Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

Direct Audits

Direct audits are any audits done remotely (or via Serial), this approach is often used

These audits can be carried out by MIT directly over Internet, VPN or Dial up from our network or directly on a customer network if UCentric is installed within their environment.

Installing within the customer environment and carrying out an audit via a screen-share, remote session or RDP/VPN, this option is often used when customers do not allow for direct access to their PBX platform over the internet/IP, have no VPN access or other security restrictions are in place.

Direct audits are also applicable for systems that do not support auditing via backup or extract. #

This section only contains details of systems that support direct audits, for systems that support backup only or our full supported list of vendors please visit either of the below sections:

Vendor

Model

Audit Method(s)

Ports Used (IP Audits Only)

Required Details

Aastra/Mitel

MX-One/MD110

SSH, Modem

22

  • Modem/Dial-up details or IP Address

  • Engineer’s username/password

Alcatel

OmniPCX

SSH, Modem

22

  • Modem/Dial-up details or IP Address

  • Engineer’s username/password

ASC

Recorder

XML File import

-

Extract

Asterisk

FreePBX

SSH

22

  • IP Address

  • Engineer’s username/password

 

Avaya

 

CM, Definity

ASA and SSH

5022, 22

  • IP Address

  • Requires ASA login and optional SSH credentials for CM and VGW’s

IP Office

TFTP

69

  • IP Address/TFTP Details

  • Administrator username/password

Avaya / SDX

INDeX

Telnet / Modem

23

  • IP Address/Dial up details

  • Engineer’s username/password

Broadsoft

Broadworks

TCP/IP

2208

  • IP Address

GPT

BTeX

Modem

-

  • Modem/Dial up details

  • Engineer’s username/password

IBM/Siemens

ROLM, 9751

Modem

-

  • Modem/Dial up details

  • Engineer’s username/password

Intertel/Mitel

Axxess, 5000

HTTP and TCP/IP

80, 4000

  • IP address

  • Administrator username/password

IPC

Classic

SQL Server Database

135

  • SQL IP Address

  • SQL Server login

Microsoft

Teams, Lync, Skype for Business,

PowerShell

-

  • Network administrator username/password

 

 

Mitel

 

3300, SX2000

MiVB (Non MSL)

Telnet, SSH, SNMP and TCP/IP

23, 22, 5022, 5023, 161

  • IP Address to Web Maintenance Console of Main Controller

  • Engineer’s username/password (that provides access to Web Maintenance Console)

NICE

NTR

MySQL Database

3306

  • IP Address

  • Administrator username/password

Nortel (Avaya Blue)

Meridian, CS1K

rLogin, Telnet, Modem

513, 23

  • IP address or modem/Dial up details

  • Engineer’s username/password with all overlays read-only access

Redbox

Recorder

TCP/IP

1401

 

Siemens/Unify

HiPath, HiCom

File load

-

iSDX, Realitis

Telnet / Modem

23

  • Modem/Dial up details

  • Engineer’s username/password

Verba

Recorder

SQL Server Database

135

Version Date Comment
Current Version (v. 5) Oct 13, 2023 10:19 Sean Millar
v. 5 Oct 13, 2023 10:19 Sean Millar
v. 4 Oct 13, 2023 10:18 Sean Millar
v. 3 Oct 06, 2022 16:28 Sean Millar
v. 2 Oct 06, 2022 16:04 Sean Millar
v. 1 Oct 06, 2022 14:56 Sean Millar

  • No labels