The first column of the table lists the section and subsections of the
Security Administration Detail page. The second column provides links
to the procedures that describe how to use the corresponding sections
and subsections.
Section/subsection |
Related procedures |
General Passwords Maximum Invalid Logon Attempts |
Applying global restrictions and permissions for off-switch dialing |
CLIDs |
Monitoring internal and external telephone activity by calling line ID (CLID) |
Mailboxes Mailboxes |
|
SMTP/VPIM |
|
Appbuilder Application DNs to Monitor |