Security Center Mobile User Guide 3.0 GA. Click here for the most recent version of this guide.

Size: px
Start display at page:

Download "Security Center Mobile User Guide 3.0 GA. Click here for the most recent version of this guide."

Transcription

1 Security Center Mobile User Guide 3.0 GA Click here for the most recent version of this guide.

2 Copyright notice 2011, 2012 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes an end-user license agreement and is furnished under license and may be used only in accordance with the terms of the license agreement. The contents of this document are protected under copyright law. The contents of this guide are furnished for informational use only and are subject to change without notice. Genetec Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide. This publication may not be copied, modified, or reproduced in any form or for any purpose, nor can any derivative works be created therefrom without Genetec Inc. s prior written consent. Genetec Inc. reserves the right to revise and improve its products as it sees fit. This document describes the state of a product at the time of document s last revision, and may not reflect the product at all times in the future. In no event shall Genetec Inc. be liable to any person or entity with respect to any loss or damage that is incidental to or consequential upon the instructions found in this document or the computer software and hardware products described herein. The use of this document is subject to the disclaimer of liability found in the end user license agreement. "Genetec", "Omnicast", "Synergis", "Synergis Master Controller", "AutoVu", "Federation", the Genetec stylized "G" and the Omnicast, Synergis and AutoVu logos are trademarks of Genetec Inc., either registered or pending registration in several jurisdictions. "Security Center", "Security Center Mobile", "Plan Manager", and the Security Center logo are trademarks of Genetec Inc. Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products. All specifications are subject to change without notice. Document information Document title: Security Center Mobile User Guide 3.0 GA Document number: Document update date: March 28, 2012 You can send your comments, corrections, and suggestions about this guide to documentation@genetec.com. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version ii

3 Product documentation Security Center includes the following documentation: Security Center Release Notes. Describes the release in detail, including new features, resolved issues, known issues, and limitations. Security Center Installation and Upgrade Guide. Describes the prerequisites for installing Security Center, and provides instructions for installing and upgrading Security Center on your system. Security Center Administrator Guide. Provides all the instructions and conceptual information you ll need to set up, configure, and administer your Security Center system. Getting Started with Security Desk. A task-oriented introduction to Security Desk that uses real-world scenarios (viewing a camera, searching/exporting video, and managing alarms) to show new users how to use the basic product features. Genetec Security Desk User Guide. Provides the instructions and conceptual information you need to get started with Security Desk, to monitor and generate reports for AutoVu LPR, Omnicast video surveillance, and Synergis access control systems. Security Center Video Unit Configuration Guide. Provides the pre-configuration instructions for integrating video units into Security Center, and any configuration steps required for some video unit features to work. Security Center Portable Archive Player User Guide. Explains how to use the Portable Archive Player to view exported video files. AutoVu Patroller Release Notes. Describes the AutoVu Patroller release in detail, including new features, resolved issues, known issues, and limitations. AutoVu Hardware Release Notes. Describes the AutoVu Hardware for this release in detail, including new features, resolved issues, known issues, and limitations. AutoVu Handbook. Provides AutoVu installers and administrators with a single source of information about installing and configuring AutoVu hardware and software. AutoVu Patroller User Guides. Quick reference guides to using Patroller, AutoVu s mobile LPR solution. There is a separate user guide for each Patroller installation type (Law Enforcement, City Parking Enforcement, City Parking Enforcement with Wheel Imaging, University Parking Enforcement, and Mobile License Plate Inventory). AutoVu Connecting the Sharp Camera. Explains how to power up and connect your Sharp. A printed version is provided in the Sharp box. AutoVu Connecting the SharpX Camera. Explains how to power up and connect your SharpX. A printed version is provided in the SharpX box. Plugin User Guides. Introduces you to the plugin features and describes what s new in the current release. It also explains how to install and configure the plugin in Security Center, and how to use it in Security Desk. Where can I find the product documentation? Product DVD. The documentation is available on the product DVD in the Documentation folder. Release notes and installation guides include a direct link to the latest version of the document. Genetec Technical Assistance Portal (GTAP). The latest version of the documentation is available from GTAP. Note, you ll need a username and password to log on to GTAP. Online help. Security Center client applications include online help, which explain how the product works and provide instructions on how to use the product features. Patroller and the Sharp portal also include context-sensitive help for each screen. To access the online help, click Help, press F1, or tap the? (question mark) in the different client applications. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version iii

4 Technical support Genetec Technical Assistance Center (GTAC) is committed to providing its worldwide clientele with the best technical support services available. As a Genetec customer, you have access to the Genetec Technical Assistance Portal (GTAP), where you can find information and search for answers to your product questions. Genetec Technical Assistance Portal (GTAP). GTAP is a support website that provides in-depth support information, such as FAQs, knowledge base articles, user guides, supported device lists, training videos, product tools, and much more. Prior to contacting GTAC or opening a support case, it is important to look at this website for potential fixes, workarounds, or known issues. You can log in to GTAP or sign up at Genetec Technical Assistance Center (GTAC). If you cannot find your answers on GTAP, you can open a support case online at For GTAC's contact information in your region see the Contact page at NOTE Before contacting GTAC, please have your System ID (available from the About button in your client application) and your SMA contract number (if applicable) ready. Licensing. For license activations or resets, please contact GTAC at For issues with license content or part numbers, or concerns about an order, please contact Genetec Customer Service at customerservice@genetec.com, or call (option #3). If you require a demo license or have questions regarding pricing, please contact Genetec Sales at sales@genetec.com, or call (option #2). Additional resources If you require additional resources other than the Genetec Technical Assistance Center, the following is available to you: GTAP Forum. The Forum is an easy to use message board that allows clients and Genetec staff to communicate with each other and discuss a variety of topics, ranging from technical questions to technology tips. You can log in or sign up at Technical training. In a professional classroom environment or from the convenience of your own office, our qualified trainers can guide you through system design, installation, operation, and troubleshooting. Technical training services are offered for all products and for customers with a varied level of technical experience, and can be customized to meet your specific needs and objectives. For more information, go to genetec.com Security Center Mobile User Guide 3.0 GA Download latest version iv

5 Contents Product documentation iii Technical support iv About this guide xiv Terminology used in this guide xvi Part I: Introduction to Security Center Mobile Chapter 1: Introducing Security Center Mobile What is Security Center Mobile? Mobile app features Web Client features How Security Center Mobile components work with Security Center Security Center Mobile prerequisites Security Center user privileges Web Client prerequisites Mobile app prerequisites Security Center Mobile 3.0 GA release notes What s new in Security Center Mobile 3.0 GA? Resolved issues Known issues Known limitations Mobile Server hardware requirements Mobile Server software requirements Mobile Admin software requirements Web Client software requirements Supported languages Web Client supported mobile devices Mobile app supported mobile devices Supported Omnicast Federations genetec.com Security Center Mobile User Guide 3.0 GA Download latest version v

6 Security Center compatibility Backward compatibility Scalability Part II: Security Center Mobile Server Chapter 2: Installing Mobile Server Before you install Review the Release Notes Install Omnicast compatibility packages Mobile Server ports Install Mobile Server Upgrade Mobile Server Chapter 3: Getting started with Mobile Admin Log on to Mobile Admin Log off from Mobile Admin Mobile Admin interface tour Monitoring Web pages Refreshing Mobile Admin Web pages View license details Chapter 4: Configuring Mobile Server Configuration overview Encrypt communication Encryption prerequisites Select a Mobile Server SSL certificate Create a test SSL certificate Reassign an HTTP port to HTTPS Configure Mobile Server administration settings Configure connection settings to Security Center Configure Web Client connections Configure Mobile app connections genetec.com Security Center Mobile User Guide 3.0 GA Download latest version vi

7 Configure video usage Configure BlackBerry OTA and push notifications Configuring Apple push notifications About the Genetec feedback server Configure Apple push notifications Apple push certificate expiry Configure Android OTA and push notifications Chapter 5: Monitoring the Security Center Mobile System Monitoring Mobile app sessions Force a user logoff Monitoring Web Client sessions Monitoring video Monitoring doors Monitoring mobile devices Delete mobile devices Monitoring ports Part III: Security Center Web Client Chapter 6: Getting started with Web Client What is Web Client Log on to Web Client Log off from Web Client Web Client interface tour Task workspaces Administration task workspace Operation tasks workspace Selector Report pane Canvas Reporting tasks workspace Customizing your report genetec.com Security Center Mobile User Guide 3.0 GA Download latest version vii

8 Print and export your report Contextual commands toolbar Understanding tasks Task categories Supported tasks Administration Operation Investigation Maintenance Working with Web Client About the Web Client time zone Refreshing Web Client Web pages Using Web Client on a touchscreen Working with entities Creating entities Searching for entities Basic name search Advanced search Delete an entity Working with the dashboard Camera widget PTZ widget PTZ mode commands Tile widget Chapter 7: Web Client administration tasks Common configuration tabs Custom fields Logical view Configure areas Properties Access rules Configure doors Properties genetec.com Security Center Mobile User Guide 3.0 GA Download latest version viii

9 Access rules Security Configure users Properties Create a user Access control Configure access rules Properties Create an access rule Configure cardholder groups Properties Create a cardholder group Configure credentials Properties Create a credential LPR Configure hotlists Properties Create a hotlist Chapter 8: Web Client operation tasks Monitoring task Add a bookmark Cardholder management Create a cardholder Modify a cardholder Finding a cardholder Visitor management Check in and check-out Before you check-in a visitor Check-in a visitor Check-out a visitor Modify a visitor Finding a visitor genetec.com Security Center Mobile User Guide 3.0 GA Download latest version ix

10 Hotlist editor Add, delete, and edit items in your hotlist Chapter 9: Introduction to Web Client reporting tasks What are reporting tasks? Generating a report Common query filters Using the time range filter Using the date-time picker Chapter 10: Web Client common investigation tasks Alarm report Alarm query filters Alarm report results Zone activities report Zone activity query filters Zone activity report results Chapter 11: Web Client access control investigation tasks Area activities report Area activity query filters Area activity report results Cardholder activities report Cardholder activities query filters Cardholder activities report results Door activities report Door activities query filters Door activities report results Visitor activities report Visitor activities query filters Visitor activities report results Visit details report Visit details query filters genetec.com Security Center Mobile User Guide 3.0 GA Download latest version x

11 Visit details report results Area presence report Area presence query filters Area presence report results Chapter 12: Web Client intrusion detection investigation tasks Intrusion detection area activities report Intrusion detection area activities query filters Intrusion detection area activities report results Chapter 13: Web Client LPR investigation tasks Hits report Hits query filters Hits report results Reads report Reads query filters Reads report results Daily usage per Patroller report Daily usage per Patroller query filters Daily usage per Patroller report results Logons per Patroller report Logons per Patroller query filters Logons per Patroller report results Reads/hits per day Reads/hits per day query filters Reads/hits per day report results Chapter 14: Web Client maintenance tasks Cardholder configuration Cardholder configuration query filters Cardholder configuration report results Part IV: Security Center Mobile app genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xi

12 Chapter 15: Installing Mobile app Before you install Review the Release Notes Prerequisites for BlackBerry devices Prerequisites for Apple Multi-Touch devices Prerequisites for Android devices Prerequisites for firewall Install Mobile app on Blackberry devices Install Mobile app from BlackBerry App World Install Mobile app using BlackBerry Desktop Manager Install Mobile app using OTA deployment Install Mobile app on Apple mobile devices Install Mobile app on Android devices Install Mobile app from Android Market Install Mobile app using OTA deployment Chapter 16: Getting started with Mobile app What is Mobile app Mobile app icons Open Mobile app Log on to Mobile app Log off Mobile app Working with Mobile app Have your device documentation on hand Using Mobile app on a touchscreen Chapter 17: Configuring Mobile app Configure Mobile app connection settings Configure alarm notifications Turn alarm notifications on and off Use your mobile device on a different server Chapter 18: Using Mobile app genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xii

13 Viewing video Browse and select cameras Using the camera controls Viewing doors Browse and select doors Viewing door events Using door controls Viewing alarms About alarm notifications View an alarm Using Favorites Add an entity to Favorites Delete an entity from Favorites Searching for specific entities About searching Search for entities on Apple devices Search for entities on BlackBerry devices Search for entities on Android devices Index genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xiii

14 About this guide This guide explains how to install, configure, and use the Security Center Mobile feature. It is for two types of readers: system administrators and users. System administrators. People responsible for deploying and supporting Security Center Mobile in their enterprise environment. You should be familiar with the following concepts and systems: BlackBerry Enterprise Server administration. Apple itunes and Apple Push Notification Service. Google Android Market and Google Cloud to Device Messaging service. As the system administrator, these are the tasks you need to perform: Task Description See Understand key information before installing Mobile Server. Limitations, known issues System requirements Scalability Compatibility with Security Center Other information about this release "Security Center Mobile 3.0 GA release notes" on page 9. Install Mobile Server. Open ports. Install Mobile Server. Configure Mobile Server. Understand the Mobile Admin interface. Configure Mobile Server. See the Mobile Server configuration chapter for a complete task list. "Installing Mobile Server" on page 18 "Getting started with Mobile Admin" on page 25 "Configuring Mobile Server" on page 30 Configure Security Center user privileges before using Security Center Mobile client components. Install Mobile app. Understand which user privileges are required to log on to Security Center Mobile client components. Configure Security Center user privileges in Security Center. If users are going to log on to Security Center Mobile from Mobile app devices, you need to install Mobile app. "Security Center user privileges" on page 7 Security Center Administrator Guide. "Installing Mobile app" on page 158 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xiv

15 Task Description See Configure Mobile app. Configure the Mobile app port connections using Mobile Admin. Configure the connection settings to Mobile Server using Mobile app. "Configure Mobile app connections" on page 40. "Configuring Mobile app" on page 170. Configure OTA deployment and push notifications for mobile devices. Depending on which mobile devices you are using with Mobile app, you need to configure the OTA deployment and alarm push notifications using Mobile Admin. "Configure BlackBerry OTA and push notifications" on page 43. "Configuring Apple push notifications" on page 45. "Configure Android OTA and push notifications" on page 48. "Turn alarm notifications on and off " on page 172 Configure Web Client. Configure the Web Client port connections using Mobile Admin. Configure Web Client entities. "Configure Web Client connections" on page 38 "Web Client administration tasks" on page 79 Monitor all connections to Mobile Server. As a system administrator, you often need to monitor your system connections. "Monitoring the Security Center Mobile System" on page 50 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xv

16 Terminology used in this guide Users. You use Security Center Mobile on your mobile device or through a Web browser. As a user, these are the tasks you need to perform: Task Description See Learn about the features you can use in Security Center Mobile. Understand key information about Web Client before using it. Use Web Client to perform tasks. Understand key information about Mobile app before using it. Use Mobile app to perform tasks. See the Feature list. See what s new in Security Center Mobile 3.0 GA. Log on/log off. Navigate and use the interface. Supported tasks. Monitor your Security Center system. Generate investigation and maintenance reports. Create, modify, and delete entities. Print an export reports. Other tasks. Open Mobile app. Log on/log off. Navigate and use the interface. Receive alarms. View live video streams. View door statuses. Add favorites. Other tasks. "Introducing Security Center Mobile" on page 2 "Getting started with Web Client" on page 60 Part 3, Security Center Web Client on page 59. "Getting started with Mobile app" on page 164 "Using Mobile app" on page 175 Terminology used in this guide This guide uses the following terminology: Apple Multi-Touch devices. ipad, iphone, and ipod touch mobile devices. APNS. Apple Push Notification Service. BES. Blackberry Enterprise Server. Security Center Mobile. Genetec Security Center Mobile Application. OTA deployment. Over the Air deployment. C2DM. Cloud to Device Messaging. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version xvi

17 Part I Introduction to Security Center Mobile This section explains how Security Center Mobile works, its components, and its network architecture. This section also contains the release notes for Security Center Mobile 3.0 GA. This part includes the following chapters: Chapter 1, "Introducing Security Center Mobile" on page 2

18 1 Introducing Security Center Mobile This section explains how Security Center Mobile works, its components, and its network architecture. This section also contains the release notes for Security Center Mobile 3.0 GA, including new features, resolved issues, known issues, limitations, and system requirements. This section includes the following topics: "What is Security Center Mobile?" on page 3 "Mobile app features" on page 4 "Web Client features" on page 5 "How Security Center Mobile components work with Security Center" on page 6 "Security Center Mobile prerequisites" on page 7 "Security Center Mobile 3.0 GA release notes" on page 9 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 2

19 What is Security Center Mobile? What is Security Center Mobile? Security Center Mobile is a feature of Genetec s unified platform that lets you remotely connect to your Security Center system over a wireless IP network. Supported Mobile client components include a platform-independent unified Web Client, as well as various Mobile apps for smartphones and tablets. Security Center Mobile has the following server and client components: Mobile Server. The server component of Security Center Mobile that connects Mobile apps and Web Clients to Security Center. The Mobile Server connects to Security Center, and synchronizes the data and video between Security Center and supported Mobile client components. Mobile Admin. Web-based administration tool used to configure Mobile Server. From the Mobile Admin you can validate your Mobile Server license, configure connection settings, configure push notifications, and monitor connections between Mobile Server and Security Center Mobile components. Web Client. The client component of Security Center Mobile that provides access to Security Center features from a Web browser. Web Client users connect to Mobile Server to configure and monitor various aspects of your Security Center system. Mobile app. The client component of Security Center Mobile installed on mobile devices. Mobile app users connect to Mobile Server to receive alarms, view live video streams, view the status of doors, and more, from Security Center. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 3

20 Mobile app features Mobile app features You can use Security Center Mobile app to do the following: Monitor your Security Center system from a mobile device, such as a smartphone. You can view video from all camera manufacturers and models supported by Security Center 5.1 SR1. For a list of camera manufacturers, see the GTAP Web site, at gtap.genetec.com. For a list of supported devices, see "Mobile app supported mobile devices" on page 15. Monitor Security Center doors and related events, such as access granted or access denied. You can lock/ unlock doors remotely, override lock/unlock schedules, and view live video from cameras associated with doors. Receive, view, and acknowledge Security Center alarms, including access control and video alarms. Receive multiple video streams to several mobile devices at the same time. View one video stream on iphone, ipod touch, BlackBerry, and Android devices. View six streams simultaneously on an ipad. Take a snapshot from a live video stream and save it to a photo library on a mobile device. Control PTZ cameras, including access to PTZ presets. Supports secure communication (authentication and encryption) between Security Center Mobile components: Mobile Server, Mobile Admin, and Mobile app. Supports ipod Touch / iphone / ipad, BlackBerry devices, and Google Android devices. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 4

21 Web Client features Web Client features You can use Security Center Web Client to do the following: Monitor your Security Center system from a computer or tablet, through a Web browser. Create and manage Security Center users. Create and manage access control entities, such as cardholders, cardholder groups, visitors, credentials, and access rules. Create and manage license plate recognition (LPR) hotlists. Modify logical entities, such as areas and doors. Control PTZ cameras, as well as trigger video recording. Generate access control, intrusion detection, and LPR investigation reports. Generate various configuration and maintenance reports. Supports secure communication (authentication and encryption) between Security Center Mobile components: Mobile Server, Mobile Admin, and Web Client. Supports authentication through Active Directory credentials. Runs on various Web browsers (Microsoft IE 8 and IE9, Mozilla Firefox, Chrome, Opera, Safari, Android browser, and Blackberry browser), with no plugins required. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 5

22 How Security Center Mobile components work with Security Center How Security Center Mobile components work with Security Center The Mobile Server connects Mobile apps and Web Clients to Security Center. Once the Mobile Server is installed, the connection settings between Mobile Server and other Mobile components are configured using the Mobile Admin. The Mobile Server streams video over an IP network to Mobile apps and Web Clients. Mobile Server also sends events and automated alarms to Mobile apps through the Apple Push Notification Service (APNS), BlackBerry Enterprise Server (BES), and Google Cloud to Device Messaging service (C2DM). Web Clients receive report data from the Mobile Server. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 6

23 Security Center Mobile prerequisites Security Center Mobile prerequisites This section describes the prerequisites for using Security Center Mobile client components. This section includes the following topics: "Security Center user privileges" on page 7 "Web Client prerequisites" on page 7 "Mobile app prerequisites" on page 8 Security Center user privileges To connect to Security Center, Security Center Mobile users must be assigned specific user rights insecurity Center. See "Web Client prerequisites" on page 7 and "Mobile app prerequisites" on page 8. Best practice: In Security Center, create a separate user group for Security Center Mobile users that has the required user privileges to log on to the client component. For more information about users and user groups in Security Center, see the Security Center Administrator Guide. Web Client prerequisites To use Web Client, you require the following: The Web Client Security Center user privilege. JavaScript enabled. To enable JavaScript, see your Web browser manual. Cookies enabled. You can enable cookies from your Internet options dialog box. Depending on the tasks you want to perform using Web Client, you require different Security Center user privileges. For more information about user privileges, see User privileges in the Security Center Administrator Guide. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 7

24 Security Center Mobile prerequisites Mobile app prerequisites To use Mobile app, you require the following: The Mobile Application Security Center user privilege. See "Security Center user privileges" on page 7. Your mobile device must be part of a WiFi or cellular network. The video frame rate may vary, depending on your available bandwidth. To receive alarm notifications on Mobile app devices, you require the following: The Apple, BlackBerry, or Android push notifications must be must be configured in Mobile Server. See "Configuring Mobile Server" on page 30. The Push alarms option must be turned on in Mobile app. See "Turn alarm notifications on and off " on page 172. To view alarms, you must have the Alarm Monitoring and View Alarms Security Center user privileges. For more information, see User privileges in the Security Center Administrator Guide. For Mobile app installation prerequisites, see "Before you install" on page 159. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 8

25 Security Center Mobile 3.0 GA release notes Security Center Mobile 3.0 GA release notes This section describes the new features and enhancements in Security Center Mobile 3.0 GA. It also lists the resolved issues, known issues, limitations, system requirements, and other things you ll need to know before you install Security Center Mobile. This section includes the following topics: "What s new in Security Center Mobile 3.0 GA?" on page 10 "Resolved issues" on page 10 "Known issues" on page 10 "Known limitations" on page 11 "Mobile Server hardware requirements" on page 12 "Mobile Server software requirements" on page 12 "Mobile Admin software requirements" on page 13 "Web Client software requirements" on page 13 "Supported languages" on page 14 "Web Client supported mobile devices" on page 14 "Mobile app supported mobile devices" on page 15 "Supported Omnicast Federations" on page 15 "Security Center compatibility" on page 16 "Scalability" on page 16 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 9

26 Security Center Mobile 3.0 GA release notes What s new in Security Center Mobile 3.0 GA? Resolved issues Security Center Mobile 3.0 GA includes the following new features and enhancements: Security Center 5.1 support. Security Center Mobile is now supported with Security Center 5.1 SR1. For a list of supported Security Center tasks using Web Client, see "Supported tasks" on page 71. New Web Client. The client component of Security Center Mobile that provides Security Center features from a Web browser. Web Client users connect to Mobile Server to configure and monitor their Security Center system. Additional user privilege. There is a new Security Center user privilege required to use Web Client. You must grant the Web Client user privilege to the users connecting to Web Client. Mobile Admin enhancements. From the Mobile Admin you can now configure setting for monitoring video, configure Web Client connection parameters, and monitor Web Client connections to Mobile Server. The following issues were resolved in Security Center Mobile 3.0 GA. Issue Description The Mobile 2.1 service does not start when you restart Windows 2003 or XP. Known issues Security Center Mobile 3.0 GA includes the following known issues. Issue Description Web Client: In the Zone activities task, you cannot use Events as a query filter Web Client: When creating or modifying access rules in the Access control administration task, you cannot add cardholder groups to the access rule membership. Workaround: Add access rules to the cardholder groups Web Client - Android devices: To perform a search in a report filter, you ll need to type a string in the search box, and then click the Search button twice. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 10

27 Security Center Mobile 3.0 GA release notes Issue Description Web Client: If you have a Global cardholder synchronizer role on your Security Center system, you can use custom fields that are defined on the host site when creating a cardholder, credential, or visitor entity in Web Client. However, if you add an image to a custom field that was defined on the host site when creating the entity, the image is not saved. Workaround: Create an entity, but do not add images to the custom fields defined on the host site. Then modify the entity, and add the desired images Mobile app: If you are using Mobile app with alarm notifications turned on, but you do not have the Alarm Monitoring and View Alarms Security Center user privileges, Mobile app may stop working if you click an entity on the Favorites page Silent upgrades from Security Center Mobile 2.0 or 2.1 to 3.0 GA are not supported. Known limitations Security Center Mobile 3.0 GA includes the following known limitations. Limitation Description Mobile app: In the list of entities on your mobile device, federated Omnicast entities do not appear red if they are offline. To verify that your Omnicast Federation is working, try to view its associated video feed. If you can t view the video feed, you may need to set up the Federation again Mobile app: When a invalid credential event is received, Mobile app does not automatically switch to the video feed on the side of the door where the event occurred. You ll need to manually select the camera on that side of the door to view the video feed Mobile app: If you move an entity that was originally created within a non-visible area to a visible area, the entity does not appear in your Mobile app s entities list, even after you refresh the list. To view the entity, log off the Mobile app, and then log back on Web Client: On ipads, the Web Client pages are not automatically resized when you switch from landscape to portrait view. Workaround: Manually resize the pages Web Client: You cannot upload photos from ios devices for cardholder or visitor pictures Web Client: In the Cardholder configuration task, visitor cardholder groups are not shown in the report results Web Client: To select a tile in the Monitoring task when using IE9, you need to double-click the tile. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 11

28 Security Center Mobile 3.0 GA release notes Mobile Server hardware requirements Mobile Server computer requirements depend on the number of cameras and mobile devices in your Security Center Mobile system. To determine which hardware configuration best suits your needs, contact the Genetec Sales Engineering team at If your system includes: 10 cameras streaming to 10 mobile devices or Web Clients. 6 cameras streaming to 60 mobile devices or Web Clients. 30 cameras streaming to 30 mobile devices or Web Clients. 18 cameras streaming to 180 mobile devices or Web Clients. 50 cameras streaming to 50 mobile devices or Web Clients. Server hardware requirements Intel Core 2 Duo 3.0 Ghz 2 GB RAM Intel Core 2 Duo 3.0 Ghz 2 GB RAM Quad Core Intel Xeon 2.13 Ghz 4 GB RAM Quad Core Intel Xeon 2.13 Ghz 4 GB RAM 2 Processors Quad Core Intel Xeon 2.5 Ghz 4 GB RAM 30 cameras streaming to 300 devices or Web Clients. 2 Processors Quad Core Intel Xeon 2.5 Ghz 4 GB RAM Mobile Server software requirements Mobile Server in Security Center Mobile 3.0 GA is supported on the following operating system versions: Category Operating system Supported software Microsoft Windows 7 Professional and Ultimate (32-bit/64-bit) Microsoft Windows Server 2003 Standard Edition SP1/SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2003 Enterprise Edition SP1/SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2008 Standard Edition SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2008 Enterprise Edition SP2/R2 (32-bit/64-bit) genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 12

29 Security Center Mobile 3.0 GA release notes Mobile Admin software requirements The Mobile Admin in Security Center Mobile 3.0 GA is supported by the following Web browsers: Category Supported software Browsers Microsoft Internet Explorer (IE 8 and 9) Mozilla Firefox Chrome Opera Safari (desktop and mobile versions) Blackberry browser Android browser Web Client software requirements The Web Client in Security Center Mobile 3.0 GA is supported on the following operating system versions, and by the following Web browsers: Operating system Microsoft Windows 7 Professional and Ultimate (32-bit/64-bit) Microsoft Windows Server 2003 Standard Edition SP1/SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2003 Enterprise Edition SP1/SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2008 Standard Edition SP2/R2 (32-bit/64-bit) Microsoft Windows Server 2008 Enterprise Edition SP2/R2 (32-bit/64-bit) Mac OS X ios 5.0 and later Blackberry Tablet OS 2.0 Android OS 3.0 Supported Browsers Microsoft Internet Explorer (IE 8 and IE9) Mozilla Firefox Chrome Opera Safari (desktop version) Microsoft Internet Explorer (IE 8 and IE9) Mozilla Firefox Chrome Opera Safari (desktop version) Safari (desktop version) Safari (mobile version) Blackberry browser Android browser genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 13

30 Security Center Mobile 3.0 GA release notes Supported languages Mobile Admin and Web Client support the following languages in Security Center Mobile 3.0 GA: English Dutch French Italian Spanish Mobile app is supported in English. Web Client supported mobile devices The following Apple Multi-Touch devices and BlackBerry devices have been tested with Web Client in Security Center Mobile 3.0 GA: Mobile devices Type Models Operating systems Apple Multi-Touch devices Apple ipad ipad1 and ipad2 ios 5.0 and later BlackBerry devices BlackBerry PlayBook n/a BlackBerry Tablet OS Android devices 1 Samsung Captivate smartphone n/a Android OS 2.0 Samsung Galaxy Tab n/a Android OS The minimum recommended resolution for Android devices is 320 x 480. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 14

31 Security Center Mobile 3.0 GA release notes Mobile app supported mobile devices The following mobile devices have been tested with Mobile app in Security Center Mobile 3.0 GA: Mobile device Type Models Operating systems Apple Multi-Touch devices Apple iphone 3G and later ios and later Apple ipod Touch 2nd generation and later ios and later Apple ipad ipad1 and ipad2 ios 3.2 and later BlackBerry devices BlackBerry Bold 9000, 9600, 9700 OS and later BlackBerry Curve 8530, 8900, 3G OS and later BlackBerry Storm 1 and 2 OS and later BlackBerry Torch 9630 OS and later Android devices 1 Samsung Captivate smartphone n/a Android OS Version 2.0 and later (minimum to view video, door events, etc) Version 2.2 and later (to receive push alarm notifications) Samsung Galaxy Tab n/a Android OS Version 2.0 and later (minimum to view video, door events, etc) Version 2.2 and later (to receive push alarm notifications) 1. The minimum recommended resolution for Android devices is 320 x 480. Supported Omnicast Federations To view video from a federated Omnicast system, your Omnicast system must meet the following requirements: Security Center Mobile supports Omnicast federated systems version 4.6, 4.7, and 4.8. You must install on the Mobile Server computer, the compatibility package for each version of Omnicast federated to Security Center. For more information, see "Install Omnicast compatibility packages" on page 19. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 15

32 Security Center Mobile 3.0 GA release notes Security Center compatibility Security Center Mobile 3.0 GA is supported with Security Center 5.1 SR1. NOTES Security Center Mobile supports Security Center 4.0 and 5.0 systems if you federate those systems to Security Center 5.1 SR1. For more information about Security Center Federation, see the Security Center Administrator Guide. If Mobile Server is streaming more than 10 cameras at the same time, then you need to install Mobile Server on a different computer than Security Center. If Mobile Server is streaming less than 10 cameras at the same time, then you can install Mobile Server and Security Center on the same computer, but the computer must meet the high-end hardware requirements for Mobile Server. For more information, see "Mobile Server hardware requirements" on page 12. Backward compatibility Mobile Server is backward compatible with Mobile app version 2.1. This means that you can use any version of Mobile app with Mobile Server version 3.0 GA. Scalability Security Center Mobile 3.0 GA supports the following number of connections per Mobile Server using Mobile app or Web Client. NOTES These numbers may vary, depending on your system setup and your computer. For maximum scalability on a single server, use the highest-end server listed in "Mobile Server hardware requirements" on page 12. To increase overall system scalability, add additional Mobile Servers. Maximum No. of: Mobile app OR Web Client User connections 50 different Security Center Mobile user accounts can be logged on to a Mobile Server simultaneously. 300 Mobile app sessions can be open using the same user credentials. 50 different Security Center Mobile user accounts can be logged on to a Mobile Server simultaneously. 100 Web Client sessions can be open using the same user credentials. Camera connections 50 different cameras can be monitored simultaneously from mobile devices. 50 different cameras can be monitored simultaneously from Web Clients. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 16

33 Part II Security Center Mobile Server This section takes you on a tour of the Mobile Admin interface. It also provides instructions on how to install Mobile Server, how to configure it using Mobile Admin, and how to monitor Security Center Mobile connections from Mobile Admin. This part includes the following chapters: Chapter 2, "Installing Mobile Server" on page 18 Chapter 3, "Getting started with Mobile Admin" on page 25 Chapter 4, "Configuring Mobile Server" on page 30 Chapter 5, "Monitoring the Security Center Mobile System" on page 50

34 2 Installing Mobile Server This section explains how to install and upgrade Mobile Server. This section includes the following topics: "Before you install" on page 19 "Install Mobile Server" on page 23 "Upgrade Mobile Server" on page 24 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 18

35 Before you install Before you install This section describes the things you need to know and do before you install Mobile Server. This section includes the following topics: "Review the Release Notes" on page 19 "Install Omnicast compatibility packages" on page 19 "Mobile Server ports" on page 20 Review the Release Notes Read the "Security Center Mobile 3.0 GA release notes" on page 9 for any known issues and other information about this release. Install Omnicast compatibility packages To view video from a federated Omnicast system, you'll need to install the Omnicast compatibility packages on your Mobile Server. You need to install a compatibility pack for each version of Omnicast federated to Security Center. For example, if you are federating an Omnicast 4.8 system to Security Center, you need to install the Omnicast 4.8 Compatibility Pack. Compatibility packs are located in the Security Center Mobile installation package. 1 Stop the Mobile Server service. From your Windows Control Panel, click Administrative Tools > Services, and then stop the Genetec Security Center Mobile Server service. 2 Uninstall all earlier versions of the Omnicast compatibility packages running on the Mobile Server computer. 3 Navigate to the Security Center Mobile installation package, and double-click setup. 4 In the Security Center Mobile Installation splash page, click Compatibility packs. 5 In the Compatibility Packs folder, open the folder that corresponds to the required compatibility pack. 6 Double-click setup.exe and follow the installer instructions. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 19

36 Before you install Mobile Server ports The following diagram and table list the ports connections required for communication between client and server components in your Security Center Mobile system. For information about the Genetec feedback server or push notifications, see the following sections: "About the Genetec feedback server" on page 45 "Configure BlackBerry OTA and push notifications" on page 43 "Configuring Apple push notifications" on page 45 "Configure Android OTA and push notifications" on page 48 H K F G I J A B C D E L M N O genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 20

37 Before you install Item Component Port information A Web Client Video streaming connection type is HTTP. Default port is B Web Client To connect Web Client to Mobile Server, open the following ports on the company firewall: HTTP protocol. Default port is 80. HTTPS protocol. Default port is C Mobile app Video streaming connection is HTTP. Default port is D Mobile app To connect Mobile app to Mobile Server, open the following ports on the company firewall: Main port: HTTP (default port is 8100) or HTTPS (default port is 443) BlackBerry OTA deployment: HTTP or HTTPS (default port is 80) Android OTA deployment: HTTP or HTTPS (default port is 80) E Mobile Admin To use Mobile Admin outside the LAN, open the following server administration ports: HTTP protocol. Default port is 80. HTTPS protocol. Default port is F G H Security Center Security Center Security Center Security Center SDK connection. Default port is TCP Inbound video streaming connection is: Unicast UDP. Default port is Multicast UDP. Default port is Outbound video streaming connection is: Unicast TCP. Default port is Manufacturer-specific video streaming connection. The most common ports are: For HTTP cameras: port 80 (TCP). For RTSP cameras: port 554 (TCP). I Omnicast Omnicast Compatibility Pack connection. Default port is TCP J Omnicast Inbound video streaming connection is: Unicast UDP. Default port is Multicast UDP. Default port is Outbound video streaming connection is: Unicast TCP. Default port is genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 21

38 Before you install Item Component Port information K Omnicast Manufacturer-specific video streaming connection. The most common ports are: For HTTP cameras: port 80 (TCP). For RTSP cameras: port 554 (TCP). L M N O Genetec feedback server 3 Apple push notifications Android push notifications BlackBerry push notifications For Mobile Server to communicate with the Genetec feedback server, open port 8102 outbound (TCP). For Mobile Server to retrieve the Apple push certificate, open port 80 outbound (TCP). For Mobile Server to send push notifications to Apple devices, open port 2195 outbound (TCP). If you are using the mobile device over a WiFi connection, open port 5223 outbound (TCP) on the company firewall. For Mobile Server to send push notifications to Android devices, open port 443 outbound (HTTP). If you are using the mobile device over a WiFi connection, open port 5228 outbound (TCP) on the company firewall. BlackBerry Enterprise Server and Mobile Data Service connection type is HTTP or HTTPS. Default port is HTTPS not supported for video data. 2. When using HTTPS on the Mobile Admin port, you need to install an SSL certificate, and use the SSL certificates page of the Mobile Admin to bind the SSL certificate to the IP port. 3. Only required for Apple push notifications. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 22

39 Install Mobile Server Install Mobile Server Use the following procedure to perform a clean installation of Mobile Server. Best practice: If Mobile Server is streaming more than 10 cameras at the same time, then you need to install Mobile Server on a different computer than Security Center. If Mobile Server is streaming less than 10 cameras at the same time, then you can install Mobile Server and Security Center on the same computer, but the computer must meet the highend hardware requirements for Mobile Server. For more information, see "Mobile Server hardware requirements" on page 12. Before you begin: Read "Before you install" on page Navigate to the Security Center Mobile installation package, and double-click setup.exe. 2 In the Security Center Mobile Installation splash page, click Mobile Server. 3 Follow the installer instructions. 4 In the Server Admin Tool Parameters page, choose the HTTP port for the Mobile Admin, and click Next. NOTE The default port is When the installation is complete, click Finish. After you are done: See "Configuring Mobile Server" on page 30. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 23

40 Upgrade Mobile Server Upgrade Mobile Server If you are upgrading Mobile Server, you don t need to uninstall the earlier version before installing the new one. Best practice: If Mobile Server is streaming more than 10 cameras at the same time, then you need to install Mobile Server on a different computer than Security Center. If Mobile Server is streaming less than 10 cameras at the same time, then you can install Mobile Server and Security Center on the same computer, but the computer must meet the highend hardware requirements for Mobile Server. For more information, see "Mobile Server hardware requirements" on page Stop the Mobile Server service. From your Windows Control Panel, click Administrative Tools > Services, and then stop the Genetec Security Center Mobile Server service. 2 Uninstall all earlier versions of the Omnicast compatibility packages running on the Mobile Server computer. 3 Install the required Omnicast compatibility packages. See "Install Omnicast compatibility packages" on page Install Mobile Server. See"Install Mobile Server" on page 23. After you are done: In Security Center Mobile 3.0 GA, there is a new user privilege required to use the Web Client. You must grant the Web Client user privilege to the users connecting to Web Client, and the Mobile application user privilege to the users connecting to Mobile app. For more information about user privileges, see User privileges in the Security Center Administrator Guide. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 24

41 3 Getting started with Mobile Admin This chapter is for administrators. It provides an overview of Security Center Mobile Admin used to configure Security Center Mobile. You ll learn how to log on and log off the application, and how to navigate the applications user interface. This section includes the following topics: "Log on to Mobile Admin" on page 26 "Log off from Mobile Admin" on page 26 "Mobile Admin interface tour" on page 27 "Refreshing Mobile Admin Web pages" on page 28 "View license details" on page 29 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 25

42 Log on to Mobile Admin Log on to Mobile Admin Before you begin: To log on to the Mobile Admin, you ll need to know the IP address or hostname of the Mobile Server computer. 1 Open a Web browser, and in the address bar, type one of the following: If you re logging on to the default port 80 using HTTP, type Server computer IP address or host name>>/gscmobileadmin. If you re logging on to a port other than 80 and/or using HTTPS, type <<http or https>>://<<mobile Server computer IP address or hostname>>:<<port number>>/ GSCMobileAdmin. EXAMPLE NOTE If you change the default port number or use HTTPS, the shortcut to Mobile Admin in your Windows start menu will not work. You ll need to type the Mobile Admin s URL into your browser manually. The Mobile Admin log on page appears. 2 In the log on page, type your username. The default is Admin. By default, there is no set password. 3 Click Log on. The Mobile Admin Home page appears. After you are done: Best practice is to change the default password, see "Configure Mobile Server administration settings" on page 36. Log off from Mobile Admin You are automatically logged off Mobile Admin after 20 minutes of inactivity. In the top-left corner of the Mobile Admin Web pages, click Log off. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 26

43 Mobile Admin interface tour Mobile Admin interface tour This section takes you on a tour of the main areas of the Mobile Admin user interface. A B C D E F A B Taskbar. Using the taskbar buttons, you can return to the Home page, log off from Mobile Admin, view your software copyright information, and open the Security Center Mobile online help. Configuration Web pages. For more information, see Chapter 4, Configuring Mobile Server on page 30. C Monitoring Web pages. For more information, see "Monitoring Web pages" on page 28 D System overview. Displays any warnings or errors with your server, if applicable. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 27

44 Refreshing Mobile Admin Web pages E F Displays information about Mobile Server, such as the startup time, server name, product version, IP addresses, the CPU usage, and the current number of Mobile app and Web Client sessions. The Home page is refreshed every 5 seconds. For more information, see "Refreshing Mobile Admin Web pages" on page 28. Monitoring Web pages The Monitoring Web pages in Mobile Admin allow you to monitor your Security Center Mobile system connections, current video stream information, and so on. This section describes the common workspace elements shared by all Monitoring Web pages. A B A B Taskbar. Using the taskbar buttons, you can return to the Home page, log off from Mobile Admin, view your software copyright information, and open the Security Center Mobile online help. If there are too many results in a Monitoring Web page table, multiple pages are created. You can switch between those pages using the arrow buttons. Related topics: Chapter 5, Monitoring the Security Center Mobile System on page 50. Refreshing Mobile Admin Web pages IMPORTANT The Home page is automatically refreshed every five seconds. All other pages are static, and must be refreshed manually to receive updated information from Mobile Server. To refresh Mobile Admin Web pages: Click the Refresh button on your browser. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 28

45 View license details View license details From the Mobile Admin License page, you can view information about your license, your system ID, and Genetec Technical Assistance contact information. NOTE You activate your Security Center Mobile license from the Security Center Server Admin. The Mobile Admin License page displays the portion of the Security Center license that pertains to Security Center Mobile. For more information on license activation, see the Security Center Administrator Guide. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click License. The License page appears. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 29

46 4 Configuring Mobile Server This section explains how to configure Mobile Server using the Mobile Admin. This section includes the following topics: "Configuration overview" on page 31 "Encrypt communication" on page 33 "Configure Mobile Server administration settings" on page 36 "Configure connection settings to Security Center" on page 37 "Configure Web Client connections" on page 38 "Configure Mobile app connections" on page 40 "Configure BlackBerry OTA and push notifications" on page 43 "Configuring Apple push notifications" on page 45 "Configure Android OTA and push notifications" on page 48 "Configure video usage" on page 41 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 30

47 Configuration overview Configuration overview This section summarizes the process to set up and configure Mobile Server. Before you begin: Install Mobile Server. See "Installing Mobile Server" on page 18. Task Description See Configure the Mobile Admin settings. (Optional) Encrypt the connections between Security Center Mobile components. Configure the connection between Mobile Server and Security Center. Configure the connection between Mobile Server and Web Clients. Configure the connection between Mobile Server and Mobile apps. Configure video usage settings for monitoring video in Web Clients and Mobile apps. Configure the Security Center camera video streams set up for remote usage in Config Tool. Configure the port number to establish communication with Mobile Server. Configure the administrator user name and password. Install SSL certificates. Select the SSL certificate to use. If needed, reassign the port numbers to use HTTPS protocol. Configure the Security Center Directory IP address. Configure the port number. Configure the Server Admin password of the main Security Center server. Configure the port number. Configure the number of report results a user can receive in a Web Client task. (Optional) Select an Integrator logo for the Web Clients. Configure the main port. Configure the video port. Select how long a user can remain inactive before being logged out of Mobile app. Select how long video can stream before the stream is stopped by Mobile Server. Select how many cameras can be monitored simultaneously. Select the maximum frames per second for Mobile app and Web Client video streams. Make sure the video stream usage is set to Remote. Configure the resolution. Configure the frame rate. "Configure Mobile Server administration settings" on page 36. "Encrypt communication" on page 33. "Configure connection settings to Security Center" on page 37. "Configure Web Client connections" on page 38. "Configure Mobile app connections" on page 40. "Configure video usage" on page 41. See Camera (video encoder) the Security Center Administrator Guide. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 31

48 Configuration overview Task Description See (Optional) To receive notifications on mobile devices from Mobile Server, configure OTA deployment and alarm push notifications. BlackBerry: Configure OTA deployment. Configure push notifications. Apple: Configure push notifications. Android: Configure OTA deployment. Configure push notifications. "Configure BlackBerry OTA and push notifications" on page 43. "Configuring Apple push notifications" on page 45. "Configure Android OTA and push notifications" on page 48. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 32

49 Encrypt communication Encrypt communication You can encrypt communication and user information between Security Center Mobile components. Video data cannot be encrypted. NOTES You cannot use HTTPS connection on port 80. The port number must be changed. The shortcut to Mobile Admin in your Windows start menu will not work if you use HTTPS. You ll need to type the Mobile Admin s URL into your browser manually. For more information, see "Log on to Mobile Admin" on page 26. This section includes the following topics: "Encryption prerequisites" on page 33 "Select a Mobile Server SSL certificate" on page 34 "Create a test SSL certificate" on page 34 "Reassign an HTTP port to HTTPS" on page 35 Encryption prerequisites Make sure you have as least one SSL certificate installed on the Mobile Server computer. For more information, contact your IT department. If you do not have an SSL certificate installed, you can generate a test SSL certificate that allows you to connect using HTTPS. See "Create a test SSL certificate" on page 34. If you re using Android OTA deployment with HTTPS, then you ll need an SSL certificate issued by a trusted certificate authority to download the Mobile app. Self-signed certificates will not work for OTA deployment over HTTPS. For more information, see "Configure Android OTA and push notifications" on page 48. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 33

50 Encrypt communication Select a Mobile Server SSL certificate To encrypt communication between Security Center Mobile components, you must bind at least one valid SSL certificate on your Mobile Server computer to your IP port. To bind the SSL certificate to your IP port, you need to select it in Mobile Admin SSL certificates page. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click SSL certificates. The SSL certificates page appears. 3 From the list of displayed certificates, select the certificate you want to use. NOTE If there are no ports using HTTPS, click Clear selection. 4 Click Apply. The Mobile Admin SSL certificates page also provides the following information: State. Indicates whether or not the certificate is valid. Ports. Indicates which ports are currently using HTTPS. Create a test SSL certificate You can create a test SSL certificate that allows you to connect using HTTPS. This certificate is not a valid SSL certificate, and is only intended for testing purposes. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click SSL certificates. The SSL certificates page appears. 3 Click Generate test certificate. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 34

51 Encrypt communication When you attempt to log on using this certificate, you will receive the following message: 4 Click Continue to this Website (not recommended) to logon with your test certificate. Reassign an HTTP port to HTTPS If you want to use the HTTP port number you are currently using (for example, port 8080) as the HTTPS port number, you can reassign the port. 1 Log on to Mobile Admin. 2 Open the Mobile Admin page where you want to change the port number. EXAMPLE Click the Mobile Server administration page. 3 In the Port field, type a different port number (for example, 8081). 4 Clear the Use HTTPS option, and then click Apply. 5 In the Port field, type the number that you were previously using for HTTP (8080 in this example). 6 Select the Use HTTPS option, and then click Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 35

52 Configure Mobile Server administration settings Configure Mobile Server administration settings From the Mobile Admin Mobile Server administration page, you can configure the Mobile Admin port, user name, and password. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Mobile Server administration. The Mobile Server administration page appears. 3 Configure the following: Port. Specify the Mobile Admin port. The default is 80. Use HTTPS. Select to encrypt communications between the Mobile Admin and Mobile Server. For information about encrypting communications, see "Encrypt communication" on page 33. Username. Mobile Admin username. Change password. Select if you want to change the logon password. New password. Type new password. NOTE Once you create a password, you will always require a password to log on to Mobile Admin. Confirm new password. Retype new password. 4 Click Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 36

53 Configure connection settings to Security Center Configure connection settings to Security Center From the Mobile Admin Security Center page, you can configure the Security Center connection settings. Before you begin: You ll need the Security Center Server Admin password of the main server. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Security Center. The Security Center page appears. 3 Configure the following: Directory. Specify the Security Center Directory IP address or hostname. Password. Specify the Security Center Server Admin password of the main server. Port. Specify the port that you want to use to connect to Security Center. The State field indicates if you are connected to Security Center. 4 Click Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 37

54 Configure Web Client connections Configure Web Client connections From the Mobile Admin Web Client administration page, you can configure the connection ports between Mobile Server and Web Clients. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Web Client administration. The Web Client administration page appears. 3 Configure the following Web Client administration settings: Port. Specify the port that you want to use to connect to Security Center Mobile Server. Use HTTPS. Select to encrypt communications (user information and configuration) between Mobile Server and Security Center Web Clients. For information about encrypting communications, see "Encrypt communication" on page 33. The State field indicates if the port is open and if it can be used with HTTP (default) or HTTPS. 4 (Optional) To test the connection to Web Client, click Test link. 5 Configure the following options: Integrator logo (optional). Select a logo to appear on all Web Client Web pages next to the Genetec logo. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 38

55 Configure Web Client connections Upload integrator logo (optional). The uploaded image must be in.png format. NOTE You cannot change the size of the uploaded image. Maximum number of results. The maximum number of report results you can have for each Web Client task. NOTE You can have a maximum of 2000 report results. 6 Click Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 39

56 Configure Mobile app connections Configure Mobile app connections To set up the connection between Mobile Server and Mobile apps, you need to configure the main communication port and the video port from the Mobile Admin Mobile Connectivity page. The main port can use HTTP or HTTPS connection. The video port can only use HTTP. 1 "Log on to Mobile Admin" on page In the Configuration section of the Mobile Admin Home page, click Mobile Connectivity. The Mobile Connectivity page appears. 3 Configure the port settings for the main communication port between Mobile Server and Mobile apps: Main port. Specify the main communication port. Use HTTPS. Select to encrypt communications (user information and configuration) between Mobile Server and Mobile apps. For information about encrypting co mm i nu cations, see "Encrypt communication" on page 33. The State field indicates if the port is open and if it can be used with HTTP (default) or HTTPS. 4 To verify that the main port is open, click Test link. 5 Configure the port settings for video streaming from Mobile Server to Mobile apps: Video port. Specify the port that will stream video. The State field indicates if the port is open. 6 To verify that the video port is open, click Test link. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 40

57 Configure video usage 7 In the Session timeout (seconds) field, specify how long a user can remain inactive before being logged out of the mobile application. 8 Click Apply. Configure video usage To maximize your video streaming performance from Security Center Mobile client components, configure the video usage settings from the Mobile Admin Video usage page. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Video usage. The Video usage page appears. 3 Configure the video usage settings: Video stream timeout (minutes). Specify how long Mobile apps and Web Clients can continuously stream video before the stream is stopped by the server. If you select None, video streaming will continue indefinitely unless stopped by the user, if the device loses connection, or the mobile device enters sleep mode. Maximum number of concurrent video streams. Specify the number of cameras that can be monitored at the same time for all connected Mobile apps and Web Clients. If you select None, then you can monitor an unlimited number of cameras, depending on the CPU power available on the Mobile Server. Maximum number of frames per second. Specify the maximum frame rate when monitoring video with a Mobile app or Web Client. NOTE The default is 8 frames per second. The maximum is 12 frames per second. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 41

58 Configure video usage 4 Click Apply. After you are done: The camera video streams set up for remote usage must be configured in Security Center Config Tool. Set the stream usage to Remote. Set the resolution to approximately 320x240. The frame rate value should be approximately the same as the Maximum number of frames per second setting configured in Step 3. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 42

59 Configure BlackBerry OTA and push notifications Configure BlackBerry OTA and push notifications From the Mobile Admin BlackBerry page, you configure BlackBerry OTA deployment and the BES push notification ports. OTA deployment (Over the air deployment) allows Security Center Mobile users to download the Mobile app directly from their mobile device, over the air. Push notifications allow alarms from Security Center to be pushed to mobile devices. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click BlackBerry. 3 Configure the BlackBerry OTA settings: Port. Specify the port for OTA deployment between Mobile Server and BlackBerry Mobile apps. Use HTTPS. Select to encrypt communications between Mobile Server and Mobile apps (port 80 cannot be used for HTTPS). For information about encrypting co mm i nu cations, see "Encrypt communication" on page 33. Virtual folder name. Type the name of the folder that contains the BlackBerry application files. Only alpha-numeric characters are allowed. NOTE The path to the application on the server appears in Server local folder path field. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 43

60 Configure BlackBerry OTA and push notifications The State field indicates if the port is open, and if it can be used with HTTP (default) or HTTPS. 4 To verify that the link to the virtual folder works, click Test link. This is the link used by users to install Mobile app using OTA deployment. 5 Configure the BES push notification settings: Enable. Select to allow push alarm notifications between Mobile Server and the BES. BlackBerry Enterprise Server address. Specify the BES Web address. BlackBerry push listening port. Specify the port on BlackBerry Mobile apps dedicated to listening for push alarm notifications. NOTE This port should only be changed if your BlackBerry device is already using port 100 for another application. The State field indicates if the listening port is open. A warning state indicates that the BES cannot push the notification to some devices. 6 Click Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 44

61 Configuring Apple push notifications Configuring Apple push notifications This section explains how to configure the Apple push notifications. This section includes the following topics: "About the Genetec feedback server" on page 45 "Configure Apple push notifications" on page 46 "Apple push certificate expiry" on page 47 About the Genetec feedback server To use the Apple Push Notification Service (APNs), Apple requires Genetec to maintain a centralized feedback server. To receive Apple push notifications on Mobile app devices, the Mobile Server must connected to the Genetec feedback server. The connection between Mobile Server and the Genetec feedback server is configured by default. You can check the connection status from the Mobile Admin Apple page. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 45

62 Configuring Apple push notifications Configure Apple push notifications Push notifications allow alarms from Security center to be pushed to mobile devices. When the Mobile Server sends a push notification, it first verifies that the mobile device user has logged on to the Mobile app within the last seven days. If the user has not logged on in the last seven days, push notifications are disabled for that user, and an is sent from Security Center informing the user of the issue. Push notifications are re-enabled automatically the next time the user logs on. CAUTION Genetec does not control the performance of the Apple Push Notification Service. As a result, delivery of critical alarms is dependent on any restrictions applied to the service by Apple. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Apple. The Apple Push notifications page appears. 3 Select Enable to turn on push notifications to Apple Mobile apps. 4 Click Apply. The Apple push notification page also provides the following information: State. Validates that Mobile Server can establish a secure connection to Gateway.push.apple.com port Apple push certificate state. Validates the Apple Push Notification certificate. This certificate is installed when you install Mobile Server. Genetec feedback service. Ensures that push notifications are sent to Apple devices that have Security Center Mobile installed. It is required to comply with Apple's terms and conditions regarding the Apple Push Notification Service. If you see Warning in this field, it means that the feedback service is unable to contact Genetec, and you should contact Genetec Technical Support immediately. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 46

63 Configuring Apple push notifications To contact Technical support, see "Technical support" on page iv. Server firewall. The firewall protecting the Mobile Server. Wi-Fi firewall devices. The firewall protecting the WiFi network used by mobile devices. Apple push certificate expiry Apple generates push certificates that are valid for one year. Approximately one month before your Apple push certificate expires, the Mobile app attempts to download a new certificate from Genetec. If the client is unable to download a new certificate, the certificate will expire, and the State field will display the following message: Apple push certificate expired on x. If this occurs, make sure that your firewall settings allow the server to contact downloads.genetec.com. If the server is still unable to download a new certificate, contact Genetec Technical Assistance. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 47

64 Configure Android OTA and push notifications Configure Android OTA and push notifications From the Mobile Admin Android page, you can configure Android OTA deployment and push notification ports. OTA deployment (Over the air deployment) allows Security Center Mobile users to download the Mobile app directly from their mobile device, over the air. Push notifications allow alarms from Security Center to be pushed to mobile devices. CAUTION Genetec does not control the performance of the Android C2DM (Cloud to Device Messaging) framework. As a result, delivery of critical alarms is dependent on any restrictions applied to the service by Android. In addition, the C2DM service is in a beta phase, and therefore Genetec cannot guarantee its performance. 1 Log on to Mobile Admin. 2 In the Configuration section of the Mobile Admin Home page, click Android. The Android page appears. 3 Configure the Android OTA settings: Port. Specify the port for OTA deployment between Mobile Server and Android Mobile apps. Use HTTPS. Select to encrypt communications between Mobile Server and Mobile apps (port 80 cannot be used for HTTPS). For information about encrypting co mm i nu cations, see "Encrypt communication" on page 33. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 48

65 Configure Android OTA and push notifications Virtual folder name. Type the name of the folder that contains the Android application files. Only alpha-numeric characters are allowed. The path to the application on the server appears in Server local folder path field. The State field indicates if the port is open, and if it can be used with HTTP (default) or HTTPS. 4 To verify that the link to the virtual folder works, click Test link. This is the link used by users to install Mobile app using OTA deployment. 5 To allow push alarm notifications between Mobile Server and the Android server, select Enable. 6 Click Apply. The Apple push notification page also provides the following information: State. Validates that Mobile Server can establish a secure connection to the Android server. Server firewall. The firewall protecting the Mobile Server. Wi-Fi firewall devices. The firewall protecting the WiFi network used by mobile devices. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 49

66 5 Monitoring the Security Center Mobile System This section explains how to monitor your Security Center Mobile system connections, current video stream information, and so on, using Mobile Admin. This section includes the following topics: "Monitoring Mobile app sessions" on page 51 "Monitoring Web Client sessions" on page 53 "Monitoring video" on page 54 "Monitoring doors" on page 56 "Monitoring mobile devices" on page 57 "Monitoring ports" on page 58 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 50

67 Monitoring Mobile app sessions Monitoring Mobile app sessions From the Mobile Admin Mobile app sessions page, you can monitor the Mobile app user connections to your Security Center Mobile system. The top of the page displays the total number of Mobile app sessions at that point in time. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Mobile app sessions. The Mobile app sessions page appears. 3 The Mobile app sessions page lists the following information about each Mobile app user connection: Username. Mobile app username. Sessions. The number of sessions the user is logged onto. 4 The Mobile app sessions page lists the following information about each active Mobile app session: Username. Mobile app username. Last access. The last time the Mobile app accessed the Security Center Mobile system. Device model. Product model name. Name. Mobile device name. Client version. Mobile app version running on the device. Client IP. IP address of the mobile device. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 51

68 Monitoring Mobile app sessions Force a user logoff If you need to log a user off their Mobile app or Web Client session (for example, if you need to change some of the configuration settings for that Security Center Mobile client component), you can force a user logoff. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Web Client sessions or Mobile app sessions. 3 In the first column in the user accounts table, click Delete. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 52

69 Monitoring Web Client sessions Monitoring Web Client sessions From the Mobile Admin Web Client sessions page, you can monitor the Web Client user connections to your Security Center Mobile system. The top of the page displays the total number of Web Client sessions at that point in time. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Web Client sessions. The Web Client sessions page appears. 3 The Web Client sessions page lists the following information about each Web Client user connection: Username. Web Client username. Sessions. The number of sessions the user is logged onto. 4 The Web Client sessions page lists the following information about each active Web Client session: Username. Web Client username. Browser. The Web browser type the user is logged in from. IP addresses. The computer IP address the user is logged in from. Created on. The date and time the user logged on to Web Client. Last access. The last time the Web Client accessed the Security Center Mobile system. From the Web Client sessions page you can also force a user log off. See "Force a user logoff " on page 52. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 53

70 Monitoring video Monitoring video From the Mobile Admin Videos page, you can monitor the video streams to your Security Center Mobile systems. The top of the page displays the total number of video streams at that point in time. NOTE If you lose connection to the video stream on the server side, your mobile device displays an error message. Android devices may take longer (up to two minutes) than Apple or BlackBerry devices to display a message. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Videos. The Videos page appears. 3 The Videos section lists the following information about each camera currently streaming video to Mobile users: Camera name. The name of the camera in the Security Center or federated Omnicast system. Connection state. The following status is displayed: Starting. Trying to connect to Security Center or Omnicast. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 54

71 Monitoring video Connected (waiting for video stream). Connected to Security Center or Omnicast and waiting for the video stream. Streaming. Video content is being sent to connected devices. Closed. Closing connection because the are no mobile devices monitoring this camera. Clients connected. The number of Mobile apps and Web Clients viewing the camera video stream. fps. The current inbound stream 1 frame rate. KB/s. The current inbound stream 1 bandwidth. 4 The Clients section the following information about each Security Center Mobile application connected: User name. Security Center Mobile application user name. fps. The current outbound stream 2 frame rate. KB/s. The current outbound stream 2 bandwidth. Camera name. The name of the camera in the Security Center or federated Omnicast system. 1. The inbound stream is the video stream received by the Mobile Server. 2. The outbound stream is the video stream send from the Mobile Server to Mobile apps and Web Clients. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 55

72 Monitoring doors Monitoring doors From the Mobile Admin Doors page, you can monitor the access points (doors and elevators) streamed to your Security Center Mobile system, as well as any camera streams associated with those access points. The top of the page displays the total number of doors/ elevators being monitored at that point in time. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Doors. The Doors page appears. 3 The Doors page lists the following information about each user connection: Door name. The name of the door in the Security Center system. Clients connected. The number ofmobile apps monitoring the door. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 56

73 Monitoring mobile devices Monitoring mobile devices From the Mobile Admin Mobile devices page, you can monitor the user connections to your Security Center Mobile system. The top of the page displays the total number of devices that are connected to the Mobile Server. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Mobile devices. The Mobile devices page appears. 3 The Mobile device page lists the following information about each user connection. Click any of the column headings to sort the list alphabetically by that heading: Name. Name assigned to the mobile device. Username. The last user log on name for the device. Device model. The product model name. Notification. Indicates if the server has push notifications enabled on that device. NOTE Any Apple or Android devices with disabled push notifications are displayed in yellow. Phone number. The device phone number. Apple phone numbers are never displayed, and are listed as Not available. BlackBerry users can specify whether or not to display their phone numbers. If they choose not to display their numbers, the BlackBerry device shows Unknown Number to applications accessing it. This message is set by BlackBerry and cannot be changed. OS version. The operating system used by the device. Client version. The Mobile app version running on the device. Last logon. The last time the user logged on. Last notification. The last push notification sent to the device. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 57

74 Monitoring ports Delete mobile devices Monitoring ports If you need to remove a mobile device from the Mobile Server (for example, if you want to use your mobile device on a different server), you can delete that device so that push notifications are no longer sent to the device. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Mobile devices. 3 On the Mobile devices page, in the device row, click Delete. From the Mobile Admin Ports page, you can monitor the port connections to Mobile Server. 1 Log on to Mobile Admin. 2 In the Monitoring section of the Mobile Admin Home page, click Ports. The Ports page appears. 3 The Ports page lists the following information about each port connection: Name. Name of the port connection. Port. Port number. Use HTTPS. Select to encrypt communications (user information and configuration) between Mobile Server and the application or device. State. Indicates if the port is open and if it can be used with HTTP (default) or HTTPS. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 58

75 Part III Security Center Web Client This section takes you on a tour of the Web Client interface. It also explains how to configure and use the Web Client. This part includes the following chapters: Chapter 6, "Getting started with Web Client" on page 60 Chapter 7, "Web Client administration tasks" on page 79 Chapter 8, "Web Client operation tasks" on page 102 Chapter 9, "Introduction to Web Client reporting tasks" on page 117 Chapter 10, "Web Client common investigation tasks" on page 122 Chapter 11, "Web Client access control investigation tasks" on page 128 Chapter 12, "Web Client intrusion detection investigation tasks" on page 142 Chapter 13, "Web Client LPR investigation tasks" on page 145 Chapter 14, "Web Client maintenance tasks" on page 155

76 6 Getting started with Web Client This chapter provides an overview of Security Center Web Client. You ll learn how to log on and log off the application, and how to navigate the applications user interface. This section includes the following topics: "What is Web Client" on page 61 "Log on to Web Client" on page 62 "Log off from Web Client" on page 62 "Web Client interface tour" on page 63 "Understanding tasks" on page 70 "Working with Web Client" on page 73 "Working with entities" on page 74 "Working with the dashboard" on page 76 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 60

77 What is Web Client What is Web Client Security Center Web Client is the client component of Security Center Mobile that provides Security Center features from a computer or tablet, through a Web browser. Web Client users connect to Mobile Server to configure and monitor their Security Center system with no installation required. NOTE Before using Web Client, make sure you have the required prerequisites. See "Security Center Mobile prerequisites" on page 7. You can use Web Client to do the following: Monitor your Security Center system from a computer or tablet, through a Web browser. Create and manage Security Center users. Create and manage access control entities, such as cardholders, cardholder groups, visitors, credentials, and access rules. Create and manage license plate recognition (LPR) hotlists. Modify logical entities, such as areas and doors. Control PTZ cameras, as well as trigger video recording. Generate access control, intrusion detection, and LPR investigation reports. Generate various configuration and maintenance reports. Generate investigation and maintenance reports Customize report results Print reports Export reports in.csv format. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 61

78 Log on to Web Client Log on to Web Client You can log on to Web Client using a variety of Web browsers. For a list of supported Web browsers, see "Web Client software requirements" on page 13. Before you begin: To log on to the Web Client, you ll need to know the IP address or hostname of the Mobile Server computer. 1 Open a Web browser, and in the address bar, type <<http or https>>://<<mobile Server computer IP address or host name>>/webclient. TIP If you want log on to Web Client in another language, you can type <<http or https>>://<<mobile Server computer IP address or hostname>>/webclient/ LogOn?Language=<<Fr, ES, IT, or NL>>. The Web Client log on page appears. 2 In the log on page, type your User name and Password. If you do not know your username and password, contact your system administrator. 3 If you want to change the Web Client language from the log on page, click the dropdown list, and select your preferred language. 4 Click Log on. The Web Client Home page appears. Log off from Web Client You are automatically logged off Web Client after twenty minutes of inactivity. In the top-left corner of the Web Client Web pages, click Log off. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 62

79 Web Client interface tour Web Client interface tour A This section takes you on a tour of the main areas of the Web Client user interface. B C D E A Taskbar. Using the taskbar buttons, you can return to the Home page, log off from Web Client, view your software copyright information, and open the Security Center Mobile online help. B Operation tasks. For more information, see "Operation tasks workspace" on page 66. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 63

80 Web Client interface tour C Investigation tasks. For more information, see "Reporting tasks workspace" on page 67. D Administration tasks. For for information, see "Administration task workspace" on page 65. E Maintenance tasks. For more information, see "Reporting tasks workspace" on page 67. Task workspaces Web Client is designed to let you work with tasks. Tasks are workspaces, or Web pages dedicated to a specific security need. For example, if you want to perform live monitoring of cameras, you will use the Monitoring task. If you want to edit LPR hotlists, you will use the Hotlist editor task. If you want to see which cardholders are in which areas of the office, you will use the Area presence task. And so on. In this section we look at the workspaces used for tasks. There are four types of tasks available in the Security Desk: Administration. See "Administration task workspace" on page 65. Operation tasks. See "Operation tasks workspace" on page 66. Investigation tasks. See "Reporting tasks workspace" on page 67. Maintenance tasks. See"Reporting tasks workspace" on page 67. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 64

81 Web Client interface tour Administration task workspace A B C Administration tasks are used to create and configure the entities required to model your system. This section describes the common workspace elements shared by all administration tasks. D E F G H I J A Taskbar. See "Task workspaces" on page 64. B C D E F G Entity views. You ll typically find one view for each entity type managed by the task. Entity filter. Type a string in this field, and click name. to filter the entities in the browser by Entity browser. Click an entity in the browser to show its settings on the right. The selected entity is highlighted in blue. Configuration tabs. The entity settings are grouped by tabs. The first tab, named Properties, is found in all entity types. Current task (LPR task shown). Configuration page. This area displays the entity settings under the selected configuration tab. (Note that the settings on this page have been removed to un-clutter the screen shot.) genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 65

82 Web Client interface tour H I J You must Undo or Save any change you make on the current page before you can move to a different page. Show, hide, or expand the selector pane. Add an entity, or Delete the selected entity. Operation tasks workspace Operation tasks are used for the day to day operation of your security system. They allow you to do things like perform live monitoring of cameras, or manage cardholders, visitors and LPR hotlists. This section describes the common operation task workspace elements. There are three main parts to the task interface: the selector, the report pane and the canvas. The Monitoring task is the only operation task that uses the canvas. The other operation tasks use the selector and report pane. Selector The selector is a pane in the task workspace where you can find and select the entities you want to work with. The selector can be hidden or expanded (select Hide or Expand from the drop-down list at the bottom of the Web page). Report pane The report pane is used to display information in the form of a table. The rows may correspond to query results or real-time events. The information can appear as text or graphics (cardholder picture, event timestamp, thumbnails, and so on). You can change the look of the report by: Adjusting the column widths. Selecting which columns to show or hide. Re-ordering the columns. Sorting the rows based on the values of one column. Canvas The canvas is the pane is used by the Monitoring task to view video. The canvas contains two panels: Tiles. This is the main panel within the canvas, and the only one that cannot be hidden. You can view cameras in four tiles simultaneously, or expand one tile by clicking the Expand ( ) button in the dashboard. Dashboard. The dashboard contains the widgets (commands and status information) associated to the camera displayed in the current tile (highlighted with a yellow border). You can show or hide the dashboard by clicking at the bottom of the Web page. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 66

83 Web Client interface tour Reporting tasks workspace Reporting tasks allow you to generate reports based on custom queries, for investigation or maintenance purposes. Most reporting tasks use a selector pane to set up the query filters and a report pane to display the results. A B C D E F G H I J A Selector pane. Shows all the query filters. B Query filters. Click on a filter heading to turn it on ( ). A red background indicates an invalid filter. C D E F G H Column headings. Click a column heading to sort the report by this column. Each click toggles between ascending and descending order. Current task (Alarm report shown). Report pane. All query results are listed in the report pane. (Note that the report results on this page have been removed to un-clutter the screen shot.) Number of returned rows. If there are multiple pages of results, you can switch pages, and select how many results to display on each page. Contextual commands. Commands pertaining to the report are displayed in the toolbar at the bottom of the workspace. See "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. I Click Clear filters ( ) to clear all query filters. Some of them may become invalid. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 67

84 Web Client interface tour J Generate report. Click this button to generate the report. This button is disabled when you have invalid filters. For more information, see "Generating a report" on page 119. Customizing your report There are many ways you can customize the look of your report. To show or hide columns: 1 At the bottom of the report pane, click Select. A dialog box showing all available columns for your report appears. 2 Select the columns you want to show, and clear the columns you want to hide. 3 Click OK. To change the column order: 1 Click and hold a column heading, and drag it to the desired position. 2 Repeat with all the columns you want to move. To change the column width: Do one of the following: If you are using a tablet: i At the bottom of the report pane, tap Select. ii In the Select dialog box, select a column. iii Using the Width arrows, tap to increase the column width, and tap to decrease the width. iv Tap OK. If you are using a computer: Click between two column headings, and drag the separator to the right or left. To sort the rows: Only reports containing query results can be sorted. To sort the report according to one of its columns, click on a column heading. The column used for the sort is indicated by a triangle in the column heading. Clicking the same column heading a second time sorts the report in the reverse order of that column. To save the column layout: If you are logged on as an administrator, you can save the column layout for each reporting task. At the bottom of the report pane, click Save. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 68

85 Web Client interface tour Print and export your report To print your report: 1 At the bottom of the report pane, click Print. A print preview Web page opens. 2 From the browser s menu bar, select Print, and continue with your computer s print process. To export your report to a.csv file: 1 At the bottom of the report pane, click Export. A dialog box showing all available file format appears. 2 Select the destination and file name, and click Save. NOTE Images are not exported. Contextual commands toolbar The commands pertaining to the selected task are displayed at the bottom of the Web page, in the contextual commands toolbar. The following table describes all the commands in alphabetical order. Button Applies to Description Add Delete Administration and operation tasks Administration and operation tasks Create an entity. Delete the selected entity from the system. You cannot delete federated entities. Export Reporting tasks Export the report in.csv format. Modify Operation tasks Modify the selected entity. Print Reporting tasks Print the report. Save Administration tasks Save the configuration changes you made to an entity. Save Reporting tasks Only if you are logged on as Administrator: Save the column layout for the next time a Web Client user opens that reporting task. Select Operation and reporting tasks Select which columns to show in the report pane. Undo Administration tasks Cancel your configuration changes. View video Reporting tasks View live video associated with the select entity. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 69

86 Understanding tasks Understanding tasks Task categories Each Web Client task corresponds to one aspect of your work as a security professional. For example, use a Monitoring task to monitor cameras in real-time, or an investigation task to search for information about entities. All tasks can be customized. This section includes the following topics: "Task categories" on page 70 "Supported tasks" on page 71 Tasks are organized into four categories in Web Client: Administration. Tasks used to create and configure the entities required to model your system. These tasks area only available if you are logged on as an administrator. For more information, see Chapter 7, Web Client administration tasks on page 79. Operation. Tasks related to day-to-day security operations. For more information, see Chapter 8, Web Client operation tasks on page 102. Investigation. Tasks allowing you to query the Security Center database, and those of federated systems, for critical information. For more information, see Chapter 9, Introduction to Web Client reporting tasks on page 117. Maintenance. Tasks related to maintenance and troubleshooting. For more information, see Chapter 14, Web Client maintenance tasks on page These tasks can be launched from the Home page. Tasks that are not supported by your Security Center Mobile license are hidden from your Home page. Under each major category, the tasks are further divided as follows: Common tasks. Tasks that are shared by all three Security Center software modules (Omnicast, AutoVu, and Synergis). These tasks are always available regardless of which modules are supported by your software license. Access control. Tasks pertaining to access control. This subcategory is only available if Synergis is supported by your software license. Intrusion detection. Tasks pertaining to the management of intrusion detection areas and units. LPR. Tasks pertaining to license plate recognition. This subcategory is only available if AutoVu is supported by your software license. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 70

87 Understanding tasks Supported tasks The Web Client in Security Center Mobile 3.0 GA supports the following task types. Administration Common tasks. "Logical view" on page 81 "Security" on page 87 Access control. LPR. "Access control" on page 90 "LPR" on page 97 Operation Common tasks. "Monitoring task" on page 103 Access control. LPR. "Cardholder management" on page 105 "Visitor management" on page 110 "Hotlist editor" on page 115 Investigation Common tasks. "Alarm report" on page 123 "Zone activities report" on page 126 Access control. "Area activities report" on page 129 "Cardholder activities report" on page 131 "Door activities report" on page 134 "Visitor activities report" on page 137 "Area presence report" on page 140 Intrusion detection. LPR. "Intrusion detection area activities report" on page 143 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 71

88 Understanding tasks Reads "Hits report" on page 146 "Daily usage per Patroller report" on page 151 "Logons per Patroller report" on page 153 "Reads/hits per day" on page 154 Maintenance Access control. "Cardholder configuration" on page 156 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 72

89 Working with Web Client Working with Web Client This section provides useful information for using Web Client. This section includes the following topics: "About the Web Client time zone" on page 73 "Refreshing Web Client Web pages" on page 73 "Using Web Client on a touchscreen" on page 73 About the Web Client time zone The time displayed in Web Client is the local time zone of Mobile Server. Refreshing Web Client Web pages IMPORTANT The Web Client uses static Web pages. To receive updated information from Mobile Server, and to see the updated status of entities in the selector pane, you must manually refresh your Web browser pages. To refresh Mobile Admin Web pages: Click the Refresh button on your browser. Using Web Client on a touchscreen Since Web Client can be used on a computer or tablet that is equipped with touch screen capabilities, it is optimized to work with touch screen commands. For example, you can tap buttons instead of clicking, and swipe the screen instead of scrolling. Refer to your mobile device manufacturer documentation for supported touchscreen features. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 73

90 Working with entities Working with entities Creating entities Everything that requires configuration in Security Center Mobile is represented by an entity. Entities are the basic building blocks of Security Center. An entity can represent a physical device, such as a camera or a door, or an abstract concept, such as an area, a user, or an access rule. Configuring your system is about creating and configuring the entities required to model your system. This section includes the following topics: "Creating entities" on page 74 "Searching for entities" on page 75 "Delete an entity" on page 75 As the basic building blocks of Security Center Mobile, most entities must be created manually. For more information about creating entities, see the following sections: "Create a user" on page 89 "Create an access rule" on page 92 "Create a cardholder group" on page 94 "Create a credential" on page 96 "Create a hotlist" on page 100 "Create a cardholder" on page 107 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 74

91 Working with entities Searching for entities Delete an entity There are two ways you can search for, and display entities in Web Client. "Basic name search" on page 75 "Advanced search" on page 75 Basic name search You can reduce the number of entities listed in any task by applying a name filter. In the selector pane of any task, type a string in the Search field, and click. All entities with names containing the search string are listed. To clear the name filter: Clear the string in the Search field, and click. Advanced search The advanced search is a context sensitive entity search tool where you can apply a set of filters (depending on the context) to quickly find the entities you need for the task at hand. 1 From the Advanced search drop-down list at the bottom of a task window, select Show to show the advanced search filters. 2 Click on a filter heading to activate it. A filter is automatically turned off when the heading is closed. For more information, see "Common query filters" on page Click Search to start the search, or to clear the filters all at once. You can delete entities that you have manually created. 1 Select the entity in the browser. 2 In the contextual commands toolbar, click Delete ( ). 3 In the confirmation dialog box that appears, click Yes. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 75

92 Working with the dashboard Working with the dashboard Camera widget The dashboard in the Monitoring task contains widget commands pertaining to the current tile and the camera type it displays. This section includes the following topics: "Camera widget" on page 76 "PTZ widget" on page 77 "Tile widget" on page 78 The Camera widget appears in the dashboard when the currently selected tile is displaying a camera. NOTE The camera recording state button is not updated live in Web Client. Button Description Camera recording disabled by the Web Client user. Click to start recording. (Solid red) Camera recording enabled by the Web Client user. Click to stop recording. Camera not currently recording. Controlled by system configuration. Users cannot click to start recording. Camera currently recording. Controlled by system configuration, Users cannot click to stop recording. Add a bookmark. Click to add a bookmark. See "Add a bookmark" on page 104. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 76

93 Working with the dashboard PTZ widget The PTZ widget is used to perform pan, tilt, and zoom operations on the displayed camera. It appears in the dashboard automatically when the selected tile is displaying a PTZ camera. PTZ mode commands The PTZ mode is only available when viewing live video from a PTZ camera ( ). IMPORTANT Not all PTZ cameras support all PTZ commands. If one or more of the PTZ buttons are not displayed, it means that the PTZ camera you are working with does not support that command. A B C D E F A Eight direction arrows for PTZ motor control B Adjust speed of the PTZ motor C Zoom in and zoom out commands (+ and -) D Quick access buttons for the first eight presets Go to PTZ home (default) position Flip PTZ motor 180 degrees E F Choice of preset slot (drop-down menu) Choice of pattern/tour slot (drop-down menu) genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 77

94 Working with the dashboard Go to preset position Start PTZ pattern (tour). Click any preset or PTZ button to stop the pattern. Tile widget The Tile widget controls the properties of the current tile. It is always shown in the dashboard. The Tile widget commands are described below: Button Command Description Expand Clear Make the current tile fill the canvas. Hide all other tiles. Empty the current tile. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 78

95 7 Web Client administration tasks This section lists all Web Client administration tasks in the order they appear in the Home page. Each task is covered with a short description, and when applicable, a short description for each of its configuration groupings. NOTE You can only use administration tasks if you are logged in as an administrator. This section includes the following topics: "Common configuration tabs" on page 80 "Logical view" on page 81 "Security" on page 87 "Access control" on page 90 "LPR" on page 97 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 79

96 Common configuration tabs Common configuration tabs The custom fields tab is commonly used by the majority of entities in the system. For this configuration tab, we will only describe it in this section. Custom fields The Custom fields tab lets you view and modify the custom fields defined for this entity. The sample screen shot below is that of a cardholder group entity. In the above example, three custom fields have been defined for the cardholder group. Group type (flagged as mandatory) Link to Photo genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 80

97 Logical view Logical view The Logical view task allows you to configure areas and doors and organize them according to their logical relationships. Areas are used as logical groupings for other types of entities. Each area may represent a concept or a physical location. The logical view only has one view, the Logical view. A B C D E F G A See "Task workspaces" on page 64. B Type a string in this field, and click to filter the entities in the browser by name. C D E Currently selected entity (1 st floor). Configuration tabs available for this entity. Click an entity to view its configuration. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 81

98 Logical view F G Undo or Save any change you make. Show, hide, or expand the selector pane. Configure areas The area entity, in its most generic use, represents a concept or a physical location (room, floor, building, site, and so on) used for the logical grouping of entities in the system. When Synergis is enabled in your license, an area entity can also be used to configure a secured area with access rules and access control behavior. Properties Custom fields Access rules Name, description, logical ID, and relationships of this entity with other entities in the system. Custom field values for this area. Access rules applied to this area. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 82

99 Logical view Properties The Properties tab lets you view and configure the area s properties. Name. Entity s given name. The entity name is editable, except in the following case: Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. Partition. Partitions this area is part of. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the areas placed in that partition. To add a partition, click. To remove the area from a partition, select the partition and click. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 83

100 Logical view Access rules The Access rules tab is only necessary if you are configuring a secured area. This tab is only visible when Synergis is enabled in your license. You can assign one or more existing access rules that allow authorized cardholders to gain access to the area, or to exit an area. In the example above, an access rule called access rule 12 is applied to the enter the Office area, and the access rule Office hours is applied to exit the area. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 84

101 Logical view Configure doors The door entity represents a physical barrier. Often, this is an actual door, but it could also be a gate, a turnstile, or any other controllable barrier. Each door has two sides named by default A and B. Each side is an access point (entrance or exit) to a secured area. Properties Custom fields Access rules Name, description, logical ID, and relationships of this entity with other entities in the system. Custom field values for this door. Access rules applied to this door. Properties The Properties tab lets you view and configure the door s properties. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 85

102 Logical view Name. Entity s given name. The entity name is editable, except in the following case: Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. Partition. Partitions this door is part of. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the doors placed in that partition. To add a partition, click. To remove the door from a partition, select the partition and click. Access rules The Access rules tab displays the access rules applied to this door. In the example above, an access rule called Lockdown rule is applied to the entry side of the door, but no rule is applied to the Exit side because of a Request to exit device. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 86

103 Security Security The Security task allows you to configure and create users. This section includes the following topics: "Configure users" on page 87 "Create a user" on page 89 Configure users The user entity identifies a person who can use Security Center applications and defines the rights and privileges that person has on the system. Each user is assigned a username and a password, which are that person s credentials to log on to the system. While the user privileges limit the range of activities a user can perform on the system, the partitions limit the range of entities the user can exercise his/her privileges on. A user can be a member of one or more user groups. Users can inherit the privileges and the access rights from their parent user groups. Properties Custom fields User s general profile. Custom field values for this user. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 87

104 Security Properties The Properties tab lets you configure the user s general profile. NOTE The personal information of the user can be imported from your company s directory service. Name. Entity s given name. The entity name is editable, except in the following case: Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. address. address used for automated actions associated to the user. Active. Select to activate or deactivate the user profile. A user cannot log on when their profile is deactivated. Deactivating a user s profile while the user is logged on will immediately log off the user. Password. As an administrator, you can change any user s password by clicking Change password. User groups. List of user groups this user is a member of. To add a user group, click. To remove the user from a group, select the user group and click. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 88

105 Security Partition. Partitions this user has permissions to. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the entities placed in that partition. To add a partition, click. To remove the user from a partition, select the partition and click. Create a user 1 Under Administration in the Web Client Home page, click Security. 2 At the bottom of the selector pane, click Add. 3 In the Creating a new user dialog box, enter the user s properties: Name. The entity name identifies the entity everywhere in the Web Client. You may create two entities with the same name, but it is not recommended. In some cases, a default entity name is created for you, but you can override it. Description (optional). Optional information regarding the entity. address (optional). User s address. Active. Select to activate or deactivate the user profile. A user cannot log on when their profile is deactivated. Deactivating a user s profile while the user is logged on will immediately log off the user. New password. Type a log on password for the user. Confirm password. Re-type the password. Privilege template (optional). Privilege templates are predefined privilege configurations, based on standard security personnel profiles, that you can apply to users and user groups to simplify the creation process. User groups (optional). Configure the user s membership in user groups. To add a user group, click. To remove the user from a group, select the user group and click. Partitions (optional). Select partition rights for the user. To add a partition, click. To remove the user from a partition, select the partition and click. 4 Click Save. The new user account is created. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 89

106 Access control Access control The Access control task allows you to configure the general settings for access control and the related entities such as access rules, cardholders, and credentials, that are not found in the Logical view. This Access control task includes the following views: Access rules Cardholder groups Credentials Lists all access rules in alphabetical order. For more information, see: "Configure access rules" on page 91 "Create an access rule" on page 92. Lists all cardholder groups in alphabetical order. For more information, see: "Configure cardholder groups" on page 93 "Create a cardholder group" on page 94 Lists all credentials in alphabetical order. For more information, see: "Configure credentials" on page 95 "Create a credential" on page 96 To select which entity type to configure: 1 At the top of the selector pane, rest your mouse pointer over the entity type (Cardholder groups by default). A drop-down list appears. 2 Click the entity type you want to configure (Access rules, Cardholders, or Credentials). genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 90

107 Access control Configure access rules The access rule entity defines the access control logic which grants or denies passage to a cardholder through an access point, based on a schedule. Properties Custom fields Type of rule and to who and when this rule applies. Custom field values for this rule. Properties The access rule Properties tab links the 3 W s: The Who, When and What. For example, Who is affected by this rule (which cardholders), When the rule applies (the schedule), and What the rule does (grant or deny access to an area/partition/door). Name. Entity s given name. The entity name is editable, except in the following case: genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 91

108 Access control Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. Schedule. Choose when this access rule is active. When schedule is active. Select whether to grant or deny access from cardholders. Membership. Cardholders affected by this rule. To add a cardholder, click. To remove a cardholder, select the cardholder and click. Partition. Partitions this rule applies to. To add a partition, click. To remove a partition, select the partition and click. NOTE An access rule is not operational until it is associated to a door, elevator, or area. Create an access rule 1 Under Administration in the Web Client Home page, click Access control. 2 At the top of the selector pane, rest your mouse pointer over the entity type (Cardholder groups by default). A drop-down list appears. 3 Click Access rules. 4 At the bottom of the selector pane, click Add. 5 From the Properties tab in the Creating a new access rule dialog box, enter the access rule properties. For a description of access rule properties, see "Properties" on page Click the Custom fields tab, and enter any custom information for the access rule. 7 Click Save. The new access rule is created. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 92

109 Access control Configure cardholder groups The cardholder group entity is used to configure the common access rights and properties of a group of cardholders. Properties Custom fields Cardholder group properties and members. Custom field values for this cardholder group. Properties The Properties tab lets you view and configure the members of this cardholder group, and configure their common properties. Additional information might be found in the Custom fields tab. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 93

110 Access control Name. Entity s given name. The entity name is editable, except in the following case: Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. address. Set an address here for automated actions associated to the group. Group available for visitors. Set this to ON if this group will be used for visitors. Membership. Defines the cardholder group members. Both individual cardholders and other cardholder groups can be members. To add a cardholder, click. To remove a cardholder, select the cardholder and click. Partition. Partitions this cardholder group is a member of. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the entities placed in that partition. To add a partition, click. To remove a partition, select the partition and click. Access rules. Access rules that apply to this cardholder group. NOTE The access rules displayed with a yellow background are inherited and cannot be removed. To add an access rule, click. To remove an access rule, select the access rule and click. Create a cardholder group 1 Under Administration in the Web Client Home page, click Access control. 2 At the bottom of the selector pane, click Add. 3 In the Creating a new cardholder group dialog box, enter the cardholder group properties. For a description of cardholder group properties, see "Properties" on page Click Save. The new cardholder group is created. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 94

111 Access control Configure credentials The credential entity represents a proximity card, a biometrics template, or a PIN required to gain access to a secured area. A credential can only be assigned to one cardholder at a time. Credentials are really claims of identity. A credential distinguishes one cardholder from another. Properties Custom fields Credential information and status. Custom field values for this credential. Properties The Properties tab lets you configure the credential information and status. Additional information might be found in the Custom fields tab. Name. Entity s given name. The entity name is editable, except in the following case: genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 95

112 Access control Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. Credential information. This section identifies the details of the credential itself. If the credential is an access control card, the format, facility code and card number will be shown. This information is read-only. Cardholder. Displays the cardholder this credential is associated with. The cardholder can be changed if required. To assign a cardholder, click. To remove a cardholder, select the cardholder and click. State. This section shows whether the credential status is Active or Inactive/Lost/Stolen/Expired. It also displays the date and time when the credential was attributed to this state. Expiration. An expiration date/time can be set here so the credential expires automatically on a certain date and time. Partition. Partitions this credential is part of. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the credentials placed in that partition. To add a partition, click. To remove a partition, select the partition and click. Create a credential 1 Under Administration in the Web Client Home page, click Access control. 2 At the top of the selector pane, rest your mouse pointer over the entity type (Cardholder groups by default). A drop-down list appears. 3 Click Credentials. 4 At the bottom of the selector pane, click Add. 5 In the Creating a new credential dialog box, enter the credential properties. For a description of credential properties, see "Properties" on page Click Save. The new credential is created. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 96

113 LPR LPR The LPR task allows you to configure the general settings for LPR (license plate recognition) and the related entities such as hotlists, that are not found in the Logical view. Configure hotlists This section includes the following topics: "Configure hotlists" on page 97 "Create a hotlist" on page 100 The hotlist entity defines a list of wanted vehicles. Each vehicle in the list is identified by a license plate number, the license plate issuing state (or province, or country), and the reason why the vehicle is wanted (for example, Stolen, Wanted felon, Amber alert, VIP, and so on). Additional vehicle information can include the model, the color and the vehicle identification number (VIN). Hotlists are used by both the AutoVu Patroller and the AutoVu LPR Manager role to check against license plates captured by LPR units to identify vehicles of interest. The hotlist entity is a type of hit rule. A hit rule is a method used by AutoVu to identify vehicles of interest. When a plate read matches a hit rule, it is called a hit. When a plate read matches a hotlist, it is called a hotlist hit. Properties Custom fields Configure the basic parameters of the hotlist, including: assigning priority to a hotlist, and the location and attributes of the hotlist data file. Custom field values for this hotlist. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 97

114 LPR Properties The Properties tab is where you configure the basic properties of the hotlist (hotlist priority, hotlist path, attributes, and so on). These settings tell Security Center Mobile how to parse the hotlist file into the format required by the Patroller and the LPR Manager to identify plates read by Sharp units. Name. Entity s given name. The entity name is editable, except in the following case: Federated entities. The entity name belongs to the original system and cannot be changed on the federation. Description. Optional descriptive text. Sound file. Choose the sound that is played on Patroller when a hit occurs. If no sound file is entered, Patroller uses the default sound file installed with the application. IMPORTANT For this feature to work, you need to manually copy the sound file to the Patroller computer. Copy the file to C:\Program Files\Genetec AutoVu\Patroller Applications X.X\MobileClient\Config\Sounds. address. Set hotlist hit notifications. When a hotlist hit occurs, Security Center sends an to the address you specify. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 98

115 LPR IMPORTANT For this feature to work, the SMTP configuration must be set up in the Security Center Server Admin and the notification option must switched to ON in the Security Center Config Tool s LPR Manager Options tab. Priority. Choose a hotlist a priority. Zero (0) is the highest priority setting and 100 is the lowest priority setting. This setting is used to resolve conflicts when a plate read matches more than one hotlist, in which case the hotlist with the highest priority is displayed first in the list of hotlist matches. Covert. Set the hotlist to a covert hotlist. When you choose this setting, Patroller users are not alerted when a hit occurs. Only users with sufficient privileges can view covert hotlists in Security Desk. Use wildcards. Indicates that the hotlist database contains wildcards. This setting tells Security Center that the records in that hotlist database only include partial license plate numbers. You can have a maximum of two wildcard characters (asterisk *) in a PlateNumber. Wildcard hotlists are used in situations where witnesses did not see or cannot remember a complete license plate number. This allows the officer to potentially intercept vehicles associated with a crime, which otherwise would not have been detected using standard hotlists. Best practice: If using wildcard hotlist, it is best practice to do the following: Do not use more than one wildcard hotlist per Patroller. Hotlists are applied at the role level. Use only one wildcard hotlist per LPR manager role. Limit the number of entries to a hundred plates. If using wildcard hotlists, please note the following: An asterisk (*) in the data file indicates a wildcard. Only the PlateNumber field accepts wildcard characters. If the asterisk is found in any other field, it is considered as a normal character. The PlateNumber field is limited to two wildcard characters. If you select Use wildcards, Patroller ignores all hotlist entries that do not contain a wildcard and hotlist entries have more than two wildcard characters. It is the number of wildcards in the PlateNumber field, and not the location of the wildcard, that determines how many mismatched characters are allowed before a match can occur. The position of the wildcards cannot be enforced because, typically, when witnesses report a partial plate number, they do not remember the position of the characters they missed. The sequence of the normal characters in the PlateNumber is respected, such that the three patterns S*K3*7, **SK37, and SK37** are equivalent. EXAMPLE If a wildcard hotlist contains the PlateNumber entry S*K3*7: genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 99

116 LPR Plate reads NSK357 and ASDK37 will generate a hit because both reads have no more than two mismatched characters (in red) and the sequence SK37 is respected. Plate read SUKA357, will not generate a hit because it contains three mismatched characters (in red). Plate read SKU573 read will not generate a hit because the sequence of characters SK37 is not found in the read. Partition. Partitions this hotlist is part of. Partitions are logical groupings used to control the visibility of certain entities by certain users on the system. Only users with permission to use a partition can see the hotlists placed in that partition. To add a partition, click. To remove a partition, select the partition and click. LPR Managers. The LPR Manager roles that manage the hotlist. To add an LPR Manager to manage the hotlist, click. To remove an LPR Manager, select the LPR Manager and click. Create a hotlist NOTE For hotlists to be shared between LPR manager roles, all the roles must all be running on the same computer. 1 Under Administration in the Web Client Home page, click LPR. 2 At the bottom of the selector pane, click Add. 3 In the Creating a new hotlist dialog box, enter the credential properties. For a description of hotlist properties, see "Properties" on page In the LPR Managers section, select the LPR Managers to associate the hotlist with. To remove an LPR Manager, select the LPR Manager and click. 5 Select the hotlist Attributes. Attributes tell Security Center the name and order of the fields in the source text file. From the Attributes area, you can add, delete, or edit the data fields (attributes). You can also import the color and sound file from a selected hotlist. Category. (Mandatory field) Reason why a license plate number is wanted. For example: Scofflaw, Stolen, Amber alert, Wanted felon, and so on. When a hit occurs, this field is displayed on the hit screen in Patroller and Security Desk. PlateState. (Mandatory field) Issuing state (or province, or country) of the license plate. Patroller uses the PlateNumber to match against a plate read. When a hit occurs, this field is displayed on the hit screen in Patroller and Security Desk. PlateNumber. (Mandatory field) The license plate number. The following fields are shown by default, but are optional. If there is no start or end date for the hotlist, you can delete these fields, or simply leave them blank. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 100

117 LPR EffectiveDate. Date at which the hotlist starts to be effective. ExpiryDate. Date after which the hotlist is no longer valid. IMPORTANT Please note the following about hotlist attributes. The hotlist text file must include Category, PlateState, and PlateNumber fields. For this reason, these fields already appear in the attribute list and cannot be deleted from the list. There cannot be any spaces within an attribute name. You can have a maximum of two wildcard characters (asterisk *) in a PlateNumber. 6 Click Save. The new hotlist is created. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 101

118 8 Web Client operation tasks Explains how to use operation tasks. This section includes the following topics: "Monitoring task" on page 103 "Cardholder management" on page 105 "Visitor management" on page 110 "Hotlist editor" on page 115 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 102

119 Monitoring task Monitoring task The Monitoring task allows you to monitor cameras in real-time. With the monitoring task, you can do the following: View live video at a resolution of 320x240, with a maximum frame rate of 12 frames per second. Control the entities you are monitoring using the widgets in the dashboard. For more information about using widgets, see "Working with the dashboard" on page 76. Show or hide the dashboard. IMPORTANT On BlackBerry PlayBooks, the Monitoring task must be used in Landscape mode. NOTE The monitoring task window includes many of the common interface elements, including the selector pane, the canvas, and the dashboard. For more information about these common interface elements, see "Web Client interface tour" on page 63. A B C D E F A Type a string in this field, and click to filter the entities in the browser by name. B C Monitor live video in the canvas tiles. Drag camera entities from the selector pane into canvas. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 103

120 Monitoring task D E Use widgets to control the cameras you are monitoring. NOTE The camera recording state button is not updated live. Click to show or hide the dashboard. F Select a camera entity, and click Add to view the camera in a tile. Add a bookmark If you see something worth noting, you can add a bookmark to the video you are viewing. A bookmark is a short text used to mark a specific position in a recorded video sequence that can be used to search for that video sequence at a later time. If a camera is not currently recording, adding a bookmark will force it to begin recording. Bookmarks can be searched when querying video recordings. 1 Click in the camera widget. The following dialog box appears. 2 Type a short text in the Message field. The timestamp of the bookmark is fixed at the Time indicated in the dialog box, when you clicked the Add bookmark button. 3 Click OK to save your bookmark. NOTE When you add a bookmark, recording starts automatically if it is not already doing so. 4 Click Cancel if you decide not to add any bookmark. Adding a blank message does not cancel this action. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 104

121 Cardholder management Cardholder management Cardholder management is an access control task that allows you to create, modify, and delete cardholders, as well as manage their credentials. A B C D E F G A B C D E F G Enter text to find a cardholder by name. Click on a column heading to sort the list by that column s items. Click to select which columns to show in the report pane. Click to view or modify the selected cardholder. Click to delete the selected cardholder. Click to create a new cardholder. Click to show the advanced entity search filters. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 105

122 Cardholder management Cardholder management allows you to: List all information concerning the cardholders: first name, last name, picture, activation date, expiration date, cardholder status, and any custom fields that are defined for cardholders. Choose which columns to display by clicking. Create and delete cardholders. See "Create a cardholder" on page 107. Modify cardholders. See "Modify a cardholder" on page 109. Search for an existing cardholder. See "Finding a cardholder" on page 109. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 106

123 Cardholder management Create a cardholder Best practice: It is a good idea to assign individual cardholders to cardholder groups. This is the best way to grant access rights to cardholders. It is better to have different cardholder groups configured in advance for the different groups of people in your organization. This way, each cardholder s profile does not need to be re-configured in order to change their security settings after they are created. 1 In the Cardholder management task, click Create new cardholder. 2 Enter the cardholder s basic information: first name, last name, address, and description. 3 In the Options area, grant optional access privileges to the cardholder if necessary: Use extended grant time. Grants the cardholder more time to pass through doors where the Extended grant time parameter is configured for a door. Use this option for cardholders with reduced mobility. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 107

124 Cardholder management Bypass antipassback rules. Exempts the cardholder from all antipassback restrictions. These options are only meaningful if the cardholder has been assigned a card credential. 4 Assign a picture to the cardholder. a In the picture area, click. b Select a picture from your computer or tablet, and click Open. All standard image formats are supported. c Click to clear the current picture. NOTES If you are logged on to Web Client from a tablet, you can also take a picture from the tablet s integrated camera. You cannot upload pictures from an ios device. 5 In the State section, set the time when the cardholder profile is to be activated. When the profile is inactive, the credentials assigned to the cardholder will not work. You can activate the cardholder s profile immediately or at an appointed time. You can also set it to expire n days after the first use, at an appointed time, or never. 6 (Optional) In the Credentials section, assign a credential to the cardholder. NOTE If you do not assign a credential, you cannot monitor the activities, or generate activity reports for that cardholder. To assign a credential, click. To remove a credential, select the credential and click. To create a new credential, click. For more information about creating credentials, see "Create a credential" on page 96. To modify an already existing credential, click. For more information about the credential properties you can modify, see "Configure credentials" on page In the Membership area, assign the cardholder to a cardholder group. The cardholder group defines the access rules that apply to the cardholder. For more information, see "Configure cardholder groups" on page 93. To add a cardholder group, click. To remove a cardholder group, select the cardholder group and click. NOTE A cardholder may belong to more than one cardholder group. 8 In the Partition area, assign the cardholder to a partition. The partition defines the users who have access to the cardholder s profile. To add a partition, click. To remove a partition, select the partition and click. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 108

125 Cardholder management Modify a cardholder NOTE A cardholder may belong to more than one partition. 9 In the Access rules section, assign access rules for the cardholder. Access rules define the access control logic which grants or denies passage to a cardholder through an access point, based on a schedule. NOTE The access rules displayed with a yellow background are inherited and cannot be removed. To add an access rule, click. To remove an access rule, select the access rule and click. 10 If custom fields are defined for cardholders, click the Custom fields tab, and enter the cardholder s custom information. 11 Click Save to complete the creation process. 1 In the Cardholder management task, click Modify. 2 In the Editing cardholder dialog box, edit the cardholder properties. The cardholder properties are described in "Create a cardholder" on page 107. NOTE The properties you can edit depend on your user privileges. 3 Click Save. Finding a cardholder Whether you modify or delete an existing cardholder, you must always find the cardholder from the cardholder list first. For information about finding cardholders in the cardholder list, see "Searching for entities" on page 75. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 109

126 Visitor management Visitor management The Visitor management task allows you to check in, check out, and modify visitors, as well as manage their credentials. A B C D D F G H A B C D E F G H Enter text to find a visitor by name. Click on a column heading to sort the list by that column s items. Visitors whose profile is not activated or expired are displayed in red. Click to select which columns to show in the report pane. Click to view or modify the selected cardholder. Click to check-out the selected visitor. Click to create a new cardholder. Click to check-in a new visitor. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 110

127 Visitor management Visitor management allows you to: Lists all information concerning the visitors: first name, last name, picture, activation date, expiration date, check-in date, and any custom fields that are defined for visitors. Choose which columns to display by clicking. Check-in new visitors. See "Check-in a visitor" on page 112. Change visitor information. See "Modify a visitor" on page 114. Check-out visitors. See "Check-out a visitor" on page 114. Search for a current visitor. See "Finding a visitor" on page 114. Check in and check-out The two most important tasks you can perform in Visitor management are checking-in and checking-out visitors. Before you check-in a visitor During visitor check-in, you will be asked to associate the visitor to a cardholder group. This is how Security Center grants access rules to visitors, since access rules cannot be directly associated to a visitor. The Visitors cardholder group is created for this specific purpose. You can also assign the visitor to any other cardholder group. For more information, see "Configure cardholder groups" on page 93. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 111

128 Visitor management Check-in a visitor 1 In the Visitor management task, click Check-in. 2 Enter the visitor s basic information: first name, last name, address and description. 3 In the State section, set the activation and expiry dates of the visitor s profile. If the profile is not activated or has expired, the credentials assigned to the visitor will not work. NOTE The activation time is not the same as the check-in time. Activation time indicates when the visitor s credentials are activated. Check-in time indicates when the visitor profile was created. You can set the activation time to a date in the future, which allows you to create visitor profiles in advance. 4 In the Options area, grant optional access privileges to the visitor if necessary: Use extended grant time. Grants the visitor more time to pass through doors where the Extended grant time parameter is configured for a door. Use this option for visitors with reduced mobility. Bypass antipassback rules. Exempts the visitor from all antipassback restrictions. These options are only meaningful if the visitor has been assigned a card credential. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 112

129 Visitor management 5 Assign a picture to the visitor. a In the picture area, click. b Select a picture from your computer or tablet, and click Open. All standard image formats are supported. c Click to clear the current picture. NOTES If you are logged on to Web Client from a tablet, you can also take a picture from the tablet s integrated camera. You cannot upload pictures from an ios device. 6 In the Credentials section, assign a credential to the visitor. NOTE If you do not assign a credential, you cannot monitor the activities, or generate activity reports for that visitor. To assign a credential, click. To remove a credential, select the credential and click. To create a new credential, click. For more information about creating credentials, see "Create a credential" on page 96. To modify an already existing credential, click. For more information about the credential properties you can modify, see "Configure credentials" on page In the Membership area, assign the visitor to a cardholder group. The cardholder group defines the access rules that apply to the visitor. For more information, see "Configure cardholder groups" on page 93. To add a cardholder group, click. To remove a cardholder group, select the cardholder group and click. NOTE A visitor may belong to more than one cardholder group. 8 In the Partition area, assign the visitor to a partition. The partition defines the users who have access to the visitor s profile. To add a partition, click. To remove a partition, select the partition and click. NOTE A visitor may belong to more than one partition. 9 If custom fields are defined for visitors, click the Custom fields tab, and enter the visitor s custom information. 10 Click Save to complete the creation process. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 113

130 Visitor management Modify a visitor Check-out a visitor You need to check-out the visitor when the person leaves. 1 In the Visitor management task, select the visitor from the visitor list. If the visitor list is long, use the search features to locate the visitor name. See "Finding a visitor" on page Click Check-out. The checked-out visitor is removed from the visitor list, but remains available for investigation reports. 3 If the visitor was assigned a credential, the credential status switches to Unassigned, and can be assigned to another visitor or cardholder. 1 In the Visitor management task, click Modify. 2 In the Editing visitor dialog box, edit the visitor properties. The visitor properties are described in "Check-in a visitor" on page 112. NOTE The properties you can edit depend on your user privileges. 3 Click Save. Finding a visitor Whether you modify or check-out an existing visitor, you must always find the visitor from the visitor list first. For information about how to find visitors in the visitor list, see "Searching for entities" on page 75. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 114

131 Hotlist editor Hotlist editor Hotlist and permit editor is an AutoVu-specific task used to edit a hotlist. You cannot create a new list using the editor, but after an existing list has been added to Security Center, you can edit, add, or delete items from the list, and the original text file is updated when you save your changes. A B C D E F G A B C D E F G Add a row to the hotlist. Select one of the available hotlists. Click on a column heading to sort the list by that column s items. Click on an individual item in the list to edit it. Save or cancel your changes. Show, hide, or expand the selector pane. Load the selected hotlist. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 115

132 Hotlist editor The hotlist and permit editor allows you to edit your lists from one central location at any time, and instantly update all your Patrollers with the new information. For example, a hotlist of stolen vehicles is downloaded from the ministry of justice each night at midnight. Every morning, when the officers begin their shift, they load the latest hotlist into a Patroller. During the day, some vehicles on the list are recovered, and new vehicles are stolen. As the operator, you can remove the recovered vehicles from the list, and add the newly stolen vehicles. Add, delete, and edit items in your hotlist This section describes how to add, delete, and edit items in your hotlist. IMPORTANT You are not notified if another user updates the hotlist while you are currently editing it. Before editing an item in your hotlist, refresh your browser. Before you begin: Make sure a hotlist has already been created and added to the Web Client. 1 In the Hotlist editor task, click the hotlist or permit list that you want to edit, and click the Load button. The Web Client loads and displays the contents of the list on the Web page. 2 Do one of the following: To add a row to your hotlist, click Add new record. To delete a row, click in the Delete row column. To edit a row, click an individual item on your list. 3 Click Save to save your changes, or Undo to discard your changes. When you save your changes, all Patrollers using your hotlist will be updated with the latest list. The original hotlist text file will also be updated with your changes. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 116

133 9 Introduction to Web Client reporting tasks Explains how to use reporting tasks to generate reports. This section includes the following topics: "What are reporting tasks?" on page 118 "Generating a report" on page 119 "Common query filters" on page 120 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 117

134 What are reporting tasks? What are reporting tasks? Most investigation and maintenance tasks are reporting tasks. Reporting tasks allow you to run customized queries on the entities, activities, and events in your Security Center system for reporting purposes. You can view and export query results in the report pane. Investigation tasks allow you to query the Security Center database for critical information, and maintenance tasks focus on the maintenance and the troubleshooting of Security Center. NOTE You can have a maximum of 2000 report results. Both investigation and maintenance tasks include the following items: Query tab. In investigation tasks, the selector pane contains specific query filters, which you can use to customize your Security Center database searches. For more information, see "Common query filters" on page 120. The Query tab always includes the following buttons: Clear filters ( ). Click to clear all filter settings. Generate report. Click to run the query. Report pane. Allows you to view and export all the results returned by your query. Sort the report by clicking a column heading. Click the same heading to sort the report in the reverse order. See "Reporting tasks workspace" on page 67. The next few chapters explain the investigation and maintenance tasks available: "Web Client common investigation tasks" on page 122 "Web Client access control investigation tasks" on page 128 "Web Client intrusion detection investigation tasks" on page 142 "Web Client LPR investigation tasks" on page 145 "Web Client maintenance tasks" on page 155 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 118

135 Generating a report Generating a report The workflow for generating an investigation or maintenance report is as follows. 1 From the Web Client Home page, select an investigation or maintenance task. 2 Use the query filters in the selector pane to create a customized search. 3 Run the query. Click Generate report to run the query and display the results in the report pane. If there are invalid filters, the Generate report button is unavailable. NOTE The report may take a few minutes to generate the report because the information needs to be retrieved from Mobile Server. 4 Analyze the query results in the report pane. The query results depend on the type of task. 5 Work with the query results. Depending on the items in the query results, you can print the report, export the report, and so on. For more information, see "Customizing your report" on page 68. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 119

136 Common query filters Common query filters Reporting tasks share many common filters in the Query tab. This section includes the following topics: "Using the time range filter" on page 120 "Using the date-time picker" on page 121 Using the time range filter Choose between two time range modes: Relative. Select a time range using the last number of seconds, minutes, hours, days, weeks, months, or years. Choose Relative time range to generate a different report every time you run the query since it is based on the current time. Absolute. Specify the From and To date and time. Choose Absolute time range if you want your query to produce the same report repeatedly. To set the time range, edit the date or time fields, or click on the calendar or clock icon to display the date-time picker. See "Using the date-time picker" on page 121. If the time range is invalid, the panel turns red and you can not generate the report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 120

137 Common query filters Using the date-time picker The date-time picker is a widget designed to help you easily set the date and time. Click the calendar title to zoom out one level Click on the date you want to pick Click on a month to zoom in to the monthly calendar Click on a year to zoom in to the yearly calendar To pick a date, click on a date in the calendar. To quickly move through the months and years, zoom out from the monthly view to view a whole year, twelve years, or twelve decades. To zoom in, click on the desired decade, year, or month. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 121

138 10 Web Client common investigation tasks Explains how to use common investigation tasks. This section includes the following topics: "Alarm report" on page 123 "Zone activities report" on page 126 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 122

139 Alarm report Alarm report The Alarm report task allows you to search and view current and past alarms. A B C D E F A Select the query filters. See "Alarm query filters" on page 124. B Select the alarms you want to investigate. See "Searching for entities" on page 75. C All query results are listed in the report pane. See "Alarm report results" on page 124. D E F Select an alarm from the report pane, and click Video video to view live video associated to the alarm. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 123

140 Alarm report Alarm query filters Alarm report results Alarm report uses the following query filters: Alarms. Types of alarms you want to investigate. Alarms can be locally defined ( ), or imported from federated systems ( ). Acknowledged by. Users who acknowledged the alarm. Acknowledged on. Alarm acknowledgement time range. For more information, see "Using the time range filter" on page 120. Acknowledgement type. Check one of the following types: Acknowledged (Default) or Acknowledged (Alternate). Source. Source entity of the event that triggered the alarm in the case of an event-toaction, or the user who triggered the alarm manually. NOTE From the Logical view in the Select entities dialog box, you cannot select federated entities as a source. State. State of the alarm: Active or Acknowledged. Triggered on. Alarm trigger time range. For more information, see "Using the time range filter" on page 120. Triggering event. Events used to trigger the alarm. The following columns are available for this report: ID. Alarm instance number. Uniquely identifies each alarm instance. Alarm. Alarm entity name. Triggering event. Event that triggered the alarm (if triggered through an event-toaction) or Manual action (if triggered manually by a user). Priority. Alarm priority. NOTE All alarms imported from Omnicast have their priority set to 1 by default. You can later change their priority in the Config Tool. Source. Source entity associated to the event that triggered the alarm, when the alarm is triggered by an event-to-action. Shows a username when the alarm is triggered manually. Source time. Time of the alarm triggering event. The only time Source time and Triggering time are different is when the event occurred while the access control unit was offline. Acknowledged on. Time the alarm was acknowledged. Acknowledged by. User who acknowledged the alarm. When the alarm is acknowledge automatically by the system, Service is indicated. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 124

141 Alarm report State. Current state of the alarm. Active. Alarm is not yet acknowledged. Selecting an active alarm shows the alarm acknowledge buttons in the report pane. Acknowledged (Default). Alarm was acknowledge using the default mode. Acknowledged (Alternate). Alarm was acknowledged using the alternate mode. Trigger time. (Hidden by default) Time the alarm was triggered in Security Center. External instance ID. (Hidden by default) Original alarm instance ID on the federated system. For federated alarms. Occurrence period. (Hidden by default) Period when the event occurred. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 125

142 Zone activities report Zone activities report The Zone activities task investigates zone related activities (zone armed, zone disarmed, lock released, lock secured, and so on). A B C D E F G H A Select the query filters. See "Zone activity query filters" on page 127. B Select the zones you want to investigate. See "Searching for entities" on page 75. C All query results are listed in the report pane. See "Zone activity report results" on page 127. D Select a time range. See "Using the time range filter" on page 120. E F G H Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Select the zone events of interest. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 126

143 Zone activities report Zone activity query filters Zone activities uses the following query filters: Zones. Select the zones to investigate. For more information, see "Searching for entities" on page 75. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Events. Select the zone events of interest. Zone activity report results The following columns are available for this report: Event. Event name. Zone. Zone name. Event timestamp. Date and time that the event occurred. Occurrence period. (Hidden by default) Period when the event occurred. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 127

144 11 Web Client access control investigation tasks Explains how to use access control investigation tasks. This section includes the following topics: "Area activities report" on page 129 "Cardholder activities report" on page 131 "Door activities report" on page 134 "Visitor activities report" on page 137 "Visit details report" on page 139 "Area presence report" on page 140 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 128

145 Area activities report Area activities report Area activities is an access control task that investigates area related activities (access granted, access denied, first person in, last person out, antipassback violation, and so on). A B C D E F A Select the query filters. See "Area activity query filters" on page 130. B Select the areas you want to investigate. See "Searching for entities" on page 75. C All query results are listed in the report pane. See "Area activity report results" on page 130. D E F Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 129

146 Area activities report Area activity query filters Area activities uses the following query filters: Areas. For more information, see "Searching for entities" on page 75. Cardholders. Cardholders related to the area events. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Events. Only area related events are available. Area activity report results The following columns are available for this report: Event. Event name. Area name. Area name. Side Direction. Entrance or exit. First name. Cardholder s first name. Last name. Cardholder s last name. Picture. Cardholder s picture. Credential. Credential used by the cardholder. Supplemental credential. A second credential is sometimes necessary. For example, when both a card and a PIN are required to access a door. Event timestamp. Date and time that the event occurred. Unit (hidden by default). Access control unit involved. Unit type (hidden by default). Type of unit IP address (hidden by default). IP address of the unit. Time zone (hidden by default). Time zone of the unit. Device (hidden by default). Device involved on the unit (reader or IO module). Card format (hidden by default). Credential card format. Credential code (hidden by default). Facility code and card number. Cardholder (hidden by default). Cardholder entity name. address (hidden by default). Cardholder s address. Occurrence period (hidden by default). Period when the event occurred. Custom fields (hidden by default). If custom fields are defined for cardholders, credentials, and visitors in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 130

147 Cardholder activities report Cardholder activities report Cardholder activities is an access control task that investigates cardholder activities (access denied, first person in, last person out, antipassback violation, and so on). A B C D E F A Select the query filters. See "Cardholder activities query filters" on page 132. B Select the cardholders you want to investigate. See "Searching for entities" on page 75. C D E F All query results are listed in the report pane. See "Cardholder activities report results" on page 132. Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 131

148 Cardholder activities report Cardholder activities query filters Cardholder activities uses the following query filters: Cardholders. Includes both cardholders and cardholder groups. See "Searching for entities" on page 75. NOTE If only All cardholders cardholder group is selected, the federated cardholders will not be included, because All cardholders is a local cardholder group that only covers local cardholders. Credentials. For more information, see "Searching for entities" on page 75. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Doors - Areas - Elevators. You can restrict the search to activities that took place at certain doors, areas, and elevators. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Events. Only cardholder related events are available. Cardholder activities report results The following columns are available for this report: Event. Event name. First name. Cardholder s first name. Last name. Cardholder s last name. Picture. Cardholder s picture. Location. Location (area) where the activity took place. Access point. Access point involved. Credential. Credential used by the cardholder. Supplemental credential. A second credential is sometimes necessary. For example, when both a card and a PIN are required to access a door. Event timestamp. Date and time that the event occurred. Unit (hidden by default). Name of the access control unit that was involved. Unit type (hidden by default). Type of access control unit IP address (hidden by default). IP address of the access control unit. Time zone (hidden by default). Time zone of the access control unit. Device (hidden by default). Device involved on the unit (reader or IO module). Card format (hidden by default). Credential card format. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 132

149 Cardholder activities report Credential code (hidden by default). Facility code / card number. Cardholder (hidden by default). Cardholder entity name. address. Cardholder s address. Occurrence period (hidden by default). Period when the event occurred. Custom fields (hidden by default). If custom fields are defined for cardholders, credentials, and visitors in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 133

150 Door activities report Door activities report Door activities is an access control task that investigates door related activities (access denied, door forced open, door open too long, hardware tamper, and so on). A B C D E F A Select the query filters. See "Door activities query filters" on page 135. B Select the doors you want to investigate. See "Searching for entities" on page 75. C All query results are listed in the report pane. See "Door activities report results" on page 135. D E F Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 134

151 Door activities report Door activities query filters Door activities uses the following query filters: Doors. See "Searching for entities" on page 75. Cardholders. You can restrict the search to certain cardholders. Credentials. You can restrict the search to certain credentials. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Side. Door sides are named A and B by default, but the administrator could have given them different names. This filter allows you to search by door side. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Events. Only door related events are available. Door activities report results The following columns are available for this report: Event. Event name. Door. Door name. Side. Door side name. First name. Cardholder s first name. Last name. Cardholder s last name. Picture. Cardholder s picture. Credential. Credential used by the cardholder. Supplemental credential. A second credential is sometimes necessary. For example, when both a card and a PIN are required to access a door. Event timestamp. Date and time that the event occurred. Unit (hidden by default). Name of the unit that was involved. Unit type (hidden by default). Type of unit IP address (hidden by default). IP address of the unit. Time zone (hidden by default). Time zone of the unit. Device (hidden by default). Device involved on the unit (reader or IO module). Card format (hidden by default). Credential card format. Credential code (hidden by default). Facility code / card number. Cardholder (hidden by default). Cardholder entity name. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 135

152 Door activities report address (hidden by default). Cardholder s address. Occurrence period (hidden by default). Period when the event occurred. Custom fields (hidden by default). If custom fields are defined for cardholders, credentials, and visitors in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 136

153 Visitor activities report Visitor activities report Visitor activities is an access control task that investigates visitor activities (access denied, first person in, last person out, antipassback violation, and so on). Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 Visitor activities query filters Visitor activities uses the following query filters: Visitor. Click the Select ( ) button to open the Visitor search form. You may only specify one visitor at a time. Doors - Areas - Elevators. You can restrict the search to activities that took place at certain doors, areas, and elevators. Events. Visitor events are the same as cardholder events. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 137

154 Visitor activities report Visitor activities report results The following columns are available for this report: Event. Event name. First name. Visitor s first name. Last name. Visitor s last name. Picture. Visitor s picture. Location. Location (area) where the activity took place. Access point. Access point involved. Event timestamp. Date and time that the event occurred. Unit (hidden by default). Name of the unit that was involved. Unit type (hidden by default). Type of unit IP address (hidden by default). IP address of the unit. Time zone (hidden by default). Time zone of the unit. Device (hidden by default). Device involved on the unit (reader or IO module). Card format (hidden by default). Credential card format. Credential code (hidden by default). Facility code / card number. Cardholder (hidden by default). Cardholder entity name. Supplemental credential (hidden by default). A second credential is sometimes necessary. For example, when both a card and a PIN are required to access a door. address (hidden by default). Cardholder s address. Occurrence period (hidden by default). Period when the event occurred. Custom fields (hidden by default). If custom fields are defined for cardholders, credentials, and visitors in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 138

155 Visit details report Visit details report Visit details ia an access control that investigates the stay (check-in and check-out time) of current and past visitors. "Reporting tasks workspace" on page 67 "Generating a report" on page 119 Visit details query filters Visit details uses following query filters: Activation date. For more information, see "Using the time range filter" on page 120. Custom fields. Visitor custom fields (if available). Expiration date. For more information, see "Using the time range filter" on page 120. First name. Visitor s first name. Last name. Visitor s last name. Status. Specific status of the Visitor s card: Active Expired Visit details report results The following columns are available for this report: First name. Visitor s first name. Last name. Visitor s last name. Picture. Visitor s picture. Activation date. Time the visitor s profile was activated. Expiration date. Time the visitor s profile expired. Check-in date. Time the visitor was checked in (may correspond to the arrival time. Check-out date. Time the visitor was checked out (may correspond to the departure time). Custom fields. (Hidden by default) If custom fields are defined for visitors in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 139

156 Area presence report Area presence report Area presence is a Synergis-specific task that provides a snapshot of all cardholders and visitors currently present in a selected area. NOTE For this report to be accurate, the selected area must be fully secured, meaning that people cannot enter or exit the area without swiping their card. A B C D E A Select the areas you want to investigate. See "Searching for entities" on page 75. B All query results are listed in the report pane. See "Area presence report results" on page 141. C D E Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 140

157 Area presence report Area presence query filters Area presence uses the following query filters: Areas. Select an area to be examined. Area presence report results The following columns are available for this report: Area. Name of the selected area. First name. Cardholder s first name. Last name. Cardholder s last name. Last access. Time the cardholder entered this area. Picture. Cardholder picture. Cardholder. Cardholder name. NOTE Format is First name + Last name for European languages, and Last name + First name for Asian languages. address. Cardholder s address. Custom fields (hidden by default). If custom fields are defined for cardholders in your system, then can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 141

158 12 Web Client intrusion detection investigation tasks Explains how to use intrusion detection investigation tasks. This section includes the following topics: "Intrusion detection area activities report" on page 143 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 142

159 Intrusion detection area activities report Intrusion detection area activities report Intrusion detection area activities is a specific Intrusion Management task that investigates activities (master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion detection areas. A B C D E F A Select the query filters. See "Intrusion detection area activities query filters" on page 144. B C D E F Select the intrusion detection areas you want to investigate. See "Searching for entities" on page 75. All query results are listed in the report pane. See "Intrusion detection area activities report results" on page 144. Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 143

160 Intrusion detection area activities report Intrusion detection area activities query filters Intrusion detection area activities uses the following query filters: Intrusion detection areas. Select the areas to investigate. See "Searching for entities" on page 75. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Events. Select the intrusion detection area events of interest. Intrusion detection area activities report results The following columns are available for this report: Event. Event name. Event timestamp. Date and time that the event occurred. Intrusion detection area. Intrusion detection area name. Intrusion detection unit. (Hidden by default) Intrusion detection unit involved. Device. (Hidden by default) Logical name of the affected device when applicable. NOTE This column is always empty when the event is either an input bypass has been activated or deactivated. User. (Hidden by default) Name of the user who triggered the event. The user name is empty if the event was not triggered from the Security Desk. Occurrence period. (Hidden by default) Period when the event occurred. Custom fields (hidden by default). If custom fields are defined for intrusion detection areas, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 144

161 13 Web Client LPR investigation tasks Explains how to use LPR event investigation tasks. This section includes the following topics: "Hits report" on page 146 "Reads report" on page 149 "Daily usage per Patroller report" on page 151 "Logons per Patroller report" on page 153 "Reads/hits per day" on page 154 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 145

162 Hits report Hits report Hits is an AutoVu-specific task that investigates hits reported within a selected time range. In the report pane, you can view and print the results of your query. A B C D E F G A Select the query filters. See "Hits query filters" on page 147. B Select a time range. See "Using the time range filter" on page 120. C Select the Patrollers of units you want to investigate. See "Searching for entities" on page 75. D All query results are listed in the report pane. See "Hits report results" on page 147. E F G Contextual commands. For more information, see "Contextual commands toolbar" on page 69. Show, hide, or expand the selector pane. Click to generate the report. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 146

163 Hits report Hits query filters Hits report results Hits report uses the following query filters: Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Patrollers. Restrict the search to selected Patroller units (including all their fitted LPR units) and/or LPR units representing fixed Sharp cameras on the Patroller unit. Hit rules. Select the hit rules you want to include in the query. Accept reasons. Reason selected by the Patroller user when enforcing a hit. Accept reasons are created and customized in Config Tool. Action taken. Patroller hit actions (Accepted, Rejected, Not enforced) selected by the Patroller user. For fixed Sharps, a hit raised by the Hit Matcher module is always automatically Accepted and Enforced. Annotation fields. Patroller hit annotations used by the Patroller user. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. License plate. Enter a full or partial license plate number. Offload timestamp. The date and time that the Patroller offloaded the reads/hits to Security Center. For more information about selecting your desired time range, see "Using the time range filter" on page 120. Reject reason. Reason selected by the Patroller user when rejecting a hit. Reject reasons are created and customized in Config Tool. Users. Select the Patroller user name, or the Patrollers parent user groups. The following columns are available for this report: Rule. Hit rule that matched the plate. Plate read. The license plate read generated by the Sharp unit. Plate origin. State that issued the license plate. Plate image. License plate image captured by the LPR camera. Context image. Wide angle color image of the vehicle captured by the context camera. Address. Location of the LPR read. Position. Latitude/longitude of the hit. Patroller. Patroller entity name. The Patroller entity name field is not populated for fixed Sharp cameras. Unit. Camera unit that read the plate and populated for a Patroller, e.g. Patroller - Left, Patroller - Right, etc., and for a fixed Sharp. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 147

164 Hits report User. Patroller user name. Event timestamp. Date and time that the event occurred. Reject Reason. Reason selected by the Patroller user when rejecting a hit. Device (hidden by default). Name of the device involved. Protected (hidden by default). Record is not purged from the database of its parent AutoVu LPR Manager ES when the Hit Retention period (for this record) expires. Offload timestamp (hidden by default). The date and time that the Patroller offloaded the reads/hits to Security Center. Custom fields (hidden by default). If custom fields are defined for this entity in your system, they can be included in this report. The columns that are displayed in brackets show the default annotation fields that match the fields that appear in most hotlists. If your hotlist contains fields that are not included in Security Desk s default columns (for example, the vehicle s VIN or serial number), you can use Config Tool to add new annotation fields (LPR Settings > Annotation fields). If you add new annotation fields however, make sure that they match your hotlist s attributes (Hotlist > Properties). {Category}. The category can mean different things depending on the type of hit. For a hotlist hit, the category corresponds to the reason a license plate is of interest. For example: Amber alert, Wanted felon, Stolen, and so on. If you are looking at a permit hit, the category corresponds to the type of permit, for example, Zone 35, Zone 50, and so on. NOTE This is a mandatory field in a hotlist or a permit list, and the information is extracted from the hotlist or permit list entry that the license plate is matched against. For a new wanted license plate, the Category is defined in the LPR settings new wanted categories and downloaded to a Patroller. When a new wanted license plate is entered manually in the Patroller, the user selects the appropriate Category from the downloaded list. {MatchPlate}. The plate number as it appears in your hotlist. {PlateState}. The plate state/province as it appears in your hotlist. {EffectiveDate}. Hotlist is effective from this date. {ExpiryDate}. Hotlist expires on this date. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 148

165 Reads report Reads report Reads is an AutoVu-specific task that reports on license plate reads performed within a selected time range. In the report pane, you can view the results of your query, print the report results, or export the report. Related topics: Reads query filters "Reporting tasks workspace" on page 67 "Generating a report" on page 119 Reads uses the following query filters: Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Patrollers. Restrict the search to selected Patroller units (including all their fitted LPR units) and/or LPR units representing fixed Sharp cameras on the Patroller unit. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. License plate. Enter a Full or Partial license plate number. If you choose Partial, a search for AB will return plates that have AB anywhere in the license plate number. If you choose Full, you can enter the full license plate number, or you can use the following wildcard characters: Asterisk (*). Represents any number of unknown characters. Use it when searching for documents or files for which you have only partial names. For example, if you enter ABC* as your search term, the search might return ABC123, ABC5, ABC002, and so on. If you enter *XYZ, the search might return 1XYZ, 245XYZ, 00XYZ, and so on. Question mark (?). Represents only one unknown character. Use it when you have a list of files with very similar names, or when you are unsure of a few characters. For example, if you enter ABC12? as your search term, the search might return ABC123, ABC127, ABC12P, and so on. The question mark only covers one character, but you can enter as many question marks in a search string as you want. You can use the asterisk and the question mark anywhere in a search, and you can also use them together. Offload timestamp. The date and time that the Patroller offloaded the reads/hits to Security Center. For more information about selecting your desired time range, see "Using the time range filter" on page 120. Users. Select the Patroller user name, or the Patrollers parent user groups. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 149

166 Reads report Reads report results The following columns are available for this report: Plate read. The license plate read generated by the Sharp unit. Plate image. License plate image captured by the LPR camera. Context image. Wide angle color image of the vehicle captured by the context camera. Address. Location of the LPR read. Position. Latitude/longitude of the read. Patroller. Patroller entity name. Unit. LPR unit that read the plate. User. Patroller user name. Event timestamp. Date and time when the event occurred. Device (hidden by default). Name of the device involved. Protected (hidden by default). Record is not purged from the database of its parent AutoVu LPR Manager ES when the Read Retention period (for this record) expires. Annotation fields (hidden by default). Any annotation field defined in System > LPR Settings in the Security Center Config Tool. Shown in brackets. Offload timestamp. The date and time that the Patroller offloaded the reads/hits to Security Center. Custom fields (hidden by default). If custom fields are defined for this entity in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 150

167 Daily usage per Patroller report Daily usage per Patroller report Daily usage per Patroller is an AutoVu-specific task that provides the total daily time (in minutes) and the percentage of daily time a Patroller application is opened, stopped, or shut down. It also provides the application usage statistics (average) for a selected time range. This report is used in mobile Patroller installations only. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 Daily usage per Patroller query filters Daily usage per Patroller uses the following query filters: Patroller. Restrict the search to selected Patroller units. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Daily usage per Patroller report results The following columns are available for this report: Date. Selected day of the shift. Operating time (min.). Total number of minutes in a day that the Patroller application is open. Longest stop (min.). Single longest number of minutes in operating time when the vehicle is stationary. Total Stop (min.). Total number of minutes in operating time when the vehicle is stationary. Total stop (%). Percentage of total stop time over operating time. Instances. Total number of times the Patroller application is opened in the day. Longest shutdown (min.). Single longest number of minutes in a day that the Patroller application is closed. Longest shutdown (%). Percentage of Longest shutdown over the total number of minutes in a day. Total Shutdown (min.). Total number of minutes in a day that the Patroller application is closed. The total shutdown value plus the operating time value equals 1440 minutes. Longest stop % (hidden by default). Percentage of longest stop time over operating time. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 151

168 Daily usage per Patroller report Total shutdown % (hidden by default). Percentage of Total shutdown over the number of minutes in a day. This report also provides the statistics on the following: Operating time (Average). Average operating time over the selected time range. Longest stop (min.) (Average). Average longest stop time in minutes over the selected time range. Longest stop % (Average). Average longest stop time percentage over the selected time range. Total Stop (min.)(average). Average total stop time in minutes over the selected time range. Total stop % (Average). Average total stop time in percentage over the selected time range. Instances (Average). Average number of times the Patroller application was opened over the selected time range. Longest shutdown (min.)(average). Average longest shutdown time in minutes over the selected time range. Longest shutdown % (Average). Average longest shutdown time in percentage over the selected time range. Total Shutdown (Average). Average total shutdown time in minutes over the selected time range. Total shutdown % (Average). Average total shutdown time in percentage over the selected time range. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 152

169 Logons per Patroller report Logons per Patroller report Logons per Patroller is an AutoVu LPR task that provides a view of the logon records for a Patroller application for a selected time range. This report is used in mobile Patroller installations only. Related topics: "Reporting tasks workspace" on page 67 "Generating a report" on page 119 Logons per Patroller query filters Logons per Patroller uses the following query filters: Patroller. Restrict the search to selected Patroller units. Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Users. Select the Patroller user name, or the Patrollers parent user groups. Logons per Patroller report results The following columns are available for this report: Date. Date of the Patroller shift. User. User log on name Log on. Log on timestamp. Log off. Log off timestamp. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 153

170 Reads/hits per day Reads/hits per day Reads/hits per day is an AutoVu-specific task that reports on the number of reads and hits per day for a selected date range. This report is used to query the performance of the selected Patrollers and the fixed Sharp cameras. Reads/hits per day query filters Reads/hits per day uses the following query filters: Event timestamp. Define the time range of the query. For more information, see "Using the time range filter" on page 120. Patrollers. Restrict the search to selected Patroller units (including all their fitted LPR units) and/or LPR units representing fixed Sharp cameras on the Patroller unit. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Hit rules. Select the hotlist hit rules. Reject Reason. Reason for the rejection of the hit. This is selected by the Patroller user. Users. Select the Patroller user name, or the Patrollers parent user groups. Reads/hits per day report results The following columns are available for this report: Date. Day that applies. Reads. Number of plate reads. Hits. Number of hits. If the Hit rules and Hit type selectors are constrained, this value may not be the total number of hits in the day. Enforced hits. Number of enforced hits. Not enforced hits. Number of hits that were not enforced. Rejected hits. Number of hits that were rejected. The report also included statistics on total number of reads, hits, and hit actions taken for the selected time range. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 154

171 14 Web Client maintenance tasks Explains how to use maintenance tasks. This section includes the following topics: "Cardholder configuration" on page 156 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 155

172 Cardholder configuration Cardholder configuration Cardholder configuration is an access control task that reports on cardholder properties (first name, last name, picture, status, custom properties, and so on). For more information about creating a Cardholder configuration report, see "Generating a report" on page 119. Cardholder configuration query filters Cardholder configuration uses the following query filters: Cardholder groups. The cardholder groups to examine. See "Searching for entities" on page 75. Custom fields. If custom fields are defined for this entity in your system, they can be included in this report. Status. Specific cardholder status: Active Expired Inactive Cardholder configuration report results The following columns are available for this report: First name. Cardholder s first name. Last name. Cardholder s last name. Picture. Cardholder s picture. Cardholder status. Cardholder profile status. Cardholder. Cardholder entity name. address. Cardholder s address. Activation date. Activation date of the cardholder. Expiration date. Expiration date of the cardholder. Custom fields (hidden by default). If cardholder custom fields are defined in your system, they can be included in this report. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 156

173 Part IV Security Center Mobile app This section introduces you to the Mobile app, and explains how to install and use Mobile app. This part includes the following chapters: Chapter 15, "Installing Mobile app" on page 158 Chapter 16, "Getting started with Mobile app" on page 164 Chapter 17, "Configuring Mobile app" on page 170 Chapter 18, "Using Mobile app" on page 175

174 15 Installing Mobile app This section explains how to install Mobile app on Apple Multi-Touch devices (iphone, ipod, ipad), BlackBerry devices, and Android devices. This section includes the following topics: "Before you install" on page 159 "Install Mobile app on Blackberry devices" on page 161 "Install Mobile app on Apple mobile devices" on page 162 "Install Mobile app on Android devices" on page 163 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 158

175 Before you install Before you install This section describes the things you need to know and do before you install Mobile app. This section includes the following topics: "Review the Release Notes" on page 159 "Prerequisites for BlackBerry devices" on page 159 "Prerequisites for Apple Multi-Touch devices" on page 159 "Prerequisites for Android devices" on page 160 "Prerequisites for firewall" on page 160 Review the Release Notes Read the "Security Center Mobile 3.0 GA release notes" on page 9 for any known issues and other information about the release. Prerequisites for BlackBerry devices BlackBerry devices need the following prerequisites to receive alarm notifications and stream video on your cellular network. Feature BlackBerry prerequisite Receive alarm notifications Connected to the cellular network, or a WiFi network. Activated on the BES server. Use video streaming on a cellular network Enable the APN settings. For information on how to configure the APN settings, see Carrier_specific_APN/TCP_settings. Prerequisites for Apple Multi-Touch devices To receive push alarm notifications on Apple Multi-Touch devices, the device must be configured as follows: Apple devices must have access to the Internet. ipod devices must connect to a WiFi network that allows access to the Internet. You ll also need to open port 5223 outbound (TCP) on the company firewall. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 159

176 Before you install Prerequisites for Android devices To receive alarm push notifications on Android devices, the device must be configured as follows: The device must be running Android version 2.2 or later, and must have the Market application installed. The device must be associated to a valid Google Account. The device must have access to the Internet. If the device is connecting to the internet using a WiFi network, you need to open port 5228 outbound (TCP) on the company firewall. For more information about the Android C2DM (Cloud to Device Messaging) framework, go to Prerequisites for firewall In order to log on to Mobile Server, you must configure the firewall on the Mobile Server computer. Open the main port and the video port for the Mobile app connection to Mobile Server. Fore more information, see "Mobile Server ports" on page 20. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 160

177 Install Mobile app on Blackberry devices Install Mobile app on Blackberry devices This section explains the different ways to install Mobile app on your Blackberry device. This section includes the following topics: "Install Mobile app from BlackBerry App World" on page 161 "Install Mobile app using BlackBerry Desktop Manager" on page 161 "Install Mobile app using OTA deployment" on page 162 Install Mobile app from BlackBerry App World To use App World, the BlackBerry device must be connected to the Internet. You ll also need an App World account. 1 From App World, search for Genetec. 2 Download Genetec Security Center Mobile. The Security Center Mobile icon appears on the Home screen as GSC Mobile. After you are done: "Open Mobile app" on page 167. Install Mobile app using BlackBerry Desktop Manager You use the Blackberry Desktop Manager and a USB connection to install Mobile app from your computer to your BlackBerry. 1 Connect your BlackBerry to your computer using a USB cable. 2 On your computer, open BlackBerry Desktop Manager. 3 Click Add, and navigate to the Security Center Mobile BlackBerry program folder containing the BlackBerry ALX files. Select the folder for the version of your BlackBerry operating system, and then select the.alx file. 4 Click OK. The application appears in the list of installed software. 5 Click Next. The manager installs Mobile app on your BlackBerry. Security Center Mobile appears in the BlackBerry Applications folder. After you are done: "Open Mobile app" on page 167. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 161

178 Install Mobile app on Apple mobile devices Install Mobile app using OTA deployment You can download Mobile app from a browser over a wireless network. Before you begin: You need to configure your APN (Access Point Name) as follows: 1 From your BlackBerry device, go to Options > Advanced Options > Browser. 2 Under Default browser configuration, select Internet Browser. 3 Press the Back key, and then select Save. 4 Go to Options > Advanced Options > TCP/IP and configure the following: APN Settings. Select to enable. APN. Enter your wireless provider s Access Point Name (for example, the Rogers Wireless APN is internet.com ). You can find your provider s APN at Press the Back key, and then select Save. To download Mobile app: 1 Your system administrator will send you an with a download link. The required link is displayed in the Mobile Admin. For more information, see "Configure BlackBerry OTA and push notifications" on page Click the link and follow the on-screen instructions to install Mobile app. Mobile app is installed to the Download folder. 3 Restart the BlackBerry. After you are done: "Open Mobile app" on page 167. Install Mobile app on Apple mobile devices On Apple devices, you download the Mobile app from the App Store. To use the App Store, the Apple device must be connected to the Internet. You ll also need an itunes App Store account. 1 From the App Store, search for Genetec. 2 Download Genetec Security Center Mobile. The Security Center Mobile icon appears on the Home screen as GSC Mobile. After you are done: "Open Mobile app" on page 167. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 162

179 Install Mobile app on Android devices Install Mobile app on Android devices This section explains the different ways to install Mobile app on your Android device. This section includes the following topics: "Install Mobile app from Android Market" on page 163 "Install Mobile app using OTA deployment" on page 163 Install Mobile app from Android Market To use Android Market, the Android device must be connected to the Internet. You ll also need an Android Market account. 1 From Android Market, search for Genetec. 2 Download Genetec Security Center Mobile. The Security Center Mobile icon appears on the Home screen as GSC Mobile. After you are done: "Open Mobile app" on page 167. Install Mobile app using OTA deployment You can download Mobile app from the Android browser over a wireless network. 1 Your system administrator will send you an with a download link. The required link is displayed in the Mobile Admin. For more information, see "Configure Android OTA and push notifications" on page Click the link and follow the on-screen instructions to install Mobile app. After you are done: "Open Mobile app" on page 167. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 163

180 16 Getting started with Mobile app This chapter provides an overview of Security Center Mobile app. You ll learn how to log on and log off the application, and how to navigate the applications user interface. This section includes the following topics: "What is Mobile app" on page 165 "Mobile app icons" on page 166 "Open Mobile app" on page 167 "Log on to Mobile app" on page 168 "Log off Mobile app" on page 168 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 164

181 What is Mobile app What is Mobile app Security Center Mobile app is the client component of Security Center Mobile installed on mobile devices. Mobile app users connect to Mobile Server to receive Security Center events and alarms, view live video streams, video the status of door, or perform door actions. Video streams are displayed as M-JPEG at a maximum of 15 frames per second, depending on your available bandwidth and the device s CPU. NOTE Before using Mobile app, make sure you have the required prerequisites. See "Security Center Mobile prerequisites" on page 7. Mobile app on a BlackBerry Bold. Mobile app on an iphone. Mobile app on a Google Android device (Samsung Captivate). Mobile app on an ipad. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 165

182 Mobile app icons Mobile app icons Mobile app icons give you one-click access to many of the Security Center Mobile features. The way icons are displayed on the screen depends on the type of mobile device you are using. For example, on BlackBerry devices the icons are displayed down the left side of the screen, while on Android devices the icons are displayed at the top of the screen. On Apple iphone and ipod, icons appear in a tab bar at the bottom of the screen, while on the ipad, you need to click the Menu icon to display the application icons. Icon Name Description Entities browser View a list of areas in your Security Center system. The entities in the Entities browser represent the Area entities in your Security Center system. Cameras are grouped under Areas. In the Entities browser, you can browse the cameras and doors in each area, and select the camera/door you want to view. Alarms View a list of unacknowledged alarms and select the alarm you want to view. Favorites View a list of areas and cameras you have added to Favorites. Apple BlackBerry Options View and configure Mobile app settings, including the connections settings to Mobile Server, Security Center username and password, encryption, cellular network, and alarm notification. Menu (ipad only) View pop-up screen that displays a browser and a tab bar with the Entities, Alarms, Favorites, and Options buttons. Log on (BlackBerry only) Click to log on. Log off (BlackBerry only) Click to log off. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 166

183 Open Mobile app Open Mobile app To open Mobile app on BlackBerry devices: Navigate to the folder where you saved Security Center Mobile, and click the GSC Mobile icon. By default Security Center Mobile is saved to your Downloads folder. Mobile app opens. NOTE The first time you start Mobile app, you are asked to confirm the following: Do you wish to receive http messages. Click Yes to receive alarm notifications. Do you wish to allow the use of your user data. Click Yes to allow outgoing connections between Mobile app and Mobile Server. To open Mobile app on Apple Multi-Touch devices and Google Android devices: From the Home screen, tap the GSC Mobile icon. NOTE The first time you use Security Center Mobile on an Apple device, a pop-up message appears asking if Security Center Mobile can send you push notifications. Click OK to continue. The Security Center Mobile log on screen appears. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 167

184 Log on to Mobile app Log on to Mobile app You will remain logged on to Security Center Mobile until you log off. Best practice: Use the following best practices when logging on: You should set the access code to protect access to your mobile device. For Apple and Android devices, turn off WiFi on your mobile device if you want to log on using 3G only. If you leave WiFi on, and the device detects an available WiFi network, it will switch to WiFi automatically, and you may lose connectivity to Mobile Server. To log on to Mobile app: 1 Open Mobile app. 2 Tap or select Log on. Log off Mobile app Do one of the following: On Apple Multi-Touch devices, click the Close button ( X ) at the top of the screen. On iphone and ipod touch, you have to navigate back to the root list in the Entity browser to view the Close button. NOTE If your Apple device supports multi-tasking, pressing the Home button does not log you out, it only minimizes the application (it s still running in the background). To close the application, press the home button twice to view the applications running in the background, touch the Security Center Mobile application icon for a few seconds, and then tap the minus icon. On BlackBerry, press the Menu key and select Close. Or, press the Back key until you return to the home screen, and select Log out. On Android, press the Back key until you are prompted to log off. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 168

185 Working with Mobile app Working with Mobile app This section provides useful information for using Mobile app. This section includes the following topics: "Have your device documentation on hand" on page 169 "Using Mobile app on a touchscreen" on page 169 Have your device documentation on hand Best practice: The Google Android operating system is supported on many different types of mobile devices. Genetec used a Samsung Captivate smartphone to show the functionality of the Mobile app, but you should also have your device s documentation on hand as a reference, as the procedures in this chapter may differ slightly from what is required for your specific device. Using Mobile app on a touchscreen The Mobile app incorporates the tap, swipe, and touch functionality available on Apple, BlackBerry, and Google Android-supported touchscreen devices. On the ipad, the client uses the additional real-estate to display up to six video camera streams. Refer to your mobile device manufacturer documentation for supported touchscreen features. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 169

186 17 Configuring Mobile app This section explains how to configure Mobile app. This section includes the following topics: "Configure Mobile app connection settings" on page 171 "Turn alarm notifications on and off " on page 172 "Use your mobile device on a different server" on page 174 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 170

187 Configure Mobile app connection settings Configure Mobile app connection settings The first time you open the Mobile app, you ll need to configure the connection settings to Mobile Server from the Options screen. From the Options screen, you can choose to encrypt the user data (not video streams) that is sent between Mobile app and Mobile Server, use your cellular network to send and receive data and video streams, and turn alarm notifications on or off. 1 Open Mobile app. 2 Do one of the following: On BlackBerry devices, select Options. On Apple and Android devices, tap the Options icon ( or ). The Security Center Mobile Options screen appears. 3 Configure the settings as follows: Server. The IP address of the Mobile Server. Port. Set port. The default is Username and Password. Enter your Security Center logon name and password. Use HTTPS. Turn encryption on this port on or off. Default is Off. NOTE Video streams are not encrypted. Allow Cellular data. Specifies whether or not to use your cellular network to connect to Mobile Server. When off, you can only connect using Wi-Fi. Default is Off. Push alarms. Turn alarm notifications on or off. Default is Off. NOTE When you turn alarm notifications on, Android registers the mobile device with Google C2DM. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 171

188 Configure alarm notifications 4 Save your changes. On Apple and Android devices: tap Save to save your changes and return to the logon screen. On BlackBerry devices: press the Back key, choose Yes to save your changes, then press the Back key again to return to the logon screen. Configure alarm notifications To receive alarm notifications on Mobile app devices, you require the following: The Apple, BlackBerry, or Android push notifications must be configured in Mobile Server. See one of the following sections: "Configure BlackBerry OTA and push notifications" on page 43 "Configuring Apple push notifications" on page 45 "Configure Android OTA and push notifications" on page 48 The Push alarms option must be turned on in Mobile app. See "Turn alarm notifications on and off " on page 172. To view alarms, you must have the Alarm Monitoring and View Alarms Security Center user privileges. For more information, see User privileges in the Security Center Administrator Guide. Turn alarm notifications on and off You can turn alarm notifications on and off from your Mobile app device. IMPORTANT To receive alarm notifications on your Mobile app device, you must configure the alarm push notifications in Mobile Server. See "Configuring Mobile Server" on page Do one of the following: On Apple Multi-Touch devices or Android devices: tap the Options icon. On BlackBerry devices: from the home screen, select the Options icon. 2 Do one of the following: On Apple Multi-Touch devices: tap Push Alarms to select On or Off, tap Save, and then log off and log back on to Mobile app. On BlackBerry devices: select Push Alarms to clear the check box. On Android devices: tap Push alarms to select On or Off, then tap Save. You can also turn off alarms by doing the following: Disable push notifications on your Apple device: a From the Home screen, tap Settings > Notifications > GSC Mobile. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 172

189 Configure alarm notifications b Set each option to OFF. Disable push notifications for each device type Security Center Mobile Server. For more information, see the following sections: "Configure BlackBerry OTA and push notifications" on page 43 "Configuring Apple push notifications" on page 45 "Configure Android OTA and push notifications" on page 48 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 173

190 Use your mobile device on a different server Use your mobile device on a different server You can use your mobile device on a different server, but you may receive duplicate push notifications for the same alarm. As a workaround, do one of the following: On your mobile device, before you log on to a different server, turn push alarms off for your current server. For more information on turning push alarms on and off, see "Turn alarm notifications on and off " on page 172. From the Mobile Admin, delete your mobile device from the server you won t be using. For more information on how to delete a device from the server, see "Delete mobile devices" on page 58. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 174

191 18 Using Mobile app This section explains how to use the main features of Mobile app. This section includes the following topics: "Viewing video" on page 176 "Viewing doors" on page 180 "Viewing alarms" on page 186 "Using Favorites" on page 189 "Searching for specific entities" on page 190 genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 175

192 Viewing video Viewing video With Mobile app, you can view a live video stream from a camera in your Security Center system. On the ipad, you can view up to six video streams. NOTE When opening a new video stream, users are prompted to retry later if the server is too busy (too many video streams already in progress). This section includes the following topics: "Browse and select cameras" on page 176 "Using the camera controls" on page 178 Browse and select cameras You use the Entities browser to find and select the entities you want to view. In Mobile app, the entities in the Entities browser represent the Area entities in your Security Center system. Cameras are grouped under Areas. 1 Open Mobile app. 2 Do one of the following: (iphone, ipod touch, BlackBerry, and Android devices) Tap or select the Entities browser icon. (ipad) Tap the Menu icon, and then select the Entities browser icon. The Entities browser appears. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 176

193 Viewing video 3 Swipe or scroll through the Entities list, and tap or select an entity. If you select an area, a list of cameras linked to the area appears. Cameras are offline when they appear in red. 4 Swipe or scroll through the cameras list, tap a tile (ipad), and tap or select a camera icon. The camera window appears. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 177

194 Viewing video Using the camera controls You can use the controls on the camera window to zoom in and out on the camera display. If available on the camera, you can use the flip (rotate camera 180 degrees) and PTZ features. You can also take a snapshot from a live video camera and save it to the photo library on the mobile device. Task Apple Multi-Touch device Blackberry Bold BlackBerry Storm/ Torch Android devices Zoom in/out 1 Pinch screen. Press the I button to zoom in, and the O button to zoom out. 2 Tap screen to zoom in. Double-tap screen to zoom out. Pinch screen Press the Menu key, and select Zoom in or Zoom out. Change display orientation Rotate device. The display adjusts to the new orientation. 3 Not supported Rotate device. The display adjusts to the new orientation. Rotate device. The display adjusts to the new orientation. Pan and tilt 1 Swipe left/right to pan. Swipe up/down to tilt. Move Up/Down/ Left/Right on the trackpad. Swipe left/right to pan. Swipe up/down to tilt. Swipe left/right to pan. Swipe up/down to tilt. Flip the image 180 degrees Tap the flip icon. Press the Menu key, and select Flip. Press the Menu key, and select Flip. Press the Menu key, and tap Flip. Return PTZ camera to home position 1 Tap the home icon. Press the Menu key, and select Home. Press the Menu key, and select Home. Press the Menu key, and tap Home. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 178

195 Viewing video Task Apple Multi-Touch device Blackberry Bold BlackBerry Storm/ Torch Android devices PTZ presets 1 Select from the available presets. Press the Menu key. Select from the available presets, or press the number of the preset on the keypad. Press the Menu key and select from the available presets. Press the Menu key, tap Preset, and select from the available presets. Take snap shot The image is automatically saved to the device photo library. (ipad) Tap the Snapshot button. (iphone, ipod Touch) Tap the camera icon. Press the Menu key and select Take Snapshot. Press the Menu key and select Take Snapshot. Press the Menu key, and tap Take Snapshot. Maximize or minimize tile (ipad only) Remove entity from tile. (ipad only) Select or deselect tile (ipad only) Return to Entities browser list of cameras. Tap the Fullscreen button. Tap the Clear button. Tap screen to select tile. Double-tap the screen to deselect tile. (ipad) Tap the Menu icon, and then select the Entities browser icon. (iphone, ipod touch). Tap the back button to navigate to the previous area, or tap the Entities browser icon to go to the root entities list. Not applicable Not applicable Not applicable Not applicable Not applicable Not applicable Not applicable Not applicable Not applicable Press the Back key. Press the Back key. Press the Back key. 1. When you perform a PTZ camera operation in the Security Center Mobile app, that camera appears in Security Desk as being locked by an administrator, even if you are not logged on to the Mobile app as an administrator. 2. In the previous version of Security Center Mobile, the +/- buttons were used to zoom in and out. In this version, the I/O buttons are used to zoom in and out. This may be initially confusing because the BlackBerry keyboard shares the same key for I and -, and the same key for O and Make sure that the lock orientation feature on your Apple device is disabled. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 179

196 Viewing doors Viewing doors With Security Center Mobile you can view the status of access points (doors and elevators) in your Security Center system, and perform door-related actions such as locking and unlocking, or overriding lock/unlock rules. You can also view live video from any cameras associated with your doors or elevators. This section includes the following topics: "Browse and select doors" on page 180 "Viewing door events" on page 181 "Using door controls" on page 183 Browse and select doors You use the entities browser to find and select the doors you want to view. In Security Center Mobile Client, the doors in the Entities Browser represent the door entities in your Security Center system. Doors can be listed as individual entities, or as entities within areas, depending on how they are configured in your Security Center system. 1 Open Mobile app. 2 Do one of the following: (iphone, ipod touch, BlackBerry, and Android devices) Tap or select the Entities browser icon. (ipad) Tap the Menu icon, and then select the Entities browser icon. The Entities browser appears. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 180

197 Viewing doors Viewing door events 3 Swipe or scroll through the Entities list, select a tile (ipad), and tap or select a Door icon. If you don t see a Door icon in the root entities list, tap or select an area, and then tap or select a Door icon. Doors are offline when they appear in red. The door window appears. The Door window displays the various door-related events and actions as they occur in Security Center. For more information on door events The door events are: Access granted. The most common event. Access has been granted through a door to a cardholder according to the access rules governing the door or area. (iphone) Access granted: no associated cameras (iphone) Access granted: with associated cameras Access denied. Access has been denied to a door according to the access rules governing the door or area. Cardholders can be denied access for the following reasons: Unassigned credential. At a door or area, a credential has been used that has not been assigned to any cardholder. Unknown credential. A credential has been used that is unknown to the Security Center. Expired credential. An expired credential has been used. Inactive credential. A credential with an inactive profile has been used. Lost credential. A credential that has been declared as lost has been used. Stolen credential. A credential that has been declared as stolen has been used. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 181

198 Viewing doors Inactive cardholder. A cardholder with an inactive profile has attempted to use his or her credential. Door open too long. The door has been held open for too long. Door forced open. The door has been forced open. This event is unavailable with a readerless door. Door manually unlocked. In Security Desk, a user has manually unlocked a door. Request to exit. Someone has pressed the door release button or has triggered a request to exit motion detector. Hardware tamper. The tamper input on a unit has been triggered. Manual station activated. Someone has pulled the door emergency release (manual pull station). Input trouble - short. A supervised input has detected a short-circuit. Input trouble- open. A supervised input has detected an open-circuit. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 182

199 Viewing doors Using door controls You can use the controls in the Mobile app to perform door-related actions, such as locking/ unlocking a door, or overriding lock/unlock schedules. You can also view live video from cameras associated with doors. For more information on how to control the cameras associated with your doors, see "Using the camera controls" on page 178. Task Apple Multi-Touch device Blackberry Bold BlackBerry Storm/ Torch Android devices View cameras associated to the door Tap Cameras. Tap a camera on Side A, Side B, or tap Do not display a camera to conserve bandwidth (a Door icon is displayed instead of video). Press Menu button and select Change camera. Select a camera on Side A, Side B, or select Do not display a camera to conserve bandwidth (a Door icon is displayed instead of video). Press Menu button, or tap screen, and select Change camera. Select or tap a camera on Side A, Side B, or select Do not display a camera to conserve bandwidth (a Door icon is displayed instead of video). Tap Change camera. Select or tap a camera on Side A, Side B, or select Do not display a camera to conserve bandwidth (a Door icon is displayed instead of video). genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 183

200 Viewing doors Task Apple Multi-Touch device Blackberry Bold BlackBerry Storm/ Torch Android devices Switch to camera controls from the Door window (iphone, ipod Touch) Swipe the door control dashboard to the left. Press Menu button and select Full Menu. Press Menu button, or tap screen, and select Full Menu. Press Menu button. (ipad) Not required. Door and video controls both displayed. Unlock door for a few seconds Tap the lock/unlock icon. Press Menu button and select Unlock. Press Menu button, or tap screen, and select Unlock. Tap the lock/unlock icon. View override options Tap the Override button. Press Menu button and select Override lock schedule. Press Menu button, or tap screen, and select Override lock schedule. Tap the Override button. Unlock for maintenance mode From the override options window, tap the Maintenance mode icon, then tap Apply. From the override options window, select Maintenance mode, then select OK. From the override options window, select Maintenance mode, then select OK. From the override options window, tap the Maintenance mode icon, then tap Apply. Specify an override schedule From the override options window, tap the temporary override icon, and configure the settings as follows: Tap Lock or Unlock. Tap Relative, then specify a fixed override duration. Tap Absolute, then specify a beginning and end for the override. Tap Apply. From the override options window, select Temporarily override lock schedule, click OK, then configure the settings as follows: Select Locked or Unlocked. Select Override for a fixed duration, then specify the duration. Select Schedule an override, then specify a beginning and end for the override. Select OK. From the override options window, select Temporarily override lock schedule, click OK, then configure the settings as follows: Select Locked or Unlocked. Select Override for a fixed duration, then specify the duration. Select Schedule an override, then specify a beginning and end for the override. Select OK. From the override options window, tap the temporary override icon, and configure the settings as follows: Tap Lock or Unlock. Tap Relative, then specify a fixed override duration. Tap Absolute, then specify a beginning and end for the override. Tap Apply. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 184

201 Viewing doors Task Apple Multi-Touch device Blackberry Bold BlackBerry Storm/ Torch Android devices Cancel overrides From the door window, tap the Override button. From the door window, press the Menu button, then select Cancel overrides. From the door window, press the Menu button, or tap screen, then select Cancel overrides. From the door window, tap the Override button. Change display orientation Rotate device. The display adjusts to the new orientation. 1 Not supported Rotate device. The display adjusts to the new orientation. Rotate device. The display adjusts to the new orientation. 1. Make sure that the lock orientation feature on your Apple device is disabled. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 185

202 Viewing alarms Viewing alarms With Security Center Mobile you can receive, view, and acknowledge alarms from Security Center. You can also turn on and off alarm notification. This section includes the following topics: "About alarm notifications" on page 186 "View an alarm" on page 186 About alarm notifications View an alarm Security Center Mobile uses push notifications to alert you to new alarms in Security Center. IMPORTANT To receive alarm notifications, you need to configure the Mobile app push notifications. See "Configure alarm notifications" on page 172. On BlackBerry devices, alarm notifications appear as a pop-up on your screen. On Apple Multi-Touch devices: If Security Center Mobile is not open or is running in the background, then a popup appears, and a numbered badge appears on the GSC Mobile icon showing the current number of unacknowledged alarms. If Security Center Mobile is running, then a sound alerts you to a new alarm, a popup appears, and a numbered badge appears on the Alarm tab. (ipad) The number of active alarms is displayed in brackets in the title bar. On Android devices, alarm notifications are displayed in the notification bar at the top of the screen, to the left of the other indicator icons (battery level, signal strength, etc). You can choose to View the alarm or Ignore the alarm. When you ignore the alarm, the alarm appears as an unacknowledged alarm in the Alarm window. You can view a list of all unacknowledged Security Center alarms from the Alarms window. From each alarm window you can view information about the alarm, including the event that triggered it, when it was triggered, and the alarm s identification number. You can also view a live video stream from cameras that are attached to the alarm, and acknowledge the alarm. NOTE Acknowledged alarms do not appear in the Mobile app. 1 Open Mobile app. 2 Do one of the following: (iphone, ipod touch, BlackBerry) Tap or select the Alarms icon. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 186

203 Viewing alarms (ipad) Tap the Menu icon, and then tap or select the Alarms icon. (Android) Tap or select the Alarms icon. The Alarms window appears. 3 On BlackBerry devices, you can acknowledge the alarm from the Alarms window. Press the Menu key, and select Acknowledge Alarm. 4 On Android devices, acknowledge an alarm by touching and holding the alarm until the Acknowledge window pops up, then tap Acknowledge. 5 To acknowledge all alarms that appear in the Alarms window, do one of the following: On Apple Multi-Touch devices, tap Ack All. NOTE (ipad only) After you tap Ack all, a dialog box appears with only the option to choose Yes. If you don t want to acknowledge all the alarms on the page, tap outside the dialog box. On BlackBerry, press the Menu key, and select Acknowledge All Alarms. NOTE Only the alarms that are displayed on the current page are acknowledged. On Android devices, press the Menu key, and tap Acknowledge All Alarms. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 187

204 Viewing alarms 6 To view alarm details, scroll through the Alarms list, and tap or select an alarm. The alarm window appears. 7 To view a live video stream from a camera attached to the alarm, do one of the following: On Apple Multi-Touch devices and Android devices, under Attached Entities, tap the camera. On BlackBerry select the camera. For information on using the camera controls, see "Using the camera controls" on page To acknowledge the alarm, do one of the following: On Apple Multi-Touch devices and Android devices, tap Acknowledge. On BlackBerry devices, press the Menu key, and select Acknowledge Alarm. genetec.com Security Center Mobile User Guide 3.0 GA Download latest version 188

SV PRO Network Security Appliance Quick Start Guide

SV PRO Network Security Appliance Quick Start Guide SV PRO Network Security Appliance Quick Start Guide This document explains how to set up the SV PRO for use with Omnicast and Security Center Click here for the most recent version of this document. REV.

More information

Security Center CCURE Plugin and Video Integration Guide 3.1. Click here for the most recent version of this guide.

Security Center CCURE Plugin and Video Integration Guide 3.1. Click here for the most recent version of this guide. Security Center CCURE Plugin and Video Integration Guide 3.1 Click here for the most recent version of this guide. Copyright notice 2014 Genetec Inc. All rights reserved. Genetec Inc. distributes this

More information

AutoVu Handbook 5.1 SR2. Click here for the most recent version of this document.

AutoVu Handbook 5.1 SR2. Click here for the most recent version of this document. AutoVu Handbook 5.1 SR2 Click here for the most recent version of this document. Copyright notice 2011, 2012 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that

More information

Getting Started with Security Desk 5.1

Getting Started with Security Desk 5.1 Getting Started with Security Desk 5.1 Copyright notice 2011 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes an end-user license agreement and is furnished

More information

Sipelia User Guide 2.0 GA. Click here for the most recent version of this document.

Sipelia User Guide 2.0 GA. Click here for the most recent version of this document. Sipelia User Guide 2.0 GA Click here for the most recent version of this document. Copyright notice 2015 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes

More information

Security Center Installation and Upgrade Guide 5.2 SR6. Click here for the most recent version of this document.

Security Center Installation and Upgrade Guide 5.2 SR6. Click here for the most recent version of this document. Security Center Installation and Upgrade Guide 5.2 SR6 Click here for the most recent version of this document. Copyright notice 2014 Genetec Inc. All rights reserved. Genetec Inc. distributes this document

More information

Map Editor Release Notes December, 2010 EN V (1) Innovative Solutions

Map Editor Release Notes December, 2010 EN V (1) Innovative Solutions Map Editor Release Notes 1.0.29.0 December, 2010 Innovative Solutions COPYRIGHT NOTICE 2010 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes an end user

More information

Security Center Installation and Upgrade Guide 5.5 SR3. Click here for the most recent version of this document.

Security Center Installation and Upgrade Guide 5.5 SR3. Click here for the most recent version of this document. Security Center Installation and Upgrade Guide 55 SR3 Click here for the most recent version of this document Copyright notice Genetec Inc, 2016 Genetec Inc distributes this document with software that

More information

CCURE Access Control Plugin and Video Integration Guide 3.2. Click here for the most recent version of this document.

CCURE Access Control Plugin and Video Integration Guide 3.2. Click here for the most recent version of this document. CCURE Access Control Plugin and Video Integration Guide 3.2 Click here for the most recent version of this document. Document last updated: November 22, 2017 Copyright notice Genetec Inc., 2017 Genetec

More information

Security Center 4.0 SR1

Security Center 4.0 SR1 Security Center 4.0 SR1 Installation and Upgrade Guide Unified Security Platform September 2010 2010 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes

More information

OMNICAST 4.8 LIVE VIEWER USER GUIDE. This document explains how to use the Omnicast Live Viewer application

OMNICAST 4.8 LIVE VIEWER USER GUIDE. This document explains how to use the Omnicast Live Viewer application OMNICAST 4.8 LIVE VIEWER USER GUIDE This document explains how to use the Omnicast Live Viewer application GENETEC OMNICAST 4.8 LIVE VIEWER USER GUIDE Omnicast 4.8 Live Viewer User Guide Document number:

More information

Unified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions

Unified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions Unified Security Platform Security Center 5.4 Hardening Guide Version: 1.0 Innovative Solutions 2016 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes

More information

Security Center 5.2 Installation Guide for NEC Cluster. Click here for the most recent version of this document.

Security Center 5.2 Installation Guide for NEC Cluster. Click here for the most recent version of this document. Security Center 5.2 Installation Guide for NEC Cluster Click here for the most recent version of this document. Copyright notice 2013 Genetec Inc. All rights reserved. Genetec Inc. distributes this document

More information

SV-32 Network Security Appliance Quick Start Guide

SV-32 Network Security Appliance Quick Start Guide SV-32 Network Security Appliance Quick Start Guide This document explains how to set up the SV-32 for use with Security Center 6 Click here for the most recent version of this document. REV. 1 Copyright

More information

Synergis Master Controller Configuration Guide 2.0 GA. Click here for the most recent version of this document.

Synergis Master Controller Configuration Guide 2.0 GA. Click here for the most recent version of this document. Synergis Master Controller Configuration Guide 2.0 GA Click here for the most recent version of this document. Copyright notice 2013 Genetec Inc. All rights reserved. Genetec Inc. distributes this document

More information

SV-16 v2 Network Security Appliance Quick Start Guide

SV-16 v2 Network Security Appliance Quick Start Guide SV-16 v2 Network Security Appliance Quick Start Guide This document explains how to set up the SV-16 v2 for use with Omnicast and Security Center Click here for the most recent version of this document.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

AutoVu Handbook 5.2 SR9. Click here for the most recent version of this guide.

AutoVu Handbook 5.2 SR9. Click here for the most recent version of this guide. AutoVu Handbook 5.2 SR9 Click here for the most recent version of this guide. Copyright notice 2014 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017 GETTING STARTED GUIDE Mobile Admin Version 8.2 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/mobile_admin/mobile_admin_documentation

More information

Security Center Mobile System Requirements 4.1

Security Center Mobile System Requirements 4.1 Security Center Mobile System Requirements 4.1 Security Center Mobile 4.1 system requirements System requirements are the recommended hardware and software components that are required for your product

More information

SV-16 Network Security Appliance Quick Start Guide

SV-16 Network Security Appliance Quick Start Guide SV-16 Network Security Appliance Quick Start Guide This document explains how to set up the SV-16 (image version 1.7) for use with Omnicast and Security Center Click here for the more recent version of

More information

Milestone Systems Milestone Mobile 2013 (Server)

Milestone Systems Milestone Mobile 2013 (Server) Milestone Systems Milestone Mobile 2013 Contents INTRODUCTION... 4 ABOUT MILESTONE MOBILE... 4 PREREQUISITES FOR USING MILESTONE MOBILE... 4 ACCESS XPROTECT WEB CLIENT... 4 SYSTEM REQUIREMENTS... 6 XPROTECT

More information

GETTING STARTED GUIDE. Mobile Admin. Version 8.2

GETTING STARTED GUIDE. Mobile Admin. Version 8.2 GETTING STARTED GUIDE Mobile Admin Version 8.2 Last Updated: April 24, 2018 GETTING STARTED GUIDE: MOBILE ADMIN 2018 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

+ milestone. Milestone Systems. Milestone Mobile client 2017 R3. User Guide

+ milestone. Milestone Systems. Milestone Mobile client 2017 R3. User Guide + milestone Milestone Systems Milestone Mobile client 2017 R3 User Guide Contents Get started... 5 About server and client components of Milestone Mobile... 5 Installing Milestone Mobile server components

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.2 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Frequently Asked Questions

Frequently Asked Questions Application and Document Sharing, page 1 Hosting, Joining, and Setting up Meetings, page 2 Joining a WebEx Meeting or Playing Back a Meeting Recording on Chrome and Firefox, page 4 Cisco WebEx for Mobile

More information

Skynax. Mobility Management System. Installation Guide

Skynax. Mobility Management System. Installation Guide Skynax Mobility Management System Installation Guide Disclaimer Honeywell International Inc. ( HII ) reserves the right to make changes in specifications and other information contained in this document

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Security Center Release Notes 5.2 GA. Click here for the most recent version of this guide.

Security Center Release Notes 5.2 GA. Click here for the most recent version of this guide. Security Center Release Notes 5.2 GA Click here for the most recent version of this guide. Copyright notice 2013 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that

More information

Security Center Release Notes 5.1 SR3 Service Pack 5. Click here for the most recent version of this guide.

Security Center Release Notes 5.1 SR3 Service Pack 5. Click here for the most recent version of this guide. Security Center Release Notes 5.1 SR3 Service Pack 5 Click here for the most recent version of this guide. Copyright notice 2013 Genetec Inc. All rights reserved. Genetec Inc. distributes this document

More information

Avigilon Control Center Gateway User Guide. Version 6.6

Avigilon Control Center Gateway User Guide. Version 6.6 Avigilon Control Center Gateway User Guide Version 6.6 2006-2017, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS.AVIGILON,

More information

exacqvision Web Service Configuration User Manual Version 9.4

exacqvision Web Service Configuration User Manual Version 9.4 exacqvision Web Service Configuration User Manual Version 9.4 www.exacq.com 1 of 12 June 12, 2018 Information in this document is subject to change without notice. Copyright 2008-2018, Exacq Technologies,

More information

Security Center Release Notes 5.2 SR3. Click here for the most recent version of this guide.

Security Center Release Notes 5.2 SR3. Click here for the most recent version of this guide. Security Center Release Notes 5.2 SR3 Click here for the most recent version of this guide. Copyright notice 2013 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software

More information

Plan Manager User Guide 10.3

Plan Manager User Guide 10.3 Plan Manager User Guide 10.3 Copyright notice 2014 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes an end-user license agreement and is furnished under

More information

Receiver for BlackBerry 2.2

Receiver for BlackBerry 2.2 Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

INSITES CONNECT ADMINISTRATION GUIDE. Version 1.4.3

INSITES CONNECT ADMINISTRATION GUIDE. Version 1.4.3 INSITES CONNECT ADMINISTRATION GUIDE Version 1.4.3 CONTENTS GETTING STARTED... 2 Version Compatibility... 2 Installing the InSites Connect app... 2 APP CONFIGURATION... 4 CONFIGURING PUSH NOTIFICATIONS...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

SonicWall Mobile Connect ios 5.0.0

SonicWall Mobile Connect ios 5.0.0 SonicWall Mobile Connect ios 5.0.0 October 2017 These release notes provide information about the SonicWall Mobile Connect ios 5.0.0 release. Topics: About Mobile Connect ios 5.0.0 Supported Platforms

More information

Installation Guide. Qlik Sense Copyright QlikTech International AB. All rights reserved.

Installation Guide. Qlik Sense Copyright QlikTech International AB. All rights reserved. Installation Guide Qlik Sense 2.0.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,

More information

AMS Device View Installation Guide. Version 2.0 Installation Guide May 2018

AMS Device View Installation Guide. Version 2.0 Installation Guide May 2018 AMS Device View Installation Guide Version 2.0 Installation Guide May 2018 Disclaimer The contents of this publication are presented for informational purposes only, and while every effort has been made

More information

Avigilon Control Center Gateway User Guide. Version 5.8

Avigilon Control Center Gateway User Guide. Version 5.8 Avigilon Control Center Gateway User Guide Version 5.8 2006-2016, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACCAVIGILON, the AVIGILON logo, AVIGILON

More information

Installation Guide - Windows

Installation Guide - Windows Kony Visualizer Enterprise Installation Guide - Windows Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version

More information

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017 INSTALLATION GUIDE Patch Manager Version 2.1.5 Last Updated: September 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/patch_manager/patch_manager_documentation

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Installation Guide - Mac

Installation Guide - Mac Kony Visualizer Enterprise Installation Guide - Mac Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version

More information

Supporting Apple ios Devices

Supporting Apple ios Devices Supporting Apple ios Devices 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Installing and Configuring hopto Work. System Requirements Be sure you have these system requirements to install and use hopto Work.

Installing and Configuring hopto Work. System Requirements Be sure you have these system requirements to install and use hopto Work. Installing and Configuring hopto Work To configure and install hopto Work on your Microsoft Windows server, you ll need to have Administrator status. Note: The recommended setup is that Active Directory

More information

GoldMine Connect Installation Guide

GoldMine Connect Installation Guide GoldMine Connect Installation Guide For GoldMine Web Release 2018.1 November 2017 490 N McCarthy Bld., Suite 100 Milpitas, CA 95035 USA TEL: 800.776.7889 www.goldmine.com Copyright Notice This document

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Avaya Desktop Collector Snap-in R GA Release Notes

Avaya Desktop Collector Snap-in R GA Release Notes Avaya Desktop Collector Snap-in R3.3.0.0.0 GA Release Notes 07 July 2017 1 Contents 1. Document changes... 3 2. Introduction... 4 3. Feature Descriptions... 6 4. Desktop Agent Widget in Oceana Workspaces...

More information

4.8 SR2 Installation and Upgrade Guide August 27, 2012

4.8 SR2 Installation and Upgrade Guide August 27, 2012 4.8 SR2 Installation and Upgrade Guide August 27, 2012 Click here for the most recent version of this document. EN.100.002-V4.8.C2(1) Innovative Solutions COPYRIGHT NOTICE 2011, 2012 Genetec Inc. All rights

More information

SolarWinds. Patch Manager. Evaluation Guide. Version 2.1.2

SolarWinds. Patch Manager. Evaluation Guide. Version 2.1.2 This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. SolarWinds Patch Manager Version 2.1.2 Evaluation Guide Last Updated: Friday, June 3, 2016 1 About SolarWinds

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Milestone Systems. XProtect VMS 2017 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+

Milestone Systems. XProtect VMS 2017 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Milestone Systems XProtect VMS 2017 R2 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and purpose...

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push

More information

+ milestone. Milestone Systems. XProtect VMS 2017 R3. System Architecture Document

+ milestone. Milestone Systems. XProtect VMS 2017 R3. System Architecture Document + milestone Milestone Systems XProtect VMS 2017 R3 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and

More information

Symantec pcanywhere 12.5 SP4 Release Notes

Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

ADDITIONAL GUIDES Customer SAP Enable Now System Requirements Customer

ADDITIONAL GUIDES Customer SAP Enable Now System Requirements Customer 2019 SAP SE or an SAP affiliate company. All rights reserved. ADDITIONAL GUIDES Customer 1902 2019-02-01 Customer Table of Contents 1 Introduction... 3 1.1 What is the Cloud Edition?... 4 1.2 Cloud Edition

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

Mobile Access Guide SuccessMaker 9

Mobile Access Guide SuccessMaker 9 Document last updated February 10, 2017 Copyright 2017 Pearson Education, Inc. or one or more of its direct or indirect affiliates. All rights reserved. Pearson and SuccessMaker are registered trademarks,

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

User Manual. (updated March 27, 2014) Information in this document is subject to change without notice.

User Manual. (updated March 27, 2014) Information in this document is subject to change without notice. User Manual (updated March 27, 2014) Information in this document is subject to change without notice. Copyright 2013-2014, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark

More information

Supporting ios Devices

Supporting ios Devices Supporting ios Devices 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners.

More information

Networked Video Surveillance That Goes Beyond Your Expectations. Innovative Solutions

Networked Video Surveillance That Goes Beyond Your Expectations. Innovative Solutions Networked Video Surveillance That Goes Beyond Your Expectations Innovative Solutions Omnicast is the IP video surveillance system of the Security Center, Genetec s unified security platform. Organizations

More information

Sage 200c Professional. System Requirements and Prerequisites

Sage 200c Professional. System Requirements and Prerequisites Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter

More information

Sage 200c Professional. System Requirements and Prerequisites

Sage 200c Professional. System Requirements and Prerequisites Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter

More information

RealPresence Media Manager

RealPresence Media Manager RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 USER GUIDE Software 6.7 January 2015 3725-75302-001A RealPresence Media Manager Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 4.0 June 22, 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

SV-32 Network Security Appliance Quick Start Guide

SV-32 Network Security Appliance Quick Start Guide SV-32 Network Security Appliance Quick Start Guide This document explains how to set up the SV-32 for use with Security Center Click here for the most recent version of this document. REV. 1 SV-32 Quick

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Milestone Systems. Milestone Mobile client 2017 R1. User Guide

Milestone Systems. Milestone Mobile client 2017 R1. User Guide Milestone Systems Milestone Mobile client 2017 R1 User Guide Contents Get started... 5 About server and client components of Milestone Mobile... 5 Installing Milestone Mobile server components (administrators)...

More information

IBM Case Manager Mobile Version Users' Guide IBM SC

IBM Case Manager Mobile Version Users' Guide IBM SC IBM Case Manager Mobile Version 1.0.0.8 Users' Guide IBM SC27-4573-07 This edition applies to version 1.0.0.8 of IBM Case Manager Mobile (product number 5725-W63) and to all subsequent releases and modifications

More information

Instruction Manual. Vimar By-web KNX Software for Apple mobile devices User Manual

Instruction Manual. Vimar By-web KNX Software for Apple mobile devices User Manual Instruction Manual Vimar By-web KNX Software for Apple mobile devices User Manual Vimar End-User License Contract Vimar end-user license contract VIMAR SPA located in Marostica (VI), Viale Vicenza n.

More information

Setup Guide Revised: April 4, 2012 Developed by: www.discoverysoftware.com COPYRIGHT, DISCOVERY SOFTWARE LTD.: April 4, 2012: This material may not be copied or otherwise reproduced in any form, by any

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Oracle Cloud. Using Oracle Social Network Release E

Oracle Cloud. Using Oracle Social Network Release E Oracle Cloud Using Oracle Social Network Release 11.1.11.0 E61996-01 November 2015 Oracle Cloud Using Oracle Social Network, Release 11.1.11.0 E61996-01 Copyright 2012, 2015 Oracle and/or its affiliates.

More information

Relativity's mobile app Guide

Relativity's mobile app Guide Relativity's mobile app Guide March 2, 2016 - Version 1.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

CA Nimsoft Monitor for Flow Analysis

CA Nimsoft Monitor for Flow Analysis CA Nimsoft Monitor for Flow Analysis Release Notes Release 1.1 Document Revision History Document Version Date Changes 1.1 11/30/2012 Updated for Flow Analysis 1.1 release 1.0 9/29/2012 Initial version

More information

Axon Commander Installation Guide

Axon Commander Installation Guide Axon Commander Installation Guide Axon Commander Version 4.14 Release Date: July, 2018 Document Revision: A Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries.

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

KeyNexus Hyper-V Deployment Guide

KeyNexus Hyper-V Deployment Guide v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

One Identity Active Roles 7.2. Web Interface Administrator Guide

One Identity Active Roles 7.2. Web Interface Administrator Guide One Identity Active Roles 7.2 Web Interface Administrator Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Avigilon Control Center Server User Guide. Version 5.8

Avigilon Control Center Server User Guide. Version 5.8 Avigilon Control Center Server User Guide Version 5.8 2006-2016, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACCAVIGILON, the AVIGILON logo, AVIGILON

More information

Siebel Mobile Guide: Disconnected Siebel Innovation Pack 2015, Rev. D

Siebel Mobile Guide: Disconnected Siebel Innovation Pack 2015, Rev. D [1]Siebel CRM Siebel Mobile Guide: Disconnected Siebel Innovation Pack 2015, Rev. D E52427-01 September 2016 Siebel Mobile Guide: Disconnected, Siebel Innovation Pack 2015, Rev. D E52427-01 Copyright 2005,

More information

KACE GO Mobile App 5.0. Release Notes

KACE GO Mobile App 5.0. Release Notes KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

vcenter CapacityIQ Installation Guide

vcenter CapacityIQ Installation Guide vcenter CapacityIQ 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

One Identity Active Roles 7.2

One Identity Active Roles 7.2 One Identity December 2017 This document provides information about the Active Roles Add_on Manager7.2. About Active Roles Add_on Manager New features Known issues System requirements Getting started with

More information