The System Configuration page displays system configuration and security information. The configuration information is for viewing only, but some of the security settings can be changed.
You can see a summary of information about the different components of the system. If you wish, you can embed this summary in intranet sites that use wiki markup.
Preset Views
Monitor System
Manage Call Queue
Purge System
Manage Cache
Interactions Administration
System Configuration
Manage Alerts
System Alerts
SpeechMiner complies with the security standards defined in the PCI-DSS standard (Payment Card Industry Data Security Standard). These standards are designed to prevent confidential information from being accessed by unauthorized individuals. For example, one purpose of SpeechMiner security settings is to prevent unauthorized people from hearing calls that are stored in the database. Some of the options that must be implemented in SpeechMiner in order for it to conform to the PCI-DSS standard are:
| Some of the recommendations listed above are not relevant to Recording UI mode, because they relate to features that are not supported in that mode. |
The settings that must be configured in order to implement these options are defined in various locations in the system, including SMConfig (the SpeechMiner configuration tool), the SpeechMiner web interface, and the configuration files of specific system features. In some cases, more than one setting must be configured in order for a requirement to be met. (For example, SSL connection requirements must be configured separately for different servers in the system.) The Security Center lists all of the PCI-related settings in your system and, whenever possible, automatically checks the system to see if they conform to the standard. In some cases, the system can correct an issue for you by changing the relevant settings; in other cases, you must manually correct the settings. You can also choose not to implement some or all of the PCI requirements; you can manually change the settings as you see fit.
The Security Center also contains a log of all security-related actions that were performed in the system. The log lists configuration changes and failed login attempts. This information can be used to monitor the system for security breaches.
| The information in this section is intended to explain how to work with the Security Center interface. It includes a general overview to the subject of PCI implementation in SpeechMiner. For comprehensive information about securing your SpeechMiner environment, please follow the guidelines in the SpeechMiner PCI Implementation Guide.
Following these guidelines does not ensure that your entire system is PCI-DSS compliant, or guarantee the confidentiality of your data. It is your company's responsibility to work with your IT department to ensure that your hardware and network systems are secure from internal as well as external intrusions. Genesys Telecommunications Laboratories makes no claims about the security of your network or the extent to which it is PCI-DSS compliant. |
The Security Center is accessed from the System Configuration screen.
The upper part of the tab contains PCI-compliance information. The lower part contains a log of security-related user actions. Both tables can be sorted by any of the columns they contain.
Preset Views
Monitor System
Manage Call Queue
Purge System
Manage Cache
Interactions Administration
System Configuration
Manage Alerts
System Alerts
The PCI-DSS Recommended Configuration section contains a table that lists all of the PCI-related settings. The table has three columns:
| Column | Description |
|---|---|
| Setting | Name of the setting |
| Explanation | Description of what conditions must be met in order for the setting to conform to the standard.
Note: If the system cannot check whether the setting meets the conditions, "Make sure that..." appears at the beginning of the explanation. |
| Action | The current status of the setting, and/or the type of action required to correct it:
|
You are prompted to confirm that you want to change the setting.
You are prompted to confirm that you want to change the settings.
| Settings that require manual correction are not changed when Reset is selected. |
Preset Views
Monitor System
Manage Call Queue
Purge System
Manage Cache
Interactions Administration
System Configuration
Manage Alerts
System Alerts
The lower table in the Security Center lists system configuration changes and failed logins that occurred in a specified time period. (System configuration changes are changes that are implemented using SMConfig, the SpeechMiner system configuration tool.)
| Option | Description |
|---|---|
| Last | Enter the number of hours or days (prior to the current time) to include in the table. |
| Time Unit | Select Hours or Days. |
| Failed Login | Select this option to include failed logins in the list. |
| Configuration Change | Select this option to include configuration changes in the list. |
Preset Views
Monitor System
Manage Call Queue
Purge System
Manage Cache
Interactions Administration
System Configuration
Manage Alerts
System Alerts