the 
    media without charge.
    THE AMANDA COMPANY MAKES NO WARRANTIES (OTHER THAN THOSE 
    SET FORTH ABOVE) TO ANY PERSON OR ENTITY WITH RESPECT TO THE 
    PRODUCT OR ANY DERIVATIVES THEREOF OR ANY SERVICES OR LICENSES 
    AND DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING WITHOUT 
    LIMITATION WARRANTIES OF MERCHANTABILITY, PERFORMANCE, 
    NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE. THE 
    AMANDA COMPANY WILL NOT BE LIABLE FOR ANY BUG, ERROR, 
    OMISSION, DEFECT, DEFICIENCY, OR NONCONFORMITY IN ANY SOFTWARE. 
    THE SOFTWARE IS LICENSED “AS IS,” AND THE PURCHASER ASSUMES THE 
    ENTIRE RISK AS TO ITS QUALITY AND PERFORMANCE.
    IN NO EVENT AND NOTWITHSTANDING ANY DOCUMENT, REPRESENTATION, 
    OR OTHERWISE, SHALL THE AMANDA COMPANY BE LIABLE TO YOU FOR 
    DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONTINGENT, OR 
    CONSEQUENTIAL DAMAGES, INCLUDING DAMAGES FROM LOSS OR 
    CORRUPTION OF DATA, INTERRUPTED USE, LOST PROFITS, COST OF 
    PROCURING SUBSTITUTE GOODS, TECHNOLOGY OR SERVICES, EVEN IF THE 
    AMANDA COMPANY OR AN AUTHORIZED AMANDA COMPANY DEALER HAS 
    BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT 
    THE AMANDA COMPANY’S LIABILITY ARISING OUT OF CONTRACT, 
    NEGLIGENCE, STRICT LIABILITY, WARRANTY, OR OTHER LEGAL OR 
    EQUITABLE THEORY SHALL NOT EXCEED ANY AMOUNTS PAID BY YOU FOR 
    THIS PRODUCT. Any written or oral information or advice given by Amanda Company 
    dealers, distributors, agents, or employees will in no way increase the scope of this 
    warranty, nor may you rely on such oral or written communication. Some states do not 
    allow the exclusion or limitation of implied warranties or liability for incidental or 
    consequential damages, so the above limitation or exclusion may not apply to you. This 
    warranty gives you specific legal rights, and you may also have other rights which vary 
    from state to state. This Agreement shall be governed by the laws of the State of California 
    without regard to the conflicts of laws or provisions thereof. 
    						
    							iii
    Fraudulent Usage Advisory
    Although the Amanda software is designed to resist fraudulent usage, including 
    unauthorized access to a long distance network, no product, including the Amanda 
    software, is able to prevent such unauthorized usage. The Amanda software is likewise 
    unable to prevent such uses as may constitute an invasion of privacy or other tort. THE 
    AMANDA COMPANY MAKES NO EXPRESS OR IMPLIED WARRANTY AGAINST 
    UNLAWFUL OR UNAUTHORIZED USE OF YOUR AMANDA SYSTEM OR ITS 
    CAPABILITIES AND HEREBY DISCLAIMS ALL LIABILITY ARISING FROM 
    SUCH USE. YOU AGREE TO INDEMNIFY, DEFEND, AND HOLD THE AMANDA 
    COMPANY HARMLESS FOR ANY UNAUTHORIZED OR FRAUDULENT USE OF 
    YOUR LICENSED AMANDA SOFTWARE.
    THE AMANDA COMPANY
    13765 ALTON PARKWAY, UNIT F
    IRVINE, CA  92618
    TELEPHONE (949) 859–6279  FAX (949) 859–4380
    Conventions
    This manual uses the following terminology and conventions:
    AmandaThe name by which this manual refers to 
    the [email protected]/Windows 
    system to make reading about the system 
    easier.
    callerSomeone who calls into Amanda. A call-
    er often obtains information, leaves a 
    message for someone, and/or provides 
    information.
    userSomeone with an extension that Amanda 
    transfers calls to and/or stores messages 
    for. A user can access Amanda to play, 
    delete, and send messages as well as set 
    personal options such as Do Not Disturb.
    fixed-space typeThis guide displays information that you 
    must type and messages from Amanda in 
    fixed-space type. 
    						
    							Contents
    Copyright and Trademark Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
    Limited Warranty on Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
    Fraudulent Usage Advisory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  iii
    Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  iii
    Chapter 1:
    Introducing Amanda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    What Amanda Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    How to Monitor and Adjust Amanda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
    How Amanda Operates  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
    A Mailbox for Each User  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
    Mailboxes that Control Call Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
    Mailboxes that Provide Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
    The Power of Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
    Processing Calls and Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
    Processing a Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
    Processing a Mailbox  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
    Customer Service and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
    End User Support  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
    System Administration Support  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
    Installation Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
    Application Support  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
    Chapter 2:
    Getting Started  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
    Starting Amanda. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
    Locking Amanda’s Computer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
    Specifying a Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
    Chapter 3:
    Monitoring Amanda  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
    Using Amanda Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
    Logging Back On  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
    System and Port Information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
    System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
    Port Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
    Using the Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
    Using the Toolbar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
    Resetting Ports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
    Tracing Port Activity  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
    Displaying a List of Mailboxes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
    Resetting the Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
    Copying Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 
    						
    							vi Administering [email protected]/Windows
    Chapter 4:
    Recording the Greetings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
    Calling Amanda  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
    Recording the Company Greeting  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
    Sample Greetings for Mailbox 990 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
    Sample Scheduling Records for Mailbox 990. . . . . . . . . . . . . . . . . . . . . . . . . . . 27
    Recording Caller Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
    Sample Instructions for Mailbox 991  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
    Sample Scheduling Records for Mailbox 991. . . . . . . . . . . . . . . . . . . . . . . . . . . 30
    Recording Employee Directory Instructions  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
    Chapter 5:
    Setting Up Mailboxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
    Using the Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
    Using the Toolbar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
    Logging Back On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
    Using a Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
    Asking the User for Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
    Personal Mailboxes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
    Creating a Personal Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
    Creating a Personal Mailbox for Someone Without a Telephone. . . . . . . . . . . . 42
    Informational Mailboxes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
    Creating an Informational Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
    Creating a Range of Mailboxes from an Existing Mailbox . . . . . . . . . . . . . . . . . . . . 44
    Modifying an Existing Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
    Moving from One Mailbox to Another  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
    Deleting an Existing Mailbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
    Finding Mailboxes that Match Certain Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
    Naming Groups and Greetings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
    Mailbox Field Reference  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
    Mailbox Statistics Reference  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
    Chapter 6:
    Notifying Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
    Selecting Ports for Notification  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
    Planning Your Notification Records  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
    Managing Notification Records and Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
    Creating a Notification Record and a Notification Template. . . . . . . . . . . . . . . . . . . 54
    Creating a Notification Record from an Existing Template. . . . . . . . . . . . . . . . . . . . 58
    Modifying Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
    Disabling a Notification Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
    Changing Notification Telephone Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
    Changing the Notification Variable by Telephone . . . . . . . . . . . . . . . . . . . . . . . 61
    Examples of Notification Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
    Controlling a Message Light . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
    Using %U and %V instead of %E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
    Using Voice Notification  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
    Calling a Pager  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
    Relaying Information to a Pager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
    Calling Home  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
    Emergency Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 
    						
    							vii
    Chapter 7:
    Automatic Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
    Managing Automatic Call-processing Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
    Creating Scheduling Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
    Modifying Scheduling Records  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
    Disabling a Scheduling Record  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
    Example: Changing User’s Greetings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
    Chapter 8:
    Generating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
    Example Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
    Managing Reports and Report Templates  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
    Creating Reports and Report Templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
    Creating Reports from Templates  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
    Printing Reports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
    Saving Reports as Files  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
    Chapter 9:
    Using the Administrator Mailbox  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
    Administering Amanda by Telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
    Managing System Announcements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
    Changing the Busy Hold Music  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
    Locking and Unlocking Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
    Resetting Mailboxes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
    Listening to System Status  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
    Creating System-wide Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
    Setting Up the Administrator Mailbox from the Computer . . . . . . . . . . . . . . . . . . . . 87
    Chapter 10:
    Using Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
    Overview  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
    Backing Up and Restoring Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
    Deleting Mailboxes and Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
    Deleting Mailboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
    Deleting Personal Mailing Lists  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
    Displaying Message Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
    Validating Notification Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
    Managing Text Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
    Searching Text Files  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
    Editing a Text File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
    Examples  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
    JOVE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
    Displaying Text Files (20 Lines at a Time). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
    Displaying the Last n Lines of Text Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
    Appendix A:
    Setup Sheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
    Company Greeting Example  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
    Caller Instructions Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
    Mailbox with Greetings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
    Mailbox with Menu  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
    General Mailbox Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
    Mailbox Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 
    						
    							viii Administering [email protected]/Windows
    Appendix B:
    Running Amanda from DOS  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
    Starting Amanda from DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
    Using Command-line Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
    Shutting Amanda Down in DOS  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
    Appendix C:
    Glossary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 
    						
    							Chapter 1:
    Introducing Amanda
    What Amanda Does
    [email protected]/Windows is an automated attendant and voice processing system 
    designed especially for ease of use and flexibility. As a PC-based product, Amanda takes 
    advantage of the technical innovations in the personal computer market. In addition, 
    Amanda’s standard hardware components can be repaired or replaced by any PC service 
    company. The computer on which Amanda is installed must be used only for Amanda.
    Depending on what lines from your PBX are connected to Amanda and when calls are 
    sent to Amanda to be processed, Amanda can serve you or your customer in a variety of 
    ways.
    Configured as a primary attendant: Amanda answers all your incoming calls on the 
    lines you designate and allows the callers to direct their calls to a specific person or 
    department without being placed on indefinite hold. If a specific person is unavailable, 
    Amanda can take a private message for that person without missing any details. 
    In this case, the telephone switching system sends all incoming calls to Amanda.
    Configured as a secondary attendant: Amanda assists your regular operator when call 
    volume is heavy, allowing callers to direct their own calls or hold for the operator. Some 
    companies provide specific incoming lines for Amanda as a backdoor attendant for calls 
    from vendors, family members, friends, and special clients who prefer to have Amanda 
    process their calls.
    In this case, the telephone switching system sends incoming calls to Amanda only when 
    the regular operator’s extension is busy or not answered.
    Configured as an off-duty attendant: Amanda provides 24-hour access to your company 
    and its employees when an operator is unavailable.
    In this case, the telephone switching system sends all incoming calls to Amanda while the 
    office is closed.
    Configured as a voice messaging center: Amanda takes messages and allows users to 
    send, store, and forward messages, increasing productivity and enhancing inter-office 
    communication.
    In this case, the telephone switching system transfers any incoming call to Amanda if the 
    extension being called is busy or not answering. 
    						
    							2 Administering [email protected]/Windows
    Configured as an information system: Amanda provides answers to your callers’ most 
    frequently asked questions (so you can avoid costly interruptions and provide a higher 
    level of customer service 24 hours a day). Information such as your address, available 
    hours, directions to your offices, and so forth, might be better handled by Amanda. 
    Amanda’s serial ports can access databases and other information stored in other 
    computers, allowing Amanda to give callers information on account balances, train 
    schedules, and so forth.
    In this case, the telephone switching system or even an operator can send incoming calls to 
    Amanda. Then automatically, or if selected, Amanda plays out the requested information.
    How to Monitor and Adjust Amanda
    Because [email protected]/Windows is a voice server, you can monitor it and adjust 
    how it processes users’ calls from your own workstation using the client software. You 
    also use the Setup utility on the server to set configuration parameters.
    [email protected]/Windows comes with the five client connections. That means, for 
    example, that five users can be using Amanda Messenger. Or, if you are running Amanda 
    Administrator and Amanda Monitor, only three users can run Amanda Messenger.
    To allow other users to access Amanda via their workstations (in addition to their 
    telephones), you must purchase additional connections.
    The Amanda Company gives you an activation key for the number of connections you 
    have purchased.
    The computer running Amanda must have a LAN adapter.
    Amanda’s Windows 3.11 client applications also run on Windows 95, Windows 98, and 
    Window NT. Amanda Unified Messenger and Amanda Call Control cannot run in the 
    Windows 3.11 environment. They are 32-bit applications.
    Amanda Administrator Windows 3.11 application. Allows you to control how 
    Amanda processes calls and to create reports.
    Amanda Monitor Allows you to observe what ports are active and so on.
    The others allow you to process messages, place calls, and 
    manage your personal mailbox:
    Amanda Messenger Allows users to access their messages and manage calls 
    from their workstations as well as by telephone. 
    Amanda Unified Messenger Allows users to access their voice mail messages from 
    their Microsoft e-mail application. This is a 32-bit client.
    Amanda Dialer Dials telephone numbers that appear in Microsoft Word 
    for Windows, Microsoft Excel, and other Windows 
    applications.  
    						
    All Amanda manuals Comments (0)

    Related Manuals for Amanda Work Group Administration Guide