Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY System Little Instructions Manual
Lucent Technologies DEFINITY System Little Instructions Manual
Here you can view all the pages of manual Lucent Technologies DEFINITY System Little Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 91
DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Enhancing system security 75 Assigning and changing users Changing passwords You should change your passwords often. Tip: To force users to change passwords, set password aging in the Login Administration screen. To change the password (b3stm0m) for angi3: 1. Type change password angi3 and press RETURN. The Password Administration screen appears. 2. Complete the following fields: nPassword of Login...
Page 92
Enhancing system security 76 Preventing toll fraud DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Changing logins Occasionally you’ll need to change permissions for a user’s login. For example, you may want to change a login so that the user must change their password every 30 days (a good rule of thumb). To change the password aging for our new login, angi3: 1. Type change login angi3 and press RETURN. The Login Administration screen appears...
Page 93
DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Enhancing system security 77 Preventing toll fraud Top 11 tips to help prevent toll fraud You can reduce your company’s risk of toll fraud by following a few important guidelines. 1. Protect system administration from unauthorized access. Make sure all system administration and maintenance logins are secure. Change your passwords frequently. 2. Deny unauthorized remote access. If you do not use remote...
Page 94
Enhancing system security 78 Preventing toll fraud DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 6. Use system software to intelligently control call routing. Set up your system to control how each call is handled or routed. If possible, use time-of-day routing to limit the use of your system during off hours. 7. Place protection on systems that ask callers to dial digits. Restrict certain users’ access to dial tone. Restrict the digit...
Page 95
DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Enhancing system security 79 Using reports to detect problems Using reports to detect problems Call Detail Recording Call Detail Recording (CDR) collects detailed information about calls handled by your system. This CDR information can be sent directly to a printer or into call accounting software. You can use the printed CDR output or call accounting reports to monitor calls on your system and look...
Page 96
Enhancing system security 80 Using reports to detect problems DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 If your organization uses call accounting software to analyze your CDR output, you probably receive formatted reports that list the information you need to detect possible toll fraud. If you have questions about reading your call accounting reports, refer to your call accounting software manuals. Security Violations Notification You can...
Page 97
DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Enhancing system security 81 Using reports to detect problems To set up Security Violations Notification for our example: 1. Type change system-parameters security and press RETURN. The Security-Related System Parameters screen appears. Security-Related System Parameters screen 2. In the SVN Authorization Code Violation Notification Enabled field, type y and press RETU RN. Additional fields now...
Page 98
Enhancing system security 82 Using reports to detect problems DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 6. Enter 3 in the Authorization Code Threshold field. Enter the maximum number of invalid entry attempts you want to allow. 7. Enter 0:01 (1 minute) in the Time Interval field. Use an hour:minute format for the amount of time you want the system to use for the monitor interval. 8. Press EN TER to save your changes. Viewing security...
Page 99
DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000 Enhancing system security 83 Using reports to detect problems Printing security reports You may want to keep a paper copy of a Security Violations report to monitor security trends for a specific time period. To print a Security Violations Summary report to the slave printer associated with the administration terminal: 1. Type list measurements security-violations summary print and press RETURN. To...
Page 100
Enhancing system security 84 Using reports to detect problems DEFINITY System’s Little Instruction Book for basic administration 555-233-756 Issue 1 April 2000