Login   |   Contact Us   |   blogicon

Home / News & Events / Articles, White Papers & Case Studies / Custom Rules and Automated Blocking...

Custom Rules and Automated Blocking


By Amy Oldham

Protector offers many valuable and money-saving options to quickly detect and stop unwanted activity. Recent customer conversations indicate that rules and blocking are two of Protector’s most widely used and popular features. This article explores the mechanics and benefits of using custom rules and automatic blocking to safeguard your network.

Understanding Rules: Tips and Best Practices

Protector lets you define custom rules for monitoring usage records. You select what period or threshold is monitored and specify the acceptable limits for each parameter in the rule. Protector compares data in each usage record against your rules, looking for violations (a value that exceeds the defined limit). Protector scores the violation based on the severity of the overage. When Protector identifies a violation, it triggers alerts and automatic blocks if your system is set up to do so.

What makes up a rule?
Each rule has three main components you control: the key, the condition, and the threshold. These values tell Protector what to monitor as well as the acceptable limit for each of that rule’s parameters. Each rule also lets you define notification settings (who and how often Protector alerts about rule violations), determine whether it initiates a block, rate its severity, and set exclusions.

Why do rules have exclusions?
Rule exclusions are powerful. They let you define a rule that applies to every situation except one or two known exceptions that Protector can ignore. Exclusions allow you to deploy really granular rules.

How do I know if a rule is violated?
CMP displays them on the main violations grid. Also, every rule has built-in notification settings. Use them to determine if Protector sends an alert when the rule is violated, and if so, define the type, recipient, and frequently of those alerts.

How do I make sure my rules are hitting the mark?
For best results, reduce false alarms. First, if you see one particular rule repeatedly triggers violations, determine whether its definitions or conditions need to be updated. Duplicate that rule and test different conditions. If necessary, disable the questionable rule while you test other versions of it. Second, it’s important to evaluate scores associated with violation events to ensure they’re in line with the latest fraud trends and that your rule thresholds are set appropriately. Last, but not least, establish regular, periodic reviews. As business partner and carrier patterns change, rules may become outdated or need adjustment. Rely on historical trends to help you identify new rules. Always revisit your rules if you change regional or other thresholds upon which they are based.

Is there anything else I need to know about using rules?
Create as many custom rules as needed to support your specific business practices and patterns. Use the built-in folders to categorize rules. Give rules descriptive, meaningful names.

Where can I learn more?
On June 22, 2021, Equinox hosted training on how to create and best apply custom rules. You can watch that recording at any time, by logging into the online library. From that same location, you can also get a copy of the CMP User Guide for step-by-step help creating and organizing custom rules. As always, you may schedule a remote review of your system’s rules by contacting Equinox Training.

Blocking: Let Protector Do the Heavy Lifting

Protector can block entities at the switch and initiate active call tear down to immediately stop unwanted activity and decrease your exposure to large write-offs and damaging financial hits.

Blocking Options
Protector’s blocking lets you choose when, what, and how to block.

When: Protector can block automatically—this action occurs when a defined threshold or rule is violated. Protector also lets you initiate a block on demand from a violation or during case resolution.
What: Protector can block ANI/billing entities, dialed numbers, trunk groups, or tear down active calls.
How: You specify the triggering events/thresholds and how the block is applied.

Protector keeps you informed at every step by displaying the current block status, providing blocking history online, and notifying you about blocks via email.

Blocking: Behind the Scenes
Device Manager is a special Protector service that interfaces directly with switches. It handles all blocks and unblocks regardless of how they are initiated (automatically or manually). Device Manager connects to the switch, transmits the command, and sends a response (status) to Protector. Protector stores that response in the database, displays it onscreen, and uses it to generate email alerts.

Blocking: One Size Does Not Fit All
Protector’s blocking is powerful but flexibly designed to fit your needs. Protector supports standard blocking as well as custom blocking methods tailor made for your installation.

Standard blocking occurs when Protector uses Device Manager to interact with a switch to block an ANI/billing entity (calling party) from making further calls. Standard blocking can be configured and added to virtually any Protector installation based on licensing the blocking feature.

Custom blocking requires specially designed interface tools and connection methods to complete a custom project or one-off customer request. Such blocking features require a custom license and typically some development (coding) for your system.

Adding Blocking to Protector
Equinox can add blocking to your system at any time, even after implementation is complete. The Protector Blocking Bulletin outlines a typical blocking project, and Equinox Support works with you through every step of the process.

Learning More about Blocking
On June 22, 2021, Equinox hosted an in-depth discussion of Protector's blocking abilities. You can watch that recording at any time, by logging into the online library. The Protector Blocking Bulletin contains all the blocking details and is always available from the same online library as the webinar recording. And as always, Equinox Support is happy to help answer questions about blocking.

Getting Help
We do more than install applications. We tackle the telecom issues that affect our customers and make sure they have the information and resources needed for success.

  • Email Support@Equinoxis.com with questions about Protector’s rules and blocking features. To reach them by phone, call (615) 612-1225 Monday—Friday from 7:30 to 5:00 (Central).
  • Contact sales@equinoxis.com to inquire about adding blocking to your current solution. Reach out with questions on the best way to accomplish whatever business challenges come your way!
  • Schedule a review of your custom rules by contacting Training@Equinoxis.com. Use that same email to schedule training for new users or for a new system feature.
  • Go to www.equinoxis.com/login.php to get the latest instructional guides and webinars.