Every sight is different so you will need to do what suits the customer.

KSU/BCM:
-Disable DISA and/or change COS password to something more secure.
-Setup restriction filters and have them applied to voice mail ports/DN's (if all users are to be restricted from out dial)
-Setup restriction filters and have them applied to lines and/or setup COS passwords to bypass restrictions.
-Disable Allow Redirect option for all sets.
Restriction example- Restrict 0 for overseas, 1 for local long distance, 900 for billing.


Voice Mail
-NAM's and Call Pilot (Voice Messaging) run the Toll Fraud Patches, for BCM's make sure your upgraded to latest patches.
-Delete all unused mailboxes
-Have ALL users change mailbox passwords to 6 or 8 digit non-trivial passwords, including General Delivery and System manager mailboxes.
-Disable Outbound Transfer/Dial/Pool Access in admin programming (COS) for each mailbox.
-Disable the "enable external initialization" feature in COS
-Setup lockup mailbox after so many unsuccessful password attempts
-You could slow a hacker down by disabling the Return to AA option but this will effect checking messages remotely.

Carrier/Telco
-Have them restrict oversea calls if you don't call overseas and/or have them setup passwords.
They maybe also be able to restrict certain digits (filter).
You may not need the Telco involved if you did the above but the choice is there.


Who called over sea's
Usually voice mail is the culprit from an outside hacker but DISA and forwarded sets can be an issue as well.
You would need to setup an SMDR to see what ext. made the call or run reports from voice mail....see your vendor for more details.


=---()))))))))---=
www.curlycord.com
[Linked Image from telcopc.ca]
Toronto, Canada