Once the softphone/hardphone is configured, it’s important that the configuration be locked (password, permissions...) so that a user cannot modify it (deactivate the authentication for example). If possible, viewing the configuration should also locked.
Management measures should also be taken to avoid accidental modification of the
configuration of the VoIP equipment.
0 comments:
Post a Comment