Genetec Security Desk User Guide

Security Desk User Guide 5.5

Copyright notice

? Genetec Inc., 2016

Genetec Inc. distributes this document with software that includes an end-user license agreement and is furnished under license and may be used only in accordance with the terms of the license agreement. The contents of this document are protected under copyright law.

The contents of this guide are furnished for informational use only and are subject to change without notice. Genetec Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide.

This publication may not be copied, modified, or reproduced in any form or for any purpose, nor can any derivative works be created therefrom without Genetec Inc.'s prior written consent.

Genetec Inc. reserves the right to revise and improve its products as it sees fit. This document describes the state of a product at the time of document's last revision, and may not reflect the product at all times in the future.

In no event shall Genetec Inc. be liable to any person or entity with respect to any loss or damage that is incidental to or consequential upon the instructions found in this document or the computer software and hardware products described herein. The use of this document is subject to the disclaimer of liability found in the end-user license agreement.

Genetec, Omnicast, Synergis, AutoVu, Federation, Stratocast, Sipelia, Citywise, the Genetec Logo, the Mobius Strip Logo, the Omnicast Logo, the Synergis Logo, the AutoVu Logo, and the Stratocast Logo are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the manufacturers or vendors of the respective products.

All specifications are subject to change without notice.

Document information

Document title: Security Desk User Guide 5.5

Document number: EN.500.004-V5.5.B(4)

Document update date: July 28, 2016

You can send your comments, corrections, and suggestions about this guide to documentation@.

About this guide

This guide describes Security Desk features and commands, and provides instruction on how to perform tasks, such as live monitoring of events, video playback and instant replay, report generation, LPR route playback, alarm management, and visitor management.

Notes and notices

The following notes and notices might appear in this guide: ? Tip. Suggests how to apply the information in a topic or step. ? Note. Explains a special case, or expands on an important point. ? Important. Points out critical information concerning a topic or step. ? Caution. Indicates that an action or step can cause loss of data, security problems, or performance

issues. ? Warning. Indicates that an action or step can result in physical harm, or cause damage to hardware. IMPORTANT: Topics appearing in this guide that reference information found on third-party websites were accurate at the time of publication, however, this information is subject to change without prior notice to Genetec.

Contents

Preface: Preface

Copyright notice . . . . . . . . . . . . . . . . . . . .

ii

About this guide . . . . . . . . . . . . . . . . . . . . iii

Part I: Introduction to Security Desk

Chapter 1: Security Desk at a glance

About Security Desk . . . . . . . . . . . . . . . . . . .

3

How Security Center is organized . . . . . . . . . . . . . . . . 4

Logging on to Security Desk . . . . . . . . . . . . . . . . .

5

Closing Security Desk . . . . . . . . . . . . . . . . . . . 6

Defining how your workspace is saved . . . . . . . . . . . . . . 6

Home page overview . . . . . . . . . . . . . . . . . . . 7

UI component overview . . . . . . . . . . . . . . . . . .

9

Overview of the About page . . . . . . . . . . . . . . . . . 11

About the area view . . . . . . . . . . . . . . . . . . . 13

Changing passwords . . . . . . . . . . . . . . . . . . . 15

Sending feedback . . . . . . . . . . . . . . . . . . . . 16

Chapter 2: Canvas

About tiles . . . . . . . . . . . . . . . . . . . . .

18

Tile menu commands . . . . . . . . . . . . . . . . . . . 20

Viewing entities in the canvas . . . . . . . . . . . . . . . . . 22

Customizing how entities are displayed in the canvas . . . . . . . . . . 22

How maps are displayed in the Security Desk canvas . . . . . . . . . . . 23

Unpacking content in tiles . . . . . . . . . . . . . . . . . . 24

Customizing entity cycling options . . . . . . . . . . . . . .

25

Maximizing the canvas to full screen . . . . . . . . . . . . . . . 26

Selecting which monitors can switch to full screen . . . . . . . . . .

26

Changing tile patterns . . . . . . . . . . . . . . . . . . . 27

Editing and creating tile patterns . . . . . . . . . . . . . . . . 28

Customizing how tiles are displayed . . . . . . . . . . . . . . . 29

Chapter 3: Widgets

Alarm widget . . . . . . . . . . . . . . . . . . . . . 31

Area widget . . . . . . . . . . . . . . . . . . . . . 33

Camera widget . . . . . . . . . . . . . . . . . . . .

34

Door widget . . . . . . . . . . . . . . . . . . . . . 37

Intrusion detection area widget . . . . . . . . . . . . . . . . 38

PTZ widget . . . . . . . . . . . . . . . . . . . . .

39

tip. | Security Desk User Guide 5.5

EN.500.004-V5.5.B(4) | Last updated: July 28, 2016

iv

Tile widget . . . . . . . . . . . . . . . . . . . . .

41

Zone widget . . . . . . . . . . . . . . . . . . . . . 43

Chapter 4: Tasks

Opening tasks . . . . . . . . . . . . . . . . . . . . . 45

Saving tasks . . . . . . . . . . . . . . . . . . . . . 46

Adding tasks to your Favorites list . . . . . . . . . . . . . . . . 47

Hiding the Favorites and Recent items lists from your home page . . . . . . . 47

Sending tasks to other users . . . . . . . . . . . . . . . . . 48

Sending tasks using a manual action . . . . . . . . . . . . . . 48

Closing tasks using a system action . . . . . . . . . . . . . . .

50

Customizing task behaviour . . . . . . . . . . . . . . . . . 51

Chapter 5: Reports

Reporting task workspace overview . . . . . . . . . . . . . . . 53

Generating reports . . . . . . . . . . . . . . . . . . .

55

Selecting date and time ranges for reports . . . . . . . . . . . .

55

Exporting generated reports . . . . . . . . . . . . . . . . 56

Printing generated reports . . . . . . . . . . . . . . . .

57

Customizing time zone settings . . . . . . . . . . . . . . . 57

Generating and saving reports . . . . . . . . . . . . . . . . . 59

Generating and saving reports using a system action . . . . . . . . . . 59

Customizing the report pane . . . . . . . . . . . . . . . . . 61

Customizing report behavior . . . . . . . . . . . . . . . . . 62

Chapter 6: Basic tasks

Monitoring events . . . . . . . . . . . . . . . . . . . . 64

Selecting events to monitor . . . . . . . . . . . . . . . . 65

Selecting entities to monitor . . . . . . . . . . . . . . . . 65

Event colors . . . . . . . . . . . . . . . . . . . . 66

Customizing Monitoring task options . . . . . . . . . . . . . . 67

Event occurrence period . . . . . . . . . . . . . . . . . . 68

Searching for entities . . . . . . . . . . . . . . . . . . . 69

Searching for entities using the search tool . . . . . . . . . . . .

69

Triggering hot actions . . . . . . . . . . . . . . . . . . . 71

Triggering one-time actions . . . . . . . . . . . . . . . . .

72

Configuring the notification tray . . . . . . . . . . . . . . . . 73

Notification tray icons . . . . . . . . . . . . . . . . .

73

Moving the taskbar . . . . . . . . . . . . . . . . . . .

76

Remote monitoring . . . . . . . . . . . . . . . . . . .

77

Connecting to remote Security Desks . . . . . . . . . . . . . . . 78

Monitoring events on remote Security Desks . . . . . . . . . . . . . 80

Monitoring alarms on remote Security Desks . . . . . . . . . . . . . 81

tip. | Security Desk User Guide 5.5

EN.500.004-V5.5.B(4) | Last updated: July 28, 2016

v

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download