Avaya INTUITY AUDIX LX
Home Getting StartedAdministrationMaintenanceReference

Search This CD

Index

Contact Us

 

 

 

  
Home > Getting Started > Concepts and Features > Enhanced List Application > ELA Security Considerations

ELA Security Considerations

When you are securing a system that allows access from another domain, you must consider both internal and external security.

External Security

External security involves administration to prevent access from an unauthorized source. These sources can include a subscriber who is administered to use email or remote AMIS analog networking. Users might send "mail bombs" to an enhanced-list. Mail bombs are harassing messages that not only do not serve your business needs, but also impose unnecessary traffic on your system.

ELA mailboxes are no more vulnerable to unauthorized use than are any other voice mailboxes. However, the impact on system performance can be many times greater.

To prevent unauthorized access to an ELA mailbox from an external source such as email users or remote AMIS Analog networking users, you can place those subscribers in a community with sending restrictions.

Internal Security

Internal security focuses on preventing or recovering from damage if a breach occurs, for example, if a virus is transmitted in a message component such as an attached software file.

INTUITY AUDIX allows for the transmission of two message components, text (originating from Message Manager or email) and binary file attachments (software files, such as a spreadsheet or word-processing file). With these components come related security considerations, namely, the inadvertent delivery of a computer virus that could be embedded in a file attachment. This problem can occur in any system that supports the delivery of software files. While the AUDIX machine cannot be infected with viruses embedded in these software files, client machines can become infected when a user launches the application associated with the software file.


 


ELA does not perform any virus detection. The customer needs to evaluate the security risks of file attachments carefully and make provisions for virus detection software on PCs running Message Manager or an email application supported by INTUITY AUDIX.

At a minimum, advise your users to detach (that is, not launch) file attachments and scan them for viruses before use.

Top of page

  Search This CD     Index     Contact Us
� 2002-2007 Avaya Inc. All rights reserved.