Contents
Index
Search
Collapse All
Expand All
Previous
Next
Print
Search
10.13.4.4. Protection of the individual call log
If the COS changeover is set to COSACT=1, browsing in the call log is always allowed.
The call log is only protected if the COS is set to COSACT=2.
Note: See also
Chapter 107, "Data Security at the Terminal"
${DocTitle}
, ID:
${DocID}
©
03/2026
Mitel Networks Corporation. All rights reserved. Mitel and the Mitel logo are trademark(s) of Mitel Networks Corporation. Unify and associated marks are trademarks of Unify Software and Solutions GmbH & Co. KG. All other trademarks herein are the property of their respective owners.