Professional Documents
Culture Documents
Lenel OnGuard ET Alarm Monitoring User Guide, product version 5.10.210 This guide is part 1 of a 2-document suite, Item number DOC-203, revision 63, September 2002 Copyright 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 Lenel Systems International, Inc. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Lenel Systems International, Inc. The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that agreement. Lenel and OnGuard are registered trademarks and BadgeDesigner, FormsDesigner, and MapDesigner are trademarks of Lenel Systems International, Inc. Windows, Windows 2000 and Windows XP are trademarks and Microsoft is a registered trademark of Microsoft Corporation. Integral and FlashPoint are trademarks of Integral Technologies, Inc. Crystal Reports for Windows is a trademark of Crystal Computer Services, Inc. Oracle is a registered trademark of Oracle Corporation. Other product names mentioned in this User Guide may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Portions of this product were created using LEADTOOLS 1991-2002 LEAD Technologies, Inc. ALL RIGHTS RESERVED. OnGuard includes ImageStream Graphic Filters. Copyright 1991-2002 Inso Corporation. All rights reserved. ImageStream Graphic Filters and ImageStream are registered trademarks of Inso Corporation.
Contents
Chapter 1: Introduction ...........................................................................................13 Conventions Used in this Documentation .........................................................13 Getting Started ...................................................................................................13 ONGUARD PASSWORDS .......................................................................13 ENABLE/DISABLE STRONG PASSWORD ENFORCEMENT ......................14 CHANGE USER PASSWORDS ................................................................15 ERROR MESSAGES ...............................................................................15 Weak Database Password Warning ....................................................................16 Weak User Password Warnings..........................................................................17 ABOUT ACCOUNTS ..............................................................................17 SET USER PERMISSIONS FOR ALARM MONITORING ............................18 SINGLE SIGN-ON OVERVIEW ...............................................................19 LOG INTO THE APPLICATION WITHOUT USING SINGLE SIGN-ON .......20 HOW TO CONFIGURE SINGLE SIGN-ON ...............................................21 LOG INTO THE APPLICATION USING SINGLE SIGN-ON .......................22 TROUBLESHOOT LOGGING IN ..............................................................23 LOG OUT OF THE APPLICATION ..........................................................24 EXIT THE APPLICATION .......................................................................24
- Page 3 -
RESET THE USE LIMIT .........................................................................50 Pending Alarms Window ...................................................................................50 Device Groups Window .....................................................................................51 CHANGE THE STATUS OF A DEVICE ....................................................52 PERFORM A DEVICE TEST ...................................................................52
- Page 4 -
DELETE A VISITOR RECORD ................................................................90 Segments Form ..................................................................................................91 SEGMENTS FORM OVERVIEW ..............................................................91 Segments Form Procedures ...............................................................................92 MODIFY A CARDHOLDER'S SEGMENT ASSIGNMENT ...........................92 MODIFY A GROUP OF CARDHOLDER'S SEGMENTS ..............................93 Badge Form (View Mode) .................................................................................95 Badge Form (Modify Mode)...............................................................................95 Badge Form Procedures .....................................................................................98 ADD A BADGE RECORD .......................................................................98 MODIFY A BADGE RECORD ...............................................................100 MODIFY BADGES FOR A SELECTED GROUP OF CARDHOLDERS ........101 DELETE A BADGE RECORD ...............................................................102 Access Levels Form (View Mode) ..................................................................103 Access Levels form (Modify Mode).................................................................103 Access Levels Form Procedures ......................................................................104 ASSIGN ACCESS LEVELS TO A BADGE ..............................................104 ASSIGN ACTIVATION AND DEACTIVATION DATES TO ACCESS LEVELS ........................................................................................107 ASSIGN ACCESS LEVELS TO A SELECTED GROUP OF CARDHOLDERS ..... 108 REMOVE ACCESS LEVELS FROM A SELECTED GROUP OF CARDHOLDERS ............................................................................110 MODIFY ACCESS LEVELS ASSIGNMENTS ..........................................110 DELETE ACCESS LEVELS ASSIGNMENTS ...........................................110 Precision Access Form .....................................................................................111 Precision Access Form Procedures ..................................................................112 ASSIGN PRECISION ACCESS GROUPS TO A BADGE ...........................112 REMOVE PRECISION ACCESS GROUPS FROM A BADGE ....................113 Biometrics Form ..............................................................................................114 Biometrics Form Procedures ...........................................................................116 SEARCH FOR A CARDHOLDERS BIOMETRIC RECORD .......................116 Visits Form (View Mode) ................................................................................117 Visits form (Modify Mode) ..............................................................................117 Visits Form Procedures ....................................................................................118 MODIFY A CARDHOLDERS PERMISSION TO HAVE VISITORS ...........118 Assets Form .....................................................................................................120 Assets Form Procedures ...................................................................................121 ASSIGN AN ASSET TO A CARDHOLDER .............................................121 UNASSIGN AN ASSET .........................................................................121 MODIFY THE ASSET GROUP ..............................................................121 Directory Accounts Form ................................................................................123 Directory Accounts Form Procedures ..............................................................124 LINK A CARDHOLDER TO A DIRECTORY ACCOUNT ..........................124 UNLINK A DIRECTORY ACCOUNT .....................................................125 Guard Tours Form ...........................................................................................126
- Page 5 -
Guard Tours Form Procedures .........................................................................127 ASSIGN GUARD TOUR SECURITY CLEARANCE LEVELS TO A CARDHOLDER ..............................................................................127 Reports Form ...................................................................................................128 Reports Form Procedures .................................................................................129 RUN A CARDHOLDER REPORT ...........................................................129 Chapter 6: Assets Folder ........................................................................................131 Assets Form .....................................................................................................132 Assets Form Procedures ...................................................................................135 ADD AN ASSET ..................................................................................135 MODIFY AN ASSET ............................................................................136 DELETE AN ASSET .............................................................................136 ASSIGN A CARDHOLDER TO AN ASSET .............................................136 SEARCH FOR AN ASSET RECORD .......................................................136 RETRIEVE THE MOST RECENT SEARCH RESULTS .............................137 ADD AN ASSET TYPE/SUBTYPE .........................................................137 Asset Classes Form (View Mode) ...................................................................138 Asset Classes Form (Modify Mode) .................................................................138 Asset Classes Form Procedures .......................................................................140 ASSIGN CLASSES TO AN ASSET .........................................................140 MODIFY AN ASSET CLASSES ASSIGNMENT .......................................140 ADD ASSET GROUPS AND CLASSES ..................................................141 Assignments Form ...........................................................................................142 Assignments Form Procedures ........................................................................144 ASSIGN A CARDHOLDER TO AN ASSET .............................................144 UNASSIGN AN ASSET .........................................................................145 LOOKUP A CARDHOLDER ASSIGNED TO AN ASSET ...........................145 Reports Form ...................................................................................................146 Reports Form Procedures .................................................................................148 RUN AN ASSET REPORT ....................................................................148
Video Monitoring Procedures ..........................................................................163 SET UP AN ALARM MONITORING STATION TO VIEW VIDEO ............163 LAUNCH VIDEO .................................................................................164 MATRIX VIEW ...................................................................................164 VIDEO MONITORING WITH MULTIPLE CAMERAS (SUCCESSIVELY) ..166 VIDEO MONITORING OF A SPECIFIC CAMERA ...................................166 EXPORT VIDEO TO A FILE ................................................................167 CREATE A VIDEO EVENT ...................................................................167 VIEW VIDEO FROM A FILE ................................................................168 VIEW THE VIDEO TOUR .....................................................................168 Chapter 9: Video Search Window .........................................................................171 Video Search Window .....................................................................................172 EVENT SETTINGS ...............................................................................173 VIDEO SEARCH PERFORMANCE REQUIREMENTS ...............................174 VIDEO SEARCH PROCEDURES ............................................................175
- Page 7 -
- Page 8 -
- Page 9 -
ADD AN AUTOMATIC GUARD TOUR ACTION ....................................268 DataExchange Script Properties Window ........................................................270 DataExchange Script Properties Window Procedures .....................................271 ADD A DATAEXCHANGE SCRIPT ACTION .........................................271 Device Output Properties Window ..................................................................272 Device Output Properties Window Procedures ...............................................273 ADD A DEVICE OUTPUT ACTION ......................................................273 Device Output Group Properties Window .......................................................274 Device Output Group Properties Window Procedures ....................................275 ADD A DEVICE OUTPUT GROUP ACTION ..........................................275 Execute Function List Properties Window ......................................................276 Execute Function List Properties Window Procedures ...................................277 ADD AN EXECUTE FUNCTION LIST ACTION ......................................277 Global APB System/Segment Reset Properties Window ................................278 Global APB System/Segment Reset Properties Window Procedures .............279 ADD A GLOBAL APB SYSTEM/SEGMENT RESET ACTION .................279 Intercom Call Properties Window ...................................................................280 Intercom Call Properties Window Procedures .................................................281 ADD AN INTERCOM CALL ACTION ....................................................281 ISC Database Download Properties Window ..................................................283 ISC Database Download Properties Window Procedures ...............................284 ADD AN ISC DATABASE DOWNLOAD ACTION .................................284 ISC Firmware Download Properties Window .................................................285 ISC Firmware Download Properties Window Procedures ..............................286 ADD AN ISC FIRMWARE DOWNLOAD ACTION .................................286 Mask/Unmask Alarm Input Properties Window .............................................287 Mask/Unmask Alarm Input Properties Window Procedures ...........................288 ADD A MASK/UNMASK ALARM INPUT ACTION ................................288 Mask/Unmask Alarm Input for Group Properties Window .............................289 Mask/Unmask Alarm Input for Group Properties Window Procedures ..........290 ADD A MASK/UNMASK ALARM INPUT FOR GROUP ACTION ............290 Mask/Unmask Alarm Mask Group Properties Window ..................................291 Mask/Unmask Alarm Mask Group Properties Window Procedures ...............292 ADD A MASK/UNMASK ALARM MASK GROUP ACTION ...................292 Mask/Unmask Door Forced Open Properties Window ...................................293 Mask/Unmask Door Forced Open Properties Window Procedures ................294 ADD A MASK/UNMASK DOOR FORCED OPEN ACTION .....................294 Mask/Unmask Door Forced Open for Reader Group Properties Window ......295 Mask/Unmask Door Forced Open for Reader Group Properties Window Procedures ..................................................................................................296 ADD A MASK/UNMASK DOOR FORCED OPEN FOR READER GROUP ACTION ........................................................................................296 Mask/Unmask Door Held Open Properties Window ......................................298 Mask/Unmask Door Held Open Properties Window Procedures ....................299 ADD A MASK/UNMASK DOOR HELD OPEN ACTION .........................299 Mask/Unmask Door Held Open for Reader Group Properties Window .........300
- Page 10 -
Mask/Unmask Door Held Open for Reader Group Properties Window Procedures 301 ADD A MASK/UNMASK DOOR HELD OPEN FOR READER GROUP ACTION 301 Muster Mode Initiation Properties Window ....................................................303 Muster Mode Initiation Properties Window Procedures .................................304 ADD A MUSTER MODE INITIATION ACTION .....................................304 Pulse Open Door Properties Window ..............................................................305 Pulse Open Door Properties Window Procedures ...........................................306 ADD A PULSE OPEN DOOR ACTION ..................................................306 Pulse Open Door Group Properties Window ...................................................307 Pulse Open Door Group Properties Window Procedures ................................308 ADD A PULSE OPEN DOOR GROUP ACTION ......................................308 Reader Mode Properties Window ....................................................................309 Reader Mode Properties Window Procedures .................................................311 ADD A READER MODE ACTION .........................................................311 Reader Mode Group Properties Window .........................................................312 Reader Mode Group Properties Window Procedures ......................................314 ADD A READER MODE GROUP ACTION ............................................314 Report Print Properties Window ......................................................................315 Report Print Properties Window Procedures ...................................................316 ADD A REPORT PRINT ACTION .........................................................316 Reset Use Limit Properties Window ...............................................................317 Reset Use Limit Properties Window Procedures .............................................318 ADD A RESET USE LIMIT ACTION .....................................................318 Appendix B: Alarm/Event Descriptions ...............................................................319 Index .........................................................................................................................333
- Page 11 -
- Page 12 -
Chapter 1:
Introduction
Getting Started
ONGUARD PASSWORDS
OnGuard ET includes strong password enforcement, which checks the users password against OnGuards password standards. This functionality is designed to enhance password security as well as encourage users to implement single sign-on. If single sign-on is used (automatic or manual) no enforcement of password standards is required by OnGuard. Note: OnGuards strong password enforcement also checks the Lenel database users password when logging into applications. Database user passwords apply only to Oracle and SQL databases. For information on changing your database password refer to the Installation and Setup User Guide.
Password Standards
When creating a strong password keep the following guidelines in mind: Passwords cannot be blank
- Page 13 -
Passwords cannot be the same as the user name (e.g. SA, SA) Passwords cannot be Lenel keywords (e.g. multimedia, Lenel, Prokupets, Prokupet, basis, and password) Although not required, your password should contain numbers, letters, and symbols. Spaces are also acceptable. (e.g. august 18, 1967) OnGuard passwords are not case-sensitive. Database passwords conform to the rules of the specific database being used; SQL Server and Oracle are case insensitive passwords. The maximum value for a strong password is 127 characters. The minimum value is 1. For Oracle databases the following account usernames and passwords are not allowed to be used together: System and Manager Internal and Oracle Sys and Change_On_Install
Notes:
- Page 14 -
5.
Enter your old password and new password in the appropriate fields. Refer to the Password Standards on page 13 for guidelines in choosing a secure password. A message confirms that you have successfully changed your password. Click the [OK] button. If you get a weak password message the next time you log into the application, carefully read the message. It may be telling you that your database password is weak and not your user password. To change your database password, refer to the Accounts and Passwords Appendix in the Installation and Setup User Guide.
6.
Note:
ERROR MESSAGES
Read weak password messages/warnings carefully to avoid confusion about whether your user password or database password is weak. If you have a weak database password and a strong user password, you will receive the following warning every time you log into any application, until you change your database password. Although it is not recommended, you can acknowledge the warning and continue working in the application.
- Page 15 -
- Page 16 -
ABOUT ACCOUNTS
The System Administrator should create a unique account for each user of the applications. The System Administrator can also, for each user, create a list of permissions, which specifies precisely which screens, fields, and buttons the user can access. During initial installation of the application, default accounts are created. These include: User name sa admin user Password sa Type system account sample sample
- Page 17 -
Password
Type sample
These are provided as samples. You may change the passwords and use the accounts, or remove them. The exception to this is the system account, SA. By definition this account has permission to do anything in the system. A user with system access has unlimited access to the application. You cannot delete or change the system account except to modify the password, which you are strongly encouraged to do as soon as possible to discourage unauthorized use. The first time you log into OnGuard to configure the application, you should log in as SA and your password should be SA.
4.
Refer to the table below for the checkboxes you should select to enable a specific permission for a user. User permission enabled Trace an intrusion controller Trace an intrusion onboard relay, intrusion offboard relay, and intrusion zone. Trace an intrusion area
Trace, Areas
- Page 18 -
4.
Refer to the table below for the checkboxes you should select to enable a specific permission for a user. User Permission enabled Set an intrusion controller clock Execute a custom function on a Radionics intrusion controller Bypass/Unbypass an intrusion zone Activate, Deactivate, or Toggle an intrusion zone output, intrusion onboard relay or intrusion offboard relay Arm/Disarm an intrusion area Silence alarms for an intrusion area Pulse open an intrusion door Change the door mode of an intrusion door.
Checkboxes to select Control, Set panel clock Control, Execute function lists Control, Mask alarms and inputs, Unmask alarms and inputs Control, Reader and relay outputs
Control, Arm areas, Disarm areas Control, Silence area alarms Control, Open doors Control, Access modes
- Page 19 -
LDAP user name and password for authentication. Furthermore, when single sign-on is used (automatic or manual) no enforcement of password standards is required by OnGuard. Single sign-on is used to: Allow users to interactively run OnGuard applications without having to enter a user name or password. This makes administration of the OnGuard system easier because separate OnGuard user names and passwords do not need to be maintained, but users still need to be created in OnGuard. Allow scripts using the OpenIT API to authenticate. These scripts will be run under a Windows account. The account that is making the call to the API can be obtained easily this way, and the script can be restricted to those actions that the user is permitted to perform (using standard OnGuard permissions). The use of the explicit username and password for directory authentication to Windows is strongly discouraged. It is recommended that you do not store Windows passwords in the OnGuard system, since OnGuard uses reversible encryption and Windows does not. If explicit authentication is required, you should use an account that has view only permission to the directory in question.
Note:
b. Note:
This only occurs when the DataSourceType= value in the Database section of the ACS.INI file is set to 2.
3.
The Log On window displays. a. b. In the User name field, type the user name assigned to you. When logging in for the first time, your User name is SA. In the Password field, type the password assigned to you. When logging in for the first time, your Password is SA. Note that the characters you type do not appear in the field. Instead, for each character
- Page 20 -
you type, a * displays. This is intended to protect against unauthorized access in the event that someone else can see the screen while you type. Important: After logging in for the first time, you are strongly encouraged to modify the password for the system account as soon as possible to discourage unauthorized use. c. d. In the Directory field, select the directory that you wish to log into. For user accounts not using single sign-on, the default is <Internal>. Select the Remember user name and directory checkbox if you want the values you just entered in the User name and Directory fields to automatically be selected the next time that you log in. Click the [OK] button.
e. 4.
Your system may be configured to prompt you to confirm that you are authorized to use the application. If you accept the terms of the authorization warning, click the [Yes] button. This is configured in the Log on authorization warning section on the General System Options form in the System Options folder in System Administration or ID CredentialCenter. The actual message may differ depending on whether your system has been configured to display the standard message or a custom message.
Note:
5.
If segmentation is not enabled, skip this step. If segmentation is enabled: a. b. The Select Segment window opens. Select the segment you wish to log into. Click the [OK] button.
6.
If there is no monitor zone assigned to the monitor station you are logging into, you will be prompted to select a monitor zone. a. Select a monitor zone from the drop-down list. If segmentation is enabled, only the monitor zones for the segment that you logged into are available. Select the Remember assignment checkbox if you wish to log into the same monitor zone next time you log in. Click the [OK] button.
b. c. Note:
Monitor zones are added in the System Administration application on the Monitor Zones form, which is displayed by selecting the Monitor Zones option from the Monitoring menu.
- Page 21 -
username or password. Single sign-on can also be used with an LDAP user name and password. To configure single sign-on: 1. Add the directory that you wish to use. For more information please refer to Add a Directory in the Directories Folder chapter in the System Administration User Guide. Link the user account that you want to use automatic single sign-on to a directory account. For more information please refer to Link a User Account to a Directory Account in the Users Folder chapter in the System Administration User Guide.
2.
b. Note:
This only occurs when the DataSourceType= value in the Database section of the ACS.INI file is set to 2.
3.
If your Windows account is linked to a user, a message will be displayed that says, Attempting to automatically log you on using your Windows account. To bypass this, hold down SHIFT. To automatically be logged in, do nothing. To login using a different user name and password, hold down the <Shift> key. The Log On window opens. a. In the Directory field, select the directory that you wish to log into. The default is <Internal>.
Note:
For a Directory to be listed, it must first be added on the Directories form in the Directories folder, which is displayed by selecting the Directories choice from the Administration menu in System Administration or ID CredentialCenter. b. c. In the User name field, type the Windows user name assigned to you. In the Password field, type the Windows password assigned to you.
- Page 22 -
Note:
A Windows account that is used for single sign-on in OnGuard must have both a user name and a password. d. Select the Remember user name and directory checkbox if you want the values you just entered in the User name and Directory fields to automatically be selected the next time that you log in. Click the [OK] button.
e. 4.
Your system may be configured to prompt you to confirm that you are authorized to use the application. If you accept the terms of the authorization warning, click the [Yes] button. This is configured in the Log on authorization warning section on the General System Options form in the System Options folder in System Administration or ID CredentialCenter. The actual message may differ depending on whether your system has been configured to display the standard message or a custom message.
Note:
5.
If segmentation is not enabled, skip this step. If segmentation is enabled: a. b. The Select Segment window opens. Select the segment you wish to log into. Click the [OK] button.
6.
If there is no monitor zone assigned to the monitor station you are logging into, you will be prompted to select a monitor zone. a. Select a monitor zone from the drop-down list. If segmentation is enabled, only the monitor zones for the segment that you logged into are available. Select the Remember assignment checkbox if you wish to log into the same monitor zone next time you log in. Click the [OK] button.
b. c. Note:
Monitor zones are added in the System Administration application on the Monitor Zones form, which is displayed by selecting the Monitor Zones option from the Monitoring menu.
TROUBLESHOOT LOGGING IN
If you attempted to login and were unable to do so, make sure that the following conditions have been met: You entered a correct User name/Password and specified the correct Directory If your system is configured to display an authorization warning, you accepted the terms
- Page 23 -
A valid license is installed (For more information please refer to the License Administration Application appendix in the Installation and Setup User Guide.) You have permission to use the application. If you attempted to log into an OnGuard server and the login failed, make sure that a properly coded, licensed dongle adapter is attached to your computer's parallel port. Make sure that your dongle is securely attached. If you attempted to log into an OnGuard client and the login failed, make sure that the client has a valid software license. Client computers do not need a hardware dongle attached to the computer's parallel port. Instead, the client must have a valid software license, which is installed in the License Administration application. If you are using single sign-on, ensure that the directory you are authenticating against is operational and properly configured. When a directory is properly configured, the accounts are listed on the Select Account form when linking a user account to a directory. For more information please refer to Link a User Account to a Directory Account in the Users Folder chapter of the System Administration User Guide. If you are using single sign-on, ensure that the directory account is properly linked to the user account.
- Page 24 -
Monitor Alarms
- Page 25 -
- Page 26 -
Chapter 2:
- Page 27 -
File menu
Menu option Print Toolbar button Function Prints information displayed in the active (topmost) window. The print toolbar button does not display if the Main Alarm Monitoring window is minimized (like the example on page 27) Logs you into or out of the application.
Switch Log On
Displays the login window, allowing a different user to log in without the previous user manually exiting the application. When the new user is successfully logged in, the old user will be simultaneously logged out. Opens the Change Password dialog, enabling you to change your password (you must have the corresponding system level permission to do so). Ends the session of every person logged on.
Edit menu
Menu option Note: Toolbar button Function To display the following menu options, you must open the Main Alarm Monitoring window. Acknowledges the currently selected alarm.
Acknowledge
- Page 28 -
Removes the selected alarm from the window. Removes all alarms from the window. Selects all alarms in the window.
View menu
Menu option Badge Info Toolbar button Function Displays the cardholder window which contains nine forms: Cardholder, Badge, Access Level, Biometrics, Visits, Assets, Directory Accounts, Guard Tours, and Reports form. Note: When this cardholder window displays, an additional menu option, Cardholder displays. For more information please refer to Cardholder menu on page 37.
Displays the Asset window which contains the Assets, Assets Classes, and Assignments forms. Displays the System Hardware window which lists all OnGuard access control devices defined in System Administration.
Device Groups
Displays the various device groups for a particular monitoring zone. Bulk operations can be performed on all parts of the device group. Types of device groups include Reader, Input, and Output groups. Displays the Pending Alarms window. To return to the Main Alarm Monitoring window click the View Alarms toolbar button.
Pending Alarms
Video Verification
Launches the Video Verification window where you can compare live video to a cardholders photograph.
Video Monitoring
Launches the Live Video window, which is used to run a video tour of the cameras defined in Camera Groups (defined in System Administration Device Groups).
- Page 29 -
Displays the map that is assigned to this monitoring zone. This menu option is dimmed if no map has been assigned to this zone. Displays a window in which all available maps are listed. This menu option is dimmed if no map are available. Sorts alarms according to criteria chosen in the submenu. To display the Sort by sub-menu options open the Main Alarm Monitoring window. When selected (checked), the toolbar displays. When selected (checked), the status bar displays.
Trace menu
Menu option Monitor Zone Controller Toolbar button Function Monitors or traces alarms for the selected monitor zone. Monitors or traces alarms for the selected access panel/ controller. An access panel/controller is a device that acts as the focal point for a group of card readers. To access the Controller menu option or toolbar button, highlight an access panel/controller or any device under a given access panel/controller in the System Hardware window. Note: Access panel/controller traces are recursive, meaning all events occurring on that access panel/controller are included.
- Page 30 -
Badge
Asset
Monitors or traces alarms for the selected asset. To access the Asset menu option, highlight a device in the System Hardware window.
Area
Monitors or traces alarms for the selected intrusion area. To access the Area menu option, highlight a device in the System Hardware window.
Configure menu
Menu option Alarm Filter Columns Hardware Status Frequency Function Displays a checklist from which to choose the alarm types to monitor. To access the Alarm Filter menu option, open the Main Alarm Monitoring window. Displays a list of columns from which to choose the columns to display. To access the Alarm Filer menu option, open the Main Alarm Monitoring window If you are using one or more Apollo panels, the Hardware Status Frequency option is a choice from this menu. You can choose how often background updates will be done. The available frequency choices are 'No Updates', 10, 15, 20, 30, and 60 minutes. This is saved as a per user / per monitor station choice. This only applies to Apollo hardware. Displays the System Hardware Options window, which is used to specify how the System Hardware window displays information and what devices are included.
Control menu
Menu option Update All Hardware Status Toolbar button Function Updates the status of all access panels in the monitoring zone.
- Page 31 -
The Current Device sub-menu option that are available, depend on the type of device listed as the Current Device in the Control menu. The type of device listed as the Current Device in the Control menu depends on the device highlighted in the System Hardware window. Displays current status of device. Acknowledges the selected alarm.
- Page 32 -
Enables/disables the Reader First Card Unlock Mode. The Reader First Card Unlock Mode is a qualifier for online Reader Mode. When enabled, the online Reader Mode is in effect until the first (qualified) access granted with entry occurs. When the first access granted with entry occurs, the online Reader Mode changes to unlocked. Whenever a Reader enters or leaves First Card Unlock Mode, an event transaction is logged in the database and displayed in Alarm Monitoring. Note: The Reader First Card Unlock Mode can also be enabled/disabled via the Reader screen in System Administration, via local timezone control in the LNL-2000, and as part of the Reader Mode or Reader Group Mode action used in the Scheduler and Global I/ O. Reader First Card Unlock Mode is only supported on the LNL2000 controller. However, first style unlock behavior can be configured for use with any access controller through Lenels Global I/O Support.
Activates the selected alarm output. Deactivates the selected alarm output. Pulses an output device.
- Page 33 -
Options menu
Menu option Mute Sound Font Save Alarms on Exit Save Settings on Exit Save Settings Now Ascending Time/ Date Function When selected (checked), the audio portion of the system is disabled. Selects font used in all the alarm monitoring windows. At the end of the session, saves all currently displayed alarms. Saves screen characteristics at end of session, for later use. Immediately saves screen characteristics for later use. In the Main Alarm Monitoring window, lists alarms in ascending order of time and date (i.e., oldest first).
- Page 34 -
Applies to alarms for which the Show Card Holder check box is selected in the System Administration software. To locate this checkbox select the Monitoring menu and then select Alarms. Click the Alarm Definition tab. If selected (checked), the corresponding cardholder view automatically displays when the alarm arrives if the alarm is related to a badge id. If the cardholder view is already displayed when a new alarm arrives, the new cardholder associated with the alarm is searched for and displayed. If not selected (unchecked), the corresponding cardholder view does not automatically display when an alarm occurs.
Applies to alarms for which the Video Verification check box is selected in the System Administration software. To locate this checkbox select the Monitoring menu and then select Alarms. Click the Alarm Definition tab. If selected (checked), the corresponding video verify view automatically displays when the alarm occurs. If not selected (unchecked), the corresponding video verify view does not automatically display when the alarm occurs.
- Page 35 -
Automatic visual notification must be configured for individual alarms in System Administration. From the Monitoring menu and then select Alarms. Click the Alarm Definition tab. Highlight the appropriate alarm, click the [Modify] button, select the Visual Notification checkbox. Click the [OK] button. In the Alarm Monitoring application be sure to refresh the Alarm configuration through the Options menu. Automatic Live Video Display Display Status On Maps Displays live video automatically when an alarm occurs. Displays the text status of all device icons on graphical maps. Highlight Entire Row Display Controller Capacity If selected (checked), text status will be displayed for all device icons on graphical maps. If not selected (unchecked), text status will only be displayed for a given device when the mouse pointer is over the device icon. If selected (checked), the entire row of an alarm will be highlighted in the Main Alarm Monitoring window. If not selected (unchecked), only the alarm description text will be highlighted in the Main Alarm Monitoring window.
Displays available memory, free memory, the maximum number of cardholders, current cardholders stored in a controller, maximum number of biometric templates, and the current number of biometric templates set in a controller. This information is displayed in the System Hardware window, and is mainly used for diagnostic purposes. By default, this option is unchecked. Causes alarm configuration information to be refreshed.
Window menu
Menu option Cascade Tile Horizontally Tile Vertically Function Places all open windows in an overlapping arrangement, with the active window displayed on top. Places all open windows in a horizontal, non-overlapping arrangement. Places all open windows in a vertical, non-overlapping arrangement.
- Page 36 -
Help menu
Menu option Contents Index About Alarm Monitoring Function Displays online help for the currently displayed window. Displays the online help table of contents. Displays version and copyright information.
Cardholder menu
Menu option Note: Function This menu is only available after you select View > Badge Info from the menu options. If selected, both visits that have and have not been signed out for the selected cardholder record will be displayed in the listing window on the Visits form. If not selected, only visits that have not yet been signed out will be displayed. If selected, both assets that currently are and assets that once were assigned to the selected cardholder will be displayed in the listing window on the Assets form. If not selected, only assets that are currently assigned to the selected cardholder will be displayed. When selected, displays the View Options window from where you can choose cardholder search attributes. If selected, allows the selected cardholder to violate anti-passback rules one time. When selected, displays the Area Move Badges window from where you can move a badge to a new area. When selected, displays the Cardholder Global Anti Pass Back (APB) Areas window. This window lists the global APB areas that the selected cardholder is currently located in. If selected, the Last access field will display information about the most recent valid access by the selected cardholder, including the triggered event, date, time, and reader name. If selected, the Last access field will display information about the most recent access attempt (whether access was granted or not) by the selected cardholder, including the triggered event, date, time, and reader name. Provides a sub-menu of options that can be applied to a select group of cardholder records.
Show Signed Out Visits Show Unassigned Assets View Options One Free Pass APB Move Badge Display Global APB Areas Show Last Granted Location Show Last Attempted Location Bulk
- Page 37 -
Allows you to destroy all cardholder data. When selected, displays the Log Viewer window from where you can view a log of bulk events.
- Page 38 -
Asset menu
Menu option Note: Function This menu is only available after you select View > Asset Info from the menu options. Displays the first matching asset record. Jumps back 10 matching asset records. Displays the previous matching asset record. Displays the next matching asset record. Jumps forward 10 matching asset records. Displays the last matching asset record. Displays the Asset Groups and Classes Management window. Displays the Asset Types and Subtypes Management window. Displays the Filter Out Assignments After X Days window, which allows you to specify the number of days you want to view. Enables you to quickly enter multiple Scan ID for the same type of asset (e.g. enter multiple Scan IDs for 10 portable PCs). To display the Bulk Add Mode menu option an asset record must be open in the Assets windows. For more information please refer to Chapter 6: Search for an Asset Record on page 136.
First Record Rewind Previous Record Next Record Fast Forward Last Record Asset Groups and Classes Asset Types and Subtypes Show Assignments X Days Past Bulk Add Mode
- Page 39 -
Alarms
When an alarm occurs, it displays in the Main Alarm Monitoring window. Each alarm displays in its own row and is preceded by a colored dot. If alarms are configured in the System Administration software so that they do not automatically delete after they are acknowledged, an alarm icon will also display beside the colored dot after it is acknowledged. Note: Alarms are configured in System Administration via the Monitoring > Alarms menu options and the Alarm Definitions tab.
Alarm icons
Icon Description Alarm acknowledged without notes.
An outstanding acknowledgement action is associated with the alarm. An acknowledgement action is an action that will automatically be carried out when the alarm is acknowledged. Acknowledgment actions are configured in System Administration. From the Monitoring menu select Alarms. Click the Acknowledgement Actions tab. A camera in the digital video system is associated with the device that the alarm occurred on/for. Therefore you can pull up live video for the device associated with the alarm via the 'Launch Video' menu item in the alarm popup menu. Alarm acknowledged without notes, and a camera is associated with the device.
Alarm acknowledged with notes, and a camera is associated with the device.
An outstanding acknowledgement action is associated with the alarm and a camera is associated with the device. The digital video associated with the alarm has been marked.
- Page 40 -
Alarm icons
Icon Description Alarm acknowledged with notes, and has archived video.
Note:
- Page 41 -
trace window, but you may not wish to display Access Granted alarms in the Main Alarm Monitoring window. 1. 2. Make the window for which you want to choose event types the active (topmost) window. From the Configure menu select Alarm Filter. The Alarm Filter window displays.
3.
By default, all event types are selected (have a checkmark). If you do not want the current window to display a particular category of events, click that option in the Alarm Filter window. This removes the checkmark and deselects it. Click on a deselected event type to select it. Click the [OK] button to close the Alarm Filter window.
4.
- Page 42 -
configuration is changed for a given reader trace, this will become the default configuration for all reader traces. 1. 2. Open the window from which you want to configure the columns displayed. Verify this window is the active (topmost) window. From the Configure menu select Columns. The Column Configuration window displays.
3.
In the Select columns display field, click/highlight the name of a column, then click the [>>] button. The column name appears in the Columns to view display field. Arrange the column names in the order you want them to appear. Click/highlight a column name in the Columns to view display box. Then use the [Up] and [Down] buttons to change the column's relative position.
4.
Note:
The order the column names appear in the Columns to view display field from top to bottom is the same order the columns will display from left to right in the window which you are configuring the columns for.
5.
Click the [OK] button, and the window displays the new column configuration.
REARRANGE ALARMS
New alarms are inserted into the list in the order indicated by the current sort criterion. The status bar indicates the current sort criterion (such as: Sort Criteria: Alarm Description). You can rearrange the order of entries in the Main Alarm Monitoring window or any Trace window. Alarms that occur after that will also be sorted accordingly. You can change the sort order using either of these two methods: By clicking on the appropriate column heading
- Page 43 -
By selecting the View > Sort by from the Main Alarm Monitoring menu options.
The choices available in the Sort by submenu are: Column name Alarm Description Account Group Asset Name Description Lists alarms alphabetically by alarm description. Lists alarms in order of receiver account group (panels). Receiver accounts are used to represent panels in a receiver setup. List alarm alphabetically by asset name, which is configured in System Administration or ID CredentialCenter under the Administration > Assets menu option. Lists alarms in order of asset scan ID. The scan ID is configured in System Administration or ID CredentialCenter under the Administration > Assets menu option. Indicates whether there is additional text associated with the alarm. Displays the badge type associated with the alarm. The Badge Type is configured via Administration >Badge Types in System Administration or the ID Credential Center. Lists alarms in order of biometric score. A biometric score is based on how well a biometric access control reader matches a template in the database. By default, this option is not enabled. To enable this sort, the Biometric Score column must first be added. For more information please refer to Arrange, Add, and Remove Columns Displayed on page 42. Lists alarms numerically by the card number (badge ID), if the alarm is associated with a cardholder. Lists alarms alphabetically by name of the controller with which the alarms are associated. The controller can be an access panel, fire panel, intercom exchange, receiver, or receiver account. Lists alarms in order of controller time. The time includes the hour and minute, and the date includes the month, day, and year. The display is formatted based on the time zone setting selected in the Control Panel on your computer. Typically the display is adapted to the country in which you are located. Lists alarms alphabetically by name of the device (reader, alarm panel, intercom station etc.) associated with the alarm. If the alarm originates at a reader, the reader name is displayed. If the alarm originates at an alarm panel, the panel name is displayed. Lists alarms alphabetically by name of the alarm input, if the alarm is generated at an alarm input. Lists alarms in order of intercom station called. Indicates the name of the area associated with the alarm. This is only displayed when the controller reported an area number along with the alarm.
Asset Scan ID
Biometric Score
Card Controller
Controller Time
Device
- Page 44 -
Description Displays alarms in order of line number. Lists highest priority (red dot) alarms at the top of the list, followed by medium priority (yellow dot) alarms, with low priority (green dot) alarms placed at the bottom of the list. Lists alarms in chronological order. Within a given date, the alarms are sorted by time which includes the hour and minute. The date includes the month, day, and year. In the Options menu, if Ascending Time/Date is selected, the most recent is at the bottom of the list. In the Options menu, if Descending Time/Date is selected, the most recent is at the top of the list
Time/Date
Transmitter
Lists alarms in order of transmitter. Transmitters are devices that generate either an RF or IR (or both) signal that Visonic SpiderAlert receivers can receive. There are three types of these devices: fixed, portable (hand-held), and man-down. For more information refer to the Personal Safety Devices Folder chapter in the System Administration User Guide. Lists alarms in order of transmitter input.
Transmitter Input
For any sort, the second level sort criterion is always Priority and the third level criterion is always Time/Date. For example: If you sort by Controller, all alarms associated with the same controller will be sorted by Priority then by Time/Date. If you sort by Priority, all alarms with the same priority will be sorted by Time/Date. If you sort by Time/Date, alarms with the same time (to the second)/date will be sorted by Priority.
The sort criterion applies to the current window only. You can have one Main Alarm Monitoring window and various Trace windows, each with a different sort criterion. When you open a new Main Alarm Monitoring window, it is initially sorted by Priority.
Note:
- Page 45 -
Alarm Definitions tab and verify the Active Alarm checkbox is selected for the specific alarm.
DELETE AN ALARM
1. In the Main Alarm Monitoring window, highlight the alarm you wish to delete. The Alarm displays in white letters on a dark background, indicating that the entry is selected. Complete one of the following: 3. Note: Press the <Delete> key. From the Edit menu select Delete.
2.
A confirmation message displays. Click the [Yes] button. You can also right-click on the alarm and select Delete. When the confirmation message displays click the [Yes] button.
Note:
DISPLAY A MAP
A monitoring map is a graphical representation of a facility or area monitored by the OnGuard system. 1. 2. Open Alarm Monitoring. If alarms are displayed in the Main Alarm Monitor window, select an alarm that has a map associated with it and from the View menu select Map, or right-click on the alarm and select View Map.
- Page 46 -
Note:
If the selected device has multiple maps associated with it you will be prompted to select a map from a list provided. Do so and then click the [OK] button. If no alarms are displayed in the Main Alarm Monitor window, select Map Selection from the View menu. Select the desired map and click the [OK] button 3. OnGuard displays the Map window, an example is shown below:
4.
Graphical symbols on the map indicate the location of OnGuard devices. Right-click on a device symbol to perform a variety of operations depending on the type of device you select. The word ALARM blinks, indicating an alarm's location on the map. The blinking alarm displays only if there is one or more alarm designated as an Active Alarm in the System Administration software and if these alarms are unacknowledged/undeleted. The alarm sprite disappears once the alarm has been acknowledged. The alarm sprite disappears if the alarm has been deleted without acknowledgement (as in the case of an initiating alarm that is automatically replaced by a canceling alarm). The alarm sprite is not used for canceling alarms.
5.
- Page 47 -
To view links to other maps: 1. 2. Activate the Main Alarm Monitoring window by clicking on it. Click the map icon on the toolbar beside the File menu option.
3.
If you have previously brought up more than one map, a Back 1 Map menu option displays. If you go back one map, a Forward 1 Map menu option displays.
Click the Activity Printer tab and select the Have Device checkbox. Fill in the correct Port and, if necessary, Baud Rate, Byte Size, Parity, and Stop Bits. Click the [OK] button.
Define which alarms will be printed. This is done on the Alarm Definitions form of the Alarm Configuration folder. a. b. c. d. In System Administration, select Alarms from the Monitoring menu. Select an alarm and click the [Modify] button. Or click the [Add] button to add an alarm. In order to enable activity printing, make sure the Print Alarm checkbox is selected. Click the [OK] button.
5. 6.
Make sure the printer is connected to the workstation. Once this is done, any alarms with the attribute Print Alarm checked will be sent to the printer on that particular workstation.
- Page 48 -
Note:
It is recommended that you use a dot matrix printer for this type of printing. Since it prints line by line, it is much easier to scroll through the pages to look at alarms printed.
From Alarm Monitoring, an application program interface (API) exists to reset the usages left for the following cases: For a specific badge on a specific controller in the monitoring zone. For a specific badge on all controllers in the monitoring zone. For all badges on a specific controller in the monitoring zone. For all badges on all controllers in the monitoring zone.
- Page 49 -
3. 4.
Reset the use limit for a specific badge, all badges, a specific access panel, or all access panels. Click the [OK] button.
- Page 50 -
- Page 51 -
Icon
Input Groups:
Output Groups:
Depending on the option selected, a Test Mode window launches or a message displays stating whether the request was successful or not. If a message displays, click the [OK] button.
- Page 52 -
Reader Groups (Access Grants). Performing this test allows you to see which devices generated desired alarms and which ones did not. 1. 2. Select a group to test in the Device Groups window. Right-click the device group and select the Test Inputs, Test Door Forced, or Test Access Grants choice. If you select Test Access Grants, skip to step 7. A dialog box appears:
3.
4.
There are two choices: Show alarms in all windows on all Monitoring Stations, or Show alarms only in Test Mode windows. Choose Show alarms only in Test Mode windows if you do not want the test results to show up on any Monitoring Stations. Type in the duration (in minutes) of the test. This option shows up if you have selected Show alarms only in Test mode windows. Click the [OK] button to initiate the test. A Test Mode window launches. The top portion of the window lists all the devices being tested and their current status (whether the test was successful/ unsuccessful). Devices that failed the test will flash in red. The bottom portion of the window displays a trace of the related alarms. When the test is finished, all other windows and monitoring stations will resume the normal display of related alarms.
5. 6. 7.
8.
- Page 53 -
- Page 54 -
Trace Alarms
- Page 55 -
- Page 56 -
Chapter 3:
Functions:
Displayed by:
The Alarm Acknowledgement window can be displayed several ways. From the Main Alarm Monitoring window: Double-click on an alarm Highlighting an alarm entry and from the Edit menu selecting Acknowledge Right-clicking on an alarm entry and selecting Acknowledge from the popup menu
- Page 57 -
If the alarm is card-related, displays the cardholder name (if known*) and the badge ID. *Cardholder name would not be available for an Invalid Badge alarm, for example.
Original notes
Any notes carried forward from the associated original alarm are displayed here.
- Page 58 -
- Page 59 -
As each alarm entry is added to the list, you may hear a voice announce the type of alarm. You can silence the audio portions of the Alarm Monitoring software by selecting the Options menu and selecting (placing a checkmark by) Mute Sound.
ACKNOWLEDGE AN ALARM
1. In the Main Alarm Monitoring window, open the Alarm Acknowledgement window by double-clicking on the entry for the alarm you wish to acknowledge. Some types of alarms may not have text instructions. But if they do have text instructions, the information is displayed in the Instructions sub-window. If you wish to play voice instructions for responding to this alarm, click the [Audio] button. When you click the button, the audio clip will play once, then stop. Some types of alarms may not have voice instructions. If you wish to add your own notes pertaining to your response to the alarm, click in the Notes sub-window, then type your comments. If this is a canceling alarm, any notes carried forward from the associated initiating alarm will be displayed in the Original Notes field. Click the [Acknowledge] button to acknowledge the alarm. If this alarm type has been configured for Require Login On Ack. in the System Configuration software, you must first log in before this alarm can be acknowledged. If this is an initiating alarm, the corresponding canceling alarm may not be displayed until you acknowledge this alarm. Whether this happens depends upon how your system is set up. Your System Administrator may have set up some types of alarms to be automatically deleted from the Main Alarm Monitoring window after you acknowledge them. If an alarm is not removed from the Main Alarm Monitoring window after you acknowledge it, you will have to delete it manually. To delete an alarm entry, refer to the procedure Delete an Alarm in the Main Alarm Monitoring Window chapter.
2. 3.
4.
5.
6.
You can acknowledge multiple alarms without closing the Alarm Acknowledgement window. Repeat 2 through 5 for each alarm you display in the Alarm Acknowledgement window. Use the navigation buttons to move through the list of alarms. To close the Alarm Acknowledgement window, click the [Close] button.
7.
- Page 60 -
To acknowledge this group of alarms complete one of the following: Choose Fast/Group Acknowledge from the Edit menu, or Right-click the selected group of alarms and choose Fast/Group Acknowledge, or Click the Fast/Group Acknowledge toolbar button, or Press <Ctrl> + <F12>
3.
A message displays:
4. Notes:
Click the [Yes] button to confirm the acknowledgement of the alarms. If any of the chosen alarms require notes upon acknowledgement, you will be prompted to enter notes for acknowledgement of ALL the alarms. If any one of the alarms has already been acknowledged, it cannot be reacknowledged. A message will be displayed to inform you of how many alarms have been acknowledged. The configuration for any given alarm may require that the operator log in upon acknowledging the alarm. For Fast/Group Acknowledgement, if this is the case, the user will be prompted to log in. The configuration for an alarm may also require an acknowledgement password. If there is a password required for an alarm using Fast/Group Acknowledgement, the operator will be prompted only once for the password (for each type of alarm).
- Page 61 -
To select a pre-configured acknowledgement note(s): 1. Open the Alarm Acknowledgement dialog box by doing one of the following: 2. Double-click the alarm you wish to acknowledge. Click on an alarm entry and choose Acknowledge from the Edit menu. Right-click on the alarm and choose Acknowledge.
The Alarm Acknowledgement window appears. Click the [Select Notes] button. If the Alarm Type has pre-configured alarm acknowledgement notes, a new dialog box appears with the text objects:
3.
Select a pre-configured acknowledgement note. The text will then appear in the Acknowledgement Notes field. If there are notes already in the Acknowledgement notes field, selecting preconfigured notes will replace the existing text. Pre-configured Acknowledgement Notes can also be used with the Fast/ Group Acknowledge feature. If notes are required when you acknowledge an alarm, you have the option of either typing in notes or using the [Select Notes] button to enter text. The configuration for any given alarm may require that the operator log in upon acknowledging the alarm. This also applies to Fast/Group Acknowledgement. The configuration for an alarm may also require an acknowledgement password. If there is a password required for an alarm using Fast/Group
Notes:
- Page 62 -
Acknowledgement, the operator will be prompted only once for the password (for each type of alarm).
SEND AN E-MAIL
Using OnGuard software you can send electronic mail with alarm information. This option is available in the Main Alarm Monitoring popup menu. 1. 2. Right-click on an alarm and select Send Email. The Send Email window opens. Click the [To] button and select (place a checkmark beside) the desired email addresses. Use the <Ctrl> or the <Shift> key to select multiple addresses. The subject and body of the message are automatically populated with information that describes the alarm. Click in either field to make any changes.
3.
- Page 63 -
Notes:
The Global Output Server must be running in order to send the e-mail. Refer to the Global Output Devices Folder chapter in the System Administration User Guide to define an electronic mail device and prospective e-mail recipients. Refer to the Installing and Configuring WirelessOffice Messaging Software Version 3.0 chapter in the Installation and Setup User Guide to install and configure electronic mail software.
Description Allows you to select an e-mail address that is already in the database. Displays the subject of the message. By default, the description of the alarm that has occurred is displayed. To change it, type over the text. Displays the body of the message being sent. By default, information pertaining to the alarm is displayed. To change it, type over the text. Once you are done, click on the [OK] button to send the message and exit the window. To exit the window without sending an e-mail message, click on the [Cancel] button.
- Page 64 -
SEND A PAGE
Using OnGuard software you can send a page to a recipient with alarm information. This option is available in the Main Alarm Monitoring popup menu. 1. 2. 3. Right-click on an alarm and select Send Page. The Send Page window opens. Click the [To] button and select (place a checkmark beside) the pager number of the recipient. The message field is automatically populated with an alarm description, the time and date on which it occurred, and the location (which reader/alarm panel). Click the [OK] button to send the page. Refer to the Global Output Devices Folder chapter in the System Administration User Guide to add a paging device and recipients. Refer to the Installing and Configuring WirelessOffice Messaging Software Version 3.0 chapter in the Installation and Setup User Guide to install and configure electronic mail software.
Notes:
Description Allows you to select pager number that is already in the database. Displays the body of the message being sent. By default, information pertaining to the alarm is displayed. To change it, type over the text. Once you are done, click on the [OK] button to send the message and exit the window. To exit the window without sending a page, click on the [Cancel] button.
- Page 65 -
- Page 66 -
Chapter 4:
Functions:
Displayed by:
The Trace Configuration window can be displayed several ways: From the Main Alarm Monitoring window, select the Trace menu option and then the type of device you wish to trace. Click the [OK] button when OnGuard prompts you to verify the name of the device to be traced. In the Main Alarm Monitoring window, right-click an alarm and select Trace and then the device you wish to trace.
The first date/time combination that the trace displays events for The last date/time combination that the trace displays events for
- Page 67 -
This option is applicable only when a historical trace is performed. If the checkbox is selected, restored transactions will be included in the historical trace. If the checkbox is not selected, normal transactions from the EVENTS table will be used for the historical trace.
Controls whether new events are displayed or not If the checkbox is selected, the trace displays new events. If the checkbox is not selected, live tracing is disabled and new events are excluded from the trace.
Controls whether alarms (events) that have marked video are displayed or not. If the checkbox is selected, live tracing shows events that are new AND are configured (in the System Administration application) to have video marked for them. The marking is not instant, so the trace may not show the of the event right away. icon in front
When the Show Only Those Alarms Which Have Marked Video checkbox is checked and the Perform Historical Trace checkbox is checked, the trace will show events which have video marked for them, regardless of the current alarm-video configuration in the System Administration application. This means that a video-only trace may exclude some alarms seen in the main alarm view with a icon in front of them.
Alarm Filter OK
Enables you to configure the type of events that will be displayed for a trace. When clicked, the Alarm Filter window opens. Performs the trace using the settings selected and closes the Trace Configuration window. A Trace Monitor window will open, which looks identical to the Main Alarm Monitoring window, but displays only those alarms that are associated with the trace criteria specified. Cancels the pending requested action.
Cancel
- Page 68 -
- Page 69 -
Traces a Reader 3. 4. OnGuard displays a message window, asking you to verify the name of the device to be traced. Click the [OK] button. A second dialog opens where you can choose to display the trace history for the selected device. The Trace Configuration illustration at the beginning of this chapter shows the default settings for the dialog. They are: Perform Historical Trace checkbox unchecked Start and End date set to the current date, Start and End time set to 0:00 and 23:59, respectively Perform Live Trace checkbox checked
Show Only Those Alarms Which Have Marked Video checkbox unchecked The dialog does not remember the selections made the last time it was used. For a detailed list of trace options see Trace Configuration Windowon page 67. 5. 6. Click the [Alarm Filter] button to configure the types of events that will be displayed for this trace. In the Alarm Filter window, select (place a checkmark beside) the alarm types you want the trace to display.
7. 8. 9.
Click the [OK] button. In the Trace Configuration dialog, click the [OK] button. OnGuard will open a Trace Monitor window for the selected device. The Trace Monitor window looks identical to the Main Alarm Monitoring
- Page 70 -
window, but it displays only those alarms that are associated with the device being traced. Here's an example:
Toolbar Shortcut
b. c. 2.
The Trace Configuration window opens. Select the trace options you desire. For a detailed list of trace options see Trace Configuration Windowon page 67. Click the [Select Alarm Types] button to configure the types of events that will be displayed for this trace. In the Alarm Filter window, select the checkboxes to the left of the alarm types you want the trace to display. Click the [OK] button. In the Trace Configuration window, click the [OK] button.
3. 4. 5. 6.
OnGuard will open a Trace Monitor window for the selected monitor zone. The Trace Monitor window looks identical to the Main Alarm Monitoring window, but it displays only those alarms that are associated with the monitor zone being traced.
- Page 71 -
- Page 72 -
- Page 73 -
- Page 74 -
Chapter 5:
Cardholders Folder
The Cardholders folder contains forms with which you can: Add, modify, and delete cardholder and visitor records. Assign cardholders or groups of cardholders to different segments. Create badge records for cardholders and visitors. Assign access levels to active badges for cardholders and visitors. Assign one or more Precision Access groups to a badge (if Precision Access is used on your system). Search for and display cardholders and visitors biometrics records. Search for cardholders and visitors visit records. Assign and track assets to cardholders and visitors. Link directory accounts to cardholders and visitors. Assign a cardholder as a tour guard. Assign security clearance levels to tour guards. Create and print reports containing cardholder information.
The folder contains up to eleven forms: the Cardholder/Visitor form, the Badge form, the Segments form (if segmentation is enabled), the Access Levels form, the Precision Access form (if in use), the Biometrics form, the Visits form, the Assets form, the Directory Accounts form, the Guard Tours form, and the Reports form. Toolbar Shortcut The Cardholders folder is displayed by selecting the Cardholders choice from the Administration menu, or by selecting the Cardholders toolbar button.
- Page 75 -
customize your cardholder data, the elements on your cardholders folders forms will be different. The Segments form is only available if segmentation is enabled on your system The availability of certain forms and fields in the Cardholders folder is subject to licensing restrictions.
- Page 76 -
Common form elements - upper-left section Last name First name Middle name Cardholder ID text text text numeric Indicates the cardholders last name. Indicated the cardholders first name. Indicates the cardholders middle name. Indicates the cardholders ID number. Note: Badge type drop-down list This field is not displayed on the Visitor form.
Indicates the cardholders badge type. Badge types are configured in the Badge Types folder. For more information please refer to the Badge Types Folder chapter in the System Administration User Guide.
Common form elements - bottom section Search push button Displayed in view mode on every form in the Cardholders folder. This button is used to search for existing cardholder records.
- Page 77 -
Modify
push button
Displayed in view mode on every form in the Cardholders folder. Note: This button will be displayed but will not be enabled on the Directory Accounts form and the Reports form, because directory account and report records can not be modified.
Delete
push button
Enabled in view mode on the Cardholder/Visitor and Badge form and is used to delete a record. Note: This button is displayed but not enabled on the Segments form, the Access Levels form, the Precision Access form, the Biometrics form, the Guard Tours form and the Reports form because these records are not deleted in the Cardholders folder.
push button
Displayed in view mode on every form in the Cardholders folder. When selected, displays the Badge Printing window from where you can print the active badge for the current record, or the active badges for all records found in a search. You can also log and print errors encountered during the print operation. Note: When you select this button on the Reports form, the Print Report Options window is displayed. For more information please refer to the Print Report Options Window chapter in the System Administration User Guide.
Encode
push button
Displayed in view mode on every form in the Cardholders folder. When selected, displays the Encode Badge window from where you can encode the badge configurations selected for the cardholder onto a smart card. For more information please refer to the Card Formats Folder chapter in the System Administration User Guide. The availability of this button is subject to licensing restrictions.
push button
Displayed in search mode on every form in the Cardholders folder. When selected, moves to the first record that matches your search criteria.
- Page 78 -
push button
push button
push button
push button
OK
push button
Cancel
push button
Clear
push button
Clear All
push button
Capture
push button
- Page 79 -
Record count
numeric
Comparison Operators
For text fields such as Last name and First name, the default comparison is begins with. The search results will include any records whose values begin with the characters that were entered. For example, when searching by last name, a filter of L will find Lake, Lewis, etc. A filter of Lake will find Lake, Lakeland, etc. For all other field types, such as drop-down lists and numeric fields, the default comparison is equal to. For example, searching on the Badge ID field with a value of 123 will find the cardholder whose badge ID is equal to 123.
- Page 80 -
In addition to the default comparison, you can customize your search by prefixing the search text with a comparison operator. The supported operators are: Comparison operator = != or <> > < >= <= Description Equal to (can be used to force an equals comparison for text fields) Not equal to Greater than Less than Greater than or equal to Less than or equal to
For drop-down lists, only the not equal to operator is supported in addition to the default equals comparison. To perform a not equal to comparison for a drop-down list, first select the value from the list, then type <> in front of the text.
- Page 81 -
field and <= 200 in the other to find all badges with IDs between 100 and 200 (inclusive).
The Person type drop-down list is subject to licensing restrictions. If this field is not displayed, move on to the next step.
4. 5.
Specify your search criteria by typing full or partial entries in the enabled fields. Click the [OK] button. OnGuard retrieves and displays the first matching record. Use the ,
, , , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
OnGuard retrieves and displays the first matching record. Use the
, , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
- Page 82 -
2.
From the Cardholder photo lookup drop-down list, select the image type you want displayed in Photo display (located in the right section of the Cardholders folder forms). Choices include: None - no image will be displayed Normal image - a photo image will be displayed as it was originally captured Normal image with chroma-key - a photo image will be displayed, but without its background
3.
From the Cardholder signature lookup drop-down list, select the type of signature you want displayed in Signature display (located in the right section of the Cardholders folder forms). Choices include: None - no signature will be displayed Normal image - a signature will be displayed
4.
In the Number of records to scroll for fast forward and rewind field, type in the number of records you want to move backwards and forwards when you select the and push buttons.
5.
- Page 83 -
Cardholder Form
In the Visitor Management application, the Cardholder form is used to search for a cardholder.
- Page 84 -
4.
Enter the cardholders name and any additional information in the cardholder data fields. You can switch to other tabs and modify the other forms at this time.
Note:
5.
If you want to add a photograph or signature to the cardholder record, click the [Capture] button. The Multimedia Capture module opens. For more information please refer to the Multimedia Capture Module appendix in the System Administration User Guide.For more information please refer to Appendix B: Multimedia Capture Module on page 1143. Click the [OK] button to save the record.
6.
- Page 85 -
2.
3.
- Page 86 -
2.
Click the [Yes] button to confirm the deletion of all cardholder data.
- Page 87 -
Visitor Form
- Page 88 -
Last changed
Note:
5.
If you want to add a photograph or signature to the visitor record, click the [Capture] button. The Multimedia Capture module opens. For more information please refer to the Multimedia Capture Module appendix in the System Administration User Guide.For more information please refer to Appendix B: Multimedia Capture Module on page 1143. Click the [OK] button to save the record.
6.
- Page 89 -
- Page 90 -
Segments Form
Note: The Segments tab is only displayed if segmentation is enabled on your system.
- Page 91 -
display
7.
- Page 92 -
3.
Select the Make changes to segment assignments radio button or select the Set the exact assignments radio button if you want all assignments that
- Page 93 -
exist for the cardholders in your group to be replaced with the new assignments you select. 4. 5. 6. Click the [Next] button. Select which primary segment you want the selected groups of cardholders to be assigned to. If you selected the Set the exact assignments radio button in step 3, and if you want to assign additional segments (if any exist), click on an entry in the Segments listing window to select it. You can select multiple entries. Click the [Next] button. If you selected All Segments in step 5, proceed to step 10. If you selected the Make changes to segment assignments radio button in step 3: a. b. c. From the Segments listing window, select any assignments you want to add in addition to the primary segment. Click the [Next] button. If there are segment assignments you want to remove from the group, click on an entry in the Segments listing window to select it. You can select multiple entries. Click the [Clear] button to remove the assignment. Click the [Next] button.
7.
d. e. 8.
If you want to perform preliminary validation and be prompted with the results before proceeding, select the Perform preliminary validation and prompt for confirmation radio button. Select the Prompt only if a problem is found checkbox if you do not want to a prompt for confirmation if there is no validation problem. If you do not want to be prompted, select the Skip preliminary validation and perform the operation without prompting radio button. Click the [Next] button. If you selected the Skip preliminary validation and perform the operation without prompting radio button in step 8 or if you selected All Segments in step 5, the Bulk Action Results window opens and displays a summary of your modifications. Click the [OK] button. If you selected the Perform preliminary validation and prompt for confirmation radio button in step 8 and a problem was found, the Bulk Segment Validation Results window opens. a. b. c. d. Click the [View Badges] button. An explanation of the problem is displayed. Click the [OK] button. Click the [Continue] button. The Bulk Action Results window opens and displays a summary of your modifications. Click the [OK] button.
9.
- Page 94 -
- Page 95 -
and
navigation
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it. Navigate to a year by clicking on the displayed year to access the year spin buttons .
Once you have selected a month and a year, click on the day that you want the selected badge to activate on.
- Page 96 -
and
navigation
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it. Navigate to a year by clicking on the displayed year to access the year spin buttons .
Once you have selected a month and a year, click on the day that you want the selected badge to deactivate on.
Displayed in add or modify mode. Indicates the badge status for the selected badge. Status drop-down list choices are defined on the Simple Lists form of the List Builder folder.
PIN
numeric
Displayed in add or modify mode. Indicates the personal identification number for the selected badge. PIN numbers are used in conjunction with card readers that are operating in PIN Only, PIN and Card, or PIN or Card, mode. The maximum PIN length is determined by the PIN type field in the Access Panels folder. Note: For increased security, PIN codes are not viewable by any user. However, if the system is configured to randomly generate a new PIN code when adding a badge, the user can see the PIN code when they first add the badge (but not later).
- Page 97 -
APB exempt
checkbox
checkbox
Displayed in add or modify mode. If applicable, enter in this field any numbers or characters that are embossed on the card. Typically this applies to Proximity cards, which are embossed by the manufacturer prior to delivery. Displayed in add or modify mode. Indicates the date when the selected badge record was last saved. Displayed in add or modify mode. Indicates the most recent date that the selected badge was printed.
display display
6.
- Page 98 -
Note:
Some information is assigned by the system, and you may or may not be able to change it.
7.
Click on the [OK] button to save the record. If this is the only active badge assigned to this cardholder, you're done and do not need to proceed to the next step. If another active badge was previously assigned to this cardholder, the Change Badge Status window will open.
8.
9.
The current active badge is displayed in the Active Badge display. A cardholder is only allowed to have one active badge. You must change the status of the current active badge to Lost or Returned in order to assign a new active badge. Select Lost or Returned from the New Status dropdown list.
10. Click the [OK] button. The Access Level Assignment window opens.
11. Do one of the following: If you want the new active badge to have the same access level assignment as the previous active badge, select the Copy from the currently selected badge (Badge ID n, Issue Code n) radio button. If you want the new active badge's access assignment level to be the selected badge type's default access group, select the Use the new badge type's default access group radio button. If no access groups
- Page 99 -
have been assigned to the selected badge type, this option is not available. Access groups are assigned to badge types in the Badge Types folder. For more information please refer to the Badge Types Folder chapter in the System Administration User Guide. If you do not want to assign access levels to the new active badge at this time, select the No access levels for this badge radio button.
- Page 100 -
3.
If you want to update fields, chose which fields you want to update. You can: Select the Update Activate Date checkbox and enter a new activate date to be assigned to the selected group of badges. Select the Update Deactivate Date checkbox and enter a new deactivate date to be assigned to the selected group of badges. Select the Update Badge Status checkbox and enter a new status to be assigned to the selected group of badges. Select the Update Use Limit checkbox and enter a new use limit to be assigned to the selected group of badges.
4.
If you want to filter which badges from the selected group will get modified, do so in the Badge Filter section. You can filter by badge status and/or badge type. If you do not want to filter badges, check the Update badges of all Statuses and Update badges of all Types radio buttons. Click the [OK] button. A message will be displayed asking if you want to continue with the modification. Click the [Yes] button. The Bulk Action Results window opens and displays a summary of your modifications.
5. 6.
- Page 101 -
7.
- Page 102 -
- Page 103 -
checkbox
display
checkbox
display
push button
Access Groups
push button
- Page 104 -
Note:
If the Show inactive badges checkbox is selected, the Show levels for badge ID (issue code) drop-down list will list both the active and inactive badge(s) assigned to the selected cardholder.
5. 6.
Click the [Modify] button. Select the Show unassigned levels checkbox. The Access levels display will list both access levels that have been and that can be assigned to the selected cardholder/badge record. To find out more about a particular access level, either double-click on and access level entry, or right-click on an access level entry and select the Level Definition menu option. A popup window opens, listing the reader/time zone combinations that define the access level. For example:
Note:
7.
Click on an access level in the Access levels display to select it. Optional: If you want to assign all the access levels that belong to an access group: a. Click the [Access Groups] button. The Select Access Levels in a Group window opens.
b.
The Select Access Levels in a Group window lists all currently defined access groups. You can expand an entry to display the list of access
- Page 105 -
levels that make up a group. Select an access level or an access group. If you select an access group, you select all of the access levels it contains. c. d. 8. 9. Click the [Select] button. Click the [Yes] button.
Repeat step 7 for each access level you want to assign. Click the [OK] button.
- Page 106 -
3. 4.
Click on an access level or access group entry to select it. In the Activation Date section, either type a numeric date into the field, or select a date from the drop-down calendar.
and
navigation buttons.
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it. Navigate to a year by clicking on the displayed year to access the year spin buttons .
Once you have selected a month and a year, click on the day that you
- Page 107 -
want the selected badge to activate on. 5. 6. 7. 8. In the Deactivation Date section, repeat step 4, choosing the date when you want the selected badge to become invalid. Click the [Set] button. Repeat steps 3-6 for each access level entry. Click the [OK] button.
3.
Click on the access level you want to assign to select it. You can select multiple entries. Optional: If you want to assign all the access levels that belong to an access group: a. Click the [Access Groups] button. The Select Access Levels in a Group window opens. The Select Access Levels in a Group window lists all currently defined access groups. You can expand an entry to display the list of access
- Page 108 -
levels that make up a group. Select an access level or an access group. If you select an access group, you select all of the access levels it contains.
b. c. 4.
If you want to define the activation and deactivation dates, click the [Activate Dates] button. For more information please refer to Assign Activation and Deactivation Dates to Access Levels on page 107. Select the Overwrite activate date settings for existing assignments if you modified the activation and/or deactivation dates and you want your changes to overwrite existing assignments. Select the Delete existing assignments checkbox if you want to delete all existing access level assignments for the selected cardholder/badge records and replace them with your bulk selections. Click the [OK] button. All active badges will be affected by this change, even in multiple active badge environments.
5.
6.
7. Note:
- Page 109 -
c. d. 4. Note:
Click the [OK] button. All active badges will be affected by this change, even in multiple active badge environments.
- Page 110 -
- Page 111 -
Exclusion or Inclusion groups are defined on the Precision Access form of the Access Levels folder. Assigned Groups Assign display push button Lists the Inclusion/Exclusion Groups assigned to the selected cardholder/badge record. Assigns to the selected cardholder/badge record the access levels selected in the Precision Access Inclusion/Exclusion Groups field. Removes from the current cardholder/badge record the access levels selected in the Precision Access Inclusion/Exclusion Groups field.
Remove
push button
4. 5.
- Page 112 -
Exclusion groups) or readers and timezones (if entries are Inclusion groups) that make up the group. You can select only one group at a time. By selecting a precision access group you select all of the readertimezone combinations it contains. These combinations are defined on the Precision Access form of the Access Levels folder.
6. 7.
Click the [Assign] button. The group(s) you selected will be listed in the Assigned Groups window. Repeat steps 5 and 6 for each additional group you want to assign to the badge. You can assign multiple Exclusion or Inclusion groups in addition to the 6 access levels that a cardholder can normally have. Click the [OK] button.
8.
- Page 113 -
Biometrics Form
- Page 114 -
Hand Geometry A hand geometry template is a representation of the cardholders handprint that is stored in the database. For more information please refer to the Multimedia Capture Module appendix in the System Administration User Guide. When an ID card is presented to the primary access control reader (a hand geometry reader is considered an alternate reader that is used in association with a primary reader, such as a magnetic stripe or proximity reader) it will ask for verification from the alternate reader. The system will compare the stored hand geometry template with the cardholder's actual handprint for verification. A primary access control reader will only ask for verification from the hand geometry reader when the Verify Mode checkbox (located on the Settings form in the Readers folder) is selected. For more information please refer to the Readers folder in the System Administration User Guide.
- Page 115 -
Search Type
drop-down list
6.
, , , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
- Page 116 -
- Page 117 -
Type Purpose
4. 5. 6.
Click the Visits tab. Click the [Modify] button. The Allowed visitors checkbox setting controls a cardholders permission to have visitors. Select the setting you want for the selected cardholder. The two possible settings are: When the Allow visitors checkbox is selected, the cardholder will be allowed to have visitors. Only cardholders with the Allow visitors checkbox will be returned when searching for a cardholder and attempting to add a new visit. When the Allow visitors checkbox is not selected, no visits to the cardholder can be scheduled.
- Page 118 -
Note:
Changing the Allow visitors checkbox setting for a cardholder will only change the cardholders ability to have visitors after the setting has been changed; any previously scheduled visits will be allowed to occur.
7.
- Page 119 -
Assets Form
- Page 120 -
UNASSIGN AN ASSET
1. 2. In the Asset listing window, click on the name of an asset to select it. Click the [Unassign] button.
- Page 121 -
Note:
A record can only be modified if an asset group was assigned when the cardholder or visitor was added.
- Page 122 -
- Page 123 -
push button
Unlink
push button
d.
Note:
To help you search, the Value field will contain different ways that the selected account may be expressed. For example, if the user account Lisa
- Page 124 -
Lake is selected, the permutations listed might be L. Lake, LISA, Lisa, Lisa L., Lisa Lake, LL, Lake, and Lake, Lisa. e. f. Click the [Search] button. The accounts associated with the selected Directory will be displayed in the Accounts listing window. If the account you wish to link to is displayed, select it. Your window should look similar to the following:
g. h. 5.
If the account you wish to link to is not displayed, return to step d and select another Value to search for.
Click the [OK] button. Repeat steps 3 and 4 for each directory account you wish to link to the selected user account.
- Page 125 -
- Page 126 -
Displays the number of security clearance levels that have been assigned to the selected cardholder. For example: 6 levels assigned.
- Page 127 -
Reports Form
- Page 128 -
6.
Note:
- Page 129 -
- Page 130 -
Chapter 6:
Assets Folder
The Assets folder contains forms with which you can: Add, change, or remove asset records. Assign assets to cardholders. Track assets that are assigned to cardholders. Preview and print asset reports.
The Assets folder contains four forms: the Assets form, the Asset Classes form, the Assignments form, and the Reports form. Toolbar Shortcut This folder is displayed by selecting the Assets choice from the Administration menu, or by selecting the Assets button on the Administration toolbar.
- Page 131 -
Assets Form
- Page 132 -
Type
drop-down list
Subtype
drop-down list
Last Inspection Next Inspection Acquired Replace Assessed Value Replacement Value Asset Can Be Disabled
- Page 133 -
- Page 134 -
5.
6. 7. 8. 9.
10. In the Assessed Value field type the amount, in dollars, of the assets value. In the Replacement Value field type the amount, in dollars, it will cost to replace the asset. 11. Check the Asset Can Be Disabled checkbox if the asset can and you want it to be disabled when the asset generates an access denied alarm (when a cardholder is not assigned to the asset.) The Can Disable Asset checkbox on the Settings form of the Readers folder in the System Administration application must also be checked in order for the selected reader to disable the asset. 12. Click the [Capture] button to launch the Multimedia Capture module from where you can capture a photo of the asset to be displayed on the Assets form. For more information please refer to the Multimedia Capture Module appendix in the System Administration User Guide. 13. You can switch to the Asset Classes form if you want to configure groups and classes now. For more information please refer to Asset Classes Form Procedures on page 140. 14. Click the [OK] button.
- Page 135 -
MODIFY AN ASSET
1. 2. 3. 4. Locate the asset record that you want to change. Click the [Modify] button. Make the changes you want to the fields. Click the [OK] button to save your changes, or the [Cancel] button to revert to the previously saved values.
DELETE AN ASSET
1. 2. 3. Locate the asset record that you want to delete. Click the [Delete] button. Click the [OK] button.
3.
4.
, , , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
- Page 136 -
, , , , and buttons to navigate through the database. A dimmed button means that the associated operation is not possible (e.g., moving to the next record while the last record is being displayed).
3. 4. 5.
Click the [Add] button. Enter the name of the asset type. Do one of the following: If you don't want to add subtypes to this asset type, click the [OK] button. If you want to add a subtype, select the Subtype tab then click the [Add] button. Enter the name of the subtype, then click the [OK] button.
6.
- Page 137 -
- Page 138 -
- Page 139 -
- Page 140 -
3. 4. 5. 6. 7.
To add an asset group, click the [Add] button. In the Asset Group field, enter the name of the group you are adding. Click the [OK] button. To add an asset class, select the Asset Class tab, then click the [Add] button. In the Asset Class field, enter the name of the class you are adding. You can add as many classes as you want but you can only assign as many as 32 classes to a group. To assign a class to a group, select the name of a group in the Asset Groups listing window. Click the [Modify] button.
8. 9.
10. Select the name of the class you want to add in the Asset Class listing window. 11. Click the push button. To remove the asset from the group, select push
the class in the Asset Class listing window, then click the button. 12. Click the [OK] button.
- Page 141 -
Assignments Form
- Page 142 -
Unassigned
numeric
- Page 143 -
3.
4.
- Page 144 -
UNASSIGN AN ASSET
1. 2. Locate the record of the asset that you want to unassign. In the listing window, select the name of the cardholder who is currently assigned to the asset. The entry of the cardholder who is assigned will not list an Unassigned Date. Right-click on the cardholder entry you selected and choose Unassign Asset from the menu. The Unassigned field will be updated to the current date.
3.
- Page 145 -
Reports Form
- Page 146 -
Select this checkbox if you want to limit this report to the search that you just completed. Displays a description of the report type you selected from the listing window. Displays the file name of the report type. Displays the captured photo of the currently selected asset. Displays the date and time of the assets last access. Displays the name of the cardholder currently displayed in the Cardholders folder. If no name is displayed, when selected the Cardholders folder is launched from where you can search for and select the cardholder you wish to assign to the selected asset. This button is not used. This button is not used. This button is not used. This button is not used. This button launches the Report Print Options window from where you can preview, print, or export a report. Moves to the first matching record. Moves 10 matching records back. Moves to the previous matching record. Moves to the next matching record. Moves 10 matching records forward.
push button push button push button push button push button push button push button push button push button push button
- Page 147 -
4. 5.
Choose a Print Destination and if you want, update the text used for the report subtitle. Click the [OK] button. If you chose the Print Directly to a Printer radio button, select a printer from the drop-down list. If you select the Prompt for Number of Pages checkbox, the Print window will be displayed where you can
- Page 148 -
select print range, number of copies, and whether or not to collate your report. If you chose the Export Directly to a File radio button, the Export window will be displayed. Choose the report Format and Destination from the drop-down lists. Depending on what you chose, enter the destination and format information in the corresponding window, then click the [OK] button. If you chose the Print to a Preview Window radio button, an asset report print preview window will be displayed from where you can view the selected report on the screen. For more information please refer to the Report Print Preview Window chapter in the System Administration User Guide.
- Page 149 -
- Page 150 -
Monitor Video
- Page 151 -
- Page 152 -
Chapter 7:
Functions:
Displayed by:
The Video Verification window can be displayed several ways: Select the [Video Verification] toolbar button. From the View menu select Video Verification.
- Page 153 -
Comment Lists all panels and all readers that are in the system. Contains those readers from which the Video Verification window will receive information. If this list is empty, no alarms will be displayed in the Video Verification window. Displays live video from a CCTV (camera) device at a specific location. If you see a black box instead of live video, it means that either there is no camera available, or the camera isn't working properly. If you see a message indicating Not Available, it means that your System Administrator has made live video from that location unavailable to Alarm Monitoring stations.
Live Video
Displays a specific cardholder record photo. Includes the Photograph and Video checkbox fields. Photograph: If checked, as each new alarm arrives, the corresponding cardholder photo displays. Video: If checked, pan, tilt, and zoom CCTV commands are automatically enabled. If unchecked, pan, tilt, and zoom CCTV commands must be manually invoked. Live video remains visible regardless of the state of this checkbox.
- Page 154 -
Comment Lists alarms as they arrive. Each row represents one alarm. Click the following column headings to arrange alarms by that heading: Alarm Description: Name of the alarm Cardholder: Cardholder's name and Badge ID Time/Date: Time and date the alarm occurred. The way that the time and date are displayed varies according to the time/date settings chosen in the Windows Control Panel on your computer. Reader: Reader at which the alarm occurred
Resize the width of a column by positioning the mouse pointer over the boundary of two column headings. Then click and drag to resize the column. Close Closes the Video Verification window
- Page 155 -
Note:
The Panels/Reader list is located in the upper left portion of the Video Verification window. The Selected Readers list is located in the lower left portion of the Video Verification window.
To add an entry to the Selected Readers list, double-click the reader in the Panels/Readers list. To add a entry to the Selected Readers list, select one or more alarm(s) in the Main Alarm Monitoring window before you open the Video Verification window, the corresponding reader(s) will be added automatically. To add all the readers associated with a particular panel, double-click the panel entry in the Panels/Readers list. To remove a reader from the Selected Readers list, double-click the reader's entry in the Selected Readers list.
DELETE AN ALARM
To remove an alarm from the alarms window, click the alarm then select the Delete choice from the Edit menu or right-click on the alarm and select Delete.
- Page 156 -
To clear all alarms from the alarms window, select the Delete All choice from the Edit menu.
- Page 157 -
- Page 158 -
Chapter 8:
Video Monitoring
Video monitoring is the process of viewing live (as it is happening) video or previously recorded video using a CCTV cameras and monitors.
Video Monitoring performs the following functions: Displays video from one camera monitoring a given area. Displays video from a group of cameras successively. Displays video from a group of cameras or a recorder simultaneously. Displays recorded video associated with a video search Pan, tilt, and zoom recorded and live video
- Page 159 -
Toolbar button
Description Contains the following menu options: Live: Displays live video from one or several cameras depending on the view settings. Recorded: Displays recorded video File: Displays video clip from a file Note: A checkmark displays beside the option that is active.
Control menu
Displays several options to play, pause, and stop video as well as advance video, zoom in/out, adjust playback speed, search video, and remove video. Displays options to load video files, set start/end times to view recorded video, export video to a file, capture images from video, and create video events. Displays options to change what cameras views are displayed. Plays recorded video Stops playing recorded video.
Options menu
- Page 160 -
Toolbar button
Description Stops playing recorded video and resets the player to the beginning of the video. Advances video one frame at a time. In order to use frame advance you must first pause the video. Advances video to the end of the video. This option is only available when the Video Monitoring (video player) window is playing recorded video. For more information please refer to Video Search Window on page 171. Enlarges the view of a specific area on the video monitor, and changes the focal point of the video to the location of the cursor. The feature only applies to recorded video. Note: To deselect this feature click the Zoom Out toolbar button or from the Control menu select Digital Zoom In to deactivate the feature and remove the checkmark.
Zoom In
Zoom Out
Broadens the video view and changes the focal point of the video to the location of the cursor. This feature only applies to recorded video. Note: To deselect this feature click the Zoom In toolbar button or from the Control menu select Digital Zoom Out to deactivate the feature and remove the checkmark. To return to the default view click the Zoom Out toolbar button until the view no longer changes.
Previous Camera
Displays the previous camera view. This feature only applies when you have opened the Video Monitoring (video player) window so that you can view multiple images, and you are currently in single view. Note: To view multiple images either simultaneously or successively, you must open the Video Monitoring (video player) window by right-clicking on a Video Group in either the System Hardware window or the Device Groups window.
Next Camera
Displays the next camera view. This feature only applies when you have opened the Video Monitoring (video player) window so that you can view multiple images, and you are currently in single view. Note: To view multiple images either simultaneously or successively, you must open the Video Monitoring (video player) window by right-clicking on a Video Group in either the System Hardware window or the Device Groups window.
Adjusts the Video Monitoring (video player) window to display a single camera view. Enlarges the Video Monitoring (video player) window to display up to four camera views (two images across and two images down).
- Page 161 -
Toolbar button
Description Enlarges the Video Monitoring (video player) window to display up to nine camera views (three images across, and three images down). Displays live or previously recorded video. When live video is playing, the status bar displays the camera name
When recorded video is playing, the status bar is similar to the screen shot on page 160 and includes the following: Camera name or time range of recorded video playing Current date and time Frame advance scroll bar Video start time Video speed Video stop time
Surveillance-only Cameras
Surveillance only cameras (stand-alone IP cameras) support live video only, they cannot record or playback video or support PTZ, whereas IP cameras (Internet Protocol cameras) support all of these features. IP cameras are directly connected to the network with their own IP address. They do not need to be connected to a PC or a video capture card. More advanced IP cameras may provide additional functionality such as a built-in web server, motion detection, alarm inputs/ outputs and e-mail and FTP support. Note: Currently SPN-50, SPN-100, SPN-200 cameras can do surveillance and/or recording to a LDVR.NET-SPN video recorder. Sony and Axis cameras are surveillance only. For information on the types of video recorders available and the cameras they support refer to the Video Recorders and the Cameras They Support Table in the Video Devices folder chapter in the System Administration User Guide.
- Page 162 -
Add a workstation. To establish an IP address for your alarm monitoring workstation refer to the Add a Video Recorder in the Video Devices Folder chapter in the System Administration User Guide. Add a camera. To add a camera or a group of cameras to a recorder refer to the Add a Camera in the Video Devices Folder chapter in the System Administration User Guide.
Warning
When adding a surveillance-only camera be sure to enter a valid administrator username and password, and select the correct camera type. No error message displays in System Administration if an invalid or non-administrator username, password, or camera type is given. The camera will be marked offline in Alarm Monitoring and a message will display in the Communication Server window. Link hardware devices to a camera. To link hardware devices (readers, motion detectors etc.) with a camera please refer to the Add a Device Camera - Link in the Video Devices Folder chapter in the System Administration User Guide. Alarm -Video configuration. To associate an alarm with video please refer to the Alarm-Video Configuration in the Video Devices Folder chapter in the System Administration User Guide.
If you have monitoring zones established: Add a video recorder to a monitoring zone. To add a video recorder to a monitoring zone please refer to the Add a Monitor Zone in the Monitor Zone Folder chapter in the System Administration User Guide. Enable monitoring zone access from a workstation. To enable access to a monitoring zone please refer to the Add a Monitoring Assignment in the Monitor Zone Folder chapter in the System Administration User Guide.
- Page 163 -
LAUNCH VIDEO
You can launch video through the Device Groups window, the System Hardware Tree, the Live Video window, and their corresponding toolbar buttons. To launch video using the Live Video window, your cameras must be online. 1. From the View menu, select Device Groups, System Hardware, or Video Monitoring or, select the appropriate toolbar button. If you select View > System Hardware, you must also select the option, New System Hardware Window, or choose the appropriate hardware window that is already open.
Note:
2.
Do one of the following: a. b. Right-click on a camera, camera device group, or recorder, and select Launch Video OR drag and drop a camera, camera device group, or recorder into a Matrix View window.
MATRIX VIEW
The matrix view can be used to view multiple cameras simultaneously.
Note:
4.
You may do one of the following to launch video in the Matrix View: a. b. Right-click on a camera, camera device group, or recorder, and select Launch Video OR drag and drop a camera, camera device group, or recorder into a Matrix View window. In this case, selecting a camera device group or recorder will launch ALL of the live video from that particular group or recorder (up to 32 cameras at once).
5.
The Video Monitoring (video player) window displays. From the View menu, select As Matrix (2x2) or As Matrix (3x3), depending on the number of cameras you want to view. You can also select the Matrix View (2x2) and Matrix View (3x3) toolbar buttons. For more information please refer to Video Monitoring Window on page 160.
- Page 164 -
Note:
Since the Matrix View can display up to 32 cameras, there may be more cameras displayed than what will fit in the viewable area of the window. You may scroll to view video from other cameras, or resize the window to display them. This is done by allowing the pointer to hover over the corner or edge of the window until a double-headed arrow is displayed. Then, drag the window to its desired size.
6.
Note:
When viewing multiple cameras simultaneously, please note that the system displays each window in such a way that it is active (the status bar for each window is blue.) Therefore any right-click option will be applied to every window. To deselect a window, place the cursor in the window and click. The status bar is gray when the window is deselected.
- Page 165 -
Note:
2.
Right-click on a specific camera listed under a Camera Device Group and select Launch Video. The Video Monitoring (video player) window displays the camera view. You can also drag and drop a specific camera into the camera view.
Note:
- Page 166 -
2.
Notes:
Within the Date/Time window you can use the keyboard keys to quickly navigate between fields. Use the right and left arrow keys on your keyboard to navigate from minutes to seconds. Use the up and down arrow keys to navigate between AM and PM. Use the tab key to navigate between fields (Start Date, Start Time, End Date, and End Time).
3. 4.
From the Options menu select Export Video. This brings up a dialog in which you can enter the filename and select the file location. Click the [Save] button.
- Page 167 -
Note:
1.
From the Main Alarm Monitoring Window right-click on the desired alarm and Select Launch Video. The Video Monitoring (video player) window displays. Verify the recorded video is playing. From the Play menu select Recorded. Using the toolbar settings and the start and stop time fields identify the portion of video to be marked as an event. From the Options menu select Create Video Event. The Alarm Monitoring window will display a User Generated Video Event alarm in the Main Alarm Monitoring Window.
2. 3. 4.
- Page 168 -
Toolbar Shortcut
1.
Launch the Video Monitoring (video player) window by either selecting the [Video Monitoring] toolbar button or choosing the Video Monitoring option from the View menu. To configure the video tour, right-click the camera device group and select Configure Video. The Video Tour window displays.
2.
3. 4.
Select the desired View time and click the [OK] button. This is the amount of time each camera is displayed in the tour. Right-click the camera device group again and select Start Tour. The camera device group list displays in the left pane of the window. The right side of the window displays the camera views.
- Page 169 -
Using the PTZ Toolbar. The PTZ Toolbar contains a Pan and Tilt control that can be used to pan or tilt a camera. Once PTZ is activated, the buttons can be used to zoom in or out, move, and focus the camera. The user can also press and hold any of the zoom, focus or iris buttons to achieve their perspective affects. Using the Mouse. You can manipulate the Pan, Tilt, and Zoom controls by right or left clicking your mouse in the video window. A left mouse button click causes the camera to move toward the cursor. The camera keeps moving in that direction until the mouse button is released. If you right-click in the top half of the screen the camera will zoom in until the mouse is released. Clicking and holding the mouse in the bottom half of the screen causes the camera to zoom out. The farther away from center the mouse is the faster the device will pan, tilt, or zoom. If you have a scroll mouse moving the scroll wheel up will zoom in and moving the scroll wheel back will zoom out. Using the Keyboard. You can use your keyboard arrow keys to pan, tilt, and zoom. The left and right arrow keys pan the camera left and right. The up and down arrow keys tilt the camera up and down. Holding the <Shift> key down while pressing either the up or down arrow causes the camera to zoom in or zoom out.
- Page 170 -
Chapter 9:
Video search window performs the following functions: Motion detection analysis on recorded video and reports results in thumbnail image form. Searches recorded video for any event that meets the specified criteria. Enables recorded video that meets the search criteria to be played on the video player. The video search feature is only available for LDVR recorders.
Note:
- Page 171 -
Description Contains the following menu options: Start: Begins the video search, and resumes the video search if it is paused Pause: Temporarily stops the video search Restart: Restarts the video search at the beginning Displays the Event Settings window from which you can configure how search results are displayed. Note: Changing some of the event settings will require you to restart the search. If this is the case, a corresponding message will prompt you to do so.
Options menu
View menu
Contains two menu options for displaying search results; image or detail. In the screen shot above, the list view displays detailed information (Start Time, End Time, Duration, and Motion level). The starting/ending point for the video search. This display only field is set in the Video Monitoring (video player) window under the Options menu. Note: If you change the start/end time in the Video Monitoring (video player) window, you must restart the video search for the new settings to apply.
- Page 172 -
Description The minimum motion level required to be included in the search results. The motion level range is 0 to 100, where 0 represents no motion. The first and last frames of an event must have a motion level equal to or greater than the motion level value to be included in the search results. A color-coded graphical representation of motion levels. Red indicates a frame meets or exceeds the minimum motion level. Green indicates a frame is less than the threshold value. Click on any part of the histogram to view the corresponding recorded video. You do not need to wait for the search to be complete to do so. The main part of the Video Search window which displays icons or detailed information about search results. In the screen shot above, the list view displays detailed information (Start Time, End Time, Duration, and Motion level). Double-click an icon or an event listed in the List view to view the corresponding recorded video for that event in the Video Monitoring (video player) window. You do not need to wait for the search to be complete to do so.
Histogram
List view
EVENT SETTINGS
When searching for events, it is possible that an event occurs through out several frames. Therefore the user can make adjustments to the event settings to obtain the best results for his/her situation.
Field Display new event if there has not been motion for the specified amount of time
Description Enter a time limit in seconds. If an event has an interval without motion longer than the value entered, it will be displayed as multiple events. Increasing the amount of time decrease the number of frames that meet or exceeds the minimum motion level, and therefore the number of red lines displayed in the histogram.
- Page 173 -
Description Filters the event list. This is useful in situations where there is extraneous noise. For example, when artificial lighting is unstable and flickers causing the video camera to capture the event. Displaying events that have a duration longer than one or two seconds is an effective way to remove such noise. Generates a thumbnail image after the specified amount of time.
Generate thumbnail after the start of the event by a specific time Generate thumbnail from the highest motion level in the event Scale of displayed thumbnails
Generates a thumbnail image from the highest motion level in the event. Specifies the scale of icons displayed in the Video Search window. Options include a 1:1 ratio, where the icon is the same size as the image in the Video Search window, down to a 1:8 ratio, where icon is 1/8th of its original size. Specifies the amount of preroll time when the user plays back events. Applies the event settings and closes the window. Closes the Event Settings window without applying any changes.
- Page 174 -
Search Video
1. 2. 3. Display the Video Monitoring (video player) window. For more information please refer to Launch Video on page 164. From the Play menu option select Recorded. A checkmark beside the menu option identifies the option as active. From the Options menu select Set Start/End Date. The following window displays:
4.
Enter the desired date and time ranges you wish to search, and click the [OK] button. Within the Date/Time window you can use the keyboard keys to quickly navigate between fields. Use the right and left arrow keys on your keyboard to navigate from minutes to seconds. Use the up and down arrow keys to navigate between AM and PM. Use the tab key to navigate between fields (Start Date, Start Time, End Date, and End Time).
Notes:
Toolbar Shortcut
5.
Notice the Video Monitoring (video player) window immediately begins to play the recorded video starting with the start date and time specified. To
- Page 175 -
search for video within the date range that has a specified level of motion, complete the remaining steps. 6. From the Control menu select Video Search or click the Video Search toolbar button located in the Video Monitoring (video player) window. The Video Search window displays. From the View menu select the desired view; images or details. The active view contains a checkmark beside it. From the Options menu select Event Settings. Make the desired setting changes and click the [OK] button. For more information please refer to Event Settings on page 173. Click the [OK] button to acknowledge the warning that you must restart the search for the new settings to take affect.
7. 8.
9.
Note:
- Page 176 -
You can pause, stop, advance video one frame at a time, and fast forward video to the end of the search results, as well as zoom in/out by using the appropriate toolbar buttons. For more information please refer to Video Monitoring Window on page 160. When the Video Monitoring (video player) window is playing recorded video, as compared to live video, the lower portion of the window displays the following:
C F
The beginning and ending time for the video search. This value is set from the Options menu in the Video Monitoring (video player) window. Field A and B automatically oscillate between the time range and the current time and camera name. Note: The camera name is configured using System Administration. From the Video menu select Video Devices, then click the camera tab.
- Page 177 -
Symbol B
Description The date and time of the video currently playing. Field A and B automatically oscillate between the date and time display, and the current time and camera name. Note: The camera name is configured using System Administration. From the Video menu select Video Devices, then click the camera tab.
Move the scroll bar back and forth to view video from a different date/ time. You do NOT need to pause or stop video to use the video display scroll bar. Start time of the video to be played. Use this feature to further filter your video search or expand your video search by setting the start time before or after your original search start time. Determines how fast the video is played as well as searched. Using the cursor click near the minus symbol to slow the video down or click the plus symbol to speed the video up. You can also adjust the speed by clicking and moving the speed bar arm to the desired level. End time of the video to be played. Use this feature to further filter your video search or expand your video search by setting the end time before of after your original search end time.
Speed bar
End time
- Page 178 -
Guard Tour
- Page 179 -
- Page 180 -
A late event means the checkpoint was reached after its maximum time expired. An overdue event means the checkpoint has not yet been reached.
Guard tours are added in the Guard Tour folder in the System Administration application. For detailed information on how to configure a guard tour, refer to the Guard Tour Folder chapter in the System Administration User Guide. Once a tour has been configured, it can be launched and tracked from the Alarm Monitoring application. Guard Tour requires the configuration of a linkage server in the system. The linkage server and the communication server (the server controlling the devices for the tour) must be running in order to launch a tour in Alarm Monitoring.
Note:
- Page 181 -
Toolbar Shortcut
Click the down arrow on the [Guard Tour] toolbar button and select Launch Tour. Right-click on a tour name in the system hardware tree and select Launch Tour.
2. Note:
Select a tour in the Tour listing window. You can click the [Tour Instructions] button to see if any special instructions exist for this tour. These instructions are written when the tour is configured in System Administration.
3.
If you know the badge ID of the tour guard, select the Enter badge ID manually radio button and type in their ID. Otherwise select the Select guard radio button and complete the following: a. Select the Show guards with proper security clearance level radio button to limit the number of tour guards to choose from or select the Show all guards radio button to list all tour guards, regardless of their security clearance levels. Click a tour guard entry in the Name listing window to select it.
b. 4. 5.
Click the [OK] button. The Guard Tour Live Tracking window opens. At this time, the tour guard can begin the tour. As the tour progresses, the status of checkpoints and generated events display in the Guard Tour Live Tracking window. For more information please refer to Guard Tour Events on page 183. Checkpoints can be predecessors or successors. A predecessor checkpoint is any checkpoint occurring before other checkpoints on a tour. For example: a tour has three stops. Checkpoints one and two are the predecessors to checkpoint three. A successor checkpoint is any checkpoint occurring after
Note:
- Page 182 -
other checkpoints on a tour. For example: a tour has three stops. Checkpoints two and three are successors to checkpoint one.
6.
When a tour is completed, the Guard Tour Live Tracking window will display the status of the tour and the events that were generated.
- Page 183 -
Generated for readers in all modes except locked and unlocked on Apollo panels. Generated when any inputs that are used as checkpoints are activated.
Generated when a checkpoint is the next checkpoint on a tour and is hit before its minimum checkpoint time has elapsed. Note: Checkpoint reached events are:
Generated for readers in all modes except locked and unlocked on Apollo panels. Generated when any inputs that are used as checkpoints are activated.
Generated when a checkpoints maximum checkpoint time has elapsed and the guard has not yet arrived. Generated for a checkpoint when its maximum checkpoint time has elapsed and it is then hit. Note: Checkpoint reached events are:
Generated for readers in all modes except locked and unlocked on Apollo panels.
Generated when any inputs that are used as checkpoints are activated. Readers on Apollo panels in locked and unlocked modes will not report cardholder events. Therefore, although those readers may be included within a guard tour, the status of those checkpoints will not be updated within the live tracing of the tour. Furthermore, since the status of a checkpoint reader in the locked or unlocked mode cannot be updated, tours containing such checkpoints will generate a Completed With Errors with Errors event when finished.Until this is investigated further, it must be assumed that readers
View Instructions
- Page 184 -
- Page 185 -
Guard Tour completed/ Guard Tour cancelled/ Guard Tour terminated/ successor hit first
Checkpoint Missed Checkpoint maximum time expired Guard Tour completed/ Guard Tour cancelled/ Guard Tour terminated/ successor hit first
Checkpoint Overdue
Checkpoint hit
- Page 186 -
SCHEDULER
- Page 187 -
- Page 188 -
Toolbar Shortcut
- Page 189 -
Scheduler Form
- Page 190 -
Listing window Add Modify Delete Help Close display push button push button push button push button push button
Displays a list of all scheduled actions. Click this button to open the Add Action Wizard. Click this button to modify the selected scheduled action. Click this button to delete the selected scheduled action. Click this button to display online assistance for this form. Click this button to close the Scheduler folder.
- Page 191 -
Note:
You can also display the Add Action Wizard by right-clicking anywhere on the Scheduler form and selecting the Add Action menu option.
3.
Select either Action Types or Action Group Library from the Category listing window. When Action Types is selected, the Objects listing window lists all available action types. When Action Group Library is selected, the Objects listing window lists all action groups which have been either created in or saved to the
- Page 192 -
action group library. For more information please refer to the Action Group Library Folder chapter in the System Administration User Guide. 4. 5. Click on an entry in the Objects listing window to select it. Click the [Next] button. Depending on which Category/Object combination you chose in steps 3 and 4, a corresponding action properties window will open. For example, if you selected Action Types in the Category listing window, and Archive/Purge Database in the Objects listing window, then the Archive/Purge Database Properties window would open. Click the Schedule tab. The Schedule form is displayed. The Schedule form is the same in every action properties window that is accessed via the Scheduler folder.
6.
7.
From the World time zone drop-down list, select which time zone you want the action to be scheduled in. The selections in the drop-down list are listed sequentially, and each includes: The world time zones clock time relative to Greenwich Mean Time. For example, (GMT+05:00) indicates that the clock time in the selected
- Page 193 -
world time zone is 5 hours ahead of the clock time in Greenwich, England. 8. The name of one or more countries or cities that are located in that world time zone.
If you want to schedule the action to occur more than once, skip this step and proceed to step 9. If you want to schedule the action to occur once: a. b. Select the One time radio button. In the On date field, the current date is entered by default, but you can change this value by typing a numeric date into the field, or by selecting a date from the drop-down calendar.
and
navigation buttons.
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it. Navigate to a year by clicking on the displayed year to access the year spin buttons .
c. 9.
Once you have selected a month and a year, click on the day that you want the action to occur.
In the At time field, select the time when you want this action to occur. Proceed to step 10. Select the Recurring radio button. Click the [Change] button. The Edit Recurring Action Schedule window opens.
- Page 194 -
c.
Do one of the following: Select the Daily radio button in the Occurs section if you want the action to occur on a daily basis. If you want the action to occur every day, in the Daily section, type the number 1 in the Every___day(s) field. If you want the action to occur every other day, type the number 2, and so on. Select the Weekly radio button in the Occurs section if you want the action to occur on a weekly basis. If you want the action to occur every week, in the Weekly section, type the number 1 in the Every___week(s) on field. If you want the action to occur every other week, type the number 2, and so on. You must also select the checkbox that corresponds with the day of the week that you want the action to occur. For example, if you want the action to occur every other Monday, type the number 2 in the Every___week(s) on field, and select the Mon checkbox. Select the Monthly radio button in the Occurs section if you want the action to occur on a monthly basis. Then, do one of the following: Select the Day___of every___month(s) radio button and type in which day of how many months you want the action to occur. The following example shows an action being scheduled to occur on the 4th day of every 6th month.
Select the The___of every___month(s) radio button and enter which day of how many months you want the action to occur.
- Page 195 -
The following example shows an action being scheduled to occur of the 2nd Tuesday of every 3rd month.
d.
In the Daily frequency section, do one of the following: If you want the action to occur only once on its scheduled day(s), select the Occurs once at___ radio button and enter a time. The following example shows an action being scheduled to occur at 12:00 PM.
If you want the action to occur more than once on its scheduled day(s), select the Occurs every___starting at___ending at___ radio button and enter the hours that you want the action to occur.
- Page 196 -
The following example shows an action being scheduled to occur every 2 hours, starting at 9:00 AM and ending at 5:00 PM.
e.
Enter the actions Start date. The current date is entered by default, but you can change this value by typing a numeric date into the field, or by selecting a date from the drop-down calendar.
and
navigation buttons.
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it. Navigate to a year by clicking on the displayed year to access the year spin buttons .
f.
Once you have selected a month and a year, click on the day that you want the action to begin occurring.
Enter the actions End date. The current date is entered by default, but you can change this value by typing a numeric date into the field, or by selecting a date from the drop-down calendar.
and
navigation buttons.
You can also select a month by clicking on the displayed month to access a drop-down list of months. Highlight the month you want to select it.
- Page 197 -
Navigate to a year by clicking on the displayed year to access the year spin buttons .
Once you have selected a month and a year, click on the day that you want the action to stop occurring.
Note:
You do not have to select an end date. If you do not want to set an end date, select the No end date radio button. g. Click the [OK] button.
10. Now you must configure the action that you have just scheduled. Select the tab to the left of the Schedule tab (this tab will correspond to the specific action properties window which you are viewing). For more information please refer to Appendix A: Actions on page 257.
- Page 198 -
Note:
If you right-click anywhere on the Scheduler form when a scheduled action is not selected in the listing window, the scheduler right-click menu will look like this:
START AN ACTION
1. 2. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed. Select the Start Action menu option to start the selected action immediately.
STOP AN ACTION
1. 2. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed. Select the Stop Action menu option to stop the selected action immediately.
- Page 199 -
application, and any errors or messages that resulted from the action are all displayed.
REFRESH AN ACTION
1. 2. Right-click on a scheduled action in the listing window. The scheduler rightclick menu is displayed. Select the Refresh Action menu option. The listing window will be updated to display the most current information for the selected action.
- Page 200 -
3. 4. Note:
- Page 201 -
- Page 202 -
Hardware
- Page 203 -
- Page 204 -
Note:
Clicking on the System Hardware button (not the arrow) will bring up a new System Hardware window if there is none present. If a System Hardware window is already open, clicking on System Hardware button causes the default (first) window to be active.
Click the window tab you wish to be active (located in the lower left corner of the screen). From the View menu, select System Hardware and then the window you wish to be active. Choose one of the numbered options under the Window menu.
- Page 205 -
Though rare, if more than nine System Hardware windows are open, the More Windows menu option will be available. Choose a window from the list and click the [OK] button to bring it to the foreground and make it active.
Description When you open and maximize the System Hardware window, a System Hardware icon displays to the left of the File menu option.
Clicking this System Hardware icon displays the following options: View Hardware Tree View Hardware List System Hardware Options Lock Display Updates
Update All Hardware Status Note: This icon is only present when the System Hardware window is open and maximized.
- Page 206 -
Description The information in the window is displayed in hierarchical fashion, also called a tree or branching arrangement. Each entry in the list contains the name of one device. Access Panels have the leftmost entries. For a specific Access Panel, a device connected to it is listed below and indented to the right. Each device connected to those devices is listed below them and further indented. An icon to the left of each entry identifies the entry's type. Note: Global Anti-Passback Areas and Muster Zones are also included in the hardware tree display window. The normal areas, safe locations, and muster zones all have right-click menu options. You can bring up Occupancy reports on normal areas and safe locations, and Occupancy and Muster reports on muster zones.
Located on the lower left portion of the screen, the status bar on the System Hardware window has four counters: Viewing: Shows the number of devices viewed. Active: Shows the number of active points in the monitoring zone. This is NOT the same as the number of active devices. For example: If a reader is in the Door Forced Open, Door Held Open, and Reader Tamper states, the active count is increased by three. The active device number is not increased. Offline: Shows the number of offline devices in the Monitoring Zone. Every device is counted in this number, including alarm inputs, reader auxiliary inputs, alarm outputs, and reader auxiliary outputs. Masked: Shows the number of masked points in the Monitoring Zone.
- Page 207 -
- Page 208 -
Notes:
An X through an icon indicates a broken connection, meaning that the software cannot communicate to the device for some reason. For example: Although surveillance-only cameras are not associated with a physical video recorder, they will be assigned to a virtual surveillance-only recorder to maintain consistency in the user interface. For example, the Alarm Monitoring hardware tree below shows two surveillance-only cameras assigned to a virtually surveillance-only recorder. which serves only as a placeholder to group cameras.
Right-clicking on a window entry displays a popup menu. The menu choices available depend upon the type of entry that is selected. The tasks you can perform are described in the procedures on page 69, page 214, and page 221.
- Page 209 -
- Page 210 -
Panel Memory Mismatch Panel Memory Low Panel database download in progress Cabinet tamper Power Failure Panel type/Panel type mismatch Panel options mismatch Total memory, memory free Max cardholders, current cardholders Max assets, current assets Max RSI templates, Current RSI templates Last dialup time Panel/Controller (Lenel hardware only) Alarm Mask Group (Lenel and Apollo only) Max identix templates, current Identix templates Mask count
- Page 211 -
Note:
- Page 212 -
Note:
This quick search feature is not restricted to the hardware list window.
A popup menu can be displayed for any device in the view by right-clicking on the item. This menu is equivalent to the menu displayed in the Tree and Map views.
- Page 213 -
Hardware Status Frequency from the Configure menu) to No Updates, 10, 15, 20, 30, or 60 minutes.
To view a dialup panel's Last connect time within Alarm Monitoring: 1. 2. Display the System Hardware window. Locate the dialup panel in the System Hardware window. In parenthesis after the name of the dialup panel, the Last connect time is listed.
- Page 214 -
mode is enabled, the normal card and/or pin access is required and then a biometric match is required. When verify mode is disabled, only the card and/or pin access is required. Activate - activates the outputs associated with the selected access panel. Deactivate - deactivates the outputs associated with the selected access panel. Pulse - pulses all outputs associated with the selected access panel. Mask - masks inputs or alarms for the currently selected reader. Unmask - unmasks inputs or alarms for the currently selected reader. GuardTour - displays the Start Guard Tour window (launch) or the View Guard Tour window.
Right-click the access panel in the hardware tree and select the Download database option.
- Page 215 -
Notes:
You can also display the System Hardware Options window by clicking the System Hardware icon that displays to the left of the File menu option (when you open the System Hardware window).
Description Displays all the devices (active, offline, masked, armed, disarmed, and areas in alarm) in the System Hardware window.
- Page 216 -
Description Displays specific types of devices including: Note: If one or more of the specified device selections are made; only devices matching those criteria display in the view.
Active devices Displays only active devices in the System Hardware window. Offline devices Displays only offline devices in the System Hardware window. Masked devices Displays only masked devices in the System Hardware window. Armed areas Displays only armed areas in the System Hardware window. An area is a separately configured section of an Intrusion Detection Panel, sometimes referred to as a partition. To arm an area means to turn on the protection for an area. Disarmed areas Displays only disarmed areas in the System Hardware window. Areas in alarm Displays only areas that have an active alarm triggered. View Displays information about devices in one of two formats: Tree Displays information in a hierarchical fashion, also called a tree or branching arrangement. Each entry in the list represents one device. Panels have the leftmost entries and any device connected to a panel is listed below the panel and indented to the right. Each device connected to those devices is listed below them and further indented. Note: You can also view the hardware tree from the Configure menu. Select System Hardware Options and then select the Tree radio button.
List Lists the following information about devices in the system: Device (Name) Parent Device (Name)
Current Device Status Any column can be sorted in ascending or descending order by clicking the column heading. You can also click and drag columns to reorganize the column order. This is important because it allows you to quickly locate or search for a device. Note: The hardware list displays separate rows for Reader Auxiliary Input and Reader Auxiliary Output devices.
- Page 217 -
Description The Lock display updates feature prevents items from being added or deleted from the view. When specified devices (active devices, offline devices, or marked devices) are displayed in the view, devices will be added to and removed from the view automatically as their device status changes. For example, if an input becomes active and the view is displaying active devices, the input will be added to the view. If the input is now restored, it will be removed from the view. On a busy system, it sometimes might be convenient to lock in a snapshot of the system and prevent these automatic additions and deletions. When Lock Display Updates is selected, it prevents devices from being added to or deleted from the view. The statuses of the devices currently in the view are still automatically updated as their statuses change, but as the status of other devices not in view changes, they are not added to the view. When display updates are locked, an indicator on the status bar will display LOCKED. When not locked, the indicator is blank. You can lock/unlock display updates via the System Hardware icon that displays to the left of the File menu option or the System Hardware Options window.
OK Cancel
Accepts the settings and closes the window. Closes the window without saving any changes made to the settings.
2.
b. c.
Select the Tree radio button to view the system hardware in a tree or branching format. Select the Lock display updates checkbox if desired.
- Page 218 -
The following columns exist in list view: Device (Name), Parent Device (Name), and Current Device Status. Any column can be sorted in ascending or descending order. You can use the columns in list view to sort and locate devices. For more information please refer to Locate or Search for a Device on page 212. 1. To view the System Hardware window in a list format, verify you are in the System Hardware window, then select Configure > System Hardware Options from the Alarm Monitoring software menu. The System Hardware Options window displays. a. Select the type of device you would like to display by clicking either the All devices or Specified devices checkbox. If you selected the Specified devices checkbox, select the desired device by clicking the appropriate radio button (active, offline, or masked devices)
2.
b. c.
Select the List radio button to view the system hardware in a tree or branching layout. Select the Lock display updates checkbox if desired.
- Page 219 -
- Page 220 -
Intercom Procedures
CALL AN INTERCOM STATION
Toolbar Shortcut 1. From the View menu select System Hardware or click the View System Hardware toolbar button.
Intercom Icon
2. 3. 4.
In the System Hardware window, expand the tree until the intercom icon for the desired intercom panel entry is visible. Right-click the desired intercom station and select Place Call. The Place Intercom Call window opens. In the Station Number to Call field, type the number of the station you wish to call and click the [OK] button.
5.
When the Successfully sent request for intercom call message displays, click the [OK] button.
4.
- Page 221 -
- Page 222 -
Toolbar Shortcut
2. 3. 4.
Select the Access Panel menu option from the Trace menu or click the [Trace Controller] toolbar button. OnGuard displays a message window, asking you to verify the name of the device to be traced. Click the [OK] button. A second dialog box will be opened, where you can choose to display the trace history for the selected device. The Trace Configuration illustration shows the default settings for the dialog. They are: Perform Historical Trace checkbox unchecked Start and End date set to the current date, Start and End time set to 0:00 and 23:59, respectively Perform Live Trace checkbox checked
Show Only Those Alarms Which Have Marked Video checkbox unchecked The dialog does not remember the selections that were made the last time it was used - these default settings are selected each time the dialog opens.
5.
Click the [Alarm Filter] button to configure the types of events that will be displayed for this trace, and the Alarm Filter window will open.
- Page 223 -
6. 7. 8.
In the Alarm Filter window, select the checkboxes to the left of the alarm types you want the trace to display. Click the [OK] button, and the Alarm Filter window will close. In the Trace Configuration dialog, click the [OK] button. OnGuard will open a Trace Monitor window for the selected device. The Trace Monitor window looks identical to the Main Alarm Monitoring window, but it displays only those alarms that are associated with the device being traced. The following illustrates this:
- Page 224 -
- Page 225 -
- Page 226 -
Note:
The status given for an access control reader that has an associated biometric reader indicates whether it is in verify mode. If it is in verify mode, verify mode enabled is listed as part of the status. When the Display Controller Capacity option in the Options menu is selected, the maximum number of biometric templates and the current number of biometric templates currently set in a controller are also displayed. Since the RSI biometric reader cannot be used with OnGuard without an access control reader, no real actions can be done on it. Transaction will be logged when a reader enters or leaves biometric verify mode (Biometric Verify Mode Disabled, Biometric Verify Mode Enabled).
- Page 227 -
- Page 228 -
To display the Biometric Score in alarm views: 1. Display the alarm view you want to add the Biometric Score column to and make it the active (topmost) window. The following table summarizes how these views are displayed: How to display: In the main window, click the Main Alarm Monitoring tab. Select the Pending Alarms option from the View menu Select an appropriate option such as Monitor Zone from the Trace menu. Select the trace options, then click [OK]. The trace will be executed and the Trace window will be displayed. Select the Video Verification option from the View menu
Video Verification 2. 3. 4.
From the Configure menu select the Columns option. In the Select Columns section, select Biometric Score and click the [>>] button. Biometric Score will now be listed in the Columns to view section. With Biometric Score highlighted, click the [Up] or [Down] button to adjust the new column's position relative to the other columns. Click the [OK] button. For more information please refer to Chapter 2: Arrange, Add, and Remove Columns Displayed on page 42.
5.
- Page 229 -
To display only biometric event types: 1. 2. Display the alarm view you want to display biometric events for and make it the active (topmost) window. From the Configure menu select Alarm Filter. The Alarm Filter for <window name> window will be displayed, where window name is the name of the window that events are being filtered for. Select the Biometric checkbox.
3.
4.
- Page 230 -
Toolbar Shortcut
2. 3. 4.
Select the Access Panel menu option from the Trace menu or click the [Trace Controller] toolbar button. OnGuard displays a message window, asking you to verify the name of the device to be traced. Click the [OK] button. A second dialog box will be opened, where you can choose to display the trace history for the selected device. The Trace Configuration illustration shows the default settings for the dialog and includes the following: Perform Historical Trace checkbox unchecked Start and End date set to the current date, Start and End time set to 0:00 and 23:59, respectively Perform Live Trace checkbox checked
Show Only Those Alarms Which Have Marked Video checkbox unchecked The dialog does not remember the selections that were made the last time it was used - these default settings are selected each time the dialog opens.
5.
Click the [Alarm Filter] button to configure the types of events that will be displayed for this trace, and the Alarm Filter window will open.
- Page 231 -
6. 7. 8.
In the Alarm Filter window, select the Biometric checkbox. Click the [OK] button, and the Alarm Filter window will close. In the Trace Configuration dialog, click the [OK] button. OnGuard will open a Trace Monitor window for the selected device. The Trace Monitor window looks identical to the Main Alarm Monitoring window, but displays only those alarms that are associated with the device being traced.
- Page 232 -
- Page 233 -
Note:
The badge must have command authority in order for the extended held command to be accepted.
2.
The extended held open command is entered and consists of an asterisk, a command key sequence, the number of minutes you want to keep the door open (must be 3 digits), and the pound key. For example if the command code is 200 and you want to extend the door held open for 30 minutes, you would enter: *200030# a. The command key sequence is determined by the extended held open command configuration for the segment of the reader. For more information please refer to Configure Extended Held Open Command Attributes on page 236. In example above the command key sequence is 200. The number of minutes to keep the door open must be three digits (padded with zeros if necessary). In the example above, 30 minutes is entered as 030. If the number of minutes entered does not fall within the range defined by the extended held open command configuration for the segment of the reader, the command is rejected. For LCD readers a buzzer sound implies access is denied and text displays.
b.
Notes:
The door does not have to be opened first in order to enter the extended held open command. After the extended held open command is successfully entered, the strike time on the reader resets (starts over). If the strike time has already expired, the strike fires again. If the door was closed when the extended held open command was entered, the door must be opened before the strike time expires. If the door is not opened in time, the extended held open mode ends when the strike time expires.
3.
For LCD readers, while in extended held open mode, the time remaining displays and is updated every few seconds. When the pre-alarm time is reached, LCD readers beep regardless of whether the reader is configured to use the pre-alarm.
- Page 234 -
Notes:
The extended held open command can be rejected for the following reasons: The reader does not support the command. A valid card was not presented. A valid card was presented but does not have command authority. A valid card was presented with command authority but the incorrect command was entered. For example, a minute value was entered that is outside of the accepted range.
- Page 235 -
Note:
For a description of each field on the Readers form/tab please refer to the Readers Folder chapter in the System Administration User Guide.
- Page 236 -
Minimum and maximum extended held values (1 to 999 minutes) entered by the user. Pre-alarm time (1 to 30 minutes) when a reader is in extended held mode. This attribute must be configured on individual readers.
To configure extended held open command attributes: 1. 2. 3. 4. 5. 6. Note: Open System Administration or ID CredentialCenter. From the Administration menu select System Options. Select the Extended Held Command form/tab. Click the [Modify] button. Enter the desired command code, minimum and maximum extended held open times (minutes) and the pre-alarm time (minutes). Click the [OK] button. For a description of each field on the Extended Held Command form/tab please refer to the System Options Folder chapter in the System Administration User Guide.
- Page 237 -
- Page 238 -
MUSTERING
- Page 239 -
- Page 240 -
- Page 241 -
Occupancy report for a hazardous area. Initiates muster mode. The Start Muster Mode window displays providing an area to enter text. Ends muster mode. The Reset Muster Mode window displays providing an area to enter text.
- Page 242 -
Alarm monitoring operators can right-click on hazardous or safe area icons and view all or some of the options available in the Right-click muster mode alarm sub-menu options table on page 242, depending on the area selected.
Soft APB must be applied to safe locations. It is assumed that readers entering safe locations are used purely for registration purposes and not to actually gain access into the safe location. In other words it is not expected that a badge will be presented to a reader to register at a safe location except during a muster mode. Since readers entering safe locations are used purely for registration purposes and
- Page 243 -
not to gain access, any card transaction at a reader entering a safe location that contains a badge ID will be used to register that badge as being in a safe location. This includes granted with entry, granted with no entry, and access denied transactions. Note: Soft Global APB is required for safe locations.
This site wants to do mustering inside of a hazardous location. They also want to use APB within area 1 (hazardous location) and the two storage rooms (area 2 and area 3). To have APB control within the two storage rooms, area 2 and area 3 must be defined as separate areas.
- Page 244 -
When a Badge enters Storage Room B, the system will consider it to be area 3. As far as APB goes, that person is not considered to be in area 1 (the hazardous location). To function properly in this situation APB will not allow the badge to re-enter area 1 through any reader other than a reader leaving area 3. However, for purposes of mustering, a person in Storage Room B (area 3) or in Storage Room A (area 2) needs to be considered as being in a hazardous location since everything inside of Building 1 except the safe location (area 4) is in the danger zone. How can both of these be achieved? The answer is by considering the hazardous location to be a combination of area 1 + area 2 + area 3. When determining who is in the hazardous location, mustering will report anybody who is currently in any one of those areas. Note: Only normal APB areas can be configured as being contained in a hazardous location. Safe locations cannot, even though they may physically reside inside the hazardous location. This is because Badges recorded in a safe location should not be considered as being contained in the hazardous location.
- Page 245 -
- Page 246 -
- Page 247 -
To manually initiate muster mode: 1. 2. Open Alarm Monitoring. Do one of the following: From the Main Alarm Monitoring window - Right-click on the Muster Mode Start alarm and select the hazardous location in muster mode. A sub-menu displays. Select Start Muster Mode. From the System Hardware window - Right-click on an area and select Start Muster Mode. From the View menu select Map - Right-click a hazardous area and select Start Muster Mode.
3.
The Start Muster Zone window displays. Enter any notes relating to why muster mode is being activated, and click the [Yes] button to activate muster mode.
4.
A warning message displays. Click the [OK] button and muster mode is initiated. When an area goes into muster mode, all alarm monitoring stations are notified with a breakthrough notification and muster reporting begins. Stations that log on after muster mode has begun are also notified that a muster mode is in progress and reporting begins as well. Hazardous area icons display an additional symbol when in muster mode (hazardous area icon vs. icon in muster mode )
Notes:
- Page 248 -
locations. If a person really does remain in a hazardous area, you would want to keep a record of them being there to properly handle the next incident. 1. 2. Open Alarm Monitoring. Do one of the following: From the Main Alarm Monitoring window - Right-click on the Muster Mode Start alarm and select the hazardous location in muster mode. A sub-menu displays. Select Reset Muster Mode. From the System Hardware window - Right-click on an area and select Reset Muster Mode. From the View menu select Map. Right-click a hazardous area and select Reset Muster Mode.
3.
The Reset Muster Mode window displays. Enter any notes and click the [Yes] button to reset muster mode.
4.
A warning message displays. Click the [OK] button and muster mode is initiated.
- Page 249 -
When deleting an area that badges are supposed to be moved when muster mode is reset, operators must update the hazardous location configuration to no longer have such an area.
Reports
Several reports are available with mustering: Muster mode report - lists the badge IDs, cardholder name, time entered, how entered, and their last attempted location for a specific hazardous area. The status bar of the report displays the total occupancy for that area and the words MUSTER MODE. The bottom of the report (tab) displays the name of hazardous location and the time and date the report was initiated. Occupancy report - list badge IDs, cardholder name, time entered, and how entered. The status bar displays the total occupancy for that area. The bottom of the report (tab) displays the name of the safe location and the time and date the report was initiated. The occupancy report is sometimes referred to as the safe location report.
Note:
Muster reporting automatically refreshes every two minutes. However the user can manually refresh the report at any time. Automatic reporting ends when the number of personnel in the muster report becomes zero.
- Page 250 -
Moving Badges
The focus of muster mode is to account for all personnel in hazardous locations. The muster report provides this information. If an operator verifies that personnel recorded as being in the hazardous location are physically outside the hazardous area, they can manually move the badge to a different area.
- Page 251 -
When prompted to confirm your request. Click the [Yes] button. The Area Move Badges window displays. Select the desired area (a checkmark displays beside the area), enter any notes and click the [OK] button.
General Constraints
When controllers go offline, OnGuard is not able to provide accurate muster and safe location reports since OnGuard will be unaware of access activity and safe location registration that occurs while a controller is offline. When
- Page 252 -
the controller comes back online, OnGuard will be able to synchronize as long as the controller queued up all event transactions while it was offline. Note: It is recommended that dual path panels and communications be deployed to help avoid offline panel situations.
For the case of safe areas outside of hazardous areas, the muster exit readers are unlocked providing free access into and out of the hazardous area. Therefore access into and out of hazardous areas during an incident cannot be accurately tracked. Registration at the safe locations is what is accurately tracked. For the case of safe locations inside of hazardous areas, entry and exit readers are locked.
Note:
- Page 253 -
When they visitors physically leave the hazardous location, the same interface should be used to manually take them out of the hazardous location. It is likely going to be simpler and more reliable to actually issue real visitor badges that are used for access into and out of the hazardous locations. Utilize Hard APB enforcement into and out of hazardous locations. Configure reader offline modes to be Locked. If personnel must enter/ exit the hazardous areas through doors whose readers are currently offline with their ISC, record the badge movement via the interface for manually moving a badge into a specific area. Please note, however, that if free access is required through muster exit readers during muster mode, that the door strikes must be physically overridden during muster mode via an external source to ensure free exit during muster mode when readers are offline with their ISCs.
Additionally, all host computers running OnGuard Communication Servers that are communicating with Access Controllers in the same Global APB Segment, must be time synchronized. OnGuard will not automatically change the mode of muster exit readers to unlocked or locked during an incident and back to a card mode at the end of an incident. It is assumed an external override will be used to override door strikes and physical barriers. For example if a fire system and access control system is installed at a site, the access control system is typically not depended upon to unlock the doors during a fire; the fire system overrides the door strike. Registration at safe locations is required after muster mode occurs even if personnel are already in the safe location at the start of the incident.
- Page 254 -
Appendices
- Page 255 -
- Page 256 -
Appendix A:
Actions
Actions Procedures
USE THE ADD ACTION WIZARD
1. Click the [Add] button either: In the Checkpoint Actions section of the Tour Wizard in the Guard Tour folder. For more information please refer to the Guard Tour Folder chapter in the System Administration User Guide. On the Scheduler form of the Scheduler folder. For more information please refer to Chapter 11: Scheduler Folder on page 189. On the Output Action sub-tab of the Global Linkage form in the Global I/O folder. For more information please refer to the Global I/O Folder chapter in the System Administration User Guide. The Add Action Wizard Opens.
2. Note:
Choose an action Category, and then select an action Object. Depending on where the Add Action Wizard was launched from, the objects available in the Objects listing window will vary.
3. 4.
Click the [Next] button. Depending on which Category/Object combination you chose in step 2, a corresponding action properties window will open. Configure the action you selected in step 3. To do this, you must refer to the action properties windows sections in this chapter for information on each action properties window. Repeat steps 1-4 for each action you want to assign.
5.
- Page 257 -
Note:
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 258 -
display push button push button push button push button push button push button
In the Description field, enter a description of the action group that is being configured. Select the Action Group Library checkbox if you want this action group to be available for selection in the Action Group Library. For more information
- Page 259 -
please refer to the Action Group Library Folder chapter in the System Administration User Guide. 4. 5. 6. Click the [Add] button. The Select Action Type window opens. Select an action type, and then click the [Next] button. Depending on which action type you chose, a corresponding action properties window will open. Configure the action type you selected in step 5. To do this, you must refer to the action properties windows sections in this chapter for information on each action properties window. Repeat steps 4-6 for each action type you want to assign to this group. Click the [OK] button.
7. 8.
- Page 260 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 261 -
- Page 262 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 263 -
Arm
- Page 264 -
For Radionics intrusion detection panel types, choices in the drop-down list are: Disarm radio button Master Arm Delay - master (both perimeter and interior) arm (with exit and entry delays) the area. Master Arm Instant - master (both perimeter and interior) arms (no delays) the area. Perimeter Delay Arm - delay arms all perimeter points in the area. Perimeter Instant Arm - instantly arms all perimeter points (no delays) in the area.
When configuring an area as an action, select this radio button if you want the action to be that the area will be disarmed. When an area is disarmed, protection for this area is turned off. Alarms will not be reported within the area. For example, consider a home burglar system that has sensors on the windows and doors and motion detectors inside. When the owner arrives home, he/she disarms the system so that alarms wont be reported as they walk around the house.
OK Cancel Help
Click this button to add the action and exit out of the Arm/ Disarm Area Properties window. Click this button to exit the Arm/Disarm Area Properties window without adding the action. Click this button to display online help for this window.
- Page 265 -
Important:
Refer to the Arm/Disarm Area Form Field Table for detailed information on arming and disarming areas.
4.
- Page 266 -
Note:
If you have accessed the Automatic Guard Tour Properties window via the Scheduler folder or the Scheduler form in the Guard Tour folder, the window will contain both the Automatic Guard Tour form and the Schedule form. You must refer to the Scheduler folder chapter for detailed information on how to use the Automatic Guard Tour Properties window in conjunction with Scheduler. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 267 -
radio button
radio button
display
push button
- Page 268 -
from a tour group. When selected, only tours groups that are configured as random tour lists will be listed in the Tour/Tour Group listing window. 3. The monitoring stations that have been assigned to the selected tour or tour group will be displayed in the Monitoring Station listing window. Do one of the following: If no monitoring stations have been assigned, or if you want to assign an additional monitoring station, click the [Add] button. The Select Monitoring Station window opens. If you do not want to assign a monitoring station, proceed to step 7.
4. 5.
Click on a monitoring station to select it. Click the [OK] button. The monitoring station you selected will be listing in the Monitoring Station listing window. All monitoring stations in the Monitoring Station listing window will, in the Alarm Monitoring application, receive a notification message when the tour is scheduled to begin. Repeat steps 3-5 for each monitoring station you want to add. If you want to remove a monitoring station from the Monitoring Station listing window, click on an entry to select it, and then click the [Remove] button.
6. Note:
7. Note:
Click the [OK] button. If you have accessed the Automatic Guard Tour Properties window via the Scheduler folder or the Scheduler form in the Guard Tour folder, the window will contain both the Automatic Guard Tour form and the Schedule form. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 269 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 270 -
Note:
3.
- Page 271 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 272 -
Deactivate
radio button
Pulse
radio button
OK Cancel Help
4.
- Page 273 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 274 -
radio button
Deactivate
radio button
Pulse
radio button
OK Cancel Help
4.
- Page 275 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 276 -
Execute: False
radio button
Execute: Pulse
radio button
OK Cancel Help
- Page 277 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 278 -
Click this button to add the action and exit out of the Global APB System/Segment Reset Properties window. Click this button to exit the Global APB System/Segment Reset Properties window without adding the action. Click this button to display online help for this window.
Note:
- Page 279 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 280 -
When configuring an intercom call as an action, select this radio button if you want the action to place an intercom call. When configuring an intercom call as an action, select this checkbox if you want the action to be a high priority. Note: This field is only enabled when the Place call radio button is selected.
When configuring an intercom call as an action, select this radio button if you want the action to cancel a call. Click this button to add the action and exit out of the Intercom Call Properties window. Click this button to exit the Intercom Call Properties window without adding the action. Click this button to display online help for this window.
- Page 281 -
b.
Select the High priority checkbox if you want this action to be a high priority. Select the Cancel call radio button. Proceed to step 5.
4. 5.
Click on an intercom station in the To listing window to select it. This is the intercom station where the call will be received. Click the [OK] button.
- Page 282 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 283 -
When configuring a database download as an action, select the maximum number of access panels that can be downloaded at a time. Displays a list of available access panels which have been configured in the system. Click this button to add the action and exit out of the ISC Database Download Properties window. Click this button to exit the ISC Database Download Properties window without adding the action. Click this button to display online help for this window.
4.
- Page 284 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 285 -
When configuring a firmware download as an action, select the maximum number of access panels that can be downloaded at a time. Displays a list of available access panels which have been configured in the system. Click this button to add the action and exit out of the ISC Firmware Download Properties window. Click this button to exit the ISC Firmware Download Properties window without adding the action. Click this button to display online help for this window.
4.
- Page 286 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 287 -
Unmask
radio button
OK Cancel Help
4.
- Page 288 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 289 -
Unmask
radio button
OK Cancel Help
4.
- Page 290 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 291 -
Unmask
radio button
OK Cancel Help
4.
- Page 292 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 293 -
radio button
Unmask
radio button
OK Cancel Help
4.
- Page 294 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 295 -
Mask/Unmask Door Forced Open for Reader Group Form Field Table
Mask/Unmask Door Forced Open for Reader Group Properties Window - Mask/ Unmask Door Forced Open for Reader Group Form
Form Element Reader Group listing window Mask Type display radio button Comment Displays a list of available reader groups which have been configured in the system. When configuring a mask/Unmask door forced open for reader group action, select this radio button if you want the door forced open alarms to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting. When configuring a mask/Unmask door forced open for reader group action, select this radio button if you want the door forced open alarms to be Unmasked. When door forced open alarms are Unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting. Click this button to add the action and exit out of the Mask/ Unmask Door Forced Open for Reader Group Properties window. Click this button to exit the Mask/Unmask Door Forced Open for Reader Group Properties window without adding the action. Click this button to display online help for this window.
Unmask
radio button
OK
push button
Cancel
push button
Help
push button
Mask/Unmask Door Forced Open for Reader Group Properties Window Procedures
ADD A MASK/UNMASK DOOR FORCED OPEN FOR READER GROUP ACTION
1. 2. 3. Display the Mask/Unmask Door Forced Open for Reader Group Properties window. From the Reader Group listing window, click on an entry to select it. Do one of the following: Select the Mask radio button if you want door forced open alarms for the selected reader group to be masked. When door forced open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting. Select the Unmask radio button if you want the door forced open alarms for the selected reader group to be Unmasked. When door forced open
- Page 296 -
alarms are Unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting. 4. Click the [OK] button.
- Page 297 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 298 -
radio button
Unmask
radio button
OK Cancel Help
4.
- Page 299 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 300 -
Mask/Unmask Door Held Open for Reader Group Form Field Table
Mask/Unmask Door Held Open for Reader Group Properties Window - Mask/ Unmask Door Held Open for Reader Group Form
Form Element Reader Group listing window Mask Type display radio button Comment Displays a list of available reader groups which have been configured in the system. When configuring a mask/Unmask door held open for reader group action, select this radio button if you want the door held open alarms to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting. When configuring a mask/Unmask door held open for reader group action, select this radio button if you want the door held open alarms to be Unmasked. When door held open alarms are Unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting. Click this button to add the action and exit out of the Mask/ Unmask Door Held Open for Reader Group Properties window. Click this button to exit the Mask/Unmask Door Held Open for Reader Group Properties window without adding the action. Click this button to display online help for this window.
Unmask
radio button
OK
push button
Cancel
push button
Help
push button
Mask/Unmask Door Held Open for Reader Group Properties Window Procedures
ADD A MASK/UNMASK DOOR HELD OPEN FOR READER GROUP ACTION
1. 2. 3. Display the Mask/Unmask Door Held Open for Reader Group Properties window. From the Reader Group listing window, click on an entry to select it. Do one of the following: Select the Mask radio button if you want door held open alarms for the selected reader group to be masked. When door held open alarms are masked, they are not reported to the Alarm Monitoring application or stored in the database for later event reporting. Select the Unmask radio button if you want the door held open alarms for the selected reader group to be Unmasked. When door held open
- Page 301 -
alarms are Unmasked, they are reported to the Alarm Monitoring application and are stored in the database for later event reporting. 4. Click the [OK] button.
- Page 302 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 303 -
- Page 304 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 305 -
- Page 306 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 307 -
- Page 308 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 309 -
drop-down list
When configuring a reader mode action for a reader on a Lenel controller that is a primary reader to an alternate biometric reader, you can select a verify mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader. When configuring a reader mode action for a reader that is not a primary reader to an alternate biometric reader, this field is disabled.
checkbox
Select this checkbox if you want the reader mode action to be that first card unlock mode is enabled. Doors configured with first card unlock will not unlock until valid personnel arrives. For example, rather than setting a lobby door to unlock at 9:00am, you can leave it in a secure mode (i.e., card only, card and pin, etc.) and set the first card unlock to 9:00am. The first person that comes in the door after 9:00am will have to present their card. Once access is granted, the reader mode will change to unlocked. This feature is useful for days like snow days when employees cant make it to work on time.
OK Cancel Help
Click this button to add the action and exit out of the Reader Mode Properties window. Click this button to exit the Reader Mode Properties window without adding the action. Click this button to display online help for this window.
- Page 310 -
5. 6.
- Page 311 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 312 -
drop-down list
When configuring a reader mode group action for a group of readers on a Lenel controller that are primary readers to alternate biometric readers, you can select a verify mode. When verify mode is enabled, for alternate reader support, the primary reader will ask for verification from the alternate reader. When configuring a reader mode group action for readers that are not primary readers alternate biometric readers, this field is disabled.
checkbox
Select this checkbox if you want the reader mode group action to be that first card unlock mode is enabled. Doors configured with first card unlock will not unlock until valid personnel arrives. For example, rather than setting a lobby door to unlock at 9:00am, you can leave it in a secure mode (i.e., card only, card and pin, etc.) and set the first card unlock to 9:00am. The first person that comes in the door after 9:00am will have to present their card. Once access is granted, the reader mode will change to unlocked. This feature is useful for days like snow days when employees cant make it to work on time.
OK Cancel Help
Click this button to add the action and exit out of the Reader Mode Group Properties window. Click this button to exit the Reader Mode Group Properties window without adding the action. Click this button to display online help for this window.
- Page 313 -
5. 6.
- Page 314 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 315 -
- Page 316 -
Note:
If you have accessed this window via the Scheduler folder, the window will also contain the Schedule tab. For more information please refer to Chapter 11: Scheduler Folder on page 189.
- Page 317 -
Cancel Help
Click this button to exit the Reset Use Limit Properties window without adding the action. Click this button to display online help for this window.
4.
- Page 318 -
Appendix B:
Alarm Accepted Biometric Score Access Denied: Reader Locked Access Granted: Reader Unlocked Alarm Active Alarm Restored Anti-Passback Violation Area Closed Area Limit Exceeded Archive Server Failure
Alarm/Event Descriptions
Event Accepted Biometric Score Access Denied: Reader Locked Access Granted: Reader Unlocked Alarm Active Alarm Cancelled Anti-Passback Violation Area Closed Area Limit Exceeded Archive Server Failure Event Type Biometric Description This event returns the accepted biometric score (the actual access granted event is sent separately). Generated when access was denied because the reader was locked. Generated when access was granted because the reader was unlocked. Generated when an alarm has become active. Generated when a device has come online or an alarm condition has been restored. Generated when the cardholder was denied access because the entry would have violated the anti-passback rules for the area. Generated when access was denied because the area being entered is closed. Generated when access was denied because the area limit would have been exceeded. This alarm/event is a generic error that is generated when there is a failure on the archive server. This error indicates that the archive server could not move any more data from the video recorders to the archive server. When this occurs, a user must go to the physical archive server computer and review the Windows event logs, the remote storage application and logs, and the OnGuard log files in the OnGuard/logs directory. The user must also follow general troubleshooting techniques (located in the Archive Server user guide) to determine the specific cause of the alarm. Generated when the asset was denied and the asset disable command was sent to disable the asset. Generated when the asset was denied because the cardholder had invalid access levels.
Granted Granted
Asset Denied Asset Disable Command Sent Asset Denied Invalid Access
Asset Denied Asset Disable Command Sent Asset Denied Invalid Access
Asset
Asset
- Page 319 -
Alarm Asset Denied Invalid Asset Asset Denied Invalid Cardholder Asset Denied No Asset Privileges Asset Granted Asset Owner Asset Granted Asset Privileges Only Audibles Silenced Audibles Unsilenced Biometric Mismatch Cabinet Tamper Active Cabinet Tamper Restored Call disconnected Call to a busy subscriber Call to an open subscriber Call to a private subscriber Command 4 Set From Reader Command 5 Set From Reader Command 6 Set From Reader Command 7 Set From Reader
Event Asset Denied Invalid Asset Asset Denied Invalid Cardholder Asset Denied No Asset Privileges Asset Granted Asset Owner Asset Granted Asset Privileges Only Audibles Silenced Audibles Unsilenced Biometric Mismatch Cabinet Tamper Cancelled Cabinet Tamper Call disconnected Call to a busy subscriber Call to an open subscriber Call to a private subscriber Command 4 Set From Reader Command 5 Set From Reader Command 6 Set From Reader Command 7 Set From Reader
Description Generated when the asset was denied because of an invalid asset (the asset was not found in the controller). Generated when the asset was denied because of an invalid cardholder. Generated when the asset was denied because the cardholder had no asset privileges. Generated when the asset was granted because the cardholder was the asset owner. Generated when the asset was granted because the cardholder had asset privileges. Generated when all the alarm bells have been turned off on the controller. Generated when all the alarm bells have been turned back on for the controller. Generated when access was denied because of a biometric mismatch. Generated when a cabinet tamper condition has been detected. Generated when a cabinet tamper condition has been restored. Generated when an intercom call has been disconnected. Generated when an intercom call has been placed to a busy subscriber. Generated when an intercom call has been placed to an open subscriber. Generated when a call has been placed to a private subscriber. Generated when the reader keypad command 4 was executed. Generated when the reader keypad command 5 was executed. Generated when the reader keypad command 6 was executed. Generated when the reader keypad command 7 was executed.
Asset
Asset
Asset Asset
Fire Fire Denied System System Intercom Intercom Intercom Intercom System System System System
- Page 320 -
Alarm Command 8 Set From Reader Command 9 Set From Reader Command 10 Set From Reader Command 11 Set From Reader Command 12 Set From Reader Command 13 Set From Reader Command 14 Set From Reader Command 15 Set From Reader Command Pin+10 Set From Reader Command Pin+20 Set From Reader Communications Lost Communications Lost - Primary Path Communications Lost - Secondary Path Communications Path Switched Primary to Secondary Communications Path Switched Secondary to Primary Communications Restored
Event Command 8 Set From Reader Command 9 Set From Reader Command 10 Set From Reader Command 11 Set From Reader Command 12 Set From Reader Command 13 Set From Reader Command 14 Set From Reader Command 15 Set From Reader Command Pin+10 Set From Reader Command Pin+20 Set From Reader Communications Lost Primary Communication Path Lost Secondary Communication Path Lost Communications Path Switch Primary to Secondary Communications Path Switch Secondary to Primary Communications Restored
Event Type System System System System System System System System System
Description Generated when the reader keypad command 8 was executed. Generated when the reader keypad command 9 was executed. Generated when the reader keypad command 10 was executed. Generated when the reader keypad command 11 was executed. Generated when the reader keypad command 12 was executed. Generated when the reader keypad command 13 was executed. Generated when the reader keypad command 14 was executed. Generated when the reader keypad command 15 was executed. Generated when the reader command Pin + 10 was executed. Generated when the reader command Pin + 20 was executed. Generated when communications to the device have been lost. Generated when the primary path lost communication with the host. Generated when the secondary path loses communication with the host. Generated when the communication path has been switched from the primary path to the secondary path. Generated when the communication path has switched from the secondary path to the primary path. Generated when communications to the device have been restored.
System
System System
System
System
System
System
- Page 321 -
Alarm Communications Restored Primary Path Communications Restored Secondary Path Database Error: Event Polling Stopped
Event Primary Communication Path Restored Secondary Communication Path Restored Database Error: Event Polling Stopped
Description Generated when the primary path restored communication with the host. Generated when the secondary path restored communication with the host. Generated by the communication server when there is a problem writing events to the database. This event is not written to the database but is sent to Alarm Monitoring clients. Polling of the events from the various hardware devices is stopped until the events can be written to the database. Generated by the communication server when the database can not be opened at the start of a database download to a controller. Generated when access is denied because the battery on the device is low. Generated when a reader command function was denied because the user did not have the command authority to execute the function. Generated when access was denied because the host did not grant approval (if the host response did not come back in a timely fashion or when the controller is offline with the host). Generated when access was denied for a PIN only request (can occur when an invalid PIN is entered or when PIN support is not enabled for the controller). Generated when access was denied because the reader exclusion list was violated. This happens when using precision access exclusion and the cardholder has access to the reader via an access level, but the precision access exclusion list has removed access. Generated when access was denied because of unauthorized assets. Generated when the cardholder was denied access under duress
System
System
Database Error in Panel Download Denied Low Battery Denied, No Command Authority Denied - No Host Approval
Database Error in Panel Download Denied Low Battery Denied, No Command Authority Denied - No Host Approval
System
Denied Denied
Denied
Denied
Denied
Denied
Emergency
- Page 322 -
Alarm Denied Unmask, Active Zones in Group Deny Count Exceeded Device Type Mismatch Dialup Last Connection Time Expired
Event Denied UnMask - Active Zones in Group Denied Count Exceeded Device Type Mismatch Dialup Last Connection Time Expired
Description Generated when the unmask command was denied because there were active points in the group. Generated when a specified number of invalid attempts are made in a row at a reader. Generated when the device is of a different type than what it has been configured for. Generated by the communication server for dialup panels that have exceeded the set number of hours since their last connection. When this event is generated, the communication server will attempt to connect to the panel. If the dialup panel repeatedly receives this event, the panel should be investigated to see why it is not calling back. Generated by the communication server for dialup panels that have exceeded their stored command limit. When this event is generated, the communication server will attempt to connect to the panel. If the dialup panel repeatedly receives this event, the panel should be investigated to see why it is not calling back. Generated when the door contact tamper has gone active. Generated when the door contact tamper has been restored. Generated when a Door Forced Open condition has been detected. Generated when the Door Forced Open event has become masked for the device. Generated when a Door Forced Open condition has been restored. Generated when the Door Forced Open event has become unmasked for the device. Generated when a Door Held Open condition has been detected. Generated when the Door Held Open event has become masked for the device.
Denied
System System
System
Door Contact Tamper Active Door Contact Tamper Restored Door Forced Open Door Forced Open Masked Door Forced Open Restored Door Forced Open Unmasked Door Held Open Door Held Open Masked
Door Contact Tamper Door Contact Tamper Cancelled Door Forced Open Door Forced Open Masked Door Forced Open Cancelled Door Forced Open Unmasked Door Held Open Door Held Open Masked
System System
- Page 323 -
Alarm Door Held Open Restored Door Held Open Unmasked Door Shunt Command Executed From Reader Door Shunt Command Results Cancelled Driver Error in Panel Download Failed to report expected event
Event Door Held Open Cancelled Door Held Open Unmasked Door Shunt Command Executed From Reader Door Shunt Command Results Cancelled Driver Error in Panel Download Failed to report expected event
Description Generated when a Door Held Open condition was restored. Generated when the Door Held Open event has become unmasked for the device. Generated when the door shunt command was executed from the reader.
System
Generated when the door is closed while the door shunt command is executing.
System
Generated by the communication server when an error occurs during a database download to a controller. Generated when a device that is supposed to report an event within a certain period of time fails to report an event during this time period. Generated when a fire alarm has been acknowledged. Generated when all fire alarms have been acknowledged at the fire panel. Generated when a new fire alarm has been detected for the device. Generated when a device with a previous fire alarm has returned to its normal state. Generated when a global I/O linkage has executed. Generated when a global I/O linkage has failed. Generated when access was granted. Generated when an anti-passback violation occurred but access was granted and entry was made. This can happen when using soft anti-passback. Generated when an anti-passback violation occurred and access was granted but no entry was made. This can happen when using soft anti-passback.
System
Fire Alarm Acknowledge Fire Alarm Block Acknowledge Fire Alarm In Fire Alarm Out Global Linkage Action Executed Global Linkage Action Failed Granted Access Granted APB Violation, Entry Made Granted APB Violation, No Entry Made
Fire Alarm Acknowledge Fire Alarm Block Acknowledge Fire Alarm In Fire Alarm Out Global Linkage Action Executed Global Linkage Action Failed Access Granted Access Granted Anti-Passback Used Access Granted Anti-Passback Not Used
Fire Fire
Area Control
- Page 324 -
Alarm Granted Facility Code Granted Facility Code, No Entry Granted No Entry Granted Under Duress Granted Under Duress, No Entry Grounded Loop Active Grounded Loop Restored Guard Tour Action Executed Guard Tour Action Failed Host Executed Function List Inactive Badge Input Masked Input Unmasked Intercom Function Invalid Access Level Invalid Badge Invalid Card Format Invalid Device Serial Number
Event Access Granted On Facility Code Access Granted On Facility Code No Entry Made Access Granted No Entry Made Access Granted Under Duress Access Granted Under Duress No Entry Made Grounded Loop Alarm Active Cancelled Grounded Loop Guard Tour Action Executed Guard Tour Action Failed Host Executed Function List Inactive Badge Input Masked Input Unmasked Intercom Function Invalid Access Level Invalid Badge Invalid Card Format Invalid Device Serial Number
Description Generated when access was granted based on a valid facility code. Generated when access was granted on facility code but no entry was made at the door. Generated when access was granted but no entry was made at the door. Generated when the cardholder was granted access under duress. Generated when the cardholder was granted access under duress but no entry was made. Generated when a grounded loop fault condition has been detected. Generated when the grounded loop fault condition was restored. Generated when a guard tour action has executed. Generated when a guard tour action has failed. Generated when a function list has been executed from the host. Generated when access was denied because the badge was inactive. Generated when an input has become masked. Generated when an input has become unmasked. Generated when an intercom function has been executed. Generated when access was denied because of an invalid access level. Generated when access was denied because the badge ID was unknown to the controller. Generated when the badge contained a card format that was not recognized by the reader. Generated when the device does not have a valid serial number.
System System System System System Denied System System Intercom Denied Denied Denied
System
- Page 325 -
Description Generated when access was denied because the badge had an invalid facility code. Generated when access was denied because the issue code read from the badge did not match the current issue code stored in the database for the badge. Generated when access was denied because an invalid PIN was entered. Generated when the key override is used in a Mortise lockset. Generated when a line error fault condition has been detected. Generated when the line error fault condition was restored. Generated when a local I/O function list has been activated. Generated when a low voltage condition has been detected at the device. Generated when a low voltage condition has been restored. Generated during a download when the number of assets exceeds the maximum value configured for the controller. Only the maximum number of assets will be downloaded (all others will be ignored). Generated during a download when the number of cardholders exceeds the maximum value configured for the controller. Only the maximum number of cardholders will be downloaded (all others will be ignored). Generated when motion has been detected on a given input channel (camera). Motion is considered any change in the environment within the field of view of the camera. Generated when motion has been restored (is no longer detected) on a given input channel (camera). Motion is considered any change in the environment within the field of view of the camera. Generated when muster mode is reset.
Invalid PIN Key Override Line Error Active Line Error Restored Local I/O Executed Function List Low Voltage Low Voltage Restored Max Assets Reached
Invalid PIN Number Key Override Line Error Active Cancelled Line Error Local I/O Executed Function List Low Voltage Low Voltage Restored Max Assets Reached
System
Motion Detected
Motion Detected
Video
Video
Mustering
- Page 326 -
Alarm Muster Mode Start No Biometric Template Data Not Configured Open Line Active Open Line Restored Panel Download Completed Panel Download Started Panel Free Memory Low Panel ID Mismatch
Event Muster Mode Start No Biometric Template Data Not Configured Open Line Alarm Active Cancelled Open Line Full Panel Download Completed Full Panel Download Started Panel Free Memory Low Panel ID Mismatch
Description Generated when muster mode is started. Generated when no biometric template data was available from the biometric reader at the end of a verification sequence. Generated when a device has not been configured or defined by the host. Generated when an open line fault condition has been detected. Generated when the open line fault condition was restored. Generated when a database download to the controller has completed. Generated when a database download to the controller has started. Generated when the free memory in the panel (controller) is below what is determined to be a safe value. Generated when the panel (controller) has a different ID than what is in the database. This can happen if a new panel or replacement panel is placed out in the field. A download to the panel should correct the problem. Generated when the options inside of the panel differ from what the panel is currently configured for in the database. This can happen if the panel options change and a download is not issued to the panel. To correct this situation, a download should be issued to the panel. Generated when the panel power up is complete. Generated when a power failure condition has been detected. Generated when the power failure condition was restored. Generated when the reader input tamper has gone active.
System
System
System
System
Panel Power Up Complete Power Failure Active Power Failure Restored Reader Input Tamper Active
Panel Power Up Complete Power Failure Cancelled Power Failure Reader Input Tamper
- Page 327 -
Alarm Reader Input Tamper Restored Reader Mode Card and Pin Reader Mode Card Only Reader Mode Facility Code Reader Mode First Card Unlock Reader Mode Locked Reader Mode Pin or Card Reader Mode Unlocked Reader Reset
Event Reader Input Tamper Cancelled Reader Mode Card and Pin Reader Mode Card Only Reader Mode Facility Code Reader Mode First Card Unlock Reader Mode Locked Reader Mode Pin or Card Reader Mode Unlocked Reader Reset
Description Generated when the reader input tamper was restored. Generated when the reader mode has changed to Pin or Card for the device. Generated when the reader mode has changed to Card Only. Generated when the reader mode has changed to Facility Code Only. Generated when the reader mode has changed to First Card Unlock. Generated when the reader mode has changed to Locked. Generated when the reader mode has changed to Pin or Card for the device. Generated when the reader mode has changed to Unlocked. Generated when the firmware resets the reader. This can happen if the reader is brand new or in the case of a failed/ incomplete download. Internal conditions, such as a possible corrupt memory, can also cause the firmware to reset. In these cases, the firmware will rewrite its entire storage with default values, overwriting the downloaded values. When this happens, the user must reprogram the lockset. This event returns the rejected biometric score (the actual denied event is sent separately). Generated when a relay contact was activated. Generated when a relay contact was deactivated. Generated when a scheduler action has executed. Generated when a scheduler action has failed. Generated when a security alarm has been acknowledged.
Rejected Biometric Score Relay Contact Activated Relay Contact Deactivated Scheduler Action Executed Scheduler Action Failed Security Alarm Acknowledge
Rejected Biometric Score Relay Contact Activated Relay Contact Deactivated Scheduler Action Executed Scheduler Action Failed Security Alarm Acknowledge
Biometric
- Page 328 -
Alarm Security Alarm Block Acknowledge Security Alarm In Security Alarm Out Shorted Line Active Shorted Line Restored Status In Status Out Supervisory Acknowledge Supervisory Block Acknowledge Supervisory In Supervisory Out
Event Security Alarm Block Acknowledge Security Alarm In Security Alarm Out Shorted Line Alarm Active Cancelled Shorted Line Status In Status Out Supervisory Acknowledge Supervisory Block Acknowledge Supervisory In Supervisory Out
Description Generated when all security alarms have been acknowledged at the fire panel. Generated when a new security alarm has been detected for the device. Generated when a device with a previous security alarm has returned to its normal state. Generated when a shorted line fault condition has been detected. Generated when the shorted line fault condition was restored. Generated when a status reporting device is active. Generated when a status reporting device has returned to the inactive state. Generated when a supervisory condition has been acknowledged. Generated when all supervisory conditions have been acknowledged at the fire panel. Generated when a new supervisory condition has been detected for the device. Generated when a device with a previous supervisory condition has returned to its normal state. Generated when the fire panel has been reset. Generated when no second card was presented within the time limit for the area/ reader using two-man control. Generated when a user is connected to the device for diagnostic purposes. Generated when a history data was transferred from the device to the parent device. Generated when the device (lockset) is programmed/reprogrammed through a download from a PDA. Generated when the button or input on a transmitter has been activated.
Fire Fire
Fire Fire
System Reset Timeout Exceeded - No Second Card Transfer, Diagnostics Transfer, History
System Reset Timeout Exceeded - No Second Card Transfer, Diagnostics Transfer, History
System System
System
Transmitter
- Page 329 -
Alarm Transmitter Alarm Restored Transmitter Inactivity Transmitter Low Battery Transmitter Low Battery Restored Transmitter PreTilt Transmitter PreTilt Restored Transmitter Pull Cord Alarm Transmitter Pull Cord Restored Transmitter Tamper Transmitter Tamper Restored Transmitter Temporary Tilt Disable Transmitter Tilt Transmitter Tilt Disabled Transmitter Tilt Enabled Transmitter Tilt Restored Trouble Acknowledge Trouble Block Acknowledge Trouble In
Event Transmitter Alarm Restored Transmitter Inactivity Transmitter Low Battery Transmitter Low Battery Restored Transmitter PreTilt Transmitter PreTilt Restored Transmitter Pull Cord Alarm Transmitter Pull Cord Restored Transmitter Tamper Transmitter Tamper Restored Transmitter Temporary Tilt Disable Transmitter Tilt Transmitter Tilt Disabled Transmitter Tilt Enabled Transmitter Tilt Restored Trouble Acknowledge Trouble Block Acknowledge Trouble In
Event Type Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter Transmitter
Description Generated when the transmitter alarm has been restored. Generated when the transmitter has been inactive longer than the supervision interval. Transmitter low battery alarm Generated when a transmitter low battery has been restored. Generated when the transmitter is in the pretilt state. Generated when the transmitter has returned to normal from the pre-tilt state. Generated when the pull cord on a transmitter has been pulled and is in alarm. Generated when the transmitter pull cord alarm has been restored. Transmitter tamper alarm Generated when a transmitter tamper has been restored. Generated when the transmitter temporary tilt has been disabled. Generated when a tilt condition on the transmitter has been detected. Generated when the transmitter tilt function has been disabled. Generated when the transmitter tilt function has been enabled. Generated when the tilt condition on the transmitter has been restored. Generated when the trouble condition has been acknowledged. Generated when all trouble conditions have been acknowledged at the fire panel. Generated when a new trouble condition has been detected for the device.
- Page 330 -
Description Generated when a device with a previous trouble condition has returned to its normal state. A user generated event can be created from any camera with any user-defined time limit from within the video player window in the Alarm Monitoring application. (Video events are typically created automatically by the system based on an event from an external device. A user generated event allows users to generate an event that is not tied to any device.) Generated when access was denied because the use limit for the badge has been exceeded. Generated when the user-defined event threshold has been reached. (The percent of disk space used by video events has been reached, typically signaling the archive server to start archiving or purging.) Generated when the user-defined event threshold has been exceeded by 5% or more. (The percent of disk space used by video events has been exceeded by at least 5%, typically signaling the archive server to start archiving or purging.) If a user-defined event threshold has not been defined, this alarm/event will be generated when the video server disk space is 95% full of video events. Generated when it has been detected that the video recorder is no longer recording. A check is done periodically (default is every 10 minutes) to check to make sure that video is still being recorded. This event is generated when the check fails.
Video
Denied
Video
Video
Video
- Page 331 -
Index
A Access Levels form (Cardholders folder) field table ................................................... 104 modify mode.............................................. 103 procedures.................................................. 104 view mode.................................................. 103 Accounts and passwords ..................................... 17 Acknowledge an alarm ....................................... 60 Action Group form field table ................................................... 259 Action Group Properties window ..................... 258 procedures.................................................. 259 Actions .............................................................. 257 procedures.................................................. 257 Add action.......................................................... 191 action group ............................................... 259 action using scheduler right-click menu .... 199 archive/purge database action.................... 262 arm/disarm area action............................... 266 asset............................................................ 135 asset groups and classes............................. 141 asset type/subtype ...................................... 137 automatic guard tour action ....................... 268 badge record................................................. 98 cardholder record ......................................... 85 columns........................................................ 42 DataExchange script action ....................... 271 device output action................................... 273 device output group action......................... 275 execute function list action ........................ 277 global APB system/segment reset action... 279 intercom call action.................................... 281 ISC database download action................... 284 ISC firmware download action.................. 286 mask/unmask alarm input action ............... 288 mask/unmask alarm input for group action 290 mask/unmask alarm mask group action..... 292 mask/unmask door forced open action ...... 294 mask/unmask door forced open for reader group action ........................................ 296 mask/unmask door held open action.......... 299 mask/unmask door held open for reader group action .................................................. 301 muster mode initiation action .................... 304 pulse open door action ............................... 306 pulse open door group action..................... 308 reader mode action..................................... 311 reader mode group action .......................... 314 readers........................................................ 155 report print action ...................................... 316 reset use limit action .................................. 318 visitor record................................................ 89 Add Action wizard............................................ 257 Alarm descriptions ................................................ 319 icons............................................................. 40 overview ...................................................... 40 Alarm Acknowledgement window ..................... 58 functions ...................................................... 57 procedures.................................................... 59 Alarm Monitoring overview ............................... 27 Archive/Purge Database form field table ................................................... 262 Archive/Purge Database Properties window .... 261 procedures.................................................. 262 Arm ................................................................... 264 Arm/Disarm Area form field table ................................................... 264 Arm/Disarm Area Properties window .............. 263 procedures.................................................. 266 Arrange columns................................................. 42 Asset Classes form field table ................................................... 139 modify mode.............................................. 138 procedures.................................................. 140 view mode.................................................. 138 Asset menu.......................................................... 39 Assets form (Assets folder)............................... 132 field table ................................................... 133 procedures.................................................. 135 Assets form (Cardholders folder) ..................... 120 field table ................................................... 121 procedures.................................................. 121 Assign access levels to a badge ............................. 104 access levels to a selected group of cardholders 108 activation and deactivation dates to access levels................................................... 107 asset to a cardholder .................................. 121 cardholder to an asset ................................ 144 classes to an asset ...................................... 140 guard tour security clearance levels to a cardholder ........................................... 127 precision access groups to a badge ............ 112 Assignments form ............................................. 142 field table ................................................... 143 procedures.................................................. 144 Automatic Guard Tour form
- Page 333 -
field table ................................................... 268 Automatic Guard Tour Properties window....... 267 procedures.................................................. 268 B Badge form field table ..................................................... 96 modify mode................................................ 95 procedures.................................................... 98 view mode.................................................... 95 Biometrics ................................................ 114, 116 display event types..................................... 229 display score .............................................. 228 enable reader biometric verify mode ......... 228 Biometrics form (Cardholders folder) .............. 114 field table ................................................... 115 procedures.................................................. 116 C Call an intercom station .................................... 221 Cancel call to intercom station.......................... 221 Cardholder form.................................................. 84 field table ..................................................... 85 overview ...................................................... 84 procedures.................................................... 85 Cardholder menu................................................. 37 Cardholder menu - bulk sub-menu ..................... 38 Cardholder photo - display ............................... 156 Cardholder search capabilities ............................ 80 Cardholders folder field table ..................................................... 77 overview ...................................................... 75 procedures.................................................... 80 Change ................................................................ 15 device status................................................. 52 Change cardholders folder view options ............ 83 Comparison operators ......................................... 80 Configure associated safe location..................... 245, 246 Configure menu .................................................. 31 Configure single sign-on..................................... 21 Control devices remotely .................................. 214 Control menu ...................................................... 31 Control menu - current device sub-menu ........ 32 Conventions used in this documentation ............ 13 Create a Video Event ........................................ 167 D DataExchange Script form field table ................................................... 271 DataExchange Script Properties window ......... 270 procedures.................................................. 271 Delete
access levels assignments .......................... 110 alarm .......................................................... 156 alarms(all) .................................................... 46 an alarm ....................................................... 46 asset ........................................................... 136 badge record .............................................. 102 cardholder record ......................................... 86 scheduled action using the scheduler right-click menu ................................................... 201 selected group of cardholder records........... 86 visitor record................................................ 90 Destroy all cardholder data ................................. 87 Device group icons ............................................. 51 Device Groups window ...................................... 51 Device icons...................................................... 207 Device Output Action form field table ................................................... 273 Device Output Group Action form field table ................................................... 275 Device Output Group Properties window......... 274 procedures.................................................. 275 Device Output Properties window .................... 272 procedures.................................................. 273 Dialup panels - view last connection time ........ 214 Directory Accounts form .................................. 123 field table ................................................... 124 procedures.................................................. 124 Disable strong password enforcement ................ 14 Display Alarm Acknowledgement window .............. 57 Alarm Monitoring window .......................... 27 biometric event types................................. 229 biometric score .......................................... 228 cardholder photo ........................................ 156 live video ................................................... 156 monitoring map............................................ 46 multiple hardware views............................ 212 scheduler right-click menu ........................ 198 Video Search window................................ 175 Download database ........................................... 215 E Edit menu............................................................ 28 Enable alarm activity printing ................................. 48 reader biometric verify mode .................... 228 strong password enforcement ...................... 14 Error .................................................................... 15 Event descriptions............................................. 319 Execute Function List Action form field table ................................................... 277 Execute Function List Properties window ........ 276 procedures.................................................. 277
- Page 334 -
Exit the application ............................................. 24 Export Video To A File .................................... 167 Export video to a file ........................................ 167 F Fast/group acknowledge feature ......................... 61 File menu ............................................................ 28 Filter video search results ................................. 178 First card unlock ...................................... 310, 313 Functions - Alarm Acknowledgement window .. 57 G Generic alternate readers................................... 232 Getting started..................................................... 13 Global APB System/Segment Reset form field table ................................................... 279 Global APB System/Segment Reset Properties window ...................................................... 278 procedures.................................................. 279 Guard tour launch a tour .............................................. 181 live tracking window buttons .................... 184 tour events.................................................. 183 Guard Tour Live Tracking window .................. 183 Guard Tours form ............................................. 126 field table ................................................... 127 procedures.................................................. 127 H Hardware........................................................... 207 list view...................................................... 218 status icons................................................. 209 update status of .......................................... 213 Hardware tree view and list view ..................... 218 Help menu........................................................... 37 Highlight an entire row ....................................... 45 I Icons alarm ............................................................ 40 hardware status icons................................. 209 hardware/device icons ............................... 207 Instant arm ........................................................ 264 Intercom Call form field table ................................................... 281 Intercom Call Properties window ..................... 280 procedures.................................................. 281 Intercoms about .......................................................... 221 cancel call .................................................. 221 make call.................................................... 221 Interior .............................................................. 264
Introduction......................................................... 13 ISC Database Download form field table ................................................... 284 ISC Database Download Properties window.... 283 procedures.................................................. 284 ISC Firmware Download form field table ................................................... 286 ISC Firmware Download Properties window ... 285 procedures.................................................. 286 L Launch a guard tour .......................................... 181 Launch Video.................................................... 164 Link cardholder to a directory account .............. 124 List view ........................................................... 218 Live video - display .......................................... 156 Locate devices................................................... 212 Lock display updates ........................................ 213 Log into the application using single sign-on..... 22 Log into the application without using single signon ................................................................. 20 Log out of the application................................... 24 Lookup a cardholder assigned to an asset......... 145 M Main Alarm Monitoring window........................ 27 Maps - display..................................................... 46 Mask/Unmask Alarm Input for Group form field table ................................................... 290 Mask/Unmask Alarm Input for Group Properties window ...................................................... 289 procedures.................................................. 290 Mask/Unmask Alarm Input form field table ................................................... 288 Mask/Unmask Alarm Input Properties window 287 procedures.................................................. 288 Mask/Unmask Alarm Mask Group form field table ................................................... 292 Mask/Unmask Alarm Mask Group Properties window ...................................................... 291 procedures.................................................. 292 Mask/Unmask Door Forced Open for Reader Group form field table ................................................... 296 Mask/Unmask Door Forced Open for Reader Group Properties window ..................................... 295 procedures.................................................. 296 Mask/Unmask Door Forced Open form field table ................................................... 294 Mask/Unmask Door Forced Open Properties window ...................................................... 293 procedures.................................................. 294
- Page 335 -
Mask/Unmask Door Held Open for Reader Group form field table ................................................... 301 Mask/Unmask Door Held Open for Reader Group Properties window ..................................... 300 procedures.................................................. 301 Mask/Unmask Door Held Open form field table ................................................... 299 Mask/Unmask Door Held Open Properties window 298 procedures.................................................. 299 Master arm ........................................................ 264 Matrix View ...................................................... 164 Matrix view....................................................... 164 Maximum number of alarms entries ................... 59 Menus.................................................................. 28 asset menu ................................................... 39 cardholder menu bulk sub-menu ..................................... 38 cardholder menu ......................................... 37 configure menu ........................................... 31 control menu ................................................ 31 current device sub-menu ................... 32 edit menu ..................................................... 28 file menu ..................................................... 28 help ............................................................. 37 options menu................................................ 34 trace menu.................................................... 30 view menu.................................................... 29 window ........................................................ 36 Modify access levels assignments .......................... 110 asset............................................................ 136 asset classes assignment ............................ 140 asset group ................................................. 121 badge record............................................... 100 badges for a selected group of cardholders 101 cardholder record ......................................... 86 cardholders permission to have visitors ... 118 cardholders segment assignment ................ 92 group of cardholder's segments ................... 93 scheduled action using the scheduler right-click menu ................................................... 201 visitor record................................................ 89 Monitor (trace) entire zone.................................................... 71 individual devices ........................................ 69 intercom devices ........................................ 222 RSI biometric readers ................................ 230 Multiple hardware views - display.................... 212 Muster Mode Initiation form field table ................................................... 304 Muster Mode Initiation Properties window ...... 303 procedures.................................................. 304
O Options menu...................................................... 34 P Pan, Tilt, and Zoom .......................................... 169 Pan, tilt, and zoom ............................................ 169 Passwords............................................................ 13 about ............................................................ 17 change.......................................................... 15 error messages ............................................. 15 standards ...................................................... 13 Pending Alarms window..................................... 50 Perform a device test........................................... 52 Perimeter........................................................... 264 Perimeter arm.................................................... 264 Permissions control permissions...................................... 19 tracing permissions ...................................... 18 Personal safety devices ..................................... 225 Precision Access form (Cardholders folder)..... 111 field table ................................................... 112 procedures.................................................. 112 Pre-configured acknowledgement notes............. 61 Print alarms ......................................................... 48 Procedures add or remove readers................................ 155 delete an alarm........................................... 156 display cardholder photos ............................... 156 video live ............................................ 156 export video ............................................... 167 pan, tilt, and zoom ..................................... 169 switch between camera and monitor views 169 view video from a file ................................. 168 video tour............................................ 168 Pulse Open Door Action form field table ................................................... 306 Pulse Open Door Group form field table ................................................... 308 Pulse Open Door Group Properties window..... 307 procedures.................................................. 308 Pulse Open Door Properties window................ 305 procedures.................................................. 306 R Reader Mode form field table ................................................... Reader Mode Group Action form field table ................................................... Reader Mode Group Properties window .......... procedures.................................................. Reader Mode Properties window...................... 310 313 312 314 309
- Page 336 -
procedures.................................................. 311 Readers generic alternate readers ............................ 232 RSI biometric readers about ................................................... 227 enable verify mode ............................. 228 Rearrange alarms ................................................ 43 Refresh all actions ................................................... 201 an action..................................................... 200 Remove access levels from a selected group of cardholders ......................................... 110 columns........................................................ 42 precision access groups from a badge ....... 113 Remove readers................................................. 155 Report Print form field table ................................................... 316 Report Print Properties window........................ 315 procedures.................................................. 316 Reports run a cardholder report............................... 129 run an asset report...................................... 148 Reports form (Assets folder)............................. 146 field table ................................................... 147 procedures.................................................. 148 Reports form (Cardholders folder) ................... 128 field table ................................................... 129 procedures.................................................. 129 Reset use limit..................................................... 50 Reset Use Limit form field table ................................................... 318 Reset Use Limit Properties window ................. 317 procedures.................................................. 318 Retrieve the most recent search results............. 137 Run asset report ................................................. 148 cardholder report........................................ 129 S Schedule action.......................................................... 191 action using scheduler right-click menu .... 199 Scheduler folder ................................................ 189 Scheduler form (Scheduler folder) ................... 190 field table ................................................... 191 procedures.................................................. 191 Search for a cardholder record................................. 82 for a cardholders biometric record ........... 116 for an asset record...................................... 136 for empty values .......................................... 81 on multiple fields ......................................... 81
Search text fields for contains ......................... 81 Search video...................................................... 175 Security clearance levels................................... 127 Segments form (Cardholders folder) .................. 91 field table ..................................................... 92 overview ...................................................... 91 procedures.................................................... 92 Select................................................................... 61 events for display......................................... 41 pre-configured acknowledgement notes ...... 61 pre-configured acknowledgment notes........ 61 Send e-mail ........................................................... 63 page.............................................................. 65 Set use limits...................................................... 49 user permissions .......................................... 18 Set up an Alarm Monitoring Station to View Video 163 Single sign-on overview ..................................... 19 Start an action ................................................... 199 Status bar - Alarm Monitoring window.............. 41 Stop an action.................................................... 199 Surveillance-only Cameras ............................... 162 Switch Between Camera and Monitor Views... 169 Switch between camera and monitor views...... 169 System Hardware Options window .................. 215 System Hardware window ................................ 205 T Test a device ....................................................... 52 Toolbars .............................................................. 28 Trace Configuration window .............................. 67 display.......................................................... 67 functions ...................................................... 67 Trace Configuration window ............................. 67 Trace menu ......................................................... 30 Tree view .......................................................... 218 Troubleshoot logging in...................................... 23 U Unassign an asset .............................................. 145 Unlink directory account ....................................... 125 Update hardware status..................................... 213 Use limit overview ...................................................... 49 reset.............................................................. 50 set................................................................. 49 V Video - display live........................................... 156 Video monitoring
- Page 337 -
checklist ..................................................... 163 Video Monitoring of a Specific Camera........... 166 Video Monitoring Procedures........................... 163 Video Monitoring Window............................... 160 Video Monitoring window................................ 159 Video Monitoring with Multiple Cameras (Simultaneously)........................................ 164 Video Monitoring with Multiple Cameras (Successively) ............................................ 166 Video search performance requirements .......... 174 Video Search window ....................................... 172 display........................................................ 175 Video search window procedures.................................................. 175 Video Verification window ..................... 153, 154 display........................................................ 153 functions .................................................... 153 View action history ............................................. 199 current status of an action .......................... 200 hardware list............................................... 218 last connection time for dialup panels ....... 214 video from a file......................................... 168 video search results.................................... 176 video tour ................................................... 168 View menu .......................................................... 29 Visitor form......................................................... 88 field table ..................................................... 89 overview ...................................................... 88 procedures.................................................... 89 Visits form (Cardholders folder) field table ................................................... 118 modify mode.............................................. 117 procedures.................................................. 118 view mode.................................................. 117 W Window menu..................................................... 36 Windows Trace Configuration..................................... 67 Video Verification ..................................... 154
- Page 338 -
- Page 339 -