![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/e/4a/e4a7c140-dfba-41b7-a697-ec454e670e70/e4a7c140-dfba-41b7-a697-ec454e670e70-bg6.png)
Contents
Issue 2.0 December 1995 ix
■ Entering the Business Schedules 6-4
■ Entering the Holiday Schedules 6-6
■ Entering the Routing Table 6-8
■ Other Administration 6-10
A System Security and Toll Fraud A-1
■ Protecting Your System A-1
Switch Security A-2
Security Tips A-2
Voice Messaging System Security A-3
Security Tips A-3
Automated Attendant System Security A-4
Security Tips A-5
■ Subscriber Password Guidelines A-5
■ Switch Administration A-6
Restrict Outward Dialing A-6
Restrict Toll Areas A-6
Create Disallowed Number Lists A-6
Create Allowed Number Lists A-6
Restrict AMIS Networking Number Ranges A-7
■ Intuity AUDIX Administration A-7
Outcalling A-7
Mailbox Administration A-8
Basic Call Transfer A-8
■ Detecting Toll Fraud A-9
Call Detail Recording A-9
Intuity AUDIX Traffic Reports A-10
■ AT&T’s Statement of Direction A-10
AT&T Security Offerings A-11
AT&T Toll Fraud Crisis Intervention A-12
AT&T Corporate Security A-12