Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY System Little Instructions Manual

Lucent Technologies DEFINITY System Little Instructions Manual

Here you can view all the pages of manual Lucent Technologies DEFINITY System Little Instructions Manual. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 91

DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Enhancing system security 
75 Assigning and changing users 
Changing passwords
You should change your passwords often.
Tip:
To force users to change passwords, set password aging in the 
Login Administration screen.
To change the password (b3stm0m) for angi3:
1. Type
 change password angi3 and press RETURN.
The Password Administration screen appears.
2. Complete the following fields:
nPassword of Login...

Page 92

Enhancing system security 
76 Preventing toll fraud 
DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Changing logins
Occasionally you’ll need to change permissions for a user’s login. 
For example, you may want to change a login so that the user 
must change their password every 30 days (a good rule of 
thumb).
To change the password aging for our new login, angi3:
1. Type 
change login angi3 and press RETURN.
The Login Administration screen appears...

Page 93

DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Enhancing system security 
77 Preventing toll fraud 
Top 11 tips to help prevent toll fraud
You can reduce your company’s risk of toll fraud by following a 
few important guidelines.
1. Protect system administration from unauthorized access.
Make sure all system administration and maintenance 
logins are secure. Change your passwords frequently.
2. Deny unauthorized remote access.
If you do not use remote...

Page 94

Enhancing system security 
78 Preventing toll fraud 
DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
6. Use system software to intelligently control call routing.
Set up your system to control how each call is handled or 
routed. If possible, use time-of-day routing to limit the use 
of your system during off hours.
7. Place protection on systems that ask callers to dial digits.
Restrict certain users’ access to dial tone. Restrict the digit...

Page 95

DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Enhancing system security 
79 Using reports to detect problems 
Using reports to detect problems
Call Detail Recording
Call Detail Recording (CDR) collects detailed information about 
calls handled by your system. This CDR information can be sent 
directly to a printer or into call accounting software. You can use 
the printed CDR output or call accounting reports to monitor calls 
on your system and look...

Page 96

Enhancing system security 
80 Using reports to detect problems 
DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
If your organization uses call accounting software to analyze your 
CDR output, you probably receive formatted reports that list the 
information you need to detect possible toll fraud. If you have 
questions about reading your call accounting reports, refer to your 
call accounting software manuals.
Security Violations Notification
You can...

Page 97

DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Enhancing system security 
81 Using reports to detect problems 
To set up Security Violations Notification for our example:
1. Type 
change system-parameters security and press 
RETURN.
The Security-Related System Parameters screen appears.
Security-Related System Parameters screen
2. In the SVN Authorization Code Violation Notification 
Enabled field, type 
y and press RETU RN.
Additional fields now...

Page 98

Enhancing system security 
82 Using reports to detect problems 
DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
6. Enter 3 in the Authorization Code Threshold field. 
Enter the maximum number of invalid entry attempts you 
want to allow.
7. Enter 
0:01 (1 minute) in the Time Interval field.
Use an hour:minute format for the amount of time you 
want the system to use for the monitor interval.
8. Press 
EN TER to save your changes.
Viewing security...

Page 99

DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000
Enhancing system security 
83 Using reports to detect problems 
Printing security reports
You may want to keep a paper copy of a Security Violations 
report to monitor security trends for a specific time period.
To print a Security Violations Summary report to the slave printer 
associated with the administration terminal:
1. Type 
list measurements security-violations summary 
print
 and press RETURN.
To...

Page 100

Enhancing system security 
84 Using reports to detect problems 
DEFINITY System’s Little Instruction Book
for basic administration  555-233-756  Issue 1
April 2000 
Start reading Lucent Technologies DEFINITY System Little Instructions Manual

Related Manuals for Lucent Technologies DEFINITY System Little Instructions Manual

All Lucent Technologies manuals