Skip to content

Policy Processing Order

This document outlines the order in which different rule triggers and policy components are processed in Call Telemetry. Understanding this order is crucial for configuring effective call policies and troubleshooting call routing behavior.

Processing Sequence at a Glance

OrderComponentDescriptionIf MatchedIf Not MatchedLicense
1WhitelistHighest priority override for trusted numbersPermit Call (End)Continue to next checkAdvanced
2BlacklistImmediate blocking for tagged numbersBlock Call (End)Continue to next checkAdvanced
3Block RulesPattern-based rules with blocking actionBlock Call (End)Continue to next checkAll Levels
4TDoS ProtectionShort-term protection against aggressive calling patternsTemporary Block (End)Continue to next checkAdvanced
5Global Block ListCentralized block list shared across policiesBlock Call (End)Continue to next checkAll Levels
6Watch ListsLong-term monitoring of suspicious behaviorBlock Call if configured (End)Continue to next checkAdvanced
7Permit RulesPattern-based rules with permit actionPermit Call (End)Default: Permit CallAll Levels

Detailed Component Descriptions

Whitelist Advanced License Feature

  • Ensures the caller is not blocked during any subsequent checks
  • Overrides all other blocking mechanisms (TDoS, Watch List, Global Block, or Reputation inspections)
  • Still allows Call Apps to run, but an App cannot request a block.
  • Useful for ensuring critical callers are never blocked by automated systems, or reducing reputation lookups for key business callers.
  • Implementation: Configure through the Policy settings page or by adding numbers with specific tags
  • Best Practice: Use for key business partners or and numbers that should never be blocked regardless of call patterns

Blacklist Advanced License Feature

  • Blocks all calls with the associated Tag immediately without further processing
  • Similar to Global Block list, but with Tags to organize numbers.
  • Can be used to categorize and manage different types of unwanted callers
  • Implementation: Configure through the Policy settings page or by adding numbers with specific tags
  • Best Practice: Use tags to categorize blocked numbers for better reporting and management

Block Rules Available at All License Levels

  • Rules with a blocking action that reject matching calls
  • Processed in numberical order
  • Can include additional actions like alerts, apps, or call modifiers
  • Implementation: Create rules with Block action and appropriate pattern matching in the Policy editor
  • Best Practice: Alternative to Global Block List for specific patterns; use to block known spam or unwanted calls.

TDoS Protection Advanced License Feature

  • Mitigates Telecommunications Denial of Service attacks
  • Designed to mitigate active attacks without requiring manual intervention
  • Operates on short-term timeframes with configurable thresholds (e.g., 50 calls within 30 seconds)
  • TDoS violations are stored but not added to watch lists or the global block list.
  • Includes email notifications when triggered to alert administrators
  • Implementation: Configure call thresholds, time windows, and block expiration times in Policy Settings.
  • Best Practice: Configure thresholds based on your normal call volume patterns; set block expiration times appropriate to your threat model.

Global Block List Available at All License Levels

  • Centralized management of blocked calls for an organization
  • Shared among multiple policies for consistent blocking across the organization
  • Community license is limited to 100 globally blocked numbers; Essentials and higher have unlimited
  • Supports auto-expiration for temporary blocks (Essentials and higher licenses)
  • Can be populated manually, via CSV import, or through user submissions (MCID, XML service, Jabber)
  • Implementation: Manage through the Global Block List Management page; enable enforcement in each policy
  • Best Practice: Set expiration dates for temporary blocks; use descriptions to document why numbers were blocked

Watch Lists Advanced License Feature

  • Monitor suspicious call activity over time based on configurable thresholds
  • Administrators can review, comment on entries, whitelist or block them based on findings
  • Operates on longer timeframes (minutes/hours) compared to TDoS protection (< 1 minute )
  • Can be configured to automatically block numbers that trigger a watch list
  • Includes email alerts when thresholds are crossed
  • Implementation: Create Watch Lists and configure Triggers with specific thresholds and time intervals
  • Best Practice: Use for pattern analysis before taking permanent blocking actions; set appropriate thresholds based on normal call patterns for your organization

Permit Rules Available at All License Levels

  • Rules with a permit action that allow matching calls
  • Processed in numberical order
  • Can include additional actions like alerts, apps, or call modifiers
  • Can be used to modify caller ID information or trigger integrations
  • Implementation: Create rules with Permit action and appropriate pattern matching in the Policy Settings
  • Best Practice: Use to call apps to lookup reputation. Can be used for call routing, analytics, and integration with other systems

Important Considerations

  • The first matching component in the sequence determines the call policy decision.
  • Numerical order rules take precedence within each rule type
  • Apps associated with rules can modify the default action (permit/block)