Mitel Forums - The Unofficial Source

Mitel Forums => Mitel SX200, SX2000, and older SX platforms => Topic started by: Suavie on August 06, 2019, 09:12:25 AM

Title: SX200 Embedded Voicemail Hacked
Post by: Suavie on August 06, 2019, 09:12:25 AM
With hackers getting more and more aggressive. How are you locking down your systems to prevent this?
Title: Re: SX200 Embedded Voicemail Hacked
Post by: johnp on August 06, 2019, 06:43:57 PM
In a 200 environment, I would make sure the default passcodes are changed, you could also expand the passcode length
Title: Re: SX200 Embedded Voicemail Hacked
Post by: acejavelin on August 06, 2019, 07:24:24 PM
In a 200 environment, I would make sure the default passcodes are changed, you could also expand the passcode length
Passcode length a minimum of 6 digits.
Change Installer, Manager, and Admin level passcodes.
Make Mailbox 0 a Message Only mailbox (may take some finesse in some instances).
Change the COR to for all VM ports so they cannot dial out, or cannot dial long distance. (This may cause an issue with "press 2 to be connected to my cell phone" but losing this feature is a small price to pay for the few LD cell phone users who use it)

Mitel used to have a document on recommended changes, but these are the main ones. Oh, and make sure your ARS is setup correctly, and blocking known area codes and international access except for the few users who really need it.