advertisement
Alarm Monitoring
User Guide
Alarm Monitoring User Guide
Table of Contents
Introduction .......................................................................29
Chapter 1: Introduction .............................................................31
Conventions Used in this Documentation ..................................................... 31
How this Document is Organized .................................................................. 31
Getting Started .............................................................................................. 32
Passwords ....................................................................................................................... 32
Enable/Disable Strong Password Enforcement .............................................................. 32
Error Messages ............................................................................................................... 33
Accounts ......................................................................................................................... 33
Log In .............................................................................................................................. 34
Single Sign-On .............................................................................................. 36
Directory Accounts .......................................................................................................... 36
Automatic and Manual Single Sign-On ........................................................................... 37
Configure Single Sign-On ............................................................................................... 37
Log In Using Automatic Single Sign-On .......................................................................... 37
Log In Using Manual Single Sign-On .............................................................................. 39
Troubleshoot Logging In ............................................................................... 40
Assigning Directory and Internal Accounts to the User ................................. 41
Switch Log On ................................................................................................................. 41
Log Out of the Application ............................................................................................... 42
Exit the Application .......................................................................................................... 42
revision 1
— 3
Table of Contents
Chapter 2: Main Alarm Monitoring Window ............................43
Menus and Toolbars ..................................................................................... 43
Toolbar Procedures ....................................................................................... 56
How to Use the Toolbars ................................................................................................. 56
Alarm Monitoring Status Bar ........................................................................................... 56
System Administrator Procedures ....................................57
Chapter 3: System Administrator Procedures ........................59
Administrative Procedures Checklist ............................................................. 59
Access Control Procedures Checklist ........................................................... 60
Intrusion Detection Alarm Definitions ............................................................ 61
Alarm Monitoring Operator Procedures ........................................................ 61
Intrusion Detection Device Statuses ............................................................. 62
Monitoring Procedures Checklist .................................................................. 62
Video Procedures Checklist .......................................................................... 62
Operator Procedures ..........................................................65
Chapter 4: Set Alarm Monitoring Display Options .................67
System Status Options Window .................................................................... 67
Display Option Procedures ........................................................................... 69
Select Event Types to Monitor ........................................................................................ 69
Select Column Configuration .......................................................................................... 70
Set Automatic Display Options ........................................................................................ 71
Display Multiple Windows ............................................................................................... 72
4 —
revision 1
Alarm Monitoring User Guide
Select Hardware View Options ....................................................................................... 72
Chapter 5: Monitor Devices ......................................................73
System Status Window ................................................................................. 73
Device Groups Window ................................................................................. 74
Device Group Test Mode Window ................................................................ 76
Device Group Icons ....................................................................................... 76
Hardware Device Icons ................................................................................. 77
Device Status ................................................................................................ 78
Offline Hardware Devices ............................................................................................... 79
Procedures for Monitoring Devices ............................................................... 80
Update the Hardware Status ........................................................................................... 80
Perform a Device Test .................................................................................................... 81
Locate or Search for a Device ......................................................................................... 82
View the Last Connection Time for Dialup Panels .......................................................... 82
Download the B.A.S.I.S. Database or Firmware ............................................................. 82
View the Controller Properties ........................................................................................ 83
Chapter 6: Trace Alarms and Events .......................................85
Trace Configuration Window Overview ......................................................... 85
Trace Configuration Window ......................................................................... 86
Procedure for Tracing ................................................................................... 87
Trace Alarms and Events ................................................................................................ 87
Chapter 7: Video Monitoring .....................................................89
Video Monitoring Window ............................................................................. 89
Video Monitoring Window Procedures .......................................................... 90
revision 1
— 5
Table of Contents
View the Video Tour ........................................................................................................ 90
Video Player .................................................................................................. 90
Daylight Saving Time ...................................................................................................... 93
Customize Overlay Information Dialog ............................................................................ 94
Performance Dialog ........................................................................................................ 94
Video Monitoring Features ............................................................................ 96
Buffering Streaming Video .............................................................................................. 96
Browser-based VideoViewer ........................................................................................... 96
Camera Lookup ............................................................................................................... 97
Two-way Audio ................................................................................................................ 97
Video Monitoring Procedures ........................................................................ 99
Launch Video (Live/Recorded) From a Camera ............................................................. 99
Export Video to a File .................................................................................................... 100
Load and View a Video File .......................................................................................... 100
Monitor Video of a Specific Camera .............................................................................. 100
Switch Camera Views Displayed in Video Player ......................................................... 101
Monitor Video of Multiple Cameras (Successively) ....................................................... 101
Capture an Image ......................................................................................................... 102
Create a Video Event .................................................................................................... 102
Automatically Launch both Live and Recorded Video on Alarm ................................... 102
Event Configuration/Search Dialog ............................................................. 104
Event Configuration/Search Dialog Menu Options ........................................................ 105
Event Configuration/Search Dialog Fields .................................................................... 107
Event Configuration/Search Dialog Procedures .......................................... 109
Open the Event Configuration/Search Dialog ............................................................... 109
Configure Event Properties ........................................................................................... 110
6 —
revision 1
Alarm Monitoring User Guide
Set Region of Interest ................................................................................................... 111
Video Search Performance Requirements .................................................................... 113
Search Video/Audio ...................................................................................................... 113
View Search Results ..................................................................................................... 113
Video Channel Configuration Dialog ........................................................... 114
Open the Video Channel Configuration Dialog ............................................................. 115
Configure Video Channel Parameters .......................................................................... 115
Matrix View .................................................................................................. 116
Select Template Dialog ................................................................................................. 116
Save Layout Dialog ....................................................................................................... 117
Load Layout Dialog ....................................................................................................... 118
Matrix View Procedures .............................................................................. 118
Monitor Video in Matrix View ......................................................................................... 118
Create a Matrix Layout .................................................................................................. 119
Save a Matrix Layout .................................................................................................... 120
Load a Matrix Layout ..................................................................................................... 120
Pan, Tilt, and Zoom ..................................................................................... 121
Configure PTZ with LNVR or LNVS Machines .............................................................. 121
Configure PTZ with all other Digital Video Recorders ................................................... 121
Using PTZ in the Video Player ...................................................................................... 122
PTZ Options Dialog ....................................................................................................... 123
PTZ Control Adjustment Parameters ............................................................................ 125
PTZ Joystick Selection .................................................................................................. 128
Configure PTZ Locking ................................................................................................. 128
Presets .......................................................................................................................... 128
PTZ Tours ..................................................................................................................... 132
revision 1
— 7
Table of Contents
Remote Monitor ........................................................................................... 135
LNVR Security ............................................................................................................... 135
Add Cameras to a Remote Monitor ............................................................................... 136
Remote Monitor Right-click Options .............................................................................. 136
Local Monitor Window in Alarm Monitoring ................................................................... 137
Remote Monitor Application .......................................................................................... 138
Application Profiles ........................................................................................................ 139
Chapter 8: Video Verification ..................................................143
Video Verification Configuration Dialog ....................................................... 143
Digital Video Verification ............................................................................. 144
Digital Video Verification Window ................................................................................. 144
Digital Video Verification Procedures ............................................................................ 144
Standard Video Verification ......................................................................... 145
Standard Video Verification Window ............................................................................. 145
Standard Video Verification Procedures ....................................................................... 146
Chapter 9: Control Devices and Areas ..................................149
Grant / Deny Pop-up Window ..................................................................... 149
Grant / Deny Pop-up Window Procedures .................................................. 150
Grant or Deny Access ................................................................................................... 150
Right-click Options to Control Devices and Areas ...................................... 151
General Right-click Options .......................................................................................... 151
Monitor Zone Right-click Options .................................................................................. 152
Access Panel and Alarm Panel Right-click Options ...................................................... 152
Intrusion Area Right-click Options ................................................................................. 153
Intrusion Panel Right-click Options ............................................................................... 153
8 —
revision 1
Alarm Monitoring User Guide
Intercom Right-click Options ......................................................................................... 153
Intrusion Door Right-click Options ................................................................................. 154
Intrusion Relay Right-click Options ............................................................................... 154
Intrusion Zone Right-click Options ................................................................................ 154
Reader Right-click Options ........................................................................................... 155
Alarm Mask Group Right-click Options ......................................................................... 155
Intrusion Mask Group Right-click Options ..................................................................... 155
Function List Right-click Options ................................................................................... 156
Action Group Right-click Options .................................................................................. 156
Anti-Passback Area Right-click Options ........................................................................ 156
Guard Tour Right-click Options ..................................................................................... 156
Remote Monitor Right-click options .............................................................................. 157
Remote Monitor Video Cell Right-click Options ............................................................ 157
Single and Double Left-click Mode .............................................................. 157
Activate Single or Double Left-click Mode ..................................................................... 158
Select a Device in Single or Double Left-click Mode ..................................................... 158
Execute a Command in Single or Double Left-click Mode ............................................ 159
Chapter 10: Monitor Alarms ....................................................161
Alarm Icons ................................................................................................. 161
Pending Alarms Window ............................................................................. 162
Procedure for Monitoring Alarms ................................................................ 163
Sort Alarms ................................................................................................................... 163
Chapter 11: Acknowledge Alarms ..........................................167
Alarm Acknowledgment Window ................................................................. 167
Alarm Acknowledgment Procedures ........................................................... 169
revision 1
— 9
Table of Contents
Acknowledge an Alarm ................................................................................................. 169
Fast/Group Acknowledge Alarms .................................................................................. 170
Delete an Alarm ............................................................................................................ 171
Delete All Alarms ........................................................................................................... 172
Display a Map ............................................................................................................... 172
Example of a Map ........................................................................................ 173
View Linked Maps ......................................................................................................... 173
Send an E-mail .............................................................................................................. 174
Send a Page ................................................................................................................. 176
Chapter 12: Muster Mode ........................................................177
Overview of Hazardous / Safe Locations .................................................... 177
Hard APB in Hazardous Locations ................................................................................ 177
Soft APB in Safe Locations ........................................................................................... 178
Enable Global APB ....................................................................................................... 178
Mustering Inside Hazardous Locations ....................................................... 178
General Constraints of Muster Mode .......................................................... 180
Recommendations for Optimal Reliability ................................................... 180
Muster Mode in Main Alarm Monitoring Window ......................................... 182
Hazardous / Safe Locations in System Status Window .............................. 182
Muster Mode Procedures ............................................................................ 183
Initiate Muster Mode ...................................................................................................... 183
Reset Muster Mode ....................................................................................................... 183
Reports ........................................................................................................ 184
Run Muster and Occupancy Reports ............................................................................ 185
Moving Badges ........................................................................................... 185
10 —
revision 1
Alarm Monitoring User Guide
Move All Badges from an Area ..................................................................................... 186
Move a Single Badge from an Area .............................................................................. 186
Advanced Operator Procedures ......................................187
Chapter 13: Cardholders Folder .............................................189
Cardholders Folder Procedures .................................................................. 192
Cardholder Search Capabilities .................................................................................... 193
Search for a Cardholder Record ................................................................................... 194
Retrieve the Most Recent Search Results .................................................................... 195
Change the Cardholders Folder View Options .............................................................. 195
Keyboard Wedge Settings Window ............................................................. 197
CAC Barcodes .............................................................................................................. 198
Scanning Barcodes with a Wedge Scanner .................................................................. 198
Keyboard Wedge Settings Window Procedures ......................................... 202
Configure a Wedge Scanner ......................................................................................... 202
Verify Fingerprint(s) Dialog ......................................................................... 203
Fingerprint Verification with PIV Cards ......................................................................... 203
Verify Fingerprint(s) Dialog Procedures ...................................................... 204
Verify Fingerprints from a PIV Card .............................................................................. 204
Import Fingerprints from a PIV Card ............................................................................. 204
Overwrite Facial Image Dialog .................................................................... 205
Overwrite Facial Image Dialog Procedure .................................................. 206
Cardholder Form ......................................................................................... 206
Cardholder Form Overview ........................................................................................... 206
Import Cardholder/Visitor Data .................................................................... 207
revision 1
— 11
Table of Contents
Prerequisites ................................................................................................................. 207
Corex Business Card Scanner ...................................................................................... 209
GSC (iCLASS) Card ...................................................................................................... 209
GSC (DESFire) Card ..................................................................................................... 209
ID Scan ......................................................................................................................... 210
ID-Check Terminal ........................................................................................................ 210
PIV Card ........................................................................................................................ 211
TWIC Card .................................................................................................................... 211
Import Cardholder Data ................................................................................................. 212
Cardholder Form Procedures ...................................................................... 212
Add a Cardholder Record ............................................................................................. 212
Modify a Cardholder Record ......................................................................................... 213
Delete a Cardholder Record ......................................................................................... 213
Delete a Selected Group of Cardholder Records .......................................................... 214
Destroy all Cardholder Data .......................................................................................... 214
Visitor Form ................................................................................................. 214
Visitor Form Procedures ............................................................................. 216
Import Visitor Data ........................................................................................................ 216
Add a Visitor Record ..................................................................................................... 216
Modify a Visitor Record ................................................................................................. 217
Delete a Visitor Record ................................................................................................. 217
Segments Form ........................................................................................... 218
Segments Form Overview ............................................................................................. 218
Segments Form Procedures ....................................................................... 219
Modify a Cardholder’s Segment Assignment ................................................................ 219
Change a Group of Cardholder's Segments ................................................................. 219
12 —
revision 1
Alarm Monitoring User Guide
Badge Form ................................................................................................ 221
Badge Form (View Mode) ............................................................................................. 221
Badge Form (Modify Mode) .......................................................................................... 221
Badge Form Procedures ............................................................................. 226
Add or Replace a Badge Record .................................................................................. 226
Modify a Badge Record ................................................................................................. 227
Modify Badges for a Selected Group of Cardholders .................................................... 228
Encoding Prerequisites ............................................................................... 229
Encode a Badge ............................................................................................................ 230
Delete a Badge Record ................................................................................................. 230
Access Levels Form .................................................................................... 231
Access Levels Form (View Mode) ................................................................................. 231
Access Levels Form (Modify Mode) .............................................................................. 231
Access Levels Form Procedures ................................................................ 232
Assign Access Levels to a Badge ................................................................................. 232
Assign Intrusion Authority to the Cardholder ................................................................. 234
Assign Activation and Deactivation Dates to Access
Levels ......................................................................................................................... 235
Assign Access Levels to a Selected Group of Cardholders .......................................... 236
Remove Access Levels From a Selected Group of
Cardholders ............................................................................................................... 237
Modify Access Levels Assignments .............................................................................. 238
Precision Access Form ............................................................................... 238
Precision Access Form Procedures ............................................................ 239
Assign Precision Access Groups to a Badge ................................................................ 239
Remove Precision Access Groups From a Badge ........................................................ 240
Biometrics Form .......................................................................................... 240
revision 1
— 13
Table of Contents
Biometrics Form Procedures ....................................................................... 241
Search for a Cardholder’s Biometric Record ................................................................. 241
Visits Form .................................................................................................. 242
Visits Form (View Mode) ............................................................................................... 242
Visits Form (Modify Mode) ............................................................................................ 242
Visits Form Procedures ............................................................................... 243
Modify a Cardholder’s Permission to Have Visitors ...................................................... 243
Assets Form ................................................................................................ 244
Assets Form Procedures ............................................................................. 245
Assign an Asset to a Cardholder ................................................................................... 245
Unassign an Asset ........................................................................................................ 245
Modify the Asset Group ................................................................................................. 245
Directory Accounts Form ............................................................................. 246
Directory Accounts Form Procedures ......................................................... 246
Link a Cardholder to a Directory Account ..................................................................... 246
Unlink a Directory Account ............................................................................................ 247
Logical Access Form (ActivIdentity Sub-tab) .............................................. 248
Logical Access Form - VeriSoft Sub-tab ..................................................... 249
Guard Tours Form ....................................................................................... 251
Guard Tours Form Procedures ................................................................... 252
Assign Guard Tour Security Clearance Levels to a Cardholder ................................... 252
Reports Form .............................................................................................. 252
Reports Form Procedures ........................................................................... 253
Run a Cardholder Report .............................................................................................. 253
Offline Form ................................................................................................ 254
14 —
revision 1
Alarm Monitoring User Guide
Offline Form Overview .................................................................................................. 254
Offline Form Procedures ............................................................................. 255
Configure an Offline Reader ......................................................................................... 255
Download Reader Information to a PDA ....................................................................... 255
Chapter 14: Badge Print Preview Window ............................257
Badge Printing Form ................................................................................... 258
Badge Print Preview Window Procedures .................................................. 259
Preview and Print a Badge ............................................................................................ 259
Chapter 15: Visits Folder ........................................................263
Visit Right-Click Menu ................................................................................................... 264
Sign In Visit(s) Window ............................................................................... 266
Print Badge(s) Window ............................................................................... 268
Visits Folder Procedures ............................................................................. 268
Visit Search Capabilities ............................................................................................... 269
Search for All Visits to a Selected Cardholder .............................................................. 270
Search for All Visits by a Selected Visitor ..................................................................... 270
Search for Scheduled, Active or Finished Visits ........................................................... 271
Search for All Visits for a Specific Date or Time ........................................................... 271
Retrieve the Most Recent Visit Search Results ............................................................ 273
Find a Cardholder or Visitor Associated with a Visit ..................................................... 273
Add a Visit Record ........................................................................................................ 273
Modify a Visit Record .................................................................................................... 278
Delete a Visit Record .................................................................................................... 278
Print a Visitor Badge ..................................................................................................... 279
Sign in a Previously Scheduled Visit and Print a Badge ............................................... 279
revision 1
— 15
Table of Contents
Sign Out a Visit ............................................................................................................. 280
Visit Form .................................................................................................... 281
Visit Form Overview ...................................................................................................... 281
Select Date(s) Window................................................................................. 282
Select Time Range Window ........................................................................ 284
Status Search Form ..................................................................................... 285
Status Search Form Overview ...................................................................................... 285
Details Form ................................................................................................ 287
Details Form Overview .................................................................................................. 287
E-mail Form ................................................................................................. 288
E-mail Form Overview ................................................................................................... 288
Add Recipient Window ................................................................................ 290
Reports Form .............................................................................................. 291
Reports Form Overview ................................................................................................ 291
Reports Form Procedures ........................................................................... 291
Run a Visit Report from the Visits Folder ...................................................................... 291
Select Host Wizard: Search Form................................................................ 293
Select Host Wizard: Search Form Overview ................................................................. 293
Select Host Wizard: Select Form ................................................................. 295
Select Host Wizard: Select Form Overview .................................................................. 295
Select Visitor Wizard: Search Form ............................................................ 297
Select Visitor Wizard: Search Form Overview .............................................................. 297
Select Visitor Wizard: Select or Add Form ................................................... 298
Select Visitor Wizard: Select or Add Form Overview .................................................... 299
Select Visitor Wizard: Add Form ................................................................. 300
16 —
revision 1
Alarm Monitoring User Guide
Select Visitor Wizard: Add Form Overview ................................................................... 300
Select Visitor Wizard: Select Form .............................................................. 302
Select Visitor Wizard: Select Form Overview ................................................................ 302
Select Import Source Window ..................................................................... 303
Chapter 16: Assets Folder ......................................................305
Assets Form ................................................................................................ 306
Assets Form Procedures ............................................................................. 308
Add an Asset ................................................................................................................. 308
Modify an Asset ............................................................................................................. 309
Delete an Asset ............................................................................................................. 309
Assign a Cardholder to an Asset ................................................................................... 309
Search for an Asset Record .......................................................................................... 310
Retrieve the Most Recent Search Results .................................................................... 310
Add an Asset Type/Subtype .......................................................................................... 311
Asset Classes Form .................................................................................... 312
Asset Classes Form (View Mode) ................................................................................. 312
Asset Classes Form (Modify Mode) .............................................................................. 312
Asset Classes Form Procedures ................................................................. 314
Assign Classes to an Asset ........................................................................................... 314
Modify an Asset Classes Assignment ........................................................................... 314
Add Asset Groups and Classes .................................................................................... 315
Assignments Form ...................................................................................... 316
Assignments Form Procedures ................................................................... 317
Assign a Cardholder to an Asset ................................................................................... 317
Unassign an Asset ........................................................................................................ 318
revision 1
— 17
Table of Contents
Search for a Cardholder Assigned to an Asset ............................................................. 318
Reports Form .............................................................................................. 319
Reports Form Procedures ........................................................................... 321
Run an Asset Report ..................................................................................................... 321
Chapter 17: Reports Folder ....................................................323
Report Configuration Form .......................................................................... 324
Report View Filter Window .......................................................................... 325
Report Configuration Form Procedures ...................................................... 327
Add a Report ................................................................................................................. 327
Modify a Report ............................................................................................................. 328
Delete a Report ............................................................................................................. 328
Filter The Report View .................................................................................................. 329
Preview and Print a Report ........................................................................................... 329
Reader Reports Form ................................................................................. 329
Reader Reports Form Overview ................................................................................... 329
Reader Reports Form Procedures .............................................................. 332
Run a Reader Report .................................................................................................... 332
Alarm Panel Reports Form .......................................................................... 333
Alarm Panel Reports Form Overview ............................................................................ 333
Alarm Panel Reports Form Procedures ...................................................... 336
Run an Alarm Panel Report .......................................................................................... 336
Anti-Passback Reports Form ...................................................................... 337
Anti-Passback Reports Form Overview ........................................................................ 337
Anti-Passback Reports Form Procedures ................................................... 340
Run an Anti-Passback Report ....................................................................................... 340
18 —
revision 1
Alarm Monitoring User Guide
Date/Time Reports Form ............................................................................. 341
Date/Time Reports Form Overview ............................................................................... 341
Date/Time Reports Form Procedures ......................................................... 345
Run a Date/Time Report ............................................................................................... 345
Event Reports Form .................................................................................... 346
Event Reports Form Overview ...................................................................................... 346
Event Reports Form Procedures ................................................................. 350
Run an Event Report ..................................................................................................... 350
Alarm Acknowledgment Reports Form ....................................................... 351
Alarm Acknowledgment Reports Form Overview ......................................................... 351
Alarm Acknowledgment Reports Form Procedures .................................... 354
Run an Alarm Acknowledgment Report ........................................................................ 354
Receiver Account Zone Reports Form ........................................................ 356
Receiver Account Zone Reports Form Overview .......................................................... 356
Receiver Account Zone Reports Form Procedures .................................... 359
Run a Receiver Account Zone Report .......................................................................... 359
Chapter 18: Print Report Options Window ............................361
Print Report Options Window ...................................................................... 362
Print a Report ................................................................................................................ 363
Chapter 19: Report Print Preview Window ............................365
Report Print Preview Window ..................................................................... 366
Report Print Preview Window Right-click Options ...................................... 368
Report Print Preview Window Procedures .................................................. 368
Preview and Print a Report ........................................................................................... 368
revision 1
— 19
Table of Contents
Search a Report for Specific Information ...................................................................... 370
Chapter 20: Guard Tour ..........................................................371
Start Guard Tour Form ................................................................................ 372
Guard Tour Live Tracking Form .................................................................. 373
Guard Tour Form Procedures ..................................................................... 374
Launch a Guard Tour .................................................................................................... 375
Schedule an Automatic Guard Tour Action ................................................................... 376
Respond to an Automatic Guard Tour .......................................................................... 377
View a Guard Tour ........................................................................................................ 377
Checkpoint Status and Events Diagram ..................................................... 378
Chapter 21: Scheduler Folder .................................................379
Scheduler Form ........................................................................................... 380
Scheduler Form Procedures ....................................................................... 381
Add and Schedule an Action ......................................................................................... 381
Display the Scheduler Right-Click Menu ....................................................................... 387
Add and Schedule an Action Using the Scheduler Right-Click Menu ........................... 388
Start an Action ............................................................................................................... 388
Stop an Action ............................................................................................................... 388
View Action History ....................................................................................................... 388
View the Current Status of an Action ............................................................................ 389
Refresh an Action .......................................................................................................... 389
Refresh all Actions ........................................................................................................ 389
Delete a Scheduled Action using the Scheduler Right-Click Menu ............................... 389
Modify a Scheduled Action using the Scheduler Right-Click Menu .............................. 390
20 —
revision 1
Alarm Monitoring User Guide
Appendices ......................................................................391
Appendix A: Actions ...............................................................393
General Actions Procedures ....................................................................... 393
Specify the Number of Simultaneous Actions ............................................................... 393
Open an Action Properties Window .............................................................................. 393
Action Group Properties Window ................................................................ 397
Action Group Properties Window Procedures ............................................. 398
Add an Action Group ..................................................................................................... 398
Action History/Guard Tour Event Purging Properties Window .................... 399
Action History/Guard Tour Event Purging Properties Window Procedures 400
Add an Action History/Guard Tour Event Purging Action .............................................. 400
Archive/Purge Database Properties Window .............................................. 401
Archive/Purge Database Properties Window Procedures ........................... 402
Add an Archive/Purge Database Action ........................................................................ 402
Arm/Disarm Area Properties Window ......................................................... 403
Arm/Disarm Area Properties Window Procedures ...................................... 406
Add an Arm/Disarm Area Action ................................................................................... 406
Automatic Guard Tour Properties Window .................................................. 407
Automatic Guard Tour Properties Window Procedures .............................. 408
Add an Automatic Guard Tour Action ........................................................................... 408
Change Network Video Password Properties Window ............................... 410
Change Network Video Password Properties Window Procedures ............ 411
Change the Network Video Password .......................................................................... 411
Schedule a One-Time Password Change ..................................................................... 412
revision 1
— 21
Table of Contents
Schedule a Recurring Password Change ..................................................................... 412
Deactivate Badge Properties Window ......................................................... 413
Deactivate Badge Properties Window Procedures ..................................... 414
Add a Deactivate Badge Action .................................................................................... 414
Device Output Properties Window .............................................................. 415
Device Output Properties Window Procedures ........................................... 416
Add a Device Output Action .......................................................................................... 416
Device Output Group Properties Window ................................................... 417
Device Output Group Properties Window Procedures ................................ 418
Add a Device Output Group Action ............................................................................... 418
Download Network Video Firmware Properties Window ............................. 419
LNVR and Camera Requirements ................................................................................ 420
Download Network Video Firmware Properties Window Procedures ........................... 421
Make an Upgrade Available in B.A.S.I.S. ...................................................................... 421
Add a Download Network Video Firmware Action ........................................................ 422
Elevator Terminal Allowed Floors Properties Window ................................ 423
Elevator Terminal Allowed Floors Properties Window Procedures ............. 424
Add an Elevator Terminal Allowed Floors Action .......................................................... 424
Elevator Terminal Mode Properties Window ............................................... 424
Elevator Terminal Mode Properties Window Procedures ........................... 425
Add an Elevator Terminal Mode Action ......................................................................... 425
Execute Function List Properties Window ................................................... 426
Execute Function List Properties Window Procedures ............................... 427
Add an Execute Function List Action ............................................................................ 427
Generate Event Properties Window ............................................................ 428
22 —
revision 1
Alarm Monitoring User Guide
Elevator Terminal Mode Properties Window Procedures ........................... 429
Add an Elevator Mode Action ........................................................................................ 429
Global APB System/Segment Reset Properties Window ............................ 429
Global APB System/Segment Reset Properties Window Procedures ........ 430
Add a Global APB System/Segment Reset Action ....................................................... 430
ISC Database Download Properties Window .............................................. 431
ISC Database Download Properties Window Procedures .......................... 432
Add an ISC Database Download Action ....................................................................... 432
ISC Firmware Download Properties Window .............................................. 433
ISC Firmware Download Properties Window Procedures ........................... 434
Add an ISC Firmware Download Action ........................................................................ 434
Moving Badges for APB Areas Properties Window .................................... 435
Moving Badges for APB Areas Properties Window Procedures ................. 436
Add a Moving Badges for APB Areas Action ................................................................ 436
Muster Mode Initiation Properties Window .................................................. 437
Muster Mode Initiation Properties Window Procedures .............................. 438
Add a Muster Mode Initiation Action ............................................................................. 438
Mask/Unmask Alarm Input Properties Window ........................................... 439
Mask/Unmask Alarm Input Properties Window Procedures ....................... 440
Add a Mask/Unmask Alarm Input Action ....................................................................... 440
Mask/Unmask Alarm Input for Group Properties Window ........................... 441
Mask/Unmask Alarm Input for Group Properties Window Procedures ....... 442
Add a Mask/Unmask Alarm Input for Group Action ...................................................... 442
Mask/Unmask Alarm Mask Group Properties Window ............................... 443
revision 1
— 23
Table of Contents
Mask/Unmask Alarm Mask Group Properties Window Procedures ............ 444
Add a Mask/Unmask Alarm Mask Group Action ........................................................... 444
Mask/Unmask Door Properties Window ..................................................... 445
Mask/Unmask Door Properties Window Procedures .................................. 446
Add a Mask/Unmask Door Action ................................................................................. 446
Mask/Unmask Door Forced Open Properties Window ............................... 447
Mask/Unmask Door Forced Open Properties Window Procedures ............ 448
Add a Mask/Unmask Door Forced Open Action ........................................................... 448
Mask/Unmask Door Forced Open for Reader Group Properties Window .. 449
Mask/Unmask Door Forced Open for Reader Group Properties Window
Procedures ............................................................................................... 450
Add a Mask/Unmask Door Forced Open for Reader Group Action .............................. 450
Mask/Unmask Door Held Open Properties Window ................................... 451
Mask/Unmask Door Held Open Properties Window Procedures ................ 452
Add a Mask/Unmask Door Held Open Action ............................................................... 452
Mask/Unmask Door Held Open for Reader Group Properties Window ...... 453
Mask/Unmask Door Held Open for Reader Group Properties Window
Procedures ............................................................................................... 454
Add a Mask/Unmask Door Held Open for Reader Group Action .................................. 454
Pulse Open Door Properties Window ......................................................... 455
Pulse Open Door Properties Window Procedures ...................................... 456
Add a Pulse Open Door Action ..................................................................................... 456
Pulse Open Door Group Properties Window .............................................. 457
Pulse Open Door Group Properties Window Procedures ........................... 458
Add a Pulse Open Door Group Action .......................................................................... 458
24 —
revision 1
Alarm Monitoring User Guide
Reader Mode Properties Window ............................................................... 459
Reader Mode Properties Window Procedures ............................................ 460
Add a Reader Mode Action ........................................................................................... 460
Reader Mode Group Properties Window .................................................... 462
Reader Mode Group Properties Window Procedures ................................. 463
Add a Reader Mode Group Action ................................................................................ 463
Reset Use Limit Properties Window ............................................................ 464
Reset Use Limit Properties Window Procedures ........................................ 465
Add a Reset Use Limit Action ....................................................................................... 465
Run PTZ Tour Properties Window .............................................................. 466
Run PTZ Tour Properties Window Procedures ........................................... 467
Add a Run PTZ Tour Action .......................................................................................... 467
Schedule Report ......................................................................................... 468
Schedule Report Properties Window Procedures ....................................... 469
Add a Schedule Report Action ...................................................................................... 469
Request Print Action Flowchart.................................................................... 470
Select PTZ Preset Properties Window ........................................................ 471
Select PTZ Preset Properties Window Procedures .................................... 472
Add a Select PTZ Preset Action .................................................................................... 472
Select Video Wall Layout Properties Window .............................................. 472
Select Video Wall Layout Properties Window Procedures .......................... 474
Add a Select Video Wall Layout Action ......................................................................... 474
Set Forwarding Station Properties Window ................................................ 475
Set Forwarding Station Properties Window Procedures ............................. 476
revision 1
— 25
Table of Contents
Add a Set Forwarding Station Action ............................................................................ 476
Sign Out Visitor Properties Window ............................................................ 477
Sign Out Visitor Properties Window Procedures ......................................... 478
Add a Sign Out Visitor Action ........................................................................................ 478
Silence Area Properties Window ................................................................. 479
Silence Area Properties Window Procedures ............................................. 480
Add a Silence Area Action ............................................................................................ 480
Appendix B: Alarm/Event Descriptions .................................481
Appendix C: Reports ...............................................................519
Appendix D: LNVR Network Setup .........................................527
Deliver Live Video to Alarm Monitoring Using IP Multicast Protocol ........... 527
LNVR Network Setup Window .................................................................... 528
Client Network Settings Form ....................................................................................... 528
Recorder Network Settings Form .................................................................................. 529
IVS Network Settings Form ........................................................................................... 530
LNVR Network Setup Configurations .......................................................... 530
Configure Recorder for IP Multicast .............................................................................. 530
Configure Client for IP Multicast .................................................................................... 531
Configure Router for IP Multicast .................................................................................. 531
Configure Firewall for IP Multicast ................................................................................ 531
Appendix E: Exporting Video .................................................533
Video Converter Window ............................................................................ 534
Video Export Dialog .................................................................................... 535
Customize Overlay Information Dialog ........................................................ 536
26 —
revision 1
Alarm Monitoring User Guide
Video Conversion Procedures .................................................................... 537
Export Video to a File .................................................................................................... 537
Convert and Export Video ............................................................................................. 538
Play Exported Video Clip Using Windows Media Player ............................................... 539
Authenticate a Video File with Watermarking ............................................................... 539
Index ...............................................................................................541
revision 1
— 27
Table of Contents
28 —
revision 1
Introduction
Alarm Monitoring User Guide
Chapter 1: Introduction
The Alarm Monitoring application displays information about individual alarms and events as they occur. Operators can acknowledge alarms and manually change the status of devices as well as monitor video and launch Guard Tours.
With the correct permissions, Operators can also perform a variety of administrative tasks such as adding, modifying, deleting and tracking cardholders, visitors and assets as well as print badges.
Conventions Used in this Documentation
• Where a term is defined, the word is represented in italics.
• Field names, menus and menu choices are shown in bold.
• Keyboard keys are represented in angle brackets. For example: <Tab>.
• Keyboard key combinations are written in two ways:
<Ctrl> + <Z> means hold down the first key and press the second
<Alt>, <C> means press the first key, then press the second
• Window buttons on the screen are represented in square brackets. For example: [OK].
How this Document is Organized
The Alarm Monitoring User Guide is divided into three sections: the System
Administrator Procedures section, the Operators section and the Advanced
Operator Procedures section.
The System Administrator section outlines the steps involved in setting up an
Alarm Monitoring station. Most of the procedures in these chapters reference other manuals because they cannot be performed in the Alarm Monitoring application.
The Operator Procedures section focuses on procedures to monitor alarms, monitor video, trace devices and execute commands.
The Advanced Operator Procedures section covers the administrative procedures operators can perform in Alarm Monitoring. For example, adding cardholders or visitors, printing badges, adding assets to the database and assigning assets to cardholders.
revision 1
— 31
1: Introduction
Note:
Depending on the workflow of your company, some of the procedures covered in this section may be considered System Administrator procedures.
Getting Started
Passwords
B.A.S.I.S.
®
includes strong password enforcement, which checks the user’s password against password standards. This functionality is designed to enhance password security if single sign-on is not used. If single sign-on is used
(automatic or manual), B.A.S.I.S. does not enforce password standards. For more information on single sign-on, refer to
The system’s strong password enforcement also checks the Stanley database user’s password when logging into applications. Database user passwords apply only to SQL databases. For information on changing your database password, refer to the Accounts and Passwords chapter in the Installation Guide.
Password Standards
When creating a strong password keep the following guidelines in mind:
• Passwords cannot be blank.
• Passwords cannot be the same as the user name (e.g. SA, SA).
• Passwords cannot be Stanley keywords.
• Although not required, your password should contain numbers, letters, and symbols. Spaces are also acceptable. (e.g. August 18, 2002).
• B.A.S.I.S. passwords are not case-sensitive.
• Database passwords conform to the rules of the specific database being used; passwords in SQL Server are case insensitive.
• The maximum value for a strong password is 127 characters. The minimum value is 1.
Enable/Disable Strong Password Enforcement
Strong password enforcement is enabled/disabled in System Administration or
ID CredentialCenter. When you install B.A.S.I.S., by default strong password enforcement is enabled. When you upgrade, by default strong password
32 —
revision 1
Alarm Monitoring User Guide
Note:
enforcement is disabled. To manually enable or disable strong password enforcement:
1. Select System Options from the Administration menu.
2. Select the General System Options tab.
3. Click [Modify].
4. Select or deselect the Enforce strong passwords checkbox.
If you disable the option to enforce strong passwords, you will continue to receive a message stating your password is weak every time you log into an application until you change your B.A.S.I.S. password to meet the password standards.
5. Click [OK].
Error Messages
Read weak password messages/warnings carefully to avoid confusion about whether your user password or database password is weak.
If you have a weak database password you will receive a warning every time you log into any application, until you change your database password. Although it is not recommended, you can acknowledge the warning and continue working in the application. This table describes the password-related error messages that may be generated and which password you need to correct.
• To correct the database password, refer to the Accounts and Passwords chapter in the Installation Guide.
• To correct the user password, select a password that meets the standards
specified in Password Standards on page 32.
Warning message
Database password violations: Your password is a keyword that is not allowed. It is highly recommended that you change your password to meet our minimum password standards.
Your password cannot be blank. Please enter a password.
User password violations: Passwords cannot be the same as the user name.
Your password is a keyword that is not allowed.
Password to correct
Database
User
User
User
Accounts
Anyone who wishes to use B.A.S.I.S. applications must enter a user name and password in order to access the software. The System Administrator should create a unique account for each user of the applications. The System
Administrator can also, for each user, create a list of permissions, which specifies precisely which screens, fields, and buttons the user can access.
revision 1
— 33
1: Introduction
During initial installation of the application, default accounts are created. These include:
User name
sa admin user badge
Password
sa
Type
system account sample sample sample
These are provided as samples. You may change the passwords and use the accounts, or remove them. The exception to this is the system account, SA. By definition this account has permission to do anything in the system. A user with system access has unlimited access to the application. You cannot delete or change the system account except to modify the password, which you are strongly encouraged to do as soon as possible to discourage unauthorized use.
The first time you log into B.A.S.I.S. to configure the application, you should log in as SA and your password should be SA.
Log In
This procedure describes how to log in without using single sign-on. For a description of single sign-on, refer to
Single Sign-On on page 36. To log in using
single sign-on, refer to
Configure Single Sign-On on page 37.
1. Click the Start button, then select Programs > B.A.S.I.S. ET690 > Alarm
Monitoring.
2. Your system may be configured to prompt you to select a database to log into. If it is not, proceed to the next step. If it is: a. In the Database drop-down, all ODBC system databases currently defined on your computer are listed. Select the database that you wish to use for your application.
b. Click [OK].
3. The Log On window displays.
a. In the User name field, type the user name assigned to you. When logging in for the first time, your user name is SA.
b. In the Password field, type the password assigned to you. When logging in for the first time, your password is SA. Note that the characters you type do not appear in the field. Instead, for each character you type, an “*” displays. This is intended to protect against
34 —
revision 1
Alarm Monitoring User Guide
Important:
unauthorized access in the event that someone else can see the screen while you type.
After logging in for the first time, you are strongly encouraged to modify the password for the system account as soon as possible to discourage unauthorized use.
Monitor zone user assignments take precedence over monitoring station user assignments.
Note:
c. In the Directory field, select the directory that you wish to log into. For user accounts not using single sign-on, the default is “<Internal>.” d. Select the Remember user name and directory checkbox if you want the values you just entered in the User name and Directory fields to automatically be selected the next time that you log in.
e. Click [OK].
4. Your system may be configured to prompt you to confirm that you are authorized to use the application. To accept the terms of the authorization warning click [Yes].
5. If you are prompted to select a monitor zone: a. Select a monitor zone from the drop-down list. If segmentation is enabled, only the monitor zones for the segment that you logged into are available.
b. Select the Save as monitoring station assignment checkbox if you wish to make the monitor zone selection the default assignment for the monitoring station. This means when any operator logs into Alarm
Monitoring at this workstation, this zone will be monitored unless the operator has monitoring zones assigned to them as a user or the operator has permission to view multiple zones. This checkbox is only enabled if the user has proper permissions.
c. Select the Save as user assignment checkbox if you if you wish to log into the same monitor zone EVERY time you log in. This is a permanent assignment. You will not be prompted to select a monitor zone during future log ins. This is checkbox is only enabled if the user has permission.
d. Click [OK].
For more information please refer to the Monitor Zones Folder chapter in the
System Administration User Guide.
6. If you are prompted that the monitoring station you are logging into is set up for event queuing: a. Select No, if you want all the queued events deleted.
b. Select Yes, if you want all queued event for the monitor zone displayed.
revision 1
— 35
1: Introduction
Single Sign-On
Single sign-on simply means logging into B.A.S.I.S. with the same user name and password that you use to log into Windows or logging into B.A.S.I.S. using an LDAP user name and password for authentication. LDAP (Lightweight
Directory Access Protocol) is a software protocol that enables you to locate businesses, people, files, and devices without knowing the domain name
(network address).
Single sign-on allows scripts using the DataConduIT API to authenticate. These scripts will be run under a Windows account. The account that is making the call to the API can be obtained easily this way, and the script can be restricted to those actions that the user is permitted to perform (using standard B.A.S.I.S. permissions).
Note:
The use of the explicit username and password for directory authentication to Windows is strongly discouraged. It is recommended that you do not store
Windows passwords in the B.A.S.I.S. system, since B.A.S.I.S. uses reversible encryption and Windows does not. If explicit authentication is required, you should use an account that has view only permission to the directory in question.
Important:
It is possible to assign both an internal account and one or more directory accounts to a single user. Assigning both types of accounts increases the flexibility of the system during the authentication process. If the directory service is down or cannot be found from the workstation where the user is logging on, that user can instead use the internal account. Using both types of accounts means that you need to manage the internal account user names and passwords in addition to managing the directory accounts.
Allowing a user to log on in multiple ways increases the probability that the user's access to the system could be compromised. It is recommended that you standardize on either internal or directory accounts, but not both.
There are cases where assigning both an internal account and a directory account to a user may make sense. In a system where directory accounts are predominantly used, you may also assign an internal account to a user who needs to access the system from locations where the directory service is unavailable. If internal accounts are predominantly used, you may want to assign a directory account to a user so that the user does not need to enter in a password to log on.
Directory Accounts
To log into B.A.S.I.S. using single sign-on, a user name, password, and directory are required. A directory is a database of network resources, such as printers, software applications, databases, and users. The following directories are supported by B.A.S.I.S.: Microsoft Active Directory, Microsoft Windows NT 4
Domain, Microsoft Windows Vista/XP Workstation, and LDAP.
36 —
revision 1
Alarm Monitoring User Guide
Automatic and Manual Single Sign-On
When a user account is configured for single sign-on, the user can log into
B.A.S.I.S. automatically or manually.
For example, with automatic single sign-on, users simply start B.A.S.I.S. and they are automatically logged in under their Windows account and directory.
With manual single sign-on, users must manually enter their Windows or LDAP account information (user name and password). Users also have the option of selecting a different configured directory.
If single sign-on is not used, users manually enter a user name and a password that is different from their Windows or LDAP password. The directory is hardcoded to refer to the internal B.A.S.I.S. user directory.
Notes:
Manual
single sign-on can be used with the following directories: Microsoft
Active Directory, Microsoft Windows NT 4 Domain, and LDAP.
Automatic single sign-on can be used with every directory supported by
B.A.S.I.S. except LDAP because it doesn’t provide all the account information required.
Configure Single Sign-On
By default, user accounts do not use sign-on. To configure single sign-on the
System Administrator must add a directory and link a user account to the directory.
Log In Using Automatic Single Sign-On
Automatic single sign-on is supported with Windows domain accounts.
1. Click the Start button, then select Programs > B.A.S.I.S. ET690 > Alarm
Monitoring.
2. Your system may be configured to prompt you to select a database to log into. If it is not, proceed to step 3 . If it is: a. In the Database drop-down, all ODBC system databases currently defined on your computer are listed. Select the database that you wish to use for your application.
b. Click [OK].
3. If your Windows account is linked to a user, a message will be displayed that says, “Attempting to automatically log you on using your Windows account.
revision 1
— 37
1: Introduction
Monitor zone user assignments take precedence over monitoring station user assignments.
Note:
To bypass this, hold down SHIFT.” To automatically be logged in, do nothing.
4. Your system may be configured to prompt you to confirm that you are authorized to use the application. To accept the terms of the authorization warning, click [Yes].
5. If you are prompted to select a monitor zone: a. Select a monitor zone from the drop-down list. If segmentation is enabled, only the monitor zones for the segment that you logged into are available.
b. Select the Save as monitoring station assignment checkbox if you wish to make the monitor zone selection the default assignment for the monitoring station. This means when any operator logs into Alarm
Monitoring at this workstation, this zone will be monitored unless the operator has monitoring zones assigned to them as a user or the operator has permission to view multiple zones. This checkbox is only enabled if the user has proper permissions.
c. Select the Save as user assignment checkbox if you if you wish to log into the same monitor zone EVERY time you log in. This is a permanent assignment. You will not be prompted to select a monitor zone during future log ins. This is checkbox is only enabled if the user has permission.
d. Click [OK].
For more information please refer to the Monitor Zones Folder chapter in the
System Administration User Guide.
6. If you are prompted that the monitoring station you are logging into is set up for event queuing: a. Select No, if you want all the queued events deleted.
b. Select Yes, if you want all queued event for the monitor zone displayed.
38 —
revision 1
Alarm Monitoring User Guide
Log In Using Manual Single Sign-On
Both users who want to log into B.A.S.I.S. using an LDAP user name and password for authentication and users who want to log in using a Windows domain account can do so using manual single sign-on.
1. Click the Start button, then select Programs > B.A.S.I.S. ET690 > Alarm
Monitoring.
2. Your system may be configured to prompt you to select a database to log into. If it is not, proceed to step 3 . If it is: a. In the Database drop-down, all ODBC system databases currently defined on your computer are listed. Select the database that you wish to use for your application.
b. Click [OK].
3. If your Windows account is linked to a user, a message will be displayed that says, “Attempting to automatically log you on using your Windows account.
To bypass this, hold down SHIFT.”
To manually login or to login using a different user name and password, hold down the <Shift> key. The Log On window opens.
a. In the Directory field, select the directory that you wish to log into. The default is “<Internal>.” b. In the User name field, type the Windows user name assigned to you.
Do not enter the domain\user name just enter your user name.
c. In the Password field, type the Windows password assigned to you.
d. Select the Remember user name and directory checkbox if you want the values you just entered in the User name and Directory fields to automatically be selected the next time that you log in.
e. Click [OK].
4. Your system may be configured to prompt you to confirm that you are authorized to use the application. To accept the terms of the authorization warning, click [Yes].
5. If you are prompted to select a monitor zone:
Monitor zone user assignments take precedence over monitoring station user assignments.
a. Select a monitor zone from the drop-down list. If segmentation is enabled, only the monitor zones for the segment that you logged into are available.
b. Select the Save as monitoring station assignment checkbox if you wish to make the monitor zone selection the default assignment for the monitoring station. This means when any operator logs into Alarm
Monitoring at this workstation, this zone will be monitored unless the operator has monitoring zones assigned to them as a user or the operator has permission to view multiple zones. This checkbox is only enabled if the user has proper permissions.
c. Select the Save as user assignment checkbox if you if you wish to log into the same monitor zone EVERY time you log in. This is a permanent assignment. You will not be prompted to select a monitor zone during
revision 1
— 39
1: Introduction
Note:
future log ins. This is checkbox is only enabled if the user has permission.
d. Click [OK].
For more information please refer to the Monitor Zones Folder chapter in the
System Administration User Guide.
6. If you are prompted that the monitoring station you are logging into is set up for event queuing: a. Select No, if you want all the queued events deleted.
b. Select Yes, if you want all queued event for the monitor zone displayed.
Troubleshoot Logging In
If you attempted to log in and were unable to do so, make sure that the following conditions have been met:
• You entered a correct user name/password and specified the correct directory.
• If your system is configured to display an authorization warning, you accepted the terms.
• A valid license is installed.
• You have permission to use the application.
• If you attempted to log into the server and the login failed, make sure that a properly coded, licensed dongle adapter is attached to your computer’s parallel port. Make sure that your dongle is securely attached.
• If you attempted to log into a client and failed, make sure the system has a valid software license. Client computers do not need a hardware dongle attached to the computer’s parallel port. Instead, the system the client is installed on must have a valid software license, which is installed in the
License Administration application.
• If you are using single sign-on, ensure that the directory you are authenticating against is operational and properly configured. When a directory is properly configured, the accounts are listed on the Select
Account form when linking a user account to a directory.
• If you are using single sign-on, ensure that the directory account is properly linked to the user account.
40 —
revision 1
Alarm Monitoring User Guide
Assigning Directory and Internal Accounts to the User
It is possible to assign both an internal account and one or more directory accounts to a single user. Assigning both types of accounts increases the flexibility of the system during the authentication process. Meaning, if the directory service is down or cannot be found from the workstation where the user is logging on, then the user can use the internal account instead.
However, using both types of accounts means that you need to manage the internal account user names and passwords in addition to managing the directory accounts. Allowing a user to log on in multiple ways increases the probability that the user's access could be compromised. For that reason, it is recommended that you standardize on either internal or directory accounts, but not both.
There are cases where assigning both an internal account and a directory account to a user may make sense. In a system where directory accounts are predominantly used, you may also assign an internal account to a user who needs to access the system from locations where the directory service is unavailable. If internal accounts are predominantly used, you may want to assign a directory account to a user for that user's convenience, so that the user does not need to enter in a password to log on.
Switch Log On
Switch Log On is often used when multiple operators use the same Alarm
Monitoring station. Instead of logging out of the application operators can use the switch log on feature. This simultaneously logs out the previous operator and logs in the new operator.
1. Select Switch Log On from the File menu.
2. The Log On to Alarm Monitoring window displays.
3. Enter the user name and password.
4. Select the desired directory.
5. Click [OK].
Notes:
When using switch log on, the person who’s logged into Windows can be a different person than the one logged into Alarm Monitoring.
Switch log on cannot be used if the new user has a monitor zone/user assignment different from the current user.
revision 1
— 41
1: Introduction
Log Out of the Application
When you log out of the application the entire application closes.
1. Select Log Off from the File menu.
2. The current user is logged off but the application remains open.
Exit the Application
You can close and exit the application using the following methods:
• Select Exit from the File menu.
• Double-click the icon located in the upper left corner of the title bar. When prompted to log off, click [Yes].
Close button
• Single click the icon located in the upper left corner of the title bar and select
Close. When prompted to log off, click [Yes].
• Click the close button in the window’s upper right corner. When prompted to log off, click [Yes].
42 —
revision 1
Alarm Monitoring User Guide
Chapter 2: Main Alarm Monitoring Window
The Main Alarm Monitoring window displays automatically when you log into the application. You can open and close additional windows but the Main Alarm
Monitoring window remains open until you log out of the entire application.
Menus and Toolbars
The menu bar is a horizontal list of options that appears at the top of the main window. Scroll over each option to view a drop-down menu. A toolbar is a strip of buttons positioned by default just below the menu bar. If you place your cursor over a toolbar button, a tool tip identifies the name of the toolbar button.
Operators can customize how the toolbar displays; they can:
• Change the toolbar from anchored to floating
Toolbars are anchored by default and are displayed in horizontal rows below the menu bar. Anchored toolbars can be changed to floating toolbars, which
• Control if the toolbar is displayed
By default the toolbar is displayed. Operators can control if the toolbar is
revision 1
— 43
2: Main Alarm Monitoring Window
File menu
Menu option
Log On/Log Off
Toolbar button Function
Prints information displayed in the active (topmost) window. The print toolbar button does not display if the Main Alarm Monitoring window is minimized.
Logs you into or out of the application.
Switch Log On
Change Password
Exit
Displays the login window, allowing a different user to log in without the previous user manually exiting the application. When the new user is successfully logged in, the old user is simultaneously logged out.
Opens the Change Password dialog, enabling you to change your password (you must have the corresponding system level permission to do so).
Ends the session of every person logged on.
Edit menu
Menu option Toolbar button Function
Note:
The following menu options are active when an alarm window is displayed.
Acknowledge
Fast/Group
Acknowledge
Acknowledges the currently selected alarm.
Allows a user to acknowledge a group of alarms simultaneously.
Delete
Delete All
Select All
View menu
Menu option
Badge Info
Removes the selected alarm from the window.
Removes all alarms from the window.
Selects all alarms in the window.
Toolbar button Function
Displays the cardholder folder/window which contains nine forms/tabs:
Cardholder, Badge, Access Level, Biometrics, Visits, Assets, Directory
Accounts, Guard Tours and Reports.
Note:
When the cardholder folder/window displays, an additional
menu option, Cardholder displays.
For more information, refer to Cardholder menu
44 —
revision 1
Alarm Monitoring User Guide
View menu (Continued)
Toolbar button Menu option
Visits
Asset Info
System Status
Device Groups
Pending Alarms
Function
Displays the Visits folder/window which contains the Status search,
Visit, Details, Email and Reports forms/tabs.
From the Visits folder/window you can:
• search visit records based on scheduled time in or out and date and time the record was last changed
• display visit records for a selected date range
• add, modify or delete
• print disposable badges
• sign in or out a visit
• send e-mail notifications
• generate reports
Displays the Asset folder/window which contains the Assets, Assets
Classes and Assignments forms/tabs.
Displays the System Status window which lists all access control devices defined in System Administration.
Displays the various device groups for a particular monitoring zone.
Bulk operations can be performed on all parts of the device group.
Types of device groups include (but are not limited to) Readers,
Cameras and Input and Output groups.
Displays the Pending Alarms window. To return to the Main Alarm
Monitoring window click the View Alarms toolbar button.
Video Verification
Video Monitoring
Map
Launches the Video Verification window where you can compare live video to a cardholder’s photograph.
Launches the Live Video window which is used to run a video tour of the cameras defined in Camera Groups.
Displays a map containing the device associated with the selected alarm
(if the Main Alarm Monitoring window is active) or the selected device
(if the System Status window is active).
• If the selected device is represented on more than one map you will be prompted to select the map of choice.
• A message displays if the selected device is not represented on any map.
• To display the View Map menu option, right-click a device in the
System Status window or select an alarm in the Main Alarm
Monitoring window.
• To print a map, select Print from the File menu. The map must be the up most window to print.
revision 1
— 45
2: Main Alarm Monitoring Window
View menu (Continued)
Toolbar button Menu option
Default Map
Map Selection
Scheduler
Reports
Function
Displays the map that is assigned to that monitoring zone. This menu option is dimmed if no map has been assigned to this zone.
This menu option is displayed through the Map icon drop-down.
Displays a window in which all available maps are listed. This menu option is dimmed if no map has been assigned to this zone.
This menu option is displayed through the Map icon drop-down.
Displays the Scheduler window which is used to add, modify and delete scheduled actions within the B.A.S.I.S. system. An action is any task that can be performed by software as a result of an event of schedule, for example; download a database, mask/unmask alarm inputs, pulse open a door and reset the use limit.
Note:
The Scheduler window is also available by selecting
Administration > Scheduler in System Administration.
For more information, refer to the Scheduler Folder chapter in the System Administration User Guide.
Displays the Reports folder/window of data entry forms/tabs.
Sort by
Toolbar
Status Bar
Trace menu
Menu option
Monitor Zone
Area
Asset
Badge
Sorts alarms according to criteria chosen in the submenu.
Displays the toolbar when selected (checked).
Displays the status bar when selected (checked).
Toolbar button Function
Monitors or traces alarms for the selected monitor zone.
Monitors or traces alarms for the selected intrusion area.
The Area menu option becomes active (not grayed out) when you highlight a device in the System Status window.
Monitors or traces alarms for the selected asset.
The Asset menu option becomes active (not grayed out) when you highlight a device in the System Status window.
Monitors or traces alarms for a specific badge.
46 —
revision 1
Alarm Monitoring User Guide
Trace menu (Continued)
Menu option
Controller
Device
Toolbar button Function
Monitors or traces alarms for the selected access panel/controller. An access panel/controller is a device that acts as the focal point for a group of card readers.
The Controller menu option or toolbar button becomes active (not grayed out) when you highlight an access panel/controller or any device under a given access panel/controller in the System Status window.
Note:
Access panel/controller traces are recursive, meaning all events occurring on that access panel/controller are included.
Monitors or traces alarms for the selected device.
The Device menu option becomes active (not grayed out) when you highlight a device in the System Status window.
This menu option is displayed through the Trace icon drop-down.
Note:
This menu option can be used to trace all device types including alarm outputs, reader aux inputs and reader aux outputs.
Configure menu
Menu option
Alarm Filter
Columns
Hardware Status
Frequency
System Status
Options
Function
Displays a checklist of alarm types to monitor. The Alarm Filter menu option becomes active
(not grayed out) when you display an alarm window.
Displays a list of columns from which to display. The Columns menu option becomes active
(not grayed out) whey you display an alarm window.
Determines how often background updates are performed. The choices are “No Updates”, 10,
15, 20, 30 and 60 minute intervals. This is saved per user / per station and only applies to
Apollo hardware.
Displays the System Status Options window which is used to specify how the System Status window displays information and what devices are included.
Control menu
Menu option
Update All
Hardware Status
Set All Controller
Clocks
Toolbar button Function
Updates the status of all controllers in the monitoring zone.
Sets the clocks in all access panels according to the machine on which the driver is running.
revision 1
— 47
2: Main Alarm Monitoring Window
Control menu (Continued)
Menu option
“Current Device”
Guard Tour
Toolbar button Function
This menu option is dynamic, meaning the name of this menu option changes according to the device highlighted in the System Status window.
For example if a BAS-1300 HID reader is highlighted in the System
Status window, then BAS-1300 HID displays in the Control menu options.
Each “Current Device” menu option also has sub-menu options. For more information refer to the
Control menu - “Current Device” sub-menu
table on page 48.
Allows Operators to launch or view a guard tour. Guard tour provides a guard (a cardholder who has been specifically chosen to conduct a tour) with a defined set of tasks that must be performed within a specified period of time. Typical tasks include swiping a card at a checkpoint access reader or turning a key connected to an alarm panel input.
To use guard tour the Linkage Server must be properly configured. For more information, refer to the System Options Folder chapter in the
System Administration or ID CredentialCenter User Guide.
Control menu - “Current Device” sub-menu
Sub-menu option
Toolbar button
Function
Note:
The “Current Device” sub-menu options that are available depend on the type of device listed as the
“Current Device” in the Control menu.
The type of device listed as the “Current Device” in the Control menu depends on the device highlighted in the System Status window.
Current Status
Acknowledge
Displays current status of device.
Acknowledges the selected alarm.
Trace
Update
Hardware
Status
Properties
Open Door(s)
Traces the selected device.
Polls currently selected access panel/controller and updates the hardware status.
If a downstream device (like a reader) is selected, the update hardware status is done for the controller associated with that device.
Displays access panel/controller properties.
Pulses open any door associated with selected access panel/controller or reader.
To activate the Open Door(s) toolbar button you must select an access panel/ controller or reader, otherwise the option is grayed out.
Set Controller
Clock
Reader Access
Modes
Sets selected access panel/controller clock to current time. If a device other than an access panel/controller is selected, this option sets the clock on the access panel/controller to which the device is attached.
Updates the reader mode of every reader associated with selected access panel/ controller or reader.
48 —
revision 1
Alarm Monitoring User Guide
Control menu - “Current Device” sub-menu (Continued)
Sub-menu option
Reader
Biometric
Verify Mode
Toolbar button
Function
Enables/disables verify mode for access control readers with an associated biometric reader.
Reader First
Card Unlock
Mode
• When verify mode is enabled, the normal card and/or pin access is and a biometric match is required.
• When verify mode is disabled, only the card and/or pin access is required.
Enables/disables the Reader First Card Unlock Mode. The Reader First Card
Unlock Mode is a qualifier for online Reader Mode. When enabled, the online
Reader Mode is in effect until the first (qualified) access granted with entry occurs. When the first access granted with entry occurs, the online Reader Mode changes to unlocked.
Activate
Deactivate
Pulse
Mask
UnMask
Receiver account information
View Map
Launch Video
Download
Firmware
Download
Database
Reset Use Limit
Whenever a Reader enters or leaves First Card Unlock Mode, an event transaction is logged in the database and displayed in Alarm Monitoring.
Note:
The Reader First Card Unlock Mode can also be enabled/disabled via the Reader folder/window in System Administration, via local timezone control in the BAS-2000 and as part of the Reader Mode or
Reader Group Mode action used in the Scheduler and Global I/O.
Note:
Reader First Card Unlock Mode is only supported on the BAS-2000 controller. However, first style unlock behavior can be configured for use with any access controller through Stanley’s Global I/O Support.
Activates the selected alarm output.
Deactivates the selected alarm output.
Pulses an output device.
Masks an input device. The System Status window displays the selected device.
masked beside
Unmasks an input device.
A receiver is a piece of hardware used to receive events from multiple accounts in multiple formats. Downstream devices connect to receivers via phone lines, direct wire connections and LAN connections. The receiver account information displays information about a specific receiver.
Displays a map associated with the selected device (if one exists). If more than one map exists, the user is prompted to select a map.
Displays video for the selected device if a camera is associated with the device.
Downloads firmware to the following downstream devices: Dual Interface Rdr1 readers, BAS-1100 and BAS-1200 alarm panels, and RS-485 command keypads.
Note:
It is not possible to download firmware to a single reader interface.
Downloads the database to the access panel/controller.
Resets the number of times a badge can be used on a particular access panel/ controller.
revision 1
— 49
2: Main Alarm Monitoring Window
Control menu - “Current Device” sub-menu (Continued)
Sub-menu option
Connect
Disconnect
Execute
Custom
Function
Bypass
Unbypass
Toolbar button
Function
Connects the access panel/controller via a dialup/modem connection.
Disconnects the access panel/controller via a dialup/modem connection.
Executes a custom function associated with the Bosch Intrusion Controller. This menu option is only available with Bosch Intrusion Controllers.
Term used to indicate that the zone has been masked. If a zone is bypassed the controller ignores any tamper or alarm condition for the zone.
Similar to bypass, this command unmasks the zone so that any tamper or alarm will be reported.
Options menu
Menu option
Mute Sound
Font
Save Alarms on
Exit
Save Settings on
Exit
Function
Disables the audio portion of the system when selected (checked).
Selects the font used in Alarm Monitoring.
Saves all currently displayed alarms at the end of a session, when selected (checked).
Saves screen characteristics at the end of a session, when selected (checked). The following settings will be saved for the current user’s profile:
1. Window positions, sizes, and minimized states
2. Matrix or player mode
3. Window arrangement setting
4. Scale factor
5. List of live and recorded video windows
Note:
Windows playing video from a file will not be saved.
When the user logs back in, all the video windows previously saved will automatically be launched. Recorded video windows will be launched as live video, since recorded video time is typically not relevant later.
Save Settings Now Saves screen characteristics immediately.
Lists alarms in ascending order of time and date (i.e., oldest first), when selected (checked).
Ascending Time/
Date
Descending Time/
Date
Display Seconds
Lists alarms in descending order of time and date (i.e., newest first), when selected (checked).
Includes seconds in the displayed alarm times, when selected (checked).
50 —
revision 1
Alarm Monitoring User Guide
Options menu (Continued)
Menu option
Auto Cardholder
Display for Access
Alarms
Function
Displays the cardholder associated with an incoming alarm whenever the alarm deals with a badge id.
Automatic Map
Display
• If selected (checked), Alarm Monitoring displays the cardholder associated with access alarms.
• If not selected (unchecked), Alarm Monitoring does NOT display the cardholder associated with access alarms.
Automatically displays a map when the alarm arrives, if selected (checked) and if the associated device exists on a map. If the device exists on multiple maps, the first one found will be displayed.
Automatic
Cardholder
Display
Automatic Video
Verification
Automatic Visual
Notification
This feature must also be configured in System Administration Monitoring > Alarm
Configuration menu, Alarm Definitions tab/form.
Applies to alarms for which the Show Card Holder check box is selected in the System
Administration software. To locate this check box select the Monitoring menu and then select
Alarms. Click the Alarm Definition tab.
• If selected (checked), the corresponding cardholder view automatically displays when the alarm arrives if the alarm is related to a badge id.
• If the cardholder view is already displayed when a new alarm arrives, the new cardholder associated with the alarm is searched for and displayed.
• If not selected (unchecked), the corresponding cardholder view does not automatically display when an alarm occurs.
Applies to alarms for which the Video Verification check box is selected in the System
Administration software. To locate this check box select the Monitoring menu and then select
Alarms. Click the Alarm Definition tab.
• If selected (checked), the corresponding video verify view automatically displays when the alarm occurs.
• If not selected (unchecked), the corresponding video verify view does not automatically display when the alarm occurs.
Causes breakthrough alarms to occur. By default, this menu choice is selected (checked) in
Alarm Monitoring.
• If selected (checked), breakthrough alarms cause the Monitoring application and the
Main Alarm View to be brought to the foreground when an alarm occurs.
• If not selected (unchecked), breakthrough alarms occur in the background.
Automatic Live
Video Display
PTZ Options
Automatic visual notification must be configured for individual alarms in System
Administration. From the Monitoring menu select Alarm Configuration. Click the Alarm
Definition tab. Highlight the appropriate alarm, click the [Modify] button, select the Visual
Notification check box. Click the [OK] button. In the Alarm Monitoring application be sure to refresh the Alarm configuration through the Options menu.
Displays live video automatically when an alarm occurs, if selected (checked).
Displays the PTZ Options dialog which is used to specify the default access mode and optional locking timeout.
revision 1
— 51
2: Main Alarm Monitoring Window
Options menu (Continued)
Menu option
Display Status On
Maps
Function
Displays the status of all device icons on graphical maps.
• If selected (checked), the status of every device icon on a graphical map is displayed (e.g. reader mode, online/offline, occupancy number).
• If not selected (unchecked), the status will only be displayed for a given device as a tool tip when the mouse pointer is over the device icon.
Highlights the entire row of an alarm when selected (checked). Highlight Entire
Row
Disable Command
Verification
Displays “successful configuration” messages when commands to hardware, E-mail and pages are successfully sent.
• If selected (checked), Alarm Monitoring will NOT display “successful configuration” messages.
• If not selected (unchecked), Alarm Monitoring displays “successful configuration” messages.
Execute Command on Single Click of
Icon
Display Controller
Capacity
Display Device
Firmware Versions
Errors display in message boxes regardless of this setting.
Specifies commands to be executed on a single click. This setting may be configured for each user and saved along with other user settings.
• If selected (checked), then a single click executes the default command for the device configured in System Administration.
• If not selected (unchecked), then the default command executes on a double-click.
Displays available memory, free memory, the maximum number of cardholders, current cardholders stored in a controller, maximum number of biometric templates and the current number of biometric templates set in a controller. This information is displayed in the System
Status window and is mainly used for diagnostic purposes. By default, this option is unchecked.
• If selected (checked), the controller capacity information displays.
• If not selected (unchecked), the controller capacity information is NOT displayed.
Displays firmware version (major and minor) for downstream devices. The minor firmware version number displays as the last two digits. The firmware version of controllers and gateways displayed regardless of this option.
Note:
The firmware version is that of the interface board.
• If selected (checked), the current firmware version displays for devices including single interface readers, dual interface Rdr1 readers, BAS-1100 and BAS-1200 alarm panels, cameras and RS-485 command keypads.
• If not selected (unchecked), the firmware version displays as part of the status when the mouse pointer is over the device icon. However the firmware version of controllers and gateways always displays, regardless of this option.
52 —
revision 1
Alarm Monitoring User Guide
Options menu (Continued)
Menu option
Display Device
Serial Numbers
Function
Displays the serial number of most devices. The serial numbers are displayed in the System
Status Tree for all devices that report a serial number.
Refresh Alarm
Configuration
Note:
Stanley Dual Interface Rdr 2 readers and biometric readers do not report serial numbers. and biometric readers do not report serial numbers.
• If selected (checked), the serial number information displays.
• If not selected (unchecked), the serial number information is NOT displayed.
Causes alarm configuration information to be refreshed.
Window menu
Menu option Function
Cascade
Tile Horizontally
Tile Vertically
Places all open windows in an overlapping arrangement with the active window displayed on top.
Places all open windows in a horizontal, non-overlapping arrangement.
Places all open windows in a vertical, non-overlapping arrangement.
Arrange Icons
Close “options”
Places all minimized windows (title icons) in a row.
There are several menu options to close different windows in the Alarm Monitoring application (e.g. Close All Windows, Close System Status Windows).
Numbered choices Lists all open windows. The active (topmost) window is indicated by a checkmark.
Help menu
Menu option
Contents
Send Feedback
Index
About Alarm
Monitoring
Function
Displays online help for the currently displayed window.
Displays the Send Feedback form. From here you can launch a web feedback form and send feedback directly to Stanley.
Displays the online help table of contents.
Displays version and copyright information.
Cardholder menu
Menu option Function
Note:
This menu is only available after you select View > Badge Info from the menu options.
Show Unassigned
Assets
If selected, both assets that currently are and assets that once were (but have since been unassigned) assigned to the selected cardholder will be displayed in the listing window on the
Assets form. If not selected, only assets that are currently assigned to the selected cardholder will be displayed.
revision 1
— 53
2: Main Alarm Monitoring Window
Cardholder menu (Continued)
Menu option
MobileVerify
Function
When selected, displays the MobileVerify Options window where the gate assigned to the current MobileVerify workstation can be changed, or the system’s Force Protection Setting can be overridden.
For this option to be available, the following conditions must be met:
Keyboard Wedge
Settings
View Options
• The user must have the MobileVerify Workstation Options permission, which is set on the
MobileVerify sub-tab of the System Permission Groups form in the Users folder.
• A recommendation label must have been added to the Cardholder form using
FormsDesigner. (The recommendation label may be on a new separate tab or on the
Cardholder form.)
• The current workstation must have a gate configuration assigned to it. This is done on the
Gate Configuration sub-tab of the Workstations form in the Workstations folder.
When selected, displays the Wedge Scanner Settings window where you can configure how the B.A.S.I.S. system interprets the information it receives from a wedge reader. You must have administrative rights to the workstation when setting these options. These settings are set per workstation.
When selected, displays the View Options window from where you can choose cardholder search attributes.
If selected, allows the selected cardholder to violate anti-passback rules one time.
One Free Pass
APB Move Badge When selected, displays the Area Move Badges window from where you can move a badge to a new area.
Display Global
APB Areas
Show Last Granted
Location
Show Last
Attempted
Location
Bulk
When selected, displays the Cardholder Global Anti Pass Back (APB) Areas window. This window lists the global APB areas that the selected cardholder is currently located in.
If selected, the Last access field will display information about the most recent valid access by the selected cardholder, including the triggered event, date, time and reader name.
If selected, the Last access field will display information about the most recent access attempt
(whether access was granted or not) by the selected cardholder, including the triggered event, date, time and reader name.
Provides a sub-menu of options that can be applied to a select group of cardholder records.
First Record
Rewind
Previous Record
Next Record
Fast Forward
Last Record
Displays the first matching cardholder record.
Jumps back 10 matching cardholder records.
Displays the previous matching cardholder record.
Displays the next matching cardholder record.
Jumps forward 10 matching cardholder records.
Displays the last matching cardholder record.
54 —
revision 1
Alarm Monitoring User Guide
Cardholder menu - Bulk sub-menu
Menu option Function
Note:
The Bulk sub-menu is only available when the Cardholder menu is available.
Note:
The Bulk sub-menu options are available when a cardholder record is displayed in the Cardholders folder/ window.
Allows you to assign access levels to a select group of cardholder records.
Assign Access
Levels
Remove Access
Levels
Modify Badges
Allows you to remove access levels from a select group of cardholder records.
If selected, displays the Bulk Modify Badges window from where you can choose to update one or more of the following fields in the Cardholders folder/window: Activate Date,
Deactivate Date, Badge Status and Use Limit. You can apply a filter as to which badges you want to update, based on status and/or type. Note that when updating the Badge Status field, you must select a badge status filter.
Note:
When bulk changing the Use Limit field and enter no value it will automatically be set to 255 (unlimited).
When selected, the Bulk Segment Change window opens from where you can change a selected group of cardholder record’s segment assignment.
Change
Cardholder
Segments
Delete
Cardholders in
Search
Destroy ALL
Cardholder Data
View Log
Allows you to delete cardholders to a select group of records.
Allows you to destroy all cardholder data.
Displays the Log Viewer window from where you can view a log of bulk events.
Asset menu
Menu option Function
Note:
This menu is only available after you select View > Asset Info from the menu options.
First Record
Rewind
Displays the first matching asset record.
Jumps back 10 matching asset records.
Previous Record
Next Record
Fast Forward
Last Record
Displays the previous matching asset record.
Displays the next matching asset record.
Jumps forward 10 matching asset records.
Displays the last matching asset record.
Displays the Asset Groups and Classes Management folder/window.
Asset Groups and
Classes
Asset Types and
Subtypes
Show Assignments
X Days Past
Displays the Asset Types and Subtypes Management folder/window.
Displays the Filter Out Assignments After X Days window, which allows you to specify the number of days you want to view.
revision 1
— 55
2: Main Alarm Monitoring Window
Asset menu (Continued)
Menu option
Bulk Add Mode
Function
Enables you to quickly enter multiple Scan IDs for the same type of asset (e.g. enter multiple
Scan ID’s for 10 portable PCs). To display the Bulk Add Mode menu option an asset record must be open in the Assets folder/window.
Toolbar Procedures
How to Use the Toolbars
Alarm Monitoring utilizes one standard Windows toolbar.
If you want to:
Display the name of a toolbar button
Use a toolbar button to perform a command or function
Change the toolbar from
“anchored” to “floating”
Change the toolbar from
“floating” to “anchored”
Hide or display the toolbar
Procedure:
Point to the toolbar button with the mouse (without clicking).
Click the toolbar button with the left mouse button.
Double-click an empty area of the toolbar.
From the View menu select Toolbar. A checkmark appears next to the toolbar if it is not hidden. Toggle the toolbar to display or hide.
Alarm Monitoring Status Bar
The Alarm Monitoring status bar, located in the lower portion of the screen provides different information, depending on what window is displayed.
The Main Alarm Monitoring window displays the following information in the status bar:
• Selected alarm: the name of the selected alarm, if any. If multiple alarms are selected simultaneously, the last one that was selected is indicated here.
• Sort criteria: the information by which the list of alarms is currently sorted.
• Pending: the number of alarms that are currently pending. Pending alarms include all existing normal or initiating alarms marked as “Active” that are still displayed in the main alarm view and have not been acknowledged.
• Total: the total number of alarms currently in the window.
•
Verified mode enabled:
an access control reader that has an associated biometric reader, is in verify mode.
56 —
revision 1
System
Administrator
Procedures
Alarm Monitoring User Guide
Chapter 3: System Administrator Procedures
Note:
The Alarm Monitoring application is not only designed to monitor alarms and events, but it can also be used for a variety of administrative tasks such as adding cardholders or visitors, printing badges, adding assets to the database and assigning assets to cardholders. Depending on how the System Administrator sets the cardholder and system permissions, users with access to Alarm
Monitoring can add, modify and delete cardholder, badge and asset information as well as capture images and perform bulk operations.
This chapter assumes that an Alarm Monitoring Station has been physically set up and focuses on the procedures the System Administrator should complete to enable procedures to be performed by Alarm Monitoring Operators. Refer to the
B.A.S.I.S. release notes to determine the PC requirements for an Alarm
Monitoring Station (client or server) and refer to the Digital Video Hardware
Installation Manual for physically setting up the hardware.
Additional System Administrator procedures may be included in the
Advanced Operator Procedures on page 187.
Administrative Procedures Checklist
The administrative procedures are completed via the Administration menu in the System Administration application. Instructions can be found in the
Administration section of the System Administrator User Guide.
• Create card formats - card formats (asset, magnetic, smart card, etc.) are required to configure a reader
• Create badge types - (employee, visitor, etc.)
– printing/encoding badge options
– required cardholder fields
– badge ID allocation for generating ID numbers
– guest defaults (extended strike/held times, passage mode, deadbolt override)
• Add directories - required for single sign-on
• Set system, cardholder, monitor and field/page permissions
• Add users
– user n
– internal account and password
– directory account
– segment access
– area access manager levels
• Add Alarm Monitoring workstations - workstations are required to configure hardware devices
– add dot matrix printer via workstations folder
revision 1
— 59
3: System Administrator Procedures
Precision access mode determines the readers that cardholders have access to.
List options are created using list builder.
– connect a printer locally (directly to the Alarm Monitoring workstation).
• Set general system options
– log on authorization warning
– strong password enforcement
– number of days to save queued events
– Linkage Server host
– DataExchange server host
– KnoWho server
• Set cardholder options and visits
– maximum number of badges per cardholder
– ability to create/save photo thumbnails
– badge PIN types (4, 6 or 9-digits)
– PIN code generated (random or manual)
– precision access mode
– use or lose badge feature (change badge status to lost or returned after a specified amount of time)
– visits options
– cardholder, visitor and visit search result options
• Configure global output devices
– SMTP server settings to use when sending e-mail
– GOS paging device
– recipients of e-mail and page messages
• Configure e-mail and paging notification
– fields and display order for e-mails and paging
– fields and/or directories to check when determining who to send an email notification to
• Add segments to your installation
– enable segmentation
– segment options
• Create list options
• Set up archiving parameters
Access Control Procedures Checklist
This portion of the chapter focuses on the procedures the System Administrator should complete to enable access control and monitoring procedures to be performed by Alarm Monitoring Operators.
Note:
Be sure to complete the administrative procedures listed at the beginning of this chapter before attempting any access control and monitoring procedures.
Several access control and monitoring procedures require that certain administrative procedures be completed first. For example you must configure a workstation before you can configure most hardware devices.
60 —
revision 1
Alarm Monitoring User Guide
All System Administrator access control procedures are completed via the
Access Control or Additional Hardware menu in the System Administration application. Instructions can be found in the Access Control section of the
System Administration User Guide, as well as the Additional Hardware section.
A separate Intrusion Detection User Guide also exists if you are going to configure intrusion detection devices.
• Configure hardware devices
– dialup modem
– access panels
– readers
– alarm panels
• Additional access control configurations
– timezones (specify holidays, assign readers and modes of operation)
– access levels
– anti-passback areas (normal, safe and hazardous areas for mustering)
– alarm mask groups (un/mask multiple alarm inputs simultaneously)
– device groups (input/output readers)
– local and/or global inputs and outputs
• Configure additional hardware
– fire panels
– intercom devices
– personal safety devices
– receivers
– intrusion detection devices
Intrusion Detection Alarm Definitions
See the Alarm Definitions appendix in the Intrusion Detection User Guide for information on alarm definitions in references to customizing intrusion detection alarms.
Alarm Monitoring Operator Procedures
These procedures are used to handle intrusion detection events in Alarm
Monitoring. For specifics see the Alarm Monitoring Operator Procedures chapter in the Intrusion Detection User Guide.
revision 1
— 61
3: System Administrator Procedures
Intrusion Detection Device Statuses
See the Intrusion Detection Device Statuses appendix in the Intrusion Detection
User Guide for more information.
Monitoring Procedures Checklist
Alarm mask groups enable you to un/mask multiple alarm inputs and readers simultaneously.
System Administrator monitoring procedures are completed via the Monitoring menu in the System Administration application. Instructions can be found in the
Monitoring section of the System Administration User Guide.
• Customize alarms, instructions, acknowledgment notes and acknowledgment actions
– alarm mask groups
– customize and configure alarms
– text instructions
– audio
– acknowledgment notes
– automatic acknowledgment actions
• Configure monitor zones
– event routing group
– monitor zones
– monitoring station assignments
• Set up guard tours
– checkpoint actions
– messages and checkpoint events
– monitoring stations
– link camera devices to the checkpoints
– special instructions
• Set Monitoring Options
– associate a command with a device or area icon (enables operators to execute a command with a single and double left-click in the system status tree and map view)
Video Procedures Checklist
All the video procedures are completed via the Video menu in the System
Administration application. Instructions can be found in the Video section of the
System Administration User Guide.
• Configure video
– matrix switcher
– video devices (recorders and cameras)
– link hardware devices to a camera
62 —
revision 1
Alarm Monitoring User Guide
– alarm-video configurations
– add a video recorder to a monitoring zone
• Configure video verification
– CCTV Controller associated with a workstation
– CCTV Command (located on Access Control > Readers > Control tab)
revision 1
— 63
3: System Administrator Procedures
64 —
revision 1
Operator
Procedures
Alarm Monitoring User Guide
Chapter 4: Set Alarm Monitoring Display Options
Note:
Several windows in Alarm Monitoring can be configured to display according to user preference. These views are recreated every time the user logs into the application.
The following is a list of user-defined display options that are set from the
Configure or Options menu.
•
•
•
•
The Select Hardware View procedure displays the System Status Options
Window.
System Status Options Window
The System
Status
Options window is displayed from the System Status window.
Verify you are in the System Status window, then select Configure > System
Status Options from the menu.
You can also display the System Status Options window by clicking the System
Status icon that displays to the left of the File menu (when you open the System
Status window).
revision 1
— 67
4: Set Alarm Monitoring Display Options
Button/field
All devices
Specified devices
Description
Displays all the devices (active, offline) in the System
Status
window.
Displays specific types of devices including:
Active devices
Displays only active devices in the System Status window.
Offline devices
Displays only offline devices in the System Status window.
Masked devices
Displays only masked devices in the System Status window.
Armed areas
Displays only armed areas in the System Status window. An area is a separately configured section of an Intrusion Detection Panel, sometimes referred to as a partition. To arm an area means to “turn on” the protection for an area.
Disarmed areas
Displays only disarmed areas in the System Status window.
Areas in alarm
Displays only areas that have an active alarm triggered.
Note:
If one or more of the specified device selections are made, only devices matching those criteria display in the view.
68 —
revision 1
Alarm Monitoring User Guide
Button/field
View
Lock display updates
OK
Cancel
Help
Description
Displays information about devices in one of two formats:
Tree
Displays information in a hierarchical fashion, also called a tree or branching arrangement.
Each entry in the list represents one device. Panels have the leftmost entries and any device connected to a panel is listed below the panel and indented to the right. the search, press F3 on your keyboard.
You can search this or any tree by focusing on the list window and clicking “Ctrl+F”. To proceed through
List
Lists the following information about devices in the system:
• Device (Name)
• Parent Device (Name)
• Current Device Status
Note:
The hardware list displays separate rows for Reader Auxiliary Input and Reader
Auxiliary Output devices.
Prevents items from being added or deleted from the display window.
When the Lock display updates check box is selected an indicator on the status bar displays
“LOCKED.” Devices cannot be added to or deleted from the display window. The status of devices currently in the window update as their status changes. Then if the status of devices not in the window change, they are not added to the display window.
When the Lock display updates check box is not selected, the status bar indicator is blank.
Devices are added to and removed from the display window automatically as their device status changes. For example, if an input becomes active and the view is displaying active devices, the input will be added to the view. If the input is now restored, it will be removed from the view.
Accepts the settings and closes the window.
Closes the window without saving any changes made to the settings.
Displays help for this topic.
Display Option Procedures
Select Event Types to Monitor
If you have permission to edit alarm filters, you can apply an alarm filter to each view in Alarm Monitoring, including the main alarm view, pending alarm view, video verification view and any trace view. Each of these views can be
revision 1
— 69
4: Set Alarm Monitoring Display Options
The alarm filter determines which alarms display based on the type of event the alarm is associated with.
configured to filter out alarms independent of each other, however, only the main alarm view filter is saved from session to session.
For example, you may wish to display every alarm for a specific reader’s trace window but you may not wish to display “Access Granted” alarms in the Main
Alarm Monitoring window. You can apply both of these filters to the different views, but when the session ends, only the filters applied the main window are saved.
1. Open the window from which you want to select the events displayed. Verify this window is the active (topmost) window.
2. From the Configure menu select Alarm Filter. The Alarm Filter window displays.
70 —
revision 1
3. By default, all event types are selected (have a checkmark). If you do not want to display a particular category of events, click that option to deselect it
(remove the checkmark). Click the option again to select it.
4. Click [OK] to close the Alarm Filter window
Select Column Configuration
You can rearrange the order of the columns in any window as well as add or remove columns that display. This is done independently for each type of window. For example, if the column configuration is changed for an alarm window, this becomes the default for all alarm windows of the same type. If the
Alarm Monitoring User Guide
column configuration is changed for a given reader trace, this will become the default configuration for all reader traces.
1. Open the window from which you want to configure the columns displayed.
Verify this window is the active (topmost) window.
2. From the Configure menu select Columns. The Column Configuration window displays.
Note:
3. In the Select columns display field, click/highlight the name of a column, then click [>>]. The column name appears in the Columns to view display field.
4. Arrange the column names in the order you want them to appear. Click/ highlight a column name in the Columns to view display box. Then use the
[Up] and [Down] buttons to change the column’s relative position.
The order the column names appear in the Columns to view display field is the same order the columns will display in the window which you are configuring the columns for.
5. Click [OK] and the window displays the new column configuration.
Set Automatic Display Options
Several display options are available from the Options menu. To activate an option select it (place a checkmark beside it). To deactivate an option select it again to remove the checkmark. For information on the options available from
the Options menu, refer to Chapter 2: Main Alarm Monitoring Window on page
revision 1
— 71
4: Set Alarm Monitoring Display Options
Display Multiple Windows
1. Open the desired windows using the toolbar buttons or menu options.
2. From the Window menu select one of the following:
• Cascade
• Tile Horizontally
• Tile Vertically
3. Using the mouse, click and drag each window to resize and relocate it.
Select Hardware View Options
Hardware view options include list or tree view as well as the type of devices displayed. Users can display every device or select devices that meet a specific criteria such as active, offline and/or masked devices as well as armed areas, disarmed areas and/or areas in alarm.
1. Verify you are in the System
Status
window, then select Configure > System
Status Options from the menu.
2. The System
Status
Options window displays.
a. Select the type of device you would like to display by clicking either the
All devices or Specified devices check box. If you selected the
Specified devices check box, select the desired device by clicking the appropriate radio button (active, offline or masked devices).
b. Select the Tree radio button to view the system hardware in a tree or branching format.
c. Select the List radio button to view a list of devices, their current status and parent device.
d. Select the Lock display updates check box if desired.
3. Click [OK].
72 —
revision 1
Alarm Monitoring User Guide
Chapter 5: Monitor Devices
The System
Status
window and Device Groups window are used to monitor devices.
System Status Window
Displayed by:
The System Status window lists every access control device, area or action group defined in System Administration for a specific segment. Other configuration settings are listed in parenthesis after each device.
The System
Status
window can be displayed several ways:
• Click the triangle on the System
Status
button and select an existing window or open a new one.
Note:
Clicking the System
Status
button (not the triangle) brings up a new System
Status
window if there is none present. If a System
Status
window is already open, clicking the System
Status
button causes the default (first) window to display.
• From t to display.
• Choose one of the numbered options under the Window menu.
– Though rare, if more than nine System
Status
windows are open, the
More Windows menu option will be available. Choose a window from the list and click [OK] to bring it to the foreground.
revision 1
— 73
5: Monitor Devices
Field
Display window
Hardware Status
Bar
Description
The information in the window is displayed in hierarchical fashion, also called a tree or branching arrangement. Each entry in the list contains the name of one device. Access Panels have the leftmost entries. For a specific Access Panel, a device connected to it is listed below and indented to the right. Each device connected to those devices is listed below them and further indented. An icon to the left of each entry identifies the entry’s type.
Located on the lower right portion of the screen, the status bar on the System Status window has four counters:
Viewing: Shows the number of devices viewed.
Active count: Shows the number of active points in the monitoring zone. This is NOT the same as the number of active devices. For example, if a reader is in the Door Forced Open,
Door Held Open and Reader Tamper states, the active count is increased by three. The active device number is not increased.
Offline count: Shows the number of offline devices in the Monitoring Zone. Every device is counted including alarm inputs, reader auxiliary inputs, alarm outputs and reader auxiliary outputs.
Mask count: Shows the number of masked points in the monitoring zone.
MUSTER MODE: This portion of the status bar only displays when a Monitoring Zone is in
Muster mode.
Device Groups Window
The Device Groups window displays the currently configured device groups within a monitoring zone and is expandable in the tree view. The Device Groups window allows operators to view, test and change the status of devices (cameras, remote monitors, readers, inputs and outputs).
74 —
revision 1
Toolbar Shortcut
Alarm Monitoring User Guide
To display the Device Groups Window, click the View Device Groups toolbar button or select Device Groups from the View menu
revision 1
— 75
5: Monitor Devices
Device Group Test Mode Window
Similar windows display for the test access grants, test forced open and test inputs for device groups. The example below is a Test Inputs for an input device group.
Field
Upper status bar
Upper display window
Lower display window
Lower status bar
Description
Displays information about the upper display window and includes the total number of devices tested, the number of devices that pass and fail, what time the test started and the current status of the device test.
Displays the device name, test status, alarm description, number of inputs or requests received and the current device status. The information displayed in this window can be sorted by any column.
Displays a variety of user-defined columns that can be sorted. Users can select whether the following columns display: Alarm Description, Time/Date, Controller, Device, Input/Output,
Card, Priority, Asset Scan ID, Asset Name, Intercom Station Called, Controller Time,
Transmitter, Transmitter Input, Biometric Score, Account Group, Badge Type, Text, Line
For more information, refer to Select Column
Displays information about the lower display window and includes the name of the currently selected alarm, sort criteria, trace type and the total number of alarms listed.
Device Group Icons
The table below identifies the different icon groups available.
Icon Description
B.A.S.I.S. System
Alarm Mask Group
76 —
revision 1
Alarm Monitoring User Guide
Icon Description
Camera Group
Reader Group
Alarm Input Group
Alarm Output Group
Monitor Group
Hardware Device Icons
The table below identifies the different icons available. To view a list of icons and icon groups available in your database, as well as add or modify icons, open
MapDesigner and select Edit > Icon Library.
Icon Description
Access Panel
Alarm/Camera Input
Alarm/Camera Output
Alarm Panel
Camera
Note:
The Camera icon flashes when there is motion detected with the associated camera.
The CCTV Camera icon turns green when there is sound with the associated camera.
CCTV Monitor
CCTV Panel
Facility Utilization Gate
Fire Panel
Function List
IntelligentVideo Application
IntelligentVideo Server
revision 1
— 77
5: Monitor Devices
Icon Description
Intercom Exchange
Intercom Station
Intrusion Area
Intrusion Door
Intrusion Offboard Relays
Intrusion Onboard Relays
Intrusion Panels
Intrusion Zones
Matrix Switcher
Offline Lock Panel
DataConduIT Device
DataConduIT Source
DataConduIT Sub-Device
PC Panel
Personal Safety Device Panel
Reader
Receiver
Remote Monitor
Remote Monitor Video Cell
Segment (only if your system is segmented)
Device Status
Alarm Monitoring is the only application that displays the status of hardware devices. Alarm Monitoring obtains the status of a device from the
78 —
revision 1
Alarm Monitoring User Guide
Note:
Communication Server, which in turn obtains the device status from hardware controllers.
Status icons are located to the left of hardware device icon. There may be one icon or a combination of icons, depending on the hardware status.
The status of the device is displayed after the entry in parentheses. If viewing the icons on a map, the device status is displayed in parentheses after the icon or as a tool tip when the mouse pointer is over the device icon. This is determined by whether the Display Status on Maps option in the Options menu is checked.
To view a list of current hardware status icons in your database, as well as add additional icons, open MapDesigner and select Edit > Icon Library.
Offline Hardware Devices
Important:
The Communication Server must be running in order for the proper offline status to be reported in Alarm Monitoring.
Devices can be marked offline for two reasons: The connection may be broken or it can intentionally be set offline. In Alarm Monitoring a different color “X” is used to differentiate those items that are intentionally taken offline to those that have a broken connection.
Broken Connection
An “ X ” through an icon indicates a broken connection, meaning that the software cannot communicate to the device. For example:
If a child device is offline then the parent device is examined. If both child and parent are found to be offline then an “ X ” is used for both devices. If only the child device is offline then an “ X ” is used for just the child device.
Although surveillance-only cameras are not associated with a physical video recorder, they are assigned to a virtual “surveillance-only recorder” to maintain consistency in the user interface. For example, the Alarm Monitoring hardware tree below shows two surveillance-only cameras assigned to a virtually surveillance-only recorder which serves only as a placeholder to group cameras.
A 16-bit OEM code can be programmed into the device which allows for a check to occur in Alarm Monitoring. If the OEM code doesn’t match the hardware, an
revision 1
— 79
5: Monitor Devices
Invalid ID transaction is generated and the device will not come online. The system status tree will show the status as offline and list the invalid OEM code.
Marked Offline
Many items can be marked offline intentionally in System Administration. When items are marked offline, a black "X" appears on those items in Alarm
Monitoring. A black "X" also appears for those items that are deleted from the system. Deleted items are also marked with text that reads “deleted.”
A list of items that can be marked offline are: Alarm inputs, Cameras, Camera
Inputs, Camera Outputs, Elevator Dispatching Panels, Fire panels, Intercom devices, Intrusion Detection Devices, Stanley access panels, OPC Connections,
Personal Safety Devices, POS Devices, Receivers, SNMP Managers, Video
Recorders.
Items that show a black “X” if their parent device has been marked offline include: Alarm inputs Alarm Mask Groups, Alarm outputs, Alarm panels, Antipassback areas, Camera Inputs, Camera Outputs, Cameras, Elevator dispatching terminals, Fire Devices, Fire Inputs/Outputs, Intercom stations, Intrusion Areas,
Intrusion Doors, Intrusion Onboard/Offboard relays, Intrusion zones, Local function lists, OPC Sources, POS Register, Readers.
Map items need to be configured, in MapDesigner, to use the current state of the device rather than a default icon in order for the proper icons to be shown on the map.
Procedures for Monitoring Devices
Update the Hardware Status
Hardware status information displays in several Alarm Monitoring windows.
When alarms and actions occur in the system, B.A.S.I.S. software updates the status information “live” for the affected hardware. Operators can also choose to have the status updated on demand.
1. Select Update All Hardware Status from the Control menu or by rightclick an alarm, access panel, alarm panel, alarm input, relay output or reader.
2. The update all hardware status feature polls the currently selected device and updates the hardware status of the associated devices. A message displays when the update is complete.
80 —
revision 1
Alarm Monitoring User Guide
Note:
If you are running Apollo hardware, there is a Hardware Status Update
Frequency window to set automatic updates. You can set the frequency to
No Updates, 10, 15, 20, 30 or 60 minutes (by selecting Hardware Status
Frequency from the Configure menu).
Perform a Device Test
Operators can perform a test on various devices in the system. A special test mode operation is available for Input Groups, Reader Groups (Door Forced) and
Reader Groups (Access Grants). Performing this test allows you to see which devices generated alarms and which ones did not.
1. Display the Device Groups window by selecting View > Device Groups.
2. Right-click the device group and select the Test Inputs, Test Door Forced or Test Access Grants. If you select Test Access Grants, skip to step 7 .
3. A dialog box appears:
Note:
4. You have two choices. Choose Show alarms only in Test Mode windows if you do not want the results to show up on any Monitoring Station. Otherwise choose Show alarms in all windows on all Monitoring Stations.
5. Type in the duration (in minutes) of the test. This option is available only if you selected Show alarms only in Test mode windows.
6. Click [OK] to initiate the test.
7. A Test Mode window launches. The top portion of the window lists all the devices being tested and their current status (whether the test was successful/ unsuccessful). Devices that failed the test flash in red. The bottom portion of the window displays a trace of the related alarms.
8. When the test is finished, all the windows and monitoring stations resume their normal display of alarms.
Device status is not available for Matrix Switchers or Account Panels.
revision 1
— 81
5: Monitor Devices
Locate or Search for a Device
Operators can locate or search for a device in any window in Alarm Monitoring.
1. Display any Alarm Monitoring window.
2. Verify your cursor is in the window.
3. Begin typing the name of the device. The system automatically scrolls to the first occurrence of those letters in column one.
View the Last Connection Time for Dialup Panels
The Last connect time status is displays in parenthesis after each dialup panel. It reflects the time of the panel’s last “Communications Restored” event and is updated every time you disconnect from the panel.
To view a dialup panel’s Last connect time within Alarm Monitoring, locate the dialup panel in the System
Status
window. In parenthesis after the name of the dialup panel, the Last connect time is listed.
Last Connection Time Guidelines
The following are guidelines for the Last connect time status:
• If a dialup panel has never connected, the Last connect time for it is “Never”.
• If a dialup panel connects while Alarm Monitoring is not running, the Last connect time for it is retrieved from the database when Alarm Monitoring starts up again.
• When a dialup panel is disconnected, the System
Status
window immediately reflects the new Last connect time regardless of whether the
“Communications Lost” alarm is acknowledged or not.
• When a dialup panel and Alarm Monitoring station are in different time zones, the Last connect time displays both the local time and the panel time.
Download the B.A.S.I.S. Database or Firmware
Operators can download the B.A.S.I.S. database and/or firmware to devices via
Alarm Monitoring. Devices include access panels (BAS-500, BAS-1000, and
BAS-2000), dual interface Rdr1 readers, alarm panels, RS-485 command keypads and cameras.
82 —
revision 1
Alarm Monitoring User Guide
Notes:
It is not possible to download firmware to single reader interfaces.
It is only possible to download firmware to BAS-1320 version B dual reader interfaces through the primary reader.
It is only possible to download firmware to BAS-CK command keypads connecting directly via RS-485 interface cable.
It is only possible to download firmware to BAS-500B gateways communicating to RSI Handkey, Identix Fingerprint and Bioscrypt
Fingerprint Biometric readers (number 0 only).
Toolbar Shortcut
1. Open Alarm Monitoring and display the System
Status
window by selecting
View > System Status and then the desired window.
2. Right-click the device in the hardware view and select Download Database,
Download Firmware or Download Reader Firmware.
View the Controller Properties
The type of firmware a controller has is indicated in the firmware revision reported in the Alarm Monitoring hardware view. It can also be found in the diagnostic tab of the access panels folder in System Administration and in the main window of the Controller Encryption Configuration Utility, which can be found in the B.A.S.I.S. directory.
Note:
If the firmware on the BAS-500, BAS-1000, and BAS-2000 controllers is not up to the latest version that is in the release a “[Not current]” tag will be noted on the firmware version string.
Note:
The flash chip size is indicated in the Alarm Monitoring controller properties dialog box, which you get to by right-clicking on the controller and selecting properties. It can also be found in the diagnostic tab of the access panels folder in
System Administration.
If the current firmware revision in the controller is older then 3.041 the controller will not report its flash size and it will not be indicated in any utility.
The current DIP switch settings for a given controller are indicated in the Alarm
Monitoring controller properties dialog box, which you get to by right-clicking on the controller and selecting properties. It can also be found in the Diagnostic tab of the access panels folder in System Administration.
BAS-2000 and BAS-3000 boards show the Communications Path Status, which indicates which of their dual path connections are active. The value of this status can be either Primary or Secondary/Failover. The secondary connection is only used when a problem with the primary problem has occurred. This status can also be seen in the System Status Tree of the controller.
revision 1
— 83
5: Monitor Devices
There is an additional property, Selective Cardholder Download, which is either enabled or disabled in the controller properties of an Access Panel. If you update the selective download configuration in System Administration, you can perform an Update Hardware Status in Alarm Monitoring to see the changes.
84 —
revision 1
Alarm Monitoring User Guide
Chapter 6: Trace Alarms and Events
Note:
B.A.S.I.S. allows you to trace the alarms and events associated with a monitor zone, controller, device, badge, asset or area. This includes events from third party DataConduIT sources.
Trace permissions for a Monitor Permission Group are set in System
Administration or ID CredentialCenter in Administration > Users >
Monitor Permission Groups tab > Monitor sub-tab.
Trace Configuration Window Overview
The Trace Configuration window performs live and historical traces of events and is displayed by:
• Selecting the Trace menu and then the type of device you wish to trace.
Click [OK] when B.A.S.I.S. prompts you to verify the name of the device to be traced.
• Right-clicking an alarm and selecting Trace and then the device you wish to trace.
• If tracing a badge you are first introduced with the following dialog box.
Type the badge ID you wish to trace and click [OK].
revision 1
— 85
6: Trace Alarms and Events
Trace Configuration Window
Trace Configuration Window
Field
Perform historical trace
Today
Start
End
Apply start and end time to each day
Use restored transactions
Description
If the check box is selected, the trace will include events that occurred between the Start and
End date/times you specify.
When clicked, the Start and End fields populate with the following:
• Start and End date: the current day’s date
• Start time: 00:00 on the current date
• End time: 23:59 on the current date
The first date/time combination that the trace displays events for
The last date/time combination that the trace displays events for
If the check box is selected, the time range is applied to each day within the date range.
For example: A trace has a Start date/time of 12/1/2003 9:00 and an End date/time of 12/9/
2003 17:00.
• If the Apply start and end time to each day check box is checked, then the trace will include only those events that occurred during the hours of 9:00 a.m. through 5:00 p.m. on the days December 1 st
through December 9 th
, 2003.
• If the Apply start and end time to each day check box is not checked, then the trace will include all events that occurred from 9:00 a.m. on December 1 st
until 5:00 p.m. on
December 9 th
.
This option is applicable only when a historical trace is performed.
• If the check box is selected, restored transactions will be included in the historical trace.
• If the check box is not selected, normal transactions from the EVENTS table will be used for the historical trace.
86 —
revision 1
Alarm Monitoring User Guide
Trace Configuration Window (Continued)
Field
Perform live trace
Description
Controls whether new events are displayed or not
Show only those alarms which have marked video
Alarm Filter
OK
Cancel
Help
• If the check box is selected, the trace displays new events.
• If the check box is not selected, live tracing is disabled and new events are excluded from the trace.
Controls whether alarms (events) that have marked video are displayed or not.
• If the check box is selected, live tracing shows events that are new AND are configured
(in the System Administration application) to have video marked for them. The marking is not instant, so the trace may not show the icon in front of the event right away.
• When the Show only those alarms which have marked video check box is checked and the Perform historical trace check box is checked, the trace will show events which have video marked for them, regardless of the current alarm-video configuration in the System Administration application. This means that a video-only trace may exclude some alarms seen in the main alarm view with a icon in front of them.
Enables you to configure the type of events that will be displayed for a trace. When clicked, the Alarm Filter window opens.
Performs the trace using the settings selected and closes the Trace Configuration window. A
Trace Monitor window will open, which looks identical to the Main Alarm Monitoring window, but displays only those alarms that are associated with the trace criteria specified.
Cancels the pending requested action.
Displays help for this topic.
Procedure for Tracing
Trace Alarms and Events
B.A.S.I.S. allows you to trace the alarms and events associated with a monitor zone, controller, device, badge, asset or area. This includes events from third party DataConduIT sources.
1. Select (highlight) an alarm, event or device you want to trace.
2. Do one of the following:
• Right-click and select Trace. Then select Controller, Device, Badge,
Asset or Area.
• From the Trace menu select Controller, Device, Badge, Asset or Area.
• Click the toolbar button that corresponds to what you want to trace.
Choices include:
Traces a Controller
revision 1
— 87
6: Trace Alarms and Events
Note:
Traces a Device (including alarm outputs, reader aux inputs and reader aux outputs)
Traces a Badge
If you are tracing a badge the Trace Badge window displays asking you to verify the Badge ID. Click [OK].
3. The Trace Configuration window displays.
4. To perform a historical trace, select the Perform historical trace check box and select the Start and End dates.
• Optional - You can also select the Apply start and end time to each
day or the Use restored transactions check box.
5. To perform a live trace, select the Perform live trace check box.
• Show only those alarms which have marked video check box unchecked
6. To view only alarms with video select the Show only those alarms which
have marked video check box.
7. Click [Alarm Filter] to select the types of events that will be displayed for this trace.
8. In the Alarm Filter window, select (place a checkmark beside) the alarm types you want displayed.
9. Click [OK].
10. In the Trace Configuration dialog, click [OK].
11. B.A.S.I.S. will open a new Trace Monitor window that looks identical to the
Main Alarm Monitoring window, but only displays alarms that are associated with the trace.
88 —
revision 1
Alarm Monitoring User Guide
Chapter 7: Video Monitoring
Toolbar Shortcut
The Video Monitoring window displays live video only. To view recorded video you must use the Video Player.
The Video Monitoring window performs the following function:
• Displays live video from one camera at any given time.
The Video Monitoring window is displayed by:
• Selecting the Video Monitoring toolbar button.
• Selecting View > Video Monitoring from the menu.
Video Monitoring Window
Field
Device Groups listing
Display area
Description
Lists the available video device groups. A device group can contain devices from more than one access panel.
Device groups can also be segmented and belong either to one segment or all segments. If a device group belongs to only one segment, the group will contain only devices associated with the access panel defined for that segment.
Displays a specific camera view - live.
revision 1
— 89
7: Video Monitoring
Video Monitoring Window Procedures
View the Video Tour
The Video Tour is used to view a group of cameras successively. These cameras are defined as a device group in the Groups folder of System Administration. The
Video Tour feature is only available for online cameras/recorders.
Toolbar Shortcut
1. Launch the Video Monitoring window by either selecting the Video
Monitoring toolbar button or choosing Video Monitoring from the View menu.
2. Verify the cameras/recorders are online. If the device icon does not have a red “ X ” through it the device is online.
3. Right-click a camera device group and select Configure Video. The Video
Tour window displays.
4. Select the desired View time and click [OK]. This is the amount of time each camera is displayed in the tour.
5. Right-click the camera device group again and select Start Tour. The right side of the window displays the camera views.
Video Player
The Video Player performs the following functions:
• Displays live or recorded video from one camera
•
Displays live or recorded video from a group of cameras successively
• Displays video from a group of cameras or a recorder simultaneously.
• Displays recorded video associated with a video search
• Enables you to pan, tilt and zoom recorded and live video
90 —
revision 1
Alarm Monitoring User Guide
The Video Player is displayed by right-clicking an alarm, device, camera or camera device group and selecting Launch Video.
Note:
Refer to the Video Player Status Bar Table on page 93 for the descriptions of the status bar components, A-F.
Video Player Menu and Toolbar Buttons Table
Field Toolbar button
Description
Play menu
Control menu
Contains the following menu options:
Live: Plays live video from one or several cameras depending on the view settings.
Recorded: Plays recorded video for the selected camera(s).
File: Plays video clips from a file.
Note:
A checkmark displays beside the option that is active.
Load Layout: Restore a previously saved video matrix layout.
Save Layout: Save the current video matrix view as a new layout.
Contains several options to play, pause and stop video as well as advance video, adjust playback speed, search video, mute audio and remove cameras from the Video Player window.
revision 1
— 91
7: Video Monitoring
Video Player Menu and Toolbar Buttons (Continued)Table
Field Toolbar button
Description
Options menu
View menu
Play button
Contains options to load video files, set start/end times to view recorded video, export video to a file, capture images from video, create video events, modify video performance (frame rate, quality, and video acceleration), and configure
PTZ tours and presets.
Contains options to change how cameras views are displayed.
Plays recorded video.
Pause button
Stop button
Frame
Advance button
Fast Forward
End button
Previous
Camera
Next Camera
Pauses or temporarily stops playing recorded video.The video will continue from where it temporarily stopped when the play button is clicked.
Stops playing recorded video and resets the player to the beginning of the video.
Advances video one frame at a time.
Video Layout
Activate PTZ
Activate
Digital PTZ
Display window
Status bar
Advances (fast forwards) video to the last frame.
Displays the previous camera view. This feature only applies when you have opened multiple images and the Video Player is in single view mode.
Displays the next camera view. This feature only applies when you have opened the Video Player so that you can view multiple images and you are currently in single view.
Displays the selected visual matrix of video cells. Options include single view, matrix view, and static templates (1x1, 2x2, 3x3, 4x4, 13+1, 1+5, and 5+1).
Enables PTZ commands for supported cameras.
For more information, refer to Pan, Tilt, and Zoom
Enables digital zoom for PTZ cameras.
Displays live or previously recorded video.
For information on the status bar please refer to
Video Player Status Bar
Table
on page 93.
92 —
revision 1
Alarm Monitoring User Guide
Video Player Status Bar Table
Symbol
A
Description
When live video is playing the status bar displays the camera name.
If an LNVR is offline, the video player can connect directly to an IP camera to display live video. A direction connection to the IP camera is indicated in the video player status bar by a icon.
B
E
F
C
D
When recorded video is playing the status bar contains two arrow heads . You can click the arrow heads to change the information displayed to any of the following:
• Camera name
• Video start date and time
• Video start date/time and end date/time
Move the slider back and forth to view video at different dates/times. You do not need to pause or stop video to use the video display slider.
Note:
Cameras configured with an LNVR recorder display different colors in the slider for different types of recorded video.
•
Red - video is not available (e.g. a download was performed, LNVR was disconnected or restarted)
• White - video is not being recorded (e.g. time lapse recording)
• Green - video is being recorded (e.g. continuous recording or time lapse recording)
• Black - time synchronization (e.g. a third-party application has updated the time on the LNVR)
• Gray - video has not been cached on the client yet
Video start time. Use this feature to adjust your video search.
Determines how fast the video is played as well as searched. Using the cursor click near the minus symbol to slow the video down or click the plus symbol to speed the video up. You can also adjust the speed by clicking and dragging the speed bar arm.
Video end time. Use this feature to adjust your video search.
Set the volume level for the camera with audio recording enabled. Click the icon to toggle mute.
A red X will appear when the audio is muted.
Daylight Saving Time
To search video that was recorded the hour before or after the Daylight Saving
Time changeover, you must perform two searches instead of one. For example, in the Eastern Standard Timezone the Daylight Saving Time changeover occurs at
2:00 a.m. To view video that was recorded between 1:00 a.m. and 3:30 a.m., perform two searches. For the first search, specify 1:00 a.m. for the start time and
1:59:59 for the end time. For the second search, specify 3:00:01 a.m. for the start time and 3:30 a.m. for the end time. Use this same technique when exporting video recorded during the changeover time.
Attempting to play or export a continuous video clip with a start time before 2:00 a.m. to an end time after 3:00 a.m. is not recommended and may result in undesired playback behavior. For this reason, search and/or export recorded
revision 1
— 93
7: Video Monitoring
video before the Daylight Saving Time changeover separate from video after the changeover.
Troubleshooting
If you receive the message: “The end time must not be before the start time.” set the End time to 1:59.59 a.m. not 2:00:00 a.m.
If you receive the message: “The time requested is not available on the Video
Recorder, and could not be located on the Video Archive Server.” set the Start time to 3:00:01 a.m. not 3:00:00 a.m.
Customize Overlay Information Dialog
The Customize Overlay Information Dialog displays when you export video in
an “.ASF” format and you click [Customize]. For more information, refer to
Customize Overlay Information Dialog on page 536.
94 —
revision 1
Performance Dialog
Adjustments to the Video Player can be made to enhance performance by limiting the frame rate, decompression, video acceleration, and edge enhancement. The Performance dialog is displayed by selecting Options >
Performance from the Video Player window. Settings are configured and stored for the monitoring station and apply to both live and recorded video. Any changes to performance settings take effect after the Video Player is restarted.
Alarm Monitoring User Guide
Video Player - Performance dialog
Field
Frame rate limit
(LNVR only)
Decompression
Quality (LDVR-408 and LDVR-444 only)
Edge Enhancement
Filter (LDVR-408 and LDVR-444 only)
Video Acceleration
OK
Cancel
Help
Comment
Limit the frame rate displayed by the Video Player. Useful for remote clients that have limited bandwidth.
Determines the quality of the video decompression which influences the size of the image displayed in the Video Player. The lowest decompression setting produces a smaller image and requires fewer resources from the client computer.
Determines whether the LDVR decoder should favor smooth images or detail. Lower values produce smoother images, but loose some small details. Higher values produce a grainy image, yet emphasize and sharpen details.
Used for troubleshooting problems displaying video related to the video card or device drivers.
Full acceleration utilizes the video card, thus freeing the computer CPU and memory for other tasks. Additionally, Windows Display Properties has a Hardware Acceleration setting on the
Troubleshoot tab of Advanced Settings that may be used for troubleshooting.
Note:
Some video cards and device drivers may produce varying results. Adjust the value to each level to find the one that generates the desired effects.
Save settings and return to the Video Player window.
Note:
You must close the Video Player for the changes to take effect.
Close the Performance dialog without saving changes.
View help for this topic.
revision 1
— 95
7: Video Monitoring
Video Monitoring Features
Buffering Streaming Video
Buffering of live and recorded video reduces the amount of network bandwidth used by buffering the video on the client machine for playback. Video may be viewed multiple times from the client rather than requesting the video from the video recorder repeatedly.
This feature enhances live video mode by allowing the user to review live video that has been cached without switching to recorded video. The live video toolbar now displays a slider which can be used to navigate the cached video. The current time of the video is displayed in the toolbar. The live video cache retains a maximum of 10 minutes. The maximum size per cached video stream is 50 MB of RAM. Live video can be paused, resumed, slowed, or accelerated. Live video play will resume if video is paused or slowed down until it reaches the beginning of the cache or if video is accelerated to the current time.
Buffering of recorded video occurs during playback. During video playback, recorded video is cached in 10 minute increments.
To turn off the buffering of live and/or recorded video on a per workstation basis, add the following lines to the [DigitalVideo] section of the ACS.INI file:
• To turn off live: BufReader0=0
• To turn off recorded: BufReader2=0
To turn buffering back on, remove the line(s) above or set the value equal to 1.
Browser-based VideoViewer
An alternative to using the video player is to use the browser-based VideoViewer.
The browser-based VideoViewer has some enhanced feature capabilities that are not available in Alarm Monitoring. Some of these features include:
• More flexible recorded video viewing options
• Robust layout manipulation
• Better joystick control with the use of buttons
For more information about these features, refer to the VideoViewer (Browserbased) User Guide.
The browser-based VideoViewer can be launched from Alarm Monitoring. The
Use browser-based VideoViewer option located in the right-click menus of supported video devices can be used to enable this feature on a per workstation basis. A check mark next to the menu option indicates that the feature has been enabled. Once the Use browser-based VideoViewer option has been enabled, all manual requests for live and recorded video will be displayed in VideoViewer.
To use the browser-based VideoViewer, the Web Application Server must be fully installed and configured. For more information, refer to the Installation
Guide.
96 —
revision 1
Alarm Monitoring User Guide
Camera Lookup
Camera lookup is used to locate a specific camera or multiple cameras by name.
The search permissions can be configured to include only the current monitor zone or the entire system. To perform a camera lookup, right-click the monitor zone or camera device group in Alarm Monitoring and select “Camera lookup...”
Searches initiated from the monitor zone will have the results highlighted in the
System Hardware Tree and searches initiated from a camera device group will have the results highlighted in the Device Groups window. Searches that return results outside of the current monitor zone or device group will be added to the monitor zone or device group.
The extent of the search is limited by a user permission on the Users > Monitor
Permission Groups > Video sub-tab. To enable a user group to search for cameras across the entire system, select the Camera lookup includes all
monitor zones check box. In segmented systems, users must have segment access to the segment in which the cameras video recorder resides for it to appear in the search results.
When a search is performed, the Camera Lookup dialog is displayed. The
Camera Lookup dialog message indicates whether the search will be performed in the current monitor zone or across the entire system. The search is performed by entering a portion of the camera name, wildcard characters (*) are not used.
For example, a search for “hall” would return cameras named “Hallway”, “Main hall”, and “Hall stairwell” if they existed in the system.
If a single camera is found it is highlighted in the System Hardware Tree or
Device Groups window. If multiple cameras are found that match the string entered, they are displayed in the Select Cameras dialog. Multiple cameras can be selected for addition to the monitor zone by placing a check mark beside each camera. The first selected camera will be highlighted and additional selected cameras will be added to the monitor zone if they are not already included. This addition to the monitor zone is temporary and restricted to the current Alarm
Monitoring session, camera additions are not saved per user or workstation.
Two-way Audio
Two-way audio enables communication between a monitoring workstation and a camera equipped with a microphone and speakers. A workstation can communicate with a single device or multiple devices simultaneously. A microphone or a pre-recorded file can be used to send audio to the device.
Audio quality is dependent on the quality of the hardware. The two-way audio streams are retrieved by the client directly from the camera. Audio sent to the camera from the client is not captured by the video recorder and cannot be recorded.
Two-way audio is enabled on the Audio tab of the Camera form in System
Administration. If the selected camera does not support two-way audio, the
Allow Two-Way Audio check box will be grayed out. Two-way audio devices may support full or half-duplex. Full duplex allows simultaneous two-way communication, while half-duplex allows communication in one direction at a
revision 1
— 97
7: Video Monitoring
Note:
time. The Two-Way Audio check box on the Users > Monitor Permission
Groups > Video sub-tab determines user permissions for the feature.
Two-way audio is controlled by the Two-Way Audio Communication dialog.
This dialog can be launched from the right-click menu of a supported camera in the System Status Tree in Alarm Monitoring or from the Play menu in the video player or VideoViewer. If the camera is either not configured or not supported for two-way audio, the option will be grayed out. All devices are controlled from the same Two-Way Audio Communication dialog. Each device can be controlled individually or multiple devices can be controlled simultaneously by selecting the check boxes of the devices and using the Multiple Selection Controls portion of the dialog.
Two-way audio is not available if the camera is in MPEG4 mode.
Two-way Audio Communication Dialog
Field(s)
Device name and status
Talk/End Talk
Description
The name of the device is displayed with each control with the status of the device in parenthesis. Statuses include:
• Active - The device is currently being controlled.
• Inactive - There is a connection to the device, but the controls are not currently in use.
• Connecting - An attempt is being made to connect to the device.
• Communication error - There is a problem connecting to the device.
This button begins and ends transmission from the monitoring workstation to the camera using a microphone. The [Talk] button changes to [End Talk] while the connection is active.
This button is disabled under the following conditions:
• A file is currently being sent.
• A connection is being established to the device.
• The camera supports only half-duplex mode and [End Listen] is currently active.
98 —
revision 1
Alarm Monitoring User Guide
Two-way Audio Communication Dialog
Field(s)
Listen/End Listen
Description
This button begins and ends transmission from the camera to the monitoring workstation. The
[Listen] button changes to [End Listen] while the connection is active.
Send File/End
Send File
Reconnect
Device check boxes
Close button (Red
X)
Multiple Selection
Controls
Select all
This button is disabled under the following conditions:
• A connection is being established to the device.
• The camera supports only half-duplex mode and [End Talk] or [End Send File] is currently active.
This button begins and ends transmission from the monitoring workstation to the camera using an audio file. The [Send File] button changes to [End Send File] while the file is being transmitted.
When [Send File] is pressed, a dialog allows you to browse for an audio file. Only the .WAV
8kHz 16-bit PCM file format is supported. To cancel the file before it is complete, press [End
Send File].
This button is disabled under the following conditions:
• [End Talk] is currently active.
• A connection is being established to the device.
• The camera supports only half-duplex mode and [End Listen] is currently active.
This button is displayed when the connection to the camera is lost or cannot be established.
When clicked, an attempt will be made to reconnect to the camera.
Select the check box for each device that you wish to control using the Multiple Selection
Controls portion of the dialog.
Each device control includes a close button (red X). Pressing this button closes the connection to the device and removes the control from the dialog. If the dialog contains only one control, the dialog is closed.
These buttons are used in conjunction with the device check boxes to control multiple devices simultaneously from one set of controls.
Select this check box to select all devices for use with the Multiple Selection Controls.
Deselect this check box to clear the check boxes for all devices.
Video Monitoring Procedures
Launch Video (Live/Recorded) From a Camera
1. To launch video in the VideoViewer complete one of the following:
• Double-click a camera.
• Drag and drop a camera, camera device group or recorder into the display window or Video Player. If you drag and drop a device group or
revision 1
— 99
7: Video Monitoring
recorder into the Video Player, the first camera in the group that was added to the database displays.
2. To launch video in Alarm Monitoring complete one of the following:
• In an alarm window right-click an alarm with associated video and select Launch Video. Recorded video will be launched with the start time of the active alarm, including pre-roll if configured.
• In a map or System
Status
window right-click a device icon and select
Launch Video.
• In the Device Group window right-click a camera icon and select
Launch Video.
• In the Video Monitoring window double-click an online camera or right-click a camera icon and select Launch Video.
• Drag and drop a camera, camera device group or recorder into the Video
Player. This launches ALL of the video cameras in that particular group or recorder (up to 32 cameras at once).
3. To view live video select Live from the Play menu.
4. To view recorded video select Recorded from the Play menu.
Export Video to a File
Video can be exported to a file using the Video Export dialog from the Video
Player. For more information, refer to Export Video to a File on page 537.
Load and View a Video File
1. Display the Video Player. For more information, refer to Video Player on page 90.
2. Select Load File from the Options menu.
3. The Open window displays. Select the correct “.info” file, and click [Open].
The recorded video automatically plays.
4. To replay the video file click the Stop toolbar button and then click the Play toolbar button.
Monitor Video of a Specific Camera
To monitor video of a specific camera in Alarm Monitoring complete one of the following:
• In the Video Monitoring window double-click an online camera to view live video.
• In an alarm window, map or System
Status
window right-click a device icon and select Launch Video to view live or recorded video.
• In the Device Group window right-click a camera icon and select Launch
Video to view live or recorded video.
• In the Video Monitoring window double-click an online camera or rightclick a camera icon and select Launch Video.
100 —
revision 1
Alarm Monitoring User Guide
Toolbar Shortcut
• Drag and drop a camera into the Video Player.
• If the Video Player is in matrix view, select Single View from the Video
Layout toolbar button. Click the Previous Camera or Next Camera toolbar buttons to view a specific camera.
• In the Video Player select Camera from the View menu. A sub-menu lists the currently displayed cameras. Select the camera of your choice.
About Surveillance-Only Cameras
Surveillance-only cameras support live video only, they cannot record or playback video, whereas IP (Internet Protocol) cameras can. IP cameras are directly connected to the network with their own IP address. They do not need to be connected to a computer or a video capture card. More advanced IP cameras may provide additional functionality such as a built-in web server, motion detection, alarm inputs/outputs and e-mail and FTP support.
Switch Camera Views Displayed in Video Player
Cameras and device groups can be dragged and dropped from the camera list into the Video Player for viewing.
Monitor Video of Multiple Cameras (Successively)
You can use the Video Player or the Video Monitoring window to monitor video of multiple cameras successively. To monitor video using the Video Monitoring
window, refer to View the Video Tour on page 90. To monitor video of multiple
cameras in matrix mode, refer to Matrix View on page 116.
Toolbar Shortcuts
To monitor video of multiple cameras successively using the Video Player:
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. Click and drag every camera or camera group, you will want to view, into the Video Player.
3. From the View menu select Camera. A sub-menu displays. Select the desired camera view.
4. Repeat step 3 to view different cameras successively or click the Previous
Camera and the Next Camera toolbar buttons.
revision 1
— 101
7: Video Monitoring
Capture an Image
You can capture images from live and recorded video. Images are saved as
“.JPG” files.
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. Verify one camera view is selected; the status bar for a selected camera is blue - not gray.
3. From the Options menu select Capture Image.
4. The Multimedia Capture window is displayed.
5. Click [Export]. The Save As window is displayed.
6. Enter a file name and click [Save]. If the photo is bitmapped and the crop window is used, the portion of the image within the cropped area is saved.
Otherwise, the whole photo is saved.
7. Click [OK].
Create a Video Event
Video events are automatically created in Alarm Monitoring if a camera is correctly added to a video recorder, hardware is linked to the camera and an alarm-video configuration is established.
You can also manually create a video event to lock/mark video at the exact start and stop times you desired. For example, if the B.A.S.I.S. system automatically creates an event for a door forced open, but you want the event to include 5 seconds after the event occurred, you can review the video and manually create an event at the desired times.
1. Follow the procedures to
2. If necessary use the toolbar settings and the start and stop time fields to identify the portion of video to be marked as an event.
3. From the Options menu select Create Video Event.
4. The Create Video Event dialog is displayed. Select the appropriate Event
text from the drop-down list or enter new text to append to the User
Generated Video Event alarm.
5. Click [OK].
6. The Alarm Monitoring window displays a User Generated Video Event alarm.
Automatically Launch both Live and Recorded Video on
Alarm
If an alarm is configured to automatically launch the Video Player, you can configure it to launch recorded video in addition to live video. This feature must be configured on each Alarm Monitoring workstation.
102 —
revision 1
Alarm Monitoring User Guide
It is highly recommended to set the playback pre-roll for the camera to at least 10 seconds when using this feature. For more information, refer to the Digital Video
Software User Guide.
To configure this feature, add the following settings in the [DigitalVideo] section of the ACS.INI file.
Setting Comment
DoubleVideoOnAlarm=1
AlarmDurationMax=60
Use this line to enable the launch of both live and recorded video when an alarm is configured to automatically launch video on alarm.
Use this line to configure the length of the recorded video clip that will be launched.
The default value is 60 seconds.
PauseOnDoubleVideoOnAlarm • A value of 1 pauses the video at the time of the alarm (the end of the recorded video clip).
• A value of 0 begins playing the recorded video including pre-roll (if configured).
The default behavior with this feature is to launch recorded and live video in matrix mode. Additional configuration may be necessary if multiple cameras are linked in a video event to display the each camera channel as a pair of video cells
(recorded and live).
By adding lines to the [DigitalVideo] section of the ACS.INI file, you can configure the layout of cameras in the matrix view. Each pair of live and recorded video streams for a camera has a width of 500 and a height of 200. You can configure different displays that depend on the total number of video streams.
The number located after PlayerWidth and PlayerHeight represents the number of video streams. For example:
To display 2 camera channels (4 video streams) with one camera (one pair of live and recorded video) on each of two rows you would add the following lines:
PlayerWidth4=500
PlayerHeight4=400
To display 4 camera channels (8 video streams) with two cameras (2 pairs of live and recorded video) on each of two rows you would add the following lines:
PlayerWidth8=1000
PlayerHeight8=400
revision 1
— 103
7: Video Monitoring
Event Configuration/Search Dialog
The Event Configuration/Search dialog is used to:
• Configure event parameters for real-time LNVR video processing and alarm generation. For detailed IntelligentVideo Event information, refer to the
IntelligentVideo User Guide.
• Display alerts when events occur. Alerts display in three areas of the dialog:
– In the video window, alerts display as a highlighted area.
– In the Event Feedback pane, alerts display as a spike in the alert status graph.
– In the alarm history pane, alerts display as thumbnails or text.
• Search LNVR or LDVR recorded/archived video for the occurrence of specific events.
• View search results as a detailed list or thumbnail images.
• Play recorded video search results in the Video Player pane.
• Play live video in the Video Player pane.
Configuration Pane
Video player pane
Event Feedback Pane
Alarm History Pane
Note:
Different fields, buttons and event options are available, depending on how you open the Event Configuration/Search dialog.
104 —
revision 1
Alarm Monitoring User Guide
Event Configuration/Search Dialog Menu Options
The following table describes the menu and sub-menu options available from the
Event Configuration/Search dialog.
Event Configuration/Search Dialog - Menus
Menu Name Menu
Options
Event Menu Select Event
Function
Enables you to select the event for which the current video source will be analyzed.
Note:
The Select Event sub-menu option is available only if you open the
Event Configuration/Search dialog using the Video Player.
In System Administration, you have to select an event before you can open the Event Configuration/Search dialog. Therefore, if you selected an event to open the dialog the Select Event sub-menu option will not display.
Screen Output Some event feedback and configuration parameters display directly on the video to help you visualize what is being (or what has been) configured. If you wish to enable this output, verify that a checkmark displays beside this sub-menu option.
Load/Save
Configuration
Copy/Paste
Configuration
Allows you to save the current configuration and load it at a later time for the same type of event.
It is possible to copy a configuration from one event and paste it to a different event. In this case, all parameters that apply to the new event will be used.
For example, the configuration for a motion detection event can be copied/pasted to an abandoned object event. In this example, the “Region of interest” parameter exists in both events, so that parameter will be saved. But the abandoned object event does not use “Threshold”, so that parameter will be ignored. Lastly, motion detection did not use the “Duration” parameter, so the original duration value for the abandoned object event will be used.
revision 1
— 105
7: Video Monitoring
Event Configuration/Search Dialog - Menus (Continued)
Menu Name Menu
Options
Player Menu Switch to
Recorded/
Live
Function
Select Start/
End Times
Displays a dialog where you can select the start and end times of a recorded video search.
Export Frame Allows you to export the current frame into a picture file. Supported image formats are BMP, JPEG, GIF, TIFF, and PNG.
Play Starts/resumes video playback. This command is not visible when video is playing.
Pause
Stop
Search
Zoom
Frame Rate
Enables you to switch to and from recorded and live video.
Pauses playback. When video play is resumed, it continues from where it was temporarily stopped. This command is visible only when video is playing.
Stops playback and rewinds the video to the beginning.
Fast-forwards through video while continuing to analyze it. This allows you to search through video faster than real-time and look for events of interest, using the Event Output and Event History panes.
Enables you to set pre-defined (50%, 100%, and 200%) zoom levels for the video player.
Sets the frame rate at which video is fed to the client side. By default, this value is set to 10 frames per second (fps). If the source video is set at a higher fps, video will be analyzed at the higher frame rate, but some frames will not be sent to the client display.
This option is available when the client display is on a computer separate from the video analysis service and the network connection between client and the service is less than ideal. Reducing the frame rate will speed up processing because the server side will not have to wait for the client to consume the video frames it has sent.
106 —
revision 1
Alarm Monitoring User Guide
Event Configuration/Search Dialog Fields
The following table describes some of the configuration parameters available in the Event Configuration/Search dialog.
Event Configuration/Search Dialog - Fields
Pane Field
Video Player Pane Video window
Description
Video playback window.
Command buttons and Status indicator
Note:
If configuration or event feedback controls have any additional information, you may choose to draw in this window or on top of the video.
Buttons at the bottom of the pane allow you to execute the same commands that are available through the menus. In addition to the menu options, the command buttons allow you to:
• Set an arbitrary zoom level for the entire video search window
• Search video by using the position indicator/seek bar control
• Play, pause, and stop recorded video
• Play the video at an accelerated rate by using the search button
Indicates the current status of the IntelligentVideo engine or video processing engine. If there are problems connecting to the search server component, the status indicator will indicate the connection state and any error values encountered.
Note:
In live video mode, most of these controls are absent since live video cannot be paused, stopped, or searched. The only option available with live video is to change the zoom level.
revision 1
— 107
7: Video Monitoring
Event Configuration/Search Dialog - Fields (Continued)
Pane
Configuration
Pane
Field Description
The fields that display in the Configuration pane depend on the event selected. An event must be selected to populate the Configuration pane.
Region of Interest
(ROI)
The ROI identifies the area of video to be processed.
Click the Create a Region of Interest button video to mark the area you wish to define.
and then click on the
Once the ROI has been created, use the mouse to drag and drop any of the green vertices or the entire ROI if adjustments are necessary.
Mask
Click the Delete Region Of Interest button
ROI.
to remove an existing
The ROI mask identifies an area of video to ignore.
Click on the Create a Mask button mark the area you wish to ignore.
and then click on the video to
Once the mask has been created, use the mouse to drag and drop any of the green vertices or the entire mask if adjustments are necessary.
Click the Delete Mask button to remove an existing mask.
Event Feedback
Pane
Alert status graph
Time Range
Level
A color-coded graphical representation of alerts. An alert is created only if the last detected event occurred more than 8 seconds ago.
Note:
For recorded video, you can click on any part of the graph to view the corresponding video. The video search must first be stopped.
Select the duration of time used by the graph.
History
The current level of change. Levels range from 0 to 100. The first and last frames of an event must have a value equal to or greater than the specified level, to be included in the search results.
Displays the history of the level of change.
108 —
revision 1
Alarm Monitoring User Guide
Event Configuration/Search Dialog - Fields (Continued)
Pane
Alarm History
Pane
Field
Event Thumbnail
View
Description
Displays a scaled-down image of the video frame for each detected event.
Help
Close
Refresh
You can double-click a thumbnail to view the recorded video for that event (in the Video Player pane). The video search must first be stopped.
The Event Thumbnail View does not apply to live video.
Event Detail View Displays information (start time, end time and duration) about each event that was detected.
You can double-click an event to view the recorded video for that event
(in the Video Player pane). The video search must first be stopped.
Push button
Push button
Push button
The Event Thumbnail View does not apply to live video.
Displays online help for this topic.
Closes the Event Configuration/Search dialog.
Once event configuration is modified, this button will be enabled and allow the user to apply configuration changes to the IntelligentVideo engine.
Event Configuration/Search Dialog Procedures
Open the Event Configuration/Search Dialog
The Event Configuration/Search dialog can be opened using the Video
Processing form or IntelligentVideo form (in System Administration) or using the Video Search menu option (in Video Player).
Using the Video Processing or IntelligentVideo Form
1. Open the Video Processing or IntelligentVideo form from System
Administration:
• For IntelligentVideo events: a. From the Video menu, select IntelligentVideo. The
IntelligentVideo folder opens.
b. Click the IntelligentVideo Events tab.
• For Video Processing events: a. From the Video menu, select Digital Video. The Digital Video folder opens.
revision 1
— 109
7: Video Monitoring
b. Click the Video Processing tab.
2. Select (place a checkmark beside) the appropriate camera.
3. Click [Modify].
4. Click the camera icon located in the lower right side of the Event Type listing window. The Event Configuration/Search dialog opens.
Toolbar Shortcut
Using the Video Player
1. Follow the procedures to
2. Click the Video Search toolbar button or from the Control menu select
Video Search. The Event Configuration/Search dialog displays.
Configure Event Properties
When you configure event properties, you define the parameters that make up an event. For example, duration time and object size are event properties for the
“Left Object” event.
Event properties are defined per event, not per channel. Therefore, you can define several unique event properties for the same event on the same video channel.
For detailed IntelligentVideo Event configuration information, refer to the
IntelligentVideo User Guide.
1. Open the Event Configuration/Search dialog. For more information, refer to
Open the Event Configuration/Search Dialog on page 109.
2. If you opened the Event Configuration/Search dialog using the Video Player, select the event type from the Event menu.
3. Set the region of interest. For more information, refer to Set Region of
4. Set the event properties. For more information, refer to the IntelligentVideo
Events chapter in the IntelligentVideo User Guide.
5. If necessary, configure event parameters that apply to the video channel
itself. For more information, refer to Video Channel Configuration Dialog on page 114.
6. Click [OK].
110 —
revision 1
Alarm Monitoring User Guide
Set Region of Interest
The Event Configuration/Search dialog has a region of interest (ROI) button.
Although this setting is optional, it is highly recommended that ROI is used whenever possible to reduce computation time and the probability of false alarms. If the ROI is not set, the entire frame is considered the region of interest.
All the events except “Object Crosses a Region” and “People Counting” support the use of ROI.
1. Open the Event Configuration/Search dialog. For more information, refer to
Event Configuration/Search Dialog on page 104.
2. If you opened the Event Configuration/Search dialog using the Video Player, select the event type from the Event menu.
revision 1
— 111
7: Video Monitoring
Toolbar Shortcut
3. Click the Create Region of Interest button.
4. In the Video Player pane left-click to create a starting point for the area you want to highlight. A green dot displays.
5. Click another point in the area you want to highlight. A red line connecting the two points displays.
6. Continue clicking points to expand the highlighted area.
112 —
revision 1
Note:
7. Use the mouse to drag and drop any of the green vertices or the entire ROI if adjustments are necessary.
If at any time you want to remove a highlighted area, select it and click the
Delete Region of Interest toolbar button.
8. Only the highlighted area is recorded or searched.
Alarm Monitoring User Guide
Video Search Performance Requirements
A fast network, 100 Mbps or greater, is recommended between the site where video is located and the site where the computer running the Video Player is located. A fast network is recommended because video is analyzed/searched on the client side, therefore the faster video can be transmitted from the server side, the faster the search will be.
The hard drive speed on the server side must be able to support the number of clients using the server. Clients include Video Players and archive servers.
A fast CPU on the client computer is also recommended. Generally, when the network and server side hard drive are fast enough, the CPU on the client side can be the bottleneck. A Pentium III based computer is required although a
Pentium IV computer is recommended.
Search Video/Audio
You can search video and audio using the Video Player or Event Configuration/
Search dialog. To search video using the Video Player, simply verify recorded video is playing and select the start/end date. However, the Event Configuration/
Search dialog enables you to perform detailed searches quickly. Complete the following to search video using the Event Configuration/Search dialog.
1. Open the Event Configuration/Search dialog. For more information, refer to
Open the Event Configuration/Search Dialog on page 109.
2. If you opened the Event Configuration/Search dialog using the Video Player, select the event type from the Event menu.
3. From the Player menu select Select Start/End Times. The Date / Time window opens. Enter the desired date and time ranges you wish to search and click [OK].
Note:
You can also set the start/end date by selecting Options > Set Start/End
Date in the video player.
4. From the Player menu select Frame Rate.
5. Set the configuration parameters for the event or load a previously saved set of channel configuration parameters. For more information on event configuration parameters, refer to the IntelligentVideo Event chapters in the
IntelligentVideo User Guide. For more information on audio events, refer to
IntelligentAudio on page 79. For more information on channel configurations, refer to
Video Channel Configuration Dialog on page 114.
6. Click the search toolbar button. Events that meet the configuration parameters display in the Alarm History pane.
View Search Results
There are several ways to view the recorded video associated with the video search results.
revision 1
— 113
7: Video Monitoring
From the Event Configuration/Search dialog:
• Click any part of the graph, in the Event Feedback pane.
• Double-click a thumbnail or listed event, in the Alarm History pane.
Video Channel Configuration Dialog
Video channel configuration parameters can be applied to real-time
IntelligentVideo processing and to recorded video searches. The Video Channel
Configuration dialog is used to configure event parameters that apply to the video channel itself and not the video processing algorithms. For example, if the source video has a lot of motion, background learning time may need to be increases so the video processing engine picks out static scene elements more accurately.
For detailed IntelligentVideo Event configuration information, refer to the
IntelligentVideo User Guide.
Video Channel Configuration Dialog
Form Element
Video Channel
Configuration listing window
OK
Cancel
Load
Configuration
Comment
Displays the video channel processing properties and user-configured values. Parameters are sorted into types. Values are modified directly in the listing window. A new value may be entered or selected from the drop-down list. Click [Explain] to read a detailed description of the selected property.
Accepts the video channel configuration changes and closes the dialog.
Rejects the video channel configuration changes and closes the dialog.
Displays an Open window from which you can select the “.XML” configuration file you want to load.
114 —
revision 1
Alarm Monitoring User Guide
Video Channel Configuration Dialog (Continued)
Form Element
Save
Configuration
Reset to Defaults
Show Parameters
Only For
Show Advanced
Parameters
Explain
Comment
Saves the set of video channel configuration parameters for reuse.
Resets all parameter settings to their original default settings.
Select this check box to display only parameters which are relevant to the selected event. Only events configured for the current channel are available in the drop-down list.
Select this check box to view additional parameters used for troubleshooting and diagnostics.
The default setting hides the advanced parameters.
Click this button to read a detailed description of the selected property.
Open the Video Channel Configuration Dialog
The Video Channel Configuration dialog can be opened using the
IntelligentVideo Events form (System Administration) or using the Event
Configuration/Search dialog available through the Video Player.
Using the IntelligentVideo Events form
1. Open System Administration.
2. From the Video menu, select IntelligentVideo. The IntelligentVideo folder opens.
3. Click the IntelligentVideo Events tab.
4. Select (place a check mark beside) the appropriate camera.
5. Click [Modify].
6. Select an IntelligentVideo Server from the drop-down list.
7. Click [Channel Configuration] (located below the camera listing window on the right side). The Video Channel Configuration dialog opens.
Using the Event Configuration/Search Dialog
1. Open the Event Configuration/Search dialog. For more information, refer to
Open the Event Configuration/Search Dialog on page 109.
2. Click [Channel Configuration] (located on the lower right side of the window). The Video Channel Configuration dialog opens.
Configure Video Channel Parameters
Two types of parameters are available: basic and advanced. Parameters are defined per channel and for each event there is a unique set of parameters. By default, only basic parameters display. If you want to set an advanced parameter, click the Show Advanced Parameters check box. Advanced parameters should only be set by expert level administrators.
revision 1
— 115
7: Video Monitoring
A parameter can be set by entering or selecting a value from the drop-down list in the listing window.
2. It is recommended that you select the Show Parameters Only For check box.
3. Select (highlight) a property name.
4. Select or enter the property value.
5. Repeat steps 3 and 4 for each property.
6. Click [Save Configuration] if you would like to be able to load these configurations at another time.
7. Click [OK].
Matrix View
Matrix view allows the user to view multiple video streams at once in the Video
Player window. Video streams can be arranged for viewing in the Video Player using preconfigured templates. Once video streams have been added to a template, this layout can be saved so that it can be loaded by another user or monitoring station.
Select Template Dialog
The Select Template dialog is used to load an empty matrix view into the Video
Player. Each template has a fixed number of video cells arranged in a different layout. Once a template has been loaded, drag and drop cameras from the System
Status Tree to monitor them in the Video Player. The Select Template dialog is displayed by selecting View > Template from the Video Player menu.
116 —
revision 1
Alarm Monitoring User Guide
Save Layout Dialog
The Save Layout dialog is used to create a layout that can be reused at another time. Layouts can be made available to all users or it can be limited to the current user or local workstation. The Save Layout dialog is displayed by selecting Play
> Save Layout from the Video Player menu.
Save Layout Dialog
Field(s) Description
Save as new layout Select this radio button to create a new layout.
Private (assigned to the current user)
Select this check box to make the new layout available only to the current user.
Select this check box to make the new layout available only on the local workstation.
Local (assigned to this workstation)
Overwrite existing layout
Listing window
Select this radio button to replace an existing layout.
Select the layout you wish to overwrite from the listing window.
Remove Click this button to remove the layout selected in the listing window.
revision 1
— 117
7: Video Monitoring
Load Layout Dialog
The Load Layout dialog is used to display layouts that have been previously saved by a user in the Video Player. The Load Layout dialog is displayed by selecting Play > Load Layout from the Video Player menu.
Save Layout Dialog
Field(s)
Private (assigned to the current user)
Local (assigned to this workstation)
Listing window
Description
Filter the list of available layouts to display only private layouts assigned to the current user.
Filter the list of available layouts to display only locally created layouts.
The list of available layouts.
Matrix View Procedures
Monitor Video in Matrix View
The Video Player in matrix view can be used to view live or recorded video from multiple cameras simultaneously.
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. The Video Player displays. From the View menu, select As Matrix. You can also select the Matrix View toolbar button.
Note:
Matrix view displays up to 32 cameras. There may be more cameras available than can fit in the viewable area. You may scroll or resize the window to view additional cameras. To resize the window hover the pointer
118 —
revision 1
Alarm Monitoring User Guide
over the corner or edge of the window until a double-headed arrow displays.
Then drag the window to its desired size.
3. The screen below displays Matrix view.
Note:
When viewing multiple cameras simultaneously, please note that the system automatically displays each window in such a way that it is active (the status bar for each window is blue.) Therefore any command will be applied to every window. To deselect a window, place the cursor in the window and click. The status bar is gray when the window is deselected.
Note:
For PTZ cameras in matrix mode, double clicking on a single video launches a new single video window with PTZ enabled automatically.
Create a Matrix Layout
Layouts can be configured to display video channels in a matrix view. There are multiple templates for creating layouts. Once configured, layouts can be saved and loaded on client workstations.
Toolbar Shortcut
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. The Video Player displays. From the View menu, select Template.
3. Choose a static template from the Select Template dialog.
4. Empty video cells are displayed in the chosen template. Click and drag cameras to the template to assign them to a video cell.
revision 1
— 119
7: Video Monitoring
Note:
Cameras can be cleared from the template by selecting them and clicking the
Remove button . Selected video cells are indicated by a blue bar at the bottom the video cell, while unselected video cells display a gray bar. Video cells can be selected or deselected with a single right-click.
Save a Matrix Layout
Once cameras have been assigned to the video cells of a template, the layout can be saved for reuse by a different operator or monitoring station.
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. The Video Player displays. From the Play menu, select Save Layout.
3. The Save Layout dialog is displayed.
• To create a new layout: a. Select the Save as new layout radio button.
b. Enter a descriptive name for the layout.
c. Select the Private or Local check boxes if the layout should be available only to the current user or workstation.
• To replace a previously saved layout: a. Select the Overwrite existing layout radio button.
b. Highlight the layout you wish to overwrite.
4. Click [OK] to save the layout.
Load a Matrix Layout
Previously saved layouts can be used by different users on different workstations.
1. Follow the procedures to
Launch Video (Live/Recorded) From a Camera on page 99 in the Video Player.
2. The Video Player displays. From the Play menu, select Load Layout.
3. The Load Layout dialog is displayed. The list of available layouts can be filtered by selecting the Private (assigned to the current user) or Local
(assigned to this workstation) check boxes.
4. Select a layout from the list.
5. Click [OK] to load the layout.
120 —
revision 1
Alarm Monitoring User Guide
Pan, Tilt, and Zoom
Pan, Tilt and Zoom (PTZ) control is supported by all Lenel video recorders.
Using PTZ you can control a camera’s movements and its ability to view images at different ranges (zoom in or out).
Digital PTZ is provided for cameras that do not have PTZ support. Digital PTZ allows the user to pan, tilt, and zoom throughout the camera’s field of view without moving the camera.
Configure PTZ with LNVR or LNVS Machines
LNVR and LNVS machines do not need a matrix switcher for PTZ control.
Therefore, these machines do not require special procedures in B.A.S.I.S. for
PTZ control; simply configure the recorder and camera.
Configure PTZ with all other Digital Video Recorders
LDVR, Loronix, and Generic Video machines require a matrix switcher (either real or virtual) for PTZ control. Complete the following in B.A.S.I.S. to configure PTZ control for these machines.
1. Verify the default matrix switcher type settings in B.A.S.I.S. are appropriate.
For more information, refer to “Modify a Matrix Switcher Type” in the
Matrix Switcher Folder chapter in the Digital Video Software User Guide.
2. Add the matrix switcher. For more information, refer to the Matrix Switcher
Folder chapter in the Digital Video Software User Guide.
3. Configure the video recorder. For more information, refer to “Add Video
Recorders Other Than LNVR/LNVS Recorders” in the Digital Video Folder chapter in the Digital Video Software User Guide.
4. Configure the camera. This includes linking the camera to the matrix switcher. For more information, refer to “Configure Cameras Other Than
LVR/LNVS Cameras” in the Digital Video Folder chapter in the Digital
Video Software User Guide.
revision 1
— 121
7: Video Monitoring
Using PTZ in the Video Player
The following screen shows the addition of PTZ control in the Video Player.
122 —
revision 1
• Using he t P
to activate PTZ. Use the remaining buttons to pan or tilt the camera, as well as, zoom in, zoom out, and focus the camera. You can also press and hold the zoom, focus, or iris buttons to achieve the preferred view.
•
Using the Mouse. After you click to activate PTZ you can pan, tilt, and zoom by right or left clicking your mouse in the video window. A left click moves the camera toward the cursor. The camera keeps moving in that direction until the mouse button is released. The camera moves with direction and speed determined by the mouse position relative to the center of the video window. If you move the mouse while holding the left button down, the camera changes the direction and speed accordingly. If you rightclick in the top half of the screen the camera zooms in until you release the mouse. If you right-click in the bottom half of the screen the camera zooms out until you release the mouse. You can also use the mouse scroll wheel to zoom in/out. Scroll up to zoom in and scroll down to zoom out. The farther away from the center the mouse is the faster the camera moves.
•
Using the Keyboard. After you click to activate PTZ you can use the keyboard arrow keys to pan, tilt, and zoom. The left and right arrow keys pan the camera left and right. The up and down arrow keys tilt the camera up and down. Hold the <Shift> key down while pressing the up or down arrows
Alarm Monitoring User Guide
zooms the camera in or out. They keyboard keypad may also be used to control PTZ.
•
Using a Joystick. After you click to activate PTZ you can use video controllers, such as joysticks, to pan, tilt, and zoom. Iris and focus are also available if supported by the joystick.
Notes:
The Zoom, Focus, and Iris control buttons are only enabled if the corresponding operations are supported by the camera in the current PTZ mode.
The speed of the pan and tilt operation is calculated based on the distance from the mouse click position to the center of the image along with the current zoom position. If the camera is zoomed in, the same mouse click will cause a slower movement. This functionality is subject to individual cameras. If a camera doesn’t support getting the current zoom position, the movement will not slow.
PTZ Options Dialog
The PTZ Options dialog is used to configure PTZ locking options and PTZ control behavior. PTZ controls can be customized to send either relative, continuous, or mixed commands with a single mouse click. The PTZ Options dialog is available from the Options menu in Alarm Monitoring.
revision 1
— 123
7: Video Monitoring
Note:
The video window must be re-opened to use the new settings.
Field Description
Default access mode Used to specify the locking mode used by default when video is launched for a PTZ camera.
“Locked” access mode gives control of the PTZ functions to the first user to activate PTZ. If another user attempts to activate PTZ for the same camera, they will receive a message that
PTZ control is locked by another user.
“Shared” access mode allows multiple users to have access to the PTZ controls at the same time.
Timeout (in seconds) If the Timeout (in seconds) check box is selected, you may specify an amount of time (in seconds) after which the PTZ controls will become unlocked. After this period another user may gain control of the camera.
For no timeout on locking, simply clear the Timeout (in seconds) check box. Unlocking will only occur when the video window is closed, PTZ control is cancelled (by deselecting the PTZ button), or PTZ locking mode is changed to shared (by deselecting the PTZ locked button).
Note:
The PTZ timeout value is not utilized with background PTZ tours.
124 —
revision 1
Alarm Monitoring User Guide
Field
Mouse mode
Zoom mode
Focus mode
Iris mode
Zoom factor (>1.0)
Focus step (1-100)
Iris step (1-100)
Description
“Continuous” moves the camera while the user holds the mouse down and stops when the mouse is released. The camera moves with direction and speed determined by the mouse position relative to the center of the video window. If the user moves the mouse while holding the left button down, the camera changes the direction and speed accordingly.
“Click-to-center, then continuous” first issues a click-to-center command with a mouse leftclick. If the user continues holding the mouse button, continuous mode is turned on (as described above). This mode is only available when the camera supports both continuous and relative PTZ commands.
“Drag or double-click-to-center” allows the user to either drag the image to issue subsequent relative commands or double-click on a point to make that point the center of the image.
“Continuous” continuously changes the corresponding setting while the user keeps pressing the left mouse button and stops when the button is released.
“Step, then continuous” first issues a relative step command with a mouse left-click. If the user continues holding the mouse button, continuous mode is turned on. This mode is only available when the camera supports both continuous and relative PTZ commands.
“Step mode” issues relative step commands each time the user clicks a corresponding button.
The number that the current focal length is multiplied (or divided) by when the zoom in or zoom out button is pressed in step mode.
Determines the step size for relative commands. Values are normalized numbers from 1 to
100 (where 1 is the smallest and 100 is the largest).
PTZ Control Adjustment Parameters
Server and client (digital) modes can be configured with different settings.
Adjustments to the client modes can be only be configured by editing the
ACS.INI file on the Alarm Monitoring workstation. Parameters should be placed in the [DigitalVideo] section.
Note:
The video window must be re-opened to use the new settings.
revision 1
— 125
7: Video Monitoring
Pan and Tilt Parameters
Name Description
ServerMouseMode Pan and tilt operations in server mode:
• 0 = Click-to-center, then continuous
• 1 = Drag or double-click-to-center
• 2 = Continuous
Note:
This parameter can also be configured with the
Mouse mode drop-down list on the PTZ
Options dialog.
Pan and tilt operations in client (digital) mode: ClientMouseMode
• 0 = Click-to-center, then continuous
• 1 = Drag or double-click-to-center
• 2 = Continuous
MixedPanAndTiltTimeOutMS Sets the timeout value used in Click-to-center, then continuous (in milliseconds).
0
0
300
Zoom Parameters
Name Description
Default
Default
Possible
Values
0, 1, or 2
0, 1, or 2
0 - 65535
ServerZoomMode
Possible
Values
0, 1, or 2
ClientZoomMode
RelativeZoomStep
MixedZoomTimeOutMS
Zoom operation in server mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
Note:
This parameter can also be configured with the
Zoom mode drop-down list on the PTZ
Options dialog.
Zoom operation in client (digital) mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
The number that the current focal length is multiplied (or divided) by when the zoom in or zoom out button is pressed in step mode.
Sets the timeout value used in Step, then continuous mode
(in milliseconds).
0
0
2
300
0, 1, or 2
>1.0
0 - 65535
126 —
revision 1
Alarm Monitoring User Guide
Focus Parameters
Name
ServerFocusMode
ClientFocusMode
RelativeFocusStep
MixedFocusTimeOutMS
Iris Parameters
Name
ServerIrisMode
ClientIrisMode
Description Default
Focus operation in server mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
Note:
This parameter can also be configured with the
Focus mode drop-down list on the PTZ
Options dialog.
Focus operation in client (digital) mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
Determines the size of each step in step mode. Value is normalized for the range of focus available for the camera.
Note:
This parameter can also be configured with the
Focus step (1-100) field on the PTZ Options dialog.
Sets the timeout value used in Step, then continuous mode
(in milliseconds).
0
0
2
300
Possible
Values
0, 1, or 2
0, 1, or 2
1 - 100
0 - 65535
Description
Iris operation in server mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
Note:
This parameter can also be configured with the
Iris mode drop-down list on the PTZ Options dialog.
Iris operation in client (digital) mode:
• 0 = Step, then continuous
• 1 = Step mode
• 2 = Continuous
0
0
Default Possible
Values
0, 1, or 2
0, 1, or 2
revision 1
— 127
7: Video Monitoring
Iris Parameters
Name
RelativeIrisStep
MixedIrisTimeOutMS
Description Default
Determines the size of each step in step mode. Value is normalized for the range of iris available for the camera.
Note:
This parameter can also be configured with the
Iris step (1-100) field on the PTZ Options dialog.
Sets the timeout value used in Step, then continuous mode
(in milliseconds).
2
300
Possible
Values
1 - 100
0 - 65535
PTZ Joystick Selection
If multiple joysticks are connected to the same workstation, the ACS.INI file can be used to specify which joystick will be used. Each connected joystick is listed as a parameter in the [DigitalVideo] section as InputDeviceName1,
InputDeviceName2
, etc. Set InputDeviceName (without a number) equal to the joystick name you wish to use as it is written in the file.
Configure PTZ Locking
PTZ options can be configured in Alarm Monitoring.
1. From the Options menu select PTZ Options.
2. The PTZ Options dialog is displayed.
3. The Default access mode drop-down list is used to specify the locking mode used by default when video is launched for a PTZ camera.
• Locked access mode gives control of the PTZ functions to the first user to activate PTZ. If another user attempts to activate PTZ for the same camera, they will receive a message that PTZ control is locked by another user.
• Shared access mode allows multiple users to have access to the PTZ controls at the same time.
4. A timeout can be enabled for PTZ control with the Timeout (in seconds) check box.
• If selected, you may specify an amount of time (in seconds) after which the PTZ controls will become unlocked. After this period another user may gain control of the camera.
• For no timeout on locking, simply clear the Timeout (in seconds) check box. Unlocking will only occur when the video window is closed, PTZ control is cancelled (by deselecting the PTZ button), or PTZ locking mode is changed to shared (by deselecting the PTZ locked button).
Presets
Client side presets can be absolute camera positions or PTZ commands. Presets are added to the PTZ Presets drop-down and can be selected by the user to
128 —
revision 1
Alarm Monitoring User Guide
control the camera. To open the PTZ Presets dialog, click in the Video
Player window to activate PTZ, then select the Options > Presets menu item or click the Preset button in the PTZ toolbar.
PTZ Preset dialog in Advanced mode
The PTZ Preset dialog has both a simple and an advanced mode. The simple mode can be used to configure a preset for an absolute camera position or to delete an existing preset. The advanced mode can be used to configure a preset for an absolute camera position or to configure a PTZ command.
Field
Type new name or select existing preset
Overwrite selected preset
Delete
Advanced
Comment
Enter descriptive name for the preset or select an existing preset from the drop-down.
Select this check box to replace an existing preset with a new camera position or command.
Click this button to delete the selected preset.
Click this button to toggle between the simple and advanced PTZ Preset dialogs.
revision 1
— 129
7: Video Monitoring
Field
Move to absolute position
Current
Move relatively by
Move continuously
Camera preset
Test
Save
Exit
Comment
Select this radio button to configure a preset for an absolute camera position.
Click this button to update the absolute position values with the camera’s current position.
Select this radio button, then return to the video player and execute the relative command you wish to configure. Return to the PTZ Preset dialog and click [Save].
Select this radio button, then return to the video player and execute the continuous command you wish to configure. Return to the PTZ Preset dialog and enter the length of time the camera should move in the Duration (sec) field. Click [Save].
Select this radio button, then enter the camera side preset number in the text box. Then click
[Save].
Click this button to execute the preset command in the video player.
Click this button to save the preset configuration. Multiple presets can be added, modified, or deleted without closing the PTZ Preset dialog.
Click this button to exit the PTZ Preset dialog.
Add an Absolute Preset
To set a client side preset for an absolute camera position using the PTZ Preset dialog in simple mode:
1. In the Video Player window, click to activate PTZ.
2. Use the PTZ controls to move the camera to the desired position.
3. From the Options menu, select Presets or click the Preset button in the
PTZ toolbar.
4. The PTZ Preset dialog is displayed in simple mode. Enter a descriptive name for the preset or select an existing preset from the drop-down.
5. If you want to overwrite an existing preset, select the Overwrite selected
preset check box.
6. Return to the video player window and adjust the camera position if desired.
7. Click [OK] to save the preset.
130 —
revision 1
Alarm Monitoring User Guide
Add a Relative or Continuous Preset
1. In the Video Player window, click to activate PTZ.
2. From the Options menu, select Presets or click the Preset button in the
PTZ toolbar.
3. The PTZ Preset dialog is displayed. Enter a descriptive name for the preset or select an existing preset from the drop-down.
4. If you want to overwrite an existing preset, select the Overwrite selected
preset check box.
5. Click [Advanced].
6. Select the Move relatively by or Move continuously radio button.
7. Return to the Video Player window and execute the desired preset command.
This will automatically populate the values in the PTZ Preset dialog.
8. Return to the PTZ Preset dialog.
9. If you are configuring a continuous command, enter the Duration (sec) that the camera should move for.
10. Click [Test] to view the preset in the Video Player window.
11. Make adjustments to the configuration as needed, then click [Save].
Add a Camera Side Preset
The following procedure allows you to add preset previously configured on the camera to the system and give it a descriptive name.
1. In the Video Player window, click to activate PTZ.
2. From the Options menu, select Presets or click the Preset button in the
PTZ toolbar.
3. The PTZ Preset dialog is displayed. Enter a descriptive name for the preset or select an existing preset from the drop-down.
4. If you want to overwrite an existing preset, select the Overwrite selected
preset check box.
5. Click [Advanced].
6. Select the Camera preset radio button and enter the number of the camera side preset in the text box.
7. Click [Test] to view the preset in the Video Player window.
8. Click [Save].
revision 1
— 131
7: Video Monitoring
PTZ Tours
PTZ tours can be created using absolute camera positions and PTZ commands.
PTZ tours can be run manually, continuously, or scheduled to run at specific times. PTZ tours should begin with an absolute camera preset to ensure the tour is properly executed.
PTZ Tour Dialog
The PTZ Tour dialog allows you to add, modify, delete, and run PTZ tours. To open the PTZ Tour dialog, click in the Video Player window to activate
PTZ, then select the Option > Tours menu item.
Field
Type new name or select existing tour
Overwrite selected tour
Delete
Comment
Enter descriptive name for the tour or select an existing tour from the drop-down.
Select this check box to replace an existing tour with a new configuration.
Click this button to delete the selected tour.
132 —
revision 1
Alarm Monitoring User Guide
Field
Listing window
Continuously
On the background
PTZ tour server
Save
Exit
Up/Down
Remove
Run
Comment
The list of the presets that make up the tour.
Edit the Delay (sec) column to change the number of seconds the tour should pause after executing the currently selected preset.
Select this check box to run the tour continuously.
Select this check box if you wish to continue running the tour after the video player has been closed. Select the PTZ tour server from the drop-down.
Note:
Background PTZ tours can only be interrupted by a user with a higher priority or by the user that started the tour. The PTZ timeout value is not utilized with background
PTZ tours.
Note:
A PTZ Tour Server must be configured on the Digital Video > PTZ Tour Server tab in System Administration to run a tour continuously in the background.
Click this button to save the tour.
Click to exit the PTZ Tour dialog.
Use the [Up] and [Down] buttons to reorder the presets in the listing window.
Remove the selected step form the tour.
Click this button to test the tour in the video player window.
revision 1
— 133
7: Video Monitoring
Add a PTZ Tour
PTZ tours are composed of a sequence of camera presets.
1. In the Video Player window, click to activate PTZ.
2. Use the PTZ controls in the Video Player window to move the camera to the desired start point.
3. Open the PTZ Presets dialog by selecting Options > Presets from the Video
Player menu.
4. In the PTZ Preset dialog, click [Advanced].
5. Click [Current] to update the absolute position values to the current camera position.
6. Enter a name for the starting point of the tour and click [Save].
7. Open the PTZ Tour dialog by selecting Options > Tours from the Video
Player menu.
8. Click <Click here to add new step> in the listing window.
9. Select the preset from the drop-down and enter the amount of time the tour should pause before the next step in the Delay (sec) column.
10. Create the next preset: a. In the PTZ Preset dialog, enter a preset name for the next step of the tour.
b. Select the radio button for the type of preset you wish to configure.
c. Return to the Video Player window and execute the command for the preset.
d. Click [Save] in the PTZ Preset dialog.
11. Add the preset to the tour: a. In the PTZ Tour dialog, click <Click here to add new step> in the listing window.
b. Select the preset from the drop-down.
c. In the Delay (sec) column, enter the amount of time the tour should pause before executing the next step of the tour.
and 11 to add additional steps to the tour.
13. When you have finished creating the tour, click [Save] in the PTZ Tour dialog.
134 —
revision 1
Alarm Monitoring User Guide
Run a PTZ Tour
Note:
1. In the Video Player window, click to activate PTZ.
2. Launch the PTZ Tour dialog by selecting Options > Tours from the Video
Player menu.
3. Select the PTZ tour from the listing window drop-down.
4. Click [Run].
The Preset button in the PTZ toolbar will remain pressed while the tour is running. To interrupt the tour, simply execute any PTZ command or menu option. The tour will also stop if control is taken over by another user with higher PTZ priority level or when the PTZ control is given up by closing the video window or deselecting the PTZ button. If the tour is set to run in the background, an option will be given to resume the tour once PTZ control is relinquished.
Remote Monitor
Remote Monitor (RM), commonly referred to as “camera call-up”, is a video monitoring application that can be run on any PC with or without B.A.S.I.S. installed. Configuration is performed in System Administration. The RM application behaves as a slave to the Alarm Monitoring application which is used to send video commands allowing the user to:
• Launch video on the RM or Remote Monitor Group (RMG).
• View status of the RMs in the System Hardware Tree and the RMGs in the
Device Group window.
• Send matrix mode, camera selection, and video playback commands to the
RM.
• Mute audio.
• Drag and drop cameras onto the RM or RMG icon to start live video playback.
• Drag and drop alarms with associated video onto the RM or RMG icon to start recorded video playback.
• Launch a local monitor window on the Alarm Monitoring workstation to send commands performed in the window to the RM.
LNVR Security
Currently there is no secure communication between the RM and the B.A.S.I.S. software. The RM must use another method of authentication to an LNVR with security settings because it cannot receive credentials from the B.A.S.I.S. server.
revision 1
— 135
7: Video Monitoring
Note:
To enable authentication with the LNVR, log on to the RM client with a
Windows user account that belongs to the LNVUsers group or configure RM to run as a LNVUsers group member.
If anonymous DCOM is disabled on the LNVR, the Windows user logged on to the RM client must be authenticated by the LNVR as Everyone or
Administrator.
Add Cameras to a Remote Monitor
Cameras can be added via multiple drag and drop operations.
The source of the camera can be one of the following:
• Camera icon in the System Status Tree
• Alarm icon that has associated video from the Alarm view
The target of the drag and drop operations can be one of the following:
• RM icon in the hardware tree or device group view
• RMG icon in the device group view
• Local monitor window
Cameras that have been added to a Remote Monitor appear in the System Status
Tree below the RM and are referred to as video cells or Remote Monitor Cells
(RMC). RMGs are displayed in the Device Group window with lists of the RMs that belong to each group. Cameras added to RMGs are added to each RM that belongs to that group.
•
•
•
- Remote Monitor
- Remote Monitor Cell
- Remote Monitor Group
Remote Monitor Right-click Options
Commands are available for RMs and RMCs through a right-click menu and drag and drop functionality. Right-click options specific to Remote Monitors are listed in the table below.
Remote Monitor Right-click options
Command
Launch Video
(RM)
Description
Launches the local monitor window in Alarm Monitoring.
136 —
revision 1
Alarm Monitoring User Guide
Remote Monitor Right-click options
Command
Launch Video
(RMC)
Download
Database (RM)
Remove All (RM)
Remove (RMC)
Select (RMC)
Matrix
Single
Next
Prev
Live
Recorded
Pause
Play
Stop
Frame Advance
Fast Forward End
Mute Audio
Unmute Audio
Description
Launches video on the RM and the local monitor window in Alarm Monitoring.
S ynchronizes the RM with the camera channels assigned in Alarm Monitoring.
Removes all video from the RM.
Removes the video cell from the RM.
In matrix view, changes to single player mode with the selected video cell.
Switches the RM to matrix view.
Switches the RM to single player mode.
In single player mode, selects the next video cell in the list
In single player mode, selects the previous video cell in the list.
Changes to live video on each video cell in the RM.
C hanges to recorded video on each video cell in the RM.
P auses the video playback on each video cell.
R esumes the video playback on each video cell.
S tops the video playback on each video cell.
Advances one video frame on each video cell.
F ast forwards to the end on each video cell.
Mutes the audio on the RM or video cell.
Turns mute off for the RM or video cell.
Local Monitor Window in Alarm Monitoring
The Local Monitor Window (LMW) is a mirror of the RM that can also be used to send commands from Alarm Monitoring. To open the LMW, right-click on the
RM or RMC in the System Status Tree and select Launch Video. If the LMW is opened from an RMC, the RM will switch to single view and display the selected video cell.
The following commands will be sent to the RM while manipulating video in the
LMW:
• Remove selected cameras. This can be done by selecting Remove Video from the right-click menu in matrix mode, by selecting Remove Video from the Control menu, or by pressing the delete key.
• Switch to matrix view or single player view.
• Select camera, move to the next camera, and move to the previous camera in single player view.
revision 1
— 137
7: Video Monitoring
• Switch between live and recorded video.
• Change recorded video time frame.
• Pause, resume, stop, frame advance, and fast forward to end commands.
• Mute audio, when selected from the right-click menu. If audio is muted in the LMW by clicking the speaker icon, this command will not be sent to the
RM.
Remote Monitor Application
The Remote Monitor Application (RMA) behaves as a slave to Alarm
Monitoring and does not support any video commands. The user has the following commands available:
• Launch and exit the application. Upon exit, the RMA looses video cell information. When the RMA comes back online, it must be synchronized via the Download Database command in Alarm Monitoring.
• Move and resize the main window.
• Close the application window.
• Open the window and exit the application by right-clicking the application’s icon in the system tray.
• Mute audio on one or more cameras by clicking the speaker icon.
• Turn on and off automatic window launch via the Auto launch on
command in the Options menu. When this setting is enabled, the RMA window will open to the previous position when the RM receives a matrix mode, camera selection, or video playback command.
• Activate full screen mode by selecting Full Screen from the Options menu.
To deactivate full screen mode, press <Esc>. You can also toggle full screen by pressing <Alt> + <Enter>.
• Change the TCP/IP connection port.
138 —
revision 1
Alarm Monitoring User Guide
Change the Remote Monitor TCP/IP Port
The Remote Monitor TCP/IP port is used by B.A.S.I.S. to communicate with the
Remote Monitor. The port number in the Remote Monitor application must match the port number defined in System Administration.
1. In the Remote Monitor application, select the Connection > Settings menu option.
2. The Connection Settings window is displayed.
a. Enter the new port number in the TCP/IP Port field.
b. Click [OK].
Application Profiles
Users of the Remote Monitor application can save the current settings as a profile for later use. Settings such as TCP/IP port number, window position, always on top, launch on command, and full screen mode are part of a Remote Monitor application profile.
Note:
Remote Monitor must be run by a user with Administrative permissions to save or remove profiles.
revision 1
— 139
7: Video Monitoring
Save a Remote Monitor Profile
1. In the Remote Monitor application, select the Profile > Save As menu option.
2. The Save Profile window is displayed.
• To create a new profile, select the Create New radio button and enter a
Name.
• To change an existing profile, select the Overwrite Existing radio button and highlight the profile you want to update.
3. Click [OK] to save the profile.
140 —
revision 1
Alarm Monitoring User Guide
Load a Remote Monitor Profile
1. In the Remote Monitor application, select the Profile > Load menu option.
2. The Load Profile window is displayed.
a. Select the profile you want to load.
b. Click [OK].
revision 1
— 141
7: Video Monitoring
Remove a Remote Monitor Profile
1. In the Remote Monitor application, select the Profile > Save As menu option.
2. The Save Profile window is displayed.
a. Select the Overwrite Existing radio button.
b. Highlight the profile you wish to delete.
c. Click [Remove].
3. Click [OK] to close the Save Profile window.
142 —
revision 1
Alarm Monitoring User Guide
Chapter 8: Video Verification
Displayed by:
Video verification
is the process of comparing “live” (as it is happening) video with a photograph stored in the database. When a person swipes a badge through a reader, you can use video verification to compare the cardholder’s photo.
The Video Verification window can be displayed several ways:
• Select the Video Verification toolbar button.
• From t
Video Verification Configuration Dialog
Form element
Video verification type
Use all video enabled readers
Reader listing window
Maximum number of videos to display
Comment
Select Use digital video verification if you are using cameras that connect to a video recorder or Use standard video verification if you are using CCTV.
Select this check box to use all readers that have a Device-Camera Link established in System
Administration.
If you do not wish to use all applicable readers, select each camera that you wish to use individually.
Select a number 1-10 from the drop-down list to indicate the maximum number of items you wish to display in the Video Verification window.
revision 1
— 143
8: Video Verification
Digital Video Verification
Digital Video Verification is used with cameras connected to a video recorder.
• Live video and cardholder information is displayed for each video verification item.
• Multiple video verification views can be displayed concurrently in the
Digital Video Verification window. The most recent view appears on top.
• If multiple cameras are linked to a device, the camera with the View Order of
1 (from the Device - Camera Links form in System Administration) will be displayed.
Digital Video Verification Window
Digital Video Verification Procedures
Set Up Digital Video Verification
Several procedures must be completed in System Administration prior to using
Digital Video Verification. Refer to the System Administration User Guide for additional information about each of the following steps.
1. Configure the video recorders and cameras that will be used with Digital
Video Verification.
2. Configure the additional devices (such as readers) that will be used with the cameras for video verification.
3. Configure a Device-Camera link for each camera and device pair. If more than one camera is associated with a device, the camera with a view order of
1 is used with video verification.
144 —
revision 1
Alarm Monitoring User Guide
Standard Video Verification
Standard Video Verification is used with CCTV cameras.
• Alarms are displayed in the Video Verification window.
Standard Video Verification Window
Form element
Panels/readers window
Selected readers
Live video
Photograph
On new event display
Comment
Lists all panels and readers in the system.
Contains those readers from which the Video Verification window will receive information. If this list is empty, no alarms will display in the Video Verification window.
Displays live video from a CCTV (camera) device at a specific location.
• If you see a black box instead of live video, it means that either there is no camera available or the camera isn't working properly.
• If you see a “Live video not available” message, it means that your System
Administrator has made live video from that location unavailable to Alarm
Monitoring stations.
Displays a specific cardholder record photo.
Includes the Photograph and Video check box fields.
• Video: If checked, pan, tilt and zoom CCTV commands are automatically enabled.
If unchecked, pan, tilt and zoom CCTV commands must be manually invoked. Live video remains visible regardless of the state of this check box.
• Photograph: If checked, as each new alarm arrives, the corresponding cardholder photo displays.
revision 1
— 145
8: Video Verification
Form element
Alarms window
Close
Comment
Lists alarms as they arrive. Each row represents one alarm.
Click the following column headings to arrange alarms by that heading:
• Alarm Description: Name of the alarm
• Cardholder: Cardholder’s name and Badge ID
• Time/Date: Time and date the alarm occurred. The way that the time and date are displayed varies according to the time/date settings chosen in the Windows Control
Panel on your computer.
• Reader: Reader at which the alarm occurred
Resize the width of a column by positioning the mouse pointer over the boundary of two column headings. Then click and drag to resize the column.
Closes the Video Verification window.
Standard Video Verification Procedures
Add or Remove Readers
To add or remove readers using the video verification window, the reader must be added to the Selected Readers list.
Note:
The Panels/Reader list is located in the upper left portion of the Video
Verification window. The Selected Readers list is located in the lower left portion of the Video Verification window.
• To add an entry to the Selected Readers list, double-click the reader in the
Panels/Readers list.
• To add a entry to the Selected Readers list, select one or more alarm(s) before you open the Video Verification window, the corresponding reader(s) will be added automatically.
• To add all the readers associated with a particular panel, double-click the panel entry in the Panels/Readers list.
• To remove a reader from the Selected Readers list, double-click the reader’s entry in the Selected Readers list.
Display the Cardholder Photo and Live Video
Clicking an alarm in the video verification alarms window displays both the cardholder photo and live video from a camera at the reader. Live video continues to display until one of the following happens:
• You click another alarm.
• Another alarm arrives (this is true only if the Video check box is selected.)
146 —
revision 1
Alarm Monitoring User Guide
Notes:
The Video check box must be selected to display live video when a new alarm occurs.
The Photograph check box must be selected to display the cardholder's photograph when a new alarm occurs.
Delete an Alarm in the Video Verification Window
• To remove an alarm from the alarms window, click the alarm then select
Delete from the Edit menu or right-click the alarm and select Delete.
• To clear all alarms from the alarms window, select Delete All from the Edit menu.
revision 1
— 147
8: Video Verification
148 —
revision 1
Alarm Monitoring User Guide
Chapter 9: Control Devices and Areas
Permissions for control device groups can be given or restricted through System
Administration. From the Administration menu select Users. On the Monitor
Permission Groups sub-tab there is a Control Device Groups sub-tab with which you can control access to device groups.
Grant / Deny Pop-up Window
Your System Administrator can configure any input event for any device to execute an output action that launches a grant/deny pop-up window associated with a door/reader. Alarm Monitoring operators with the correct permissions can either grant or deny access through the door/reader. When a grant is issued the door is pulsed open. When a deny is issued, no command is sent.
Note:
For configuration procedures refer to the Global I/O Folder chapter in the
System Administration User Guide.
Alarm Monitoring stations and operators monitoring the same zone the input device/event and output device/event are configured for are notified when the input event occurs.
revision 1
— 149
9: Control Devices and Areas
Field
Display area
Grant
Deny
Description
Displays any and all active requests. The display window contains the following columns:
• Destination Device - The door/reader the output action will affect.
• Initiating Device - The device the request is coming from.
Note:
Both the initiating device and destination device must be in the same monitor zone.
• Alarm - The input event that is linked to an output action.
• Alarm Time - The time the request was initiated.
• Timeout - The total amount of time the operator has to either grant or deny the request.
The timeout value is user-defined with a default value of 3 minutes. This field does not refresh. To determine the amount of time remaining the operator must also refer to the
Alarm Time column. The current time located in the status bar determines when the request was initiated.
Grants the request (pulses open the door) and removes the request from the Grant / Deny popup window.
Denies the request (no command is issued to the hardware) and removes the request from the
Grant / Deny pop-up window.
Grant / Deny Pop-up Window Procedures
Grant or Deny Access
1. Verify the Communication and Linkage Server are running. To do this, click the Start button then select All Programs > B.A.S.I.S. ET690 >
Communication Server or Linkage Server.
2. To grant access, complete one of the following when the Grant / Deny popup window displays:
• Double-click a request.
• Right-click a request and select Grant.
• Select (highlight) a request and click [Grant].
Note:
You must have the open door user permission in order to issue a grant.
Contact your System Administrator to set up this permission or refer to the
150 —
revision 1
Alarm Monitoring User Guide
Users Folder chapter in the System Administration User Guide for procedures.
Note:
3. To deny access, complete one of the following when the Grant / Deny popup window displays:
• Let the timeout value expire by doing nothing.
• Right-click a request and select Deny.
• Select (highlight) a request and click [Deny].
A user transaction is logged when a grant or deny occurs.
Right-click Options to Control Devices and Areas
You can control devices and areas through a wide variety of right-click and leftclick menu options available in Alarm Monitoring. You can right-click and leftclick icons in map view, right-click alarms, right-click device groups as well as right-click and left-click hardware in the System
Status
window. The menu options available when you right-click or left-click depend on the window you are in and the device or area you are clicking on.
Some right-click and left-click menus contain sub-menus. To execute commands you must first select the device from the right-click or left-click menu. A submenu of options displays to control that device.
Note:
Many of the right-click and left-click options are also available as options from the main menu.
General Right-click Options
These right-click options can be available for alarms as well as multiple devices/ hardware.
•
Acknowledge - acknowledges the currently selected alarm.
•
Trace - traces the selected device.
• Update Hardware Status - polls currently selected access panel/controller and updates the hardware status. If a downstream device (like a reader) is selected, the update hardware status is done for the controller associated with that device.
•
View Map - displays a map associated with the selected device (if one exists). If more than one map exists, the user is prompted to select a map.
•
Launch Video - displays video for the selected device if a camera is associated with the device.
revision 1
— 151
9: Control Devices and Areas
Monitor Zone Right-click Options
•
Update All Hardware Status - updates the display to show the currently status of all devices.
• Set All Controller Clocks - sets all clocks to the current system time.
• Trace Monitor Zone - traces a monitor zone.
Access Panel and Alarm Panel Right-click Options
• Properties - available for access and intrusion panels.
• Open Door(s) - opens the door(s) associated with the selected access panel.
If using Recognition Source readers this option will not be available, because these specific readers are not in constant communication with the
PIM devices.
• Set Controller Clock - sets selected access panel/controller clock to current time. If a device other than an access panel/controller is selected, this option sets the clock on the access panel/controller to which the device is attached.
• Reader Access Modes - updates the reader mode of every reader associated with selected access panel/controller or reader.
– Card and Pin: Sets the reader to card and pin mode.
– Card Only: Sets the reader to card only mode.
r C
– Cipher Lock Emulation: Sets the reader to cipher mode requiring a master combination or “cipher code”.
– Facility Code Only: Sets the reader to facility code only mode.
– Locked: Locks the reader.
– Unlocked: Unlocks the reader.
– Default: Sets the reader to the default online mode that it is configured for in the database.
•
Reader Verify Mode - used to enable or disable verify mode for access control readers with an associated secondary reader. When verify mode is enabled, access to both the primary and secondary reader is required. When verify mode is disabled, only access to the primary reader is required.
•
Activate - activates the outputs associated with the selected access panel.
•
Deactivate - deactivates the outputs associated with the selected access panel.
•
Pulse - pulses all outputs associated with the selected access panel.
•
Mask - masks inputs or alarms for the currently selected reader.
• UnMask - unmasks inputs or alarms for the currently selected reader.
• Download Firmware - downloads firmware to the selected controller, BAS-
1100 or BAS-1200 alarm panel or RS-485 command keypads. Controllers and gateways display firmware revision numbers using three decimal places, while downstream devices display the firmware revision number using two.
•
Download Database - downloads the database to the access panel/ controller.
152 —
revision 1
Alarm Monitoring User Guide
•
Reset Use Limit - resets the number of times a badge can be used on a particular access panel/controller.
•
Connect - connects the access panel/controller via a dialup/modem connection.
•
Disconnect - connects the access panel/controller via a dialup/modem connection.
Intrusion Area Right-click Options
• Disarm (all intrusion controllers) - Disarms the area.
• Perimeter Arm (Detection Systems only) - Arms the perimeter of an area.
• Arm Entire Partition (Galaxy and Detection Systems only) - Arms the perimeter and interior points of an area.
• Partial Arm (Galaxy only) - Arms only the zones marked for partial set in the controller.
• Master Arm Delay (Bosch only) - Arms the perimeter and interior points with exit and entry delays.
• Master Arm Instant (Bosch only) - Instantly arms both the perimeter and interior points.
• Perimeter Delay Arm (Bosch only) - Arms the perimeter with exist and entry delays.
• Perimeter Instant Arm (Bosch only) - Instantly arms the perimeter points.
Intrusion Panel Right-click Options
In addition to the acknowledge, trace, update hardware status, properties and set controller clock right-click options, intrusion panels and relays can also have the following right-click option.
• Execute Custom Function - executes a custom function associated with the
Bosch Intrusion Controller. This menu option is only available with Bosch
Intrusion Controllers.
Intercom Right-click Options
•
Place Call - displays a dialog box where you enter the station number you are calling to.
•
Cancel Call - cancels the intercom call.
•
Badge Information - displays badge information associated with the intercom event; who placed the call and/or who received the call. If an intercom event has two intercom stations associated with it (the station that placed the call and the station that received the call) a dialog displays, allowing alarm monitoring operators to select the intercom station(s) they want to base the cardholder search on.
Note:
The Badge Information right-click option is only available for intercom stations linked with the customized cardholder field, Cell number. For more
revision 1
— 153
9: Control Devices and Areas
information, refer to the Cardholder Options folder - Automatic Lookup form in System Administration.
Ericsson MD110 Intercom Right-click Options
Note:
The Ericsson MD110 allows calls to be queued. If a call is queued, a Call
Queued alarm is sent to Alarm Monitoring.
• Place Call - displays a dialog box where you enter the station number you are calling to.
• Cancel Call - cancels the intercom call.
• Cancel all Calls - cancels all calls.
• Block Station - blocks the station from receiving a call.
• Unblock Station - lets the station receive calls again.
•
Divert This Call - for a call that has been queued. Displays a dialog box that allows you to divert the call to another station. That station will then receive a ringing alarm, which you then handle as normal.
Intrusion Door Right-click Options
Bosch is the only intrusion controller that supports doors.
• Open Door - Opens the door for the selected intrusion panel.
• Door Mode - Changes the current door mode.
– Lock -
– Unlock - Unlocks the door allowing free access to everyone.
Intrusion Relay Right-click Options
The information in this section applies to both onboard and offboard relays except where noted otherwise.
• Activate - Activates the outputs associated with the selected intrusion panel.
• Deactivate - Deactivates the outputs associated with the selected intrusion panel.
• Toggle - Puts the output in the opposite state of the current state. For example, if the output is currently set to activate then this command will set the output to deactivate. This command is available for Bosch Offboard relays only.
Intrusion Zone Right-click Options
• Bypass - Masks the zone from reporting alarm or tamper activity.
• Unbypass - Unmasks the zone so that any tamper or alarm activity for the zone will be reported.
154 —
revision 1
Alarm Monitoring User Guide
Reader Right-click Options
In addition to several options listed in Access Panels and Alarm Panels, rightclick options for readers also include:
It is not possible to download firmware to single reader interfaces.
• Download Reader Firmware - downloads firmware to the selected dual interface Rdr1 reader. Displays the major and minor firmware revision number. The minor firmware revision number displays as the last two digits
• Reader Biometric Verify Mode - enables/disables verify mode for access control readers with an associated biometric reader. When verify mode is enabled, the normal card and/or pin access and a biometric match is required. When verify mode is disabled, only the card and/or pin access is required.
• Reader First Card Unlock Mode - enables/disables the Reader First Card
Unlock Mode. The Reader First Card Unlock Mode is a qualifier for online
Reader Mode. When enabled, the online Reader Mode is in effect until the first (qualified) access granted with entry occurs. When the first access granted with entry occurs, the online Reader Mode changes to unlocked.
Note:
Reader First Card Unlock Mode is only supported on the BAS-2000 controller. However, first style unlock behavior can be configured for use with any access controller through Stanley’s Global I/O Support.
Alarm Mask Group Right-click Options
• Group Mask - masks inputs or alarms for the currently selected reader.
• Group U
Intrusion Mask Group Right-click Options
• Disarm/Reset - Disarms the Intrusion Mask Group. If the intrusion mask group is armed it will transition to be disarmed if no alarm is made. If the intrusion mask group was in an alarm state, it will transition into an alarm cancelled state until the same command is executed again to transition it into a disarmed state.
•
Arm Away - Arms all points of the mask group. Any point activation will either trigger an alarm or start the entry or exit delays. Exit delays start at the time arming occurs, and allows exit through trigger points for the user set duration.
•
Arm Stay - Arms the perimeter points of the mask group but does not arm the points defined as interior. This mode allows movement inside the protected area, but will trigger an entry delay and subsequent alarm if any perimeter point is activated. Exit delays start at the time arming occurs, and allows exit through trigger points for the user set duration.
•
Arm Stay Instant - Arms the perimeter points of the mask group but does not arm the points defined as interior. This mode allows movement inside the protected area but will trigger an entry delay and subsequent alarm if any perimeter point is activated. There is no exit delay.
revision 1
— 155
9: Control Devices and Areas
• Restore All Points - Removes bypass settings for all points in the intrusion mask group.
Function List Right-click Options
Function Lists
are keypad - activated commands that are programmed into an access panel. Function lists can be accessed by assigning them to specific keypad sequences.
•
Clear All Terms - only applicable to Apollo function lists. Used to clear all terms, and set all the resulting function list values to false.
• Execute: True - sets the logic term to true.
•
Execute: False- sets the logic term to false.
• Execute: Pulse - temporarily sets the logic term to true.
Action Group Right-click Options
In addition to the view map option, action groups also include execute as a rightclick option.
Note:
Action groups will display if the logged in user has the segment access to the action group along with permissions to execute all of the actions in the action group.
Anti-Passback Area Right-click Options
These right-click options are unique to areas and area alarms. There are other right-click options available for areas and they are listed in General Options.
• Update Area Status - updates the status of both safe and hazardous areas so that operators can have a current view of cardholder locations.
• Occupancy Report - provides a current report of the cardholders currently in a safe area.
• Move Badges - enables an operator to manually move all the badges in one area to another.
• Mustering Report - provides a current report of the cardholders currently in a hazardous area.
• Start Muster Mode - initiates Muster mode. The Start Muster Mode window displays and provides an area to enter comments.
• Reset Muster Mode - ends Muster mode. The Reset Muster Mode window displays and provides an area to enter comments.
Guard Tour Right-click Options
These right-click options are available if Guard Tour is set up in your system.
• Launch Tour - starts a guard tour.
156 —
revision 1
Alarm Monitoring User Guide
• View Tour - displays the guard tour live tracking window for a specific tour.
Remote Monitor Right-click options
In addition to several options listed in Access Panels and Alarm Panels, rightclick options for Remote Monitors also include:
•
Launch Video - launches the local monitor window in Alarm Monitoring.
•
Download Database - synchronizes the RM with the camera channels assigned in Alarm Monitoring.
•
Remove All - removes all video from the RM.
•
Matrix - switches the RM to matrix view.
•
Single - switches the RM to single player mode.
•
Next - in single player mode, selects the next video cell in the list.
•
Prev - in single player mode, selects the previous video cell in the list.
•
Live - changes to live video on each video cell in the RM.
•
Recorded - changes to recorded video on each video cell in the RM.
•
Pause - pauses the video playback on each video cell.
•
Play - resumes the video playback on each video cell.
•
Stop - stops the video playback on each video cell.
•
Frame Advance - advances one video frame on each video cell.
•
Fast Forward End - fast forwards to the end on each video cell.
Remote Monitor Video Cell Right-click Options
In addition to several options listed for Remote Monitors, these right-click options are available for video cells assigned to Remote Monitors (RM):
•
Launch Video - launches video on the RM and the local monitor window in
Alarm Monitoring.
•
Remove - removes the video cell from the RM.
•
Select - in matrix view, changes to single player mode with the selected video cell.
Single and Double Left-click Mode
Each Alarm Monitoring operator can set their options so that commands are executed with a single left-click or a double left-click of an icon in the system status view or map view. The default setting is to execute commands with a double left-click.
Furthermore, if that command was previously available as a right-click menu option, then the command will be listed in bold when the device is right-clicked.
revision 1
— 157
9: Control Devices and Areas
For some menus, the default command may be in a sub-menu of the context menu. The example that follows shows the Reader Auxiliary Output # 2 in bold. This is the command that will be executed when the operator single or double left-clicks the controller icon, depending on how they have set their options.
Note:
Using the System Administration application your System Administrator can associate commands with a device or area icon so that when the icon is single or double left-clicked in Alarm Monitoring, the command is executed.
For information on how to associate a command with a device or area icon, refer to the Monitoring Options Folder Chapter in the System
Administration User Guide.
Activate Single or Double Left-click Mode
Single or double leftclick mode is configurable per user.
To activate single left-click mode select (place a checkmark beside) the Execute
Command on Single Click of Icon in the Options menu of Alarm Monitoring.
While in this mode you can single left-click an icon in the Alarm Monitoring system status and map view to execute the command configured for that device or area.
To activate double left-click mode deselect (there is no checkmark beside) the
Execute Command on Single Click of Icon in the Options menu of Alarm
Monitoring.
Select a Device in Single or Double Left-click Mode
158 —
revision 1
Alarm Monitoring User Guide
Single Left-click Mode
In single left-click mode you can select a device, by placing or hovering the cursor near the device without left-clicking. The system status list and tree view identifies a selected device by underlining and/or highlighting the device.
The map view identifies a selected device by displaying the tool tip.
Double Left-click Mode
To select a device in double-click mode, left-click the device.
Execute a Command in Single or Double Left-click Mode
Single Left-click Mode
To execute a command in single left-click mode, left-click the device. Clicking the expand symbol in tree view does not execute the command.
Double Left-click Mode
To execute the command, double left-click the device.
Note:
If you are in double left-click mode in the System
Status
view, not only do you execute the command when you double left-click a device, but you also expand or collapse the hardware list.
revision 1
— 159
9: Control Devices and Areas
160 —
revision 1
Alarm Monitoring User Guide
Chapter 10: Monitor Alarms
When an alarm occurs, it displays in the Main Alarm Monitoring window. Each alarm displays in its own row and is preceded by a colored dot. If alarms are configured in the System Administration software so that they do not automatically delete after they are acknowledged, an alarm icon will also display beside the colored dot after it is acknowledged.
Alarm Icons
Icon
The following table is a list of the different types of alarm icons.
Description
Alarm acknowledged without notes.
Alarm acknowledged with notes.
An outstanding acknowledgment action is associated with the alarm. An acknowledgment
action
is an action that will automatically be carried out when the alarm is acknowledged.
A camera is associated with the device that the alarm occurred on/for. Therefore you can pull up live video via the Launch Video right-click menu option.
Alarm acknowledged without notes and a camera is associated with the device.
Alarm acknowledged with notes and a camera is associated with the device.
An outstanding acknowledgment action is associated with the alarm and a camera is associated with the device.
The digital video associated with the alarm has been marked.
Alarm acknowledged without notes and has archived video.
Alarm acknowledged with notes and has archived video.
The alarm has outstanding acknowledgment actions and archived video.
The alarm has been marked in progress.
revision 1
— 161
10: Monitor Alarms
Pending Alarms Window
An initiating alarm is automatically deleted upon arrival of its corresponding canceling alarm. (e.g. Door
Forced Open/Door
Forced Open
Cancelled).
Toolbar Shortcut
The Pending Alarms window is similar to the Main Alarm Monitoring window in that it has the same menu options and toolbars. However, the Pending Alarms window only displays pending alarms, which are alarms that are configured to require an operator to take action. Pending alarms are highlighted in the Main
Alarm View and cause Alarm Sprites to be shown on graphical maps for the devices associated with those pending alarms.
Alarms are configured to be pending alarms in the Alarm Definitions Form in
System Administration. If events configured here are set to be “active” then their corresponding alarm will be highlighted in Main Alarm Monitoring window. For more information see the Alarm Configuration Folder chapter in System
Administration.
An example of a pending alarm can be anything depending on the configuration done in System Administration. Commonly though, higher need alarms such as a door being forced open are reserved for this type of immediate action.
If the Pending Alarms Window is left open, the window automatically updates itself. For example, when a pending alarm is acknowledged in the Main Alarm
Monitoring window, it immediately ceases to display in the Pending Alarms window.
If a pending alarm is an initiating alarm that becomes physically restored and must be acknowledged, it continues to display as a pending alarm until it is acknowledged. If a pending alarm is an initiating alarm that becomes physically restored but does not require acknowledgment, the alarm ceases to be a pending alarm.
Like the Main Alarm Monitoring window you can determine the type of information displayed about alarms through the Configure > Columns menu option. However, you cannot filter the type of alarms displayed through the
Configure > Alarm Filter menu option. That is because the Pending Alarms window is intended to summarize ALL pending alarms.
To display the window, select the Pending Alarms option from the View menu or click the View Pending Alarms toolbar button.
162 —
revision 1
Alarm Monitoring User Guide
To view tables of the menu items and toolbar options, refer to Menus and
Procedure for Monitoring Alarms
Sort Alarms
Alarms are listed in the order indicated by the sort criterion. To determine the current sort criterion locate “Sort criteria” in the status bar (lower right side of the screen).
You can rearrange the order of existing and new alarms using either of these two methods:
• Clicking a column heading
• Selecting View > Sort by from the Main Alarm Monitoring menu.
The choices available in the Sort by submenu are:
Column name Description
Alarm Description Lists alarms alphabetically by alarm description.
Account Group
Lists alarms in order of receiver account group (panels). Receiver accounts are used to represent panels in a receiver setup.
Asset Name
Asset Scan ID
Associated Text
Badge Type
List alarm alphabetically by asset name.
Lists alarms in order of asset scan ID.
Indicates (Yes or blank) whether there is additional text associated with the alarm.
Displays the badge type associated with the alarm.
revision 1
— 163
10: Monitor Alarms
Column name
Biometric Score
Card
Controller
Controller Time
Device
Input/Output
Intercom Station
Called
Intrusion Area
Line Number
Priority
Time/Date
Transmitter
Transmitter Input
Description
Lists alarms in order of biometric score. A biometric score is based on how well a biometric access control reader matches a template in the database. By default, this sort option is not enabled. To enable this sort option, the “Biometric Score” column must first be added via the
Configure > Columns menu option in Alarm Monitoring.
Lists alarms numerically by the card number (badge ID), if the alarm is associated with a cardholder.
Lists alarms alphabetically by name of the controller with which the alarms are associated.
The controller can be an access panel, fire panel, intercom exchange, receiver or receiver account.
Lists alarms in order of controller time. The time includes the hour and minute and the date includes the month, day and year. The display is based on the time zone setting selected in the
Control Panel of your computer. Typically the display is adapted to the country in which you are located.
Lists alarms alphabetically by name of the device (reader, alarm panel, intercom station etc.) associated with the alarm. If the alarm originates at a reader, the reader name displays. If the alarm originates at an alarm panel, the panel name displays. If the alarm originates at a video recorder, the recorder name displays.
Lists alarms alphabetically by name of the alarm input, if the alarm is generated at an alarm input.
Lists alarms in order of intercom station called.
Indicates the name of the area associated with the alarm. This is only displayed when the controller reported an area number along with the alarm.
Displays alarms in order of line number.
Lists highest priority alarms at the top of the list, followed by medium priority alarms, with low priority alarms placed at the bottom of the list.
Lists alarms in chronological order. Within a given date (month, day and year) the alarms are sorted by time, which include hours and minutes and optionally seconds.
• To view time in seconds go to the Options menu and select (place a checkmark beside)
Display Seconds.
• To view the most recent alarms at the bottom of the list, go to the Options menu and select (place a checkmark beside) Ascending Time/Date. To view the most recent alarms at the top of the list select (place a checkmark beside) Descending Time/Date.
Lists alarms in order of transmitter. Transmitters are devices that generate either an RF or IR
(or both) signal that Visonic SpiderAlert receivers can receive. There are three types of transmitters: fixed, portable (hand-held) and man-down.
For more information refer to the Personal Safety Devices Folder chapter in the System
Administration User Guide.
Lists alarms in order of transmitter input.
For any sort, the second level sort criterion is always Priority and the third level criterion is always Time/Date. For example:
• If you sort by Controller, all alarms associated with the same controller will be sorted by Priority then by Time/Date.
164 —
revision 1
Alarm Monitoring User Guide
• If you sort by Priority, all alarms with the same priority will be sorted by
Time/Date.
• If you sort by Time/Date, alarms with the same time (to the second)/date will be sorted by Priority.
The sort criterion applies to the current window only. You can have one Main
Alarm Monitoring window and various Trace windows, each with a different sort criterion. When you open a new Main Alarm Monitoring window, it is initially sorted by Priority.
revision 1
— 165
10: Monitor Alarms
166 —
revision 1
Alarm Monitoring User Guide
Chapter 11: Acknowledge Alarms
Note:
When you acknowledge an alarm, you provide a software response to it. Your
System Administrator can configure alarms so they have to or do not have to be acknowledged before they are deleted from the Main Alarm Monitoring window.
Furthermore, your System Administrator can associate actions with an alarm so when the alarm is acknowledged an action or group of actions is automatically triggered.
An action is any task performed by software as a result of an event or schedule.
Alarm Acknowledgment Window
The Alarm Acknowledgment window enables you to:
• Respond (in the software) to an alarm.
• View or listen to stored instructions for a specific alarm.
• Print information pertaining to an alarm.
• Enter or select notes pertaining to an alarm.
The Alarm Acknowledgment window can be displayed several ways:
• Double-click an alarm
• Highlight an alarm entry and from the Edit menu select Acknowledge
revision 1
— 167
11: Acknowledge Alarms
• Right-click an alarm entry and select Acknowledge
Alarm Acknowledgment Window
Form Element
Description
Controller
Input/output
Time/date
Device
Card
Original notes
Notes
Select
Instructions
Audio
In Progress
Comment
Contains the same name for the alarm as indicated in the Main Alarm Monitoring window.
Displays the name of the access panel/controller associated with the alarm.
If the alarm originated at an input/output device, displays the name of the device.
Displays the time and date the alarm occurred.
If the alarm originated at a reader, displays the name of the reader.
If the alarm originated at an alarm panel, displays the name of the alarm panel.
If the alarm is card-related, displays the cardholder name (if known*) and the badge ID.
*Cardholder name would not be available for an “Invalid Badge” alarm, for example.
Displays any notes carried forward from the associated original alarm.
Enables you to add your own comments/response to the selected alarm.
Displays a window where pre-configured acknowledgment notes can be selected.
Displays pre-configured instructions pertaining to the alarm.
Plays audio instructions.
Prints the information from this window, including alarm information and any notes entered.
Marks the alarm as “In Progress.” This shows that the alarm is currently being checked on but whose source has yet to be determined. If an alarm has been marked in progress, the “Original notes:” control will list the operator that marked the alarm in progress and the date\time this occurred prior to displaying the current notes for that alarm.
168 —
revision 1
Alarm Monitoring User Guide
Alarm Acknowledgment Window (Continued)
Form Element
Update
Acknowledge
Previous
Next
Close
Help
Comment
Once an alarm has been marked “In Progress” you are able to update the notes for the alarm by clicking [Update] and adding additional notes. Each note is time stamped with the date and time of the update.
Tells the B.A.S.I.S. software to acknowledge the currently selected alarm.
Displays information about the previous alarm in the Main Alarm Monitoring window.
Displays information about the next alarm in the Main Alarm Monitoring window.
Closes the Alarm Acknowledgment window.
Displays online assistance for using this window.
Alarm Acknowledgment Procedures
Acknowledge an Alarm
1. Display the Alarm Acknowledgment window by double-clicking an alarm.
2. If the alarm has text instructions associated with it the information displays in the Instructions sub-window. Click [Print] to print the instructions.
3. If the alarm has voice instructions click [Audio].
4. To select pre-configured acknowledgment note(s) click [Select]. The Select
Acknowledgment Notes dialog appears. Select the name of the preconfigured note and click [OK].
5. To add notes to the alarm, type your comments and click in the Notes subwindow. If this is a canceling alarm, any notes carried forward from the associated initiating alarm gets displayed in the Original Notes field.
revision 1
— 169
11: Acknowledge Alarms
Note:
If your System Administrator has configured the alarm to be marked “in
progress” before being acknowledged continue to step 6 . If not, move on to
step 8 .
An initiating alarm is an alarm that B.A.S.I.S. automatically deletes when the corresponding canceling alarm occurs.
6. If you are unable to acknowledge an alarm click [In Progress]. This marks the alarm as being “in progress” and acts as a state in between an unacknowledged and acknowledged alarm.
7. One an alarm is marked “In Progress” you are able to update the notes by clicking [Update]. Each update is time stamped with the date and time.
8. Click [Acknowledge] to acknowledge the alarm.
• If your System Administrator has configured this alarm type for
“Require Login On Ack.” you must first log in before this alarm can be acknowledged.
• If this is an initiating alarm, the corresponding canceling alarm may not be displayed until you acknowledge this alarm. Whether this happens depends upon how your system is set up.
• Your System Administrator may have set up some types of alarms to be automatically deleted from the Main Alarm Monitoring window after you acknowledge them. If this is not the case, delete the alarm manually.
For more information, refer to Delete an Alarm on page 171.
9. You can acknowledge multiple alarms without closing the Alarm
Acknowledgment window. Repeat step 2 through 8 for each alarm you display in the Alarm Acknowledgment window. Use the navigation buttons to move through the list of alarms.
10. To close the Alarm Acknowledgment window, click [Close].
Fast/Group Acknowledge Alarms
The Fast/Group Acknowledge feature allows you to acknowledge a group of alarms simultaneously. This feature can be used without bringing up the acknowledgment dialog box.
1. Select the alarm(s) that you wish to acknowledge.
• To choose two or more alarms, hold down the <Ctrl> key while selecting additional alarms.
• To select all the alarms press <Ctrl> + <F11>.
170 —
revision 1
Toolbar Shortcut
Alarm Monitoring User Guide
2. Acknowledge the group of alarms by completing one of the following:
• Choose Fast/Group Acknowledge from the Edit menu
• Right-click the selected group of alarms and choose Fast/Group
Acknowledge
• Click the Fast/Group Acknowledge toolbar button
• Press <Ctrl> + <F12>
3. A message displays:
Notes:
4. Click [Acknowledge] to confirm the acknowledgment of the alarms.
If any of the chosen alarms require notes upon acknowledgment, you will be prompted to enter notes.
If any one of the alarms has already been acknowledged, it cannot be reacknowledged. A message displays to inform you of how many alarms have been acknowledged. Click [OK] and delete the alarm(s).
The configuration for any given alarm may require that the operator log in upon acknowledging the alarm. If this is the case the user will be prompted to log in.
The configuration for an alarm may also require an acknowledgment password. If this is the case the operator will be prompted only once for the password (for each type of alarm).
Delete an Alarm
1. In the Main Alarm Monitoring window, highlight (click) the alarm you wish to delete.
2. Complete one of the following:
• Press the <Delete> key.
• From t
3. A confirmation message displays. Click [Yes].
Note:
You can also right-click the alarm and select Delete. When the confirmation message displays click [Yes].
revision 1
— 171
11: Acknowledge Alarms
Delete All Alarms
Depending on how your System Administrator configured alarms, some alarms cannot be deleted until they have been acknowledged. B.A.S.I.S. will alert you if this is the case.
1. To delete all of the alarm entries from the current alarm view, select Delete
All from the Edit menu.
2. A confirmation message displays. Click [Yes]. All entries will be removed from the Main Alarm Monitoring window.
Note:
You can also delete multiple alarms in the Main Alarm Monitoring window using the <Shift> or <Ctrl> keys and right-clicking. Select the Delete option.
A confirmation message displays. Click [Yes].
Display a Map
A monitoring map is a graphical representation of a facility or area monitored by the B.A.S.I.S. system. You can manually view maps associated with an alarm or you can set your display options to automatically display maps when an alarm occurs.
1. To manually display a map, open Alarm Monitoring.
2. If alarms are displayed in the Main Alarm Monitor window, right-click an alarm that has a map associated with it and select View Map. Otherwise, with the alarm selected choose Map from the View menu.
3. If no alarms are displayed in the Main Alarm Monitor window, select Map
Selection from the View menu. Select the desired map and click [OK].
Note:
If the selected device has multiple maps associated with it you will be prompted to select a map from a list provided. Do so and click [OK].
172 —
revision 1
Example of a Map
Alarm Monitoring User Guide
An alarm sprite is a small bitmap image used as an icon.
Graphical symbols on the map indicate the location of devices. Using your mouse, scroll over each symbol to view the device status and any text associated with the device. For information on associating text with map icons refer to the
MapDesigner User Guide.
Right-click a device symbol to perform a variety of operations depending on the type of device you select.
The word “ALARM” blinks, indicating an alarm’s location on the map.
• The blinking alarm displays only if there is one or more alarm designated as an “Active Alarm” in the System Administration software and if these alarms are unacknowledged/undeleted.
• The alarm sprite disappears once the alarm has been acknowledged.
• The alarm sprite disappears if the alarm has been deleted without acknowledgment (as in the case of an initiating alarm that is automatically replaced by a canceling alarm).
• The alarm sprite is not used for canceling alarms.
View Linked Maps
Several maps can be linked to each other using the MapDesigner software application. For more information refer to the “Place Icons on a background” section in the MapDesigner User Guide.
To view linked maps do one of the following:
revision 1
— 173
11: Acknowledge Alarms
• If the map that is currently displayed has a link to another map, you can double-click the icon or right-click and select Switch Map.
• With a map currently displayed, click the map icon beside the File menu option. If you have previously brought up more than one map, a Back 1
Map menu option displays. If you go back one map, a Forward 1 Map menu option displays.
• From t
[OK].
Send an E-mail
Using B.A.S.I.S. software you can automatically or manually send electronic mail with alarm information. Contact your System Administrator to automatically send electronic mail for specific alarms.
174 —
revision 1
Alarm Monitoring User Guide
To manually send an e-mail using Alarm Monitoring:
1. Verify the Global Output Server is running by clicking Start and selecting
Programs > B.A.S.I.S. ET690 > Global Output Server.
2. Right-click an alarm and select Send Email. The Send Email window opens.
3. Click [To] and select (place a checkmark beside) the desired e-mail addresses. Use the <Ctrl> or the <Shift> key to select multiple addresses.
4. The subject and body of the message are automatically populated with information that describes the alarm. Click in either field to make any changes.
5. Click [OK].
Field/button
To
Subject
Message
OK
Cancel
Description
Allows you to select an e-mail address that is already in the database.
Displays the subject of the message. By default, the description of the alarm that has occurred is displayed. To change it, type over the text.
Displays the body of the message being sent. By default, information pertaining to the alarm is displayed. To change it, type over the text.
Once you are done, click the [OK] button to send the message and exit the window.
To exit the window without sending an e-mail message, click the [Cancel] button.
revision 1
— 175
11: Acknowledge Alarms
Send a Page
Using B.A.S.I.S. software you can send a page to a recipient with alarm information.
1. Verify the Global Output Server is running by clicking Start and selecting
Programs > B.A.S.I.S. ET690 > Global Output Server.
2. Right-click an alarm and select Send Page. The Send Page window opens.
3. Click [To] and select (place a checkmark beside) the pager number of the recipient.
4. The message field is automatically populated with an alarm description, the time and date on which it occurred and the location (which reader/alarm panel).
5. Click [OK] to send the page.
Field/Button
To
Message
OK
Cancel
Description
Allows you to select pager number that is already in the database.
Displays the body of the message being sent. By default, information pertaining to the alarm is displayed. To change it, type over the text.
Once you are done, click the [OK] button to send the message and exit the window.
To exit the window without sending a page, click the [Cancel] button.
176 —
revision 1
Alarm Monitoring User Guide
Chapter 12: Muster Mode
Mustering
is a licensed feature that identifies all cardholders in a hazardous location during an incident. When an incident occurs (triggers an alarm)
B.A.S.I.S. automatically goes into muster mode. System operators can also manually initiate muster mode if necessary.
An incident is any situation/emergency where everyone in a hazardous area must evacuate and convene at designated safe locations. Safe locations are defined by exit and entry readers called muster readers. These readers are used purely for registration purposes and not to actually gain access into the safe location.
When an incident occurs a muster report can be generated listing all personnel within a hazardous location. During an incident cardholders must register in a safe location by entering the safe location via a designated muster readers.
Registering in a safe location removes the cardholder from the muster report. In this way the muster report becomes a report of all those who are on-site and have failed to register in a safe location.
At the end of an incident system operators can remove all cardholders from the safe locations; this is referred to as a muster reset.
Overview of Hazardous / Safe Locations
Hazardous and safe locations are defined in System Administration as a special type of global APB (Anti-PassBack) area. APB is the prevention of a badge from gaining entry in an access control system when that badge has either recently entered the same reader or area (timed APB) or is not considered to be in the proper area required to gain entry into a new area (area APB). Global APB is
APB enforced at a system level; areas span across multiple controllers.
Global APB can be soft APB or hard. Soft APB allows badges to enter areas that would normally be denied due to APB violations whereas Hard APB does not.
Hard APB in Hazardous Locations
Soft global APB is required for hazardous locations but it is strongly recommended that hard global APB be used when ever possible, because soft global APB can invalidate the accuracy of muster reporting. For example the accuracy of muster reporting will be compromised if a person swipes into a hazardous location that they are already considered to be in or swipes out of a hazardous location when they are not considered to be in it.
revision 1
— 177
12: Muster Mode
Notes:
Soft global APB is required for hazardous locations but it is strongly
recommended that hard global APB be used when ever possible.
Mustering is fully supported with B.A.S.I.S. and Apollo hardware. However, hard global APB is not supported with Apollo hardware.
Soft APB in Safe Locations
Soft APB must be applied to safe locations. It is assumed that readers entering safe locations are used purely for registration purposes and not to actually gain access into the safe location. In other words it is not expected that a badge will be presented to a reader to register at a safe location except during a muster mode.
Since readers entering safe locations are used purely for registration purposes and not to gain access, any card transaction at a reader entering a safe location that contains a badge ID will be used to register that badge as being in a safe location.
This includes granted with entry, granted with no entry, and access denied transactions.
Note:
Soft Global APB is required for safe locations.
Enable Global APB
Hazardous and safe locations are segmented and can only belong to one segment at any time. In order to enable mustering functionality in a given segment,
Global APB support must be enabled in that segment.
To enable global APB:
• In a segmented system, open System Administration or ID CredentialCenter and select the Global Anti-Passback check box on the Anti-Passback subtab of the Segments form in the Segments folder.
• In a non-segmented system, open System Administration or ID
CredentialCenter and select Administration > System Options. Select the
Global Anti-Passback check box on the Anti-Passback form.
Mustering Inside Hazardous Locations
For every hazardous location there must be at least one safe location associated with it, although multiple safe locations can be specified. In addition, multiple
178 —
revision 1
Alarm Monitoring User Guide
APB areas can be defined as hazardous, and safe locations can exist within these hazardous locations. Refer to the example below.
This site wants to do mustering inside of a hazardous location. They also want to use APB within area 1 (hazardous location) and the two storage rooms (area 2 and area 3). To have APB control within the two storage rooms, area 2 and area 3 must be defined as separate areas.
When a Badge enters “Storage Room B”, the system will consider it to be area 3.
As far as APB goes, that person is not considered to be in area 1 (the hazardous location). To function properly in this situation APB will not allow the badge to re-enter area 1 through any reader other than a reader leaving area 3.
However, for purposes of mustering, a person in “Storage Room B” (area 3) or in
“Storage Room A” (area 2) needs to be considered as being in a hazardous location since everything inside of Building 1 except the safe location (area 4) is in the danger zone.
How can both of these be achieved? The answer is by considering the hazardous location to be a combination of area 1 + area 2 + area 3. When determining who
revision 1
— 179
12: Muster Mode
is in the hazardous location, mustering will report anybody who is currently in any one of those areas.
Only normal APB areas can be configured as being contained in a hazardous location. Safe locations cannot, even though they may physically reside inside the hazardous location. This is because Badges recorded in a safe location should not be considered as being contained in the hazardous location.
General Constraints of Muster Mode
• When controllers go offline, B.A.S.I.S. is not able to provide accurate muster and safe location reports since B.A.S.I.S. will be unaware of access activity and safe location registration that occurs while a controller is offline.
When the controller comes back online, B.A.S.I.S. will be able to synchronize as long as the controller queued up all event transactions while it was offline.
Note:
It is recommended that dual path panels and communications be deployed to help avoid offline panel situations.
Note:
• For the case of safe areas outside of hazardous areas, the muster exit readers are unlocked providing free access into and out of the hazardous area.
Therefore access into and out of hazardous areas during an incident cannot be accurately tracked. Registration at the safe locations is what is accurately tracked.
For the case of safe locations inside of hazardous areas, entry and exit readers are locked.
Recommendations for Optimal Reliability
• The operators main concern during an incident is to change the mode of muster exit readers to unlocked or locked and to run the muster and safe location reports.
• If a reader entering or leaving a hazardous location is configured with an offline mode of “unlocked” or “facility code only” and that reader goes offline with the controller, badges will be able to enter and/or exit the hazardous location without a record being made. If an incident occurs before these badges are swiped again (thus self-correcting the record of their location), the muster report will not be correct. It may list badges as being in
180 —
revision 1
Alarm Monitoring User Guide
hazardous locations when they are no longer there. Furthermore, it may not list badges that are still in the hazardous location as being there.
The same issues can occur if, during normal times, badges are not forced to swipe at muster readers to gain entry into and out of hazardous areas or if physical barriers are not present to enforce one and only one physical entry per card swipe.
Stanley recommends the following during normal times, at muster entry and exit readers:
– Require that all access to hazardous locations be performed through the
Access Control System. Utilize physical barriers such as full turnstile and vehicle gates to enforce one and only one physical entry per card swipe.
This implies that a scenario should not be allowed where people freely enter a hazardous location and are then issued an access control badge once inside. If an incident occurs just after they have entered the hazardous location, there will be no record of them being in the hazardous area. If personnel, such as visitors, must enter hazardous locations without being issued a physical badge, they should first be issued a “virtual” badge in the system and the interface to manually place their badges inside of the hazardous location should be used.
When they visitors physically leave the hazardous location, the same interface should be used to manually take them out of the hazardous location. It is likely going to be simpler and more reliable to actually issue real visitor badges that are used for access into and out of the hazardous locations.
– Utilize Hard APB enforcement into and out of hazardous locations.
– Configure reader offline modes to be “Locked”. If personnel must enter/ exit the hazardous areas through doors whose readers are currently offline with their ISC, record the badge movement via the interface for manually moving a badge into a specific area.
Note, however, that if free access is required through muster exit readers during muster mode, that the door strikes must be physically overridden during muster mode via an external source to ensure free exit during muster mode when readers are offline with their ISC’s.
Additionally, all host computers running B.A.S.I.S. Communication Servers that are communicating with Access Controllers in the same Global APB Segment, must be time synchronized.
• B.A.S.I.S. will not automatically change the mode of muster exit readers to unlocked or locked during an incident and back to a card mode at the end of an incident. It is assumed an external override will be used to override door strikes and physical barriers. For example if a fire system and access control system are installed at a site, the access control system is typically not depended upon to unlock the doors during a fire; the fire system overrides the door strike.
• Registration at safe locations is required after muster mode occurs even if personnel are already in the safe location at the start of the incident.
revision 1
— 181
12: Muster Mode
Muster Mode in Main Alarm Monitoring Window
In muster mode, the Main Alarm Monitoring window displays a muster mode start alarm. Right-clicking the alarm and selecting the area in muster mode displays a sub-menu of options. These options are also available by right-clicking a hazardous or safe area icon in a map or in the System
Status
window.
Note:
In certain situations some right-click options listed below may not be available because they are location and/or mode (normal or muster) dependant.
Right-click Muster mode alarm sub-menu options
Option Description
Update Area
Status
View Map
Updates the status of both safe and hazardous areas so that operators can have a current view of cardholder locations.
Displays a map associated with the alarm. If several maps are associated with an alarm, the operator is prompted to select a map.
Move Badges Enables an operator to manually move all the badges in one area to another.
Occupancy Report Provides a current report of the cardholders currently in a safe area with information such as: the badge ID, the cardholder name, the time entered, and how the area was entered.
Muster Report
Note:
The occupancy report can also be run for a hazardous area. The occupancy report for a hazardous area is the similar to the muster report except it does not report the last attempted location.
Provides a current report of the cardholders currently in a safe area with information such as: the badge ID, the cardholder name, the time entered, and the area/last attempted location.
Note:
The muster report cannot be run for a safe area.
Start Muster Mode Initiates muster mode. The Start Muster Mode window displays and provides an area to enter comments.
Reset Muster
Mode
Ends muster mode. The Reset Muster Mode window displays and provides an area to enter comments.
Hazardous / Safe Locations in System Status Window
Hazardous and safe location icons display in the System
Status
window under the
Global Anti-Passback Areas and Mustering section. Alarm monitoring operators can right-click hazardous or safe area icons and view all or some of the options available in the Right-click Muster mode alarm sub-menu options on page 182 table, depending on the area selected.
182 —
revision 1
Alarm Monitoring User Guide
Muster Mode Procedures
Initiate Muster Mode
Muster mode is manually initiated via the Main Alarm Monitoring window,
System
Status
window or map view.
Depending on how your
System Administrator configures hazardous locations, muster mode initiation may automatically remove all cardholders from a safe location.
1. Using the Alarm Monitoring application, do one of the following:
• From the Main Alarm Monitoring window - Right-click the Muster
Mode Start alarm and select the hazardous location in muster mode. A sub-menu displays. Select Start Muster Mode.
• From the System
Status
window - Right-click an area and select Start
Muster Mode.
• From t select Start Muster Mode.
2. The Start Muster Mode window displays.
3. Enter any notes relating to why muster mode is being activated, and click
[Yes] to activate muster mode.
4. A warning message displays. Click [OK]. Muster mode is initiated.
Reset Muster Mode
Muster reset is a manual operation that takes a hazardous area out of muster mode. Muster reset will not automatically remove personnel in hazardous
revision 1
— 183
12: Muster Mode
locations. If a person really does remain in a hazardous area, you want to keep a record of them being there.
1. Using the Alarm Monitoring application, do one of the following:
• From the Main Alarm Monitoring window - Right-click the Muster
Mode Start alarm and select the hazardous location in muster mode. A sub-menu displays. Select Reset Muster Mode.
• From the System
Status
window - Right-click an area and select Reset
Muster Mode.
• From t select Reset Muster Mode.
2. The Reset Muster Mode window displays. Enter any notes and click [Yes] to reset muster mode.
3. A warning message displays. Click [OK] and muster mode is initiated.
Reports
Several reports are available with mustering:
•
Muster mode report - lists the badge IDs, cardholder name, time entered, how entered, and their last attempted location for a specific hazardous area.
The status bar of the report displays the total occupancy for that area and the words MUSTER MODE. The title of the report displays the name of hazardous location and the time and date the report was initiated.
•
Occupancy report - list badge IDs, cardholder name, time entered, and how entered. The status bar displays the total occupancy for that area. The title of the report displays the name of the safe location and the time and date the
184 —
revision 1
Alarm Monitoring User Guide
report was initiated. The occupancy report is sometimes referred to as the
Safe Location report.
Run Muster and Occupancy Reports
Operators can run the muster and occupancy reports from the Main Alarm
Monitoring window or System
Status
window. They can also right-click a hazardous or safe icon in map view to run reports.
1. Display either the Main Alarm Monitoring window or the System
Status window.
2. Do one of the following:
• From the Main Alarm Monitoring window - Right-click the Muster
Mode Start alarm, select the device (in this case it would be the hazardous location in muster mode.) A sub-menu displays. Select
Muster Report or Occupancy Report.
• From the System
Status
window - Right-click an area and select Muster
Report or Occupancy Report.
Notes:
Muster reporting automatically refreshes every two minutes. However the user can manually refresh a report at any time.
Automatic reporting ends when the number of personnel in the muster report becomes zero.
Report right-click options
Both the muster and occupancy report (via right-click options) allow operators to move one or several badges from an area as well as select a cardholder and bring up their badge information.
Moving Badges
Specific user permission is required to move badges.
The focus of muster mode is to account for all personnel in hazardous locations.
The muster report provides this information. If an operator verifies that personnel recorded as being in the hazardous location are physically outside the hazardous area they can manually move the badge to a different area.
revision 1
— 185
12: Muster Mode
Move All Badges from an Area
1. You can move every badge from a safe or hazardous area via several windows:
• From the Main Alarm Monitoring window right-click the muster mode
Start alarm, select the hazardous area and then select Move Badges.
• From the System
Status
window right-click an APB area and select
Move Badges.
• From a map view right-click an APB area and select Move Badges.
2. When prompted to confirm your request. Click [Yes].
3. The Area Move Badges window displays. Select the desired area (a checkmark displays beside the area), enter any notes and click [OK].
Move a Single Badge from an Area
Operators can also move a single badge from a safe or hazardous area; this can only be done through the occupancy or muster report.
1. Run the occupancy or muster report. For more information, refer to Run
Muster and Occupancy Reports on page 185.
2. From the occupancy or muster report right-click and select Move Badge to
APB Area.
Note:
You can also move multiple badges from an area; this can be done by highlighting the desired badges, right-clicking and selecting Move Badge to
APB area.
186 —
revision 1
Advanced Operator
Procedures
Alarm Monitoring User Guide
Chapter 13: Cardholders Folder
Toolbar Shortcut
Notes:
The Cardholders folder contains forms with which you can:
• Add, modify and delete cardholder and visitor records.
• Assign cardholders or groups of cardholders to different segments.
• Create badge records for cardholders and visitors.
• Assign access levels to active badges for cardholders and visitors.
• Assign one or more Precision Access groups to a badge (if Precision Access is used on your system).
• Search for and display cardholders and visitors biometrics records.
• Search for cardholders and visitors visit records.
• Assign and track assets to cardholders and visitors.
• Link directory accounts to cardholders and visitors.
• Assign a cardholder as a tour guard.
• Assign security clearance levels to tour guards.
• Create and print reports containing cardholder information.
The folder contains up to eleven forms: the Cardholder/Visitor form, the Badge form, the Segments form (if segmentation is enabled), the Access Levels form, the Precision Access form (if in use), the Biometrics form, the Visits form, the
Assets form, the Directory Accounts form, the Guard Tours form and the Reports form.
The Cardholders folder is displayed by selecting Badge Info from the View menu, or by selecting the Cardholders toolbar button.
The forms in the Cardholders folder are visually divided into four sections; the right section, the upper-left section, the middle-left section and the bottom section.
Several of the form elements in these sections are common to every form in the cardholders folder. Refer to the following table for descriptions of the common form elements.
This documentation refers to cardholder data fields that are shipped as the default by Stanley. If you have used the FormsDesigner application to
revision 1
— 189
13: Cardholders Folder
customize your cardholder data, the elements on your Cardholders folders will be different.
The Segments form is only available if segmentation is enabled on your system
The availability of certain forms and fields in the Cardholders folder is subject to licensing restrictions.
Cardholders Folder
Form Element Comment
Common form elements - right section
Photo display
Signature display
Last access
Displays the cardholder’s photo as it appears on their badge.
Displays the cardholder’s signature as it appears on their badge.
If Show Last Granted Location is selected in the Cardholder menu, displays information about the most recent valid access by this cardholder, including the triggered event, date, time and reader name.
Badge ID
Issue code
Prints
Activate
If Show Last Attempted Location is selected in the Cardholder menu, displays information about the most recent access attempt (whether access was granted or not) by this cardholder, including the triggered event, date, time and reader name.
Displays the numeric identifier assigned to the cardholder’s active badge.
Displays the issue code assigned to the cardholder’s active badge.
Displays the number of times the active badge has been printed.
Displays the date when the badge becomes valid.
Deactivate Displays the date when the badge becomes invalid.
Common form elements - upper-left section
Last name
First name
Middle name
Cardholder ID
Indicates the cardholder’s last name.
Indicated the cardholder’s first name.
Indicates the cardholder’s middle name.
Indicates the cardholder’s ID number.
Badge type
Note:
This field is not displayed on the Visitor form.
Indicates the cardholder’s badge type. Badge types are configured in the Badge Types folder.
For more information refer to the Badge Types Folder chapter in the System Administration
User Guide.
Common form elements - bottom section
Search Displayed in view mode on every form in the Cardholders folder. This button is used to search for existing cardholder records.
190 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder (Continued)
Form Element
Add
Comment
Enabled in view mode on the Cardholder/Visitor and Badge form and is used to add a record.
Modify
Delete
Encode
Note:
This button is displayed but not enabled on the Segments form, the Access Levels form, the Precision Access form, the Biometrics form, the Visits form, the Guard
Tours form and the Reports form because these records are not added in the
Cardholders folder.
Displayed in view mode on every form in the Cardholders folder.
Note:
This button will be displayed but will not be enabled on the Directory Accounts form and the Reports form, because directory account and report records cannot be modified.
Enabled in view mode on the Cardholder/Visitor and Badge form and is used to delete a record.
Note:
This button is displayed but not enabled on the Segments form, the Access Levels form, the Precision Access form, the Biometrics form, the Guard Tours form and the
Reports form because these records are not deleted in the Cardholders folder.
Displayed in view mode on every form in the Cardholders folder. When selected, displays the
Badge Printing window from where you can print the active badge for the current record, or the active badges for all records found in a search.
You can also log and print errors encountered during the print operation.
Note:
When you select this button on the Reports form, the Print Report Options window
For more information, refer to
Chapter 18: Print Report Options
Note:
Displayed in view mode on every form in the Cardholders folder. When selected, displays the Encode Badge window from where you can encode the badge configurations selected for the cardholder onto a smart card. For more information refer to the Card Formats Folder chapter in the System Administration User
Guide.For cardholder records with guest badge types, clicking this button will display the Increment Issue Code window.
The availability of this button is subject to licensing restrictions.
Displayed in search mode on every form in the Cardholders folder. When selected, moves to the first record that matches your search criteria.
Displayed in search mode on every form in the Cardholders folder. When selected, by default moves 10 matching records back. You can change the number of records moved back by modifying the value in the Number of records to scroll for fast forward and rewind field on the View Options window. The View Options window is displayed by selecting View Options from the Cardholder menu.
Displayed in search mode on every form in the Cardholders folder. When selected, moves to the previous record that matches your search criteria.
Displayed in search mode on every form in the Cardholders folder. When selected, moves to the next record that matches your search criteria.
revision 1
— 191
13: Cardholders Folder
Cardholders Folder (Continued)
Form Element
OK
Cancel
Clear
Clear All
Capture
Last Search
Record count
Comment
Displayed in search mode on every form in the Cardholders folder. When selected, by default moves 10 matching records forward. You can change the number of records moved forward by modifying the value in the Number of records to scroll for fast forward and rewind field on the View Options window. The View Options window is displayed by selecting View Options from the Cardholder menu.
Displayed in search mode on every form in the Cardholders folder. When selected, moves to the last record that matches your search criteria.
Displayed in search or modify mode on every form in the Cardholders folder. When selected, saves the changes made to the current record, or begins the requested search.
Displayed in search or modify mode on every form in the Cardholders folder. When selected, cancels the pending requested action.
Displayed in search or modify mode on every form in the Cardholders folder. When selected, clears all current record information that can be cleared from the current form.
Displayed in search or modify mode on every form in the Cardholders folder. When selected, clears all current record information that can be cleared from all forms in the folder.
Displayed in add or modify mode on the Cardholder/Visitor form, the Segments form, the
Badge form, the Access Levels form, the Precision Access form and the Biometrics form.
Displayed in modify mode on the Visits form. When selected, opens Multimedia Capture.
Note:
The availability of Multimedia Capture is subject to licensing restrictions.
Displayed in search mode on every form in the Cardholders folder. When selected, retrieves the same group of records that was found by the most recent search operation.
Displayed in view mode on every form in the Cardholders folder and indicates the number of the record out of the total number of records found by the most recent search operation. For example: 6 of 10.
Person type
You can type in a number and hit the <Enter> key to jump to that record number.
In search mode, select the type of record you want to search.
Choices are:
• All - when selected, your search will locate both Cardholder and Visitor records
• Cardholders - when selected, your search will only locate cardholder records
• Visitors - when selected, your search will only locate visitor records
Cardholders Folder Procedures
The following procedures pertain to every form in the Cardholders folder unless otherwise noted.
192 —
revision 1
Alarm Monitoring User Guide
Cardholder Search Capabilities
Before you begin searching cardholders you must have cardholder search permissions enabled. For more information, refer to Cardholder Permission
Groups Form (Cardholder Sub-tab) in the System Administration or ID
CredentialCenter user guide.
In search mode, you can search on any combination of fields in the Visits folder, including the Status search, Visit and Details forms. On the E-mail and Reports forms, you can only search for the host name or visitor name.
Comparison operator
>
<
=
!= or <>
>=
<=
%
Comparison Operators
Comparison operators
are symbols that represent specific actions. You can refine your search by prefixing search fields with a comparison operator. Refer to the following table to identify the comparison operators you can use with different fields.
Description
Equal to
Not equal to
Greater than
Less than
Greater than or equal to
Less than or equal to
Contains
Text field
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Numeric field
Yes
Yes
Yes
Yes
Yes
Yes
NA
Drop-down list
Yes
Yes
NA
NA
NA
NA
NA
Notes:
“Equal to” is the default comparison operator for numeric and drop-down list fields.
If you type an equal to sign “=” in a field and nothing else, B.A.S.I.S. will search for records that have an empty value for that field. For example, typing an “=” in the Department field will find every record that does not have an assigned department.
Note:
Search Fields Using “Begins With”
For text and drop-down list fields you can search records whose values begin with specific characters by entering those characters in the field. For example, when searching by last name, a filter of “L” will find “Lake”, “Lewis”, etc. A filter of “Lake” will find “Lake”, “Lakeland”, etc.
The default comparison operator for text fields is “begins with”.
revision 1
— 193
13: Cardholders Folder
Note:
Search Multiple Fields
When you search multiple fields, the search criteria for each field is combined.
For example, typing “A” in Last name field and “B” in First name field will find all people whose last name begins with “A” and whose first name beings with “B”.
One exception is searching access levels, which uses an “or” comparison for multiple selections. For example, selecting both “Access Level A” and “Access
Level B” will find all cardholders with either “Access Level A” or “Access Level
B” assigned.
If you want to search for a range of Badge IDs, take advantage of the two
Badge ID fields on the Badge form. One field is located in the middle-left section of the form and the other field is located in the right section of the form. Note, the form must be in modify mode to see both fields. Type “>=
100” in one field and “<= 200” in the other to find all badges with IDs between 100 and 200 (inclusive).
Search for a Cardholder Record
1. In Alarm Monitoring, select Badge Info from the View menu. In all other applications, select Cardholders from the Administration menu.
2. The Cardholders folder opens. Click [Search].
3. If you are searching for a cardholder or visitor, select the type of person you are searching for in the Person type drop-down list (in the lower right). This field may not display due to licensing restrictions.
4. Specify your search criteria by typing full or partial entries in any enabled field on any of the tabs.
5. Click [OK].
6. B.A.S.I.S. retrieves and displays the first matching record. Use the navigational buttons (in the lower right) to look at additional matching records.
record.
First record/Last Record - Displays the first/last matching
Rewind/Fast Forward - Moves backward/forward ten matching records. To modify the number of records moved, refer to the View Options window, which is accessed from the Cardholder menu.
Previous record/Next record - Displays the previous/next matching record.
194 —
revision 1
Alarm Monitoring User Guide
Retrieve the Most Recent Search Results
1. Display the Cardholders folder or Visits folder by completing one of the following:
• To display the Cardholders folder in Alarm Monitoring, select Badge
Info from the View menu. For all other applications, select
Cardholders from the Administration menu.
• To display the Visits folder in Alarm Monitoring, select Visits from the
View menu. For all other applications, select Visits from the
Administration menu.
2. Click [Search].
3. Click [Last Search]. The criteria you selected from the most recent search operation will be inserted into the appropriate fields.
4. You can optionally modify your search criteria.
5. Click [OK].
6. B.A.S.I.S. retrieves and displays the first matching record. Use the navigational buttons to look at additional matching records.
Change the Cardholders Folder View Options
1. Select View Options from the Cardholder menu. The View Options window opens.
2. From the Cardholder photo lookup drop-down list, select the image type you want displayed in Photo display (located in the right section of the
Cardholders folder forms).
Choices include:
• None - no image will be displayed
• Normal image - a photo image will be displayed as it was originally captured
• Normal image with chromakey - a photo image will be displayed, but without its background
• Thumbnail - This option is only displayed if the Create/save photo
thumbnails check box in Administration > Cardholder Options >
revision 1
— 195
13: Cardholders Folder
General Cardholder Options is selected. A smaller thumbnail version of the photo is displayed.
3. From the Cardholder signature lookup drop-down list, select the type of signature you want displayed in Signature display (located in the right section of the Cardholders folder forms).
Choices include:
• None - no signature will be displayed
• Normal image - a signature will be displayed
4. In the Number of records to scroll for fast forward and rewind field, type in the number of records you want to move backwards and forwards when you select the
5. Click [OK].
and push buttons.
196 —
revision 1
Keyboard Wedge Settings Window
Alarm Monitoring User Guide
A wedge scanner, also sometimes referred to as a wedge reader, is a device that is attached to a keyboard and used to scan badge IDs as direct keyboard input.
Wedge scanners can be used with B.A.S.I.S. to:
•
Add a badge. In this scenario, each card entry station has a wedge scanner.
The operator clicks [Add] and swipes the badge with the wedge scanner to read the badge ID. This is equivalent to typing in the badge ID at the keyboard. When a wedge scanner is used in this manner, no configuration of the settings on the Keyboard Wedge Settings window is needed.
•
Search for a badge. The normal way to search for a badge in B.A.S.I.S. is to click [Search] and then specify what to search for, such as badge ID or social security number. When a wedge scanner is used, the [Search] button does not need to be clicked; instead, the system specifically searches on one predefined criteria. When a wedge scanner is used in this manner, the settings on the Keyboard Wedge Settings window must be properly configured.
When to Use the Keyboard Wedge Settings Window
The Keyboard Wedge Settings window only needs to be configured on systems that will be using a wedge scanner to search for badges. This may include:
• MobileVerify stations. MobileVerify stations typically use a wedge scanner because using a keyboard on a mobile computer is awkward. The wedge scanner provides a quick way to search for a cardholder and instantly grant or deny access based on the system’s recommendation.
The settings on the Keyboard Wedge Settings window determine the format of the data that is sent between a wedge scanner and the B.A.S.I.S. system, and are specified on a per workstation basis. Administrative rights to the workstation are required to change these settings because any changes must be written to the
ACS.INI file.
revision 1
— 197
13: Cardholders Folder
Displaying the Keyboard Wedge Settings Window
The Keyboard Wedge Settings window is displayed by selecting Keyboard
Wedge Settings from the Cardholder menu. (In System Administration, ID
CredentialCenter, Visitor Management, and View/Edit Only the Cardholder menu is only displayed after selecting Cardholders from the Administration menu. In Alarm Monitoring, the Cardholder menu is displayed after clicking the
toolbar button.)
CAC Barcodes
A common access card (CAC) is a military-issued ID card that is issued to active duty personnel, selected reservists, Department of Defense civilian employees, eligible contractors, and some foreign nationals. Retirees, family members, and inactive reservists are not currently issued a CAC card.
Configuring B.A.S.I.S. to Read CAC Barcodes
To set the B.A.S.I.S. system up to read CAC cards, the If length of input
exceeds limit, assume CAC barcode check box on the Keyboard Wedge
Settings window must be selected. A limit also needs to be specified. If only
CAC cards will be read, then the Limit can be set to 0. However, most systems will also need to have the ability to read other cards in addition to CACs, so the limit will need to be set to an appropriate value.
For example, a military base that assigns badge IDs to the people on its base may want to be able to read those badge IDs as well as CACs because visitors from other bases will only have a CAC. In this case, the limit would need to be set to an appropriate number. If the badge IDs were all nine digits long, then an appropriate limit would be ten because CAC barcodes are much longer than ten digits.
Scanning Barcodes with a Wedge Scanner
When an ID is scanned, B.A.S.I.S. determines the length of the number that was scanned. If the number of digits exceeds the limit, then the number is treated as a
CAC number, and the social security number is decrypted and searched up.
If the number of digits is less than the limit, then the maximum length, start, and end settings are applied to the string and used to extract the search criteria
(typically badge ID or social security number).
After those settings are examined, the system then examines the Table and Field and searches that information up. The Table and Field specified depend on what information is encoded on the card that will be read in addition to the CAC.
Common options include:
• Badge ID. If searching on Badge IDs, select the BADGE table and the ID field.
• Social security number. If searching on social security numbers, select the
EMP table and the SSNO field.
198 —
revision 1
Alarm Monitoring User Guide
• User-defined field. If searching on a user-defined field, select the desired table and field. For example, a company may wish to search on a table and field that is unique to their system, such as an employee number.
The following flowchart describes what happens when a barcode is scanned with a wedge scanner:
Scanning Barcodes with a Wedge Scanner
Scan badge
Is CAC being used?
No
Yes
Is length of number scanned greater than Limit?
No
B.A.S.I.S. examines
Ignore non-numeric
data, Max length, Start, and End settings
Yes
B.A.S.I.S. decrypts social security number from CAC number
B.A.S.I.S. examines
Field and Table
B.A.S.I.S. searches up social security number
B.A.S.I.S. searches up
field and table
revision 1
— 199
13: Cardholders Folder
Keyboard Wedge Settings Window
Form Element
Table
Comment
Select the table in the B.A.S.I.S. database that you wish to search on when keyboard input is detected. If searching for badge ID numbers, select the BADGE table, and if searching for social security numbers, select the EMP table.
Field
If length of input exceeds limit, assume CAC barcode
Limit
Ignore nonnumeric data
Max length
Note:
If CAC is being used and an ID is scanned that has more than the specified Limit of digits, then the Table and Field will be ignored.
Select the field in the selected table in the B.A.S.I.S. database that you wish to search on when keyboard input is detected. If searching for badge ID numbers, select ID (in the BADGE table), and if searching for social security number, select SSNO (in the EMP table).
Note:
If CAC is being used and an ID is scanned that has more than the specified Limit of digits, then the Table and Field will be ignored.
If selected, CAC (Common Access Card) barcodes can be used. This allows military code
3of9 barcodes to be scanned and decoded into the cardholder’s social security number. If you do not wish to use this feature, leave this check box deselected.
If this check box is selected, you must specify an appropriate Limit. When this check box is selected and an ID is scanned, the number of digits will be examined.
• If the number of digits is less than or equal to the Limit, then the system will search on the Table and Field.
• If the number of digits is greater than the Limit, then the system will assume the
ID was a CAC, decrypt the social security number, and search the social security number up.
The Limit field is only enabled when the If length of input exceeds limit, assume CAC
barcode check box is selected.
If the Limit is set to zero, then only CAC can be read. Setting a limit greater than zero enables the system to recognize two different formats. When an ID is scanned, the number of digits will be examined.
• If the number of digits is less than or equal to the Limit, then the system will search on the Table and Field using the Max length, Start, and End settings.
• If the number of digits is greater than the Limit, then the system will assume the
ID was a CAC, decrypt the social security number, and search the social security number up.
If selected, non-numeric data is removed and not counted as a placeholder. This is important for scans that include dashes in the social security number. For example, if an ID is scanned that has 123-45-6789 encoded, the system will search for 123456789.
A maximum length must be provided if the wedge scanner does not automatically provide a line feed carriage return. This allows the wedge scanner to be used as long as the length of the scan is always the same (i.e., social security number).
If 0 or -1 is specified, then the whole string will be read in.
200 —
revision 1
Alarm Monitoring User Guide
Keyboard Wedge Settings Window (Continued)
Form Element
Start
Comment
The Start field works in combination with the End field. When an ID is scanned, a string of numbers are read. As long as the ID is not a CAC, that string of numbers typically contains the actual badge ID or social security number. For a CAC, that string of numbers doesn’t contain the actual social security number, but B.A.S.I.S. does “decrypt” the social security number from the string.
End
OK
Cancel
The Start position is important because the string of numbers may contain other numbers in addition to what is being searched for; it is the first position in the string of numbers that contains a digit of what is being searched for. The End position is the last digit of what is being searched for.
The End position should be greater than or equal to the Start position. Take for example the string 123456789. If 4 is the Start position and 7 is the End position, then the B.A.S.I.S. system will search on 4567.
If you specify an End position that is less than the Start position, B.A.S.I.S. assumes the end is 255. Therefore, for the string 123456789 with 4 as the Start and 3 as the End, B.A.S.I.S. would search on 456789.
The End field works in combination with the Start field. As long as the ID is not a CAC, that string of numbers typically contains the actual badge ID or social security number. For a CAC, that string of numbers doesn’t contain the actual social security number, but B.A.S.I.S. does
“decrypt” the social security number from the string.
The Start position is important because the string of numbers may contain other numbers in addition to what is being searched for; it is the first position in the string of numbers that contains a digit of what is being searched for. The End position is the last digit of what is being searched for.
The End position must be greater than or equal to the Start position. Take for example the string 123456789. If 4 is the Start position and 7 is the End position, then the B.A.S.I.S. system will search on 4567.
If you specify an End position that is less than the Start position, B.A.S.I.S. assumes the end is 255. Therefore, for the string 123456789 with 4 as the Start and 3 as the End, B.A.S.I.S. would search on 456789.
Applies the selected wedge scanner settings and closes the Keyboard Wedge Settings window.
Closes the Keyboard Wedge Settings window without applying any changes made.
revision 1
— 201
13: Cardholders Folder
Keyboard Wedge Settings Window Procedures
Configure a Wedge Scanner
How the B.A.S.I.S. system interprets the information it receives from a wedge scanner can be configured by doing the following:
1. In System Administration, ID CredentialCenter, Visitor Management, or
View/Edit Only, select Cardholders from the Administration menu. In
Alarm Monitoring, click the toolbar button.
2. Select Keyboard Wedge Settings from the Cardholder menu.
3. The Keyboard Wedge Settings window opens.
202 —
revision 1
a. Specify the Table and Field you wish to search on when non-CAC input is detected. By default, the system searches on the ID field in the
BADGE table. If for example you wanted to search based on social security number instead of badge ID, you would select the SSNO field in the EMP table.
b. If CAC (Common Access Card) barcodes will be used, select the If
length of input exceeds limit, assume CAC barcode check box and specify the limit. This allows military code 3of9 barcodes to be scanned and decoded into the cardholder’s social security number. If you do not wish to use this feature, leave this check box deselected.
c. Select whether to ignore non-numeric data. By default, the Ignore non-
numeric data check box is selected. This is important for scans that include dashes in the social security number.
d. Specify the maximum length in the Max length field. A maximum length must be provided if the wedge scanner does not automatically provide a line feed carriage return. This allows the wedge scanner to be used as long as the length of the scan is always the same (i.e., social security number).
Alarm Monitoring User Guide
Note:
If 0 or -1 is specified, then the whole string will be read in.
e. Specify the start and end. In a string of numbers that contains a search criteria (typically social security number or badge ID), start and end are the first and last position, respectively, that contain the search criteria.
f. Click [OK].
Verify Fingerprint(s) Dialog
Fingerprint Verification with PIV Cards
When fingerprint data is imported from PIV cards, the Verify Fingerprint(s) dialog will be displayed allowing you to capture the cardholder's live fingerprint for comparison against the fingerprint encoded on the PIV card. If the PIV card is encoded with a facial image, it is displayed for additional verification.
Important:
Fingerprint verification is optional. To verify fingerprints, select the Verify
fingerprints on import check box in the Cardholder Options Folder >
General Cardholder Options Form in System Administration.
Verify Fingerprint(s) Dialog
Dialog Element
Facial image from
PIV card
Capture Device
Comment
If a facial image is encoded on the PIV card, it is displayed in the left pane of the dialog for verification of the cardholder’s identity.
From the drop-down list, select the fingerprint scanning device you are using to capture the fingerprint.
revision 1
— 203
13: Cardholders Folder
Verify Fingerprint(s) Dialog (Continued)
Dialog Element
Live fingerprint
Status display
Capture
Abort
Close
Comment
The captured fingerprint is displayed in the left pane. This image is compared against the fingerprints encoded on the PIV card.
Messages and on-screen prompts are displayed in the status box below the fingerprint image.
Click this button to begin capturing the fingerprint.
Click this button to stop the capture operation.
Click this button to close the dialog.
Verify Fingerprint(s) Dialog Procedures
Verify Fingerprints from a PIV Card
1. When the Verify Fingerprint(s) dialog is displayed, follow the on-screen prompts provided in the status box below the fingerprint image. You will be guided through the process of capturing and verifying the fingerprints.
2. From the Capture Device drop-down select the device you will use to capture the fingerprints.
3. When prompted, the cardholder presents his/her finger to the capture device.
4. Click [Capture].
5. If the fingerprints match, a successful issuance is registered with B.A.S.I.S.
However, if fingerprint verification fails, the card is terminated and recycled.
Note:
If the PIV card contains a facial image, it is displayed with the captured fingerprint image for additional verification of the cardholder.
6. To stop the capture operation, click [Abort].
Import Fingerprints from a PIV Card
To import the fingerprints encoded on the PIV card into the database:
Important:
Ensure the Import fingerprints from card into database check box is selected in the Cardholder Options Folder > General Cardholder Options
Form in System Administration.
Note:
When importing data from a PIV card after adding, modifying, or searching on a badge (NOT a cardholder), cardholder-specific data that is imported
204 —
revision 1
Alarm Monitoring User Guide
(Last name, First name, Middle name, and Cardholder ID) is not overwritten even though it is displayed in the grayed-out fields. However, the cardholder photo is imported if the user confirms replacement of the existing photo.
Overwrite Facial Image Dialog
Note:
After fingerprint verification, if the cardholder already has a photo, the Overwrite
Facial Image dialog is displayed allowing you to import the facial image from the
PIV card and overwrite the current cardholder photo with it.
Existing cardholder photos are NOT automatically overwritten. If there is an existing cardholder photo, the Overwrite Facial Image dialog is displayed with the current photo and the photo from the card allowing the user to choose which one to use.
Overwrite Facial Image Dialog
Dialog Element
Current Photo
New Photo on
Card
Overwrite
Cancel
Comment
Displays the cardholder’s current photo.
Displays the facial image encoded on the PIV card.
Click this button to replace the current photo with the one on the PIV card.
Click this button if you do not wish to overwrite the current photo.
revision 1
— 205
13: Cardholders Folder
Overwrite Facial Image Dialog Procedure
Replace Cardholder Photo with Facial Image on PIV Card
1. If the Overwrite Facial Image dialog is displayed, compare the facial image from the PIV card with the current cardholder photo.
2. Click [Overwrite] to replace the current cardholder photo with the one from the PIV card.
3. If you do not wish to replace the current cardholder photo, click [Cancel].
Cardholder Form
Cardholder Form Overview
In the System Administration and ID CredentialCenter applications, the
Cardholder form is used to:
• Define a cardholder.
• Enter or import demographic information into the cardholder record.
• Choose a badge type for the cardholder.
• Access Multimedia Capture (subject to licensing restrictions).
In the Visitor Management application, the Cardholder form is used to search for a cardholder.
206 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Cardholder Form
Form Element
Cardholder data
Record last changed
Comment
Displayed in view mode. When adding or modifying a cardholder record, enter the cardholder’s information such as name, address and department into these fields.
Displayed in view mode and indicates the date on which the selected cardholder record was last modified and saved.
This date is updated only when cardholder information is changed, not when badge information is changed. The last changed date is saved individually for each badge record as well.
Import Cardholder/Visitor Data
Users can import demographic data stored on business cards, passports, driver’s licenses, identification (ID) cards, and smart cards during cardholder/visitor add,
the user-defined fields (UDF) that must be mapped in FormsDesigner to import data into the Cardholder form.
Note:
Licenses are required to import cardholder data and are based on the number of scanning terminals used.
Prerequisites
System Administrators should complete the following steps in order to prepare
B.A.S.I.S. to import information:
1. Configure the reader/scanner communication settings including the
workstation to which it is connected. Refer to the third column in the
Cardholder/Visitor Import table on page 208 to determine if you have to
configure the reader/scanner in B.A.S.I.S. and if so, what the device type would be. For more information, refer to the Encoders/Scanners form in
System Administration.
revision 1
— 207
13: Cardholders Folder
Note:
Some reader/scanners do not need to be configured in the B.A.S.I.S. application. Simply load the drivers onto the encoding/scanning workstation.
2. Map the demographic data to the appropriate user-defined fields in Forms
Designer. For more information, refer to the FormsDesigner User Guide.
3. For PIV cards: a. Configure the fingerprint settings in the General Cardholder Options form. For more information, refer to the Cardholder Options chapter in the System Administration User Guide.
b. Ensure the PIV card is inserted in the PC/SC encoder/scanner.
Cardholder/Visitor Import
Source Hardware scanner
Business card
Passport
License required
Driver’s license ScanShell 800 Terminal Yes
Identification card
GSC (DESFire) smart card
GSC (iCLASS) smart card
Corex CardScan scanner
ScanShell 1000
Terminal
ScanShell 1000
Terminal
ID-Check Terminal
ScanShell 800 Terminal
ScanShell 1000
Terminal
ID-Check Terminal
No
Yes
Yes
Yes
Yes
Yes
No
MIFARE Pegoda
Contactless Smart Card
Reader (MF EV700)
HID iCLASS
Yes
Yes
Device Type to select in
Workstations folder
NA
NA
NA
NA
ID-Check
Terminal
NA
NA
ID-Check
Terminal
NA
HID (iCLASS) reader/encoder
Import Source to select
UDF
Corex CardScan scanner
ID Scan vCard
ID Scan
ID Scan
ID-Check Terminal
ID Scan
ID Scan
ID-Check Terminal
GSC (DESFire) smart card
GSC (iCLASS) smart card
DMV/
Passport
DMV/
Passport
DMV/
Passport
DMV/
Passport
DMV/
Passport
DMV/
Passport
DMV/
Passport
CAC
GSC
CAC
GSC
FASC-N
208 —
revision 1
Alarm Monitoring User Guide
Cardholder/Visitor Import
Source Hardware scanner
GSC
Cartographer smart card
PIV card
TWIC card
PC/SC encoder/scanner
PC/SC encoder/scanner
PC/SC encoder/scanner
License required
Yes
No
No
Device Type to select in
Workstations folder
PC/SC encoder/ scanner
Import Source to select
GSC Cartographer smart card
PC/SC encoder/ scanner
PC/SC encoder/ scanner
PIV card
TWIC card
PIV card
UDF
CAC
GSC
FASC-N
PIV
FASC-N
PIV
FASC-N
Corex Business Card Scanner
Using Corex Business Card scanners, users can import demographic data into the
Cardholder form from business cards.
The Corex Business Card scanners are not configured in B.A.S.I.S. as encoder/ scanners. Simply load the drivers onto the encoding/scanning workstation and the Corex CardScan scanner will be an option on the Select Import Source dialog.
Only data that is mapped to the appropriate vCard -UDF or DMV-UDF field in
FormsDesigner is imported into the Cardholder form.
GSC (iCLASS) Card
Using HID (iCLASS) readers/scanners, users can import demographic data into the Cardholder form from GSC (iCLASS) smart cards.
Only data that is mapped to the appropriate CAC, GSC, or FASC-N-UDF fields in FormsDesigner is imported into the Cardholder form.
Note:
If badge information is stored on the smart card, you will have to assign a badge type during import.
GSC (DESFire) Card
Using MIFARE Pegoda Contactless Smart Card Readers (MF EV700), users can import demographic data into the Cardholder form from smart cards from GSC
(DESFire) smart cards.
The MIFARE Pegoda Contactless Smart Card Reader (MF EV700) is not configured through the B.A.S.I.S. application. Simply load the drivers onto the
revision 1
— 209
13: Cardholders Folder
encoding/scanning workstation and the MF EV700 will be an option on the
Select Import Source window.
Only data that is mapped to the appropriate CAC or GSC -UDF fields in
FormsDesigner is imported into the Cardholder form.
ID Scan
Using the ID Scan scanners, users can import demographic data on driver licenses, identification cards, and passports issued by various Countries and State and Provincial Departments of Motor Vehicles.
Note:
Not all the state and provincial DMV’s currently encode their driver’s license and identification cards. Therefore, not all state driver licenses are supported.
Note:
Importation of cardholder and visitor data with ScanShell 800 and ScanShell
1000 CSS devices is now licensed. This license allows only a certain number of CSS devices, dictated by the license, to be configured through workstations and scanners.
The ScanShell 800 is the regular scanner that scans driver’s licenses and uses
OCR to extract data off of them. The ScanShell 1000 performs the same function plus passport scanning.
Only data that is mapped to the appropriate DMV-UDF fields in FormsDesigner is imported into the Cardholder form.
Data Import
Users will be prompted to select an ID, barcode, or passport during the scanning process. When ID scanning is selected users will have to select the country and the state/region of the driver license. However, when U. S. is selected (as the country), users will have an option to select auto detect (for the state). When auto detect is selected ID scan attempts to detect the state of the driver license that is being scanned.
ID-Check Terminal
Using the ID-Check Terminal scanner, users can import demographic data on driver licenses and identification cards issued by various State and Provincial
Departments of Motor Vehicles. These credentials usually use any combination of a 3-track magnetic stripe, 2D barcode, and 1D barcode. Only data that is mapped to the appropriate DMV-UDF field in FormsDesigner can be imported.
210 —
revision 1
Alarm Monitoring User Guide
Notes:
Not all state and provincial DMV’s are supported.
B.A.S.I.S. supports ID-Check terminals (IDC-1400) version 5.4 and later.
Note:
Importation of cardholder and visitor data with the ID-Check Terminal is now licensed. This license allows only certain number of ID-Check Terminal devices, dictated by the license, to be configured.
PIV Card
Using a PC/SC encoder/scanner, users can import data into the Cardholder form from PIV cards.
Only data that is mapped to the appropriate PIV-UDF or FASC-N-UDF fields in
FormsDesigner is imported into the Cardholder form.
After selecting the PIV card as the data import source, the user must enter their
PIN number to authenticate the process.
Fingerprint Verification and Import
Users will be prompted to verify the cardholder’s fingerprint(s) and the photo on the PIV card is presented for further verification. Fingerprints from the card may be imported as well. For more information, refer to
on page 203 and Import Fingerprints from a PIV Card on page 204.
Photo Replacement
If a photo is encoded on the PIV card, the user may elect to replace the current
cardholder photo with the one on the card. For more information, refer to
Replace Cardholder Photo with Facial Image on PIV Card on page 206.
TWIC Card
Using a PC/SC encoder/scanner, users can import data into the Cardholder form from TWIC cards which contain both TWIC and PIV data.
Only data that is mapped to the appropriate PIV-UDF or FASC-N-UDF fields in
FormsDesigner is imported into the Cardholder form.
After selecting either the TWIC card or PIV card as the data import source, the user must enter their PIN number to authenticate the process.
revision 1
— 211
13: Cardholders Folder
Import Cardholder Data
1. Select Cardholders from the Administration menu for all applications except Alarm Monitoring. (In Alarm Monitoring, select Badge Info from the View menu.)
2. The Cardholders folder opens. Click [Add].
Note:
The Import function is also available if the user searches for or modifies a cardholder/visitor or badge.
3. Click [Import].
4. In the Select Import Source window, select the import source available for
this workstation. For more information, refer to the Cardholder/Visitor
Note:
Import devices are configured in System Administration. In System
Administration, select Encoders/Scanners from the Workstations menu.
5. Click [OK].
6. Perform the instructions that display to complete the import data process.
Cardholder Form Procedures
Add a Cardholder Record
1. Select Badge Info choice the View menu. The Cardholders folder opens.
2. By default, the Cardholder form is displayed. Click [Add].
3. From the Person type drop-down list, select Cardholders.
212 —
revision 1
Alarm Monitoring User Guide
Note:
The Person type drop-down list is subject to licensing restrictions. If this field is not displayed, move on to the next step.
Note:
4. Enter the cardholder’s name and any additional information in the cardholder data fields.
You can switch to other tabs and modify the other forms at this time.
5. If you want to add a photograph or signature to the cardholder record, click
[Capture]. Multimedia Capture opens. For more information refer to the
Multimedia Capture appendix in the System Administration User Guide.
6. Click [OK] to save the record.
Modify a Cardholder Record
1. Locate the cardholder record you want to change.
2. Click [Modify].
3. Make the changes you want to the record.
4. Click [OK] to save the changes, or [Cancel] to revert to the previously saved values.
Delete a Cardholder Record
1. Locate the cardholder record you want to delete.
2. Click [Delete].
3. Click [OK].
Note:
If you delete the cardholder record, all associated records (Badge, Access
Levels, Precision Access, Biometrics, Assets, Directory Accounts, Guard
Tours and Visits) for the cardholder are also removed from the database.
revision 1
— 213
13: Cardholders Folder
Delete a Selected Group of Cardholder Records
Warning
This is a powerful feature that cannot be undone. Use caution when performing a bulk deletion of cardholders to ensure that you only delete the cardholders you want to eliminate from your database.
1. Locate the cardholder records you want to delete using the search function.
The bulk delete operation will act on all cardholders that result from the current search.
2. Select Bulk > Delete Cardholders in Search from the Cardholder menu.
The following message is displayed:
3. Click [Yes].
Destroy all Cardholder Data
Warning
This feature will wipe out all cardholder and badge information from the database without any transaction logging and cannot be undone. This function is mainly intended for wiping out data after a system has been installed and tested. For example, when you are first setting up the system and have imported cardholder data but you wish to change and redo the import. This function provides a quick way to wipe out all existing cardholder data.
1. Select Bulk > Destroy ALL Cardholder Data from the Cardholder menu.
The following message is displayed:
2. Click [Yes] to confirm the deletion of all cardholder data.
Visitor Form
To provide integration with Visitor Management, visitor records can be searched and viewed in the Cardholders folder. When the current record is a visitor, the first tab in the window changes from Cardholder to Visitor and will display the appropriate fields.
If you select the [Add] button on the Cardholder form, or the [Search] button on any of the forms in the Cardholders folder, the Person type drop-down list is displayed in the bottom section of the form.
214 —
revision 1
Alarm Monitoring User Guide
Notes:
The drop-down list choices are:
• All - when selected, your search will locate both Cardholder and Visitor records
• Cardholders - when selected, your search will only locate cardholder records
• Visitors - when selected, your search will only locate visitor records
With the exception of the Allowed visitors check box and the [Capture] button (in modify mode only) on the Visits form, visit records cannot be added, modified, or deleted from the Cardholders folder. To add, modify, or delete visits, you must purchase Visitor Management.
The availability of this form is subject to licensing restrictions.
Cardholders Folder - Visitor Form
Form Element
Visitor data
Last changed
Comment
Displayed in view mode. When adding or modifying a visitor record, enter the visitor’s information such as name, address and organization into these fields.
Displayed in view mode and indicates the date on which the selected visitor record was last modified and saved.
This date is updated only when visitor information is changed, not when badge information is changed. The last changed date is saved individually for each badge record as well.
revision 1
— 215
13: Cardholders Folder
Visitor Form Procedures
Import Visitor Data
For more information, refer to Import Cardholder/Visitor Data on page 207.
1. In Alarm Monitoring, select Badge Info from the View menu. In all other applications, select Cardholders from the Administration menu.
2. The Cardholders folder opens. Click [Add].
3. Click [Import].
4. In the Select Import Source dialog, select the import source available for this workstation. Click [OK].
Note:
Import sources are configured in System Administration under the
Workstations folder > Encoders/Scanners form.
5. Follow the instructions that display. They should explain how to scan and execute the import data transaction.
Add a Visitor Record
1. Select the Badge Info from the View menu. The Cardholders folder opens.
By default, the Cardholder form is displayed.
2. Click [Add].
3. From the Person type drop-down list, select Visitors.
4. Enter the visitor's name and any additional information in the visitor data fields.
216 —
revision 1
Alarm Monitoring User Guide
Note:
You can switch to other tabs and modify the other forms at this time.
5. If you want to add a photograph or signature to the visitor record, click
[Capture]. Multimedia Capture opens. For more information refer to the
Multimedia Capture appendix in the System Administration User Guide.
6. Click [OK] to save the record.
Modify a Visitor Record
1. Locate the visitor record you want to change.
2. Click [Modify].
3. Make the changes you want to the record.
4. Click [OK] button to save the changes, or the [Cancel] button to revert to the previously saved values.
Delete a Visitor Record
1. Locate the visitor record you want to delete.
2. Click [Delete].
3. Click [OK].
Note:
If you delete the visitor record, all associated records (Badge, Access Levels,
Precision Access, Biometrics, Assets, Directory Accounts, Guard Tours and
Visits) for the visitor are also removed from the database.
revision 1
— 217
13: Cardholders Folder
Segments Form
Note:
The Segments tab is only displayed if segmentation is enabled on your system.
Segments Form Overview
The Segments form is used to:
• Modify a cardholder’s segment assignment.
• Change a group of cardholder’s segments.
Cardholders Folder - Segments Form
Form Element
Primary segment
Additional
Segments listing window
Number of selections
Comment
In modify mode, select which primary segment you want the selected cardholder to be assigned to.
A cardholder can be assigned to a primary segment and as well as additional segments.
Lists all of the segments that have been configured in the system. For more information refer to the Segments Folder chapter in the System Administration User Guide.
Displays the number of segments that have been selected in the Additional Segments listing window. For example: 2 selections.
218 —
revision 1
Alarm Monitoring User Guide
Segments Form Procedures
Modify a Cardholder’s Segment Assignment
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Segments tab.
3. Locate the cardholder record that you want to modify.
4. Click [Modify].
5. From the Primary segment drop-down list, select which primary segment you want the selected cardholder to be assigned to.
6. If you want to assign additional segments (if any exist), click on an entry in the Additional Segments listing window to select it. You can select multiple entries.
7. Click [OK].
Change a Group of Cardholder's Segments
1. Locate the group of cardholder records you want to change.
2. Select Bulk > Change Cardholder Segments from the Cardholder menu.
The Bulk Segment Change window opens.
3. Select the Make changes to segment assignments radio button or select the
Set the exact assignments radio button if you want all assignments that
revision 1
— 219
13: Cardholders Folder
exist for the cardholders in your group to be replaced with the new assignments you select.
4. Click [Next].
5. Select which primary segment you want the selected groups of cardholders to be assigned to.
6. If you selected the Set the exact assignments radio button in step
, and if you want to assign additional segments (if any exist), click on an entry in the
Segments listing window to select it. You can select multiple entries.
7. Click [Next]. If you selected “All Segments” in step 5 , proceed to step 10 .
If you selected the Make changes to segment assignments radio button in step
: a. From the Segments listing window, select any assignments you want to add in addition to the primary segment.
b. Click [Next].
c. If there are segment assignments you want to remove from the group, click on an entry in the Segments listing window to select it. You can select multiple entries.
d. Click [Clear] to remove the assignment.
e. Click [Next].
8. If you want to perform preliminary validation and be prompted with the results before proceeding, select the Perform preliminary validation and
prompt for confirmation radio button. Select the Prompt only if a
problem is found check box if you do not want to a prompt for confirmation if there is no validation problem.
If you do not want to be prompted, select the Skip preliminary validation
and perform the operation without prompting radio button.
9. Click [Next].
10. Click [Finish].
• If you selected the Skip preliminary validation and perform the
operation without prompting radio button in step 8 or if you selected
“All Segments” in step
, the Bulk Action Results window opens and displays a summary of your modifications. Click [OK].
• If you selected the Perform preliminary validation and prompt for
confirmation radio button in step 8 and a problem was found, the Bulk
Segment Validation Results window opens.
a. Click [View Badges]. An explanation of the problem is displayed.
b. Click [OK].
c. Click [Continue]. The Bulk Action Results window opens and displays a summary of your modifications. d. Click [OK].
220 —
revision 1
Badge Form
Badge Form (View Mode)
Alarm Monitoring User Guide
Badge Form (Modify Mode)
revision 1
— 221
13: Cardholders Folder
Cardholders Folder - Badge Form
Form Element
Badge listing window
Comment
Displayed in view mode. Lists all badges for the selected cardholder. If you right-click on a badge in this listing window, the following options are available:
Badge ID
Issue code
• One Free Pass - If selected, allows the selected badge to violate anti-passback rules one time. This is the same as selecting One Free Pass from the Cardholder menu.
• APB Move Badge - If selected, displays the Area Move Badges window from where you can move a badge to a new area. This is the same as selecting APB Move Badge from the
Cardholder menu.
• Encode - If selected, displays the Encode Badge window from where you can encode the badge configurations selected for this badge onto a smart card. This is the same as clicking [Encode].
• Encoding History - Displays historical encoding information for the selected badge including card format, type, encoding count, and last time encoded.
• Import Badge - Displays the Import Card window, in which you may select a reader to import cards from.
Note:
If this option is selected for a VeriSoft logical access badge, the badge type associated with the badge must have VeriSoft logical access enabled in order for the badge to be imported.
• Import Badge ID - Displays the Encoder selection list window, in which you may select an encoder to read a badge ID from. In order for this option to be available for selection and function correctly:
An encoder with the Device type “Digion24 (MIFARE)” must be configured in
Administration > Workstations > Encoders/Scanners tab.
The selected badge must be associated with a badge type that has “Import from card” selected in the Generate badge ID field in Administration > Badge Types > Badge ID
Allocation tab > ID Allocation sub-tab.
The system should have Maximum badge number length set to “10” in
Administration > System Options > Hardware Settings tab.
Displayed in add or modify mode. Indicates the numeric identifier that is assigned to this badge.
The maximum Badge ID length is determined in System Administration or ID
CredentialCenter in the System Options folder > Hardware Settings form (non-segmented systems) or the Segments folder > Segments form > Hardware Settings sub-tab (segmented systems).
Displayed in add or modify mode. Indicates the selected badge's issue code if your installation uses issue codes on its badges.
Issue codes are required for guest badges.
222 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Badge Form (Continued)
Form Element
Activate
Comment
Displayed in add or modify mode. Indicates the date when the selected badge becomes valid.
The current date (at the time the badge record is created) is entered by default, but you can change this value by typing a numeric date into the field, or by selecting a date from the dropdown calendar.
Deactivate
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a dropdown list of months. Highlight the month you want to select it.
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the selected badge to activate on.
Displayed in add or modify mode. Indicates the date when the selected badge becomes invalid.
A default date is assigned based on the Badge type, but you can change this value by typing a numeric date into the field, or by selecting a date from the drop-down calendar.
Status
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a dropdown list of months. Highlight the month you want to select it.
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the selected badge to deactivate on.
Displayed in add or modify mode. Indicates the badge status for the selected badge.
Status drop-down list choices are defined on the Simple Lists form of the List Builder folder.
revision 1
— 223
13: Cardholders Folder
Cardholders Folder - Badge Form (Continued)
Form Element
PIN
Comment
Displayed in add or modify mode. Indicates the personal identification number for the selected badge. PIN numbers are used in conjunction with card readers that are operating in “Card and
Pin,” or “Pin or Card,” mode.
Use limit
The maximum PIN length is determined by the PIN type field in the Access Panels folder.
For increased security, PIN codes are not viewable by any user. However, if the system is configured to randomly generate a new PIN code when adding a badge, the user can see the
PIN code when they first add the badge (but not later).
A user can see the PIN code for guest type badges.
Displayed in add or modify mode. Imposes a restriction on the number of times a cardholder can use his/her badge at readers marked with the “Enforce Use Limit” option. A use limit value of zero (0) indicates that a badge has no uses at readers that enforce a use limit. A use limit value of 255 or that is left empty indicates that the badge has unlimited uses.
Note:
Users who have upgraded to this current build should note that the Use Limit feature has changed. Having a use limit of “0” no longer means unlimited. It now means none. A use limit of “255” now means unlimited. Also, performing a download of your system will no longer reset the uses count.
APB exempt
Destination exempt
Use extended strike/held times
Note:
When the use limit for a badge is modified the uses left are updated to reflect the new use limit assigned. For example, if you have 10 total uses and have already used
5 (so 5 are left), and you increase the Use limit to 15, the panel will be updated so the uses left will be 10. Conversely if you have a badge with 10 total uses and have already used 5 (so 5 are left), and you decrease the Use Limit count to 8, the panel will be updated so the uses left will be 3.
Note:
Making changes to the use limit feature while your system is offline with the host may cause the badges to become out of synch with the panel.
Displayed in add or modify mode. When this check box is selected, any anti-passback violation for the selected badge will granted access into the anti-passback area with no violation noted in the Alarm Monitoring application.
Displayed in add or modify mode. Select this check box if you want the selected badge record to be exempt from destination assurance processing.
When selected, the badge will not be included in the destination assurance processing and no alarms will be generated if the cardholder violates any of the destination assurance settings.
Via the Reports folder, you can run a Destination Assurance Exempt Cardholders report to see a list of which cardholders will be exempt from processing.
For more information, refer to the Destination Assurance Folder chapter in the System
Administration User Guide.
Displayed in add or modify mode. When this check box is selected, extended held open and extended strike times will be used for the selected badge.
Note:
This option is supported by Stanley hardware only.
224 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Badge Form (Continued)
Form Element
Embossed
Default floor
Allow Access To
Comment
Displayed in add or modify mode. If applicable, enter in this field any numbers or characters that are embossed on the card. Typically this applies to Proximity cards, which are embossed by the manufacturer prior to delivery.
Indicates the floor that is called by default when a badge accesses the reader associated with the Destination Entry Computer (DEC).
Displayed only when a valid guest class badge type is selected. Valid guest class badge types are those badge types which were configured during their creation to provide guest parameters.
Last changed
Last printed
Choices in the drop-down list include readers/locks that are associated with the selected badge type. Select an option from the list if you want to assign the selected cardholder to a specific guest reader/lock.
The Badge ID and Issue Code fields are automatically updated when a cardholder is assigned to a guest reader/lock. The values for these fields are obtained from the next available badge
ID from the badge numbers reserved for the selected reader, and the next valid issue code for that badge number. The values are updated after you select an item for the drop-down list and then move on to another field on the form.
Passage Mode
Note:
This field is subject to licensing restrictions.
Select this checkbox if you want the selected cardholder to have passage mode privileges. The passage mode privilege lets a cardholder use their card twice (within the lock's unlock duration) to place the lock in an unlock mode for an indefinite duration. The door remains unlocked until a card with the passage mode feature is used to relock the door or until a timezone with the “locked” mode becomes effective.
Note:
This field is subject to licensing restrictions.
Deadbolt Override If this checkbox is selected, the selected cardholder will have deadbolt override privileges. The deadbolt override privilege lets the cardholder access a door with a deadbolt function mortise lock even when the deadbolt is thrown.
Note:
This field is subject to licensing restrictions.
Displayed in add or modify mode. Indicates the date when the selected badge record was last saved.
Displayed in add or modify mode. Indicates the most recent date that the selected badge was printed.
revision 1
— 225
13: Cardholders Folder
Badge Form Procedures
Add or Replace a Badge Record
1. In Alarm Monitoring, select Badge Info from the View menu. In all other applications, select Cardholders from the Administration menu.
2. Locate the existing cardholder/visitor record.
3. On the Badge tab, click [Add].
4. Select the badge type.
5. Enter the badge activation and deactivation dates.
6. Depending on how badge ID allocation is configured, you may need to manually enter a badge ID.
7. If the badge will be used for access control and access requires a card and/or personal identification number (PIN), ask the cardholder/visitor to enter a
PIN.
Note:
The length of PIN codes is configured in System Administration under the
Access Panels folder > Options sub-tab and the Cardholder Options folder. If a PIN code is configured to be n-digits long and a cardholder enters a PIN code longer than n, the PIN code gets downloaded with the badge record, but
226 —
revision 1
Alarm Monitoring User Guide
gets truncated at n digits. For example, if a cardholder enters “123456” and the PIN type is 4-digits, then “1234” gets downloaded.
8. Enter any additional information and click [OK].
9. If this is the only active badge assigned to the cardholder/visitor, you are finished. Otherwise, continue with the next step.
10. If the cardholder/visitor record already has an active badge, the Change
Badge Status dialog opens, prompting you to change the status of the “old” badge. To do this: a. Verify the current active (old) badge is selected.
b. Select the new status from the New Status drop-down list. Choices include the default badge status values, and any badge status values that were added in the List Builder folder.
c. Click [OK].
d. The Access Level and Pin Assignment dialog opens, prompting you to assign an access level and PIN to the recently added (new) badge.
Note:
Select the No access levels for this badge radio button to manually assign access levels or to not assign access levels at all. e. Click [OK].
Modify a Badge Record
1. Locate the badge record you want to change.
2. Click [Modify].
3. Make the changes you want to the record.
revision 1
— 227
13: Cardholders Folder
Note:
If the PIN type is modified on the Access Panel and/or the General
Cardholder Options form, you must log off/log on before you modify a cardholder’s pin number.
4. Click [OK] to save the changes, or the [Cancel] button to revert to the previously saved values.
Modify Badges for a Selected Group of Cardholders
1. Locate the group of cardholders whose records you want to modify.
2. Select Bulk > Modify Badges from the Cardholder menu. The Bulk
Modify Badges window opens.
Note:
3. If you want to update the activation date, deactivation date, badge status, or use limit, do so in the Fields to Update section.
The Update use limit field refers to the number of times a cardholder can use a badge at readers marked with the “enforce use limit” option. If you do update the use limit and leave the field empty it will be set to 255 (unlimited uses). In previous versions of B.A.S.I.S. this would be set to 0, which now means 0 (or no) uses. Also note that a bulk use limit change updates a cardholder’s previous use number. So, if a badge originally was set to 5 uses,
228 —
revision 1
Alarm Monitoring User Guide
and has already used 3, and then a bulk update changed the use limit to 4, then the badge would only have 1 use left.
4. If you want to filter which badges from the selected group get modified, do so in the Badge Filter section. You can filter by badge status and/or badge type.
5. If you do not want to filter badges, select the Update badges of all statuses and/or Update badges of all types radio buttons.
6. Click [OK]. A message displays asking if you want to continue with the modification.
7. Click [Yes]. The Bulk Action Results window opens and displays a summary of your modifications.
8. Click [OK].
Encoding Prerequisites
Several steps must occur in B.A.S.I.S. to properly encode a magnetic, Wiegand, or smart card. Each step occurs in a different folder in the B.A.S.I.S. application.
1. In the Workstations folder > Encoding form, configure an inline or standalone encoder/scanner.
Note:
You do not need to configure USB encoders/scanners (e.g. MIFARE Pegoda contactless smart card reader) in B.A.S.I.S. applications. Simply install the drivers and attach the hardware to the workstation. This does not apply to the
ScanShell 800/1000.
2. In the Card Formats folder, create a card format that will contain data to be encoded on a badge.
3. In the Badge Types folder > Encoding form, assign an encoding format to a badge type. In other words, assign a card format to be encoded on a badge of a specific type.
4. In the Cardholders folder, add a cardholder or visitor record to the database.
5. In Multimedia Capture, capture the cardholder/visitor’s photo, signature, and/or biometric data.
6. In the Cardholders folder, encode the badge.
revision 1
— 229
13: Cardholders Folder
Encode a Badge
This procedure assumes the magnetic encoder has been set up and configured in
System Administration on the Administration > Workstations > Encoders/
Scanners form.
1. Display a cardholder/visitor in the Cardholders folder. You can do this by enrolling a cardholder or searching for one or several cardholders.
2. Click [Encode]. If the selected badge record has a “guest” badge type, the
Increment Issue Code window opens. If the selected badge record has a badge type other than “guest,” the Encode Badge window opens.
3. If the Encode Badge window is open, select a format to encode and an
Encoder, then click [Encode]. If the Increment Issue Code window is open, click [Yes].
4. Follow the instructions that display on your monitor.
Delete a Badge Record
1. Locate the badge record you want to delete.
2. Click [Delete].
3. Click [OK].
230 —
revision 1
Access Levels Form
Access Levels Form (View Mode)
Alarm Monitoring User Guide
Access Levels Form (Modify Mode)
Cardholders Folder - Access Levels Form
Form Element
Show levels for badge ID (issue code)
Show inactive badges
Comment
Displayed in view mode. Lists the badge ID and issue code (in parentheses) for the current active badge. If the Show inactive badges check box is selected, the list includes both the active and the inactive badge(s) assigned to the selected cardholder. Select a badge ID (issue code) from the list and the corresponding access levels for that badge will be displayed in the
Access levels display.
Displayed in view mode. When selected, the Show levels for badge ID (issue code) dropdown list will list both the active and inactive badge(s) assigned to the selected cardholder.
revision 1
— 231
13: Cardholders Folder
Cardholders Folder - Access Levels Form (Continued)
Form Element
Access levels display
Show unassigned levels
Number of levels assigned
Intrusion
Authority
Activate Dates
Access Groups
Comment
Displayed in a view and modify mode. When the Show unassigned levels check box is selected, lists both access levels that have been and that can be assigned to the selected cardholder/badge record. If the Show unassigned levels check box is not selected, only access levels that have been assigned will be listed. If they exist, also displays the access level’s activation and deactivation dates.
Displayed in view and modify mode. When selected, the Access levels display lists both access levels that have been and that can be assigned to the selected cardholder/badge record.
Displayed in view and modify mode. Displays the number of access levels that have been assigned to the selected cardholder/badge record. For example: 6 levels assigned.
Note:
The authority levels assigned act as access levels. Make note of this as the maximum number of access levels is usually 32.
Displayed in modify mode. When selected, displays the Intrusion Authority Levels form from where you can assign intrusion authority levels. These levels will allow the cardholder the ability to issue commands via the keypad. For more information, refer to the Command
Keypad Templates Folder in the System Administration User Guide.
Displayed in modify mode. When selected, displays the Access Level Activation Dates form from where you can select the dates when the selected access level will become valid and invalid.
Displayed in modify mode. When selected, displays the Select Access Levels in a Group form from where you can choose the access level group that you want to select access levels from.
Access Levels Form Procedures
Assign Access Levels to a Badge
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Access Levels tab.
3. Locate the cardholder record for which you want to assign access levels.
4. From the Show levels for badge ID (issue code) drop-down list, select the badge you want to assign access levels to.
Note:
If the Show inactive badges check box is selected, the Show levels for
badge ID (issue code) drop-down list will list both the active and inactive badge(s) assigned to the selected cardholder.
5. Click [Modify].
6. Select the Show unassigned levels check box. The Access levels display will list both access levels that have been and that can be assigned to the selected cardholder/badge record.
232 —
revision 1
Alarm Monitoring User Guide
Note:
To find out more about a particular access level, either double-click on an access level entry, or right-click on an access level entry and select Level
Definition. A popup window opens, listing the reader/time zone combinations that define the access level. For example:
7. Click on an access level in the Access levels display to select it.
Optional: If you want to assign all the access levels that belong to an access group: a. Click [Access Groups]. The Select Access Levels in a Group window opens.
b. The Select Access Levels in a Group window lists all currently defined access groups. You can expand an entry to display the list of access levels that make up a group. Select an access level or an access group. If you select an access group, you select all of the access levels it contains.
c. Click [Select].
d. Click [Yes].
8. Repeat step 7 for each access level you want to assign.
9. Click [OK].
revision 1
— 233
13: Cardholders Folder
Assign Intrusion Authority to the Cardholder
1. On the Access Levels form, click [Modify].
2. Click [Intrusion Authority]. The Intrusion Authority Levels window opens.
3. Select what access levels you would like to assign Level 1 and/or Level 2 authority.
4. Click [OK]. On the access levels listing window you will see an intrusion authority column that shows you what intrusion authority level(s) that access level now shares.
Important:
The authority levels assigned act as access levels but do not count toward the maximum number of access level assignment allowed per badge. When the
“Advanced Permission Control” intrusion command configuration option is selected, the maximum number of access level assignments allowed per badge is reduced to 30.
234 —
revision 1
Alarm Monitoring User Guide
Assign Activation and Deactivation Dates to Access
Levels
1. On the Access Levels form, click [Modify].
2. The access levels listing window displays all access levels that are currently configured for use with the selected cardholder’s badge type. From the listing window, select one or more access levels.
3. Click [Activate Dates]. The Access Level Activation Dates window opens.
The selected access levels that have been assigned to the selected cardholder/badge record will be listed in the Assigned Access Levels listing window.
4. Click on an access level entry to select it.
5. In the Activation Date section: a. Type a numeric date into the field, or select a date from the drop-down calendar.
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it.
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the selected badge to activate on.
b. If your system is configured so that you can specify a specific activation time, enter a time in the field to the right of the date field. This time will be used in conjunction with the selected activation date.
revision 1
— 235
13: Cardholders Folder
Notes:
To specify the activation time, the Store expiration date field on the
Options sub-tab of the Access Panels form must be set to Date only or Date
and time. The Date and time option applies to Stanley panels only, while the
Date only option applies to Stanley panels but not Offline Lock panels.
The activation time you enter should match the granularity setting on the
Cardholder Options folder, General Cardholder Options form. Otherwise, the time you enter will be rounded down. For example if the granularity is set to 30 minutes, and you enter any time between 4:00 and 4:29 the time will automatically be rounded to 4:00. Any time entered between 4:31 and
4:59 will be rounded to 4:30.
6. In the Deactivation Date section, repeat step
, choosing the date when you want the selected badge to become invalid.
7. Click [Set Date/Time].
for each access level entry.
9. Click [OK].
Assign Access Levels to a Selected Group of
Cardholders
1. Locate the group of cardholders that you want to assign access levels.
2. Select Bulk > Assign Access Levels from the Cardholder menu. The Bulk
Access Levels Selections window opens.
236 —
revision 1
3. To modify access levels: a. Select (place a checkmark beside) the access level(s) you want to assign. b. If you want to assign an entire access group, click [Access Groups].
Highlight the access group and click [Select].
Alarm Monitoring User Guide
Note:
You can expand access groups to display associated access levels. You can also double-click access levels to display associated readers
Note:
c. Select the Delete existing access level assignments check box if you want to delete the existing access level assignments and apply the new access level assignments. If you do not select this check box, the cardholders will retain their existing access levels in addition to their new access level assignments.
4. To modify activation/deactivation dates: a. Click [Activate Dates].The Access Level Activation Dates dialog opens.
Although you can assign multiple access levels to a record, you can only assign activation/deactivation dates to one access level at a time.
b. Select the first access level. c. Set the activation and deactivation dates.
d. If there is more than one access level that you want to assign dates to, click [Set] and continue setting the activation/deactivation dates. e. When you are finished, click [OK]. f. Select the Overwrite activate date settings for existing assignments check box to apply the new dates.
g. Click [OK] and acknowledge any messages that display.
Remove Access Levels From a Selected Group of
Cardholders
1. Locate the group of cardholders that you want to remove access levels from.
2. Select Bulk > Remove Access Levels from the Cardholder menu. The
Bulk Access Levels Selections window opens.
3. Click on the access level you want to remove to select it. You can select multiple entries.
Optional: If you want to remove all the access levels that belong to an access group: a. Click [Access Groups]. The Select Access Levels in a Group window opens.
b. The Select Access Levels in a Group window lists all currently defined access groups. You can expand an entry to display the list of access levels that make up a group. Select an access level or an access group. If you select an access group, you select all of the access levels it contains.
c. Click [Select].
d. Click [Yes].
4. Click [OK].
revision 1
— 237
13: Cardholders Folder
Note:
All active badges will be affected by this change, even in multiple active badge environments.
Modify Access Levels Assignments
1. Locate the cardholder/badge record whose access level assignments you want to change.
2. Click [Modify].
3. Make the changes you want to the record.
• Select the access level to assign it to a cardholder/badge record.
• Deselect the access level to limit cardholder/badge access.
• Click [Clear all] to deselect all the access level assignments.
4. Click [OK] to save the changes, or [Cancel] to revert to the previously saved values.
Precision Access Form
Note:
The Precision Access tab is only displayed if either “Inclusion” or
“Exclusion” is selected in the Precision Access Mode field on the General
Cardholder Options form of the Cardholder Options folder in the System
Administration software application.
238 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Precision Access Form
Form Element
Precision Access
Inclusion/
Exclusion Groups
Comment
Lists all currently defined Exclusion or Inclusion groups (your system will have one or the other) and the readers and timezones/elevator control levels that belong to each.
A icon precedes each exclusion group entry.
Assigned Groups
Assign
Remove
An icon precedes each inclusion group entry.
Exclusion or Inclusion groups are defined on the Precision Access form of the Access Levels folder.
Lists the Inclusion/Exclusion Groups assigned to the selected cardholder/badge record.
Assigns to the selected cardholder/badge record the access levels selected in the Precision
Access Inclusion/Exclusion Groups field.
Removes from the current cardholder/badge record the access levels selected in the Precision
Access Inclusion/Exclusion Groups field.
Precision Access Form Procedures
Assign Precision Access Groups to a Badge
1. Select the Badge Info from the View menu.The Cardholders folder opens.
2. Select the Precision Access tab.
3. Locate the cardholder record that you want to assign precision access.
Precision access can only be assigned to the selected cardholder’s/visitor’s active badge.
4. Click [Modify].
5. In the Precision Access [Inclusion or Exclusion] Groups window, select a precision access group.
• The window contains all currently defined precision access groups. You can expand an entry to display the list of readers (if entries are
revision 1
— 239
13: Cardholders Folder
Exclusion groups) or readers and timezones (if entries are Inclusion groups) that make up the group.
• You can select only one group at a time.
• By selecting a precision access group you select all of the readertimezone combinations it contains. These combinations are defined on the Precision Access form of the Access Levels folder.
6. Click [Assign]. The group(s) you selected will be listed in the Assigned
Groups window.
for each additional group you want to assign to the badge. You can assign multiple Exclusion or Inclusion groups in addition to the 6 access levels that a cardholder can normally have.
8. Click [OK].
Remove Precision Access Groups From a Badge
1. Locate the record of the cardholder whose precision access assignment you want to remove.
2. In the Assigned Groups window, select the precision access group to be removed.
3. Click [Remove].
for each precision access group you want to remove.
5. Click [OK].
Biometrics Form
240 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Biometrics Form
Form Element
Biometric listing window
Comment
In search mode, lists all biometric features and the type associated with each. In view mode, lists the selected cardholder’s biometric information (if any exists).
There are three biometric features, Fingerprint, Hand Geometry and Iris. A biometric fingerprint’s type can be template or image.
Fingerprint image Displayed in view mode. Displays a visual representation of the cardholder’s fingerprint. For more information refer to Multimedia Capture appendix in the System Administration User
Guide.
Search Type Displayed in search mode. This field is used in conjunction with the listing window.
Click on a biometric feature in the listing window and select a choice from the Search Type drop-down list to search for a record that Has or Does Not Have a fingerprint image, a fingerprint template, iris data, or a hand geometry template associated with the cardholder.
Biometrics Form Procedures
Search for a Cardholder’s Biometric Record
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Biometrics tab.
3. Click [Search].
4. In the Biometric listing window, click on a biometric feature to select it.
5. Choose either “Has” or “Does Not Have” from the Search Type drop-down list to search for a record that has or does not have specific biometric data associated with the cardholder.
6. Click [OK].
B.A.S.I.S. retrieves and displays the first matching record. Use the ,
, , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
revision 1
— 241
13: Cardholders Folder
Visits Form
Visits Form (View Mode)
Visits Form (Modify Mode)
Cardholders Folder - Visits Form
Form Element
Allowed visitors
Comment
When selected in modify mode, the selected cardholder is allowed to be assigned visitors.
When not selected, the cardholder will not be available for visit assignment in the Visitor
Management application.
242 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Visits Form (Continued)
Form Element
Add Visit
Find Visits
Type
Purpose
Comment
In modify mode, click this button to display the Adding Visit window. From here you can add or modify visits, display visit records for a selected date range, and search for visit records based on the scheduled time in, scheduled time out, time in, time out, or date and time last changed.
This button quickly looks up visit records associated with the record whose name is specified in the Last name, First name and Middle name fields.
Displayed in modify mode. Indicates the type of visit.
Displayed in modify mode. Indicates the purpose of the visit.
Visits Form Procedures
Modify a Cardholder’s Permission to Have Visitors
A cardholder must have permission to have visitors visit. This permission can only be granted (or taken away) in System Administration or ID
CredentialCenter, but not in Visitor Management. To change a cardholder’s permission to have visitors:
1. Select the Badge Info from the View menu.
2. Click the Cardholders tab.
3. Locate the record of the cardholder that you want to allow visitors.
Note:
Cardholders who are visitors cannot be assigned visitors.
4. Click the Visits tab.
5. Click [Modify].
6. The Allowed visitors check box setting controls a cardholder’s permission to have visitors. Select the setting you want for the selected cardholder. The two possible settings are:
• When t allowed to have visitors. Only cardholders with the Allow visitors check box will be returned when searching for a cardholder and attempting to add a new visit.
• When t cardholder can be scheduled.
revision 1
— 243
13: Cardholders Folder
Note:
Changing the Allow visitors check box setting for a cardholder will only change the cardholder’s ability to have visitors after the setting has been changed; any previously scheduled visits will be allowed to occur.
7. Click [OK].
Assets Form
Cardholders Folder - Assets Form
Form Element
Asset group
Asset listing window
Assign
Unassign
Comment
Indicates the asset group to which the cardholder or visitor belongs.
Lists all assets that are currently assigned to the selected cardholder or visitor.
When selected, assigns an asset to a cardholder.
When selected, unassigns an asset.
244 —
revision 1
Alarm Monitoring User Guide
Assets Form Procedures
Assign an Asset to a Cardholder
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Assets tab.
3. Locate the cardholder record for which you want to assign the asset.
4. While still on the Assets tab, locate the asset record that you want to assign.
5. Click [Assign].
Note:
Authorized users can manually assign an asset to a cardholder who does not have proper asset group permissions for that asset.
Unassign an Asset
1. In the Asset listing window, click on the name of an asset to select it.
2. Click [Unassign].
Modify the Asset Group
1. Locate the cardholder record for which you want to modify.
2. Click [Modify].
3. Select an Asset Group from the drop-down list.
4. Click [OK].
Note:
A record can only be modified if an asset group was assigned when the cardholder or visitor was added.
revision 1
— 245
13: Cardholders Folder
Directory Accounts Form
Cardholders Folder - Directory Accounts Form
Form Element
Directory accounts listing window
Link
Comment
Lists the directory accounts that have been linked to the selected cardholder.
Unlink
When selected, displays the Select Account window from where you can link a directory account to the selected cardholder.
When selected, unlinks the selected cardholder from the directory account that is selected in the Directory Accounts listing window.
Directory Accounts Form Procedures
Link a Cardholder to a Directory Account
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Directory Accounts tab.
3. Locate the cardholder record for which you want to link a directory account.
4. Click [Link]. The Select Account window opens. In the Select Account window: a. In the Directory drop-down list, select the directory you wish to link to.
b. In the Field drop-down list select whether to search for a name or user name.
c. In the Condition drop-down list, select how the value will be related to the field. For example, a search where the Field selected is “Name”, the
246 —
revision 1
Alarm Monitoring User Guide
Note:
Condition selected is “contains” and the Value specified is “Lake” will display all accounts where the name contains the word “Lake”, such as
Lisa Lake.
d. In the Value field, type or select a word you think may be in the user name or name. If you leave this field empty, all accounts for the selected directory will be displayed when the search is executed.
To help you search, the Value field will contain different ways that the selected account may be expressed. For example, if the user account Lisa
Lake is selected, the permutations listed might be “L. Lake”, “LISA”,
“Lisa”, “Lisa L.”, “Lisa Lake”, “LL”, “Lake” and “Lake, Lisa.” e. Click [Search].
f. The accounts associated with the selected Directory will be displayed in the Accounts listing window.
• If the account you wish to link to is displayed, select it. Your window should look similar to the following:
• If the account you wish to link to is not displayed, return to step
and select another Value to search for.
g. Click [OK].
h. Repeat steps
for each directory account you wish to link to the selected user account.
5. Click the [OK] button on the Directory Accounts form.
Unlink a Directory Account
1. Locate the record of the cardholder you want to unlink a directory account from.
2. Click on an entry in the Directory accounts listing window to select it.
3. Click [Unlink].
4. Click [OK].
revision 1
— 247
13: Cardholders Folder
Logical Access Form (ActivIdentity Sub-tab)
Before a badge can be issued to a user, the cardholder record for the user must have a logical user account linked to it on this form.
Displayed by: Administration > Cardholders > Logical Access form >
ActivIdentity sub-tab.
Cardholders Folder - Logical Access Form (ActivIdentity Sub-tab)
Form Element
Issuing CMS
User ID
Cards listing window
Update list from server
Comment
The CMS that the user exists in. It will be the CMS that is connected to when issuing a badge to the cardholder.
The cardholder’s logical user account name.
Lists all cards/badges that have been encoded or bound to the cardholder. If the check box
Update list from server is selected, then the list will also display badges which were issued to users outside of B.A.S.I.S. Badges issued to users outside of B.A.S.I.S. cannot be linked to a physical badge and thus do not support life cycle management. Additional operations on the badge (such as resuming, suspending, terminating, or unlinking) can be performed by rightclicking on an entry in the list.
• Resume
• Suspend
• Terminate
• Unlink
Allows badges that have been issued to the user outside of B.A.S.I.S. to be displayed in the
Cards listing window.
248 —
revision 1
Alarm Monitoring User Guide
Logical Access Form - VeriSoft Sub-tab
In order to associate any cardholder or badge operations with a logical user account or logical token, VeriSoft logical user accounts must be linked to
B.A.S.I.S. cardholders. VeriSoft user accounts are linked to cardholders by simply specifying the logical user account’s directory and user ID on this form.
Displayed by: Administration > Cardholders > Logical Access form > VeriSoft sub-tab.
Cardholder Folder - Logical Access Form (VeriSoft Sub-tab)
Form Element
Directory
User ID
Comment
This defines the directory that the VeriSoft user account that is being linked to the cardholder resides in.
The user ID of the VeriSoft user account to link to the cardholder. Click [...] to open the Select
Account window. This allows the user account to be searched for by different fields (first name, last name, user ID, e-mail, etc.) and selected from a list.
Show Unregistered
Tokens
Show Tokens
From Server
A VeriSoft user account can be unlinked by simply removing the User ID.
If selected, this option will show unregistered tokens in addition to registered tokens. If deselected, only registered and linked tokens are shown in this list. Registered and unlinked tokens will also be displayed if the Show Tokens From Server check box is selected.
If selected, tokens that are registered with VeriSoft, but not linked to an access control badge are displayed. If not selected, only registered and linked tokens are shown in the list.
Unregistered tokens will also be displayed if the Show Unregistered Tokens check box is selected.
revision 1
— 249
13: Cardholders Folder
Cardholder Folder - Logical Access Form (VeriSoft Sub-tab)
Form Element
VeriSoft Tokens listing window
Comment
Lists all registered and unregistered tokens (cards). If you right-click on an entry in this listing window, the following options are available:
Register with
VeriSoft
• Enable (Logical Token Only)
• Disable (Logical Token Only)
• Delete (Logical Token Only)
• Unlink from Badge - Unlinks the selected VeriSoft logical token from a B.A.S.I.S. badge.
• Link to Badge - Links the selected VeriSoft logical token with a B.A.S.I.S. badge. A registered and linked token is a logical token whose state is dependent on any B.A.S.I.S. badges.
• Remove from Database - For a selected unregistered badge, the selected badge information will be removed from the database.
When clicked, the system performs registration of fingerprints and badges for the active cardholder. Fingerprints are only sent if they have been captured and the cardholder options are configured to register fingerprints for fingerprint only authentication (not on card). If the
VeriSoft user account already has fingerprints registered, the fingerprints are still re-registered.
Registered tokens are not re-registered. Unregistered tokens, if any exist, are always registered with VeriSoft. Unregistered tokens are displayed as inactive (indicated by the red badge icon) and display “<Not Registered>” for the authentication method, status, and type. Tokens are registered with VeriSoft with the registration method specified by the badge’s badge type settings.
250 —
revision 1
Guard Tours Form
Alarm Monitoring User Guide
Cardholders Folder - Guard Tours Form
Form Element
Can perform guard tours
Security Clearance
Levels listing window
Number of levels assigned
Comment
Select this check box to if you want the selected cardholder to perform guard tours.
Lists all security clearance levels that have been configured in the system. Security clearance levels are a means of limiting the number of tour guards to choose from when a tour is launched. Particular security clearance levels will be assigned only to guards who will need access to areas where a tour will take them. When a tour is launched, only guards with the appropriate security clearance level for that tour will be listed.
Guard tours and security clearance levels are configured in the Guard Tour folder. For more information refer to the Guard Tour Folder chapter in the System Administration User Guide.
Note:
This field is enabled only if the Can perform guard tours check box is selected.
Displays the number of security clearance levels that have been assigned to the selected cardholder. For example: 6 levels assigned.
revision 1
— 251
13: Cardholders Folder
Guard Tours Form Procedures
Assign Guard Tour Security Clearance Levels to a
Cardholder
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Guard Tours tab.
3. Locate the cardholder record for which you want to assign security clearance levels.
4. Click [Modify].
5. Select the Can perform guard tours check box.
6. In the Security Clearance Levels listing window, click on an entry to select it.
7. Click [OK].
Note:
You can assign multiple security clearance levels to a cardholder.
Reports Form
Cardholders Folder - Reports Form
Form Element
Limit report to current search
Comment
When selected, only cardholders in the current search will be included in the report.
252 —
revision 1
Alarm Monitoring User Guide
Cardholders Folder - Reports Form (Continued)
Form Element
Report listing window
Description
Comment
Lists currently defined cardholder-related reports.
A brief description of the report contents.
Reports Form Procedures
Run a Cardholder Report
1. Select the Badge Info from the View menu. The Cardholders folder opens.
2. Select the Reports tab.
3. Locate the cardholder record(s) for which you want to run a report. (If you want to run a report on all cardholder records, skip this step.)
4. In the Reports listing window, click on the name of the report you want to run.
5. Select the Limit report to current search check box if you want only cardholders in the current search to be included in the report. If you do not select this check box, all cardholder who meet the criteria specified in the
Description field will be included in the report.
Note:
Any report in the Reports List Window on the Event Reports form in the
Reports folder that has “Cardholder” listed in the Type(s) column is available on the Reports form in the Cardholders folder. This means that a report can be generated on the Reports form in the Cardholders folder based on a cardholder search operation.
revision 1
— 253
13: Cardholders Folder
Offline Form
Offline Form Overview
B.A.S.I.S. V and B.A.S.I.S. G Locks are offline locks with an integrated reader.
B.A.S.I.S. G Locks provide guest management features. Guest management features allow cards to be encoded for use by students each semester in dormitory doors without having to reprogram the readers/locks as students change.
Although B.A.S.I.S. V and B.A.S.I.S. G Locks are offline (stand-alone) locks and are not managed by access control panels, access panel settings must be defined for the readers/locks.
The Offline form is used to define offline readers. When offline readers are defined, they are defined as either guest readers or non-guest readers. “Guest” readers are offline readers that are attached to locksets used in the guest environment. Non-guest offline readers are referred to as “Offline” readers. If you have a combination license that includes both offline and guest, you can configure the reader as an offline reader, a guest reader, or as a combination
“Offline Guest” reader.
254 —
revision 1
Alarm Monitoring User Guide
Offline Form Procedures
Configure an Offline Reader
1. On the Reader form, select the offline reader for which to configure. If the
Multiple Selection checkbox is selected, you can select more than one reader at the same time.
2. Click the [Modify] button.
3. Choose the settings you wish. Please refer to the for specific information on each field.
4. Click the [OK] button to save the changes, or the [Cancel] button to revert to the previously saved values.
Download Reader Information to a PDA
Important:
The Communication Server must be present on a workstation that intends to download. Note that the Communication Server is not automatically installed during a client installation. To install on a client workstation, you must run a separate custom installation. (To run a custom installation, select
Start > Control Panel. Then, select Add or Remove Programs. From the list of programs, select B.A.S.I.S. ET690. For detailed instructions on running a custom installation, please refer to the Installation & Setup User
Guide.)
revision 1
— 255
13: Cardholders Folder
To download reader configuration information to a Personal Digital Assistant
(PDA):
1. Select System Tree from the View menu.
2. The System Tree displays the available access panels below the item labeled
Hardware. Expand the access panel list items to display the readers that are attached to each of them.
3. Click on one or more readers under the same access panel, or across different access panels. (Click on the reader while pressing the <Ctrl> key to select multiple entries.)
4. Right-click to display the following popup menu:
256 —
revision 1
Notes:
5. Select Download from the popup menu.
To program a B.A.S.I.S. G or B.A.S.I.S. G lock, you need to:
In the System Administration application, define an access control panel and reader configuration for the lock.
Download the reader configuration from the PC to the PDA.
Download the reader configuration from the PDA to the lock. (Refer to the
B.A.S.I.S. Transport User's Guide.)
6. After you have downloaded reader configurations to the PDA, the system tree view does not automatically update. To update the view, right-click on the tree and select Refresh from the pop-up menu.
Reader Level Download System Tree View
When a change is made to B.A.S.I.S. that affects any reader, the affected reader and the access panel to which it is attached will be marked in the system tree view with a red “X.” When a change is made to the system at the access panel level, then all the readers under the access panel are marked with an “X.” The
“X” indicates that data relevant to the reader(s) under this access panel must be downloaded to the lockset(s) to maintain synchronization of data.
Alarm Monitoring User Guide
Chapter 14: Badge Print Preview Window
The Badge Print Preview window is used to:
• View (on-screen) a badge to be printed from the Cardholders folder.
• Print a badge.
This window is displayed by clicking [Print] in the Cardholders folder and then clicking [Print Preview], or by selecting Print from the Application menu. The
Application menu is only available in System Administration and ID
CredentialCenter.
Badge Print Preview Window
Element
Preview window
Print All
Print Current
Close
Next Page
Previous Page
Comment
Displays the currently selected badge layout with cardholder information.
Prints all the badges selected according to the Badge Printing window.
Prints the badge that is currently displayed in the preview window.
Click on this button to exit from the Badge Print Preview window.
Allows you to view the next badge if multiple badges are being printed or to view the back layout of a two-sided badge.
Allows you to view the previous badge if multiple badges are being printed or to view the front layout of a two-sided badge.
Displays online help for this topic.
Enter a value to zoom in or zoom out on the badge in the preview window.
Help
Zoom
• Entering a number greater than 100% will cause the preview to zoom in on the badge, displaying less area and more detail
• Entering a number less than 100% will cause the preview to zoom out on the badge, display more area and less detail
Badge information Displays badge and cardholder information for the badge currently in the print preview window. Printer information displays also.
Page number Displays the number of the page or badge that is currently in the preview window.
revision 1
— 257
14: Badge Print Preview Window
Badge Printing Form
Badge Printing Form
Form Element
Print active badge(s) for current cardholder only
Select All
Clear All
Print active badges for all cardholders...
Show badge type printer assignments
Send all badges to an alternate printer
Printer
Report all errors immediately
(pause printing)
Comment
Select this to print the active badges currently shown on the Cardholders form.
By default, the active badge currently selected on the Cardholder form is selected to print. If other active badges exist for the cardholder, these will be included and may be selected to print as well.
Click to select all badges of the current cardholder.
Click to de-select all badges of the current cardholder.
Select this option to print all active badges that match the search criteria currently in the
Cardholders form.
Click to show what printer is assigned to the current print selection.
Select to open the Printer dialog box which allows you to select a printer other than the one assigned.
Select what printer should be used.
Select to pause the printing when an error occurs. Selecting this causes errors to be reported immediately.
258 —
revision 1
Alarm Monitoring User Guide
Badge Printing Form
Form Element
Log errors to error log only (continue printing)
Print Preview
Cancel
Comment
Select this to continue printing when errors occur. Selecting this causes errors to be logged for further review.
Click to print your current selection.
Click to preview what will be printed.
Closes the Badge Printing form.
Badge Print Preview Window Procedures
Preview and Print a Badge
1. Select an active badge from within the Cardholders folder (Cardholders,
Badge, Access Levels, Assets or Precision Access form).
• Before printing, make sure that you are properly configured to print badges. Configurations are done using the Badge Types and Card
Formats folders in System Administration or ID CredentialCenter.
• Make sure the proper printer is chosen. This is configured by selecting
Badge Types from the Administration menu in System Administration or ID CredentialCenter and setting the printer assignments on the
Printing/Encoding folder.
2. Do one of the following:
• Select Print from the Application menu.
• Click [Print] on any form within the Cardholders folder (Cardholders,
Badge, Access Levels, Assets or Precision Access form).
3. The Badge Printing window displays.
• The Print selection section determines which badges are printed or previewed out of the cardholders listed in the current search results.
– To print/preview specific badges for the current cardholder select
Print active badge(s) for current cardholder only. The badge selected within the Cardholder form is selected by default. If multiple active badges are included in the list, select any of these to print or preview as well. Only the active badges for the current cardholder display in the Print selection section.
– To print all the active badges for the current cardholder select
Print active badges for all cardholders matching current search
criteria. If you click [Show badge type printer assignments] the following information displays within the Badge Printing window:
Badge Type, Primary Segment and Assigned Printer.
Notes:
Badges will not print if at least one badge does not have a printer assigned to it or at least one badge has been assigned to a printer that B.A.S.I.S. no
revision 1
— 259
14: Badge Print Preview Window
longer recognizes. You must establish a network connection to a remote printer (via control panel) in order B.A.S.I.S. to recognize that printer.
To be printable, a badge must be active, have a print count of zero if you do not have permission to print duplicates or a print count less than the maximum number of prints for its badge type if you have permission to print duplicates. Also, a badge must have a front and/or back layout assigned to its badge type.
• The Alternate printer section allows you to override badge type printer assignments and send all badges to an alternate printer. This section is only active when an alternate printer is configured and the user has permission to choose an alternate printer.
• The Error Reporting section allows you to configure how printing errors are handled. All badge printing is logged to the transaction log
(print previews are not logged).
– Click the Report all errors immediately (pause printing) radio button if you want to be prompted to either abort printing or skip to the next badge (or badge type) when an error occurs.
– Click the Log errors to error log only (continue printing) radio button if you want errors logged and badge printing to continue on to the next badge (or if the error is associated with the badge type, the printing will move onto the next badge type).
4. It is recommended that you preview your badges first before printing them.
If there is no need to preview the badge(s), you may print at this time by
260 —
revision 1
Alarm Monitoring User Guide
clicking [Print]. Skip to step 9 . If you wish to exit the window without
printing, click [Cancel]. Otherwise continue on to the next step.
5. Click [Print Preview] to display the Badge Print Preview window.
Note:
The current badge displays along with cardholder data and printer information.
6. Use the [Next Page] and [Previous Page] buttons to view the next badge or other side of a two-sided badge.
7. You can zoom in or out on the badge by changing the percentage value in the
Zoom box. A larger number displays the badge close-up, in more detail. A smaller number will display more of the badge, in less detail.
8. To print the badge(s), do one of the following:
• Click [Print Current]. Doing so will print the badge that is currently in the preview window.
• Click [Print All] to print all of the badges that have been selected.
• To exit from the window without printing, click [Close].
If a user attempts to print a badge that has already been printed the maximum number of times then an error displays and the badge does not print. As with other printing errors the user can continue on to the next badge if a batch print is being performed.
9. If you decided to print badges a status window displays to indicate the status of the print operation.
A single print job entry represents all the badges selected in the Print
selection section.
revision 1
— 261
14: Badge Print Preview Window
262 —
revision 1
Alarm Monitoring User Guide
Chapter 15: Visits Folder
Toolbar Shortcut
The Visits folder contains the Status search form, the Visit form, the Details form, the E-mail form and the Reports form with which you can:
• Display visit records for a selected date range
• Search for visit records based on the scheduled time in, scheduled time out, time in, time out or date and time it was last changed
• Display visit records that are scheduled in the future, scheduled and are late, active, active and overstayed and finished
• Filter and display visit records for a selected cardholder, visitor or both
• Display the cardholder or visitor record associated with a visit
• Refresh the Visits listing window
• Send e-mail notifications regarding visits
• Add or modify visits
• Delete a visit or multiple visits
• Print a disposable badge or multiple disposable badges
• Sign out and sign in a visit or multiple visits
• Generate a report for either a defined search criteria or for all visits
This folder is displayed by selecting Visits from the View menu.
The forms in the Visits folder are divided into two sections: the form elements that are common to every form in the Visits folder (shown in the screen shot that follows) and the form elements that are unique to each form. For descriptions of
the common form elements refer to the Visits Folder Field Table table on page
265. For descriptions of the unique form elements refer to the
Status Search Form
Field Table table on page 285, the Visit Form Field Table table on page 282, the
Details Form Field Table table on page 287, and the E-mail Form Field Table table on page 288, and the Reports Form Field Table table on page 291.
revision 1
— 263
15: Visits Folder
Notes:
This documentation refers to visit data fields that are shipped as the default by Stanley. If you have used the FormsDesigner application to customize your visit data, the elements on your Visits folder forms will be different.
Forms and fields that pertain to segmentation are only available if segmentation is enabled on your system.
Visit Right-Click Menu
If you right-click on a visit in the listing window, a menu will be displayed. The menu contains the following options:
Right-click menu option
Select All
Clear All
Add
Modify
Delete
Sign In
Sign Out
Description
Enabled only when the Multiple Selection check box is selected. If selected, all visits in the listing window will be selected.
If selected, all visits selected in the listing window will be deselected.
Selecting this option does the same thing as clicking the [Add] button - it allows you to add another visit based on the currently selected visit.
Selecting this option does the same thing as clicking the [Modify] button - it allows you to change the visit that is currently selected.
Selecting this option does the same thing as clicking the [Delete] button - it allows you to delete the visit that is currently selected. The visit will be deleted without prompting for confirmation.
This option is only available for a visit that is not active/not signed in. If the Multiple Selection check box is selected, multiple visits can be selected and signed in at once. Selecting this option does the same thing as clicking the [Sign In] button. If selected, the Sign In Visit(s) window is displayed. In this window, select whether to print disposable badges for the visitor that is being signed in.
This option is only available for a visit that is active/signed in. If the Multiple Selection check box is selected, multiple visits can be selected and signed out at once. Selecting this option does the same thing as clicking the [Sign Out] button. To use this feature, you must first configure a badge status to use when doing an automatic sign out. This is done on the General Cardholder
Options form of the Cardholder Options folder. For more information refer to Configure Systemwide Visit Options in the Cardholder Options Folder chapter in the System Administration User
Guide.
When selected, the actual Time out for the visit is updated to the current date/time.
If the visitor has an active badge, the deactivate date is updated and the badge status is set to the status setup that was selected on the General Cardholder Options form.
Find Cardholder Opens the Cardholders folder and displays the cardholder record that is associated with the currently selected visit.
Find Visitor Opens the Cardholders folder and displays the visitor record that is associated with the currently selected visit.
Refresh Click this button to refresh the visits listed in the Visits listing window. When someone else makes changes in the database, you may need to click this button to see the changes. (Cardholder information is not automatically updated, but visit information is.)
264 —
revision 1
Alarm Monitoring User Guide
Visits Folder Field Table
Visits Folder
Form Element Comment
Common form elements
Visits listing window
Host name
Displays the status, host, visitor, scheduled time in, scheduled time out, time in, time out, visit type and visit purpose for visit records.
Specifies the host for whom you want to display scheduled visits.
Visitor name
Status
Specifies the visitor for whom you want to display scheduled visits.
Displays the status of the visit. Choices include:
Search
Add
Modify
Delete
Sign In
Sign Out
• Scheduled - A visit that has a scheduled time in and scheduled time out that are both in the future
• Late - A visit where the current date and time is after the scheduled time in
• Overstayed - A visit where the current date and time is after the scheduled time out
• Active - A visit that has been signed in and the scheduled time out has not yet been reached
• Finished - A visit occurred in the past and has been signed out
Allows you to search based on any field on any form in the Visits folder. The search results will be displayed in the Visits listing window.
Allows you to add a visit record.
Allows you to modify a selected visit record. Multiple selection cannot be used when modifying visit records. If the Multiple Selection check box is selected and multiple visit records are selected, the [Modify] button will be grayed out.
Allows you to delete a selected visit record. If the Multiple Selection check box is selected, multiple visit records can be deleted at once. The visit(s) will be deleted without prompting for confirmation.
Allows you to print a disposable badge. Disposable badge types are configured in the Badge
Types folder. For a badge type to be used to print disposable badges, it must have “Visitor” selected for the Class and the Disposable check box must be selected (on the Badge Type subtab). If segmentation is enabled, the correct segment must be selected on the Segment
Membership sub-tab.
If selected, the Sign In Visit(s) window is displayed. In this window, select whether to print disposable badges for the visitor(s) that are being signed in. If the Multiple Selection check box is selected, multiple visit records can be signed in at once.
To use this feature, you must first configure a badge status to use when doing an automatic sign out. This is done on the General Cardholder Options form of the Cardholder Options folder. For more information, refer to the Cardholder Options Folder chapter in the System
Administration User Guide.
When selected, the actual Time Out for the visit is updated to the current date/time.
If the visitor has an active badge, the deactivate date is updated and the badge status is set to the status setup that was selected on the General Cardholder Options form.
revision 1
— 265
15: Visits Folder
Visits Folder (Continued)
Form Element Comment
Multiple Selection If selected, more than one entry in the listing window can be selected simultaneously. The changes made on this form will apply to all selected visits. This feature is primarily used for printing badges, signing in visits and signing out visits.
Sign In Visit(s) Window
This window is displays when:
• A visit is added in the Visits folder and the Sign In Now check box is selected on the Visit form.
• A visit record is selected in the Visit listing window in the Visits folder and the [Sign In] button is clicked.
• Automatic sign in is enabled. For more information about this feature, refer to the Automatic Sign In section of the Visitor Management User Guide.
Visits Folder - Sign In Visit(s) Window Field Table
Form Element
Print disposable badge(s) of this type
Comment
• For this field to be enabled, the Allow disposable badge printing check box on the Visits form in the Cardholder Options folder in System Administration or ID CredentialCenter must be selected.
• Displays a list of disposable badge types that can be selected for the visit.
• Only those badge types that are disposable are listed.
• If you do not want to print a disposable badge for the visitor, deselect this check box.
266 —
revision 1
Alarm Monitoring User Guide
Visits Folder - Sign In Visit(s) Window Field Table (Continued)
Form Element
Send all badges to this printer
(overriding badge type printer assignment)
Assign this access control badge ID
Sign In
Cancel
Comment
• Select this check box to select an alternate printer
• For this field to be enabled, the Choose alternate printer check box on the Users Folder,
Cardholder Permission Groups Form, Badge sub-tab must be selected.
CredentialCenter users guide.
For more information refer to the Users Folder chapter in the System Administration or ID
• Selecting this check box overrides the printer assignments in the Printing/Encoding form of the Badge Types folder.
• For this field to be enabled, the Allow access control badge assignment check box on the Visits form in the Cardholder Options folder in System Administration or ID
CredentialCenter must be selected.
• The badge must already exist in the system
• The existing badge’s class must be “Visitor”
• If the visitor already has an active access control badge (from a manual assignment or another visit), this field will automatically be populated with that ID.
• If you do not want to assign an access control badge ID for the visitor, deselect this check box.
Signs in the visit using the options selected on the form.
Closes the Sign In Visit(s) window without signing in the visit.
revision 1
— 267
15: Visits Folder
Print Badge(s) Window
This window displays when the [Print] button is clicked on any form in the Visits folder.
Visits Folder - Print Badge(s) Window Field Table
Form Element
Print disposable badge(s) of this type
Send all badges to this printer
(overriding badge type printer assignment)
OK
Cancel
Comment
• For this field to be enabled, the Allow disposable badge printing check box on the Visits form in the Cardholder Options folder in System Administration or ID CredentialCenter must be selected.
• Displays a list of disposable badge types that can be selected for the visit. You must select a badge type and only one badge type can be selected.
• Only those badge types that are disposable are listed.
• Select this check box to select an alternate printer. Chose the printer from the drop-down list.
• For these fields to be enabled, the Choose alternate printer check box on the Users
Folder, Cardholder Permission Groups Form, Badge sub-tab must be selected.
CredentialCenter users guide.
For more information refer to the Users Folder chapter in the System Administration or ID
• Selecting this check box overrides the printer assignments in the Printing/Encoding form of the Badge Types folder.
Prints the disposable badge
Closes the Print Badge(s) window without printing the visit.
Visits Folder Procedures
The following procedures pertain to every form in the Visits folder unless otherwise noted.
268 —
revision 1
Alarm Monitoring User Guide
Visit Search Capabilities
In search mode, you can search on any combination of fields in the Visits folder, including the Status search, Visit and Details forms. On the E-mail and Reports forms, you can only search for the host name or visitor name.
Comparison operator
>=
<=
%
>
<
=
!= or <>
Comparison Operators
Comparison operators
are symbols that represent specific actions. You can refine your search by prefixing search fields with a comparison operator. Refer to the following table to identify the comparison operators you can use with different fields.
Description
Equal to
Not equal to
Greater than
Less than
Greater than or equal to
Less than or equal to
Contains
Text field Numeric field Drop-down list
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
NA
Yes
Yes
NA
NA
NA
NA
NA
Notes:
“Equal to” is the default comparison operator for numeric and drop-down list fields.
If you type an equal to sign “=” in a field and nothing else, B.A.S.I.S. will search for records that have an empty value for that field. For example, typing an “=” in the Department field will find every record that does not have an assigned department.
Note:
Search Fields Using “Begins With”
For text and drop-down list fields you can search records whose values begin with specific characters by entering those characters in the field. For example, when searching by last name, a filter of “L” will find “Lake”, “Lewis”, etc. A filter of “Lake” will find “Lake”, “Lakeland”, etc.
The default comparison operator for text fields is “begins with”.
Search Multiple Fields
When you search multiple fields, the search criteria for each field is combined.
For example, typing “A” in Last name field and “B” in First name field will find all people whose last name begins with “A” and whose first name beings with “B”.
revision 1
— 269
15: Visits Folder
Note:
One exception is searching access levels, which uses an “or” comparison for multiple selections. For example, selecting both “Access Level A” and “Access
Level B” will find all cardholders with either “Access Level A” or “Access Level
B” assigned.
If you want to search for a range of Badge IDs, take advantage of the two
Badge ID fields on the Badge form. One field is located in the middle-left section of the form and the other field is located in the right section of the form. Note, the form must be in modify mode to see both fields. Type “>=
100” in one field and “<= 200” in the other to find all badges with IDs between 100 and 200 (inclusive).
Search for All Visits to a Selected Cardholder
This procedure will search for every person who visited a selected cardholder.
1. Select Visits from the View menu. The Visits folder opens.
2. On the Visit tab, click [Search].
3. Do one of the following:
• Enter the full or partial last name of the cardholder in the Host name drop-down list.
• Use the Select Host Wizard by leaving the Host name drop-down list blank and clicking the [...] button to the right it. When the wizard opens, enter any information that you know about the cardholder and click
[Next]. The wizard will display all records that match the criteria you entered. Select the correct cardholder and click [Finish].
4. Click [OK]. B.A.S.I.S. displays all the visits made to the selected cardholder.
If you entered a partial cardholder name, B.A.S.I.S. displays all the visits made to the cardholders that meet the search criteria.
Search for All Visits by a Selected Visitor
1. Select Visits from the View menu. The Visits folder opens.
2. On the Visit tab, click [Search].
3. Do one of the following:
• Enter the full or partial last name of the visitor in the Visitor name drop-down list.
• Use the Select Host Wizard by leaving the Visitor name drop-down list blank and clicking the [...] button to the right it. When the wizard opens, enter any information that you know about the visitor and click [Next].
The wizard will display all records that match the criteria you entered.
Select the correct visitor and click [Finish].
4. Click [OK]. B.A.S.I.S. displays all the cardholders the selected visitor has met with. If you entered a partial visitor name, B.A.S.I.S. displays all the cardholders visited by the visitors that meet the search criteria.
270 —
revision 1
Alarm Monitoring User Guide
Search for Scheduled, Active or Finished Visits
1. Select Visits from the View menu. The Visits folder opens.
2. On the Status search tab, click [Search].
3. In the Search for visits section, select that status you wish to search for.
• To search for scheduled visits, select the Scheduled, future check box.
– If you wish to search for visits that are scheduled to begin in a specified amount of time, select the Starting within check box and specify the number of minutes, hours, or days.
– By default, scheduled visits that are late getting started are included in the search. If you do not want to search for scheduled visits that are late, deselect the Scheduled, late check box.
• To search for active visits, select the Active check box.
– If you wish to search for visits that are scheduled to end within a specified amount of time, select the Ending within check box and specify the number of minutes, hours, or days.
– By default, active visits that are late signing out (overstayed) are included in the search. If you do not want to search for overstayed visits, deselect the Active, overstayed check box.
• To search for finished visits, select the Finished check box.
4. The refresh rate is how often (in minutes) the database is queried for changes.
• Select the Use system default rate check box to use the system default rate. Notice the Refresh rate field automatically populates with the default value.
• Deselect the Use system default rate check box to use a different rate.
Enter the new rate in the Refresh rate field. This setting is stored on a per user basis.
5. Click [OK]. The visit records that meet the search criteria display in the
Visits listing window.
Search for All Visits for a Specific Date or Time
Depending on the fields you populate, this procedure will search for:
• Visits scheduled to start on a specific date or time.
• Visits scheduled to end on a specific date or time.
• Visits that start on a specific date or time.
revision 1
— 271
15: Visits Folder
• Visits that end on a specific date or time.
1. Select Visits from the View menu. The Visits folder opens.
2. On the Visit tab, click [Search].
3. To search for a specific date: a. Click the [...] button to the right of one of the four date fields (Scheduled time in, Scheduled time out, Time in, or Time out).
b. The Select Date(s) window opens. Complete one of the following:
• Select a time range and the number of days to search. If you select
“Today”, you do not need to enter the number of days to search.
• Select a time range and a date.
• Select a start date and the number of days to search.
• Select a start date and end date.
c. Click [OK]. The code for the search criteria that you specified displays in the Visit form.
4. To search for a specific time: a. Click the [...] button to the right of one of the four time fields.
Notes:
b. The Select Time Range window opens. Select the start time range and enter a time. c. Select the end time range and enter a time.
If you select “None” for a time range, you cannot enter a specific time.
You can change the time by using the spin buttons or typing new values. The hour, minute, and time of day are adjusted individually.
d. Click [OK].
5. Click [OK] on the Visit form. The visit records that meet the search criteria display in the listing window.
6. Repeat steps 3 5 to search for scheduled time in, scheduled time out, time in, or time out.
272 —
revision 1
Alarm Monitoring User Guide
Retrieve the Most Recent Visit Search Results
1. Display the Cardholders folder or Visits folder by completing one of the following:
• To display the Cardholders folder in Alarm Monitoring, select Badge
Info from the View menu. For all other applications, select
Cardholders from the Administration menu.
• To display the Visits folder in Alarm Monitoring, select Visits from the
View menu. For all other applications, select Visits from the
Administration menu.
2. Click [Search].
3. Click [Last Search]. The criteria you selected from the most recent search operation will be inserted into the appropriate fields.
4. You can optionally modify your search criteria.
5. Click [OK].
6. B.A.S.I.S. retrieves and displays the first matching record. Use the navigational buttons to look at additional matching records.
Find a Cardholder or Visitor Associated with a Visit
1. Select Visits from the View menu. The Visits folder opens.
2. Locate the visit record that you wish to find the visitor or cardholder for.
3. Right-click on the visit record.
• If you wish to view the cardholder record, select Find Cardholder.
• If you wish to view the visitor record, select Find Visitor.
4. The record of the corresponding cardholder or visitor will be displayed in the
Cardholder or Visitor window.
Add a Visit Record
To add a visit, information about the visit needs to be entered on the Visit, Details and E-mail forms in the Visits folder; it does not matter which form you start with. When the Visits folder opens, the Visit form displays by default, so this procedure begins on that form.
Note:
This procedure does not apply to view/edit only workstations.
1. Select Visits from the View menu. The Visits folder opens.
2. On the Visit form: a. A new visit record can either be based on an existing visit record or it can be an entirely new record.
• To create a record based on an existing visit record, select a visit record in the Visits listing window, then click [Add]. The fields
revision 1
— 273
15: Visits Folder
Note:
prepopulate with the information from the selected visit. You can select new values for any field.
• To create a record that is not based on an existing visit record, make sure that no visit record is selected in the Visits listing window, then click [Add]. The fields will be blank to begin with.
Steps
and
can be done in either order.
Note:
b. Click the [...] button to the right of the Host name drop-down list. The
Select Host Wizard: Search form opens. For more information, refer to
Select Host Wizard: Search Form on page 293.
1) Specify your search criteria by typing full or partial entries in the enabled fields.
Leave all fields blank to display all cardholders.
Note:
2) If a visitor is specified and you wish to search for only cardholders who have been visited by that visitor, select the Previous hosts for
current visitor only check box.
3) Click [Next].
4) The Select Host Wizard: Select form opens. In the Cardholder listing window, select the cardholder you wish to add a visitor for.
For more information, refer to Select Host Wizard: Select Form on page 295.
5) Click [Finish]. The cardholder’s name appears in the Host name field on the Visit form.
c. Click the [...] button to the right of the Visitor name field. The Select
Visitor Wizard: Search form displays.
1) Specify your search criteria by typing full or partial entries in the enabled fields.
Leave all fields blank to display all visitors.
2) If a cardholder is specified and you wish to only search for visitors who have visited that cardholder, select the Previous visitors for
current host only check box.
3) Click [Next].
4) The Select Visitor Wizard: Select or Add form displays. If the
Visitor is listed below, select the visitor and click [Finish]. The visitor’s name appears in the Visitor name field on the Visit form.
If the Visitor is not listed below, select the Create new visitor radio button and click [Next]. The Select Visitor Wizard: Add form displays. Enter the new visitor’s information and click [Finish].
274 —
revision 1
Alarm Monitoring User Guide
Note:
For a detailed description of the Select Visitor Wizard: Select or Add form
refer to Select Visitor Wizard: Select or Add Form on page 298.
Note:
d. In the Scheduled time in fields, specify the date and time the visit will begin. You can either type the values or select them.
If the Sign In Now check box is selected, these fields will be grayed out.
Note:
e. In the Scheduled time out fields, specify the date and time the visit will end. You can either type the values or select them.
f. Select the Sign In Now check box if the visit is starting immediately. If you select this option, the Scheduled time in fields will become grayed out and the date and time when you click the [OK] button will be assigned as the visit’s Time in.
3. Click the Details tab. For a detailed description of the Details form refer to
Details Form on page 287. On the Details form:
a. In the Type drop-down list, select the type of visit.
Types of visits must first be configured in the List Builder, which is displayed in System Administration or ID CredentialCenter by selecting the
Administration menu, then selecting List Builder.
Note:
b. In the Purpose field, type the reason for the visitor’s visit.
4. You may wish to send e-mail notifications to all parties that require information about a scheduled visit. For a detailed description of the E-mail
form refer to E-mail Form on page 288. To set up e-mail notifications, click
the E-mail tab. On the E-mail form:
For an e-mail to be sent, the Allow e-mail notification check box on the
Visits form in the Cardholder Options folder must be selected.
a. In the Include section, verify the Default Recipients check box is selected as long as you wish to send e-mail messages to the default
revision 1
— 275
15: Visits Folder
recipients. The default recipients are configured in the following locations:
• On segmented systems, select Administration > Segments, click the Segments tab, then click the Visits sub-tab. On the Visits subtab, you can view or modify the default recipients.
• On nonsegmented systems, select Administration > System
Options, then click the Visits tab. On the Visits tab, you can view or modify the default recipients.
b. Select the Cardholder for this visit check box if you wish to have an email sent to the cardholder for this visit.
c. Select the Visitor for this visit check box if you wish to have an e-mail sent to the visitor for this visit.
d. Click [Add] if you wish to add another recipient. The Add recipient window displays. You may add a cardholder, visitor, directory account or SMTP address.
276 —
revision 1
• If you select the Cardholder radio button and click [OK], the
Select Host Wizard: Search form displays. For a detailed
description of the Select Host Wizard: Search form refer to Select
Host Wizard: Search Form on page 293.
• If you select the Visitor radio button and click [OK], the Select
Visitor Wizard: Search form displays. For a detailed description of
the Select Visitor Wizard: Search form refer to Select Visitor
Wizard: Search Form on page 297.
• If you select the Directory account radio button and click [OK], the Select Account window displays.
• If you select the SMTP address radio button, type the SMTP address, then click [OK]. An example of an SMTP address is
5. Click [OK].
6. If the Sign in now check box was selected, proceed to step 7 . If the Sign in
now check box was not selected, the visit will be added. The value for the
Time In column for the visit will remain blank and the visit can be signed in later when it actually occurs.
7. If none of the Allow disposable badge printing, Allow access control
badge assignment and Allow e-mail notification check boxes are checked
Alarm Monitoring User Guide
on the Visits form in the Cardholder Options folder, the visit will be signed in. If any of those options are selected, the Sign In Visit(s) window displays.
Note:
8. The Print disposable badge(s) of this type check box and listing window are enabled if the Allow disposable badge printing check box is selected on the Visits form in the Cardholder Options folder.
• If enabled, you can print a disposable badge for the user by selecting the
Print disposable badge(s) of this type check box, then selecting a disposable badge type to be assigned and printed.
Disposable badge types are configured in the Badge Types folder in System
Administration. For a badge type to be used to print disposable badges, it must have “Visitor” selected for the Class and the Disposable check box must be selected (on the Badge Type sub-tab). If segmentation is enabled, the correct segment must be selected on the Segment Membership sub-tab.
• If the check box is deselected, the system will not print a disposable badge.
9. To override the badge type printer assignment select the Send all badges to
this printer (overriding badge type printer assignment) check box and select the printer from the drop-down list. This check box and drop-down list
revision 1
— 277
15: Visits Folder
are enabled if the Print disposable badge(s) of this type check box is selected and the user has the correct permissions.
10. The Assign this access control badge ID check box and field are enabled if the Allow access control badge assignment check box is selected on the
Visits form in the Cardholder Options folder in System Administration.
• If enabled, you can select the Assign this access control badge ID check box and then type the number of an existing badge that has the class “Visitor” in the field or leave the field blank.
• If the visitor already has an active access control badge (from manual assignment or another visit), this field will automatically be filled in with that ID.
• If the check box is deselected, the system will not attempt to assign an access control badge ID.
11. Click [Sign In]. The visit will be added, the Time In field will be updated to the current date and time and any access control badge assigned will become active.
Modify a Visit Record
Note:
This procedure does not apply to view only workstations.
Note:
1. Select Visits from the View menu. The Visits folder opens.
2. Locate the visit record you want to change and select it in the Visits listing window.
Multiple selection cannot be used when modifying visits.
3. Click [Modify].
4. Make the changes you want to the record. Changes can be made on any tab in the Visits folder.
5. Click [OK] to save the changes, or [Cancel] to revert to the previously saved values.
Delete a Visit Record
Note:
This procedure does not apply to view/edit only workstations.
1. Select Visits from the View menu. The Visits folder opens.
2. In the Visits listing window select the visit record you want to delete.
278 —
revision 1
Alarm Monitoring User Guide
Note:
To select multiple visit records select the Multiple Selection check box.
3. Click [Delete].
4. Click [OK]. The visit(s) will be deleted without confirmation.
Print a Visitor Badge
1. Select Visits from the View menu. The Visits folder opens.
2. In the Visits listing window select the visit record you want to print.
Note:
To select multiple visit records select the Multiple Selection check box.
3. On any form in the Visits folder, click [Print].
4. The Print badge(s) window displays. In the Print disposable badge(s) of
this type listing window select the type of badge to print.
Note:
Disposable badge types are configured in the Badge Types folder in System
Administration and must have “Visitor” selected for the Class and the
Disposable check box selected (on the Badge Type sub-tab). If segmentation is enabled, the correct segment must be selected on the Segment
Membership sub-tab.
5. To select an alternate printer select the Send all badges to this printer
(overriding badge type printer assignment) check box and choose a printer from the drop-down list. This check box and drop-down list are enabled if the user has the correct permissions.
6. Click [OK].
Sign in a Previously Scheduled Visit and Print a Badge
Note:
This procedure does not apply to view only workstations.
revision 1
— 279
15: Visits Folder
Note:
Each visit has a time that it is scheduled to begin. When the visitor arrives and the visit actually begins, the visit should be “signed in”. When a visit is signed in, the actual Time In of the visitor is updated to the current date and time and any access control badge that the visitor is issued is activated. A visit can be signed in immediately after it is added or it can be signed in later.
1. Open the Sign In Visit(s) dialog by completing one of the following:
a. Add a visit. For more information, refer to Add a Visit Record on page 273.
2. Depending on how the badge types are configured, different fields are active on the Sign In Visit(s) form.
• To print a disposable visitor’s badge using the default printer
assignment, complete steps a and d (below).
• To print a disposable visitor’s badge by overriding the default printer
,
, and
.
• To print a non-disposable visitor’s badge by using the default printer
assignment, complete steps c and d .
• To print a non-disposable visitor’s badge by overriding the default
printer assignment, complete steps a through d
.
a. Select the Print disposable badge(s) of this type check box and select a badge type.
b. Select the Send all badges to this printer (overriding badge type printer assignment) check box and select the printer from the dropdown list.
c. Select the Assign this access control badge ID check box and enter the badge ID. Note, the badge ID must exist in the database as an active visitor badge ID. If the visitor already has an active access control badge, this field will automatically be filled in with that ID.
d. Click [Sign In].
Disposable badge types are configured in the Badge Types folder. For a badge type to be used to print disposable badges, it must have “Visitor” selected for the Class and the Disposable check box must be selected (on the
Badge Type sub-tab). If segmentation is enabled, the correct segment must be selected on the Segment Membership sub-tab.
Sign Out a Visit
Note:
This procedure does not apply to view only workstations.
Each visit has a time that it is scheduled to end. When the visitor leaves and the visit actually ends, the visit should be “signed out.” When a visit is signed out,
280 —
revision 1
Visit Form
Alarm Monitoring User Guide
the actual Time Out of the visitor is updated to the current date and time and any access control badge that the visitor is issued is deactivated.
To use the Sign Out feature, you must first configure a badge status to use when doing an automatic sign out. This is done on the Visits form in the Cardholder
Options folder. For more information refer to “Configure System-wide Visit
Options” in the Cardholder Options Folder in the System Administration User
Guide.
1. Select Visits from the View menu. The Visits folder opens.
2. Locate the active visit record that needs to be signed out.
3. In the Visits listing window, select the active visit that you want to sign out by clicking on it.
4. Click [Sign Out].
5. The message “Are you sure you wish to sign out the selected visit(s)? This will also deactivate any badges the visitors have.” will be displayed. Click
[Yes] to complete the sign out. The Time out will be updated to the current date/time. If the visitor has an active badge, the deactivate date will be updated and the badge status will be set to the status setup that was selected on the Cardholder Options form. The signed out visit will appear in the
Visits listing window.
Visit Form Overview
The Visit form is displayed by default when the Visits folder opens. It is used to:
• Add or modify visits
• Display visit records for a selected date range
revision 1
— 281
15: Visits Folder
• Search for visit records based on the scheduled time in, scheduled time out, time in, time out or date and time last changed
Visit Form Field Table
Form Element
Scheduled time in
Time in
Scheduled time out
Time out
Last changed
Comment
Select the date and time that the visit is expected to start.
When a visit is signed in, the visit’s Time in gets updated to the current date and time.
Select the date and time that the visit is expected to end.
When a visit is signed out, the visit’s Time out gets updated to the current date and time.
Indicates the date and time on which this visit record was last modified and saved.
This date and time are only updated when visit information is changed, not when badge information is changed. The last changed date is saved individually for each badge record as well.
Select Date(s) Window
This window is only displayed when the Visit form in the Visits folder is in
Search mode. In Search mode, click the [...] button to the right of the first
Scheduled time in, Time in, Scheduled time out or Time out field.
Visit Form - Select Date(s) Window Field Table
Form Element
Day
Specific Date
Comment
Used when searching for a scheduled time in, time in, scheduled time out or time out. Selects visits that occurred today, on a previous number of days or on a specified number of days in the future.
Used when searching for the date portion of a scheduled time in, time in, scheduled time out or time out. Selects visits that occurred on a specified date. Choices include on, on or after, after, on or before or before a specified date.
282 —
revision 1
Alarm Monitoring User Guide
Visit Form - Select Date(s) Window Field Table (Continued)
Form Element
Number of Days
After a Date
Between Two
Dates
OK
Cancel
Comment
Used when searching for the date portion of a scheduled time in, time in, scheduled time out or time out. Selects visits between a specified start date and a specified number of days after the start date.
Used when searching for the date portion of a scheduled time in, time in, scheduled time out or time out. Selects all visits that occurred between the specified Start date and the End date.
Enters the code for the selected search criteria in the respective field on the Visit form in the
Visits folder.
Closes the Select Date(s) window without selecting a date search criteria.
revision 1
— 283
15: Visits Folder
Select Time Range Window
This window is only displayed when the Visit form in the Visits folder is in
Search mode. In Search mode, click the [...] button to the right of the second
Scheduled time in, Time in, Scheduled time out or Time out field.
Visit Form - Select Time Range Window Field Table
Form Element
Start time
End time
OK
Cancel
Comment
Used when searching for the time portion of a scheduled time in, time in, scheduled time out or time out. Allows you to search for visits that start on or after or after a specified time. If
“None” is selected, no time restraints are put on the visit records that are returned. (Visits that started at any time on the specified date will be returned.)
Used when searching for the time portion of a scheduled time in, time in, scheduled time out or time out. Allows you to search for visits that end on or before or before a specified time. If
“None” is selected, no time restraints are put on the visit records that are returned. (Visits that ended at any time on the specified date will be returned.)
Enters the code for the selected search criteria in the respective field on the Visit form in the
Visits folder.
Closes the Select Time Range window without selecting a time search criteria.
284 —
revision 1
Status Search Form
Alarm Monitoring User Guide
Status Search Form Overview
The Status Search form is only enabled when the [Search] button is clicked. It is used to:
• Search for Visits that meet a specified criteria (scheduled in the future, scheduled but late, active, finished, etc.)
• Set the refresh rate
Status Search Form Field Table
Form Element Comment
Scheduled, future
Starting within
Scheduled, late
Active
If selected, the search will find visits that are scheduled in the future, i.e., have a scheduled time in that is in the future and have not been signed in yet
Enabled for selection only when the Scheduled, future check box is selected. If selected, specify the number of hours, days or minutes that the visit is scheduled to begin in. For example, you can search for all visits that are scheduled to begin within the next two days.
If selected, the search will find visits that are late, i.e., have a scheduled time in that is in the past and have not been signed in yet
If selected, the search will find all visits that are currently signed in and have not been signed out yet
Ending within Enabled for selection only when the Active check box is selected. If selected, specify the number of hours, days or minutes that the visit is scheduled to end in. For example, you can search for all visits that are scheduled to end within the next two days.
Active, overstayed If selected, the search will find all visits that are currently signed in where the current date and time is after the scheduled time out. For example, a visitor that was supposed to leave at 3 p.m., but is still visiting at 5 p.m.
Finished If selected, the search will locate visits that occurred in the past.
revision 1
— 285
15: Visits Folder
Status Search Form Field Table (Continued)
Form Element
Refresh rate (in minutes)
Use system default rate
Comment
The refresh rate is how often the database is queried to see if it has changed. The refresh rate is stored on a per user basis and only applies when searching based on a status (i.e., the
“Scheduled, future”, “Scheduled, late”, “Active”, “Active, overstayed” or “Finished” status) on the Status search form in the Visits folder. The default value is set in the Refresh rate (in
minutes) field on the Visits form in the Cardholder Options form. A custom refresh rate can be specified as long as the Use system default rate check box is not selected.
If selected, the system default rate will be used when refreshing. The system default rate is set in the Refresh rate (in minutes) field on the Visits form in the Cardholder Options folder.
If not selected, a custom refresh rate can be specified in the Refresh rate (in minutes) field.
286 —
revision 1
Alarm Monitoring User Guide
Details Form
Details Form Overview
The Details form is a user-defined form that has been created for you. This form can be modified or even deleted using FormsDesigner. By default, the form contains the type and purpose of the visit.
Details Form Field Table
Form Element
Type
Purpose
Comment
Select the type of visit.
Note:
Types of visits must first be configured in the List Builder, which is displayed by selecting the Administration menu, then selecting List Builder. For more information refer to the List Builder Folder chapter in the System Administration
User Guide.
Type the reason why the visitor is visiting the cardholder.
revision 1
— 287
15: Visits Folder
E-mail Form
E-mail Form Overview
The E-mail form is used to specify e-mail addresses and pager numbers that are automatically notified of visits. You can:
• Add a recipient
• Remove a recipient
• Specify whether to e-mail the default recipients, the cardholder being visited and/or the visitor
E-mail Form Field Table
Form Element Comment
Default Recipients Select this check box if you wish to send e-mail messages to the default recipients.
Cardholder for this visit
Visitor for this visit
• On segmented systems, select Administration > Segments, click the Segments tab, then click the Visits sub-tab. On the Visits sub-tab, you can add or remove recipients. These recipients will be collectively considered the “Default Recipients” on the E-mail form in the Visits folder.
• On non segmented systems, select Administration > System Options, then click the
Visits tab. On the Visits tab, you can view or modify the default recipients.
Whether this check box is selected by default when a new visit is added is determined by the
Include default recipients by default check box on the Visits form in the Cardholder Options folder.
Select this check box if you wish to have an e-mail sent to the cardholder for this visit.
Whether this check box is selected by default when a new visit is added is determined by the
Include host’s e-mail by default check box on the Visits form in the Cardholder Options folder.
Select this check box if you wish to have an e-mail sent to the visitor for this visit. Whether this check box is selected by default when a new visit is added is determined by the Include
visitor’s e-mail by default check box on the Visits form in the Cardholder Options folder.
288 —
revision 1
Alarm Monitoring User Guide
E-mail Form Field Table (Continued)
Form Element
Additional
Recipients listing window
Add
Comment
Displays the e-mail addresses that will receive e-mail notification of visits.
Note:
The addresses for the default recipients are not displayed in this listing window.
Click this button if you wish to add another recipient. The Add recipient window is displayed.
You may add a cardholder, visitor, directory account or SMTP address.
Remove
• If you select the Cardholder radio button and click [OK], the Select Host Wizard: Search form is displayed.
• If you select the Visitor radio button and click [OK], the Select Visitor Wizard: Search form is displayed.
• If you select the Directory account radio button and click [OK], the Select Account window is displayed.
• If you select the SMTP address radio button, type the SMTP address, then click [OK].
An example of an SMTP address is “[email protected]”.
Removes the selected recipient from the list of recipients that will receive notification of visits.
revision 1
— 289
15: Visits Folder
Add Recipient Window
This window is displayed when the E-mail form in the Visits folder is in Add or
Modify mode and the [Add] button to the right of the Additional Recipients listing window is clicked.
E-mail Form - Add Recipient Window Field Table
Form Element Comment
Cardholder The Select Host Wizard: Search form is displayed, which allows you to add a cardholder as an
For more information, refer to Select Host Wizard: Search Form
Visitor The Select Visitor Wizard: Search form is displayed, which allows you to add a visitor as an email recipient.
Directory account The Select Account window is displayed, which allows you to add a directory account as an email recipient.
SMTP address Type the SMTP address, then click [OK]. An example of an SMTP address is
OK • If you selected the Cardholder radio button, the Select Host Wizard: Search form is displayed.
For more information, refer to Select Host Wizard: Search Form
• If you selected the Visitor radio button, the Select Visitor Wizard: Search form is displayed.
For more information, refer to Select Visitor Wizard: Search Form
• If you selected the Directory account radio button, the Select Account window is displayed.
• If you selected the SMTP address radio button and typed an SMTP address, the address will be added to the Additional Recipients listing window.
Cancel Closes the Add recipient window without adding a recipient.
290 —
revision 1
Alarm Monitoring User Guide
Reports Form
Reports Form Overview
The Reports form shows only visit-related reports. On the Reports form you can:
• Search for a cardholder
• Search for a visitor
• Generate a report
Reports Form Field Table
Form Element
Limit report to current search
Description
Report listing window
Comment
If selected, the report will only include those records that match the rest of the search criteria specified on any form in the Visits folder.
If not selected, the report will include all records for the selected report type.
A brief description of the report contents.
Lists currently defined reports of the type(s) selected in the Report listing window.
Reports Form Procedures
Run a Visit Report from the Visits Folder
A visit report can be generated for either a defined search criteria or for all visits.
revision 1
— 291
15: Visits Folder
Note:
This procedure does not apply to view only workstations.
1. If you wish to generate a visit report that searches through all visit records not just those that match a search criteria, proceed to step 2 . To generate a visit report based on a search criteria: a. Select Visits from the View menu. The Visits folder opens.
b. In the Visits folder, click [Search].
c. Run the search that you wish to print a report for. For more information on searching refer to the following:
•
Visit Search Capabilities on page 269
•
Search for All Visits to a Selected Cardholder on page 270
•
Search for All Visits by a Selected Visitor on page 270
•
Search for Scheduled, Active or Finished Visits on page 271
•
Search for All Visits for a Specific Date or Time on page 271
•
Retrieve the Most Recent Visit Search Results on page 273
d. Click the Reports tab.
e. Select the Limit report to current search check box.
2. To generate a visit report that searches through all visits: a. Select Visits from the View menu. The Visits folder opens.
b. In the Reports listing window, select the type of report you wish to print.
3. Click [Print]. The Print Report Options window opens.
292 —
revision 1
4. In the Print Destination section, select whether to print to a preview window, export directly to a file or print directly to a printer.
5. If you selected Print Directly to a Printer in the Print Destination section, select a printer in the drop-down list and choose whether to Prompt for
Number of Pages.
6. In the Report Subtitle section, type the report subtitle. If the Limit report to
current search check box is selected, the search criteria will be listed in the
Alarm Monitoring User Guide
Report Subtitle section by default. The subtitle will be displayed below the report title on the report.
7. Click [OK]. The options selected in the Print Destination section will determine where the report is sent.
Select Host Wizard: Search Form
Note:
If the FormsDesigner application has been used to customize your cardholder data, the elements on your Select Host Wizard: Search form will be different. The default fields are pictured below.
This form is displayed when the [Search] button in the Visits folder is clicked and then the [...] button to the right of the Host name field is clicked.
Select Host Wizard: Search Form Overview
This form is used to enter search criteria that will allow you to locate a specific cardholder.
revision 1
— 293
15: Visits Folder
Visits Folder - Select Host Wizard: Search Form
Form Element Comment
Previous hosts for current visitor only
Last name
First name
Middle name
Cardholder ID
Badge type
This check box is only enabled when a visitor has been selected and a cardholder is being searched for. If selected, only those cardholders who have previously been visited by the selected visitor will be displayed on the Select Visitor: Select or Add form.
Indicates cardholder’s last name.
Indicates cardholder’s first name.
Indicates cardholder’s middle name.
Indicates a cardholder’s ID, which is most commonly their Social Security Number. The cardholder ID must be a numeric value.
Selects which of the cardholder’s badges (if he or she has more than one) is to be the active one.
User-defined fields All fields below the line on this form are user-defined fields. The default fields are pictured, but your form may be different if the FormsDesigner application has been used to customize your cardholder data.
Back This button is not used.
Next
Cancel
Help
Import
The wizard will proceed to the Select Host Wizard: Select form.
Closes the window without locating a cardholder and returns you to the Visit form in the Visits folder.
Displays online help for this topic
Displays the Select Import Source window, which allows you to select a device to import cardholder data from, such as a business card scanner
294 —
revision 1
Alarm Monitoring User Guide
Select Host Wizard: Select Form
This form is displayed when the [Next] button on the Select Host Wizard: Search form is clicked.
Select Host Wizard: Select Form Overview
This form is used to select a cardholder record from those that matched the specified search criteria. The columns displayed are configured on the
Cardholder Search Results form in the Cardholder Options folder. For more information refer to the Segments Folder chapter in the System Administration
User Guide.
Visits Folder - Select Host Wizard: Select Form
Form Element
Cardholder listing window
Back
Finish
Cancel
Comment
A list of cardholder records that match the search criteria specified on the Select Host Wizard:
Search form are displayed.
Note:
The fields that are displayed in columns are set on the Cardholder Search Results
Lists form in the Cardholder Options folder.
Returns to the Select Host Wizard: Search form.
Completes the wizard. The selected cardholder’s name will be displayed in the Host name field.
Closes the window without selecting a cardholder and returns you to the Visit form in the
Visits folder.
revision 1
— 295
15: Visits Folder
Visits Folder - Select Host Wizard: Select Form (Continued)
Form Element
Help
Comment
Displays online help for this topic
296 —
revision 1
Alarm Monitoring User Guide
Select Visitor Wizard: Search Form
Note:
If the FormsDesigner application has been used to customize your visitor data, the elements on your Select Visitor Wizard: Search form will be different. The default fields are pictured below.
This form is displayed when the [...] button to the right of the Visitor name dropdown list on the Visit form is clicked.
Select Visitor Wizard: Search Form Overview
This form is used to locate visitor records that match the specified search criteria.
Visits Folder - Select Visitor Wizard: Search Form
Form Element
Previous visitors for current host only
Last name
First name
Middle name
Comment
This check box is only enabled when a cardholder has been selected and a visitor is being searched for. If selected, only those visitors who have previously visited the selected cardholder will be displayed on the Select Visitor: Select or Add form.
Indicates visitor’s last name.
Indicates visitor’s first name.
Indicates visitor’s middle name.
revision 1
— 297
15: Visits Folder
Visits Folder - Select Visitor Wizard: Search Form (Continued)
Form Element Comment
Badge type Indicates the visitor’s badge type. Badge types are configured in the Badge Types folder. For more information refer to the Badge Types Folder chapter in the System Administration User
Guide.
User-defined fields All fields below the horizontal line on this form are user-defined fields. The default fields are pictured, but your form may be different if the FormsDesigner application has been used to customize your visitor data.
Back
Next
Cancel
This button is not used.
The wizard will proceed to the Select Visitor Wizard: Select or Add form.
Import
Help
Closes the window without locating a visitor and returns you to the Visit form in the Visits folder.
Displays the Select Import Source window, which allows you to select a device to import visitor data from, such as a business card scanner
Displays online help for this topic
Select Visitor Wizard: Select or Add Form
This form is displayed when the [Next] button on the Select Visitor Wizard:
Search form is clicked.
298 —
revision 1
Alarm Monitoring User Guide
Select Visitor Wizard: Select or Add Form Overview
This form is displayed when adding a visit. From this form, you can:
• Search for visitor records that match the specified search criteria.
• Add a new visitor record.
Visits Folder - Select Visitor Wizard: Select or Add Form
Form Element
Select visitor below
Comment
Select this option if the visitor you need to add a visit for is listed below in the Visitor listing window.
If you select this option, also select a visitor in the Visitor listing window below.
Create new visitor Select this option if the visitor you need to add a visit for is not listed in the Visitor listing window.
Visitor listing window
If you select this option, the [Finish] button will be replaced with a [Next] button. When the
[Next] button is clicked, the Select Visitor Wizard: Add form will be displayed, on which you can add a new visitor.
A list of visitor records that match the search criteria specified on the Select Visitor Wizard:
Search form are displayed.
Back
Finish
Cancel
Help
Note:
The fields that are displayed in columns are set on the Visitor Search Results Lists form in the Cardholder Options folder.
Returns to the Select Visitor Wizard: Search form.
This button is displayed only if Select visitor below is selected. Click this button to complete the wizard. The selected visitor’s name will be displayed in the Visitor name field.
If Create new visitor is selected, the [Finish] button is replaced by a [Next] button.
Closes the window without selecting a visitor and returns you to the Visit form in the Visits folder.
Displays online help for this topic
revision 1
— 299
15: Visits Folder
Select Visitor Wizard: Add Form
This form is displayed when Create new visitor is selected and the [Next] button is clicked on the Select Visitor Wizard: Select or Add form.
Select Visitor Wizard: Add Form Overview
This form allows you to:
• Add a new visitor record
• Capture photographic information such as a photo, signature or biometric data for a visitor
• Import visitor data from a business card scanner or other similar device
Visits Folder - Select Visitor Wizard: Add Form
Form Element
Last name
First name
Middle name
Badge type
Comment
Indicates visitor’s last name.
Indicates visitor’s first name.
Indicates visitor’s middle name.
Select the visitor’s badge type. Badge types are configured in the Badge Types folder. For more information refer to the Badge Types Folder chapter in the System Administration User
Guide.
300 —
revision 1
Alarm Monitoring User Guide
Visits Folder - Select Visitor Wizard: Add Form (Continued)
Form Element Comment
User-defined fields All fields below the Name fields on this form are user-defined fields. The default fields are pictured, but your form may be different if the FormsDesigner application has been used to customize your visitor data.
Import
Capture
Back
Displays the Select Import Source window, which allows you to select a device to import visitor data from, such as a business card scanner
Displays Multimedia Capture, where you can capture photographic information such as a photo, signature or biometric data for a visitor
Returns to the Select Visitor Wizard: Select or Add form.
Finish
Cancel
Help
Completes the wizard. The visitor record will be added to the database and the name of the visitor who was just added will be displayed in the Visitor name field.
Closes the window without adding a visitor and returns you to the Visit form in the Visits folder.
Displays online help for this topic
revision 1
— 301
15: Visits Folder
Select Visitor Wizard: Select Form
This form is displayed when the [...] button to the right of the Visitor name field on the Visit form in the Visits folder is clicked.
Select Visitor Wizard: Select Form Overview
This form is displayed when searching; it is used to select a visitor record from those that matched the specified search criteria.
Visits Folder - Select Visitor Wizard: Select Form
Form Element Comment
Last Name
First Name
Back
Finish
Cancel
Indicates visitor’s last name.
Indicates visitor’s first name.
Middle Initial Indicates visitor’s middle initial.
User-defined fields All fields below the Name fields on this form are user-defined fields. The default fields are pictured, but your form may be different if the FormsDesigner application has been used to customize your visitor data.
Returns to the previous form.
Completes the wizard. The selected visitor’s name will be displayed in the Visitor name field.
Help
Closes the window without selecting a visitor and returns you to the Visit form in the Visits folder.
Displays online help for this topic
302 —
revision 1
Alarm Monitoring User Guide
Select Import Source Window
This window is displayed by clicking the [Import] button on any window in the
Select Host Wizard or Select Visitor Wizard.
Select Import Source Window Field Table
Form Element
Source listing window
OK
Cancel
Comment
Displays a list of available sources, such as a business card scanner, to import cardholder or visitor data from.
If a valid source is selected, you will be able to import cardholder or visitor data using it.
Closes the Select Import Source window without selecting a source to import cardholder or visitor data from.
revision 1
— 303
15: Visits Folder
304 —
revision 1
Alarm Monitoring User Guide
Chapter 16: Assets Folder
Toolbar Shortcut
The Assets folder contains forms with which you can:
• Add, change or remove asset records.
• Assign assets to cardholders.
• Track assets that are assigned to cardholders.
• Preview and print asset reports.
The Assets folder contains four forms: the Assets form, the Asset Classes form, the Assignments form and the Reports form.
This folder is displayed by selecting the Asset Info from the View menu.
revision 1
— 305
16: Assets Folder
Assets Form
Assets Folder - Assets Form
Form Element
Scan ID
Name
Type
Subtype
Serial Number
Department
Last Inspection
Next Inspection
Acquired
Replace
Assessed Value
Replacement
Value
Comment
Enter the Scan ID of the asset.
Enter a descriptive name for the asset. This is a “friendly” name assigned to each asset to make it easy to identify. Each name must be unique and contain no more than 32 characters.
Select the type of asset being configured. Available choices depend on what asset types were added in the Asset Types and Subtypes Management window. The window is displayed by selecting Asset Types and Subtypes from the Asset menu.
Select the subtype of the asset being configured. Available choices depend on what asset subtypes were added in the Asset Types and Subtypes Management window. The window is displayed by selecting Asset Types and Subtypes from the Asset menu.
Enter the serial number of the asset you are adding.
Select the department of the asset being configured. Available choices depend on what departments were added in the List Builder folder.
Enter the date when the asset was last inspected.
Enter the date when the asset will be inspected next.
Enter the date when the asset was acquired.
Enter the date when the asset will be replaced.
Enter the assessed value of the asset.
Enter the replacement value of the asset.
306 —
revision 1
Alarm Monitoring User Guide
Assets Folder - Assets Form (Continued)
Form Element
Asset Can Be
Disabled
Comment
(For special HID, IBM notebooks only) If checked, when the asset generates an access denied alarm (when a cardholder is not assigned to the asset), the asset will be disabled.
The Can Disable Asset check box on the Settings form of the Readers folder in System
Administration must also be checked in order for the selected reader to disable the asset.
Indicates the date of when the selected asset record was last changed.
Record Last
Changed
Photo
Last Access
Assign Asset/
Assign To
Search
Last Search
Displays a photo capture of the asset if one was added in Multimedia Capture.
Displays the date and time of the asset’s last access.
When adding or modifying an asset, select the [Assign Asset] button to launch the Cardholders folder. On the Cardholder form you can search for or add a cardholder to assign to the asset being configured.
Once you have located the cardholder on the Cardholder form, their name will appear on the
[Assign To] push button. Click on this button to assign the asset to the cardholder.
If the Cardholders folder is already open and a cardholder record is displayed, then the [Assign
To] button will automatically display the name of that cardholder record.
Click on this button to search for an asset based on a value entered in one or more of the fields.
Click on this button the display the findings of the previous search.
Moves to the first matching record.
Moves 10 matching records back.
Moves to the previous matching record.
Record count
Add
Capture
Modify
Delete
Moves to the next matching record.
Moves 10 matching records forward.
Moves to the last matching record.
Displayed in view mode and indicates the number of the record out of the total number of records found by the most recent search operation. For example: 6 of 10.
You can type in a number and hit the <Enter> key to jump to that record number.
Used to add an asset record.
Launches Multimedia Capture where you can add a photo of the asset.
Used to change an asset record.
Used to delete an asset record.
revision 1
— 307
16: Assets Folder
Assets Form Procedures
Add an Asset
Note:
This procedure does not apply to view/edit only workstations.
1. Select Asset Info from the View menu. The Assets folder opens.
2. Click [Add].
3. In the Scan ID field, enter an ID number for the asset.
4. In the Name field, enter a descriptive name for the asset. This is a “friendly” name assigned to each asset to make it easy to identify. Each name must be unique and contain no more than 32 characters.
5. If you want to identify the asset by type, select one from the Type dropdown list. If you want to identify the asset by subtype, select one from the
Subtype drop-down list. If you don’t want to identify the asset by type and/ or subtype, choose N/A from the Type and Subtype drop-down lists.
6. Type in a Serial Number and then choose the Department of the asset from the drop-down list.
7. Enter the date of the asset’s Last Inspection and the date of the asset’s Next
Inspection.
8. Enter the date of when the asset was acquired in the Acquired field.
9. Enter the date of when the asset will be replaced in the Replace field.
10. In the Assessed Value field type the amount, in dollars, of the asset’s value.
In the Replacement Value field type the amount, in dollars, it will cost to replace the asset.
11. Check the Asset Can Be Disabled check box if the asset can and you want it to be disabled when the asset generates an access denied alarm (when a cardholder is not assigned to the asset.) The Can Disable Asset check box on the Settings form of the Readers folder in the System Administration application must also be checked in order for the selected reader to disable the asset.
12. Click [Capture] to launch Multimedia Capture from where you can capture a photo of the asset to be displayed on the Assets form. For more information refer to the Multimedia Capture appendix in the System Administration User
Guide.
13. You can switch to the Asset Classes form if you want to configure groups
and classes now. For more information, refer to Asset Classes Form
14. Click [OK].
308 —
revision 1
Alarm Monitoring User Guide
Modify an Asset
Note:
This procedure does not apply to view only workstations.
1. Locate the asset record that you want to change.
2. Click [Modify].
3. Make the changes you want to the fields.
4. Click [OK] to save your changes, or [Cancel] to revert to the previously saved values.
Delete an Asset
Note:
This procedure does not apply to view/edit only workstations.
1. Locate the asset record that you want to delete.
2. Click [Delete].
3. Click [OK].
Assign a Cardholder to an Asset
Note:
This procedure does not apply to view only workstations.
1. Locate the asset record that you want to assign.
2. If the Cardholders folder was already open and a cardholder record displayed, proceed to
. If not, click [Assign Asset] to launch the
Cardholders folder.
3. In the Cardholders folder, retrieve the record of the cardholder you want to assign to the asset. On the Assets form of the Assets folder, the name of the cardholder will appear in the [Assign To] push button.
4. Click [Assign To] to assign the asset.
revision 1
— 309
16: Assets Folder
Search for an Asset Record
1. Select Asset Info from the View menu. The Assets folder opens.
2. Click [Search].
3. Specify your search criteria by typing full partial entries in the enabled fields.
4. Click [OK].
B.A.S.I.S. retrieves and displays the first matching record. Use the ,
, , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
Retrieve the Most Recent Search Results
1. Click [Search].
2. Click [Last Search]. The criteria you selected from the most recent search operation will be inserted into the appropriate fields.
3. If you want, modify your search criteria.
4. Click [OK].
B.A.S.I.S. retrieves and displays the first matching record. Use the ,
, , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
310 —
revision 1
Alarm Monitoring User Guide
Add an Asset Type/Subtype
Note:
This procedure does not apply to view only workstations.
1. Select Asset Info from the View menu. The Assets folder opens.
2. Select Asset Types and Subtypes from the Asset menu. The Asset Types and Subtypes Management window opens.
3. Select and asset type in the Asset Types listing window. If you want to modify a subtype, select the Subtype tab first.
4. Click [Modify] and make your desired changes.
5. Click [OK].
6. Click [Close] to return to the Assets form.
revision 1
— 311
16: Assets Folder
Asset Classes Form
Asset Classes Form (View Mode)
Asset Classes Form (Modify Mode)
312 —
revision 1
Alarm Monitoring User Guide
Asset Classes Form Field Table
Assets Folder - Asset Classes Form
Form Element
Scan ID
Name
Type
Subtype
Assigned Classes
Asset Groups
Asset Group
Asset Classes
Photo
Last Access
Assign Asset/
Assign To
Search
Last Search
Comment
Indicates the Scan ID of the asset.
Indicates the name of the asset.
Indicates the type of asset being configured.
Indicates the subtype of the asset being configured.
(View and modify mode) Displays the classes that are currently assigned to a group in the
Asset Groups listing window.
(View mode) Displays the asset groups that correspond with the classes in the Assigned
Classes listing window.
(Modify mode) Select the asset group(s) to which the asset will belong.
Select the asset classes that will be assigned to the asset. Groups can contain as many as 32 classes, but each asset can only belong to as many as 15 classes.
Displays a photo capture of the asset if one was added in Multimedia Capture.
Displays the date and time of the asset’s last access.
When adding or modifying an asset, select the [Assign Asset] button to launch the Cardholders folder. On the Cardholders form you can search for or add a cardholder to assign to the asset being configured.
Once you have located the cardholder on the Cardholders form, their name will appear on the
[Assign To] push button. Click on this button to assign the asset to the cardholder.
If the Cardholders folder is already open and a cardholder record is displayed, then the [Assign
To] button will automatically display the name of that cardholder record.
Click on this button to search for an asset based on a value entered in one or more of the fields.
Click on this button the display the findings of the previous search.
Moves to the first matching record.
Moves 10 matching records back.
Moves to the previous matching record.
Moves to the next matching record.
Moves 10 matching records forward.
Moves to the last matching record.
revision 1
— 313
16: Assets Folder
Assets Folder - Asset Classes Form (Continued)
Form Element
Record count
Comment
Displayed in view mode and indicates the number of the record out of the total number of records found by the most recent search operation. For example: 6 of 10.
Add
Modify
Delete
You can type in a number and hit the <Enter> key to jump to that record number.
This button is not used.
Used to change an asset classes record.
This button is not used.
This button is not used.
Asset Classes Form Procedures
Assign Classes to an Asset
Note:
This procedure does not apply to view only workstations.
1. Locate the record of the asset that you want to assign classes to.
2. Click [Modify].
3. Select an Asset Group from the drop-down list.
4. In the Asset Classes listing window, select the classes you want to assign.
You can select as many as 15 classes for each asset.
5. Click [OK].
Modify an Asset Classes Assignment
Note:
This procedure does not apply to view only workstations.
1. Locate the record of the asset that you want to change.
2. Click [Modify].
3. Make the changes you want to the fields.
4. Click [OK] to save your changes, or [Cancel] to revert to the previously saved values.
314 —
revision 1
Alarm Monitoring User Guide
Add Asset Groups and Classes
1. Select Asset Info from the View menu.
The Assets folder opens.
2. Select Asset Groups and Classes from the Asset menu. The Asset Groups and Classes Management window opens.
3. To add an asset group: a. Click the Asset Groups tab.
b. Click [Add].
c. In the Asset Group field, enter the name of the group you are adding.
d. Click [OK].
4. To add an asset class: a. Click the Asset Class tab.
b. Click [Add].
c. In the Asset Class field, enter the name of the class you are adding. You can add as many classes as you want but you can only assign as many as
32 classes to a group.
d. Click [OK].
5. To assign a class to a group: a. Click the Asset Class tab. b. Select an asset class.
c. Click [Modify].
d. Select the name of an asset group.
e. Click the push button to remove the asset group. Click the
push button add the asset group.
f. Click [OK].
revision 1
— 315
16: Assets Folder
Assignments Form
Assets Folder - Assignments Form
Form Element
Scan ID
Name
Type
Subtype
Listing window
Comment
Displays the assets scan ID. If you click [Search], you can enter the scan ID you want to search.
Displays the name of the asset. If you click [Search], you can enter the name of the asset you want to search.
Displays the type of asset. If you click [Search], you can enter the type of asset you want to search.
Displays the subtype of the asset. If you click [Search], you can enter the subtype of the asset you want to search.
Displays a list of cardholders who are currently or have been assigned to the selected asset.
Last Name
First Name
Assigned
Unassigned
Photo
Last Access
You can choose the number of entries you want listed by selecting Show Assignments X Days
Past from the Asset menu.
When you select the [Search] button, enter the last name of a cardholder to locate the assets that have been assigned to them.
When you select the [Search] button, enter the first name of a cardholder to locate the assets that have been assigned to them.
When you select the [Search] button, enter the date the asset was assigned if you want to locate the cardholder who was assigned to the asset on that date.
When you select the [Search] button, enter the date the asset was unassigned if you want to locate the cardholder who was unassigned to the asset on that date.
Displays a photo of the asset if one was captured in Multimedia Capture.
Displays the date and time of the assets last access.
316 —
revision 1
Alarm Monitoring User Guide
Assets Folder - Assignments Form (Continued)
Form Element
Assign Asset/
Assign To
Search
Last Search
Comment
Displays the name of the asset currently displayed in the Cardholders folder. If no name is displayed, when selected the Cardholders folder is launched from where you can search for and select the cardholder you wish to assign to the asset.
Used to locate a cardholder or asset assignment record.
Click on this button the display the findings of the previous search.
Moves to the first matching record.
Record count
Moves 10 matching records back.
Moves to the previous matching record.
Moves to the next matching record.
Moves 10 matching records forward.
Moves to the last matching record.
Displayed in view mode and indicates the number of the record out of the total number of records found by the most recent search operation. For example: 6 of 10.
You can type in a number and hit the <Enter> key to jump to that record number.
Assignments Form Procedures
Assign a Cardholder to an Asset
Note:
This procedure does not apply to view only workstations.
1. Locate the record of that asset that you want to assign.
2. If the Cardholders folder was already open and a cardholder record displayed, proceed to
. If not, click [Assign Asset] to launch the
Cardholders folder.
3. On the Cardholders folder, retrieve the record of the cardholder you want to assign to the asset. On the Assignments form of the Assets folder, the name of the cardholder will appear in the [Assign To] push button.
4. Click [Assign To] to assign the selected asset to the selected cardholder. The name of the cardholder will appear in the listing window.
revision 1
— 317
16: Assets Folder
Unassign an Asset
Note:
This procedure does not apply to view only workstations.
1. Locate the record of the asset that you want to unassign.
2. In the listing window, select the name of the cardholder who is currently assigned to the asset. The entry of the cardholder who is assigned will not list an Unassigned Date.
3. Right-click on the cardholder entry you selected and choose Unassign Asset from the menu. The Unassigned field will be updated to the current date.
Search for a Cardholder Assigned to an Asset
1. Locate the asset record that you want to look up a cardholder for.
2. In the listing window, select the name of the cardholder you want to look up.
3. Right-click on the cardholder entry you selected and choose Find
Cardholder from the menu. The Cardholders folder will display the record of the cardholder you selected.
318 —
revision 1
Alarm Monitoring User Guide
Reports Form
Note:
The Reports form is not available in view/edit only workstations or in the
Alarm Monitoring application.
Assets Folder - Reports Form
Form Element
Scan ID
Name
Type
Subtype
Listing window
Comment
Displays the scan ID of the selected asset.
Displays the name of the selected asset.
Displays the type of the selected asset.
Displays the subtype of the selected asset.
Displays a list of the types of reports that can be previewed and/or printed. An icon precedes each entry.
Select this check box if you want to limit this report to the search that you just completed.
Limit report to current search
Description
Filename
Photo
Last Access
Assign Asset/
Assign To
Displays a description of the report type you selected from the listing window.
Displays the file name of the report type.
Displays the captured photo of the currently selected asset.
Displays the date and time of the asset’s last access.
Displays the name of the cardholder currently displayed in the Cardholders folder. If no name is displayed, when selected the Cardholders folder is launched from where you can search for and select the cardholder you wish to assign to the selected asset.
revision 1
— 319
16: Assets Folder
Assets Folder - Reports Form (Continued)
Form Element
Comment
This button launches the Report Print Options window from where you can preview, print or export a report.
Moves to the first matching record.
Moves 10 matching records back.
Moves to the previous matching record.
Record count
Close
Moves to the next matching record.
Moves 10 matching records forward.
Moves to the last matching record.
Displayed in view mode and indicates the number of the record out of the total number of records found by the most recent search operation. For example: 6 of 10.
You can type in a number and hit the <Enter> key to jump to that record number.
Closes the Assets folder.
320 —
revision 1
Alarm Monitoring User Guide
Reports Form Procedures
Run an Asset Report
Note:
This procedure does not apply to Alarm Monitoring.
1. In the listing window, select the type of report you want to run.
2. Select the Limit report to current search check box if you want to limit this report to the search that you just completed.
3. Click [Print]. The Print Report Options window will be displayed.
4. Choose a Print Destination and if you want, update the text used for the report subtitle.
5. Click [OK].
• If you chose the Print Directly to a Printer radio button, select a printer from the drop-down list. If you select the Prompt for Number
of Pages check box, the Print window will be displayed where you can select print range, number of copies and whether or not to collate your report.
• If you chose the Export Directly to a File radio button, the Export window will be displayed. Choose the report Format and Destination from the drop-down lists. Depending on what you chose, enter the destination and format information in the corresponding window, then click [OK].
• If you chose the Print to a Preview Window radio button, an asset report print preview window will be displayed from where you can view the selected report on the screen. For more information refer to the
Report Print Preview Window chapter in the System Administration
User Guide.
revision 1
— 321
16: Assets Folder
322 —
revision 1
Alarm Monitoring User Guide
Chapter 17: Reports Folder
Toolbar Shortcut
Note:
The Reports folder contains forms with which you can:
• View on the screen reports created using report layout templates in the database and current data
• Report on data that meets specified criteria (such as dates, times, readers, alarm panels, cardholders and badge IDs)
• Print a report, save it to a file or export the data
The folder contains eight forms: the Report Configuration form, the Reader
Reports form, the Alarm Panel Reports form, the Anti-Passback Reports form, the Date/Time Reports form, the Event Reports form, the Receiver Account Zone
Reports form, and the Alarm Acknowledgment Reports form.
This folder is displayed by selecting Reports from the View menu or by selecting the Reports toolbar button.
Reports are installed when Database Setup is run. All reports are installed on the database server under the ReportTemplates subdirectory in the B.A.S.I.S. installation path. By default, this location is C:\Program
Files\B.A.S.I.S.\ReportTemplates.
Refer to the release notes for the versions of Seagate Crystal Reports that are supported. The release notes are located on the root of the B.A.S.I.S. installation disc.
For more information, refer to Appendix C: Reports on page 519.
revision 1
— 323
17: Reports Folder
Report Configuration Form
Reports Folder - Report Configuration Form
Form Element Comment
Listing window Lists currently defined reports of the type(s) selected in the Report View Filter window. Note that some reports are categorized under more than one type.
Filter Report View Click this button to display the Report View Filter window from where you can choose the types of reports you wish to view.
Name The name of the report.
File
Browse
Description
Password
The location and name of the file that contains the report.
Used to search through drives and directories to choose a report filename to insert into the File field.
A brief description of the report contents.
This field is optional. If you type a password here, a user attempting to print this report will be asked to first enter the correct password.
A password can be from 1 to 32 characters in length. As you type, the password will appear in the field as a series of *s.
Confirm Password If you typed something in the Password field, you must type exactly the same thing here. As with the Password field, your entry here will appear as a series of *s.
Type(s) Lists the types of reports that you can configure.
The system reports that are included with the installation are each assigned an appropriate
Type. You can modify report types on the system reports but selecting invalid types could result in unwanted behavior.
Note:
To restore types back to their defaults, run Database Setup.
Note:
To make the report appear in Area Access Manager the Area Access Manager check box must be selected in the Types field.
324 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Report Configuration Form (Continued)
Form Element
Add
Modify
Delete
Preview
Help
Use restored records
Comment
Used to configure a report.
Used to change a report configuration.
Used to remove a report.
Opens the Print Report Options window.
Displays the selected report in the Report Print Preview window.
Displays relevant on-screen help for this form.
If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Mode
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder.
In view mode, indicates the number of reports selected in the listing window and the total number of reports contained in all selected categories. For example: “1 of 42 selected.”
In modify mode, indicates the current operation, such as “Modify Mode.”
Closes the Reports folder.
Report View Filter Window
This window is displayed by clicking the [Filter Report View] button on the
Report Configuration form.
revision 1
— 325
17: Reports Folder
Reports Folder - Report View Filter Window
Form Element
Access Granted/
Denied
Comment
If this check box is selected, Access Granted and Access Denied reports will be included in the listing window.
Alarm
Acknowledgments
Alarm Panel
Alarm Panel
Events
Anti-Passback
Asset
Cardholder
Date/Time
General
Guest
Reader
Reader Events
Receiver
Receiver account
Zone
Reports of this type appear on the Reader Reports form for filtering.
If this check box is selected, Alarm Acknowledgment reports will be included in the listing window.
If this check box is selected, Alarm Panel reports will be included in the listing window.
Reports of this type appear on the Alarm Panel Reports form for filtering.
If this check box is selected, Alarm Panel Events reports will be included in the listing window.
Reports of this type appear on the Alarm Panel Reports form for filtering.
If this check box is selected, Anti-Passback reports will be included in the listing window.
Reports of this type appear on the Anti-Passback Reports form for filtering.
If this check box is selected, Asset reports will be included in the listing window.
Reports of this type appear on the Asset Reports form for filtering.
If this check box is selected, Cardholder reports will be included in the listing window.
Reports of this type appear on the Reports form of the Cardholder folder for filtering.
If this check box is selected, Date/Time reports will be included in the listing window.
Reports of this type appear on the Date/Time Report form for filtering.
If this check box is selected, general reports will be included in the listing window.
If this checkbox is selected, guest reports will be included in the listing window.
If this check box is selected, Reader reports will be included in the listing window.
Reports of this type appear on the Reader Reports form for filtering.
If this check box is selected, Reader Events reports will be included in the listing window.
Reports of this type appear on the Reader Reports form for filtering.
If this check box is selected, the names of Receiver reports will be displayed in the listing window.
Reports of this type appear on the Receiver Account Zone Reports form for filtering.
If this check box is selected, the names of Account Zone reports will be displayed in the listing window.
Reports of this type appear on the Receiver Account Zone Reports form for filtering.
326 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Report View Filter Window (Continued)
Form Element
Receiver Events
Comment
If this check box is selected, the names of Receiver Events reports will be displayed in the listing window.
User Transactions
Video Events
Visitor
OK
Cancel
Select All
Clear All
Reports of this type appear on the Receiver Account Zone Reports form for filtering.
If this check box is selected, User Transactions reports will be included in the listing window.
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder.
If this check box is selected, Video events reports will be included in the listing window.
If this check box is selected, Visitor reports will be included in the listing window.
Click this button to save your changes and return to the Report Configuration form.
Click this button to return to the Report Configuration form without saving your changes.
Click this button to select all check boxes in the window.
Click this button to deselect all check boxes in the window.
Report Configuration Form Procedures
Add a Report
1. Select Reports from the View menu. The Reports folder opens.
2. Click [Add].
3. In the Name field, type a unique, descriptive name for the report.
4. Click [Browse]. The Open window opens.
5. Select the drive, then the directory, then the file name for an existing report layout.
6. Click [OK] to insert the selection into the File field on the Report
Configuration form.
Note:
You cannot use the Report Configuration form to design a report layout.
Only existing layouts can be used to create reports. A valid report layout
revision 1
— 327
17: Reports Folder
must have been designed using Crystal Reports for Windows™ and must have the file extension “rpt.”
Note:
7. In the Description field, type a description of this report's contents.
8. If you want to restrict previewing and printing of this report, type a password in the Password field.
9. Type the password again in the Confirm Password field.
10. In the Type(s) listing window, select the check boxes beside the most appropriate category for this report.
You do not have to select a check box. Many of the reports currently in the system are uncategorized.
11. Click [OK] to add the report. The name of the report will be inserted alphabetically into the listing window.
Modify a Report
1. From the listing window, select the name of the report that you want to be changed. If the report is not listed, make sure that the appropriate check box is selected in the Report View Filter window (displayed by selecting the
[Filter Report View] button).
2. Click [Modify].
3. Make the changes you want to the fields.
4. Click [OK] to save the changes, or [Cancel] to revert to the previously saved values.
Delete a Report
1. From the listing window, select the name of the report that you want to delete. If the report is not listed, make sure that the appropriate check box is selected in the Report View Filter window (displayed by selecting the [Filter
Report View] button).
2. Click [Delete].
3. Click [OK].
328 —
revision 1
Alarm Monitoring User Guide
Filter The Report View
1. On the Report Configuration form, click [Filter Report View]. The Report
View Filter window opens.
2. Select the check boxes that correspond with the types of reports that you want to view. Click [Select All] to select all of the choices in the listing window. Click [Clear All] to deselect all of the choices in the listing window.
3. Click [OK]. The types of reports that correspond to the check boxes that you selected will be displayed in the listing window on the Report Configuration form.
Preview and Print a Report
For more information, refer to Preview and Print a Report on page 368.
Reader Reports Form
Reader Reports Form Overview
This form allows you to add filtering criteria to a reader report, so that you can narrow the results of your report. Depending on the type of report you select, you can optionally add a filter on reader(s), start date/time, end date/time, badge ID and/or cardholder name.
revision 1
— 329
17: Reports Folder
Reader Reports Form Field Table
Readers Folder - Reader Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined reader reports, and each report’s type. Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start
time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
330 —
revision 1
Alarm Monitoring User Guide
Readers Folder - Reader Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Cardholder Filter
Last Name
First Name
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
Includes the Last Name, First Name, and Badge ID fields. These fields are available only for applicable report types. These fields are not case-sensitive and will match any names beginning with the characters you type (much like the Cardholder form searches). For example, typing “smith” for Last Name will match “Smith”, “SMITHY”, “smithereen”, etc.
Enter the cardholder’s last name.
Enter the cardholder’s first name.
revision 1
— 331
17: Reports Folder
Readers Folder - Reader Reports Form (Continued)
Form Element Comment
Badge ID If you wish to report on the activity associated with a specific badge, enter the Badge ID here. This field is available only for applicable report types.
Report All
Report All/__ selected
Reader listing window
If this button is pushed, all entries in the Reader list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all readers will be included in the report.
Indicates “Report All” if no devices are selected in the Reader field. Indicates “__ selected” if one or more devices are selected in the Reader field.
Lists all readers on the system and the access panel to which each is attached.
Clear
Preview
Help
To select/deselect a reader, click on the icon beside it. A checkmark on an icon indicates that the reader is selected. Only data from selected readers will be included in the report.
However, if no devices are selected, data for all readers will be reported.
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder in the System Administration User Guide.
Closes the Reports folder.
Reader Reports Form Procedures
Run a Reader Report
1. Select Reports from Administration View menu. The Reports folder opens.
2. Select the Reader Reports tab.
3. From the listing window, select the report that you want to run.
4. In the Reader Filter section, select the icon(s) corresponding to the reader(s) whose data you wish to include in the report. If you don’t select any readers, data for all readers will be reported.
5. If desired, specify a date/time interval for gathering data in the Date/Time
Filter section. Only data gathered during the specified period will be
332 —
revision 1
Alarm Monitoring User Guide
Note:
included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
6. In the Cardholder Filter section, enter the person’s Last Name, First
Name, and/or Badge ID if you want the report to contain data pertaining only to cardholders having the specified name and/or badge ID (cardholder name and badge ID is applicable only to reader reports based on events).
7. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
Alarm Panel Reports Form
Alarm Panel Reports Form Overview
This form allows you to add filtering criteria to an alarm panel report, so that you can narrow the results of your report. Depending on the type of report you select, you can optionally add a filter on alarm panel(s), start date/time, and end date/ time.
revision 1
— 333
17: Reports Folder
Alarm Panel Reports Form Field Table
Reports Folder - Alarm Panel Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined alarm panel reports, and each report’s type. Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the displayed year and use the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight
AM by clicking on it, and use the spin buttons.
334 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Alarm Panel Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year to access the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight
AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
Report All
Report All
/__ selected
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of 8:00
AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
If this button is pushed, all entries in the Alarm Panel list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all readers will be included in the report.
Indicates “Report All” if no devices are selected in the Alarm Panel field. Indicates “__ selected” if one or more devices are selected in the Alarm Panel field.
revision 1
— 335
17: Reports Folder
Reports Folder - Alarm Panel Reports Form (Continued)
Form Element
Alarm Panel listing window
Comment
Lists all alarm panels on the system and the access panel to which each is attached.
Clear
Preview
Help
Use restored records
To select/deselect an alarm panel, click on the icon beside it. A checkmark on an icon indicates that the alarm panel is selected. Only data from selected alarm panels will be included in the report. However, if no devices are selected, data for all alarm panels will be reported.
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
Alarm Panel Reports Form Procedures
Run an Alarm Panel Report
1. Select Reports from Administration View menu. The Reports folder opens.
2. Select the Alarm Panel Reports tab.
3. From the listing window, select the report that you want to run.
4. If desired, specify a date/time interval for gathering data in the Date/Time
Filter section. Only data gathered during the specified period will be included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. In the Alarm Panel Filter section, select the icon(s) corresponding to the alarm panel(s) whose data you wish to include in the report. If you don’t select any alarm panels, or click [Report All], data for all alarm panels will be reported.
6. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
336 —
revision 1
Alarm Monitoring User Guide
Note:
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
Anti-Passback Reports Form
Anti-Passback Reports Form Overview
This form allows you to add filtering criteria to an anti-passback report, so that you can narrow the results of your report. Depending on the type of report you select, you can optionally add a filter on area(s), start date/time, end date/time, badge ID and/or cardholder name.
revision 1
— 337
17: Reports Folder
Anti-Passback Reports Form Field Table
Reports Folder - Anti-Passback Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined anti-passback reports, and each report(s) type. Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
338 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Anti-Passback Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Cardholder Filter
Last Name
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
Includes the Last Name, First Name, and Badge ID fields. These fields are available only for applicable report types. These fields are not case-sensitive and will match any names beginning with the characters you type (much like the Cardholder form searches). For example, typing “smith” for Last Name will match “Smith”, “SMITHY”, “smithereen”, etc.
Enter the cardholder’s last name.
revision 1
— 339
17: Reports Folder
Reports Folder - Anti-Passback Reports Form (Continued)
Form Element Comment
First Name
Badge ID
Enter the cardholder’s first name.
If you wish to report on the activity associated with a specific badge, enter the Badge ID here. This field is available only for applicable report types.
Report All
Report All /__ selected
If this button is pushed, all entries in the Area list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all areas will be included in the report.
Indicates “Report All” if no entries are selected in the Area field. Indicates “__ selected” if one or more entries are selected in the Area field.
Area listing window Lists all anti-passback areas defined on the system, and the access panel associated with each.
Clear
Preview
To select/deselect an area, click on the icon beside it. A checkmark on an icon indicates that the area is selected. Only data pertaining to selected areas will be included in the report.
However, if no entries are selected, data for all areas will be reported.
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Help Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
Anti-Passback Reports Form Procedures
Run an Anti-Passback Report
1. Select Reports from Administration View menu. The Reports folder opens.
2. Select the Anti-Passback Reports tab.
3. In the reports listing window, select the icon that corresponds to the report you wish to run.
4. Complete the Date/Time Filter section to specify a date/time interval for gathering data. Only data gathered during the specified period will be
340 —
revision 1
Alarm Monitoring User Guide
Note:
included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. In the Cardholder Filter section, enter the person’s Last Name, First
Name, and/or Badge ID if you want the report to contain data pertaining only to cardholders having the specified name or badge ID.
6. In the Area Filter section, select the icon(s) corresponding to the antipassback area(s) whose data you wish to include in the report. If you don’t select any areas, or click [Report All], data for all areas will be reported.
7. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
Date/Time Reports Form
Date/Time Reports Form Overview
This form allows you to add filtering criteria to a date/time report, so that you can narrow the results of your report.
revision 1
— 341
17: Reports Folder
Date/Time Reports Form Field Table
Reports Folder - Date/Time Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined date/time reports, and each report(s) type. Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
342 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Date/Time Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Badge ID
Text Field Filter
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
If you wish to report on the activity associated with a specific badge, enter the Badge ID here. This field is available only for applicable report types.
Includes the Where and Match criteria fields, as well as a Blank field. This section is enabled only when a report that allows filtering is selected in the listing window.
revision 1
— 343
17: Reports Folder
Reports Folder - Date/Time Reports Form (Continued)
Form Element
Where
Comment
You can now add a text filter to the following:
Match criteria (Set to
Contains by default.
May also be set to
Begins With, Ends
With, or Equals)
Blank field
• Action Type, Details, or Object for User Transactions reports
• Alarm Acknowledgment text for Alarm Acknowledgments reports
When this section is enabled, the Where field contains the attribute in B.A.S.I.S. that is to be filtered.
If enabled, the Match criteria drop-down list may be changed from its default value of contains to Begins With, Ends With, or Equals. This setting specifies how the selection in the Where field relates to the value entered to search for in the Blank field.
In this field, type the value you wish to filter or search for.
For example, if you wanted to display all User Transactions associated with System
Administration, you should:
1. Select a User Transaction Log report in the listing window.
2. In the Where field, select “Object”.
3. In the Match criteria field, select “Equals”.
4. In the blank field, type “System Administration” (without the quotes).
Click [Preview], and only those entries associated with System Administration will be displayed in the resulting report.
Clears all current filter criteria.
Displays the Print Report Options window.
Clear
Preview
Help
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
344 —
revision 1
Alarm Monitoring User Guide
Date/Time Reports Form Procedures
Run a Date/Time Report
1. Select Reports from Administration View menu. The Reports folder opens.
2. Select the Date/Time Reports tab.
3. In the reports listing window, select the icon that corresponds to the report you wish to run.
4. Complete the Date/Time Filter section to specify a date/time interval for gathering data. Only data gathered during the specified period will be included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. Enter a Badge ID if you want the report to contain data pertaining only to cardholders having the specified name or badge ID.
6. Complete the Text Field Filter section. (This section is optional, and is only enabled for User Transactions reports and Alarm Acknowledgment reports.) a. Select a value to filter in the Where field.
• If the report you are running is a User Transactions report and you wish to apply a filter, select Action Type, Details, or Object in the
Where field.
• If the report you are running is an Alarm Acknowledgment report and you wish to apply a filter, select Alarm Acknowledgment in the
Where field.
b. In the next drop-down list, select whether the filter criteria Begins
With, Contains, Ends With or Equals the value that you will enter in the next blank field.
c. In the blank field, type the value you wish to filter for.
7. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
Note:
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
revision 1
— 345
17: Reports Folder
Event Reports Form
Note:
On the Event Reports form, any report in the reports listing window that has
“Cardholder” listed in the Type(s) column is available on the Reports form in the Cardholders folder. This means that a report can be generated on the
Reports form in the Cardholders folder based on a cardholder search operation.
Event Reports Form Overview
This form allows you to add filtering criteria to an event report, so that you can narrow the results of your report.
346 —
revision 1
Alarm Monitoring User Guide
Event Reports Form Field Table
Reports Folder - Event Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined event reports, and each report’s type(s). Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
revision 1
— 347
17: Reports Folder
Reports Folder - Event Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year and use the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Report All (panels)
Report All /
__ selected
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
If this button is pushed, all entries in the Panel list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all access panels will be included in the report.
Indicates “Report All” if no entries are selected in the Panel field. Indicates “__ selected” if at least one entry is selected in the Panel field.
348 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Event Reports Form (Continued)
Form Element Comment
Panel listing window Lists all panels in the system. An icon that indicates the panel’s type precedes each entry.
Report All (events)
If your installation uses segmentation, the segment assignment is listed for each entry.
If this button is pushed, all entries in the Event list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all events for the selected Event Type will be included in the report.
Indicates “Report All” if no entries are selected in the Event field. Indicates “__ selected” if at least one entry is selected in the Event field.
Report All /
__ selected
Event Type Can be used to filter all events of a particular type. For example, if you select the “All Events
Over Time” report and select an Event Type of “Fire”, an “All Fire Events Over Time” report will effectively be created.
Event listing window Lists currently defined events for the selected Event Type, and each event’s type.
Clear
Preview
Help
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
revision 1
— 349
17: Reports Folder
Event Reports Form Procedures
Run an Event Report
1. Select Reports from the View menu. The Reports folder opens.
2. Select the Event Reports tab.
3. In the reports listing window, select the icon that corresponds to the report you wish to run.
4. Complete the Date/Time Filter section to specify a date/time interval for gathering data. Only data gathered during the specified period will be included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. In the Access Panel Filter section, select the icon(s) corresponding to the panel(s) whose data you wish to include in the report. If you don’t select any panels, or click [Report All], data for all panels will be reported.
6. In the Event Filter section, select an Event Type.
7. In the Event listing window, select the icon(s) corresponding to the event(s) whose data you wish to include in the report.
• If you select “<All>” in the Event Type field, data for all events will be reported.
• If you click [Report All], data for all events of the selected Event Type will be reported.
8. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
Note:
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
350 —
revision 1
Alarm Acknowledgment Reports Form
Alarm Monitoring User Guide
Alarm Acknowledgment Reports Form Overview
The Alarm Acknowledgment Reports form is designed to provide reports on acknowledged alarms. These reports can be filtered by the date/time the acknowledgment occurred, the device that triggered the alarm, and the operator who acknowledged the alarm. When you select a filter, the report displays alarm acknowledgments for only the filtered device. If you want to view everything, use the convenient [Report All] button.
The result of the report includes the following:
• Date and time this report was created
• Date and time the alarm occurred
• Date and time the alarm was acknowledged
• Who acknowledged the alarm
• Any notes included with the acknowledgment
• The device that caused the alarm
• The total number of acknowledgments
Notes:
The details column does not report who acknowledged the alarm, but rather who was logged into Alarm Monitoring when the alarm was acknowledged.
Therefore, someone other than the person logged into Alarm Monitoring may have acknowledged the alarm.
The first and last name displayed in the details column are configured in the
System Administration Users folder.
revision 1
— 351
17: Reports Folder
Alarm Acknowledgment Reports Form Field Table
Reports Folder - Alarm Acknowledgment Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined alarm acknowledgment reports, and each report’s type(s). Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
Start
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the displayed year to access the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start
time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
352 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Alarm Acknowledgment Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
End
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the last year for which data is to be included in this report. To change the year, click on the name of the year to access the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Report All
Filter by
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
Reports every alarm acknowledgment and does not apply any filter.
Select one device you want the report based on. The report displays the alarm acknowledgments only for the device you select.
revision 1
— 353
17: Reports Folder
Reports Folder - Alarm Acknowledgment Reports Form (Continued)
Form Element Comment
Filter listing window Select one or multiple filters for the report. The filters that display in this window depend on what you select in the Filter by drop-down list.
Clear
Preview
Help
The report displays the alarm acknowledgments for only the devices you select.
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
Alarm Acknowledgment Reports Form Procedures
Run an Alarm Acknowledgment Report
1. Select Reports from the View menu. The Reports folder opens.
2. Select the Alarm Acknowledgment Reports tab.
3. In the listing window, select the report you wish to run.
4. Complete the Date/Time Filter section to specify a date/time interval for gathering data. Only data gathered during the specified period will be included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. In the Filter by drop-down list, select the device whose data you wish to include in the report. If you don’t select any device, or if you click [Report
All], data for every device will be reported.
6. In the Filter listing window, select the device(s) whose data you wish to include in the report.
7. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
354 —
revision 1
Alarm Monitoring User Guide
Note:
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
revision 1
— 355
17: Reports Folder
Receiver Account Zone Reports Form
Receiver Account Zone Reports Form Overview
This form allows you to add filtering criteria to a receiver account zone report, so that you can narrow the results of your report.
356 —
revision 1
Alarm Monitoring User Guide
Receiver Account Zone Reports Form Field Table
Reports Folder - Receiver Account Zone Reports Form
Form Element
Listing window
Today
Start
Comment
Lists currently defined alarm acknowledgment reports, and each report’s type(s). Note that some reports are categorized under more than one type.
Click this button to:
• Set the Start time/date to 12:00:00 AM on the current date
• Set the End time/date to 11:59:59 PM on the current date
If you want to filter a report by a specific date, select the Start date check box and choose a specific start date from the drop-down calendar.
Start
• Select the first month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the displayed year to access the spin buttons .
• Once you have selected a month and a year, click on the first day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the Start
time check box and choosing a specific start time.
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
revision 1
— 357
17: Reports Folder
Reports Folder - Receiver Account Zone Reports Form (Continued)
Form Element
End
Comment
If you want to filter a report by a specific date, select the End date check box and choose a specific end date from the drop-down calendar.
End
• Select the last month for which data is to be included in this report. Use the and
navigation buttons to view different months. You can also click on the name of the month to access a drop-down list of every month.
• Select the first year for which data is to be included in this report. To change the year, click on the name of the displayed year to access the spin buttons .
• Once you have selected a month and a year, click on the last day for which data is to be included in this report. Note that the day circled in red indicates the current date.
• Select the time for which data is to be included in this report by selecting the End time check box and choosing a specific end time.
Apply start and end time to each day
Report All (account zones)
Report All/___ selected
Highlight the hour, minutes, or seconds by clicking on them. Use the spin buttons to increase or decrease their value. To change from AM to PM, highlight AM by clicking on it, and use the spin buttons.
If selected, the specified time range will be applied to any date that falls within the specified date range.
For example, if you specify a Date/Time Filter starting January 1, 1998 at 8:00 AM and ending March 31, 1998 at 7:00 PM:
• If this box is checked, the report will include only data collected during the hours of
8:00 AM through 7:00 PM, on any and all days between January 1 and March 31.
• If this box is not checked, the report will include all data gathered from 8:00 AM on
January 1 straight through until March 31 at 7:00 PM.
If this button is pushed, all entries in the Account Zone list are deselected. “Report All” is displayed to the left of this button, to indicate that data for all account zones will be included in the report.
Indicates “Report All” if no entries are selected in the Account Zone field. Indicates “__ selected” if at least one entry is selected in the Account Zone field.
358 —
revision 1
Alarm Monitoring User Guide
Reports Folder - Receiver Account Zone Reports Form (Continued)
Form Element
Account Zone listing window
Comment
Lists all account zones in the system. An icon that indicates the account zone’s type precedes each entry.
Clear
Preview
Help
If your installation uses segmentation, the segment assignment is listed for each entry.
Clears all current filter criteria.
Displays the Print Report Options window.
Displays the selected report with selected criteria in the Report Print Preview window.
Displays relevant on-screen help for this form.
Use restored records If this check box is selected, data for an event or user transaction report is obtained from restored events/transactions in the database, rather than from the current “live” events/ transactions.
Close
Restored events/transactions are those restored using the [Restore Archive] button on the
Restoring form of the Archives folder. For more information refer to the Archives Folder chapter in the System Administration User Guide.
Closes the Reports folder.
Receiver Account Zone Reports Form Procedures
Run a Receiver Account Zone Report
1. Select Reports from the View menu. The Reports folder opens.
2. Select the Receiver Account Zone Reports tab.
3. In the listing window, select the icon that corresponds to the report you wish to run.
4. Complete the Date/Time Filter section to specify a date/time interval for gathering data. Only data gathered during the specified period will be included in the report. To limit each date in the range to the specified time interval, select the Apply start and end time to each day check box.
5. In the Account Zone Filter section, select the icon(s) corresponding to the account zone(s) whose data you wish to include in the report. If you don’t select any account zones, or if you click [Report All], data for all account zones will be reported.
6. Click either the [Print] or [Preview] button depending on which function you
wish to perform. For more information, refer to Chapter 19: Report Print
revision 1
— 359
17: Reports Folder
Note:
Only data that’s currently in the database can be included in the report.
Events or other transactions deleted because of space limitations or elapsed time are no longer available.
360 —
revision 1
Alarm Monitoring User Guide
Chapter 18: Print Report Options Window
Toolbar Shortcut
From the Print Report Options window, you can:
• Choose a destination for the report. Choices include:
– Preview Window (the default)
– Direct Export to a File
– Directly to a Printer
• Update the subtitle used for the report
This window is displayed by clicking the [Print] button on the Reports form or the Print toolbar button while a report is displayed.
revision 1
— 361
18: Print Report Options Window
Print Report Options Window
362 —
revision 1
Alarm Monitoring User Guide
Print Report Options Window Field Table
Print Report Options Window
Form Element
Print Destination
Print to a Preview
Window
Export Directly to a File
Print Directly to a
Printer
Printer drop-down list
Prompt for
Number of Pages
Comment
Includes the Print to a Preview Window, Export Directly to a File and Print Directly to a
Printer radio buttons. Also includes the Printer drop-down list and the Prompt for Number
of Pages check box.
If selected, the Report Print Preview window will be displayed when the [OK] button is clicked. In the Report Print Preview window, you can view the selected report on the screen.
For more information, refer to Chapter 19: Report Print Preview Window
If selected, the Export window will be displayed when the [OK] button is clicked. Choose the report Format and Destination from the drop-down lists.
Depending on what you choose, enter the destination and format information in the corresponding window, then click [OK].
If selected, also select a printer from the Printer drop-down list.
If you select the Prompt for Number of Pages check box, the Print window will be displayed where you can select the print range, number of copies and whether or not to collate your report.
Select a printer in this field for the report to be printed on. This field is enabled for selection only when the Print Directly to a Printer radio button is selected.
All printers currently configured for use are listed.
This field is enabled for selection only when the Print Directly to a Printer radio button is selected.
Report Subtitle
Report Subtitle textbox
OK
Cancel
Help
If selected, the Print window will be displayed where you can select the print range, number of copies and whether or not to collate your report.
Includes the Report Subtitle textbox.
Type the text here that will be displayed as the subtitle on the report.
Prints the report using the options you selected.
Closes the Print Report Options window without printing the report.
Displays online help for this form.
Print a Report
1. Select a report from within the Reports folder. Reports are also available in the Cardholders folder (Reports form) and the Assets folder (Reports form).
You can use this procedure to print those reports as well.
revision 1
— 363
18: Print Report Options Window
Toolbar Shortcut
Notes:
The report form is available from within the Reports folder, Cardholders folder and Assets folder for System Administration and ID CredentialCenter.
The report form is only available from the Cardholders folder in Alarm
Monitoring. (View menu > Badge Info > Reports form/tab).
The availability of the Reports folder is subject to licensing restrictions.
2. Select additional criteria if you want the report to include only a specific range of data.
3. Click one of the following:
• The Print button on the Main toolbar
• [Print] button on the form
4. The Print Report Options window opens.
364 —
revision 1
Note:
5. In the Print Destination section, select whether to print to a preview window, export directly to a file or print directly to a printer.
6. If you selected Print Directly to a Printer in the Print Destination section, select a printer in the drop-down list and choose whether to Prompt for
Number of Pages.
If the Linkage Server is running under a local system account it may not have permission to access a network printer (depending on its configuration). If this is the case you must select a local or default network printer. Contact your System Administrator to determine what account the
Linkage Server is running under and the printers it can access.
7. In the Report Subtitle section, type the report subtitle. The subtitle will be displayed below the report title on the report.
8. Click [OK]. The options selected in the Print Destination section will determine where the report is sent.
Alarm Monitoring User Guide
Chapter 19: Report Print Preview Window
Toolbar Shortcut
Toolbar Shortcut
If you click [Preview] or [Print Preview] while a report form is displayed, the report is automatically printed to the Report Print Preview window.
Previewing a report is done in a window. This allows you to preview multiple reports at the same time. It also means that while the report is processing, you can do other work. From the Report Print Preview window, you can:
• View an on-screen report created in the Reports folder.
• View an on-screen report created in the Cardholders folder (Reports form),
The Visits folder (Reports form) or the Assets folder (Reports form) via the
Print Report Options window.
• Print a report, save it to a file or send it over electronic mail.
• Search for any textual information in the report.
This window is displayed by:
• Clicking on the [Print Preview] button on any form in the Reports folder.
• Clicking on the Print Preview toolbar button when a report is selected on a form in the Reports folder.
• Clicking [Print] on the form, selecting the Print to a Preview Window radio button on the Print Report Options window, then clicking the [OK] button.
(This is how the Report Print Preview form can be viewed from the Reports form in the Cardholders folder, the Visits folder or the Assets folder.)
revision 1
— 365
19: Report Print Preview Window
Report Print Preview Window
366 —
revision 1
Alarm Monitoring User Guide
Report Print Preview Window Field Table
Report Print Preview Window
Form Element
Report navigation tree
Preview window
Comment
The display in the left portion of the Report Print Preview window. The report navigation tree lists the records contained in the report, in a hierarchical arrangement.
The information is content-sensitive. The report type determines the entries in the tree.
For example, the default “User Transaction Log” report is arranged in date order, so the tree will contain a list of dates. The tree for the default “Text Instructions” report lists alarms. The
“Access and Denials, by Reader” report has an entry for each queried reader, with subentries by event date.
If the tree has branching entries, you can expand the branches of the tree. When you click an entry in the tree, you move to that section or record in the report. When a section or record is selected via the report navigation tree, that section or record will appear in the preview
window with a blue box border.
For more information, refer to Preview and Print a
The display in the right portion of the Report Print Preview window. The preview window displays up to one full page of the report, depending upon the zoom level set. If a report appears too large for the current window, either adjust the zoom level or use the up, down, left, and right arrow keys to scroll and see the rest of that page of the report.
For reports that contain more than one page, use the arrows or the <Page Up>/<Page Down> keys to navigate through the pages.
Click to displays a Print window from where you can select the page range and number of copies to print, then initiate report printing.
Click to export the report to a file or to your organization’s electronic mail system.
Click to toggle the display of the report navigation tree on or off.
Zoom
Page count
From this drop-down list, you can select the magnification level of the preview window contents, with respect to the actual size. Choices include 400%, 300%, 200%, 150%, 100%,
75%, 50%, 25%, Page Width and Whole Page. Selecting either Page Width or Whole Page displays the corresponding percentage in this field.
You can also type a number directly into this field, but you must then either press <Tab> or click outside of the field for the number to take effect.
Click to move to the first page of the report.
Click to move to the previous page of the report. Another way to do this is to click the <Page
Up> key.
This display indicates the page number of the currently displayed page, followed by the total page count for the report. For example: “2 of 4.”
Click to move to the next page of the report. Another way to do this is to click the <Page
Down> key.
revision 1
— 367
19: Report Print Preview Window
Report Print Preview Window (Continued)
Form Element Comment
Click to move to the last page of the report.
Click to terminate the report building process. This button is especially useful if the report is lengthy and you want to view only part of it.
Click to display the Search window from where you can perform a text search of the report.
When you enter text in the Find what field (in the Search window) and click [Find Next], the view jumps to the first occurrence of the requested text or a message is displayed if no match was found.
Report Print Preview Window Right-click Options
While viewing a report in the Report Print Preview Window there are a number of right-click options and identifiers that appear depending on what section of the report is highlighted.
• Field: Tells you what field is currently selected.
• Text: Tells you whether the current selection is text.
• Copy: Copy the information into the clipboard.
• Freeze Pane: Freezes the section of the pane so you continue to see the information as you scroll.
• Unfreeze Pane: Unfreezes the pane so the page scrolls normally
Report Print Preview Window Procedures
Preview and Print a Report
1. Select a report from within the Reports folder.
Note:
Reports are also available on the Reports form in the Cardholders folder,
Visits folder and Assets folder. However, the Print Preview toolbar button and the [Preview] button on the form are disabled or “grayed out.” Instead, the Print toolbar button or the [Print] button on the form are used to preview
and print reports from these forms. For more information, refer to Print a
2. Select additional criteria if you want the report to include only a specific range of data.
3. Click one of the following:
368 —
revision 1
Toolbar Shortcut
Alarm Monitoring User Guide
• The Print Preview button on the Main toolbar.
• The [Print] button, select the Print to a Preview Window radio button and then click [OK].
• The [Preview] button on the form.
4. If the chosen report has been password-protected, type the correct password when prompted to do so, then click [OK].
5. The Report Print Preview window is displayed.
• On the left, the report navigation tree may have branching entries.
– If the tree has branching entries, expand that branch of the tree.
– Click an entry in the tree to move to that section or record in the report. When a section or record is selected via the report navigation tree, that section or record will appear in the preview window with a blue box border. For example:
• On the right, the preview window will show the first page of the report as it will look when it is printed. Click a section or record in the preview window. When a section or record is selected in the preview window, that section or record will appear in the preview window with a blue box border.
• Click and drag the split bar to resize the report navigation tree and the preview window relative to each other.
• Click the button to hide the report navigation tree and maximize the space used for the preview window.
6. Use the , , and buttons or the <Page Down>/<Page Up> keys to view other pages of the report.
7. Select an option from the zoom drop-down list to change the size of the display. You can instead type a number directly into this field, but you must then either press <Tab> or click outside of the field for the number to take
revision 1
— 369
19: Report Print Preview Window
effect. If a report page is still too large for the window, you can use the up, down, left, and right arrow keys to scroll and see the rest of the page.
8. To save the report to a file on your computer or to send the report to someone using your company’s electronic mail system, select the
Export window is displayed.
button. The
• Select the format that you want to send the report in from the Format drop-down list.
• In t to an application, a disk file, an exchange folder, a Lotus Notes database or your electronic mail system (if you have one).
• Click [OK] and follow the instructions
9. To print the report from within the Report Print Preview window: a. Click the button. The Print window is displayed from where you can select which pages to print and the number of copies.
b. Select one of the following:
• The All radio button to print the entire report without user intervention.
• The Pages radio button and enter a page range.
c. A message box will be displayed to indicate the status of the print operation.
Search a Report for Specific Information
Note:
1. To search through the report for specific information, click the button.
2. The Search window is displayed. In the Find what field, type the word, contiguous words or number you wish to locate in the report.
The search is not case-sensitive.
3. Click [Find Next].
4. One of two things will happen:
• If the requested information was found, the preview window display will move to the first occurrence of it.
• If the information is not contained in the report, a message box will be displayed.
5. If the requested information was found, click [Find Next] to move through successive occurrences of it.
370 —
revision 1
Alarm Monitoring User Guide
Chapter 20: Guard Tour
Checkpoints are designated stops along a tour.
A late event means the checkpoint was reached after its maximum time expired. An overdue event means the checkpoint has not yet been reached.
Note:
Guard tour provides a guard (a cardholder who has been specifically chosen to conduct a tour) with a defined set of tasks that must be performed within a specified period of time. Typical tasks include swiping a card at a checkpoint access reader or turning a key connected to an alarm panel input.
Guard tour records the location and timestamp for each checkpoint visited by the tour guard. The Checkpoint Time represents the time it should take to reach a particular checkpoint. All checkpoints have minimum and maximum checkpoint times. A guard tour event is generated if a checkpoint is missed, reached early, on time, late, out of sequence or overdue.
A tour is considered complete when one of the following actions occurs:
• All of the checkpoints on the tour are reached, even if they are reached out of sequence or some checkpoints are missed
• The tour is acknowledged as complete at a monitoring station
• The tour is terminated at a monitoring station
System Administrator procedures to set up a Guard Tour are located in the
Guard Tour Folder chapter in the System Administration User Guide.
revision 1
— 371
20: Guard Tour
Start Guard Tour Form
Button
Select Tour listing window
Select Guard
Function
Displays a list of configured Guard Tours. Click a tour to select it. A checkmark displays beside a tour when it is selected.
Displays a list of guards. Select a guard to perform the Guard Tour. The list of Guards can be filtered by selecting the show guards with proper security clearance level radio button.
Limits the guards displayed in the Select guard listing to the guards with authorization to perform the selected guard tour.
Show guards with proper security clearance level
Show all guards
Enter badge ID
Manually
Tour Instructions
Displays all the guards in the Select guard listing.
Provides you the option to enter the badge ID of the guard instead of selecting a guard from the
Select guard list.
Displays the Tour Instructions window which contains specific instructions for the selected tour. From the Tour Instructions window you can print the instructions.
372 —
revision 1
Guard Tour Live Tracking Form
Alarm Monitoring User Guide
Button
Terminate
Force Complete
View Instructions
Add Tour Note
Show Video
Function
Stops a tour before it is completed (before all of the checkpoints have been reached). When this button is selected, a “Guard Tour Terminated” event is generated.
Manually completes a tour. For example, the [Force Complete] button could be used to end a tour that otherwise could not be completed because of a card that could not be swiped at a reader (a checkpoint) that was in “unlocked” mode.
Displays special instructions that were written for this tour when it was configured in the
System Administration application.
Adds a note to an event. For example, you can add a note explaining why a particular checkpoint was reached late.
Displays live video of the tour as it progresses. (This button is displayed only when the tour is configured to show video.
Guard Tour Events Table
Event
Guard Tour
Initiated
Guard Tour
Completed
Description
Generated when a tour is launched from a monitoring station.
Generated when all checkpoints on a tour have a “Checkpoint Reached on Time” status.
Otherwise, a “Guard Tour Completed with Errors” event is generated.
revision 1
— 373
20: Guard Tour
Guard Tour Events Table
Event
Guard Tour
Completed with
Errors
Guard Tour
Cancelled
Guard Tour
Terminated
Checkpoint reached out of
Sequence
Checkpoint
Missed
Checkpoint
Reached on Time
Description
Generated when the last checkpoint has been reached but one or more checkpoints were not reached on time or were missed altogether.
Generated when the scheduled automatic guard tour is cancelled before the tour was started.
Generated when the [Terminate] button is selected in the Guard Tour Live Tracking window.
Generated when a checkpoint is hit ahead of schedule on a tour (i.e., it is supposed to be hit later in a tour).
When a checkpoint is assigned a status of “Checkpoint reached out of sequence”, the
“Checkpoint Missed” event is generated for all previous checkpoints that have a status of
“Checkpoint Not Reached.”
Generated when a checkpoint is hit between its minimum and maximum checkpoint times.
Checkpoint
Reached Early
Note:
Checkpoint reached events are:
• Generated for readers in all modes except “locked” and “unlocked” on Apollo panels.
• Generated when any inputs that are used as checkpoints are activated.
Generated when a checkpoint is the next checkpoint on a tour and is hit before its minimum checkpoint time has elapsed.
Checkpoint
Overdue
Checkpoint
Reached Late
Note:
Checkpoint reached events are:
• Generated for readers in all modes except “locked” and “unlocked” on Apollo panels.
• Generated when any inputs that are used as checkpoints are activated.
Generated when a checkpoint’s maximum checkpoint time has elapsed and the guard has not yet arrived.
Generated for a checkpoint when its maximum checkpoint time has elapsed and it is then hit.
Note:
Checkpoint reached events are:
• Generated for readers in all modes except “locked” and “unlocked” on Apollo panels.
• Generated when any inputs that are used as checkpoints are activated.
Readers on Apollo panels in “locked” and “unlocked” modes will not report cardholder events. Therefore, although those readers may be included within a guard tour, the status of those checkpoints will not be updated within the live tracing of the tour. Furthermore, since the status of a checkpoint reader in the “locked” or “unlocked” mode cannot be updated, tours containing such checkpoints will generate a “Completed With Errors with Errors” event when finished.
Guard Tour Form Procedures
The following procedures in this section are:
374 —
revision 1
Alarm Monitoring User Guide
•
•
Schedule an Automatic Guard Tour Action
•
Respond to an Automatic Guard Tour
•
Launch a Guard Tour
1. Start the Linkage Server by clicking the Start button, then selecting
Programs > B.A.S.I.S. ET690 > Linkage Server.
2. Open the Select Guard Tour window by completing one of the following:
• From t
Toolbar Shortcut
• Click the down arrow on the Guard Tour toolbar button and select
Launch Tour.
• Right-click a tour name in the system status tree and select Launch
Tour.
3. Select a tour in the Tour listing window.
Note:
You can click [Tour Instructions] to see if any special instructions exist for this tour. These instructions are written when the tour is configured in
System Administration.
Note:
4. If you know the badge ID of the tour guard, select the Enter badge ID
manually radio button and type in their ID.
Otherwise select the Select guard radio button and complete the following: a. Select the Show guards with proper security clearance level radio button to limit the number of tour guards to choose from or select the
Show all guards radio button to list all tour guards, regardless of their security clearance levels.
b. Click a tour guard entry in the Name listing window to select it.
5. Click [OK]. The Guard Tour Live Tracking window opens.
6. At this time, the tour guard can begin the tour. As the tour progresses, the status of checkpoints and generated events display in the Guard Tour Live
Tracking window. For more information, refer to Guard Tour Events Table on page 373.
Checkpoints can be predecessors or successors. A predecessor checkpoint is any checkpoint occurring before other checkpoints on a tour. For example: a tour has three stops. Checkpoints one and two are the predecessors to checkpoint three. A successor checkpoint is any checkpoint occurring after other checkpoints on a tour. For example: a tour has three stops. Checkpoints two and three are successors to checkpoint one.
7. When a tour is completed, the Guard Tour Live Tracking window displays the status of the tour and the events that were generated.
revision 1
— 375
20: Guard Tour
Schedule an Automatic Guard Tour Action
Assuming your System Administrator has configured a Guard Tour (in System
Administration) you can schedule an automatic guard tour action (in Alarm
Monitoring). This means that using the Scheduler you can set B.A.S.I.S. to automatically launch a Guard Tour on at a specific date and time as well as on a regular basis.
1. Open the Scheduler by clicking the Scheduler toolbar button or selecting
Scheduler from View menu.
2. Click [Add].
3. The Add Action Wizard window displays. In the Category pane select
Action Types. In the Objects pane select Automatic Guard Tour.
4. Click [Next].
5. The Automatic Guard Tour Properties window displays. Select a tour or tour group.
6. Select the Monitoring stations to be notified.
7. Click the Schedule tab.
8. Select the World time zone.
9. If the automatic Guard Tour is a single occurrence select the One time radio button and set the start date and time.
10. If the automatic Guard Tour will occur several times click the Recurring radio button and click [Change].
a. Set how often you want the Guard Tour to occur and the start and end dates. b. Click [OK].
c. The frequency settings display in the in the Recurring pane on the schedule tab.
11. Click [OK].
376 —
revision 1
Alarm Monitoring User Guide
Respond to an Automatic Guard Tour
1. When an automatic Guard Tour is started, Alarm Monitoring displays a
Scheduler Action Executed
alarm and you prompts you to start the Guard
Tour.
2. Click [OK].
3. The Start Guard Tour window displays with the guard tour name selected.
Select the guard (person) to complete the tour by either selecting the guard from the list provided or entering the guard’s badge ID.
4. Click [OK].
5. While the Guard Tour is active you can monitor the Guard Tour status by selecting Control > Guard Tour > View from the main menu.
6. The Guard Tour Live Tracking window display information such as the badge ID of the person performing the Guard Tour, the checkpoint statuses, tour history as well as the ability to view instructions and video.
View a Guard Tour
1. Start the Linkage Server by clicking the Start button, then selecting
Programs > B.A.S.I.S. ET690 > Linkage Server.
2. Open the Select Guard Tour window by completing one of the following:
• From t
• Click the down arrow on the Guard Tour toolbar button and select
Launch Tour.
3. The View Guard Tour window opens. Select the tour and click [OK].
revision 1
— 377
20: Guard Tour
Checkpoint Status and Events Diagram
Guard Tour completed/
Guard Tour cancelled/
Guard Tour terminated/ successor hit first
Guard Tour initiated
Checkpoint not reached
Checkpoint hit before minimum time
Checkpoint
Missed
Guard Tour completed/
Guard Tour cancelled/
Guard Tour terminated/ successor hit first
Checkpoint maximum time expired
Checkpoint hit before predecessor
Checkpoint
Reached
Early
Checkpoint hit between minimum time and maximum time
Checkpoint
Reached out of
Sequence
Checkpoint
Overdue
Checkpoint
Reached on
Time
Checkpoint hit
Checkpoint
Reached
Late
378 —
revision 1
Alarm Monitoring User Guide
Chapter 21: Scheduler Folder
Note:
The Scheduler folder contains the Scheduler form with which you can schedule actions.
Additional documentation on actions is available in the Actions appendix.
For more information, refer to Appendix A: Actions on page 393.
Toolbar Shortcut
This folder is displayed by selecting Scheduler from the View menu.
Important:
For the Scheduler to run and execute action the Linkage Server needs to be configured and running. You can configure the Linkage Server host on the
General System Options Form in System Administration.
revision 1
— 379
21: Scheduler Folder
Scheduler Form
Scheduler Folder - Scheduler Form
Form Element
Service status
Host name
Current time in
Listing window
Add
Modify
Delete
Help
Close
Comment
Lists the status of the LS Linkage Server host and whether it’s running or not. This is displayed only when the LS Linkage Server host is configured.
Lists the name of the host computer. This is displayed only when the Linkage Server host is configured.
When scheduling an action, select which time zone you want the action to be scheduled in.
The selections in the drop-down list are listed sequentially and each includes:
• The world time zone’s clock time relative to Greenwich Mean Time. For example,
(GMT+05:00) indicates that the clock time in the selected world time zone is 5 hours ahead of the clock time in Greenwich, England.
• The name of one or more countries or cities that are located in that world time zone.
Displays a list of all scheduled actions.
Click this button to open the Add Action Wizard.
Click this button to modify the selected scheduled action.
Click this button to delete the selected scheduled action.
Click this button to display online assistance for this form.
Click this button to close the Scheduler folder.
380 —
revision 1
Alarm Monitoring User Guide
Scheduler Form Procedures
Add and Schedule an Action
1. Select Scheduler from the View menu. The Scheduler folder opens.
2. Click [Add]. The Add Action Wizard opens.
Note:
You can also display the Add Action Wizard by right-clicking anywhere on the Scheduler form and selecting the Add Action menu option.
3. Select either “Action Types” or “Action Group Library” from the Category listing window.
• When “Action Types” is selected, the Objects listing window lists all available action types.
• When “Action Group Library” is selected, the Objects listing window lists all action groups which have been either created in or saved to the
revision 1
— 381
21: Scheduler Folder
action group library. For more information refer to the Action Group
Library Folder chapter in the System Administration User Guide.
4. Click on an entry in the Objects listing window to select it.
5. Click [Next]. Depending on which Category/Object combination you chose
, a corresponding action properties window will open.
For example, if you selected “Action Types” in the Category listing window and “Archive/Purge Database” in the Objects listing window, then the
Archive/Purge Database Properties window would open.
6. Click the Schedule tab. The Schedule form is displayed.
The Schedule form is the same in every action properties window that is accessed via the Scheduler folder.
7. From the World time zone drop-down list, select which time zone you want the action to be scheduled in. The selections in the drop-down list are listed sequentially and each includes:
• The world time zone’s clock time relative to Greenwich Mean Time. For example, (GMT+05:00) indicates that the clock time in the selected
382 —
revision 1
Alarm Monitoring User Guide
world time zone is 5 hours ahead of the clock time in Greenwich,
England.
• The name of one or more countries or cities that are located in that world time zone.
8. If you want to schedule the action to occur more than once, skip this step and proceed to step
9 . If you want to schedule the action to occur once:
a. Select the One time radio button.
b. In the On date field, the current date is entered by default, but you can change this value by typing a numeric date into the field or by selecting a date from the drop-down calendar.
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it.
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the action to occur.
c. In the At time field, select the time when you want this action to occur.
.
9. If you want to schedule the action to occur more than once: a. Select the Recurring radio button.
b. Click [Change]. The Edit Recurring Action Schedule window opens.
revision 1
— 383
21: Scheduler Folder
384 —
revision 1
c. Do one of the following:
• Select the Daily radio button in the Occurs section if you want the action to occur on a daily basis.
If you want the action to occur every day, in the Daily section, type the number 1 in the Every___day(s) field. If you want the action to occur every other day, type the number 2 and so on.
• Select the Weekly radio button in the Occurs section if you want the action to occur on a weekly basis.
If you want the action to occur every week, in the Weekly section, type the number 1 in the Every___week(s) on field. If you want the action to occur every other week, type the number 2 and so on. You must also select the check box that corresponds with the day of the week that you want the action to occur.
For example, if you want the action to occur every other Monday, type the number 2 in the Every___week(s) on field and select the
Mon check box.
• Select the Monthly radio button in the Occurs section if you want the action to occur on a monthly basis. Then, do one of the following:
Select the Day___of every___month(s) radio button and type in which day of how many months you want the action to occur.
The following example shows an action being scheduled to occur on the 4th day of every 6th month.
Select the The___of every___month(s) radio button and enter which day of how many months you want the action to occur.
Alarm Monitoring User Guide
The following example shows an action being scheduled to occur of the 2nd Tuesday of every 3rd month.
d. In the Daily frequency section, do one of the following:
• If you want the action to occur only once on its scheduled day(s), select the Occurs once at___ radio button and enter a time.
The following example shows an action being scheduled to occur at
12:00 PM.
• If you want the action to occur more than once on its scheduled day(s), select the Occurs every___Starting at___Ending at___ radio button and enter the hours that you want the action to occur.
revision 1
— 385
21: Scheduler Folder
The following example shows an action being scheduled to occur every 2 hours, starting at 9:00 AM and ending at 5:00 PM.
e. Enter the action’s Start date. The current date is entered by default, but you can change this value by typing a numeric date into the field or by selecting a date from the drop-down calendar.
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it.
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the action to begin occurring.
f. Enter the action’s End date. The current date is entered by default, but you can change this value by typing a numeric date into the field or by selecting a date from the drop-down calendar.
386 —
revision 1
• To select a month, click on the and navigation buttons.
• You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it.
Alarm Monitoring User Guide
Note:
• Navigate to a year by clicking on the displayed year to access the year spin buttons .
• Once you have selected a month and a year, click on the day that you want the action to stop occurring.
You do not have to select an end date. If you do not want to set an end date, select the No end date radio button.
g. Click [OK].
10. Now you must configure the action that you have just scheduled. Select the tab to the left of the Schedule tab (this tab will correspond to the specific
Display the Scheduler Right-Click Menu
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
Note:
If you right-click anywhere on the Scheduler form when a scheduled action is not selected in the listing window, the scheduler right-click menu will look like this:
revision 1
— 387
21: Scheduler Folder
Add and Schedule an Action Using the Scheduler Right-
Click Menu
1. Right-click anywhere on the Scheduler form. The scheduler right-click menu is displayed.
2. Select the Add Action menu option. The Add Action Wizard opens.
3. Proceed to step 3 of the “Add and Schedule an Action” procedure in this
chapter.
Start an Action
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the Start Action menu option to start the selected action immediately.
Stop an Action
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the Stop Action menu option to stop the selected action immediately.
View Action History
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the View Action History menu option. The Action History window opens and the name of the action, when the action was run, the result, the application and any errors or messages that resulted from the action are all displayed.
388 —
revision 1
Alarm Monitoring User Guide
View the Current Status of an Action
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the View Current Status menu option. A message similar to the following will be displayed:
Refresh an Action
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the Refresh Action menu option. The listing window will be updated to display the most current information for the selected action.
Refresh all Actions
1. Right-click anywhere on the Scheduler form except on a scheduled action in the listing window. The scheduler right-click menu is displayed.
2. Select the Refresh All Actions menu option. The listing window will be updated to display the most current information for all of the scheduled actions.
Delete a Scheduled Action using the Scheduler Right-
Click Menu
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the Delete Action menu option. A confirmation message is displayed.
3. Click [Yes].
Note:
Selecting the Delete Action right-click menu option does the same thing as selecting an action in the listing window, and then clicking [Delete] on the
Scheduler form.
revision 1
— 389
21: Scheduler Folder
Modify a Scheduled Action using the Scheduler Right-
Click Menu
1. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed.
2. Select the Modify Action menu option. Depending on which action you selected in the listing window, a corresponding action properties window will open.
3. Make the changes you want to the fields. For more information, refer to
Appendix A: Actions on page 393.
4. Click [OK].
Note:
Selecting the Modify Action right-click menu option does the same thing as selecting an action in the listing window, then clicking the [Modify] button on the Scheduler form.
390 —
revision 1
Appendices
Alarm Monitoring User Guide
Appendix A: Actions
Important:
Actions can be added (configured) through the Action Group Library, Scheduler,
Guard Tour, Acknowledgment Actions, or Global I/O folders in System
Administration. Actions can also be added through the Scheduler in Alarm
Monitoring.
If you add an action through the Scheduler or Guard Tour folder, you can also schedule the action to execute routinely or once. To manually execute an action you can right-click a device in Alarm Monitoring > System Status window.
This appendix describes how to add (configure) an action to your B.A.S.I.S. system.
For the Scheduler to be able to execute actions the Linkage Server must be configured and running. You can configure the Linkage Server host on the
General System Options form in the System Options folder in System
Administration or ID CredentialCenter.
General Actions Procedures
Specify the Number of Simultaneous Actions
Occasional problems may occur when running a large number of actions at once.
B.A.S.I.S. defaults the limit of simultaneous actions to fifty but that can be changed in the ACS.INI file.
To change the ACS.INI file to override the default limit on simultaneous actions:
1. Click the Start button, then select Run.
2. In the Run dialog box type:
ACS.INI
3. In the ACS.INI file find the [Service] section and add the line:
“MaxNumberActionThreads=<Number of actions>” without the quotes and where the “Number of actions” equals the number of simultaneous actions you want to occur.
Open an Action Properties Window
Refer to the following procedures to open an action properties window through various folders in System Administration and Alarm Monitoring.
revision 1
— 393
A: Actions
Toolbar Shortcut
Using Action Group Library
Note:
The Action Group Library folder can be used to group actions. To schedule a group of actions or configure a group of actions based on incoming events, guard tour related conditions, or acknowledged alarms, you can use the action type called “Action group” which is available using the Scheduler,
1. In System Administration, select Action Group Library from the
Administration menu.
2. Click [Add].
3. The Action Group Properties window is displayed.
4. Enter an action group name and click [Add].
5. The Select Action Type window opens. Select the appropriate action and click [Next]. The Action Properties window opens.
Using the Scheduler
The Scheduler folder can be used to configure actions to occur on a schedule
(reoccurring or one time only). For more information, refer to Chapter 21:
1. In System Administration, select Scheduler from the Administration menu. In Alarm Monitoring, click the Scheduler toolbar button.
2. Click [Add]. The Add Action Wizard window displays.
3. In the Category listing window, select “Action Types” and in the Objects listing window, select the appropriate action.
4. Click [Next]. The Action Properties window opens.
394 —
revision 1
Alarm Monitoring User Guide
Using Global I/O
The Global I/O folder can be used to configure actions to occur based on an incoming event. For more information, refer to the Global I/O Folder chapter in the System Administration User Guide.
1. In System Administration, select Global I/O from the Access Control menu.
2. Select a global linkage.
3. Click [Modify].
4. On the Output Action tab, click [Add].
5. The Add Action Wizard window displays. In the Category listing window, select “Action Types” and in the Objects listing window, select the appropriate action.
6. Click [Next]. The Action Properties window opens.
Using Guard Tour
The Guard Tour folder can be used to configure actions to occur under certain conditions related to a guard tour. For more information, refer to the Guard Tour
Folder chapter in the System Administration User Guide.
1. In System Administration, select Guard Tour from the Monitoring menu.
You cannot configure an action using the Guard Tour option available in
Alarm Monitoring.
2. On the Tours tab, highlight a tour.
3. Click [Modify].
4. The Tour Wizard window opens. Select (place a checkmark beside) an ID/ hardware device.
5. Click [Next].
6. Click [Add].
7. The Add Action Wizard window displays. In the Category listing window, select “Action Types” and in the Objects listing window, select the appropriate action.
8. Click [Next]. The Action Properties window opens.
revision 1
— 395
A: Actions
Using Acknowledgment Actions
The Acknowledgment Actions folder can be used to configure actions to occur when an alarm is acknowledged. For more information, refer to the Alarm
Configuration Folder chapter in the System Administration User Guide.
1. In System Administration, select Alarms from the Monitoring menu.
2. Click the Acknowledgment Actions tab.
3. Select (place a checkmark beside) an alarm.
4. Click [Modify].
5. In the Actions section, click [Add].
6. The Add Action Wizard window displays. In the Category listing window, select “Action Types” and in the Objects listing window, select the appropriate action.
7. Click [Next]. The Action Properties window opens.
396 —
revision 1
Alarm Monitoring User Guide
Action Group Properties Window
The Action Group Properties action executes multiple actions simultaneously.
You can display the Action Group Properties window using the Scheduler, Guard
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 397
A: Actions
Action Group Properties Window Field Table
Form Element
Description
Action Group
Library
Comment
When adding or modifying an action group, you can enter a description of the action group that is being configured.
When selected, the action group that you are adding or modifying will be available for selection in the Action Group Library. For more information, refer to “Action Groups
Overview” in the Action Group Library Folder chapter in the System Administration User
Guide.
Displays the action types which have been assigned to the selected action group.
Action Type listing window
Add
Modify
Delete
OK
Cancel
Help
Click this button to add an action type.
Click this button to modify the action type that is selected in the Action Type listing window.
Click this button to delete the action type that is selected in the Action Type listing window from the selected action group.
Click this button to save your changes and exit out of the Action Group Properties window.
Click this button to exit the Action Group Properties window without saving your changes.
Click this button to display online help for this window.
Action Group Properties Window Procedures
Add an Action Group
1. Open the Action Group Properties window using the Scheduler, Guard Tour,
Acknowledgment Actions, or Global I/O. For more information, refer to
Open an Action Properties Window on page 393.
2. In the Description field, enter a description of the action group that is being configured.
3. Select the Action Group Library check box if you want this action group to be available for selection in the Action Group Library. For more information, refer to the Action Group Library Folder chapter in the System
Administration User Guide.
4. Click [Add]. The Select Action Type window opens.
5. Select an action type and then click [Next]. Depending on which action type you chose, a corresponding action properties window will open.
6. Configure the action type you selected in step 5 . To do this, you must refer to
the action properties windows sections in this chapter for information on each action properties window.
for each action type you want to assign to this group.
8. Click [OK].
398 —
revision 1
Alarm Monitoring User Guide
Action History/Guard Tour Event Purging Properties
Window
The Action History/Guard Tour Event Purging action allows you to create an action that will automatically delete certain records after they are a specified number of days old. For example, you can have all Guard Tour History record types deleted when they are 180 days old.
You can display the Action History/Guard Tour Event Purging Properties
Note:
In segmented systems, the Action History/Guard Tour Event Purging action must be applied to all segments.
Action History/Guard Tour Event Purging Properties Window
Form Element
Number of Days
Action History
Guard Tour
History
OK
Cancel
Comment
The history records older than the number of days selected will be permanently deleted when the action runs.
Select this check box if you want Action History records deleted that are older than the
Number of days setting.
Select this check box if you want Guard Tour History records deleted that are older than the
Number of days setting.
Click this button to add the action and exit out of the Action History/Guard Tour Event
Purging Properties window.
Click this button to exit the Action History/Guard Tour Event Purging Properties window without adding the action.
revision 1
— 399
A: Actions
Action History/Guard Tour Event Purging Properties Window
Form Element
Help
Comment
Click this button to display online help for this window.
Action History/Guard Tour Event Purging Properties
Window Procedures
Add an Action History/Guard Tour Event Purging Action
1. Open the Action History/Guard Tour Event Purging Properties window
using the Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Enter how old (number of days) records can be before they are purged.
3. Choose the type of records you want to delete.
4. Click [OK]. This action is now configured to archive/purge the database using your current archive/purge configurations.
400 —
revision 1
Alarm Monitoring User Guide
Archive/Purge Database Properties Window
You can display the Archive/Purge Database Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
Note:
In segmented systems, the Archive/Purge Database Properties action must be applied to all segments.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 401
A: Actions
Archive/Purge Database Properties Window Field Table
Form Element
Listing window
OK
Cancel
Help
Comment
Displays the following message:
“<This action will archive/purge the database using current archive/purge configuration>”
Click this button to add the action and exit out of the Archive/Purge Database Properties window.
Click this button to exit the Archive/Purge Database Properties window without adding the action.
Click this button to display online help for this window.
Archive/Purge Database Properties Window Procedures
Add an Archive/Purge Database Action
1. Open the Archive/Purge Database Properties window using the Scheduler.
For more information, refer to Open an Action Properties Window on page 393.
2. Click [OK]. This action is now configured to archive/purge the database using your current archive/purge configurations. For more information, refer to the Archives Folder chapter in the System Administration User Guide.
402 —
revision 1
Alarm Monitoring User Guide
Arm/Disarm Area Properties Window
You can display the Arm/Disarm Area Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 403
A: Actions
Arm/Disarm Area Properties Window Field Table
Form Element
Listing window
Arm
Arm
Comment
Lists currently enabled intrusion areas. Intrusion areas are configured on the Areas form in the
Intrusion Detection Configuration folder.
When configuring an area as an action, select this radio button if you want the action to be that the area will be armed. When an area is armed, protection for this area is “turned on.” Alarms will be reported within the area (the zones within the area will report alarms when activated).
For example, consider a home burglar system that has sensors on the windows and doors and motion detectors inside. When the owner leaves the home, they arm the system. Alarms will be reported if those windows/doors are opened or if motion is detected.
You must also select an option from the drop-down list. The following terms will help you choose an option.
Instant arm
- some intrusion panels support the notion of both delay arm and instant arm. With instant arm, the area is armed immediately.
Interior
and Perimeter- in higher end intrusion panels, there is the concept of an interior and a perimeter of an area. Various zones within the area are associated with either the interior or the perimeter. Zones that might be associated with the interior are motion detectors placed in the hallways of an office building. Zones that might be associated with the perimeter are sensors on external windows and doors.
Master arm
- when an area is master armed, the entire area is armed. This includes both the perimeter and the interior.
Perimeter arm
- when an area is perimeter armed, only the perimeter is armed. This means that those zones associated with the interior will continue to generate alarms, but those associated with the perimeter will not. This type of arming may be used when an authorized person is inside a building at off hours. They don’t want the interior armed and reporting alarms since they will be moving throughout the interior. However, if somebody else breaches the perimeter of the building (forces open a door, breaks a window, etc.), alarms will be reported. (continued
on next page
)
Partial arm -
arms only those zones that have been configured for partial arming. All other zones in the area will not be armed.
404 —
revision 1
Alarm Monitoring User Guide
Form Element
Arm (continued)
Disarm
OK
Cancel
Help
Comment
For Detection Systems intrusion detection panel types, choices include:
• Arm Entire Partition - arms both the interior and perimeter of the area.
• Perimeter Arm - arms the perimeter of the area.
For Bosch intrusion detection panel types, choices include:
• Master Arm Delay - master (both perimeter and interior) arm (with exit and entry delays) the area.
• Master Arm Instant - master (both perimeter and interior) arms (no delays) the area.
• Perimeter Delay Arm - delay arms all perimeter points in the area.
• Perimeter Instant Arm - instantly arms all perimeter points (no delays) in the area.
For Galaxy intrusion detection panel types, choices include:
• Arm Entire Partition - arms both the interior and perimeter of the area.
• Partial Arm - arms only those zones that have been configured for partial arming. All other zones in the area will not be armed.
When configuring an area as an action, select this radio button if you want the action to be that the area will be disarmed. When an area is disarmed, protection for this area is “turned off.”
Alarms will not be reported within the area.
For example, consider a home burglar system that has sensors on the windows and doors and motion detectors inside. When the owner arrives home, he/she disarms the system so that alarms won’t be reported as they walk around the house.
Click this button to add the action and exit out of the Arm/Disarm Area Properties window.
Click this button to exit the Arm/Disarm Area Properties window without adding the action.
Click this button to display online help for this window.
revision 1
— 405
A: Actions
Arm/Disarm Area Properties Window Procedures
Add an Arm/Disarm Area Action
1. Open the Arm/Disarm Area Properties window using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. From the listing window, click on an entry to select it.
3. Do one of the following:
• Select the Arm radio button if you want the action to be that the area will be armed. You must also select an option from the drop-down list.
• Select the Disarm radio button if you want the action to be that the area will be disarmed.
Important:
Refer to the Arm/Disarm Area Properties Window Field Table table on page
404 for detailed information on arming and disarming areas.
4. Click [OK].
406 —
revision 1
Alarm Monitoring User Guide
Automatic Guard Tour Properties Window
You can display the Automatic Guard Tour Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
Note:
If you have accessed the Automatic Guard Tour Properties window via the
Scheduler form, the window will contain both the Automatic Guard Tour form and the Scheduler form.
revision 1
— 407
A: Actions
Automatic Guard Tour Properties Window Field Table
Form Element
Tour/Tour Group listing window
Single tour
Randomly select tour from group
Monitoring Station listing window
Add
Remove
OK
Cancel
Help
Comment
Displays a list of the tours and tour groups which have been configured in the system. Tours and tour groups are configured in the Guard Tour folder.
Select this radio button if you want to configure an automatic guard tour for a single tour.
When selected, only single tours will be listed in the Tour/Tour Group listing window.
Select this radio button if you want to configure an automatic guard tour that will be randomly selected from a tour group. When selected, only tours groups that are configured as random tour lists will be listed in the Tour/Tour Group listing window. Tour groups are configured on the Tour Groups form of the Guard Tour folder. A tour group is considered a random tour list when the Random Tour List check box is selected on the Tour Groups form.
Displays a list of the monitoring stations which are assigned to the selected tour. These monitoring stations will be notified when the automatic guard tour is scheduled to begin.
Click this button to display the Select Monitoring Station window and add a monitoring station to the Monitoring Station listing window.
Click this button to remove the selected monitoring station from the Monitoring Station listing window.
Click this button to add the action and exit out of the Automatic Guard Tour Properties window.
Click this button to exit the Automatic Guard Tour Properties window without adding the action.
Click this button to display online help for this window.
Automatic Guard Tour Properties Window Procedures
Add an Automatic Guard Tour Action
1. Open the Automatic Guard Tour Properties window using the Action Group
Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Do one of the following:
• Select the Single Tour radio button if you want to configure an automatic guard tour for a single tour. When selected, only single tours will be listed in the Tour/Tour Group listing window.
• Select the Randomly select tour from group radio button if you want to configure an automatic guard tour that will be randomly selected from a tour group. When selected, only tours groups that are configured
408 —
revision 1
Alarm Monitoring User Guide
Note:
as random tour lists will be listed in the Tour/Tour Group listing window.
3. The monitoring stations that have been assigned to the selected tour or tour group will be displayed in the Monitoring Station listing window. Do one of the following:
• If no monitoring stations have been assigned or if you want to assign an additional monitoring station, then click [Add]. The Select Monitoring
Station window opens.
• If you do not want to assign a monitoring station, proceed to step
.
4. Click on a monitoring station to select it.
5. Click [OK]. The monitoring station you selected will be listing in the
Monitoring Station listing window. All monitoring stations in the
Monitoring Station listing window will, in the Alarm Monitoring application, receive a notification message when the tour is scheduled to begin.
for each monitoring station you want to add.
If you want to remove a monitoring station from the Monitoring Station listing window, click on an entry to select it and then click [Remove].
Note:
7. Click [OK].
If you have accessed the Automatic Guard Tour Properties window via the
Scheduler folder or the Scheduler form in the Guard Tour folder, the window will contain both the Automatic Guard Tour form and the Schedule form.
For more information, refer to Chapter 21: Scheduler Folder on page 379.
revision 1
— 409
A: Actions
Change Network Video Password Properties Window
The Change Network Video Password action allows you to schedule automatic password changes for video recorders. You can make the change a one-time event or to schedule it daily, weekly, or monthly with the Edit Recurring Action
Schedule. For more information, refer to Chapter 21: Scheduler Folder on page 379.
You can display the Change Network Video Password Properties window using the Action Group Library, Scheduler, or Global I/O. Only the Scheduler will let
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Change Network Video Password Properties Window Field Table
Form Element
Description
Listing Window
Comment
Names the video device you are currently changing the password for.
Lists currently defined LNVR recorders and cameras associated with them.
Select the recorders and/or cameras you want to modify.
410 —
revision 1
Alarm Monitoring User Guide
Change Network Video Password Properties Window Field Table
Form Element
Current User
Comment
The name of the user account.
This field automatically populates if a user name was initially populated on the Video
Recorder/Camera forms.
Enter the password in the text box. The following restrictions apply: Reset to this password
• Axis cameras allow up to 10 character passwords using A through Z, a through z, 0 - 9, !,
#' - ', -, ., ^, _, ~, $
• Sony cameras allow up to 16 character passwords using A through Z, a through z, 0 - 9
• LNVR recorder password length is limited by the LNVR’s computer password policy, which is set by the system administrator. Valid characters are ! - ~
Note:
In addition to these restrictions, B.A.S.I.S. includes strong password enforcement, which checks the user’s password against password standards.
For more information, refer to Chapter 1: Introduction
Confirm password Enter the password a second time for verification.
OK Adds the action and exits out of the Change Network Video Properties window.
Cancel
Help
Exits the Change Network Video Password Properties window without adding the action.
Displays online help for this window.
Change Network Video Password Properties Window
Procedures
Change the Network Video Password
1. Open the Change Network Video Password Properties window using the
Action Group Library or Global I/O. For more information, refer to Open an
Action Properties Window on page 393.
2. On the Change Network Video Password tab, enter the new password and confirm the password by typing it again.
3. Click [OK].
revision 1
— 411
A: Actions
Schedule a One-Time Password Change
1. Open the Change Network Video Password Properties window using the
Scheduler. For more information, refer to Open an Action Properties
2. On the Change Network Video Password tab, enter the new password and confirm the password by typing it again.
3. On the Schedule tab, select the One time radio button.
4. Select the date and time you wish the password to change.
5. Click [OK].
Schedule a Recurring Password Change
1. Open the Change Network Video Password Properties window using the
Scheduler. For more information, refer to Open an Action Properties
2. On the Change Network Video Password tab, enter the new password and confirm the password by typing it again
3. On the Schedule sub-tab, select the Recurring radio button.
4. Click [Change]. The Edit Recurring Action Schedule form displays.
5. Choose the time and date intervals that best suit your needs.
6. Click [OK] on the Edit Recurring Action Schedule form.
7. Click [OK] on the Change Network Video Password Properties window.
412 —
revision 1
Alarm Monitoring User Guide
Deactivate Badge Properties Window
The Deactivate Badge action allows you to deactivate a cardholder’s badge when it is either lost or returned.
Note:
In segmented systems, the Action History/Guard Tour Event Purging action must be applied to all segments.
Deactivate Badge Properties Window Field Table
Form Element
Badge Status
OK
Cancel
Help
Comment
Use to select the status of a badge that will be deactivated. Choices are Lost and Returned.
Click this button to add the action and exit out of the Deactivate Badge Properties window.
Click this button to exit the Deactivate Badge Properties window without adding the action.
Click this button to display online help for this window.
revision 1
— 413
A: Actions
Deactivate Badge Properties Window Procedures
Add a Deactivate Badge Action
Note:
In order to execute the action, Global I/O should have a linkage configured on a device, event, and badge ID that is passed to the action at runtime.
2. Click [Add].
3. Click the Output Action sub-tab.
4. Click [Add]. The Add Action Wizard window opens.
5. Select “Deactivate Badge” from the Objects listing window.
6. Click [Next]. The Deactivate Badge Properties window appears.
7. Choose the type of badge you want to deactivate.
8. Click [OK].
9. Click [OK] again.
414 —
revision 1
Alarm Monitoring User Guide
Device Output Properties Window
You can display the Device Output Properties window using Action Group
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Form Element
Output listing window
Activate
Deactivate
Pulse
Comment
Displays a list of available device outputs which have been configured in the system.
When configuring a device output as an action, select this from the drop-down menu if you want the action to be that the device output will activate. When a device output is activated, that means it is in an “on” state.
When configuring a device output as an action, select this from the drop-down menu if you want the action to be that the device output will deactivate. When a device output is deactivated, that means it is in an “off” state.
When configuring a device output as an action, select this from the drop-down menu if you want the action to be that the device output will pulse (turn on and then turn off again).
revision 1
— 415
A: Actions
Form Element
Toggle
OK
Cancel
Help
Comment
When configuring a device output as an action, select this from the drop-down menu if you want to toggle the state of the relay. For example, if the relay is on (activated), toggling deactivates it. If the relay is off (deactivated), toggling activates it.
Note:
Only offboard relays on the Bosch (7412 and 9412) intrusion panels support the toggle option.
Click this button to add the action and exit out of the Device Output Properties window.
Click this button to exit the Device Output Properties window without adding the action.
Click this button to display online help for this window.
Device Output Properties Window Procedures
Add a Device Output Action
1. Open the Device Output Properties window using the Action Group Library,
2. Select (place a checkmark beside) an entry in the Output listing window.
3. Do one of the following:
• Select Activate from the drop-down menu
if you want this action to be that the device output will activate. When a device output is activated, that means it is in an “on” state.
• Select Deactivate from the drop-down menu
if you want this action to be that the device output will deactivate. When a device output is deactivated, that means it is in an “off’ state.
• Select Pulse from the drop-down menu
if you want this action to be that the device output will pulse (turn on and then turn off again).
• Select Toggle from the drop-down menu
in you want this action to be that the device output will toggle the state of the relay. For example, if the relay is on (activated), toggling deactivates it. If the relay is off
(deactivated), toggling activates it.
Note:
Only offboard relays on the Bosch (7412 and 9412) intrusion panels support the toggle option.
4. Click [OK].
416 —
revision 1
Alarm Monitoring User Guide
Device Output Group Properties Window
You can display the Device Output Group Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 417
A: Actions
Device Output Group Properties Window Field Table
Form Element
Output Device
Group listing window
Activate
Comment
Displays a list of available output device groups which have been configured in the system.
Deactivate
Pulse
OK
Cancel
Help
When configuring an output device group as an action, select this radio button if you want the action to be that the device outputs in the group will activate. When device outputs are activated, that means they are in an “on” state.
When configuring an output device group as an action, select this radio button if you want the action to be that the device outputs in the group will deactivate. When device outputs are deactivated, that means they are in an “off” state.
When configuring an output device group as an action, select this radio button if you want the action to be that the device outputs in the group will pulse (they will turn on and then turn off again).
Click this button to add the action and exit out of the Device Output Group Properties window.
Click this button to exit the Device Output Group Properties window without adding the action.
Click this button to display online help for this window.
Device Output Group Properties Window Procedures
Add a Device Output Group Action
1. Open the Device Output Group Properties window, using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) a group in the Output Device Group listing window.
3. Do one of the following:
• Select the Activate radio button if you want this action to be that the device outputs in the group will activate. When device outputs are activated, that means they are in an “on” state.
• Select the Deactivate radio button if you want this action to be that the device outputs in the group will deactivate. When device outputs are deactivated, that means they are in an “off’ state.
• Select the Pulse radio button if you want this action to be that the device outputs in the group will pulse (they will turn on and then turn off again).
4. Click [OK].
418 —
revision 1
Alarm Monitoring User Guide
Download Network Video Firmware Properties Window
The Download Network Video Firmware action type allows users to select multiple network video devices and automatically upgrade their firmware when the action is executed. Network video devices are LNVR recorders and IP cameras assigned to LNVR recorders.
To configure this action type, the Accessory Add-On for Network Video
Firmware Remote Upgrades must be installed on the same server as the Linkage
Server. The add-on can be found on the Supplemental Materials disc. Users need the System Permissions Groups > Video Hardware > Cameras Modify permission to use this feature.
This feature requires one of the following:
• The authenticated account specified in the LNVR connection properties is a member of the Administrators group, which by default has remote and local launch permissions enabled in the machine-wide limits.
• The authenticated account specified in the LNVR connection properties is left blank, and the Linkage Server is run under an account with
Administrator privileges on the LNVR.
The Download Network Video Firmware action type is available from the
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 419
A: Actions
Form Element
Description
Listing window
The System
Account
Comment
A distinctive name for the type of network video firmware download action. If one video device is selected in the listing window, this field automatically populates. If multiple devices are selected, enter a distinctive name.
Displays network video devices as well as the current firmware version and upgrade that is available.
Note:
Devices must be online when you configure the action and when the action executes.
Note:
If multiple upgrades are scheduled at the same time, the firmware will download to each LNVR consecutively.
Select this radio button if you want recorder services to run under the system account after the upgrade.
This User
User
This radio button applies to LNVR only.
Select this radio button if you want recorder services to run under a specific user account after the upgrade.
This radio button applies to LNVR only.
Enter the user name for the specific user account. Typically the account you choose here is the same as the one selected during the original network video device installation. However, you can select a different account.
Password
This radio button applies to LNVR only.
Enter the password for the specific user account.
This radio button applies to LNVR only.
Confirm password Retype the password.
OK
Cancel
Help
Adds the action and exits out of the Download Network Video Firmware Properties window.
Exits the Download Network Video Firmware Properties window without adding the action.
Displays online help for this window.
LNVR and Camera Requirements
During the action configuration, only network video devices that meet the following criteria are available for selection:
• The device is online.
• The device is an LNVR recorder or a network camera assigned to an LNVR recorder.
• The LNVR to be upgraded is version 2.0 or higher.
• The IP camera to be upgraded is connected to an LNVR recorder with version 2.0 or higher.
• Upgrades are supported for the following IP cameras: Axis 2100, 2120,
2130, 2400, 2401, 2411, and 2420.
420 —
revision 1
Alarm Monitoring User Guide
• The network video device has an upgrade available and the upgrade is installed properly on the Linkage Server machine.
• The current version of the network video device is eligible for an upgrade.
Multiple upgrades can co-exist for the same device. This allows older versions to be upgraded in multiple steps. Each step is considered an upgrade.
Download Network Video Firmware Properties
Window Procedures
When you download network video firmware you are essentially upgrading the device. In order to execute a device upgrade, the upgrade has to be made available in B.A.S.I.S. and then the action must be configured.
Make an Upgrade Available in B.A.S.I.S.
Stanley distributes upgrades for network video devices as they become available.
Complete the following steps to make an upgrade available in your B.A.S.I.S. system.
1. Shut down System Administration, Alarm Monitoring, Communication
Server, and Linkage Server on the machine running the Linkage Server.
2. Run the Lenel Network Video Firmware Remote Upgrades.msi file on the Linkage Server computer.
3. Restart the applications closed in step 1 .
Camera Upgrade Limitations
Some camera types support more than one camera model. In B.A.S.I.S., different models may be treated the same. For example, the Axis 2400, Axis 2400+, and
2400+Blade models are configured in B.A.S.I.S. as Axis 2400 camera types.
However, different camera models require different firmware upgrades. With this in mind, only the first model listed in the text file will be upgraded when the action is executed, regardless of how many models are listed. To upgrade a different model, change the order in which that model appears in the file, by making it the first element under the corresponding <NV> tag.
For example, if the first entry listed was an Axis 2400, only the Axis 2400 camera model upgrade will occur, even if there are additional Axis 2400+ and
2400+Blade camera models listed. If a user accidentally selects a 2400+ or
2400+ Blade camera model during configuration, the upgrade will fail at action execution time because of the order the models are listed in the text file.
To upgrade an Axis 2400+, change the text file such that it is the first element under the corresponding <NV> tag. The text file should look like this:
<Upgrades>
<NV Name= “Axis 2400”>
<Model Name= “Axis 2400+ Video Server”>
revision 1
— 421
A: Actions
<Upgrade min=“3.01” ver=“3.13”>Upgrades\Axis2400+\3.13</Upgrade>
</Model>
<Model Name= “Axis 2400 Video Server”>
<Upgrade min=“2.20” ver=“2.34”>Upgrades\Axis2400\2.34</Upgrade>
</Model>
<Model Name= “Axis 2400+ Blade Video Server”>
<Upgrade min=“3.11” ver=“3.13”>Upgrades\Axis2400+Blade\3.13</Upgrade>
</Model>
</NV>
</Upgrades>
Add a Download Network Video Firmware Action
The Download Network Video Firmware action is available from the Scheduler only.
1. Open the Download Network Video Firmware Properties window using the
Scheduler. For more information, refer to Open an Action Properties
2. Select (place a checkmark beside) the network video device in the listing window.
Note:
Only devices that meet the network video device requirements will display.
For more information, refer to LNVR and Camera Requirements on page 420.
Note:
3. If there is more than one LNVR to upgrade, enter a name for the download network video firmware action or use the pre-populated name provided.
If multiple upgrades are scheduled at the same time, the firmware will download to each LNVR consecutively.
4. For LNVR only: a. Select the account the recorder services will run under after the upgrade.
Choices include The System Account radio button and This User radio button.
b. If you selected This User radio button, enter the user name and password. Re-enter the password.
5. Click [OK].
422 —
revision 1
Alarm Monitoring User Guide
Elevator Terminal Allowed Floors Properties Window
You can display the Elevator Terminal Allowed Floors Properties window using the Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Elevator Terminal Allowed Floors Properties Window Field Table
Form Element
Allowed Floors
Floors
Comment
Allowed floors are floors that can be accessed via the elevator terminal without supplying security credentials. Your options include:
• All Floors Always - the elevator is allowed to all floors no matter the security credentials presented.
• No Floors - The elevator is allowed to no floors without security credentials being presented.
Lists the floors the elevator is capable of traveling to.
revision 1
— 423
A: Actions
Elevator Terminal Allowed Floors Properties Window
Procedures
Add an Elevator Terminal Allowed Floors Action
1. Open the Elevator Terminal Allowed Floors Properties window using the
Action Group Library or Scheduler. For more information, refer to Open an
Action Properties Window on page 393.
2. Select an elevator terminal in the listing window.
3. Select an option in the Allowed Floors drop-down box.
4. Click [OK].
Elevator Terminal Mode Properties Window
You can display the Elevator Terminal Mode Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
424 —
revision 1
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Alarm Monitoring User Guide
Elevator Terminal Mode Properties Window Field Table
Form Element
Elevator Terminal
Mode listing window
Mode
Comment
Lists the current elevator terminals and elevator controllers.
Refers to operational modes which dictate how the terminal interacts with the cardholder.
Choose from:
• Access to Authorized Floors
• Default Floor Only
• Default Floor or User Entry of Destination Floor
• User Entry of Destination Floor
Elevator Terminal Mode Properties Window Procedures
Add an Elevator Terminal Mode Action
1. Open the Elevator Terminal Mode Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Select an elevator terminal in the listing window.
3. Select an option in the Mode drop-down box.
4. Click [OK].
revision 1
— 425
A: Actions
Execute Function List Properties Window
You can display the Execute Function List Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
426 —
revision 1
Alarm Monitoring User Guide
Execute Function List Properties Window Field Table
Form Element
Function List listing window
Execute: True
Comment
Displays a list of available function lists which have been configured in the system.
Execute: False
Execute: Pulse
OK
Cancel
Help
When configuring a function list as an action, select this radio button if you want the action to execute the function list with an argument of “True.”
When configuring a function list as an action, select this radio button if you want the action to execute the function list with an argument of “False.”
When configuring a function list an action, select this radio button if you want the action to execute the function list with an argument of “Pulse.”
Click this button to add the action and exit out of the Execute Function List Properties window.
Click this button to exit the Execute Function List Properties window without adding the action.
Click this button to display online help for this window.
Execute Function List Properties Window Procedures
Add an Execute Function List Action
1. Open the Execute Function List Properties window, using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) an entry in the Function List listing window.
3. Do one of the following:
• Select the Execute: True radio button if you want this action to execute the function list with an argument of “True.”
• Select the Execute: False radio button if you want this action to execute the function list with an argument of “False.”
• Select the Execute: Pulse radio button if you want this action to execute the function list with an argument of “Pulse.”
4. Click [OK].
revision 1
— 427
A: Actions
Generate Event Properties Window
You can display the Generate Event Properties window using the Action Group
Library or Scheduler. For more information, refer to Open an Action Properties
Generate Event Properties Window Field Table
Form Element
Event text
OK
Cancel
Help
Comment
Type your custom event text here. You must create your own event text for this event.
Click this button to add the action and exit out of the window.
Click this button to exit the window without adding the action.
Click this button to display online help for this window.
428 —
revision 1
Alarm Monitoring User Guide
Elevator Terminal Mode Properties Window Procedures
Add an Elevator Mode Action
1. Open the Elevator Terminal Mode Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Select an elevator terminal in the listing window.
3. Select an option in the Mode drop-down box.
4. Click [OK].
Global APB System/Segment Reset Properties Window
You can display the Global APB System/Segment Reset Properties window
using the Action Group Library or Scheduler. For more information, refer to
Open an Action Properties Window on page 393.
revision 1
— 429
A: Actions
Global APB System/Segment Reset Properties Window Field Table
Form Element
Description
Global APB
System/Segment listing window
OK
Comment
Displays a description of the selected global APB system/segment.
Displays a list of the segments available for this action.
Cancel
Help
Click this button to add the action and exit out of the Global APB System/Segment Reset
Properties window.
Click this button to exit the Global APB System/Segment Reset Properties window without adding the action.
Click this button to display online help for this window.
Global APB System/Segment Reset Properties Window
Procedures
Add a Global APB System/Segment Reset Action
Note:
Global APB must be configured on your system in order to add this action.
1. Open the Global APB System/Segment Reset Properties window, using the
Action Group Library or Scheduler. For more information, refer to Open an
Action Properties Window on page 393.
2. Select (place a checkmark beside) a segment from the Global APB System/
Segment listing window.
3. Click [OK]. If segmentation is enabled, this action will reset APB for the selected segment. If segmentation is not enabled, this action will reset APB for your entire system.
430 —
revision 1
Alarm Monitoring User Guide
ISC Database Download Properties Window
You can display the ISC Database Download Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 431
A: Actions
ISC Database Download Properties Window Field Table
Form Element
Description
Max number of panels to be downloaded at a time
Controller listing window
OK
Cancel
Help
Comment
Displays a description of the access panel which is selected in the Access Panel listing window.
Note:
This field only displays a description when one and only one access panel is selected.
When configuring a database download as an action, select the maximum number of access panels that can be downloaded at a time.
Displays a list of available controllers that have been configured in the system.
Click this button to add the action and exit out of the ISC Database Download Properties window.
Click this button to exit the ISC Database Download Properties window without adding the action.
Click this button to display online help for this window.
ISC Database Download Properties Window Procedures
Add an ISC Database Download Action
1. Open the ISC Database Download Properties window using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Select the max number of panels to be downloaded at a time.
3. From the Access Panel listing window, click on an entry to select it.
Note:
You can select multiple entries.
4. Click [OK].
432 —
revision 1
Alarm Monitoring User Guide
ISC Firmware Download Properties Window
You can display the ISC Firmware Download Properties window using the
Action Group Library or Scheduler. For more information, refer to Open an
Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 433
A: Actions
ISC Firmware Download Properties Window Field Table
Form Element
Description
Comment
Displays a description of the access panel which is selected in the Access Panel listing window.
Note:
This field only displays a description when one and only one access panel is selected.
When configuring a firmware download as an action, select the maximum number of access panels that can be downloaded at a time.
Max number of panels to be downloaded at a time
Controller listing window
OK
Cancel
Help
Displays a list of available controllers that have been configured in the system.
Click this button to add the action and exit out of the ISC Firmware Download Properties window.
Click this button to exit the ISC Firmware Download Properties window without adding the action.
Click this button to display online help for this window.
ISC Firmware Download Properties Window Procedures
Add an ISC Firmware Download Action
1. Open the ISC Firmware Download Properties window, using the Action
Group Library or Scheduler. For more information, refer to Open an Action
Properties Window on page 393.
2. Select the max number of panels to be downloaded at a time.
3. From the Access Panel listing window, click on an entry to select it.
Note:
You can select multiple entries.
4. Click [OK].
434 —
revision 1
Alarm Monitoring User Guide
Moving Badges for APB Areas Properties Window
You can display the Moving Badges for APB Areas Properties window using
Action Group Library, Scheduler, or Global I/O. For more information, refer to
Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Form Element Comment
From listing window
Displays a list of areas that are available for selection.
To listing window Displays a list of areas that are available for selection.
OK
Cancel
Help
Click this button to add the action and exit out of the Moving Badges for APB Areas
Properties window.
Click this button to exit the Moving Badges for APB Areas Properties window without adding the action.
Click this button to display online help for this window.
revision 1
— 435
A: Actions
Moving Badges for APB Areas Properties Window
Procedures
Add a Moving Badges for APB Areas Action
1. Open the Moving Badges for APB Areas Properties window using the
2. In the From listing window, select (place a checkmark beside) the area that you want to move badges from when this action is executed.
3. In the To listing window, select (place a checkmark beside) the area that you want to move badges to when this action is executed.
4. Click [OK].
436 —
revision 1
Alarm Monitoring User Guide
Muster Mode Initiation Properties Window
You can display the Muster Mode Initiation Properties window using the Global
I/O. For more information, refer to Open an Action Properties Window on page 393.
Form Element
Hazardous
Location listing window
OK
Cancel
Help
Comment
Displays a list of available hazardous locations that have been configured in the system.
Click this button to add the action and exit out of the Muster Mode Initiation Properties window.
Click this button to exit the Muster Mode Initiation Zone Properties window without adding the action.
Click this button to display online help for this window.
revision 1
— 437
A: Actions
Muster Mode Initiation Properties Window Procedures
Add a Muster Mode Initiation Action
2. From the listing window, click on an entry to select it.
3. Click [OK]. This action is now configured to initiate muster mode in the selected hazardous location. (Refer to the Areas folder chapter in this user guide for more information on mustering.)
438 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Alarm Input Properties Window
You can display the Mask/Unmask Alarm Input Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 439
A: Actions
Mask/Unmask Alarm Input Properties Window Field Table
Form Element
Alarm Input listing window
Mask
Unmask
OK
Cancel
Help
Comment
Displays a list of available alarm inputs which have been configured in the system.
When configuring a mask/unmask alarm input action, select this radio button if you want the alarm input to be masked. When alarm inputs are masked, they are not reported to the Alarm
Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask alarm input action, select this radio button if you want the alarm input to be unmasked. When alarm inputs are unmasked, they are reported to the Alarm
Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Alarm Input Properties window.
Click this button to exit the Mask/Unmask Alarm Input Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Alarm Input Properties Window
Procedures
Add a Mask/Unmask Alarm Input Action
1. Open the Mask/Unmask Alarm Input Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global
I/O. For more information, refer to Open an Action Properties Window on page 393.
2. From the Alarm Input listing window, click on an entry to select it.
3. Do one of the following:
• Select the Mask radio button if you want the alarm input to be masked.
When alarm inputs are masked, they are not reported to the Alarm
Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the alarm input to be unmasked. When alarm inputs are unmasked, they are reported to the
Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
440 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Alarm Input for Group Properties Window
You can display the Mask/Unmask Alarm Input for Group Properties window using the Action Group Library, Scheduler, Guard Tour, Acknowledgment
Actions, or Global I/O. For more information, refer to Open an Action Properties
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 441
A: Actions
Mask/Unmask Alarm Input for Group Properties Window Field Table
Form Element
Input Group listing window
Mask
Unmask
OK
Cancel
Help
Comment
Displays a list of available alarm input groups which have been configured in the system.
When configuring a mask/unmask alarm input for group action, select this radio button if you want the group of alarm inputs to be masked. When alarm input groups are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask alarm input for group action, select this radio button if you want the group of alarm inputs to be unmasked. When alarm input groups are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Alarm Input for Group
Properties window.
Click this button to exit the Mask/Unmask Alarm Input for Group Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Alarm Input for Group Properties Window
Procedures
Add a Mask/Unmask Alarm Input for Group Action
1. Open the Mask/Unmask Alarm Input for Group Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties
2. From the Input Group listing window, click on an entry to select it.
3. Do one of the following:
• Select the Mask radio button if you want the alarm inputs in the group to be masked. When alarm inputs are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the alarm inputs in the group to be unmasked. When alarm inputs are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
442 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Alarm Mask Group Properties Window
You can display the Mask/Unmask Alarm Mask for Group Properties window using the Action Group Library, Scheduler, Guard Tour, Acknowledgment
Actions, or Global I/O. For more information, refer to Open an Action Properties
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 443
A: Actions
Mask/Unmask Alarm Mask Group Properties Window Field Table
Form Element
Mask Group listing window
Mask
Comment
Displays a list of available alarm mask groups which have been configured in the system.
Unmask
OK
Cancel
Help
When configuring a mask/unmask alarm mask group action, select this radio button if you want the mask group to be masked. When alarms are masked, they are not reported to the
Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask alarm mask group action, select this radio button if you want the mask group to be unmasked. When alarms are unmasked, they are reported to the
Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Alarm Mask Group
Properties window.
Click this button to exit the Mask/Unmask Alarm Mask Group Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Alarm Mask Group Properties Window
Procedures
Add a Mask/Unmask Alarm Mask Group Action
1. Open the Mask/Unmask Alarm Mask for Group Properties window using the Action Group Library, Scheduler, Guard Tour, Acknowledgment
Actions, or Global I/O. For more information, refer to Open an Action
Properties Window on page 393.
2. Select (place a checkmark beside) and entry in the Mask Group listing window.
3. Do one of the following:
• Select the Mask radio button if you want the mask group to be masked.
When alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the mask group to be unmasked. When alarms are unmasked, they are reported to the Alarm
Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
444 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Door Properties Window
You can display the Mask/Unmask Door Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 445
A: Actions
Mask/Unmask Door Form Properties Window Table
Form Element
Reader/Controller listing window
Mask
Unmask
OK
Cancel
Help
Comment
Displays a list of readers that are available for selection and the controllers that are associated with each.
When configuring a mask/unmask door action, select this radio button if you want the action to be that the door is masked. When masked doors generate alarms, they are not reported to the
Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask door action, select this radio button if you want the action to be that the door is unmasked. When unmasked doors generate alarms, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Door Properties window.
Click this button to exit the Mask/Unmask Door Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Door Properties Window Procedures
Add a Mask/Unmask Door Action
1. You can display the Mask/Unmask Door Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties
2. Select (place a checkmark beside) and entry in the Reader/Controller listing window.
3. Do one of the following:
• Select the Mask radio button if you want the action to be that the door is masked. When masked doors generate alarms, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the action to be that the door is unmasked. When unmasked doors generate alarms, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
446 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Door Forced Open Properties Window
You can display the Mask/Unmask Door Forced Open Properties window using the Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 447
A: Actions
Mask/Unmask Door Forced Open Properties Window Field Table
Form Element
Reader/Controller listing window
Mask
Unmask
OK
Cancel
Help
Comment
Displays a list of available readers which have been configured in the system and the controllers that are associated with each.
When configuring a mask/unmask door forced open action, select this radio button if you want the door forced open alarm to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask door forced open action, select this radio button if you want the door forced open alarm to be unmasked. When door forced open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Door Forced Open
Properties window.
Click this button to exit the Mask/Unmask Door Forced Open Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Door Forced Open Properties Window
Procedures
Add a Mask/Unmask Door Forced Open Action
1. Open the Mask/Unmask Door Forced Open Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties
2. Select (place a checkmark beside) and entry in the Reader/Controller listing window.
3. Do one of the following:
• Select the Mask radio button if you want door forced open alarms for the selected reader to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the door forced open alarms for the selected reader to be unmasked. When door forced open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
448 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Door Forced Open for Reader Group
Properties Window
You can display the Mask/Unmask Door Forced Open for Reader Group
Properties window using the Action Group Library, Scheduler, Guard Tour,
Acknowledgment Actions, or Global I/O. For more information, refer to Open an
Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 449
A: Actions
Mask/Unmask Door Forced Open for Reader Group Field Table
Form Element
Reader Group listing window
Mask
Comment
Displays a list of available reader groups which have been configured in the system.
Unmask
OK
Cancel
Help
When configuring a mask/unmask door forced open for reader group action, select this radio button if you want the door forced open alarms to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask door forced open for reader group action, select this radio button if you want the door forced open alarms to be unmasked. When door forced open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Door Forced Open for
Reader Group Properties window.
Click this button to exit the Mask/Unmask Door Forced Open for Reader Group Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Door Forced Open for Reader Group
Properties Window Procedures
Add a Mask/Unmask Door Forced Open for Reader
Group Action
1. Open the Mask/Unmask Door Forced Open for Reader Group Properties window using the Action Group Library, Scheduler, Guard Tour,
Acknowledgment Actions, or Global I/O. For more information, refer to
Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) and entry in the Reader Group listing window.
3. Do one of the following:
• Select the Mask radio button if you want door forced open alarms for the selected reader group to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the door forced open alarms for the selected reader group to be unmasked. When door forced open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
450 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Door Held Open Properties Window
You can display the Mask/Unmask Door Held Open Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 451
A: Actions
Mask/Unmask Door Held Open Properties Window Field Table
Form Element
Reader/Controller listing window
Mask
Unmask
OK
Cancel
Help
Comment
Displays a list of available readers which have been configured in the system and the controllers that are associated with each.
When configuring a mask/unmask door held open action, select this radio button if you want the door held open alarm to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask door held open action, select this radio button if you want the door held open alarm to be unmasked. When door held open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Door Held Open
Properties window.
Click this button to exit the Mask/Unmask Door Held Open Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Door Held Open Properties Window
Procedures
Add a Mask/Unmask Door Held Open Action
1. Open the Mask/Unmask Door Held Open Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
Global I/O. For more information, refer to Open an Action Properties
2. Select (place a checkmark beside) and entry in the Reader/Controller listing window.
3. Do one of the following:
• Select the Mask radio button if you want door held open alarms for the selected reader to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the door held open alarms for the selected reader to be unmasked. When door held open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
452 —
revision 1
Alarm Monitoring User Guide
Mask/Unmask Door Held Open for Reader Group
Properties Window
You can display the Mask/Unmask Door Held Open for Reader Group Properties window using the Action Group Library, Scheduler, Guard Tour,
Acknowledgment Actions, or Global I/O. For more information, refer to Open an
Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 453
A: Actions
Mask/Unmask Door Held Open for Reader Group Field Table
Form Element
Reader Group listing window
Mask
Comment
Displays a list of available reader groups which have been configured in the system.
Unmask
OK
Cancel
Help
When configuring a mask/unmask door held open for reader group action, select this radio button if you want the door held open alarms to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
When configuring a mask/unmask door held open for reader group action, select this radio button if you want the door held open alarms to be unmasked. When door held open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
Click this button to add the action and exit out of the Mask/Unmask Door Held Open for
Reader Group Properties window.
Click this button to exit the Mask/Unmask Door Held Open for Reader Group Properties window without adding the action.
Click this button to display online help for this window.
Mask/Unmask Door Held Open for Reader Group
Properties Window Procedures
Add a Mask/Unmask Door Held Open for Reader Group
Action
1. Open the Mask/Unmask Door Held Open for Reader Group Properties window using the Action Group Library, Scheduler, Guard Tour,
Acknowledgment Actions, or Global I/O. For more information, refer to
Open an Action Properties Window on page 393.
2. From the Reader Group listing window, click on an entry to select it.
3. Do one of the following:
• Select the Mask radio button if you want door held open alarms for the selected reader group to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting.
• Select the Unmask radio button if you want the door held open alarms for the selected reader group to be unmasked. When door held open alarms are unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting.
4. Click [OK].
454 —
revision 1
Alarm Monitoring User Guide
Pulse Open Door Properties Window
You can display the Pulse Open Door Properties window using the Action Group
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 455
A: Actions
Pulse Open Door Properties Window Field Table
Form Element
Reader/controller listing window
OK
Cancel
Help
Comment
Displays a list of available readers which have been configured in the system and the controllers that are associated with each.
Click this button to add the action and exit out of the Pulse Open Door Properties window.
Click this button to exit the Pulse Open Door Properties window without adding the action.
Click this button to display online help for this window.
Pulse Open Door Properties Window Procedures
Add a Pulse Open Door Action
Note:
The open door commands will not be available for those using Schlage
Wireless Access readers, because those types of readers are not in constant communication with the PIM device. For more information, refer to “Action
Groups Overview” in the Action Group Library Folder chapter in the System
Administration User Guide.
1. Open the Pulse Open Door Properties window using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) and entry in the listing window.
3. Click [OK]. The pulse open door action (the door opens and then closes) is now configured for the selected reader.
456 —
revision 1
Alarm Monitoring User Guide
Pulse Open Door Group Properties Window
You can display the Pulse Open Door Group Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 457
A: Actions
Pulse Open Door Group Properties Window Field Table
Form Element
Reader Group listing window
OK
Comment
Displays a list of available readers groups which have been configured in the system.
Cancel
Help
Click this button to add the action and exit out of the Pulse Open Door Group Properties window.
Click this button to exit the Pulse Open Door Group Properties window without adding the action.
Click this button to display online help for this window.
Pulse Open Door Group Properties Window Procedures
Add a Pulse Open Door Group Action
1. Open the Pulse Open Door Group Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global
I/O. For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) and entry in the Reader Group listing window.
3. Click [OK]. The pulse open door group action (the doors open and then close) is now configured for the selected reader.
458 —
revision 1
Alarm Monitoring User Guide
Reader Mode Properties Window
You can display the Reader Mode Properties window using the Action Group
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 459
A: Actions
Reader Mode Form Properties Window Table
Form Element
Reader/Controller listing window
Reader Mode
Verify Mode
First Card Unlock
OK
Cancel
Help
Comment
Displays a list of available readers which have been configured in the system and the controllers that are associated with each.
When configuring a reader mode action, select a mode from this drop-down list. Choices include:
• Card nly O
• Facility Code Only
• Locked
• Card and Pin
• Pin r ard C
• Unlocked
• Default Reader Mode - Used to return a reader to its default online access mode.
When configuring a reader mode action for a reader on a Stanley controller that is a primary reader to an alternate biometric reader, you can select a verify mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader.
When configuring a reader mode action for a reader that is not a primary reader to an alternate biometric reader, this field is disabled.
Select this check box if you want the reader mode action to be that first card unlock mode is enabled.
Doors configured with first card unlock will not unlock until valid personnel arrives. For example, rather than setting a lobby door to unlock at 9:00 am, you can leave it in a secure mode (i.e., card only, card and pin, etc.) and set the first card unlock to 9:00 am. The first person that comes in the door after 9:00 am will have to present their card. Once access is granted, the reader mode will change to unlocked. This feature is useful for days like “snow days” when employees can’t make it to work on time.
Note:
If the reader is in “Facility code only” mode, the first card unlock feature does not work.
Click this button to add the action and exit out of the Reader Mode Properties window.
Click this button to exit the Reader Mode Properties window without adding the action.
Click this button to display online help for this window.
Reader Mode Properties Window Procedures
Add a Reader Mode Action
1. Open the Reader Mode Properties window using the Action Group Library,
2. Select (place a checkmark beside) an entry in the Reader/Controller listing
460 —
revision 1
Alarm Monitoring User Guide
window.
3. From the Reader Mode drop-down list, select a reader mode for the selected reader/controller.
4. When configuring a reader mode action for a reader on a Stanley controller that is a primary reader to an alternate biometric reader, you can select a
Verify Mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader.
5. Select the First Card Unlock check box if you want this reader mode action to enable first card unlock.
6. Click [OK].
revision 1
— 461
A: Actions
Reader Mode Group Properties Window
You can display the Reader Mode Group Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
462 —
revision 1
Alarm Monitoring User Guide
Reader Mode Group Properties Window Field Table
Form Element
Reader Device
Group listing window
Reader Mode
Comment
Displays a list of available reader groups which have been configured in the system.
Verify Mode
First Card Unlock
OK
Cancel
Help
When configuring a reader mode action, select a mode from this drop-down list. Choices include:
• Card nly O
• Facility Code Only
• Locked
• Card and Pin
• Pin r ard C
• Unlocked
• Default Reader Mode - Used to return a reader to its default online access mode.
When configuring a reader mode group action for a group of readers on a Stanley controller that are primary readers to alternate biometric readers, you can select a verify mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader.
When configuring a reader mode group action for readers that are not primary readers alternate biometric readers, this field is disabled.
Select this check box if you want the reader mode group action to be that first card unlock mode is enabled.
Doors configured with first card unlock will not unlock until valid personnel arrives. For example, rather than setting a lobby door to unlock at 9:00 am, you can leave it in a secure mode (i.e., card only, card and pin, etc.) and set the first card unlock to 9:00 am. The first person that comes in the door after 9:00 am will have to present their card. Once access is granted, the reader mode will change to unlocked. This feature is useful for days like “snow days” when employees can’t make it to work on time.
Note:
If the reader is in “Facility code only” mode, the first card unlock feature does not work.
Click this button to add the action and exit out of the Reader Mode Group Properties window.
Click this button to exit the Reader Mode Group Properties window without adding the action.
Click this button to display online help for this window.
Reader Mode Group Properties Window Procedures
Add a Reader Mode Group Action
1. Open the Reader Mode Group Properties window using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
revision 1
— 463
A: Actions
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) and entry in the Reader Device Group listing window.
3. From the Reader Mode drop-down list, select a reader mode for the selected reader group.
4. When configuring a reader mode group action for readers on a Stanley controller that are primary readers to alternate biometric readers, you can select a Verify Mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader.
5. Select the First Card Unlock check box if you want this reader mode group action to enable first card unlock.
6. Click [OK].
Reset Use Limit Properties Window
You can display the Reset Use Limit Properties window using the Action Group
464 —
revision 1
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Alarm Monitoring User Guide
Reset Use Limit Form Properties Window Table
Form Element
Description
Comment
When one controller is selected in the listing window, displays the text “Reset Use Limit:” followed by the controller name. For example, “Reset Use Limit: Front Door Bldg 1.”
When more than one controller is selected in the listing window, this field is activated. Type in a descriptive name to identify the selected group of controllers.
Displays a list of available controllers.
Controller listing window
OK
Cancel
Help
Click this button to add the reset use limit action for the selected controller(s) and exit out of the Reset Use Limit Properties window.
Note:
Each time a use-limited badge is used at a reader, the badge’s use limit is decremented for the associated controller. A cardholder’s use limit is specified on the Badge form of the Cardholders folder. Whenever the cardholder swipes their badge at a reader where use limits are enforced, the cardholder’s use limit is reduced by one (1). When the use count reaches zero (0), the cardholder is unable to access use limit-enforced card readers on that controller.
Click this button to exit the Reset Use Limit Properties window without adding the action.
Click this button to display online help for this window.
Reset Use Limit Properties Window Procedures
Add a Reset Use Limit Action
1. Open the Reset Use Limit Properties window using the Action Group
2. Select (place a checkmark beside) one or more controller from the listing window.
3. If you selected one controller from the listing window, skip this step. If you selected more than one controller from the listing window, type a descriptive name to identify the selected group of controllers in the Description field.
4. Click [OK].
revision 1
— 465
A: Actions
Run PTZ Tour Properties Window
The Run PTZ Tour action type allows the user to start or end a continuous background PTZ tour. To use this action, a PTZ Tour Server must be configured in System Administration and a PTZ tour must be created in Alarm Monitoring.
Background PTZ tours can be interrupted by a user with a higher priority or by the user that started the tour.
You can open the Run PTZ Tour Action window using Scheduler or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Form Element
Listing window
Start this tour
PTZ Tour Server
End the current tour
Comment
Displays all of the cameras assigned to an LNVR recorder.
To display only PTZ cameras, add the following line to the ACS.INI file in the
[DigitalVideo]
section:
TestForPTZOnStartUp=1
To begin a tour, select the radio button and choose a tour from the drop-down list.
Select the PTZ tour server that should run this tour.
Select this radio button to stop a tour that is currently running on the selected camera.
466 —
revision 1
Alarm Monitoring User Guide
Run PTZ Tour Properties Window Procedures
Add a Run PTZ Tour Action
1. Open the Run PTZ Tour Action window using the Scheduler or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) the camera from the listing window.
3. To start a tour: a. Select the Start this tour radio button and select the tour from the dropdown list.
b. Select the server to run the tour from the PTZ Tour Server drop-down list.
Note:
Separate actions must be added to start and to end a PTZ tour. To end a tour, select the End the current tour radio button.
4. Click [OK].
revision 1
— 467
A: Actions
Schedule Report
The Schedule Report action type allows the user to either print a report or send a report in an email.
You can open the Schedule Report action window using Scheduler or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Form Element Comment
Report listing window
Email report
Displays a list of available reports.
Select this radio button if you want the scheduled report to be sent in an email.
E-mail notification requires the GOS module to be configured and running. For more information, refer to the Global Output Devices Folder chapter in the System
Administration User Guide.
Enter the email address where the scheduled report is to be sent.
Email address
Send Report to printer
Use default printer
Select this radio button if you want the scheduled report to print.
Select this radio button if you want the scheduled report to print from the workstation’s default printer.
Select printer below Select this radio button and choose a printer from the drop-down list if you want the scheduled report to print to a printer other than the workstation’s default printer.
Note:
The choices in the drop-down list are printers that are available for the computer running the linkage server and not for the workstation that the action is being configured on.
468 —
revision 1
Alarm Monitoring User Guide
Form Element
If fails use default printer
Number or pages to generate
Comment
If you selected the Select printer below radio button, select this check box if you want to print from the default printer if the selected printer does not exist.
Note:
Due to a limitation of Crystal Reports this setting is not enforced if the printer exists but is not accessible under the linkage server account. When this occurs the report will automatically be printed from the default printer regardless of this setting.
For more information, refer to page 470.
Request Print Action Flowchart
When configuring a scheduled report action, you can enter the number of pages that you want the report to have. This can be helpful when only a small section of a large report is needed.
Schedule Report Properties Window Procedures
Add a Schedule Report Action
1. Open the Schedule Report Properties window using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select the report from the listing window.
3. Select whether the report is to be printed or sent in an email.
• If the report is being sent in an email, select the Email report radio button and add an email address to the Email Address field.
Important:
E-mail notification requires the GOS module to be configured and running.
For more information, refer to the Global Output Devices Folder chapter in the System Administration User Guide.
• If the report is being printed, select the Send report to printer radio button and select the printer to be used.
4. Select how many pages will be sent in an email or printed by entering a number in the Number of pages to generate field.
5. Click [OK]. s
revision 1
— 469
A: Actions
Request Print Action Flowchart
470 —
revision 1
This flowchart shows how a report may get printed from the default printer although the If fails use default printer check box is NOT selected in the Report
Print Properties window.
Alarm Monitoring User Guide
Select PTZ Preset Properties Window
The Select PTZ Preset action type allows users to select a preset for a PTZ camera to move to when the action is executed. This action is for camera and client side presets with network cameras assigned to an LNVR recorder.
Notes:
The camera must be online when you configure the action.
The camera must be online when the action executes.
You can display the Select PTZ Preset Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Form Element
Listing window
Enter preset
Comment
Displays all network cameras assigned to an LNVR recorder.
To display only PTZ cameras, add the following line to the ACS.INI file in the
[DigitalVideo]
section:
TestForPTZOnStartUp=1
Note:
The camera must be online when you configure the action and the camera must be online when the action executes.
Enter the camera side preset number or select a client side preset from the drop-down list.
revision 1
— 471
A: Actions
Select PTZ Preset Properties Window Procedures
Add a Select PTZ Preset Action
1. Open the Select PTZ Preset Properties window using the Action Group
Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global I/O.
For more information, refer to Open an Action Properties Window on page 393.
2. Select (place a checkmark beside) the video recorder/camera/channel option from the listing window.
Note:
The camera must be online when you configure the action and the camera must be online when the action executes.
3. Enter a camera side preset value or select a client side preset from the dropdown list.
4. Click [OK].
Select Video Wall Layout Properties Window
The Select Video Wall Layout action type allows users to activate and deactivate pre-configured layouts on the Barco video wall. Before this action is configured, video wall layouts must be defined using external software such as the Barco
Apollo Explorer.
You can display the Select Video Wall Layout Properties window using the
Action Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or
472 —
revision 1
Alarm Monitoring User Guide
Global I/O. For more information, refer to Open an Action Properties Window on page 393.
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
Select Video Wall Layout Properties Window Field Table
Form Element
Description
Video Wall Controller
Host Name
Connect
Desktop
Region
Layout
Comment
A descriptive name for the action. After the Select Video Wall Layout to be Activate section of the dialog is configured, [...] can be used to automatically generate a name based on the controller, desktop, region, and layout names.
Host name or IP address of the Barco Apollo server that controls the video wall.
The drop-down list is populated by controller names that have been configured in other instances of the Select Video Wall Layout action.
Click to retrieve video wall layout information from the video wall controller to populate the drop-down lists in the Select Video Wall Layout to be Activated section.
Identifies which physical video wall is being configured.
If regions are enabled on the video wall, select one from the Region drop-down list.
Note:
Regions are used to logically separate content so that multiple users can work in parallel without affecting each other.
Identifies the layout to be activated by the action. Layouts are configured in the Barco
Apollo Explorer.
revision 1
— 473
A: Actions
Select Video Wall Layout Properties Window Field Table
Form Element
When this layout is activated...
Comment
Specifies the policy for deactivation of a layout that may be already active on the video wall.
• Deactivate All Layouts - Deactivates all layouts that are active on the video wall regardless of region.
• Deactivate Layouts in the Current Region - Deactivates layouts that are active in the region indicated in the Region drop-down list.
• Do Not Deactivate Any Layouts - Adds the new layout without deactivating any currently active layouts.
Select Video Wall Layout Properties Window Procedures
Add a Select Video Wall Layout Action
Before configuring this action, the video wall must be fully configured. For more information, refer to the Digital Video Hardware User Guide
1. Open the Select Video Wall Layout Properties window using the Action
Group Library, Scheduler, Guard Tour, Acknowledgment Actions, or Global
I/O. For more information, refer to Open an Action Properties Window on page 393.
2. Enter the host name or IP address of the Barco Apollo server that controls the video wall in the Video Wall Controller Host Name field or select a controller from the drop-down list.
3. Select the Desktop name from the drop-down list.
4. If your Barco configuration utilizes regions, select the appropriate one from the Region drop-down list.
5. Select the Layout to activate from the drop-down list.
6. Specify the Layout Deactivation Policy by selecting an action for currently active layouts from the When this layout is activated... drop-down list.
• Deactivate All Layouts - Deactivates all layouts that are active on the video wall regardless of region.
• Deactivate Layouts in the Current Region - Deactivates layouts that are active in the region indicated in the Region drop-down list.
• Do Not Deactivate Any Layouts - Adds the new layout without deactivating any currently active layouts.
7. Enter a descriptive name for the action or use [...] to generate a name for the
Description field based on the selected desktop, region, and layout names.
8. Click [OK] to save the action.
474 —
revision 1
Alarm Monitoring User Guide
Set Forwarding Station Properties Window
The Set Forwarding Station action allows you to change where a monitor station forwards its alarms. Using this action allows a monitor station to be configured to forward its alarms to a different monitoring station.
Note:
The action is only valid for a scheduler invocation.
revision 1
— 475
A: Actions
Set Forwarding Station Properties Window Field Table
Form Element Comment
Monitor Station listing window
Lists the monitoring stations available. Select the monitoring station that is having its alarms forwarded.
Station to forward to Select the monitor station you would like the alarms forwarded to.
OK Click this button to add the action and exit out of the Set Forwarding Station properties window.
Cancel
Help
Click this button to exit the Set Forwarding Station properties window without adding the action.
Click this button to display online help for this window.
Set Forwarding Station Properties Window Procedures
Add a Set Forwarding Station Action
2. Choose the monitor station in the Monitoring Station list window. This will be the monitor station that has its alarms forwarded to another monitoring station.
3. In the Station to forward to drop-down box, choose the monitoring station that the alarms will be forwarded to.
4. Click [OK].
476 —
revision 1
Alarm Monitoring User Guide
Sign Out Visitor Properties Window
The Sign Out Visitor action allows you to deactivate the badges of cardholders who have signed out of the system. You can further modify this action by choosing which of the cardholder’s badges will be signed out, just the badge that triggered the action or all badges belonging to that cardholder.
Note:
In segmented systems, the Sign Out Visitor Properties action must be applied to all segments.
revision 1
— 477
A: Actions
Sign Out Visitor Properties Window Field Table
Form Element
Only the badge that triggered this action
All the active badges held by the visitor
OK
Cancel
Help
Comment
Select if you want to deactivate only the badge that caused the visitor to sign out.
Select if you want all the badges belonging to the visitor to deactivate once the visitor is signed out.
Click this button to add the action and exit out of the Sign Out Visitor properties window.
Click this button to exit the Sign Out Visitor properties window without adding the action.
Click this button to display online help for this window.
Sign Out Visitor Properties Window Procedures
Add a Sign Out Visitor Action
2. Choose the options that suit your needs.
3. Click [OK].
478 —
revision 1
Alarm Monitoring User Guide
Silence Area Properties Window
The Silence Area action allows an area (that uses a Bosch intrusion panel) to be silenced during an alarm from that panel.
You can display the Silence Area Properties window using the Action Group
Note:
If you have accessed this window via the Scheduler folder, the window will
also contain the Schedule tab. For more information, refer to Chapter 21:
revision 1
— 479
A: Actions
Silence Area Properties Window Field Table
Form Element
Listing window
OK
Cancel
Help
Comment
Lists currently enabled intrusion areas. Intrusion areas are configured on the Areas form in the
Intrusion Detection Configuration folder.
Click this button to add the action and exit out of the Silence Area Properties window.
Click this button to exit the Silence Area Properties window without adding the action.
Click this button to display online help for this window.
Silence Area Properties Window Procedures
Add a Silence Area Action
1. Open the Silence Area Properties window using the Action Group Library,
2. From the listing window, click on an entry to select it. The area you selected will now be silenced during an alarm from that panel.
Important:
The silence area action can only be used with Bosch intrusion panels.
3. Click [OK].
4.
480 —
revision 1
Alarm Monitoring User Guide
Appendix B: Alarm/Event Descriptions
Alarm
24 Hour Alarm
Event
24 Hour Alarm
Event Type
Trouble
24 Hour Alarm Restore 24 Hour Alarm Restore Trouble
24 Hour Auto Test
24 Hour Non-Burglary
Alarm
24 Hour Auto Test
24 Hour Non-Burglary
Alarm
Trouble
Trouble
24 Hour Report Closed 24 Hour Report Closed Trouble
24 Hour Report Open 24 Hour Report Open Trouble
24 Hour Zone Bypassed Trouble 24 Hour Zone
Bypassed
24 Hour Zone
Unbypassed
30 Minutes Since
Fallback Command
32 Hour Event Log
Marker
Abort
24 Hour Zone
Unbypassed
30 Minutes Since
Fallback Command
32 Hour Event Log
Marker
Abort
Trouble
Trouble
System
System
AC Restore
AC Trouble
Accepted Biometric
Score
AC Restore
AC Trouble
Accepted Biometric
Score
System
System
Biometric
Access Closed
Access Code Used
Access Denied
Access Denied: Area
Empty
Access Denied: Area
Occupied
Access Closed
Access Code Used
Access Denied
Access Denied
Access Denied
Access Denied: Asset
Required
Access Denied
Denied
Denied
Denied
Denied
Denied
Denied
Description
A 24 hour alarm condition has been detected.
A 24 hour alarm condition has been restored.
A 24 hour non-burglary alarm condition has been detected.
A 24 Hour report on a closed zone
A 24 Hour report on an open zone
A 24 hour zone has been bypassed.
A 24 hour zone has been unbypassed.
30 minutes have passed since fallback command.
An event message was not sent due to User action
AC power trouble has been restored.
An AC power trouble condition has been detected.
This event returns the accepted biometric score. The actual access granted event is sent separately. This event is mainly used for diagnostic purposes.
Access for all users prohibited.
Access code was used.
Access was denied.
An event indicating that access was denied due to the room being empty.
An event indicating that access was denied due to the room being empty.
An event indicating that access was denied since no asset was presented for the access attempt.
revision 1
— 481
B: Alarm/Event Descriptions
Alarm
Access Denied:
Biometric Reader
Offline
Access Denied: Escort
Timeout Expired
Event
Access Denied:
Biometric Reader
Offline
Access Denied: Escort
Timeout Expired
Event Type
Denied
Denied
Access Denied: Door
Secured
Access Denied:
Interlock
Access Denied: No
Biometric Template
Access Denied: No
Occupant Approval
Access Denied:
Passback
Access Denied: Reader
Locked
Access Denied:
Unauthorized Arming
State
Access Denied:
Unauthorized Entry
Level
Access Denied:
Unauthorized Time
Access Door Propped
Access Door Status
Monitor Shunt
Access Door Status
Monitor Trouble
Access Granted
Access Granted
Access Granted - No
Entry Made
Access Granted on
Facility Code
Access Denied: Door
Secured
Access Denied:
Interlock
Access Denied: No
Biometric Template
Access Denied: No
Occupant Approval
Access Denied:
Passback
Access Denied: Reader
Locked
Access Denied:
Unauthorized Arming
State
Access Denied:
Unauthorized Entry
Level
Access Denied:
Unauthorized Time
Access Door Propped
Access Door Status
Monitor Shunt
Access Door Status
Monitor Trouble
Access Granted
Granted Access
Granted No Entry
Granted Facility Code
Denied
Denied
Denied
Denied
Denied
Denied
Denied
Denied
Denied
System
System
System
Granted
Granted
Granted
Granted
Description
Generated when the alternate biometric reader could not be contacted for verification (was offline).
This event indicates that access was denied because a person requiring an escort attempted access but an escort did not present their credentials in the time period.
Access denied because door was secured.
An access request was denied because the doors associated Interlock point is open.
Generated when the cardholder did not have a biometric template loaded in the database, so a verification could not be done.
An event indicating that access was denied due to no occupant approval.
Access was denied because the credential has not exited the area before attempting to re-enter same area.
Generated when access was denied because the reader was locked.
An access request was denied because the user was not authorized in this area when the area was armed.
An access request was denied because the user is not authorized in this area.
An access request was denied because the request is occurring outside the user’s authorized time window(s).
Access was granted.
Access was granted.
Access was granted but no entry was made at the door.
Access was granted based on a valid facility code.
482 —
revision 1
Alarm Monitoring User Guide
Alarm
Access Granted on
Facility Code, No Entry
Made
Access Granted:
Reader Unlocked
Access Granted Under
Duress
Access Granted Under
Duress - No Entry
Made
Access Level Change
Access Lockout
Access Open
Access Point Bypass
Access Program Exit
Access Relay/Trigger
Fail
Access Request to Exit
Shunt
Access Schedule
Change
Access Trouble
Event
Granted Facility Code,
No Entry
Access Granted: Reader
Unlocked
Access Granted Under
Duress
Access Granted Under
Duress - No Entry Made
Access Level Change
Access Lockout
Access Open
Access Point Bypass
Access Program Exit
Access Relay/Trigger
Fail
Access Request to Exit
Shunt
Access Schedule
Change
Access Trouble
Event Type
Granted
Granted
Duress
Duress
System
System
System
System
System
System
System
System
System
Access Zone Shunt
Acknowledgment
Action Executed
Access Zone Shunt
Acknowledgment
Action Executed
System
Account Status Failure Account Status Failure System
Account Status Restore Account Status Restore System
System
Acknowledgment
Action Failed
Acknowledgment
Action Failed
System
Activate Output
Activity Resumed
Air Flow Loss
Activate Output
Activity Resumed
Air Flow Loss
Air Flow Loss Restore Air Flow Loss Restore
Alarm Alarm
System
System
Trouble
Trouble
System
Description
Access was granted on facility code but no entry was made at the door.
Generated when access was granted because the reader was unlocked.
Indicates that the cardholder was granted access under duress.
Access Granted Under Duress - No Entry
Made
Access denied, known code
Access for authorized users in now allowed
The access schedule has changed.
An access system trouble condition has been detected.
An access zone is put in the shunted state.
Generated when an alarm is acknowledged and actions associated with the alarm are executed.
Generated when there is a failure to execute actions associated with an alarm acknowledgment.
A zone has detected activity after an alert.
An air flow loss condition has been detected.
An air flow loss condition has been restored.
revision 1
— 483
B: Alarm/Event Descriptions
Alarm
Alarm Active
Alarm Canceled
Alarm Condition
Priority Level #
Alarm Mask Group
Armed
Alarm Mask Group
Disarmed
Alarm Mask Group
Force Armed
Alarm Mask Group
Mask Count
Incremented
Alarm Mask Group
Mask Count
Decremented
Alarm Mask Group
Arming Failure, Active
Points
Event
Alarm Active
Alarm Restored
Alarm Condition
Priority Level #
Alarm Monitoring
Action Group Executed
Alarm Monitoring
Action Group Failed
Alarm Relay Disable
Alarm Relay Disable
Restored
Alarm/Restore
Alarm Monitoring
Action Group Executed
Alarm Monitoring
Action Group Failed
Alarm Relay Disable
Alarm Relay Disable
Restored
Alarm/Restore
System
System
System
System
System
Alarm Silenced
Alarm Tamper Loop
Alarm Silenced
Alarm Tamper Loop
System
Trouble
Event Type
System
System
Digitize
Description
Generated when an alarm has become active.
A device has come online or an alarm condition has been restored.
Alarm condition priority level 1 (Highest priority i.e. Fire)
This event is generated when the alarm mask group is armed.
This event is generated when the alarm mask group is disarmed.
This event is generated when the alarm mask group is force armed.
This event is generated when a disarm command is issued and the alarm mask group is already disarmed, causing the alarm mask count to get incremented. The alarm mask group will still remain disarmed.
This event is generated when an arm or force arm command is issued and the alarm mask group has a mask count greater than 1, causing the mask count to be decremented.
The alarm mask group will still remain disarmed.
The following command is used to indicate an arming failure due to active points. This command should be hard to generate because currently the only way to issue the standard arm command is from the command keypad and this should only be available if there are no active points.
Generated when the action group is executed.
Generated when the action group execution fails.
Generated when a device has come online or an alarm condition has been restored.
484 —
revision 1
Alarm Monitoring User Guide
Alarm
All Points Tested
All Systems Normal
Analog Restore
Analog Restored
Analog Service
Requested
Analog Service
Required
Anti-Passback
Violation
Analog Restore
Analog Restored
Analog Service
Requested
Fire
System
System
Analog Service
Required
Fire
Anti-Passback Violation Area Control
Archive Server Failure Archive Server Failure Video
Archive Server Failure
Archive Location Full
Event
All Points Tested
All Systems Normal
Archive Server Failure
Event Type
System
Fire
Description
All points have been tested.
Generated when the Notifier AM-2020 panel is booted up. This alarm may also be sent when all existing alarm conditions are resolved.
Video
An analog fire sensor needs to be cleaned or calibrated.
Generated when the cardholder was denied access because the entry would have violated the anti-passback rules for the area.
Generic error indicating a failure on the archive server. This error indicates that the archive server could not move any more data from the video recorders to the archive server. The user will have to go to the physical archive server computer and review the windows event logs, remote storage application and logs, B.A.S.I.S. log files in the B.A.S.I.S.\logs directory, and also follow general trouble shooting techniques as outlined in the archive server manual to determine the specific cause of the alarm.
This error indicates that the archive location is full and no further data can be moved from the video recorders to the archive server. If this issue is not resolved, it is possible events may be purged before they are archived.
ARDIS Module
Communication Loss
ARDIS Module
Communication Loss
Trouble
ARDIS Module
Communication
Restored
Area Closed
ARDIS Module
Communication
Restored
Area Closed
Trouble
Area Control
Area Control Area Limit Exceeded Area Limit Exceeded
Armed Perimeter Delay Armed Perimeter Delay System
Generated when access was denied because the area being entered is closed.
Generated when access was denied because the area limit would have been exceeded.
revision 1
— 485
B: Alarm/Event Descriptions
Alarm
Armed Perimeter
Instant
Armed Stay
Asset Denied - Asset
Disable Command Sent
Event
Armed Perimeter
Instant
Armed Stay
Asset Denied - Asset
Disable Command Sent
Event Type
System
System
Asset
Asset Denied - Invalid
Access
Asset Denied - Invalid
Access
Asset
Asset Denied - Invalid
Asset
Asset Denied - Invalid
Asset
Asset
Asset Denied - Invalid
Cardholder
Asset Denied - No
Asset Privileges
Asset Denied - Invalid
Cardholder
Asset Denied - No
Asset Privileges
Asset
Asset
Asset Granted - Asset
Owner
Asset Granted - Asset
Privileges Only
Audible Alarm
Asset Granted - Asset
Owner
Asset Granted - Asset
Privileges Only
Audible Alarm
Asset
Asset
Trouble
Audible Alarm Restore Audible Alarm Restore Trouble
Audibles Silenced
Audibles Unsilenced
Audibles Silenced
Audibles Unsilenced
Fire
Fire
Auto Arming Time
Changed
Auto-Arm Failed
Automatic Closing
Automatic Opening
Automatic Phone Test
Automatic Test
Auxiliary Power Fault
Auxiliary Power
Supply AC Loss
Auxiliary Power
Supply AC Restored
Auto Arming Time
Changed
Auto-Arm Failed
Automatic Closing
Automatic Opening
Automatic Phone Test
Automatic Test
Auxiliary Power Fault
Auxiliary Power Supply
AC Loss
Auxiliary Power Supply
AC Restored
System
Trouble
Trouble
Open/Close
Open/Close
System
System
Trouble
Trouble
Description
Generated when the asset was denied and the asset disable command was sent to disable the asset.
Generated when the asset was denied because the cardholder had invalid access levels.
Generated when the asset was denied because of an invalid asset (the asset was not found in the controller).
Generated when the asset was denied because of an invalid cardholder.
Generated when the asset was denied because the cardholder had no asset privileges.
Generated when the asset was granted because the cardholder was the asset owner.
Generated when the asset was granted because the cardholder had asset privileges.
An audible alarm condition has been detected.
An audible alarm condition has been restored.
Generated when all the alarm bells have been turned off on the controller.
Generated when all the alarm bells have been turned back on for the controller.
An automatic arm has failed.
The system was armed automatically.
The system has disarmed automatically.
Automatic communication test report
486 —
revision 1
Alarm Monitoring User Guide
Alarm
Auxiliary Power
Supply Communication
Loss
Auxiliary Power
Supply Communication
Restored
Auxiliary Power
Supply Communication
Restored
Event
Auxiliary Power Supply
Communication Loss
Auxiliary Power Supply
Communication
Restored
Auxiliary Power Supply
Communication
Restored
Event Type
Trouble
Trouble
Trouble
Description
Auxiliary Power
Supply Fault Restored
Auxiliary Power Supply
Fault Restored
Trouble
Auxiliary Power
Supply Output Low
Auxiliary Power Supply
Output Low
Trouble
Auxiliary Power
Supply Output Low
Restored
Background Map
Found
Background Map Not
Found
Auxiliary Power Supply
Output Low Restored
Trouble
Background Map Found Video
Background Map Not
Found
Video
Background Scene
Changed
Background Scene
Change Restored
Bad 9112 Packet
Battery Test Fail
Battery Test Fail
Restore
Bell # Disable
Bell # Disable Restore
Bell Fault
Bell Restore
Background Scene
Changed
Background Scene
Change Restored
Bad 9112 Packet
Battery Test Fail
Battery Test Fail
Restore
Bell # Disable
Bell # Disable Restore
Bell Fault
Bell Restore
Video
Generated when background stickers are detected.
Generated when the engine cannot detect the background stickers. This may be caused when there is poor contrast or the stickers are improperly shaped/separated.
Indicates that part of the background has changed. This can be from something added to the scene or something removed from the scene.
The alarm is restored.
Video
System
System
System
A battery test fail condition has been detected.
A battery test fail condition has been restored.
Relay/Sounder Bell # has been disabled.
Relay/Sounder Bell # has been restored.
Relay/Sounder A trouble condition has been detected on a local bell, siren, or annunciator.
Relay/Sounder A trouble condition has been restored on a local bell, siren, or annunciator.
revision 1
— 487
B: Alarm/Event Descriptions
Alarm
Biometric Mismatch
Biometric Verify Mode
Disabled
Biometric Verify Mode
Enabled
Blind Camera (AI)
Biometric Verify Mode
Disabled
Biometric Verify Mode
Enabled
Blind Camera (AI)
Blind Camera (AI)
Restored
Block Acknowledge
Brightness Change
Brightness Change
Restored
Burglary Alarm
Event
Biometric Mismatch
Blind Camera (AI)
Restored
Block Acknowledge
Brightness Change
Brightness Change
Restored
Burglary Alarm
Event Type Description
Denied Generated when the cardholder has a biometric template and the alternate reader was utilized to capture a template to match, but the captured template did not match the stored template.
System Generated disabled. when biometric verify mode is
System Generated enabled.
Video when biometric verify mode is
Indicates that level of camera blindness
(covered by some sort of obstacle) exceeded configured threshold.
Video The alarm is restored.
Fire
Video
Video
Burglary
Generated when a block acknowledge command is sent. This command acknowledges any existing unacknowledged alarms in the system all at once.
Generated when a change in overall brightness level of the scene is detected.
Generated when changes in brightness level are no longer exceeding the user defined threshold.
A burglary alarm condition has been detected.
Burglary Alarm Cross
Point
Burglary Alarm Cross
Point
Burglary
Burglary Alarm Restore Burglary Alarm Restore Burglary
Burglary Bypass
Burglary Cancel
Burglary Bypass
Burglary Cancel
Burglary
Burglary
A burglary alarm condition has been restored.
A burglary zone has been bypassed.
A burglary zone has been cancelled by an authorized user.
Burglary Close
Burglary Inactive
Burglary Open
Burglary Restore
Burglary Close
Burglary Inactive
Burglary Open
Burglary Restore
Open/Close
Burglary
Open/Close
Burglary
Burglary Supervisory
Burglary Test
Burglary Supervisory
Burglary Test
Burglary
Burglary
A burglary alarm/trouble condition has been eliminated.
An unsafe intrusion detection system condition has been detected.
A burglary zone has been activated during testing.
488 —
revision 1
Alarm Monitoring User Guide
Alarm
Burglary Trouble
Burglary Trouble
Restore
Burglary Unbypass
Burglary Verified
Busy Seconds
Event
Burglary Trouble
Burglary Trouble
Restore
Burglary Unbypass
Burglary Verified
Busy Seconds
Event Type
Burglary
Burglary
Burglary
Burglary
System
Bypass - Closed
Bypass Restore
C900 Battery Low
C900 Battery Restore
C900 Input Open
C900 Input Restored
C900 Input Shorted
C900 Intercepted
Disabled
C900 Intercepted
Enabled
Bypass - Closed
Bypass Restore
C900 Battery Low
C900 Battery Restore
C900 Input Open
C900 Input Restored
C900 Input Shorted
C900 Intercepted
Disabled
C900 Intercepted
Enabled
C900
C900 Output Activated C900 Output Activated C900
C900 Output
Deactivated
C900 Output
Deactivated
C900
C900 Reboot C900 Reboot C900
C900 C900 Switched to
Fallback
C900 Switched to
Intercept
C900 Switched to
Fallback
C900 Switched to
Intercept
Cabinet Tamper Active Cabinet Tamper
C900
System
Open/Close
System
C900
C900
C900
C900
C900
C900
Cabinet Tamper
Restored
Callback Request
Callback Request
Cancelled Cabinet
Tamper
Callback Request
Call Conferenced
System
System
Intercom
Description
A burglary trouble condition has been detected.
A burglary trouble condition has been restored.
Burglary zone bypass has been removed.
A burglary alarm has occurred and been verified within programmed conditions.
The percent of time the receiver’s line card is online.
Generated when a cabinet tamper condition has been detected.
Generated when a cabinet tamper condition has been restored.
Call Disconnected
Call Ended
Call Disconnected
Call Ended
Intercom
Intercom
Generated when an intercom call has been disconnected.
Generated when a call has ended.
revision 1
— 489
B: Alarm/Event Descriptions
Alarm
Call Established
Event
Call Established
Event Type
Intercom
Call Failed
Call to a busy subscriber
Call to an open subscriber
Call to a private subscriber
Call Transferred
Call Failed
Call to a busy subscriber
Call to an open subscriber
Call to a private subscriber
Call Transferred
Intercom
Intercom
Intercom
Intercom
Intercom
Camera Tamper Active Camera Tamper Active Video
Description
Generated when an intercom call is answered.
Generated when an intercom call fails.
Generated when an intercom call has been placed to a busy subscriber.
Generated when an intercom call has been placed to an open subscriber.
Generated when a call has been placed to a private subscriber.
Generated when a call was transferred.
Indicates that IP Camera configuration was changed bypassing the B.A.S.I.S. software.
(It is possible if the user knows password to access the IP Camera and connect to it directly using IP Camera provided Webinterface.)
The alarm is restored. LNVR changed camera settings back to normal.
Camera Tamper
Restored
Cancel Alarm
Cancel Entire Sale
Cancel Report
Capture Source
Mismatch
Camera Tamper
Restored
Cancel Alarm
Cancel Entire Sale
Cancel Report
Capture Source
Mismatch
Carbon Monoxide
Detected
Card Added
Card Assigned
Carbon Monoxide
Detected
Card Added
Card Assigned
Gas
System
System
Card Deleted Card Deleted System
Cash Amount Tendered Cash Amount Tendered POS
Video
System
POS
System
Video
Cash or Safe Drop
Change Due
Cash or Safe Drop
Change Due
POS
POS
Change of State Change of State System
Charge Account Tender Charge Account Tender POS
Generated when a transaction is used to indicate that an entire sale was cancelled.
Untyped zone cancel.
Indicates that user-specified IP Camera type in B.A.S.I.S. does not match actual IP
Camera type.
Generated when carbon monoxide has been detected by an alarm.
Generated when a card has been added.
An access ID has been added to the controller.
An access ID has been deleted from the controller.
Generated when an event is used to indicate that a cash amount has been tendered
Generated when a transaction indicating a cash or safe drop has occurred.
Generated when a transaction indicating the change due has occurred.
An expansion/peripheral device is reporting a new condition or state change.
Generated when a charge account was used as tender.
490 —
revision 1
Alarm Monitoring User Guide
Alarm Event
Check Tender
Checksum Fail
Check Tender
Checksum Fail
Cipher Mode Disabled Cipher Mode Disabled
Cipher Mode Enabled Cipher Mode Enabled
Event Type
POS
System
System
System
Clerk Name or Number Clerk Name or Number POS
Close Area
Close by User
Close Exception
Close Out of Window
Closing
Closing Delinquent
Closing Extend
Closing Out of Window by User
Close Area
Close by User
Close Exception
Close Out of Window
Closing
Closing Delinquent
Closing Extend
Closing Out of Window by User
Closing Report
Closing Switch
Closing Report
Closing Switch
Closing Time Changed Closing Time Changed
Combustion Alarm Combustion Alarm
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Open/Close
Combustion Alarm
Restore
Command (#) Set From
Reader
Command Pin +10 Set
From Reader
Command Pin +20 Set
From Reader
Command Sent
Combustion Alarm
Restore
Command (#) Set From
Reader
Command Pin +10 Set
From Reader
Command Pin +20 Set
From Reader
Command Sent
Open/Close
System
System
System
System
Communication Access
Denied
Communication Access
Denied
System
Description
Generated when a check was used as tender.
A checksum failure has been detected.
Generated when Cipher mode is disabled for a reader.
Generated when cipher mode is enabled for a reader. When this occurs card data can be entered via the keypad.
A transaction that reports the clerk’s name or number.
The system has been partially armed
The area has been armed by a user.
The closing time has been extended.
The system is armed and normal
A combustion alarm condition has been detected.
A combustion alarm condition has been restored.
Generated when the reader keypad command “(#)” was executed.
Indicates the reader command “Pin +10” was executed.
Indicates the reader command “Pin +20” was executed.
A command has been sent to an expansion/ peripheral device.
Indicates that a wrong password has been entered while logging on to a communication device.
revision 1
— 491
B: Alarm/Event Descriptions
Alarm
Communication
Initialization Failed
Event
Communication
Initialization Failed
Communication
Trouble Restore
Communications Fail
Communications Lost
Communication
Trouble Restore
Communications Fail
Communications Lost
System
System
System
Communications Lost -
Primary Path
Communications Lost -
Secondary Path
Communications Path
Switched - Primary to
Secondary
Communications Path
Switched Secondary to
Primary
Communications
Restore
Communications
Restored
Communications
Restored - Primary Path
Communications
Restored - Secondary
Path
Communications
Trouble
Communications With
Host Lost
Primary
Communication Path
Lost
Secondary
Communication Path
Lost
Communications Path
Switched - Primary to
Secondary
Communications Path
Switched Secondary to
Primary
Communications
Restore
Communications
Restored
Primary
Communication Path
Restored
Secondary
Communication Path
Restored
Communications
Trouble
Communications With
Host Lost
System
System
System
System
System
System
System
System
System
System
Communications With
Host Restored
Communications With
Host Restored
System
Complimentary Tender Complimentary Tender POS
Event Type
System
Description
Generated when the Communication Server fails to initialize communications. For example if you are using RS-232 and have hyperterminal running and using COM1 and then you start up the Communication Server and it needs to use COM1 to communicate to a panel, it will fail to open up the serial port and this event will be logged.
A communication trouble has been restored.
A communication has failed.
Generated when communications to the device have been lost.
Generated when the primary path lost communication with the host.
Generated when the secondary path loses communication with the host.
Generated when the communication path has been switched from the primary path to the secondary path.
Generated when the communication path has switched from the secondary path to the primary path.
Generated when communications have been restored.
Generated when communications to the device have been restored.
Generated when the primary path restored communication with the host.
Generated when the secondary path restored communication with the host.
A communications trouble has been detected.
An event was generated by the hardware when communications with the host was lost.
An event was generated by the hardware when communications with the host was restored.
Generated when the tender was complimentary.
492 —
revision 1
Alarm Monitoring User Guide
Alarm
Computer Trouble
Conferenced Call
Congestion
Congestion Restored
Event
Computer Trouble
Congestion
Congestion Restored
Controller Connection
Mismatch
Controller Connection
Mismatch
Controller Encryption
Error
CPU Data Error
CPU Utilization
Threshold Exceeded
CPU Utilization
Threshold Restored
Credit Card Tendered
Cross Zone Trouble
Current Time
Controller Encryption
Error
CPU Data Error
CPU Utilization
Threshold Exceeded
CPU Utilization
Threshold Restored
Credit Card Tendered
Cross Zone Trouble
Current Time
Event Type
System
Intercom
Video
Video
System
System
System
System
System
POS
Trouble
POS
Description
Generated if a call is conferenced together with another call.
Generated when the user-specified level and pattern of congestion is detected within a region of interest.
Generated 8 seconds after last detection of a
Congestion event.
Generated when the B.A.S.I.S. attempts to make a connection to a controller by upgrading or degrading the connection while the controller is online.
Generated in several instances, including when:
• A controller is configured for a plain connection when it requires encryption.
• An encrypted controller is online, but its configuration is changed to a plain connection.
• A controller is configured for a plain connection, but then a physical controller swap is made where the new controller requires encryption.
• A controller that supports encryption is currently online with a plan connection, and then the DIR switch 8 is turned on.
A CPU data error was detected.
Generated by an LNVR recorder when current CPU level exceeds the user defined limit.
Generated by an LNVR recorder when the current CPU level drop below the user defined limit.
Generated when a credit card was used as tender.
An event that reports the current time.
revision 1
— 493
B: Alarm/Event Descriptions
Alarm
Database Error Event
Polling Stopped
Event
Database Error Event
Polling Stopped
Database Error in Panel
Download
Database Error in Panel
Download
System
Data Lost
Date Changed
Day Trouble
Day Trouble Restore
Day/Night Alarm
Data Lost
Date Changed
Day Trouble
Day Trouble Restore
Day/Night Alarm
Day/Night Alarm
Restore
Deactivate Output
Dealer ID
Debit, ATM, Check
Card Tender
Deferred Close
Deferred Open/Close
Denied, Badge Not in
Panel
Denied Low Battery
Day/Night Alarm
Restore
Deactivate Output
Dealer ID
Debit, ATM, Check
Card Tender
Deferred Close
Deferred Open/Close
Denied, Badge Not in
Panel
Denied Low Battery
Denied, No Command
Authority
Denied, No Command
Authority
Denied
System
System
Trouble
Trouble
Trouble
Trouble
System
System
POS
Open/Close
Open/Close
Denied
Denied
Denied - No Host
Approval
Denied, PIN Only
Request
Denied - No Host
Approval
Denied, PIN Only
Request
Event Type
System
Description
Generated by the communication server when there is a problem writing events to the database. This event is not written to the database but is sent to Alarm Monitoring clients. Polling of the events from the various hardware devices is stopped until the events can be written to the database.
Generated by the communication server when the database cannot be opened at the start of a database download to a controller.
The dialer data has been lost and there is a transmission error.
The date was changed.
A day trouble condition has been detected.
A day trouble condition has been restored.
A day/night alarm condition has been detected.
A day/night alarm condition has been restored.
Denied
Denied
Transaction that indicated that a debit,
ATM, or check card was used as tender.
Generated when a badge is denied at a reader because it is not in the system.
Generated when access is denied because the battery on the device is low.
Generated when a reader command function was denied because the user did not have the command authority to execute the function.
Generated when access was denied because the host did not grant approval. This can happen because the host response did not come back in a timely fashion or the controller is offline with the host.
Generated when access was denied for a pin only request (either an invalid pin code or pin support is not enabled for the panel).
494 —
revision 1
Alarm Monitoring User Guide
Alarm
Denied, Reader
Excluded
Denied - Unauthorized
Assets
Denied Under Duress
Denied Unmask, Active
Zones in Group
Denied - Unauthorized
Assets
Access Denied Under
Duress
Denied Unmask -
Active Zones in Group
Denied
Duress
Denied
Deny Count Exceeded Deny Count Exceeded Denied
Deposit Amount Paid
Pending Purchase
Deposit Return
Detector High
Sensitivity
Detector High
Sensitivity Restore
Detector Low
Sensitivity
Event
Denied, Reader
Excluded
Deposit Amount Paid
Pending Purchase
Deposit Return
Detector High
Sensitivity
Detector High
Sensitivity Restore
Detector Low
Sensitivity
POS
POS
Trouble
Trouble
Trouble
Event Type
Denied
Description
Generated when access was denied because the reader exclusion list was violated. This happens when using precision access exclusion and the cardholder has access to the reader via an access level, but the precision access exclusion list has removed access.
Generated when access was denied because of unauthorized assets.
Generated when the cardholder was denied access under duress.
Generated when the unmask command failed because there are still active zones in the group.
Generated when a specified number of invalid attempts are made in a row at a reader.
Event indicating that a deposit amount paid pending purchase has occurred.
Transaction for a deposit return.
A detector high sensitivity condition has been detected.
A detector high sensitivity condition has been restored.
A detector low sensitivity condition has been detected.
Detector Low
Sensitivity Restore
Detector Low
Sensitivity Restore
Trouble
Detector Test
Detector Test Fail
Detector Test OK
Detector Test
Detector Test Fail
Detector Test OK
Fire
Fire
Fire
Device Turned Off Device Turned Off Trouble
Device Turned On Device Turned On Trouble
Device Type Mismatch Device Type Mismatch System
Diagnostic
Diagnostic Error
Diagnostic
Diagnostic Error
System
System
A detector low sensitivity condition has been restored.
Generated when the fire detection test is initiated.
Generated when the fire detection test fails.
Generated when the fire detection test is successfully completed.
A device turned off.
A device turned on.
Generated when the device is of a different type than what it has been configured for.
A diagnostic report was requested.
A device is reporting a diagnostic error.
revision 1
— 495
B: Alarm/Event Descriptions
Alarm Event Event Type
Dial Out Method
Dialer Disabled
Dial Out Method
Dialer Disabled
System
Trouble
Dialer Disabled Restore Dialer Disabled Restore Trouble
Dialer Shutdown
Dialing Error
Dialup Last Connection
Time Expired
Dialer Shutdown
Dialing Error
Dialup Last Connection
Time Expired
Trouble
Trouble
System
Dialup Stored
Command Limit
Exceeded
Dialup Stored
Command Limit
Exceeded
System
Description
The dialer has become disabled.
The dialer has been restored from being disabled.
The dialer has shutdown.
An error has been detected when dialing.
Generated by the communication server for dialup panels that have exceeded the set number of hours since their last connection.
When this event is generated, the communication server will attempt to connect to the panel. If the dialup panel repeatedly receives this event, the panel should be investigated to see why it is not calling back.
Generated by the communication server for dialup panels that have exceeded their stored command limit. When this event is generated, the communication server will attempt to connect to the panel. If the dialup panel repeatedly receives this event, the panel should be investigated to see why it is not calling back.
Digital dialer failed to report its daily test.
Digital Dialer Daily
Test Fail
Digital Dialer Daily
Test Fail
System
Disable Intercept Mode Disable Intercept Mode System
Directional Motion Directional Motion Video
Directional Motion
Restored
Disarm From Alarm
Discount Entered as
Absolute Amount
Discount Entered as
Percentage
Disk Read Utilization
Threshold Exceeded
Directional Motion
Restored
Disarm From Alarm
Discount Entered as
Absolute Amount
Discount Entered as
Percentage
Disk Read Utilization
Threshold Exceeded
Video
System
POS
POS
System
Disk Read Utilization
Threshold Restored
Disk Read Utilization
Threshold Restored
System
Disk Write Utilization
Threshold Exceeded
Disk Write Utilization
Threshold Exceeded
System
Generated when an object moving in a prespecified direction is detected.
Generated 8 seconds after last detection of a
Directional Motion event.
An account in alarm was reset/disarmed.
Generated when a discount was entered as an absolute amount.
Generated when a discount was entered as a percentage.
Generated by an LNVR recorder when current hard drive read speed exceeds the user defined limit.
Generated by an LNVR recorder when the current hard drive read speed drops below the user defined limit.
Generated by an LNVR recorder when current hard drive write speed exceeds the user defined limit.
496 —
revision 1
Alarm Monitoring User Guide
Alarm
Disk Write Utilization
Threshold Restored
Event
Disk Write Utilization
Threshold Restored
Event Type
System
Door Close
Door Contact Tamper
Active
Door Contact Tamper
Restored
Door Cycled
Door Close
Door Contact Tamper
Door Contact Tamper
Cancelled
Door Cycled
System
System
System
System
Door Forced
Door Forced Open
Door Forced Open
Masked
Door Forced Open
Restored
Door Forced Open
Unmasked
Door Forced Trouble
Door Held Open
Door Forced
Door Forced Open
Door Forced Open
Masked
Door Forced Open
Cancelled
Door Forced Open
Unmasked
Door Forced Trouble
Door Held Open
Trouble
System
System
System
System
Trouble
Door Held Open
Masked
Door Held Open
Restored
Door Held Open
Unmasked
Door Left Open
Door Held Open
Masked
Door Held Open
Cancelled
Door Held Open
Unmasked
Door Left Open
Door Left Open Alarm Door Left Open Alarm Trouble
Door Left Open
Restore
Door Left Open
Trouble
Door Left Open Restore
Door Left Open Trouble
System
System
System
System
Trouble
Trouble
Trouble
Description
Generated by an LNVR recorder when the current hard drive write speed drops below the user defined limit.
Generated when a door closes.
Generated when the door contact tamper has gone active.
Generated when the door contact tamper has been restored.
Generated when momentary access is granted to a door. This is a temporary door state in which the door initiates the door sequence as if a valid card was read.
Door cycled cannot be scheduled.
The door was forced open without an access request.
Generated when a “Door Forced Open” condition has been detected.
Generated when the “Door Forced Open” event has become masked for the device.
Generated when a “Door Forced Open” condition has been restored.
Generated when the “Door Forced Open” event has become unmasked for the device.
An access point has been forced open in an unarmed area.
Generated when a “Door Held Open” condition has been detected.
Generated when the “Door Held Open” event has become masked for the device.
Generated when a “Door Held Open” condition was restored.
Generated when the “Door Held Open” event has become unmasked for the device.
An access point was open when the door cycle time expired.
An open access point was open when the open time expired in an armed area.
An access point in a door left open state has restored.
An open access point was open when the open time expired in an unarmed area.
revision 1
— 497
B: Alarm/Event Descriptions
Alarm
Door Locked
Door Open
Door Request
Door Restore
Door Secured
Event
Door Locked
Door Open
Door Request
Door Restore
Door Secured
Door Shunt Command
Executed From Reader
Door Shunt Command
Results - Cancelled
Door Station
Door Unlocked
Door Shunt Command
Executed From Reader
Door Shunt Command
Results - Cancelled
Door Station
Door Unlocked
Event Type
Trouble
System
System
Trouble
System
System
System
Trouble
System
Description
Generated when a door returns to its normal door state (locked). When a door is in the lock door state, you can initiate the door sequence using schedules, command center functions, door requests, or valid card requests.
Door locked is similar to a reader being in card and pin mode.
An event indicating that the door has opened.
This event is generated from Bosch intrusion panels when a door is manually activated to open without the presentation of an ID.
An access alarm/trouble condition has been eliminated.
Generated when no access is allowed to a door. When a door is in a secure state, no access is allowed through the door until it is returned to the locked state.
Door secured is similar to a reader being in locked mode.
Generated when the door shunt command was executed from the reader.
Generated when the door is closed while the door shunt command is executing.
Identified door for next report.
Generated when there is free access to a door. When a door is unlocked, the door is shunted and the strike does not prevent the door from opening. In this state, you do not need to activate a door request or present a valid card to gain access.
Door unlocked is similar to a reader being in unlocked mode.
Drift Compensation
Error
Driver Error in Panel
Download
Duct Alarm
Duct Alarm Restore
Duress Access Grant
Drift Compensation
Error
Driver Error in Panel
Download
Duct Alarm
Duct Alarm Restore
Duress Access Grant
Trouble
System
Trouble
Trouble
Duress
Generated by the communication server when an error occurs during a database download to a controller.
A duct alarm condition has been detected.
A duct alarm condition has been restored.
498 —
revision 1
Alarm Monitoring User Guide
Alarm
Duress Egress Grant
Elevator Terminal
Mode Access to
Authorized Floors
Elevator Terminal
Mode Default Floor
Elevator Terminal
Mode Default Floor or
User Entry of
Destination Floor
Elevator Terminal
Mode User Entry of
Destination Floor
Employee Sign Off
Employee Sign On
Extended Held
Command Denied
Extended Held
Command Set From
Reader
Extended Held Open
Mode Disabled
Extended Held Open
Mode Enabled
Facial Detection
Event
Duress Egress Grant
Elevator Terminal
Mode Access to
Authorized Floors
Elevator Terminal
Mode Default Floor
Elevator Terminal
Mode Default Floor or
User Entry of
Destination Floor
Elevator Terminal
Mode User Entry of
Destination Floor
Employee Sign Off
Employee Sign On
Extended Held
Command Denied
Extended Held
Command Set From
Reader
Extended Held Open
Mode Disabled
Extended Held Open
Mode Enabled
Facial Detection
Event Type
Duress
System
System
System
System
POS
POS
System
System
System
System
Video
Facial Detection
Restored
Facility Occupancy Too
Low
Facility Occupancy Too
Low Restored
Facility Occupancy Too
High
Facility Occupancy Too
High Restored
Failed to Report
Expected Event
Facial Detection
Restored
Facility Occupancy Too
Low
Facility Occupancy Too
Low Restored
Facility Occupancy Too
High
Facility Occupancy Too
High Restored
Failed to Report
Expected Event
Video
Video
Video
Video
Video
System
Description
Fire Alarm Fire Alarm Fire
Generated when the elevator terminal mode has changed to “Access to Authorized
Floors.”
Generated when the elevator terminal mode has changed to “Default Floor Only.”
Generated when the elevator terminal mode has changed to “Default Floor or User Entry of Destination Floor.”
Generated when the elevator terminal mode has changed to “User Entry of Destination
Floor.”
Generated when an employee signs off.
Generated when an employee signs on.
Generated when an extended held command is denied.
Generated when an extended held command is entered at the reader.
Generated when extended held open mode is disabled.
Generated when extended held open mode is enabled.
Generated when one or several faces are detected.
Generated 8 seconds after last detection of a face.
Generated when the occupancy falls below the user-specified limit.
Generated when the occupancy returns to a value above the lower limit.
Generated when the occupancy rises above the user-specified limit.
Generated when the occupancy returns to a value below the upper limit.
Generated when a device that is supposed to report an event within a certain period of time fails to report an event during this time period.
Generated when a fire device is in alarm.
revision 1
— 499
B: Alarm/Event Descriptions
Alarm
Fire Alarm
Acknowledge
Fire Alarm
Acknowledged Clear
Fire Alarm Block
Acknowledge
Fire Alarm In
Fire Alarm Out
Fire Button Set
Fire Missing
Fire Walk Test Ended
Event
Fire Alarm
Acknowledge
Fire Alarm
Acknowledged Clear
Fire Alarm Block
Acknowledge
Fire Alarm In
Fire Alarm Out
Fire Button Set
Fire Missing
Fire Walk Test Ended
Fire
Fire
Fire
Fire
Fire
Event Type
Fire
Fire
Fire
Description
Generated when a fire alarm has been acknowledged.
Generated when a fire alarm has been acknowledged and cleared.
Generated when all fire alarms have been acknowledged at the fire panel.
Generated when a new fire alarm has been detected for the device.
Generated when a device with a previous fire alarm has returned to its normal state.
The reported fire button has been set.
A fire walk test has ended.
Fire Walk Test Started
Fire Zone Walk Tested
Firmware Download
Started
Firmware Download
Completed
Firmware Download
Failed
First Card Unlock
Mode Disabled
First Card Unlock
Mode Enabled
Foil Break Alarm
Fire Walk Test Started
Fire Zone Walk Tested
Firmware Download
Started
Firmware Download
Completed
Firmware Download
Failed
First Card Unlock Mode
Disabled
First Card Unlock Mode
Enabled
Foil Break Alarm
Fire
Fire
System
System
System
System
System
Trouble
Foil Break Restore
Foodstamps Tender
Gasoline Prepayment
Gasoline Prepayment
Refund
Generic Event
Foil Break Restore
Foodstamps Tender
Gasoline Prepayment
Gasoline Prepayment
Refund
Generic Event
Trouble
POS
POS
POS
Generic
A fire walk test has started.
A fire zone has been tested.
Generated when the firmware download has started.
Generated when the firmware download has completed.
Generated when the firmware download has failed.
Generated when first card unlock mode is disabled for a door.
Generated when first card unlock mode is enabled for a door.
Generated when a break in a foil circuit occurs. This is most commonly used to trigger an alarm when glass being protected with the foil circuit is broken.
Generated when a foil break alarm condition has been restored.
Indicates that food stamps were used as tender.
Transaction for a gasoline prepayment
Transaction for a gasoline prepayment
A generic event exists with more specific information in the event text.
500 —
revision 1
Alarm Monitoring User Guide
Alarm
Global Linkage Action
Executed
Global Linkage Action
Failed
Granted Access
Granted APB Violation,
Entry Made
Event
Global Linkage Action
Executed
Global Linkage Action
Failed
Access Granted
Access Granted Anti-
Passback Used
Granted APB Violation,
No Entry Made
Granted Facility Code
Granted Facility Code,
No Entry
Granted No Entry
Granted Under Duress
Granted Under Duress,
No Entry
Access Granted Under
Duress - No Entry Made
Grounded Loop Active Grounded Loop Alarm
Active
Grounded Loop
Restored
Guard Tour Action
Executed
Cancelled Grounded
Loop
Guard Tour Action
Executed
Guard Tour Action
Failed
History Report End
History Report Start
Hold
Access Granted Anti-
Passback Not Used
Access Granted On
Facility Code
Access Granted On
Facility Code No Entry
Made
Access Granted No
Entry Made
Access Granted Under
Duress
Guard Tour Action
Failed
History Report End
History Report Start
Hold
Event Type
System
System
Granted
Area Control
Area Control
Granted
Granted
Granted
Emergency
Emergency
System
System
System
System
System
System
Intercom
Holdup Alarm Restore
Host Executed
Function List
Host Open Door - Door
Used
Holdup Alarm Restore
Host Executed Function
List
Host Open Door - Door
Not Used
Emergency
System
System
Description
Generated when a global I/O linkage has executed.
Generated when a global I/O linkage has failed.
Generated when access was granted.
Generated when an anti-passback violation occurred but access was granted and entry was made. This can happen when using soft anti-passback.
Generated when an anti-passback violation occurred and access was granted but no entry was made. This can happen when using soft anti-passback.
Generated when access was granted based on a valid facility code.
Generated when access was granted on facility code but no entry was made at the door.
Generated when access was granted but no entry was made at the door.
Generated when the cardholder was granted access under duress.
Generated when the cardholder was granted access under duress but no entry was made.
Generated when a grounded loop fault condition has been detected.
Generated when the grounded loop fault condition was restored.
Generated when a guard tour action has executed.
Generated when a guard tour action has failed.
Generated when a phone call is placed on hold.
Holdup alarm was restored.
Generated when a function list has been executed from the host.
When the host issued an open door command and the door was opened.
revision 1
— 501
B: Alarm/Event Descriptions
Alarm
Host Open Door - Door
Not Used
In-Camera-Memory
Download Completed
Event
Host Open Door - Door
Not Used
In-Camera-Memory
Download Completed
Event Type
System
System
In-Camera-Memory
Download Failed
In-Camera-Memory
Download Restored
In-Camera-Memory
Download Started
Inactive Badge
In-Camera-Memory
Download Failed
In-Camera-Memory
Download Restored
In-Camera-Memory
Download Started
Inactive Badge
System
System
System
Denied
Incoming Call
Information Message
Initiated
Input Masked
Input Unmasked
Intercom Function
Incoming Call
Information Message
Initiated
Input Masked
Input Unmasked
Intercom Function
Intercom
POS
Intercom
System
System
Intercom
Insufficient Frame Rate Insufficient Frame Rate Video
Insufficient Frame Rate
Restored
Insufficient Frame Rate
Restored
Intrusion Command
Accepted
Intrusion Command
Denied
Invalid Access Level
Invalid Badge
Invalid Camera
Intrusion Command
Accepted
Intrusion Command
Denied
Invalid Access Level
Invalid Badge
Invalid Camera
Video
Generic
Denied
Denied
Denied
Video
Description
When the host issued an open door command and the door was not opened.
Generated when the process of retrieving the files from the camera memory is completed.
Generated when the process of retrieving the files from the camera memory is failed.
Generated when the process of retrieving the files from the camera memory is restored.
Generated when the process of retrieving the files from the camera memory is started.
Generated when access was denied because the badge was inactive.
Generated when there is an incoming call.
Used to report information messages
Generated when a phone call is initiated.
Generated when an input has become masked.
Generated when an input has become unmasked.
Generated when an intercom function has been executed.
Generated when the IntelligentVideo engine does not receive a sufficient frame rate for the events configured on the video channel.
Generated when the frame rate reaches a value sufficient for the events configured on the video channel.
An intrusion command was successfully executed.
An attempt to execute an intrusion command was denied, either the command is not allowed at the reader, the user is not authorized for this command, or invalid command arguments were supplied.
Generated when access was denied because of an invalid access level.
Generated when access was denied because the badge ID was unknown to the controller.
Generated when the camera is tampered with (covered, moved, or out-of-focus).
502 —
revision 1
Alarm Monitoring User Guide
Alarm
Invalid Camera
Restored
Invalid Card Format
Invalid Device Serial
Number
Invalid Facility Code
Invalid Issue Code
Invalid OEM Code
Invalid PIN
Item Correct of
Previously entered Item
Item Sold
IVS Channel
Processing Failed
IVS Channel
Processing Restarted
IVS Connection Lost
IVS Connection
Restored
Event
Invalid Camera
Restored
Invalid Card Format
Invalid Device Serial
Number
Invalid Facility Code
Invalid Issue Code
Invalid OEM Code
Invalid PIN Number
IVS Connection Lost
IVS Connection
Restored
System
Denied
Denied
Denied
Item Correct of
Previously entered Item
Item Sold
IVS Channel Processing
Failed
POS
POS
Video
IVS Channel Processing
Restarted
Video
Video
Video
IVS Engine Connection
Lost
IVS Engine Connection
Lost
Video
IVS Engine Connection
Restored
IVS Engine Connection
Restored
Event Type
Video
Denied
System
Video
Description
Generated 8 seconds after the camera becomes valid again or in the case of camera covered or moved, when the background is relearned.
Generated when the badge contained a card format that was not recognized by the reader.
Generated when the device does not have a valid serial number.
Generated when access was denied because the badge had an invalid facility code.
Generated when access was denied because the issue code read from the badge did not match the current issue code stored in the database for the badge.
Indicates that the hardware did not contain the expected OEM (Original Equipment
Manufacturer) code.
Generated when access was denied because an invalid PIN was entered.
Generated to indicate that an item was corrected.
Indicates an item was sold.
Generated by the IntelligentVideo Server when video processing is terminated due to an error or lost connection.
Generated when the IntelligentVideo Server re-establishes a connection to a channel that previously reported failure.
Generated when the camera is configured to analyze video on a remote IntelligentVideo
Server and connection to the
IntelligentVideo Server is lost.
Generated when the connection to the
IntelligentVideo Server was lost and has been restored.
Generated when the IntelligentVideo Server looses connection to the LpsSearchSvc service and video processing of all channels fails.
Generated when the IntelligentVideo Server reconnects to the LpsSearchSvc service after the connection has been lost.
revision 1
— 503
B: Alarm/Event Descriptions
Alarm
Key Override
Keypad Fire
Lamp Test Activated
Lamp Test Completed Lamp Test Completed
License Will Soon
Expire - X Days Left
License Will Soon
Expire - X Days Left
Line Error Active
Line Error Restored
Local I/O Executed
Function List
Loitering
Loitering Restored
Lottery Pay Out
Lottery Sale
Event
Key Override
Keypad Fire
Lamp Test Activated
Line Error Active
Cancelled Line Error
Local I/O Executed
Function List
Loitering
Loitering Restored
Lottery Pay Out
Lottery Sale
System
System
System
Video
Video
POS
POS
Event Type
System
Fire
Fire
Fire
System
Description
Generated when the key override is used in a Mortise lockset. Not supported in
Cylindrical lockset.
A fire alarm has been generated from a keypad.
Generated when the lamp test is activated.
When a lamp test is activated the AM-2020 will send out a command sequence to display a set of solid blocks on the hardware’s LCD.
Generated when the lamp test successfully completes.
Generated when the system license is reaching its expiration date. This alarm is dependent on linkage server being configured and running on a host workstation. It is advised that this alarm be configured to be e-mailed to the system administrator.
For more information, refer to Send an E-mail
Note:
In order for the alarm to be reported to monitoring stations there must be at least one panel configured and marked online.
The panel does not need to exist or actually be online in Alarm
Monitoring, it simply needs to exist in the System Status view.
Note:
This event must be available as an input event to use the Global I/O output action. Make sure it is available to be sent out via
DataConduIT.
Generated when a line error fault condition has been detected.
Generated when the line error fault condition was restored.
Generated when a local I/O function list has been activated.
Generated when a loiterer is detected.
Generated 8 seconds after the last detection of a Loitering event.
Generated when a lottery pay out has occurred.
Generated when an event for a lottery sale has occurred.
504 —
revision 1
Alarm Monitoring User Guide
Alarm
Low Voltage
Event
Low Voltage
Low Voltage Restored Low Voltage Restored
Manufacturer Coupon
Manufacturer Coupon
Redemption
Max Assets Reached
Manufacturer Coupon
Manufacturer Coupon
Redemption
Max Assets Reached
Event Type
System
System
POS
POS
System
Max Biometric
Templates Reached
Max Cardholders
Reached
Merchandise Returned
Miscellaneous Tender
Module Active
Module Clear
Motion Detected (AI)
Max Biometric
Templates Reached
Max Cardholders
Reached
Merchandise Returned
Miscellaneous Tender
Module Active
Module Clear
Motion Detected (AI)
System
System
POS
POS
Fire
Fire
Video
Description
Generated when a low voltage condition has been detected at the device.
Generated when a device resumes its proper voltage.
Indicates a manufacturer coupons.
Transaction generated for a manufacturer coupon redemption.
Generated during a download when the number of assets exceeds the maximum value configured for the controller. Only the maximum number of assets will be downloaded (all others will be ignored).
Generated during a download when the number of biometric templates exceeds the maximum value configured for the controller. Only the maximum number of templates will be downloaded (all others will be ignored).
Generated during a download when the number of cardholders exceeds the maximum value configured for the controller. Only the maximum number of cardholders will be downloaded (all others will be ignored).
Generated when merchandise is returned.
Generated when miscellaneous tender is used.
Generated when a monitor or control module connected to the system becomes active. The device label assigned to this device and the zone label assigned to the first zone programmed for this device will be included with the event.
Generated when a monitor or control module connected to the system is no longer active. The device label assigned to this device and the zone label assigned to the first zone programmed for this device will be included with the event.
Generated when motion has been detected on a given input channel (camera). Motion is considered any change in the environment within the field of view of the camera.
revision 1
— 505
B: Alarm/Event Descriptions
Alarm
Motion Detected (AI)
Restored
Event
Motion Detected (AI)
Restored
Event Type
Video
Muster Mode Reset
Muster Mode Start
Negative Tax
Negative Total
Network Utilization
Threshold Exceeded
Network Utilization
Threshold Restored
Muster Mode Reset
Muster Mode Start
Negative Tax
Negative Total
Network Utilization
Threshold Exceeded
Mustering
Mustering
POS
POS
System
No Biometric Template
Data
No Biometric Template
Data
Biometric
Non-Fire Active
Non-Fire Active
Cleared
Not Configured
No Sale
Object Crosses a
Region
Object Crosses a
Region Restored
Object Detection
Object Detection
Restored
Object Left Behind
Object Left Behind
Restored
Object Lurking
Network Utilization
Threshold Restored
Non-Fire Active
Non-Fire Active
Cleared
Not Configured
No Sale
Object Crosses a
Region
Object Crosses a
Region Restored
Object Detection
Object Detection
Restored
Object Left Behind
Object Left Behind
Restored
Object Lurking
System
System
System
System
POS
Video
Video
Video
Video
Video
Video
Video
Description
Generated when motion has been restored
(is no longer detected) on a given input channel (camera). Motion is considered any change in the environment within the field of view of the camera.
Generated when muster mode is reset.
Generated when muster mode is started.
Generated when negative tax is used.
Generated when there is a negative total.
Generated by an LNVR recorder when current Network activity levels exceeds the user defined limit.
Generated by an LNVR recorder when the current Network activity level dropped below the user defined limit.
Generated when no biometric template data was available from the biometric reader at the end of a verification sequence.
An event indicating a non fire related alarm condition is active.
An event indicating a non fire related alarm condition is no longer active.
Generated when a device has not been configured or defined by the host.
Transaction generated for a no sale.
Generated when an object is detected in the process of crossing a user-specified region.
Generated 8 seconds after the last detection of an Object Crosses a Region event.
Generated when an object complying with user-specifications is detected.
Generated 8 seconds after the last detection of an Object Detection event.
Generated when a foreground object is left for more than a pre-specified duration.
Generated when the left object was taken or the background (after a certain time interval) is relearned.
Generated when a moving object stops or slows down for at least 7 seconds.
506 —
revision 1
Alarm Monitoring User Guide
Alarm Event Event Type
Object Lurking
Restored
Object Lurking
Restored
Video
Object Moves Too Fast Object Moves Too Fast Video
Object Moves Too Fast
Restored
Object Starts to Move
Object Moves Too Fast
Restored
Object Starts to Move
Video
Video
Object Starts to Move
Restored
Object Removed
Object Starts to Move
Restored
Object Removed
Video
Video
Object Removed
Restored
Object Stops
Object Stops Restored
Open Door Command
Issued - Door Used
Open Door Command
Issued - Door Used
Open Door Command
Issued - Door Not Used
Open Line Active
Open Line Restored
Override
Preprogrammed Price
Panel Download
Completed
Panel Download
Started
Panel Event Capacity
Exceeded - Events
Overwritten
Panel Free Memory
Low
Object Removed
Restored
Object Stops
Object Stops Restored
Open Door Command
Issued - Door Not Used
Open Line Active
Cancelled Open Line
Override
Preprogrammed Price
Full Panel Download
Completed
Full Panel Download
Started
Panel Event Capacity
Exceeded - Events
Overwritten
Panel Free Memory
Low
Video
Video
Video
System
System
System
System
POS
System
System
System
System
Description
Generated 8 seconds after the last detection of an Object Lurking event.
Generated when a moving object is detected in a scene with a speed that exceeds the user-specified rate.
Generated 8 seconds after the last detection of an Object Moves Too Fast event.
Generated when a monitored object begins moving.
Generated 8 seconds after last detection of an Object Starts to Move event.
Generated when a background object is removed.
Generated when the object is returned to its original location or the background (after a certain time interval) is relearned.
Generated when a foreground object stops.
Generated 8 seconds after the last detection of an Object Stops event.
Indicates that a command was issued to open the door and the door was used. This can be for a locally generated open door command or one from the host.
Indicates that a command was issued to open up the door and the door was not used.
This can be for a locally generated open door command or one from the host.
Generated when an open line fault condition has been detected.
Generated when the open line fault condition was restored.
Generated when the preprogrammed price is overridden.
Generated when a database download to the controller has completed.
Generated when a database download to the controller has started.
Generated when the event log in the panel fills up and starts overwriting old events.
Generated when the free memory in the panel (controller) is below what is determined to be a safe value.
revision 1
— 507
B: Alarm/Event Descriptions
Alarm
Panel ID Mismatch
Panel Options
Mismatch
Event
Panel ID Mismatch
Panel Options
Mismatch
Panel Power Up
Complete
Panic Abort
Panic Alarm
Panic Alarm Restore
Panel Power Up
Complete
Panic Abort
Panic Alarm
Panic Alarm Restore
Pay Out
Payment of Refund to
Customer
Payment Toward
Charge Account
Balance
People Counting
Pay Out
Payment of Refund to
Customer
Payment Toward
Charge Account
Balance
People Counting Video
POS
POS
POS
System
Trouble
Trouble
Trouble
People Entry Rate Too
High
People Entry Rate Too
High
Video
People Entry Rate Too
High Restored
People Entry Rate Too
High Restored
Video
People Entry Rate Too
Low
People Entry Rate Too
Low
Video
People Entry Rate Too
Low Restored
People Entry Rate Too
Low Restored
Video
People Exit Rate Too
High
People Exit Rate Too
High
Video
Event Type
System
System
Description
Generated when the panel (controller) has a different ID than what is in the database.
This can happen if a new panel or replacement panel is placed out in the field.
A download to the panel should correct the problem.
Generated when the options inside of the panel differ from what the panel is currently configured for in the database. This can happen if the panel options change and a download is not issued to the panel. To correct this situation, a download should be issued to the panel.
Generated when the panel power up is complete.
Generated when a panic alarm has been manually aborted/canceled.
Generated when emergency assistance has been manually requested.
Generated when the panic alarm has been restored.
Generated when a payout takes place.
Generated when a payment or refund is given to a customer.
Generated when a payment toward an account balance.
Generated when the count was updated
(usually within a short delay after an individual passes).
Generated when the number of entering people rises above the limit during the specified time interval.
Generated when the number of entering people returns to a value below the limit during the specified time interval.
Generated when the number of entering people falls below the limit during the specified time interval.
Generated when the number of entering people returns to a value above the limit during the specified time interval.
Generated when the number of exiting people rises above the limit during the specified time interval.
508 —
revision 1
Alarm Monitoring User Guide
Alarm
People Exit Rate Too
High Restored
People Exit Rate Too
Low
People Exit Rate Too
Low Restored
Pick Up
Point Enabled
Point Disabled
Poor Video Visibility
Event
People Exit Rate Too
High Restored
People Exit Rate Too
Low
People Exit Rate Too
Low Restored
Pick Up
Point Enabled
Point Disabled
Poor Video Visibility
Poor Video Visibility
Restored
Power Failure Active
Poor Video Visibility
Restored
Power Failure
Power Failure Restored Cancelled Power
Failure
Pre-Alarm Pre-Alarm
Pre-Alarm Clear
Price Lookup
Pre-Alarm Clear
Price Lookup
System
POS
Quantity or Weight
Reader Input Tamper
Active
Reader Input Tamper
Restored
Reader Low Battery
Reader Low Battery
Restored
Reader Mode Card and
Pin
Reader Mode Card
Only
Reader Mode Facility
Code
Quantity or Weight
Reader Input Tamper
Reader Input Tamper
Cancelled
Reader Low Battery
Reader Low Battery
Restored
Reader Mode Card and
Pin
Reader Mode Card
Only
Reader Mode Facility
Code
POS
System
System
System
System
System
System
System
Video
System
System
System
Event Type
Video
Video
Video
Description
Generated when the number of exiting people returns to a value below the limit during the specified time interval.
Generated when the number of exiting people falls below the limit during the specified time interval.
Generated when the number of exiting people returns to a value above the limit during the specified time interval.
Transaction indicating a pick up has occurred.
POS
System
System
Video Generated when indefinite edges are present in the video image likely caused by environmental factors such as fog or glare.
Generated when the video quality returns to an acceptable level.
Generated when a power failure condition has been detected.
Generated when the power failure condition was restored.
An event indicating a pre-alarm condition is active.
An event indicating a pre-alarm condition is no longer active.
Generated when a price lookup has taken place.
An event indicating a quantity or weight.
Generated when the reader input tamper has gone active.
Generated when the reader input tamper was restored.
Generated when a reader has a low battery.
Generated when a reader low battery condition has been restored.
Generated when the reader mode has changed to “Pin and Card” for the device.
Generated when the reader mode has changed to “Card Only.”
Generated when the reader mode has changed to “Facility Code Only.”
revision 1
— 509
B: Alarm/Event Descriptions
Alarm
Reader Mode First
Card Unlock
Reader Mode Locked
Event
Reader Mode First Card
Unlock
Reader Mode Locked
Event Type
System
System
Reader Mode Pin or
Card
Reader Mode Pin or
Card
System
Reader Mode Unlocked Reader Mode Unlocked System
Reader Motor Stalled
Reader Motor Stalled
Restored
Reader Reset
Reader Motor Stalled
Reader Motor Stalled
Restored
Reader Reset
System
System
System
Register X Report
Register Z Report
Rejected Biometric
Score
Relay Contact
Activated
Relay Contact
Deactivated
Removed Object
Removed Object
Restored
Register X Report
Register Z Report
Rejected Biometric
Score
Relay Contact
Activated
Relay Contact
Deactivated
Removed Object
Removed Object
Restored
POS
POS
Biometric
System
System
Video
Video
Description
Generated when the reader mode has changed to “First Card Unlock.”
Generated when the reader mode has changed to “Locked.”
Generated when the reader mode has changed to “Pin or Card” for the device.
Generated when the reader mode has changed to “Unlocked.”
Generated when the motor stalls on a reader.
Generated when a motor stalled condition has been restored.
Generated when the firmware resets the reader. This can happen if the reader is brand new or in the case of a failed/ incomplete download. Internal conditions, such as a possible corrupt memory, can also cause the firmware to reset. In these cases, the firmware will rewrite its entire storage with default values, overwriting the downloaded values. When this happens, the user must reprogram the lockset.
Indicates a X report was generated. X reports are financial, end of day, clerk, etc. reports.
Indicates a Z report was generated. Z reports are the same as X reports, but resets totals to zero.
This event returns the rejected biometric score (the actual denied event is sent separately).
Generated when a relay contact was activated.
Generated when a relay contact was deactivated.
Generated when an object which was part of the background is detected as missing.
Generated when the object is returned to its original location or the background (after a certain time interval) is relearned.
510 —
revision 1
Alarm Monitoring User Guide
Alarm
Request to Exit - Door
Used
Event
Request to Exit - Door
Used
Event Type
System
Request to Exit - Door
Not Used
Retrieved
Ringing
Sales Subtotal
Schedule Change
Schedule Executed
Retrieved
Ringing
Sales Subtotal
Schedule Change
Schedule Executed
Intercom
Intercom
POS
System
System
Scheduler Action
Executed
Scheduler Action
Failed
Security Alarm
Acknowledge
Security Alarm Block
Acknowledge
Security Alarm In
Scheduler Action
Executed
System
Scheduler Action Failed System
Security Alarm
Acknowledge
Security Alarm Block
Acknowledge
Security Alarm In
Fire
Fire
Fire
Security Alarm Out Security Alarm Out Fire
Shorted Line Active
Shorted Line Restored
Signal Silence
Request to Exit - Door
Not Used
Shorted Line Alarm
Active
Canceled Shorted Line
Signal Silence
System
System
System
Fire
Description
Generated when the request to exit is granted and the door is used.
Note:
If the Assumed Door Used checkbox is selected on the
Readers form, then the door is assumed to be used. This might interfere with this event.
Generated when the request to exit is granted and the door is not used.
Note:
If the Assumed Door Used checkbox is selected on the
Readers form, then the door is assumed to be used. This might interfere with this event.
Generated when a phone call is retrieved/ answered.
Generated when an intercom station/phone is ringing.
A transaction that reports the sale subtotal
Generated when a schedule, added in the
Scheduler, is changed.
Generated when a schedule, added in the
Scheduler, is executed.
Generated when a scheduler action has executed.
Generated when a scheduler action has failed.
Generated when a security alarm has been acknowledged.
Generated when all security alarms have been acknowledged at the fire panel.
Generated when a new security alarm has been detected for the device.
Generated when a device with a previous security alarm has returned to its normal state.
Generated when a shorted line fault condition has been detected.
Generated when a device with a shorted line fault condition has returned to its normal state.
Generated when the alarm signal on the hardware has been silenced.
revision 1
— 511
B: Alarm/Event Descriptions
Alarm
Smart Card
Authentication Failed
Smart VMD
Smart VMD Restored
Smoke Detection
Smoke Detection
Restored
Status In
Status - Missing Fire
Supervision
Status Out
Storage Failure
Store Coupon
Supervisory
Acknowledge
Supervisory Block
Acknowledge
Supervisory In
Supervisory Out
Event
Smart Card
Authentication Failed
Smart VMD
Smart VMD Restored
Smoke Detection
Smoke Detection
Restored
Status In
Status - Missing Fire
Supervision
Status Out
Storage Failure
Store Coupon
Supervisory
Acknowledge
Supervisory Block
Acknowledge
Supervisory In
Supervisory Out
Event Type
System
Video
Video
Video
Video
Fire
Fire
Fire
Video
POS
Fire
Fire
Fire
Fire
System Reset System Reset Fire
Tax Amount
Taxable Subtotal
Timeout Exceeded - No
Second Card
Tax Amount
Taxable Subtotal
Timeout Exceeded - No
Second Card
POS
POS
Area Control
Time Out-Of-Sync Time Out-Of-Sync Video
Time Out-Of-Sync
Restored
Time Out-Of-Sync
Restored
Video
Description
Generated when a smart card authentication failed.
Generated when a change is detected.
Generated 8 seconds after the last detection of a Smart VMD event.
Generated when smoke has been detected for the specified amount of time.
Generated 8 seconds after the last detection of a Smoke Detection event.
Generated when a status reporting device is active.
Fire supervision is missing.
Generated when a status reporting device has returned to the inactive state.
Indicates that something is wrong related to recording/retrieving video to/from hard drives. Includes LNVR database failure.
Indicates a store coupon.
Generated when a supervisory condition has been acknowledged.
Generated when all supervisory conditions have been acknowledged at the fire panel.
Generated when a new supervisory condition has been detected for the device.
Generated when a device with a previous supervisory condition has returned to its normal state.
Generated when the fire panel has been reset.
Event that indicates the tax amount.
Transaction that reports the taxable subtotal
Generated when no second card was presented within the time limit for the area/ reader using two-man control.
Generated when the time stamp feature is enabled and the time on the camera has a difference of 20 seconds or more from the video recorder time.
Generated when the time difference between the camera and video recorder returns to less than 20 seconds.
512 —
revision 1
Alarm Monitoring User Guide
Alarm
Total Amount Due
Transaction Number
Transfer, Diagnostics
Transfer, History
Transfer, PDA To Lock
Transferred Call
Transmitter Alarm
Transmitter Alarm
Restored
Transmitter Inactivity
Event
Total Amount Due
Transaction Number
Transfer, Diagnostics
Transfer, History
Transfer, PDA To Lock
Transmitter Alarm
Transmitter Alarm
Restored
Transmitter Inactivity
Event Type
POS
POS
System
System
System
Intercom
Transmitter
Transmitter
Transmitter
Transmitter Low
Battery
Transmitter Low
Battery Restored
Transmitter Pre-Tilt
Transmitter Tilt
Disabled
Transmitter Tilt
Enabled
Transmitter Low
Battery
Transmitter Low
Battery Restored
Transmitter Pre-Tilt
Transmitter Tilt
Disabled
Transmitter Tilt
Enabled
Transmitter
Transmitter
Transmitter
Transmitter Pre-Tilt
Restored
Transmitter Pull Cord
Alarm
Transmitter Pull Cord
Restored
Transmitter Tamper
Transmitter Tamper
Restored
Transmitter Temporary
Tilt Disable
Transmitter Tilt
Transmitter Pre-Tilt
Restored
Transmitter Pull Cord
Alarm
Transmitter Pull Cord
Restored
Transmitter Tamper
Transmitter Tamper
Restored
Transmitter Temporary
Tilt Disable
Transmitter Tilt
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Description
Transaction indicating the total amount due.
Event Generated that indicates the transaction number of the sales transaction.
Generated when a user is connected to the device for diagnostic purposes.
Generated when a history data was transferred from the device to the parent device.
Generated when the device (lockset) is programmed/reprogrammed through a download from a PDA.
Generated if an intercom call is transferred.
Generated when the button or input on a transmitter has been activated.
Generated when the transmitter alarm has been restored.
Transmitter has been inactive longer than the supervision interval
Transmitter low battery alarm
Generated when a transmitter low battery has been restored.
Generated when the transmitter is in the pretilt state.
Generated when the transmitter has returned to normal from the pre-tilt state.
Generated when the pull cord on a transmitter has been pulled and is in alarm.
Generated when the transmitter pull cord alarm has been restored.
Transmitter tamper alarm.
Generated when a transmitter tamper has been restored.
Generated when the transmitter temporary tilt has been disabled.
Generated when a tilt condition on the transmitter has been detected.
Generated when the transmitter tilt function has been disabled.
Generated when the transmitter tilt function has been enabled.
revision 1
— 513
B: Alarm/Event Descriptions
Alarm
Transmitter Tilt
Restored
Transmitter
Acknowledge
Transmitter No
Response
Transmitter Touch
Alarm
Transmitter Removal
Alarm
Trouble Acknowledge
Trouble Bell #
Trouble Out
Unanswered Call
Unexpected Access
Unexpected Access
Attempt
Unknown Elevator
Terminal
Event
Transmitter Tilt
Restored
Transmitter
Acknowledge
Transmitter No
Response
Transmitter Touch
Alarm
Transmitter Removal
Alarm
Trouble Acknowledge
Trouble Acknowledge
Clear
Trouble Acknowledge
Clear
Trouble Bell 1 or 2
Trouble Bell # Restore Trouble Bell 1 or 2
Trouble Block
Acknowledge
Trouble In
Restore
Trouble Block
Acknowledge
Trouble In
Trouble Out
Unanswered Call
Unexpected Access
Unexpected Access
Attempt
Unknown Elevator
Terminal
Event Type Description
Transmitter
Transmitter
Transmitter
Transmitter
Transmitter
Generated when the tilt condition on the transmitter has been restored.
This event is reported when an alarm generated by a transmitter has been acknowledged.
This event is reported when an alarm generated by a transmitter has not been acknowledged.
Alarm generated by a transmitter when the item it is protecting is touched.
Alarm generated by a transmitter when an item it is protecting is removed.
Fire
Fire
Relay/Sounder Generated when Trouble bell 1 or 2 is in alarm.
Relay/Sounder Generated when Trouble bell 1 or 2 is restored.
Fire Generated when all trouble conditions have been acknowledged at the fire panel.
Fire
Generated when a trouble condition that has been cleared from the system has been acknowledged by a user.
Fire
Generated when a new trouble condition has been detected for the device.
Generated when a device with a previous trouble condition has returned to its normal state.
Intercom
Generated when the trouble condition has been acknowledged.
System
System
System
Generated if a ringing intercom call goes unanswered.
Generated when a user successfully exits using an unexpected exit reader, after gaining access to a specific entry reader, and the “must proceed to exit readers” option is enabled.
Generated when a user attempts to exit using an unexpected exit reader, after gaining access to a specific entry reader, and the “must proceed to exit readers” option is enabled.
Generated when an elevator terminal is detected that has not been configured in the system.
514 —
revision 1
Alarm Monitoring User Guide
Alarm
Unknown User
Command
Untyped Abort
Untyped Alarm
Update: Now able to
Achieve Current
Required Storage
Setting
Use Limit Exceeded
User Failed to Reach
Destination
User Generated Video
Event
Value Added
Video Event Threshold
Reached
Value Added
Video Event Threshold
Reached
Video Failover Failed
Event
Unknown User
Command
Untyped Abort
Untyped Alarm
Update: Now able to
Achieve Current
Required Storage
Setting
Use Limit Exceeded
User Failed to Reach
Destination
User Generated Video
Event
Video Failover Failed
Event Type
System
Trouble
Trouble
Untyped Alarm Restore Untyped Alarm Restore Trouble
Untyped Bypass Untyped Bypass Trouble
System
Denied
System
Video
POS
Video
Video
Description
Generated when an unknown user command is entered through a reader. For example, if a cardholder enters the command *1234#
(where that command means nothing) an unknown user command alarm is sent to
Alarm Monitoring. The numbers entered as the command are used as the event text for the alarm.
Generated when an alarm for a device of an unknown type has been aborted/canceled.
Generated when an alarm for a device of unknown type occurs.
Generated when the device of an unknown type is restored.
Generated when a device of an unknown type has been bypassed.
Generated by an LNVR recorder when the recording rate drops to allow the video storage to be full in the same or more number of days than defined by the user.
Access was denied because the use limit for the badge has been exceeded.
Generated when a user fails to exit at a specific exit reader, after gaining access to a specific entry reader, before the timeout value expires.
Video events are typically created automatically by the system based on an event from an external device. This allows the user to generate an event that is not tied to any device. It can be created from any camera with any user defined time limit from within the video player window in
Alarm Monitoring. This event can then be included in reports, or have a trace performed like any other event in the system.
Event that indicates value added.
Generated when the user-defined event threshold has been reached and exceeded.
(The percent of disk space used by video events has been reached, typically signaling the archive server to start archiving or purging.)
Generated when the camera is configured for failover and failover cannot be activated on this camera.
revision 1
— 515
B: Alarm/Event Descriptions
Alarm
Video Failover
Restored
Video Failover Started
Video Overflow
Restored
Video Failover Started
Video Overflow
Restored
Video
Video
Video Overflow Started Video Overflow Started Video
Video Server Disk Full
Video Server is Not
Recording
Video Source Signal
Lost
Video Source Signal
Restored
Event Event Type
Video Failover Restored Video
Video Server Disk Full
Video Server is Not
Recording
Video Source Signal
Lost
Video Source Signal
Restored
Video
Video
Video
Video
Description
Generated when the camera is configured for failover and secondary recorder is currently recording video from the camera and secondary recorder determined that the primary recorder came back online and started recording video from the camera.
Secondary recorder will stop recording video from the camera. Alarm Monitoring users should log off of the application and back on when the primary recorder comes back online.
Generated when the camera is configured for failover and secondary recorder determined that the primary recorder is not recording video from the camera, so secondary recorder starts recording from this camera. Alarm Monitoring users should log off of the application and back on when failover occurs.
Generated when the recorder is no longer having troubles handling incoming video.
Generated when the recorder determined that it cannot handle incoming video.
Usually it happens when hard drive or CPU utilization is close to 100%, so recorder cannot keep up with amount of video.
Generated when the user-defined event threshold has been exceeded by 5% or more. (The percent of disk space used by video events has been exceeded by at least
5%, typically signaling the archive server to start archiving or purging.) If a user-defined event threshold has not been defined, this alarm/event will be generated when the video server disk space is 75% full of video events.
Generated when it has been detected that the video recorder is no longer recording. A check is done periodically (default is every
10 minutes) to check to make sure that video is still being recorded. This event is generated when the check fails.
Generated when the video signal from a channel is lost from the video server. This alarm may be accompanied by a
Communications Lost alarm.
Generated when the video signal from a channel is restored to the video server. This alarm maybe accompanied by a
Communications Restored alarm.
516 —
revision 1
Alarm Monitoring User Guide
Alarm
Video Storage
Unavailable
Void or Error
Correction
Walk Test ##
Walk Test Uninstalled
Walk Test
Unprogrammed
Event
Video Storage
Unavailable
Void or Error
Correction
Walk Test ##
Walk Test Uninstalled
Walk Test
Unprogrammed
Walk Test Untest Walk Test Untest Fire
Warning: Unable to
Achieve Current
Required Storage
Setting
Warning: Unable to
Meet Required Storage
Setting! Deleting
Oldest Video
Wireless Smoke
Detector
Warning: Unable to
Achieve Current
Required Storage
Setting
Warning: Unable to
Meet Required Storage
Setting! Deleting Oldest
Video
Wireless Smoke
Detector
System
System
Fire
Event Type
Video
POS
Fire
Fire
Fire
Description
Generated when the recorder cannot record video to a drive.
Transaction that indicates a void or error correction
Generated when walk test ## is initiated. A walk test is used to test devices in the system and report devices addressed incorrectly. The device and the first zone programmed for this device are reported with each message.
Generated when the reported device was part of a walk test and has been physically disconnected from the system.
Generated when the reported device was part of a walk test and has been removed from the system (it is not longer configured in the system).
Generated when the reported device is no longer being tested (part of a walk test).
Generated by an LNVR recorder when video storage will be full in less number of days than defined by the user.
Generated by an LNVR recorder when there is no space available to record to, so the oldest file will be deleted in order to continue recording.
A wireless smoke detector has generated an alarm.
revision 1
— 517
B: Alarm/Event Descriptions
518 —
revision 1
Alarm Monitoring User Guide
Appendix C: Reports
Note:
Reports are installed when Database Setup is run. All reports are installed on the database server under the ReportTemplates subdirectory in the B.A.S.I.S. installation path. By default, this location is C:\Program
Files\B.A.S.I.S.\ReportTemplates.
Refer to the release notes for the versions of Seagate Crystal Reports that are supported. The release notes are located on the root of the B.A.S.I.S. installation disc.
Report name
Access Denials and
Grants, by Reader
Access Denials,
Grants and Other
Badge Events
Access Denied
Events
Access Denied
Events, by Reader
Access Granted
Events
Access Granted
Events, by Reader
Access Groups
Access Groups With
Levels
Access Level
Assignments to
Cardholders
Access Level
Assignments to
Cardholders By
Segment
Access Levels
Access Panels
Active Visits by
Cardholder Name
Active Visits by
Visitor Name
Alarm
Acknowledgments
Description
Access Denied and Granted Events, grouped by Reader
All badge-related events, including time, reader, badge and cardholder name.
All Access Denied events, including time, reader, badge and cardholder name.
Access Denied Events, grouped by reader.
All Access Granted events, including time, reader, badge and cardholder name.
Access Granted events, grouped by Reader
Lists all Access Groups and the Access Levels contained in each group.
Access Group definitions including access level details.
Listing of each Access Level, with each cardholder that has that access level assigned to them. Also summarizes the total number of badges that need to be downloaded.
Listing of each Access Level by Segment, with each cardholder that has that access level assigned to them. Also summarizes the total number of badges that need to be downloaded to each segment. This report is valid only for systems that use the Segmentation feature.
Access Level definitions.
Access Panel definitions.
Listing of each active visit, grouped by cardholder name.
Listing of each active visit, grouped by visitor name.
All alarm acknowledgments, including the alarm information and acknowledgment notes.
revision 1
— 519
C: Reports
Report name Description
Alarm
Acknowledgments, by Definition
Alarm
Acknowledgments, by Operator
All alarm acknowledgments, grouped by alarm definition.
All alarm acknowledgments, grouped by system operator.
Alarm
Acknowledgments, by Panel
All alarm acknowledgments, grouped by panel.
Alarm Configuration Alarm configuration summary.
Alarm Input Events
Alarm Panel Inputs
Alarm Panel Local
Linkage
All Alarm Input events by date.
Definition of all Alarm Panel Inputs, grouped by Access Panel and Alarm Panel.
Lists alarm input/output local links on alarm panels.
Alarm Panel Outputs Definitions of Alarm Panel Outputs, grouped by Access Panel and Alarm Panel.
Alarm Panels Definition of all Alarm Panels, grouped by Access Panel.
All Events Over
Time
A listing of all event types over time.
All Events Over
Time With Unique
Alarm ID
Anti-Passback
Events
Area Anti-Passback
Configuration
Area Entrance
History
Asset Classes
A listing of all event types over time with their unique alarm IDs included. This report displays the selected event types that occurred over a specific time and the unique alarm ID associated with each event type.
All anti-passback events over time.
Lists all anti-passback areas, including the reader entrances and exits.
History of all cardholders entering anti-passback areas, sorted by area and date.
Asset Events
Asset Groups
Asset Types
Assets by Scan ID
Assets by Type
Assigned Assets by
Cardholder
Assigned Assets by
Scan ID
Assigned Assets by
Type, Scan ID
Listing of each asset class.
Listing of each asset event.
Listing of each asset group.
Listing of each asset type.
Listing of each asset, grouped by Scan ID.
Listing of each asset, grouped by type.
Listing of each asset, grouped by cardholder.
Listing of each assigned asset, grouped by Scan ID.
Listing of each assigned asset, grouped by type and Scan ID.
520 —
revision 1
Alarm Monitoring User Guide
Report name
Audio Notifications and Instructions
Badge Type
Configuration badges by Deactivate
Date
Badges Without
Access Levels
Card Formats
Cardholder Access to
Readers
Cardholder Exit/
Entry
Cardholder Guest
Access to Readers
Cardholder Photo
Gallery
Cardholder Time and
Attendance
Cardholders by
Badge Type
Cardholders by Last
Name
Description
Lists all audio notifications and instructions in the database.
Lists all badge types that have been configured in the system.
Listing of all badges by deactivate date. Can be used to determine which badges are about to expire.
Lists those badges that don’t have access level assignments.
Definitions of all Magnetic and Wiegand card formats in the system. This combined report replaces the Magnetic Card Formats and Wiegand Card Formats reports that were available with previous software releases.
Listing of each Reader and which cardholders have access to that reader. Includes the associated Access Level and Timezone.
Displays user-defined Exit/Entry on a per-cardholder basis. In order for this report to work, readers must be designated as a ‘Time and Attendance’ Entrance or Exit reader on the
Readers/Controls page. This report is not an Area APB report.
Listing of each Reader, and which cardholders have access to that reader. Includes the associated Access Level and Timezone.
All cardholder photos, sorted by name.
Pairs each in-time with an out-time for cardholders gaining entry to time and attendance readers.
All cardholders sorted by badge type, no access levels shown.
Note:
ONLY personnel with badges assigned will be included in this report!
All cardholders sorted by last name, with badges but no access levels.
Note:
ONLY personnel with badges assigned will be included in this report!
List of the cardholders located in each anti-passback area, sorted by area and date Cardholders Located in Each APB Area, by Date
Cardholders Located in Each APB Area, by Name
Cardholders with
Access, by Badge
Type
List of the cardholders located in each anti-passback area, sorted by area and cardholder name
List of any access and precision access levels the cardholders have, sorted by badge type.
Note:
ONLY personnel with active badges AND access levels will be included in this report!
revision 1
— 521
C: Reports
Report name Description
Cardholders with
Access, by Last
Name
List of any access and precision access levels the cardholders have, sorted by last name.
ONLY personnel with active badges AND access levels will be included in this report!
CCTV Instructions
Continuous Video
Current Visits
Destination
Assurance
Configuration
Elevator Access
Denied and Granted
Events
Emergency Events
Enterprise Servers
Event Codes
Event Count By
Panel
Fire Device Input/
Outputs
Global APB/
MobileVerify
Occupancy, By Date
Global APB/
MobileVerify
Occupancy, By
Name
Note:
The Cardholders with Access, by Badge Type and Cardholders with Access,
by Last Name reports replace the following reports from previous B.A.S.I.S. versions:
• Cardholders With Access and Precision by Last Name
• Cardholders With Access Levels, by Badge Type
• Cardholders With Access Levels, by Last Name
• Cardholders With Precision Access, by Last Name
Summary of all CCTV instructions in the database.
Lists all of the times that there has been continuous video archived.
Lists all currently signed in visits.
Lists all entrance readers, their settings and the associated exit readers.
Destination
Assurance Exempt
Cardholders
Lists all cardholders who has a badge that is exempt from destination assurance.
Device Status Events Status events for all devices.
Lists all dialup events by panel.
Dialup Events by
Panel
Dialup Last Connect
Time
Lists the dialup last connect times.
All Access Denied and Granted events, including time, reader, badge, cardholder name and the floor to which access was attempted. All access denials and grants will be shown.
All emergency events over time.
Listing of Enterprise servers defined on this system. This report is valid only for systems that use the Enterprise Management feature.
Event code templates and event code mapping configuration.
Listing of each event counts, grouped by panel.
Lists all fire input/outputs grouped by panel and fire device.
Shows the last known area accessed by each cardholder, sorted by date and time.
Shows the last known area accessed by each cardholder, sorted by name.
522 —
revision 1
Alarm Monitoring User Guide
Report name Description
Global I/O Linkages Lists all of the global I/O linkages, including the input events and output actions.
Guard Tour
Configuration
Lists all of the configured guard tours including checkpoints, actions and messages.
Guard Tour History Lists all of the events, associated with checkpoints, that happened for each guard tour.
Hardware Panels
Holidays
Intercom Functions
Intercom Stations
Listing of all hardware panels.
List of all system holiday definitions.
Listing of all intercom functions.
Listing of all intercom stations.
Lists all intrusion areas grouped by panel.
Intrusion Detection
Areas
Intrusion Detection
Devices
Intrusion Panel User
Groups
Last Location of
Cardholders
Lists all of the intrusion detection devices grouped by panel.
Lists all panel users grouped by panel user groups.
Shows the last reader accessed by each cardholder, sorted by cardholder name.
Maps
MobileVerify User
Transaction Log
MobileVerify User
Transaction Log, By
Operation
MobileVerify User
Transaction Log, By
User ID
Monitor Stations
List of available maps in the database.
Chronological log of all transactions performed.
Chronological log of all transactions performed, grouped by operation.
Chronological log of all transactions performed, grouped by User ID.
Monitor Zones
Overdue Visits
Overstayed Visits
Personal Safety
Transmitter
Assignments
Personal Safety
Transmitters
Personnel in the
Database
Personnel Without an
Active Badge
Shows all alarm monitoring stations defined in the system, including which monitor zones and access panels they are monitoring.
Monitoring Zone definitions.
Lists all scheduled visits that have not signed in.
Lists all visitors logged into the facility, but whose badge or visit has expired.
Listing of all personal safety transmitter assignments.
Listing of all personal safety transmitters.
List of all personnel in the database, with basic information only.
All personnel in the database which do not have an active badge assigned to them.
revision 1
— 523
C: Reports
Report name Description
Personnel,
Organization Details
Personnel, Personal
Details
Point of Sale
Registers
Precision Access
Groups
List of all personnel in the database, with organization details. This report is designed for the standard cardholder layout. It may not work with user-customized cardholder layouts.
List of all personnel in the database, with personal details. This report is designed for the standard cardholder layout. It may not work with user-customized cardholder layouts.
Lists all point of sale registers by point of sale device.
Precision Access Group definitions.
Reader Assignments to Cardholders
Lists all cardholders that have access to a particular reader.
Reader Status Events All reader status events, grouped by reader.
Reader Timezone
Schedules
Reader timezone scheduling for reader modes.
Readers Reader definitions, grouped by Access Panel.
Lists all receiver account areas, grouped by receiver account.
Receiver Account
Areas
Receiver Account
Groups
Lists all receiver account groups and the receiver accounts contained in each group.
Lists all receiver account zones, grouped by receiver account.
Receiver Account
Zones
Receiver Accounts
Receiver Accounts that Failed to Report
Receiver and
Receiver Account
Events
Lists all receiver accounts.
Lists all of the receiver accounts that failed to report during their duration.
All the events that occurred on a receiver or receiver account.
Segment Badge
Download Summary
Segments
SNMP Agents
SNMP Management
Information Base
Configuration
For each segment, lists the count of badges that must be downloaded to the access panels in that segment. This report is valid only for systems that use the Segmentation feature.
Listing of segments defined on the system and their options. This report is valid only for systems that use the Segmentation feature.
Lists all SNMP agents sorted by segment and name.
Lists all MIB data grouped by enterprise.
Text Instructions
Timezones
All text instructions.
Timezone definitions.
User Permissions All system users and their permissions.
User Transaction Log Chronological log of all transactions performed on the system by users.
User Transaction
Log, By User ID
Chronological log of all transactions performed, grouped by User ID.
524 —
revision 1
Report name
Video Camera
Device Links
Video Cameras
Video Events
Video Servers
Visit History
Visitors
Windows Event Log
Errors
Description
Listing of all video camera device links.
Listing of all video cameras.
Listing of all video events.
Listing of all video servers.
Listing of each visit.
Listing of all visitors.
All errors logged by the system to the Windows event log.
Alarm Monitoring User Guide
revision 1
— 525
C: Reports
526 —
revision 1
Alarm Monitoring User Guide
Appendix D: LNVR Network Setup
The LNVR Network Setup tool allows you to enable multicast, fix computers with several network interfaces, and restrict ports usage as well as make them firewall friendly. Install the LNVR Network Setup tool by running LnrNI.exe from the directory: C:\Program Files\Common Files\Lenel. Alternatively, the tool is also provided on the Supplemental Materials disc under Current Digital
Video.
Deliver Live Video to Alarm Monitoring Using IP
Multicast Protocol
Using an IP Multicast protocol to send video is ideal because it saves bandwidth when more than one machine is watching the same video. IP Multicast video is sent once instead of multiple times as with a Unicast protocol.
Live video retrieval from LNVR recorders by default is configured to use UDP/
IP, Multicast, and TCP/IP protocols on any available port. Clients can specify which of these protocol they want to use for each request. The options are to use:
• UDP/IP
• Multicast
If all protocols are selected to be used then your computer will try and use IP
Multicast first but if it fails it will then use UDP/IP. If UDP/IP fails then TCP/IP will be used.
Note:
While you can select to not use UDP/IP and Multicast, TCP/IP is always used as a last resort if the previous methods fail.
Note:
Recorded video is always retrieved using DCOM protocol. DCOM is also used to access LNVR recorder for configuration. It is assumed that DCOM is configured properly and therefore this document does not cover retrieval of recorded video.
To configure your system to use IP Multicast you must:
•
Configure Recorder for IP Multicast
•
Configure Client for IP Multicast
•
Configure Router for IP Multicast
•
Configure Firewall for IP Multicast
revision 1
— 527
D: LNVR Network Setup
LNVR Network Setup Window
The LNVR Network Setup tool has three tabs that are viewable if you have the specific network setups. If you only see one or two of the following tabs do not worry. They are not applicable for your system.
Client Network Settings Form
The Client Network Settings form can be used by all machines and allows you to specify how the client computer receives video data. You can also enable and disable multicast and UDP/IP use.
Note:
The Client Network Settings form only affects client applications. It will not change anything on the server.
Field
Select Network
Interface
Connection
Protocol Settings
Use Multicast
Use UDP/IP
Limit port range
Description
Lists the network interface you wish to setup for LNVR Live Video if you computer has more then one network card.
Area where you select what protocol settings you want to use. These include using Multicast and UDP/IP. You can also choose what ports to use with UDP/IP.
Select for client machines if you wish to use Multicast. Multicast allows more than one computer to view the same video. While this frees up bandwidth some routers and firewalls don’t allow this sort of multicast packets to pass through them.
Select for client machines if you wish to use UDP/IP. UDP/IP allows more than one computer to view the same video. Unlike multicast, though, the video will be sent multiple times which will increase the network load.
Choose which ports should be used for UDP/IP.
528 —
revision 1
Alarm Monitoring User Guide
Field
Use TCP/IP
Description
This is always selected as it is the last method of delivery and there is nothing else to fallback on if all else fails. TCP/IP is preferred over UDP/IP because it is able to deliver much more data. Because of bandwidth and speed issues this should only be used if there are problems with the other methods.
Recorder Network Settings Form
The Recorder Network Settings form can only be used by LNVR machines and allows you to specify the ports used when client computers connect to them using
TCP/IP.
Important:
Multiple recorders should not use the same multicast ports. Doing so causes video frames from the recorders to conflict with each other and become interlaced. Each channel on a recorder should be given its own port.
Field
Recorder TCP/IP
Port
Any Available
Specific
Description
The port used for the LNVR recorder.
Select if you want the LNVR recorder to use any available port on the system.
Select if you want the LNVR recorder to use a specific port if firewalls prevent you from using any port.
The port used for the LNVR first recorder.
First Recorder
Multicast Port
Any Available
Specific
Select if you want the LNVR first recorder to use any available port on the system.
Select if you want the LNVR first recorder to use a specific port if firewalls prevent you from using any port.
revision 1
— 529
D: LNVR Network Setup
IVS Network Settings Form
The IVS Network Settings form can only be used by IVS machines and allows you to specify the ports used when client computers connect to them using TCP/
IP.
Field
IntelligentVideo
Server TCP/IP
Port
Any Available
Specific
Description
The port used for the IVS servers.
Select to use any available port when using TCP/IP with IVS machines.
Select to use a specific port when using TCP/IP with IVS machines if firewalls prevent you from using any port.
LNVR Network Setup Configurations
Configure Recorder for IP Multicast
1. Navigate to the directory: C:\Program Files\Common Files\Lenel.
2. Double-click on LnrNI.exe to run the LNVR Network Setup tool.
3. Alternatively, run the LNVR Network Setup tool from the Supplemental
Materials disc.
4. If it has more than one network interface select the one you would like to use to send multicasts.
5. Click [Apply].
530 —
revision 1
Alarm Monitoring User Guide
Configure Client for IP Multicast
1. Run the LNVR Network Setup tool from C:\Program Files\Common
Files\Lenel\LnrNI.exe or from the Supplemental Materials disc on each
B.A.S.I.S. computer that is going to use Alarm Monitoring to see live video.
2. Select the Use Multicast check box.
3. Click [Apply].
Configure Router for IP Multicast
Most network routers and network devices between LNVR and its clients block
IP Multicast traffic. Refer to the device manual of your specific equipment to see how to enable Multicast on it.
Configure Firewall for IP Multicast
A Firewall between LNVR and its clients can and usually does block both UDP/
IP and IP Multicast traffic. This traffic is one directional communication, so if there are firewalls between LNVR and its clients they must have UDP/IP and IP
Multicast traffic enabled from LNVR to its clients.
It is enough to open ports in one direction only (from LNVR to clients). If a firewall cannot be configured to enable UDP/IP traffic on all ports then a range of ports can be opened instead.
Note:
A client will be able to see no more live video streams from the recorder than number of open ports.
revision 1
— 531
D: LNVR Network Setup
532 —
revision 1
Alarm Monitoring User Guide
Appendix E: Exporting Video
The B.A.S.I.S. installation includes a conversion utility that converts exported video from the LDVR or LNVR native format to an “.asf” format. The “.asf” file format is playable on any machine that has Microsoft’s Windows Media Player and does not require any additional software to play video. The video converter is located at: C:\Program files\Common Files\Lenel\LVConvert.exe.
You can run the conversion utility either from a command line or by launching the utility. To use the standalone video conversion utility to export video, refer to
Convert and Export Video on page 538.
The video converter is also available from within the VideoViewer and Alarm
Monitoring applications. When used standalone, the source file can be changed in the Lenel Video Converter window; when used in Alarm Monitoring and
VideoViewer it cannot. To use the video converter in VideoViewer or Alarm
Monitoring to export video, refer to
Export Video to a File on page 537.
revision 1
— 533
E: Exporting Video
Video Converter Window
Form Element
Source file
Browse
Output file
Browse
Generate Overlay
Image
Customize
Status area
Convert
Close
Help
Comment
Identifies the export file to be converted to the Windows Media format.
Note:
The Source file and Output file fields cannot be modified in Alarm Monitoring or
VideoViewer; they can only be modified when using the standalone version of the video converter.
Search for the export file to be converted to the Windows Media format.
Name of the new file to be created.
Note:
The Source file and Output file fields cannot be modified in Alarm Monitoring or
VideoViewer; they can only be modified when using the standalone version of the video converter.
Search for the location the new file should be created in.
If enabled, additional information such as time and date will be overlaid on the video image. If this check box is selected, the default is to show the date and time in the top-left corner.
Enables the user to customize the format and the content of overlay information.
Updates as the video is exported to show how much video has been exported and how much video still needs to be exported.
Converts the file from its native format to an “.asf” format.
Closes the window without converting the file from its native format to an “.asf” format
.
Displays online help.
534 —
revision 1
Alarm Monitoring User Guide
Video Export Dialog
Form Element
Output Type
Digital Signature
Custom Signature
File Name
Comments
Generate Overlay
Image
Customize
Export
Cancel
Close
Help
Comment
Specifies the format for the exported video:
• Native Format - video format determined by the video recorder
• Windows Media Format - overlay may be applied to the video
Specifies whether the watermarking uses the default or custom key/signature.
For more information, refer to Authenticate a Video File with Watermarking
Specifies a custom digital key/signature.
Note:
The Custom Signature is case sensitive.
Search for the location the new file should be created in.
Text entered in this field will be displayed during the digital signature verification process.
If enabled, additional information such as time and date will be overlaid on the video image. If this check box is selected, the default is to show the date and time in the top-left corner.
Enables the user to customize the format and the content of overlay information.
Saves the recorded video to a file using the configured options.
Aborts the export after the process has begun.
Exits the dialog without exporting the video.
Displays online help.
revision 1
— 535
E: Exporting Video
Customize Overlay Information Dialog
Form Element
Date Location
Time Location
Text Location
Row fields
Text
Change
Transparency
OK
Cancel
Load Settings
Save Settings
Comment
Identifies which corner(s) the date will be printed. Possible values are top-left, top-right, bottom-left, bottom-right, and none. If none is selected, the field will not be shown. The default is to show the date and time in the top-left corner and no text.
Identifies which corner(s) the time will be printed. Possible values are top-left, top-right, bottom-left, bottom-right, and none. If none is selected, the field will not be shown. The default is to show the date and time in the top-left corner and no text.
Identifies which corner(s) the additional text will be printed. Possible values are top-left, topright, bottom-left, bottom-right, and none. If none is selected, the field will not be shown. The default is to show the date and time in the top-left corner and no text.
If more than one piece of information is printed in the same corner, this field allows you to specify if one item should appear above the other one. If the items are on the same row, they will be printed one after the other.
Enter any additional text that you want to appear in the video. For example, the text could identify the location where the video came from.
Allows the user to specify a different font, style, and color of the printed information.
Specifies the transparency level of the printed text where 0 means the text is invisible and 100 means the text is opaque.
Accepts the changes and closes the dialog.
Closes the dialog without applying any changes.
Loads a previously saved overlay configuration.
Saves an overlay configuration.
536 —
revision 1
Alarm Monitoring User Guide
Form Element
Help
Comment
Displays online help.
Video Conversion Procedures
The following procedures are used to convert, export and play video clips.
Note:
The conversion utility converts “.lnr” or “.info/.spfs” files into “.asf” format.
Export Video to a File
This procedure describes using the video converter in VideoViewer or Alarm
Recorded video and audio can be saved/exported to a file. By default the video clip is saved as “.asf” which can be played on any Microsoft Windows Media
Player. In addition, video clips can be saved in Lenel proprietary formats. For
LDVR hardware, proprietary formats include “.info” and “.spfs” files and for
LNVR hardware the proprietary format is “.lnr” files.
Note:
If you have video files in proprietary formats, you can use the conversion utility available at: C:\Program Files\Common
Files\Lenel\LVConvert.exe.
1. While viewing recorded video in the Video Player, select Set Start/End
Date from the Options menu.
2. The Date/Time window opens. Fill in the appropriate dates and times and click [OK].
3. From the Options menu select Export Video. The Video Export Dialog is
displayed.
4. Select the Output Type from the drop-down list. The specific file type is
.
5. Click the [...] button to browse for a location to save the exported video file.
The Save As window opens.
a. Select the file location.
b. Enter the file name.
c. Select the desired file format (*.asf), (*.info), (*.spfs), or (*.lnr).
revision 1
— 537
E: Exporting Video
Note:
The file formats available in the drop down list reflect the output type chosen in Step
d. Click [Save].
6. The Windows Media Format allows the use of an overlay image.
a. Select the Generate Overlay Image check box to overlay the time and date on the video image.
b.
To customize the content of overlay information, click [Customize]. The
7. Click [Export].
Convert and Export Video
This procedure describes using the standalone video conversion utility. When
using the video converter in VideoViewer or Alarm Monitoring, refer to Export
The conversion utility is installed with B.A.S.I.S. and can be executed from a command line as well as by launching the utility.
538 —
revision 1
Alarm Monitoring User Guide
Using the Conversion Utility
1. Navigate to C:\Program Files\Common Files\Lenel.
2. Run the LVConvert.exe program in this directory.
3. The Video Converter window opens. Enter the source file name.
4. Enter the output file name.
5. Optional - Select and customize any overlay information.
6. Click [Convert].
7. Click [Close] when the conversion is complete.
Using a Command Line
1. Click Start, then select Run. The Run dialog opens.
2. Enter “LVConvert.exe -i InputFile.lnr -o
OutputFile.asf [-c ConfigFile.xml] [-s]
” where:
• i specifies the input file
• o specifies the output file
• c (optional) specifies the overlay configuration file. If not specified, overlay information will not be generated.
• s (optional) silent run. If specified the application will not pop up any error/status dialog boxes. This is useful if you are running the application as part of a script.
3. Click [OK].
Play Exported Video Clip Using Windows Media Player
1. Launch the Windows Media Player. On most Windows machines, you can do this by clicking Start, then Programs > Accessories > Entertainment >
Windows Media Player.
2. On the File menu, select Open.
3. Type in the location of the video clip, or click on [Browse] to navigate to it.
4. Click [OK] (or [Open] if you browsed to the file). The video clip will be played in the Media Player window.
Authenticate a Video File with Watermarking
Embedding a watermark in the video file is equivalent to signing a digital identification on the content of the video. If the video is manipulated, the watermark is destroyed. The authenticator can verify whether a received video has been tampered with by attempting to match the signature.
The Watermarking feature allows the individual exporting the video to set a custom digital signature which can later be verified by the recipient of the video file.
revision 1
— 539
E: Exporting Video
Note:
Set a Watermark
1. From the Video Export Dialog
in Alarm Monitoring or VideoViewer, select
“Native Format” from the Output Type drop-down.
2. Select the type of signature, “Custom” or “Default”, from the Digital
Signature drop-down list.
3. If you selected “Custom”, in the Custom Signature text box, enter a key for authentication (case sensitive). The recipient of the file will need to know this key to determine the validity of the video file.
The Default signature type does not require a key for authentication.
Notes:
Authenticate the Watermark
Authentication of the watermark occurs with the stand-alone Lenel Video Player
(LVPlayer.exe).
1. Navigate to the C:\Program Files\Common Files\Lenel directory and run
LVPlayer.exe.
2. From the File menu, select Open File.
3. From the Control menu, select Verify Signature. The Signature Details dialog is displayed.
4. If a custom signature was entered during export, type the key entered in the
Enter Signature text box.
The custom signature is case sensitive.
If the Default signature type was used during export the Enter Signature text box will be grayed out.
5. Click [Verify Signature]. A message will be displayed indicating whether the authentication was successful.
540 —
revision 1
Alarm Monitoring User Guide
Index
A
Access levels
assign to a badge........................................ 232
assign to cardholder group......................... 236
Access Levels form (Cardholders folder)......... 231
procedures.................................................. 232
Accounts ............................................................. 33
Acknowledge an alarm ..................................... 169
Action Group Properties window ..................... 397
Action History/Guard Tour Event Purging
procedures.................................................. 400
Actions .............................................................. 393
procedures.................................................. 397
Activate single or double left-click mode......... 158
Activation dates assign ..................................... 235
Active visits ...................................................... 271
Add
action group ............................................... 398
archive/purge database action.................... 402
arm/disarm area action............................... 406
asset............................................................ 308
asset type/subtype ...................................... 311
automatic guard tour action ....................... 408
cardholder record....................................... 212
columns........................................................ 70
deactivate badge action.............................. 414
device output action................................... 416
device output group action......................... 418
execute function list action ........................ 427
global APB system/segment reset action... 430
ISC database download action................... 432
ISC firmware download action.................. 434
mask/unmask alarm input action ............... 440
mask/unmask alarm input for group action 442
mask/unmask alarm mask group action..... 444
mask/unmask door action .......................... 446
mask/unmask door forced open action ...... 448
mask/unmask door forced open for reader group action........................................ 450
mask/unmask door held open action.......... 452
muster mode initiation action .................... 438
pulse open door action............................... 456
pulse open door group action..................... 458
reader mode action..................................... 460
reader mode group action .......................... 463
readers........................................................ 146
report.......................................................... 327
reset use limit action .................................. 465
set forwarding station action...................... 476
sign out visitor action ................................ 478
silence area action...................................... 480
visit record ................................................. 273
visitor record.............................................. 216
Alarm
icons........................................................... 161
overview ...................................................... 56
pending alarms........................................... 162
Alarm Acknowledgment Reports form
field table ................................................... 352
overview .................................................... 351
Alarm Acknowledgment window..................... 168
Alarm descriptions............................................ 481
Alarm mask groups............................................. 62
Alarm Monitoring Operator Procedures............. 61
Alarm Monitoring overview ............................... 31
Alarm Monitoring window ............................... 182
Alarm Panel Reports form ................................ 333
field table ................................................... 334
overview .................................................... 333
procedures.................................................. 336
Alarms - Muster mode ...................................... 182
Anti-Passback Reports form ............................. 337
field table ................................................... 338
overview .................................................... 337
procedures.................................................. 340
Archive/Purge Database Properties window .... 401
Arm ................................................................... 404
Arm/Disarm Area Properties window .............. 403
field table ................................................... 404
Arrange columns................................................. 70
Asset classes
add ............................................................. 315
Asset Classes form
field table ................................................... 313
modify mode.............................................. 312
procedures.................................................. 314
view mode.................................................. 312
revision 1
— 541
Index
Asset groups
add.............................................................. 315
Asset menu.......................................................... 55
Assets
assign to cardholder ................................... 245
Assets form
Cardholders folder ..................................... 244
procedures.................................................. 245
procedures.................................................. 308
Assign
cardholder to an asset................................. 317
classes to an asset....................................... 314
Assign Intrusion Authority to the Cardholder .. 234
procedures.................................................. 317
Authenticating video files................................. 539
setting a watermark.................................... 540
Automatic Guard Tour
respond to................................................... 377
schedule ..................................................... 376
Automatic Guard Tour Properties window....... 407
B
Badge form ....................................................... 221
procedures.................................................. 226
Badge Print Preview window
field table ................................................... 257
Badges
add or replace record ................................. 226
assign access levels.................................... 232
assign precision access group .................... 239
encode........................................................ 230
Barcodes
Biometrics
search records ............................................ 241
Biometrics form
Cardholders folder ..................................... 240
procedures.................................................. 241
Buffering Video .................................................. 96
C
CAC barcodes ................................................... 198
Camera lookup.................................................... 97
Cameras (surveillance-only)............................. 101
Capture an image .............................................. 102
Cardholder form................................................ 206
procedures.................................................. 212
Cardholder menu................................................. 53
Cardholder menu - bulk sub-menu ..................... 55
Cardholders
assign access levels to cardholder group ... 236
destroy all data........................................... 214
modify segment assignments..................... 219
retrieve recent search results...................... 195
run reports.................................................. 253
search for cardholders................................ 194
Cardholders folder ............................................ 189
Access Levels form ................................... 231
procedures.................................................. 192
procedures.................................................. 411
Checkpoint status and events diagram.............. 378
Checkpoint time................................................ 371
Checkpoints ...................................................... 371
Client Side Caching ............................................ 96
Comparison operators.............................. 193, 269
Configure
wedge scanner............................................ 202
Configure menu .................................................. 47
Control menu ...................................................... 47
Control menu - “current device” sub-menu........ 48
Conventions used in this documentation ............ 31
Convert and export video.................................. 538
Create a video event.......................................... 102
Customize Overlay Information Dialog ........... 536
D
Date/Time Reports form ................................... 341
field table ................................................... 342
overview .................................................... 341
procedures.................................................. 345
procedures.................................................. 414
Deactivation dates assign.................................. 235
Delete
alarm .......................................................... 171
alarm in standard Video Verification window ............................................... 147
alarms (all)................................................. 172
asset ........................................................... 309
badge record .............................................. 230
cardholder record....................................... 213
report.......................................................... 328
542 —
revision 1
Alarm Monitoring User Guide
selected group of cardholder records......... 214
visit record ................................................. 278
visitor record.............................................. 217
Deny or grant access ......................................... 150
Destroy all cardholder data ............................... 214
Device group icons ............................................. 76
Device Groups window ...................................... 74
Device icons........................................................ 77
Device Output Group Properties window......... 417
procedures.................................................. 416
Dialup panels - view last connection time .......... 82
Directory account link ...................................... 246
Disable strong password enforcement ................ 32
Display
monitoring map.......................................... 172
multiple hardware views.............................. 71
scheduler right-click menu ........................ 387
Display options - for users .................................. 67
Document organization....................................... 31
Double and single left-click mode .................... 157
Download
Download reader information to a PDA ........... 255
E
Edit menu............................................................ 44
E-mail form....................................................... 288
Add Recipient window field table ............ 290
Enable strong password enforcement ................. 32
Encode
badges ........................................................ 230
Error messages.................................................... 33
Event Configuration/Search
dialog ......................................................... 104
Event Configuration/Search Dialog
procedures.................................................. 109
Event descriptions............................................. 481
Event Reports form........................................... 346
field table ................................................... 347
overview .................................................... 346
procedures.................................................. 350
Events diagram ................................................. 378
Execute Function List Properties window........ 426
Exit the application ............................................. 42
Export video to a file ........................................ 537
Exporting video
digital signatures........................................ 539
F
Fast/group acknowledge feature ....................... 170
File menu ............................................................ 44
Filter report view .............................................. 329
Find cardholder/visitor associated with a visit . 273
Finished visits ................................................... 271
First card unlock ...................................... 460, 463
G
Generate Event Properties Window.................. 428
Grant / Deny pop-up window ........................... 149
field table ................................................... 150
Procedures ................................................. 150
Grant or deny access......................................... 150
Guard Tour
assign security clearance levels ................. 252
launch a tour .............................................. 375
respond....................................................... 377
schedule automatic .................................... 376
Guard Tours
form (Cardholders folder).......................... 251
procedures.................................................. 252
H
Hardware
tree view ...................................................... 72
update status of ............................................ 80
Hardware view options ....................................... 72
Help menu........................................................... 53
How this document is organized......................... 31
I
Icons
alarm .......................................................... 161
hardware device icons ................................. 77
revision 1
— 543
Index
hardware status icons................................... 78
Images capture .................................................. 102
Import
cardholder data........................................... 207
fingerprints from PIV card......................... 204
Initiate Muster mode......................................... 183
Instant arm ........................................................ 404
IntelligentVideo form
field table ................................................... 114
Interior .............................................................. 404
Intrusion Detection Device Statuses ................... 62
ISC Database Download Properties window.... 431
ISC Firmware Download Properties window... 433
K
Keyboard Wedge Settings window................... 197
L
Late event.......................................................... 371
Launch ................................................................ 99
Guard Tour................................................. 375
Launch video from camera ................................. 99
Left-click mode................................................. 157
Link
cardholder to a directory account .............. 246
Linked maps...................................................... 173
List options ......................................................... 60
Load a video file ............................................... 100
Locate a device ................................................... 82
Logging in
using automatic single sign-on .................... 37
using manual single sign-on ........................ 39
without using single sign-on........................ 34
Logging out of the application............................ 42
Logical Access form
ActivIdentity sub-tab ................................. 248
VeriSoft sub-tab......................................... 249
Lookup a cardholder assigned to an asset......... 318
M
Maps
display........................................................ 172
linked ......................................................... 173
Mask/Unmask Alarm Input Properties window 439
Mask/Unmask Door Forced Open for Reader Group
Properties window ..................................... 449
Mask/Unmask Door Held Open for Reader Group
Properties window ..................................... 453
Mask/Unmask Door Held Open Properties window
Mask/Unmask Door Properties window........... 445
Master arm ........................................................ 404
Menus.................................................................. 43
asset menu ................................................... 55
cardholder menu
bulk sub-menu ..................................... 55
cardholder menu ......................................... 53
current device sub-menu ...................... 48
help ............................................................. 53
options menu................................................ 50
trace menu.................................................... 46
view menu.................................................... 44
window ........................................................ 53
Modify
access levels assignments .......................... 238
asset ........................................................... 309
asset classes assignment ............................ 314
asset group ................................................. 245
badge record .............................................. 227
badges for selected cardholder group ........ 228
cardholder record....................................... 213
cardholder’s permission to have visitors ... 243
group of cardholder’s segments................. 219
report.......................................................... 328
visit record ................................................. 278
544 —
revision 1
Alarm Monitoring User Guide
visitor record.............................................. 217
Monitor (trace)
individual devices ........................................ 87
Monitor Devices ................................................. 73
Monitor video
in matrix view............................................ 118
with multiple cameras (successively) ........ 101
with one specific camera ........................... 100
Move
Multiple hardware views - display...................... 71
Muster mode
alarm .......................................................... 182
initiate ........................................................ 183
reports ............................................... 184, 185
reset............................................................ 183
Muster mode report........................................... 184
O
Occupancy report.............................................. 184
procedures.................................................. 255
Options - right-click.......................................... 151
Options menu...................................................... 50
Overdue event ................................................... 371
Overwrite Facial Image Dialog......................... 205
P
Pan, tilt, and zoom
configure.................................................... 121
control adjustment ..................................... 125
control locking........................................... 128
how to use.................................................. 122
presets ........................................................ 128
tours ........................................................... 132
Password
weak database warning................................ 33
Pending alarms.................................................. 162
Perform a device test........................................... 81
Perimeter........................................................... 404
Perimeter arm.................................................... 404
Permissions
modify cardholder and visitors .................. 243
PIV card
verify fingerprints ...................................... 204
Play exported video .......................................... 539
Precision Access form
Cardholders folder ..................................... 238
procedures.................................................. 239
Precision access groups-assign ......................... 239
Precision access mode ........................................ 60
Pre-configured acknowledgment notes - using. 169
Preview a badge................................................ 259
Preview and print a report................................. 329
badge.......................................................... 259
badge for a visitor...................................... 279
report................................................. 329, 363
Print Report Options window ........................... 362
field table ................................................... 363
PTZ ................................................................... 121
Pulse Open Door Group Properties window..... 457
Pulse Open Door Properties window................ 455
R
Reader Mode Group Properties window .......... 462
Reader Mode Properties window...................... 459
Reader Reports form......................................... 329
field table ................................................... 330
overview .................................................... 329
procedures.................................................. 332
Readers folder
Offline form............................................... 254
Rearrange alarms .............................................. 163
Receiver Account Zone Reports form .............. 356
field table ................................................... 357
overview .................................................... 356
procedures.................................................. 359
Record
add cardholder ........................................... 212
add or replace badge .................................. 226
add visitor .................................................. 216
Refresh actions.................................................. 389
Region of Interest
set............................................................... 111
Remote Monitor................................................ 135
add cameras ............................................... 136
change TCP/IP port ................................... 139
LNVR security........................................... 135
local monitor window................................ 137
revision 1
— 545
Index
right-click options...................................... 136
Remote Monitor application ............................. 138
profiles ....................................................... 139
Remove
access levels from cardholder group.......... 237
columns........................................................ 70
precision access groups from a badge ....... 240
procedures.................................................. 327
Report Print Preview window........................... 366
field table ................................................... 367
procedures.................................................. 368
Report Print Properties window........................ 464
Report right-click options ................................. 185
Report View Filter window .............................. 325
Reports ............................................ 184, 321, 519
run a cardholder report............................... 253
run a date/time report................................. 345
run a reader report...................................... 332
run a receiver account zone report............. 359
run a visit report from the Visits folder ..... 291
run an alarm acknowledgment report ........ 354
run an alarm panel report........................... 336
run an anti-passback report........................ 340
run an asset report...................................... 321
run an event report..................................... 350
run visit report from Visits folder.............. 291
Reports form ..................................................... 291
Assets folder .............................................. 319
Cardholders folder ..................................... 252
Request Print Action Flowchart........................ 464
Reset Muster mode ........................................... 183
Reset Use Limit Properties window ................. 464
Respond to an automatic Guard Tour............... 377
Retrieve the most recent search results............. 310
Retrieve the most recent visit search results..... 273
Right-click muster mode options...................... 182
Right-click options............................................ 151
Run.................................................................... 321
S
Scan barcodes with wedge scanner................... 198
Schedule
action.......................................................... 381
automatic Guard Tour action..................... 376
visits........................................................... 271
Schedule Report................................................ 468
Scheduler folder................................................ 379
procedures.................................................. 381
right-click menu......................................... 387
Search
biometric records ....................................... 241
cardholder records ..................................... 194
comparison operators................................. 193
for a device .................................................. 82
for all visits by a selected visitor ............... 270
for all visits for a specific date or time ...... 271
for all visits to a selected cardholder ......... 270
for an asset record...................................... 310
for devices.................................................... 82
for scheduled, active, or finished visits ..... 271
report for specific information................... 370
video .......................................................... 113
Search results
retrieve recent search results...................... 195
Security clearance levels
assign ......................................................... 252
Segmentation
modify cardholder segment assignments... 219
Segments form
Cardholders folder ..................................... 218
procedures.................................................. 219
Select
column configuration................................... 70
events to monitor ......................................... 69
Select a device
in single or double left-click mode............ 158
Select Date(s) window...................................... 282
Select Host Wizard - Search form
field table ................................................... 294
overview .................................................... 293
Select Host Wizard - Select form
Select Host Wizard-Search form ...................... 293
Select Host Wizard-Select form ....................... 295
Select Time Range window .............................. 284
546 —
revision 1
Alarm Monitoring User Guide
Select Visitor Wizard - Select or Add form...... 298
field table ................................................... 299
Send
overview .................................................... 299
e-mail ......................................................... 174
page............................................................ 176
Set Forwarding Station Properties window
Sign in a previously scheduled visit ................. 279
Sign out a visit .................................................. 280
Sign Out Visitor Properties window................. 477
Single and double left-click mode .................... 157
Sort alarms ........................................................ 163
Standard video verification
Start an action ................................................... 388
Status bar - Alarm Monitoring window.............. 56
Stop an action.................................................... 388
Surveillance-only cameras................................ 101
Switch between camera and monitor views...... 121
Switch camera views in Video Player .............. 101
Switch log on ...................................................... 41
System Hardware Options window .................... 67
System Status window ............................... 73, 18 2
T
Test a device ....................................................... 81
Toolbars .............................................................. 43
Trace Configuration window .............................. 85
Trace Configuration Window Overview ............ 85
Trace menu ......................................................... 46
Tree view ............................................................ 72
Two-way audio ................................................... 97
U
Unassign an asset.............................................. 318
Unlink
directory account ....................................... 247
Update hardware status....................................... 80
User-defined display options .............................. 67
V
Verify fingerprint.............................................. 204
Verify Fingerprint(s) Dialog............................. 203
Video
create event ................................................ 102
export ......................................................... 537
monitor....................................................... 101
Video Channel Configuration
Video Channel Configuration dialog................ 114
Video Export..................................................... 534
Video monitor features ....................................... 96
Video monitoring features
browser-based VideoViewer ....................... 96
Camera lookup............................................. 97
client side caching ....................................... 96
Two-way audio............................................ 97
Video monitoring procedures ............................. 99
Video Monitoring window.................................. 89
Video Player ....................................................... 90
switch camera views.................................. 101
Video Search window....................................... 104
Video Verification
digital video ............................................... 144
standard CCTV.......................................... 145
VideoViewer (Browser-based) ........................... 96
View
action history ............................................. 388
current status of an action.......................... 389
last connection time for dialup panels ......... 82
linked maps................................................ 173
video files .................................................. 100
video tour..................................................... 90
View menu.......................................................... 44
View options change cardholders folder view.. 195
Visit form.......................................................... 281
field table .................................................. 282
overview .................................................... 281
Select Date(s) window field table ............. 282
Select Time Range window field table ..... 284
Visit reports....................................................... 291
Visit right-click menu ....................................... 264
Visit search capabilities .................................... 269
Visit search results............................................ 273
Visitor
add record .................................................. 216
print badge for a visitor ............................. 279
search for all visits by a selected visitor .... 270
Visitor form....................................................... 214
procedures.................................................. 216
revision 1
— 547
Index
Visits
active.......................................................... 271
add a visit record........................................ 273
delete a visit record.................................... 278
finished ...................................................... 271
modify a visit record.................................. 278
retrieve recent search results...................... 195
retrieve recent visit search results.............. 273
right-click menu......................................... 264
run a visit report from the Visits folder ..... 291
search all visits by selected visitor............. 270
search all visits for specific date or time ... 271
search all visits to selected cardholder....... 270
search capabilities...................................... 269
sign in a previously scheduled visit........... 279
sign out a visit............................................ 280
Visits folder
field table ................................................... 265
Sign In Visit(s) window field table............ 266
Visits form
Cardholders folder ..................................... 242
procedures.................................................. 243
W
Watermarking ................................................... 539
authentication............................................. 540
Weak database password warning ...................... 33
Wedge scanner
add a badge ................................................ 197
configure.................................................... 202
scanning barcodes...................................... 198
search for a badge ...................................... 197
Wedge Settings window ................................... 197
Window menu..................................................... 53
Wizards
select host wizard (Search form) ............... 293
select host wizard (Select form) ................ 295
select visitor wizard (Add form)................ 300
select visitor wizard (Select or Add form). 298
548 —
revision 1
Alarm Monitoring User Guide
revision 1
— 549
6161 East 75th Street
Indianapolis, IN 46250
Phone: (317) 849-2250
B.A.S.I.S.
®
ET690 Alarm Monitoring User Guide, product version 6.1
Item number E805, revision 1.019, July 2008
Content of this document copyright © 1992-2008 by Lenel Systems International, Inc. BadgeDesigner™,
FormsDesigner™, and MapDesigner™, are trademarks used by Stanley Security Solutions with permission from
Lenel Systems International, Inc. Windows, Windows Vista, Windows 2003, and Windows XP are trademarks and
Microsoft is a registered trademark of Microsoft Corporation. Integral and FlashPoint are trademarks of Integral
Technologies, Inc. Crystal Reports for Windows is a trademark of Crystal Computer Services, Inc. Other product names mentioned in this User Guide may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.
Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of the authors.
The software described in this document is licensed to Stanley Security Solutions by Lenel Systems International,
Inc. Portions of this product were created using LEADTOOLS © 1991-2008, LEAD Technologies, Inc. ALL
RIGHTS RESERVED. The software includes ImageStream® Graphic Filters. Copyright © 1991-2008 Inso
Corporation. All rights reserved. ImageStream Graphic Filters and ImageStream are registered trademarks of Inso
Corporation.
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 3 Table of Contents
- 29 Introduction
- 31 Chapter 1: Introduction
- 31 Conventions Used in this Documentation
- 31 How this Document is Organized
- 32 Getting Started
- 32 Passwords
- 32 Password Standards
- 32 Enable/Disable Strong Password Enforcement
- 33 Error Messages
- 33 Accounts
- 34 Log In
- 36 Single Sign-On
- 36 Directory Accounts
- 37 Automatic and Manual Single Sign-On
- 37 Configure Single Sign-On
- 37 Log In Using Automatic Single Sign-On
- 39 Log In Using Manual Single Sign-On
- 40 Troubleshoot Logging In
- 41 Assigning Directory and Internal Accounts to the User
- 41 Switch Log On
- 42 Log Out of the Application
- 42 Exit the Application
- 43 Chapter 2: Main Alarm Monitoring Window
- 43 Menus and Toolbars
- 56 Toolbar Procedures
- 56 How to Use the Toolbars
- 56 Alarm Monitoring Status Bar
- 57 System Administrator Procedures
- 59 Chapter 3: System Administrator Procedures
- 59 Administrative Procedures Checklist
- 60 Access Control Procedures Checklist
- 61 Intrusion Detection Alarm Definitions
- 61 Alarm Monitoring Operator Procedures
- 62 Intrusion Detection Device Statuses
- 62 Monitoring Procedures Checklist
- 62 Video Procedures Checklist
- 65 Operator Procedures
- 67 Chapter 4: Set Alarm Monitoring Display Options
- 67 System Status Options Window
- 69 Display Option Procedures
- 69 Select Event Types to Monitor
- 70 Select Column Configuration
- 71 Set Automatic Display Options
- 72 Display Multiple Windows
- 72 Select Hardware View Options
- 73 Chapter 5: Monitor Devices
- 73 System Status Window
- 74 Device Groups Window
- 76 Device Group Test Mode Window
- 76 Device Group Icons
- 77 Hardware Device Icons
- 78 Device Status
- 79 Offline Hardware Devices
- 79 Broken Connection
- 80 Marked Offline
- 80 Procedures for Monitoring Devices
- 80 Update the Hardware Status
- 81 Perform a Device Test
- 82 Locate or Search for a Device
- 82 View the Last Connection Time for Dialup Panels
- 82 Last Connection Time Guidelines
- 82 Download the B.A.S.I.S. Database or Firmware
- 83 View the Controller Properties
- 85 Chapter 6: Trace Alarms and Events
- 85 Trace Configuration Window Overview
- 86 Trace Configuration Window
- 87 Procedure for Tracing
- 87 Trace Alarms and Events
- 89 Chapter 7: Video Monitoring
- 89 Video Monitoring Window
- 90 Video Monitoring Window Procedures
- 90 View the Video Tour
- 90 Video Player
- 93 Daylight Saving Time
- 94 Troubleshooting
- 94 Customize Overlay Information Dialog
- 94 Performance Dialog
- 96 Video Monitoring Features
- 96 Buffering Streaming Video
- 96 Browser-based VideoViewer
- 97 Camera Lookup
- 97 Two-way Audio
- 99 Video Monitoring Procedures
- 99 Launch Video (Live/Recorded) From a Camera
- 100 Export Video to a File
- 100 Load and View a Video File
- 100 Monitor Video of a Specific Camera
- 101 About Surveillance-Only Cameras
- 101 Switch Camera Views Displayed in Video Player
- 101 Monitor Video of Multiple Cameras (Successively)
- 102 Capture an Image
- 102 Create a Video Event
- 102 Automatically Launch both Live and Recorded Video on Alarm
- 104 Event Configuration/Search Dialog
- 105 Event Configuration/Search Dialog Menu Options
- 107 Event Configuration/Search Dialog Fields
- 109 Event Configuration/Search Dialog Procedures
- 109 Open the Event Configuration/Search Dialog
- 109 Using the Video Processing or IntelligentVideo Form
- 110 Using the Video Player
- 110 Configure Event Properties
- 111 Set Region of Interest
- 113 Video Search Performance Requirements
- 113 Search Video/Audio
- 113 View Search Results
- 114 Video Channel Configuration Dialog
- 115 Open the Video Channel Configuration Dialog
- 115 Using the IntelligentVideo Events form
- 115 Using the Event Configuration/Search Dialog
- 115 Configure Video Channel Parameters
- 116 Matrix View
- 116 Select Template Dialog
- 117 Save Layout Dialog
- 118 Load Layout Dialog
- 118 Matrix View Procedures
- 118 Monitor Video in Matrix View
- 119 Create a Matrix Layout
- 120 Save a Matrix Layout
- 120 Load a Matrix Layout
- 121 Pan, Tilt, and Zoom
- 121 Configure PTZ with LNVR or LNVS Machines
- 121 Configure PTZ with all other Digital Video Recorders
- 122 Using PTZ in the Video Player
- 123 PTZ Options Dialog
- 125 PTZ Control Adjustment Parameters
- 128 PTZ Joystick Selection
- 128 Configure PTZ Locking
- 128 Presets
- 129 PTZ Preset dialog in Advanced mode
- 130 Add an Absolute Preset
- 131 Add a Relative or Continuous Preset
- 131 Add a Camera Side Preset
- 132 PTZ Tours
- 132 PTZ Tour Dialog
- 134 Add a PTZ Tour
- 135 Run a PTZ Tour
- 135 Remote Monitor
- 135 LNVR Security
- 136 Add Cameras to a Remote Monitor
- 136 Remote Monitor Right-click Options
- 137 Local Monitor Window in Alarm Monitoring
- 138 Remote Monitor Application
- 139 Change the Remote Monitor TCP/IP Port
- 139 Application Profiles
- 140 Save a Remote Monitor Profile
- 141 Load a Remote Monitor Profile
- 142 Remove a Remote Monitor Profile
- 143 Chapter 8: Video Verification
- 143 Video Verification Configuration Dialog
- 144 Digital Video Verification
- 144 Digital Video Verification Window
- 144 Digital Video Verification Procedures
- 144 Set Up Digital Video Verification
- 145 Standard Video Verification
- 145 Standard Video Verification Window
- 146 Standard Video Verification Procedures
- 146 Add or Remove Readers
- 146 Display the Cardholder Photo and Live Video
- 147 Delete an Alarm in the Video Verification Window
- 149 Chapter 9: Control Devices and Areas
- 149 Grant / Deny Pop-up Window
- 150 Grant / Deny Pop-up Window Procedures
- 150 Grant or Deny Access
- 151 Right-click Options to Control Devices and Areas
- 151 General Right-click Options
- 152 Monitor Zone Right-click Options
- 152 Access Panel and Alarm Panel Right-click Options
- 153 Intrusion Area Right-click Options
- 153 Intrusion Panel Right-click Options
- 153 Intercom Right-click Options
- 154 Ericsson MD110 Intercom Right-click Options
- 154 Intrusion Door Right-click Options
- 154 Intrusion Relay Right-click Options
- 154 Intrusion Zone Right-click Options
- 155 Reader Right-click Options
- 155 Alarm Mask Group Right-click Options
- 155 Intrusion Mask Group Right-click Options
- 156 Function List Right-click Options
- 156 Action Group Right-click Options
- 156 Anti-Passback Area Right-click Options
- 156 Guard Tour Right-click Options
- 157 Remote Monitor Right-click options
- 157 Remote Monitor Video Cell Right-click Options
- 157 Single and Double Left-click Mode
- 158 Activate Single or Double Left-click Mode
- 158 Select a Device in Single or Double Left-click Mode
- 159 Single Left-click Mode
- 159 Double Left-click Mode
- 159 Execute a Command in Single or Double Left-click Mode
- 159 Single Left-click Mode
- 159 Double Left-click Mode
- 161 Chapter 10: Monitor Alarms
- 161 Alarm Icons
- 162 Pending Alarms Window
- 163 Procedure for Monitoring Alarms
- 163 Sort Alarms
- 167 Chapter 11: Acknowledge Alarms
- 167 Alarm Acknowledgment Window
- 169 Alarm Acknowledgment Procedures
- 169 Acknowledge an Alarm
- 170 Fast/Group Acknowledge Alarms
- 171 Delete an Alarm
- 172 Delete All Alarms
- 172 Display a Map
- 173 Example of a Map
- 173 View Linked Maps
- 174 Send an E-mail
- 176 Send a Page
- 177 Chapter 12: Muster Mode
- 177 Overview of Hazardous / Safe Locations
- 177 Hard APB in Hazardous Locations
- 178 Soft APB in Safe Locations
- 178 Enable Global APB
- 178 Mustering Inside Hazardous Locations
- 180 General Constraints of Muster Mode
- 180 Recommendations for Optimal Reliability
- 182 Muster Mode in Main Alarm Monitoring Window
- 182 Hazardous / Safe Locations in System Status Window
- 183 Muster Mode Procedures
- 183 Initiate Muster Mode
- 183 Reset Muster Mode
- 184 Reports
- 185 Run Muster and Occupancy Reports
- 185 Report right-click options
- 185 Moving Badges
- 186 Move All Badges from an Area
- 186 Move a Single Badge from an Area
- 187 Advanced Operator Procedures
- 189 Chapter 13: Cardholders Folder
- 192 Cardholders Folder Procedures
- 193 Cardholder Search Capabilities
- 193 Comparison Operators
- 194 Search for a Cardholder Record
- 195 Retrieve the Most Recent Search Results
- 195 Change the Cardholders Folder View Options
- 197 Keyboard Wedge Settings Window
- 197 When to Use the Keyboard Wedge Settings Window
- 198 Displaying the Keyboard Wedge Settings Window
- 198 CAC Barcodes
- 198 Configuring B.A.S.I.S. to Read CAC Barcodes
- 198 Scanning Barcodes with a Wedge Scanner
- 202 Keyboard Wedge Settings Window Procedures
- 202 Configure a Wedge Scanner
- 203 Verify Fingerprint(s) Dialog
- 203 Fingerprint Verification with PIV Cards
- 204 Verify Fingerprint(s) Dialog Procedures
- 204 Verify Fingerprints from a PIV Card
- 204 Import Fingerprints from a PIV Card
- 205 Overwrite Facial Image Dialog
- 206 Overwrite Facial Image Dialog Procedure
- 206 Replace Cardholder Photo with Facial Image on PIV Card
- 206 Cardholder Form
- 206 Cardholder Form Overview
- 207 Import Cardholder/Visitor Data
- 207 Prerequisites
- 209 Corex Business Card Scanner
- 209 GSC (iCLASS) Card
- 209 GSC (DESFire) Card
- 210 ID Scan
- 210 Data Import
- 210 ID-Check Terminal
- 211 PIV Card
- 211 Fingerprint Verification and Import
- 211 Photo Replacement
- 211 TWIC Card
- 212 Import Cardholder Data
- 212 Cardholder Form Procedures
- 212 Add a Cardholder Record
- 213 Modify a Cardholder Record
- 213 Delete a Cardholder Record
- 214 Delete a Selected Group of Cardholder Records
- 214 Destroy all Cardholder Data
- 214 Visitor Form
- 216 Visitor Form Procedures
- 216 Import Visitor Data
- 216 Add a Visitor Record
- 217 Modify a Visitor Record
- 217 Delete a Visitor Record
- 218 Segments Form
- 218 Segments Form Overview
- 219 Segments Form Procedures
- 219 Modify a Cardholder’s Segment Assignment
- 219 Change a Group of Cardholder's Segments
- 221 Badge Form
- 221 Badge Form (View Mode)
- 221 Badge Form (Modify Mode)
- 226 Badge Form Procedures
- 226 Add or Replace a Badge Record
- 227 Modify a Badge Record
- 228 Modify Badges for a Selected Group of Cardholders
- 229 Encoding Prerequisites
- 230 Encode a Badge
- 230 Delete a Badge Record
- 231 Access Levels Form
- 231 Access Levels Form (View Mode)
- 231 Access Levels Form (Modify Mode)
- 232 Access Levels Form Procedures
- 232 Assign Access Levels to a Badge
- 234 Assign Intrusion Authority to the Cardholder
- 235 Assign Activation and Deactivation Dates to Access Levels
- 236 Assign Access Levels to a Selected Group of Cardholders
- 237 Remove Access Levels From a Selected Group of Cardholders
- 238 Modify Access Levels Assignments
- 238 Precision Access Form
- 239 Precision Access Form Procedures
- 239 Assign Precision Access Groups to a Badge
- 240 Remove Precision Access Groups From a Badge
- 240 Biometrics Form
- 241 Biometrics Form Procedures
- 241 Search for a Cardholder’s Biometric Record
- 242 Visits Form
- 242 Visits Form (View Mode)
- 242 Visits Form (Modify Mode)
- 243 Visits Form Procedures
- 243 Modify a Cardholder’s Permission to Have Visitors
- 244 Assets Form
- 245 Assets Form Procedures
- 245 Assign an Asset to a Cardholder
- 245 Unassign an Asset
- 245 Modify the Asset Group
- 246 Directory Accounts Form
- 246 Directory Accounts Form Procedures
- 246 Link a Cardholder to a Directory Account
- 247 Unlink a Directory Account
- 248 Logical Access Form (ActivIdentity Sub-tab)
- 249 Logical Access Form - VeriSoft Sub-tab
- 251 Guard Tours Form
- 252 Guard Tours Form Procedures
- 252 Assign Guard Tour Security Clearance Levels to a Cardholder
- 252 Reports Form
- 253 Reports Form Procedures
- 253 Run a Cardholder Report
- 254 Offline Form
- 254 Offline Form Overview
- 255 Offline Form Procedures
- 255 Configure an Offline Reader
- 255 Download Reader Information to a PDA
- 256 Reader Level Download System Tree View
- 257 Chapter 14: Badge Print Preview Window
- 258 Badge Printing Form
- 259 Badge Print Preview Window Procedures
- 259 Preview and Print a Badge
- 263 Chapter 15: Visits Folder
- 264 Visit Right-Click Menu
- 266 Sign In Visit(s) Window
- 268 Print Badge(s) Window
- 268 Visits Folder Procedures
- 269 Visit Search Capabilities
- 269 Comparison Operators
- 270 Search for All Visits to a Selected Cardholder
- 270 Search for All Visits by a Selected Visitor
- 271 Search for Scheduled, Active or Finished Visits
- 271 Search for All Visits for a Specific Date or Time
- 273 Retrieve the Most Recent Visit Search Results
- 273 Find a Cardholder or Visitor Associated with a Visit
- 273 Add a Visit Record
- 278 Modify a Visit Record
- 278 Delete a Visit Record
- 279 Print a Visitor Badge
- 279 Sign in a Previously Scheduled Visit and Print a Badge
- 280 Sign Out a Visit
- 281 Visit Form
- 281 Visit Form Overview
- 282 Select Date(s) Window
- 284 Select Time Range Window
- 285 Status Search Form
- 285 Status Search Form Overview
- 287 Details Form
- 287 Details Form Overview
- 288 E-mail Form
- 288 E-mail Form Overview
- 290 Add Recipient Window
- 291 Reports Form
- 291 Reports Form Overview
- 291 Reports Form Procedures
- 291 Run a Visit Report from the Visits Folder
- 293 Select Host Wizard: Search Form
- 293 Select Host Wizard: Search Form Overview
- 295 Select Host Wizard: Select Form
- 295 Select Host Wizard: Select Form Overview
- 297 Select Visitor Wizard: Search Form
- 297 Select Visitor Wizard: Search Form Overview
- 298 Select Visitor Wizard: Select or Add Form
- 299 Select Visitor Wizard: Select or Add Form Overview
- 300 Select Visitor Wizard: Add Form
- 300 Select Visitor Wizard: Add Form Overview
- 302 Select Visitor Wizard: Select Form
- 302 Select Visitor Wizard: Select Form Overview
- 303 Select Import Source Window
- 305 Chapter 16: Assets Folder
- 306 Assets Form
- 308 Assets Form Procedures
- 308 Add an Asset
- 309 Modify an Asset
- 309 Delete an Asset
- 309 Assign a Cardholder to an Asset
- 310 Search for an Asset Record
- 310 Retrieve the Most Recent Search Results
- 311 Add an Asset Type/Subtype
- 312 Asset Classes Form
- 312 Asset Classes Form (View Mode)
- 312 Asset Classes Form (Modify Mode)
- 314 Asset Classes Form Procedures
- 314 Assign Classes to an Asset
- 314 Modify an Asset Classes Assignment
- 315 Add Asset Groups and Classes
- 316 Assignments Form
- 317 Assignments Form Procedures
- 317 Assign a Cardholder to an Asset
- 318 Unassign an Asset
- 318 Search for a Cardholder Assigned to an Asset
- 319 Reports Form
- 321 Reports Form Procedures
- 321 Run an Asset Report
- 323 Chapter 17: Reports Folder
- 324 Report Configuration Form
- 325 Report View Filter Window
- 327 Report Configuration Form Procedures
- 327 Add a Report
- 328 Modify a Report
- 328 Delete a Report
- 329 Filter The Report View
- 329 Preview and Print a Report
- 329 Reader Reports Form
- 329 Reader Reports Form Overview
- 332 Reader Reports Form Procedures
- 332 Run a Reader Report
- 333 Alarm Panel Reports Form
- 333 Alarm Panel Reports Form Overview
- 336 Alarm Panel Reports Form Procedures
- 336 Run an Alarm Panel Report
- 337 Anti-Passback Reports Form
- 337 Anti-Passback Reports Form Overview
- 340 Anti-Passback Reports Form Procedures
- 340 Run an Anti-Passback Report
- 341 Date/Time Reports Form
- 341 Date/Time Reports Form Overview
- 345 Date/Time Reports Form Procedures
- 345 Run a Date/Time Report
- 346 Event Reports Form
- 346 Event Reports Form Overview
- 350 Event Reports Form Procedures
- 350 Run an Event Report
- 351 Alarm Acknowledgment Reports Form
- 351 Alarm Acknowledgment Reports Form Overview
- 354 Alarm Acknowledgment Reports Form Procedures
- 354 Run an Alarm Acknowledgment Report
- 356 Receiver Account Zone Reports Form
- 356 Receiver Account Zone Reports Form Overview
- 359 Receiver Account Zone Reports Form Procedures
- 359 Run a Receiver Account Zone Report
- 361 Chapter 18: Print Report Options Window
- 362 Print Report Options Window
- 363 Print a Report
- 365 Chapter 19: Report Print Preview Window
- 366 Report Print Preview Window
- 368 Report Print Preview Window Right-click Options
- 368 Report Print Preview Window Procedures
- 368 Preview and Print a Report
- 370 Search a Report for Specific Information
- 371 Chapter 20: Guard Tour
- 372 Start Guard Tour Form
- 373 Guard Tour Live Tracking Form
- 374 Guard Tour Form Procedures
- 375 Launch a Guard Tour
- 376 Schedule an Automatic Guard Tour Action
- 377 Respond to an Automatic Guard Tour
- 377 View a Guard Tour
- 378 Checkpoint Status and Events Diagram
- 379 Chapter 21: Scheduler Folder
- 380 Scheduler Form
- 381 Scheduler Form Procedures
- 381 Add and Schedule an Action
- 387 Display the Scheduler Right-Click Menu
- 388 Add and Schedule an Action Using the Scheduler Right- Click Menu
- 388 Start an Action
- 388 Stop an Action
- 388 View Action History
- 389 View the Current Status of an Action
- 389 Refresh an Action
- 389 Refresh all Actions
- 389 Delete a Scheduled Action using the Scheduler Right- Click Menu
- 390 Modify a Scheduled Action using the Scheduler Right- Click Menu
- 391 Appendices
- 393 Appendix A: Actions
- 393 General Actions Procedures
- 393 Specify the Number of Simultaneous Actions
- 393 Open an Action Properties Window
- 394 Using Action Group Library
- 394 Using the Scheduler
- 395 Using Global I/O
- 395 Using Guard Tour
- 396 Using Acknowledgment Actions
- 397 Action Group Properties Window
- 398 Action Group Properties Window Procedures
- 398 Add an Action Group
- 399 Action History/Guard Tour Event Purging Properties Window
- 400 Action History/Guard Tour Event Purging Properties Window Procedures
- 400 Add an Action History/Guard Tour Event Purging Action
- 401 Archive/Purge Database Properties Window
- 402 Archive/Purge Database Properties Window Procedures
- 402 Add an Archive/Purge Database Action
- 403 Arm/Disarm Area Properties Window
- 406 Arm/Disarm Area Properties Window Procedures
- 406 Add an Arm/Disarm Area Action
- 407 Automatic Guard Tour Properties Window
- 408 Automatic Guard Tour Properties Window Procedures
- 408 Add an Automatic Guard Tour Action
- 410 Change Network Video Password Properties Window
- 411 Change Network Video Password Properties Window Procedures
- 411 Change the Network Video Password
- 412 Schedule a One-Time Password Change
- 412 Schedule a Recurring Password Change
- 413 Deactivate Badge Properties Window
- 414 Deactivate Badge Properties Window Procedures
- 414 Add a Deactivate Badge Action
- 415 Device Output Properties Window
- 416 Device Output Properties Window Procedures
- 416 Add a Device Output Action
- 417 Device Output Group Properties Window
- 418 Device Output Group Properties Window Procedures
- 418 Add a Device Output Group Action
- 419 Download Network Video Firmware Properties Window
- 420 LNVR and Camera Requirements
- 421 Download Network Video Firmware Properties Window Procedures
- 421 Make an Upgrade Available in B.A.S.I.S.
- 421 Camera Upgrade Limitations
- 422 Add a Download Network Video Firmware Action
- 423 Elevator Terminal Allowed Floors Properties Window
- 424 Elevator Terminal Allowed Floors Properties Window Procedures
- 424 Add an Elevator Terminal Allowed Floors Action
- 424 Elevator Terminal Mode Properties Window
- 425 Elevator Terminal Mode Properties Window Procedures
- 425 Add an Elevator Terminal Mode Action
- 426 Execute Function List Properties Window
- 427 Execute Function List Properties Window Procedures
- 427 Add an Execute Function List Action
- 428 Generate Event Properties Window
- 429 Elevator Terminal Mode Properties Window Procedures
- 429 Add an Elevator Mode Action
- 429 Global APB System/Segment Reset Properties Window
- 430 Global APB System/Segment Reset Properties Window Procedures
- 430 Add a Global APB System/Segment Reset Action
- 431 ISC Database Download Properties Window
- 432 ISC Database Download Properties Window Procedures
- 432 Add an ISC Database Download Action
- 433 ISC Firmware Download Properties Window
- 434 ISC Firmware Download Properties Window Procedures
- 434 Add an ISC Firmware Download Action
- 435 Moving Badges for APB Areas Properties Window
- 436 Moving Badges for APB Areas Properties Window Procedures
- 436 Add a Moving Badges for APB Areas Action
- 437 Muster Mode Initiation Properties Window
- 438 Muster Mode Initiation Properties Window Procedures
- 438 Add a Muster Mode Initiation Action
- 439 Mask/Unmask Alarm Input Properties Window
- 440 Mask/Unmask Alarm Input Properties Window Procedures
- 440 Add a Mask/Unmask Alarm Input Action
- 441 Mask/Unmask Alarm Input for Group Properties Window
- 442 Mask/Unmask Alarm Input for Group Properties Window Procedures
- 442 Add a Mask/Unmask Alarm Input for Group Action
- 443 Mask/Unmask Alarm Mask Group Properties Window
- 444 Mask/Unmask Alarm Mask Group Properties Window Procedures
- 444 Add a Mask/Unmask Alarm Mask Group Action
- 445 Mask/Unmask Door Properties Window
- 446 Mask/Unmask Door Properties Window Procedures
- 446 Add a Mask/Unmask Door Action
- 447 Mask/Unmask Door Forced Open Properties Window
- 448 Mask/Unmask Door Forced Open Properties Window Procedures
- 448 Add a Mask/Unmask Door Forced Open Action
- 449 Mask/Unmask Door Forced Open for Reader Group Properties Window
- 450 Mask/Unmask Door Forced Open for Reader Group Properties Window Procedures
- 450 Add a Mask/Unmask Door Forced Open for Reader Group Action
- 451 Mask/Unmask Door Held Open Properties Window
- 452 Mask/Unmask Door Held Open Properties Window Procedures
- 452 Add a Mask/Unmask Door Held Open Action
- 453 Mask/Unmask Door Held Open for Reader Group Properties Window
- 454 Mask/Unmask Door Held Open for Reader Group Properties Window Procedures
- 454 Add a Mask/Unmask Door Held Open for Reader Group Action
- 455 Pulse Open Door Properties Window
- 456 Pulse Open Door Properties Window Procedures
- 456 Add a Pulse Open Door Action
- 457 Pulse Open Door Group Properties Window
- 458 Pulse Open Door Group Properties Window Procedures
- 458 Add a Pulse Open Door Group Action
- 459 Reader Mode Properties Window
- 460 Reader Mode Properties Window Procedures
- 460 Add a Reader Mode Action
- 462 Reader Mode Group Properties Window
- 463 Reader Mode Group Properties Window Procedures
- 463 Add a Reader Mode Group Action
- 464 Reset Use Limit Properties Window
- 465 Reset Use Limit Properties Window Procedures
- 465 Add a Reset Use Limit Action
- 466 Run PTZ Tour Properties Window
- 467 Run PTZ Tour Properties Window Procedures
- 467 Add a Run PTZ Tour Action
- 468 Schedule Report
- 469 Schedule Report Properties Window Procedures
- 469 Add a Schedule Report Action
- 470 Request Print Action Flowchart
- 471 Select PTZ Preset Properties Window
- 472 Select PTZ Preset Properties Window Procedures
- 472 Add a Select PTZ Preset Action
- 472 Select Video Wall Layout Properties Window
- 474 Select Video Wall Layout Properties Window Procedures
- 474 Add a Select Video Wall Layout Action
- 475 Set Forwarding Station Properties Window
- 476 Set Forwarding Station Properties Window Procedures
- 476 Add a Set Forwarding Station Action
- 477 Sign Out Visitor Properties Window
- 478 Sign Out Visitor Properties Window Procedures
- 478 Add a Sign Out Visitor Action
- 479 Silence Area Properties Window
- 480 Silence Area Properties Window Procedures
- 480 Add a Silence Area Action
- 481 Appendix B: Alarm/Event Descriptions
- 519 Appendix C: Reports
- 527 Appendix D: LNVR Network Setup
- 527 Deliver Live Video to Alarm Monitoring Using IP Multicast Protocol
- 528 LNVR Network Setup Window
- 528 Client Network Settings Form
- 529 Recorder Network Settings Form
- 530 IVS Network Settings Form
- 530 LNVR Network Setup Configurations
- 530 Configure Recorder for IP Multicast
- 531 Configure Client for IP Multicast
- 531 Configure Router for IP Multicast
- 531 Configure Firewall for IP Multicast
- 533 Appendix E: Exporting Video
- 534 Video Converter Window
- 535 Video Export Dialog
- 536 Customize Overlay Information Dialog
- 537 Video Conversion Procedures
- 537 Export Video to a File
- 538 Convert and Export Video
- 539 Using the Conversion Utility
- 539 Using a Command Line
- 539 Play Exported Video Clip Using Windows Media Player
- 539 Authenticate a Video File with Watermarking
- 540 Set a Watermark
- 540 Authenticate the Watermark
- 541 Index