7. The Alarm Filter (Toll Fraud Detection)
The Alarm Filter allows the PollCat III to monitor call records, and check for characteristics
that may indicate Toll Fraud or other forms of phone abuse. When suspect calls are detected,
PollCat III can then provide user notification by contacting your local PC, or calling your
modem or pager.
Up to three Pager I.D. numbers can be defined, allowing the user to link a specific
alphanumeric pager to a specific type of suspect call. When a Toll Fraud Alarm is generated,
PollCat III call any or all of the defined pager I.D. numbers, depending on the nature of the
suspect call record.
The Alarm Filter has priority over the Data Filter. Even if a call record is rejected by the Data
Filter, it will still be flagged and stored if it matches the parameters of any of the user-defined
Alarm Clues. The Alarm Filter can also be used as a second Data Filter, allowing separate
storage and retrieval of data regarding specific area codes, phone numbers and etc..
7.1. The Alarm Filter Format
Each record consists of a line of text with specific data items in assigned locations or "fields".
In order to enable PollCat III to check the appropriate field(s) of each record, you must first
determine the structure of the record format produced by the PBX. Once the PBX record
format is established, you must then describe the format to PollCat III and assign variables to
the fields you wish to monitor.
When defining the Alarm Filter Format, particular attention must be paid to recognize the exact
format used by the PBX. For example, if the PBX call record shows the time as "09:00", then
the Alarm Filter Format must account for all five digits, including the colon that separates
hours and minutes.
7.1.1. Common Types of Suspect Phone Activity
The first step in the detection of Toll Fraud, is to determine what type of calls you wish to
monitor. The following types of calls may provide an indication of potential Toll Fraud:
·Repeated unsuccessful attempts to access voice mail
·After-hours long distance calls
·After-hours calls to your 800 number
·Lengthy international calls
·Calls to countries where the company doesn't normally conduct business
You may also wish to program PollCat III to monitor other types of calls that can indicate
internal abuse of phone access. Examples of these types of calls are as follows:
·Calls to your competitor's phone number
·Extensions with exceptionally high call activity
·Calls to "900" numbers
All of these call types will have certain characteristics, or a "fingerprint", that can be easily
recognized when PollCat III examines PBX call records.
Terms of Use | Privacy Policy | DMCA Policy
2006-2020 Rsmanuals.com