SecurOS Administration Guide
SecurOS Administration Guide
Administration Guide
SecurOS Administration Guide (AG - EN, build 2 on 20.09.2013).
Printed in US.
Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Administration Guide
Contents
Contents
1 Preface 9
1.1 Scope
........................................................................... 9
1.2 Target
. . . Audience
........................................................................ 9
1.3 Using
. . .This
. . . .Manual
.................................................................... 9
1.4 Getting
. . . .Technical
. . . . . . . . .Support
.............................................................. 9
1.5 SecurOS
. . . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
...................................................... 10
1.6 Design
. . . . .Convention
...................................................................... 10
1.7 Design
. . . . .Elements
...................................................................... 11
3 SecurOS Installation 22
3.1 Installing
. . . . . . .And
. . . .Configuring
. . . . . . . . . . The
. . . .Configuration
. . . . . . . . . . . . Server
...................................... 22
3.1.1 Installing
. . . and
. . . .Configuring
. . . . . . . . . . the
. . . .SecurOS
. . . . . . . on
. . .Video
. . . . . Server
................................................. 22
3.1.1.1 Hardware Installation .......................................................................... 22
3.1.1.1.1 Guardant .Key . . . Installation
...................................................................... 22
3.1.1.1.2 TVISS Boards . . . . .Installation
. . . . . . . . .and
. . .Cameras
. . . . . . . .Connection
................................................. 22
3.1.1.2 License Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1.1.2.1 The Key is . .a. part
. . . .of
. .a. product
................................................................ 23
www.isscctv.com
SecurOS 4 Administration Guide
Contents
5 Core Subsystem 73
5.1 Working
. . . . . .Principles
..................................................................... 73
5.2 Object
. . . . Reference
....................................................................... 73
5.2.1 System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
www.isscctv.com
SecurOS 5 Administration Guide
Contents
5.2.2 Security
. . Zone
................................................................................... 75
5.2.2.1 Setting Up Event
. . .Redirection
....................................................................... 76
5.2.3 Department
..................................................................................... 78
5.2.4 User Account
..................................................................................... 78
5.2.5 Active .Directory
. . . . . . . .Storage
............................................................................ 79
5.2.6 User Rights
..................................................................................... 80
5.2.7 Computer..................................................................................... 83
5.2.7.1 Servers to connect .......................................................................... 86
5.2.7.1.1 Operations . .with
. . . .the
. . .Servers
. . . . . . to
. . connect
. . . . . . .List
.................................................. 87
5.2.7.1.2 Servers to. .connect
. . . . . . List
. . . .Operations
. . . . . . . . .Rules
..................................................... 87
5.2.7.2 Auto login .......................................................................... 88
5.2.8 Monitoring
. . . . .center
. . . . . agent
........................................................................... 89
5.2.9 Remote . .system
................................................................................... 90
5.2.10 Area Zone
..................................................................................... 91
5.2.11 Region..................................................................................... 91
5.2.12 Event. Filter
.................................................................................... 92
5.2.13 SNMP. .agent
................................................................................... 95
5.2.13.1 Setting up Windows . . . . . .Management
. . . . . . . . . . .and
. . .Monitoring
. . . . . . . . .Tools
............................................. 95
5.3 Configuration
. . . . . . . . . . .Examples
................................................................ 96
5.3.1 Defining
. . .Access
. . . . . .Levels
. . . . . .to
. . Individual
. . . . . . . . .Objects
........................................................... 96
5.3.2 Configuration
. . . . . . .of
. . Network
. . . . . . . .Domain
. . . . . . .User
. . . .Rights
......................................................... 97
5.3.2.1 Settings for Windows . . . . . .NT
. . .Provider
................................................................. 97
5.3.2.2 Settings for LDAP . . . Provider
....................................................................... 98
6 Interface Subsystem 99
6.1 Maps
. . . Working
. . . . . . . .Principles
................................................................ 99
6.1.1 Map Creation
..................................................................................... 99
6.1.2 Drawing
. . . Map
. . . . .Layers
............................................................................. 100
6.1.3 Moving
. . .Map
. . . .Objects
. . . . . . .onto
. . . .Operator
. . . . . . . .Workstations
........................................................... 101
6.2 Object
. . . . . Reference
...................................................................... 102
6.2.1 Desktop
..................................................................................... 102
6.2.2 Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
6.2.2.1 Working with Map . . . . Layers
...................................................................... 103
6.2.2.2 Placing, Moving . . .and
. . .Rotating
. . . . . . . Objects
. . . . . . .on
. .Map
.................................................... 104
6.2.2.3 Performing Additional
. . . . . . . Operations
. . . . . . . . . on
. . .Objects
....................................................... 105
6.2.3 Map v2..................................................................................... 106
6.2.3.1 Working with Map
. . . . Layers
...................................................................... 109
6.2.3.2 Placing Objects. . .on
. .Map
..................................................................... 110
6.2.3.3 Setting Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.2.3.4 Setting Passwords
.......................................................................... 112
6.2.4 Event. Viewer
.................................................................................... 112
6.2.5 External
. . . Window
.................................................................................. 113
6.2.6 HTML. Form
.................................................................................... 114
6.2.7 HTML. Dialog
.................................................................................... 114
6.3 Setting
. . . . . .Map
. . . .v2
................................................................. 115
www.isscctv.com
SecurOS 6 Administration Guide
Contents
7.3.4 Archive
. . .Recording
.................................................................................. 118
7.3.4.1 Disk Volume Settings
.......................................................................... 118
7.3.4.2 Video Recording
. . . Settings
....................................................................... 119
7.3.4.3 Long-term Archive
. . . . .Settings
. . . . . . .And
. . . Archive
. . . . . . .Converter
.................................................... 120
7.4 Export
. . . . . Video
. . . . . .Using
. . . . . Monitor
........................................................... 120
7.5 Object
. . . . . Reference
...................................................................... 121
7.5.1 System. . .Objects
.................................................................................. 121
7.5.1.1 Video Capture. .Devices
........................................................................ 122
7.5.1.2 Video Capture. .Device
........................................................................ 122
7.5.1.3 Camera .......................................................................... 125
7.5.1.4 Zone .......................................................................... 132
7.5.1.5 Light Detector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
7.5.1.6 PTZ Controller.......................................................................... 137
7.5.1.7 PTZ Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
7.5.1.8 Archive Converter
.......................................................................... 139
7.5.1.9 Archiver .......................................................................... 144
7.5.1.10 Image Processor
.......................................................................... 146
7.5.2 User Interface
. . . . . . . . Objects
............................................................................. 146
7.5.2.1 Monitor .......................................................................... 147
7.5.2.2 Archive Converter . . . . Dialog
...................................................................... 151
7.5.2.3 Archiver Dialog .......................................................................... 152
7.6 Configuration
. . . . . . . . . . . .Examples
............................................................... 153
7.6.1 Standalone
. . . . . .Configuration
............................................................................... 153
7.6.2 Video. Server
. . . . . .+
. .Operator
. . . . . . . .Workstation
.................................................................... 154
7.6.3 Setting. . Up
. . . Camera
................................................................................ 155
7.6.3.1 Adding Video .Capture . . . . . . .Device
.................................................................. 155
7.6.3.2 Adding Camera . . .to. .System
..................................................................... 156
7.6.3.3 Adding Camera . . .to. .Monitor
..................................................................... 157
7.6.3.4 Adding User Rights .......................................................................... 158
7.6.3.5 Setting up telemetry .......................................................................... 159
7.6.3.5.1 Setting up . . .telemetry
. . . . . . . for
. . .IP
. .devices
........................................................... 159
7.6.3.5.1.1 Separate . . . . . .Telemetry
. . . . . . . . Control
............................................................ 161
7.6.3.5.2 Setting up . . .telemetry
. . . . . . . with
. . . .PTZ
. . . .Controller
. . . . . . . .Creation
................................................ 162
7.6.4 Joystick
. . . Configuration
.................................................................................. 165
www.isscctv.com
SecurOS 7 Administration Guide
Contents
9.2 Configuring
. . . . . . . . . .System
. . . . . . .to
. .Work
. . . . .with
. . . . Wiper
............................................... 181
14 Appendixes 201
14.1 Appendix
. . . . . . . . .A.
. .Upgrading/Uninstalling
. . . . . . . . . . . . . . . . . . . . .Software
........................................... 201
14.1.1 Upgrading
. . . . . . Software
............................................................................... 201
14.1.2 Uninstalling
. . . . . . . .Software
............................................................................. 201
14.1.3 Release
. . . .6.2
. . .Updating
. . . . . . . . Procedure
...................................................................... 202
14.1.3.1 Software Updating . . . . . .On
. . .Configuration
. . . . . . . . . . .Server
...................................................... 203
14.1.3.2 Updating Software . . . . . .On
. . .Peripheral
. . . . . . . .Servers
......................................................... 203
14.2 Appendix
. . . . . . . . .B.
. . Quick
. . . . . .Video
. . . . .Subsystem
. . . . . . . . . . Configuration
........................................... 204
14.3 Appendix
. . . . . . . . .C.
. . System
. . . . . . .Utilities
......................................................... 205
14.3.1 ISS Hardware
. . . . . . . . .Report
. . . . . .Utility
...................................................................... 206
14.3.2 ISS System
. . . . . . .Report
. . . . . . Utility
........................................................................ 207
14.3.3 ISS Media
. . . . . .Export
. . . . . .Utility
......................................................................... 209
14.3.3.1 Export Settings . . . dialog
....................................................................... 210
14.3.3.2 Command-line . . .parameters
....................................................................... 212
14.3.4 gtUSB
. . .Configuration
. . . . . . . . . . . .Utility
...................................................................... 213
14.3.5 ISS Startup
. . . . . . .Configuration
. . . . . . . . . . . .Utility
.................................................................. 215
www.isscctv.com
SecurOS 8 Administration Guide
Contents
14.3.6 DSAdmin
. . . . . Utility
................................................................................ 216
14.3.7 ISS Database
. . . . . . . . .Update
. . . . . .Utility
...................................................................... 217
14.3.8 ISS Object
. . . . . . Types
. . . . . .Database
. . . . . . . .Editor
................................................................. 218
14.3.8.1 Names Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
14.3.8.2 Events Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
14.3.8.3 Reacts Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
14.3.8.4 Markers Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
14.3.8.5 States Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
14.3.8.6 State Rules Tab .......................................................................... 225
14.4 Appendix
. . . . . . . . .D.
. . TCP/IP
. . . . . . .Ports
. . . . .Used
. . . . .by
. .SecurOS
............................................. 227
14.5 Appendix
. . . . . . . . .E.
. .Additional
. . . . . . . . . Windows
. . . . . . . . .Settings
.............................................. 229
14.5.1 Installing
. . . . . Multimedia
. . . . . . . . . .Components
. . . . . . . . . . . and
. . . .Services
. . . . . . . .under
. . . . .MS
. . . Windows
. . . . . . . . .Server
. . . . . 2008
. . . . .R2
.................... 229
14.5.2 SMTP. . Mail
. . . . Server
. . . . . . Installation
. . . . . . . . . .and
. . . .Configuration
........................................................... 229
14.5.3 Windows
. . . . . XP/Vista/Win7
. . . . . . . . . . . . .Automatic
. . . . . . . . .Login
. . . . .Configuration
..................................................... 232
14.5.4 Disabling
. . . . . Disk
. . . . .Cleanup
. . . . . . .Master
.................................................................... 233
14.6 Appendix
. . . . . . . . .F.
. .Technical
. . . . . . . . .Support
. . . . . . . Information
................................................ 233
Index 235
www.isscctv.com
SecurOS 9 Administration Guide
Preface
1 Preface
This section contains general information about the document, the means of its design and use, as well
as on how to get additional technical support for the product.
1.1 Scope
Current manual provides general information about SecurOS architecture, describes the process of
configuring security network and system objects, gives some troubleshooting tips and
recommendations.
It is assumed that the user have already deployed the security network physically and installed
SecurOS software on all computers of this network.
To get online help (Microsoft HTML Help) just press F1 key when running SecurOS in administration
mode. You can get context help for the given object by pressing F1 key when its settings window is
active.
If you have any questions after reading this manual, please address them to your system administrator
or supervisor.
For any further information you can contact our Technical Support Team:
in USA:
phone: +1 732 855 1111 (Monday to Friday, 9am - 6pm EST);
e-mail: [email protected]
www.isscctv.com
SecurOS 10 Administration Guide
Preface
in Russia:
phone: +7 (495) 645 21 21 (Monday to Thursday, 9am - 6pm MST; Friday 9am - 5pm MST);
e-mail: [email protected]
in Brazil:
phone: +55 11 2262 2894 (Monday to Friday, 9am - 6pm BRST);
e-mail: [email protected]
in Chile:
phone: +56 2 897 7320 (Monday to Friday, 9am - 6pm CLST);
e-mail: [email protected]
in Peru:
phone: +51 1 711 8465 (Monday to Friday, 9am - 6pm CLST);
e-mail: [email protected]
SecurOS Enterprise;
SecurOS Prof essional;
SecurOS Xpress;
SecurOS Lite.
For the product designation regardless of its edition the SecurOS united term is used in the framework
of the given document.
Sections that describe the functionality available for some editions are marked by the special footnote
which example is presented below:
Font Description
www.isscctv.com
SecurOS 11 Administration Guide
Preface
Font Description
bold italic type Used to mark out the elements of homogeneous lists.
Used to mark out macros text and programming code, file names
and paths to them. Also it is used to specify the necessary options,
monospace
to mark out values specified by the user from the keyboard
(manually).
Additional Information
Used to display a complementary information. The element contains, for example, the description of embodiments
of the operation or reference to additional literature.
www.isscctv.com
SecurOS 12 Administration Guide
Purpose, Implementation And Operation Principles
Computers of the SecurOS network are distinguished by their functionality and have specific roles in
network configuration management procedure.
This section contains general information on types of SecurOS servers and workstations, their intended
purposes, basic capabilities and operational specifics.
Video Server.
Operator Workstation.
Administrator Workstation.
Application Server.
The system administrator defines the installation type while planning the system architecture and sets
it during the installation procedure. On each computer on the network only one installation type is
allowed. A brief description of the installation types can be seen below.
www.isscctv.com
SecurOS 13 Administration Guide
Purpose, Implementation And Operation Principles
The Application Server implements all the Video Server functionality except for connecting cameras, and
receiving video and audio streams. Using the Application Server one can also administrate the SecurOS
security network.
The Administrator Workstation is a client computer similar to the operator workstation but has an
additional administrator interface for configuring the security network. On such a computer one can
perform the following administrator operations:
Actual system configuration is updated and then duplicated to each network server with the help of
Conf iguration Server. Conf iguration Server is the dedicated network server which implements enhanced
functionality against typical.
Conf iguration Server is assigned during system installation and can not be reassigned at system
operation. Conf iguration Server can be represented by any of the typical network computers — Video
Server, Application Server or Administrator Workstation.
Warning! The only one network server can be assigned Conf iguration Server.
In the SecurOS Xpress, SecurOS Lite editions Video Server implements the configuration server.
www.isscctv.com
SecurOS 14 Administration Guide
Purpose, Implementation And Operation Principles
Actual system configuration is stored on the Conf iguration Server. Each of Peripheral Servers stores
working copy of the system configuration.
2.1.1.2.2 Peripheral Server
The Peripheral Server is an any of network servers, except Conf iguration Server. Peripheral server is
assigned during the system installation and can be represented by any of the typical network
computers — Video Server, Application Server or Administrator Workstation.
Warning!
1. Peripheral Server can't apply configuration changes independently.
2. Operation period is restricted for the Peripheral Servers not connected to the Conf iguration
Server. If connection with the Conf iguration Server is not resumed within 90 days of
disconnection then system will automatically shutdown on given Peripheral Server and all
Operator Workstations connected to it.
At the initial system configuring Conf iguration Server must be adjusted (i. e. installed and configured)
first (see Installing And Configuring The Configuration Server section).
Note. Described algorithm is applicable to the any type of operations with tree's objects and its settings,
including creating, editing and deleting.
1. Using any of Peripheral Servers administrator (or operator) changes tree structure and/or object
settings for that Computer (or Computers), configuration of which is need to be modified.
2. Peripheral Server used to modify configuration generates an appropriate request to the Conf iguration
Server.
Notes:
1. If Conf iguration Server is used to modify configuration changes are applied on Conf iguration Server
directly, with no request.
2. When Conf iguration Server is unavailable it's not possible to modify system configuration using
Peripheral Server.
3. Conf iguration Server processes received request and applies changes first renewing it's own objects
tree and objects settings, than generates and sends to each of the Peripheral Servers a command to
update state of the appropriate objects in its working copies. If Peripheral Server is switched off when
changes must be applied, the command will be sent when connection with the Conf iguration Server
will be restored.
4. Having received the command to update its working copy each of the Peripheral Servers applies the
www.isscctv.com
SecurOS 15 Administration Guide
Purpose, Implementation And Operation Principles
Note. The queries are processed by Conf iguration Server consistently in order of creation. Only one request is
processed by Conf iguration Server at the moment. The next request processing is locked until current request is
closed and changes are applied on the Conf iguration Server.
The configuration can be restored from backup copy. Backup copy can be created by any of network
servers, but restore procedure can be executed only on the Conf iguration Server.
Warning! Only backup copy of the currently installed SecurOS version is applicable.
This section describes basic system configurations determined by type and number of used SecurOS's
servers and workstations.
In certain cases it may be required to create several independent security systems with a single top level
control center. This case is possible, for example, for banking area, when all branches are monitored
with the help of single Monitoring Center.
Two types of the Monitoring Center differing by functionality can be created and configured within
SecurOS:
1. Monitoring Center working with remote video archives;
2. Monitoring Center working with local video archives.
www.isscctv.com
SecurOS 16 Administration Guide
Purpose, Implementation And Operation Principles
Remote security system is controlled and monitored via a set of objects, which are created on the
Monitoring Center server when it is configured (see Remote system). To work with video stream, the
copies of cameras presented in the remote system are created on the Monitoring Center's server. The
operator can perform different actions with the video depending on the Monitoring Center type: in the
first case, the video stream is only available for viewing (access to the archive file created by the remote
system camera is allowed), and in the second case can be recorded locally on the Monitoring Center
server (access to the archive file created by the remote system camera is forbidden).
Monitoring Center working with remote video archives allows operator to perform the following
operations:
1. Viewing video provided by the remote system's Cameras in real time mode;
2. Working with Alarms and Bookmarks;
3. Converting video archive stored on the remote server;
4. Controlling Cameras on the remote servers using PTZ.
Monitoring Center working with local video archives allows operator to perform the following
operations:
1. Viewing video provided by the remote system's Cameras in real time mode;
2. Recording video stream provided by the the remote system's Camera. Recording is executed locally
on the Monitoring Center's server;
3. Controlling Cameras on the remote servers using PTZ;
4. Other operations using camera cell control elements.
In other words, Monitoring Center working with local video archives allows operator to control video
stream, coming from the remote servers's Cameras in the same way as if they were set within local
SecurOS security network.
When planning the system architecture it should be considered that a Monitoring Center working with
local video archives requires a much greater TCP/IP bandwidth than the Monitoring Center working
with remote video archives. Monitoring Center working with remote video archives is capable to
control up to 500 Cameras of the remote security system simultaneously. Number of cameras controlled
by "local" Monitoring Center depends on system characteristics of the Video Server, where Monitoring
Center is deployed (see Video Server System Requirements).
To provide Monitoring Center functionality within SecurOS security system the Monitoring center
agent and Remote system objects of Core subsystem were designed.
www.isscctv.com
SecurOS 17 Administration Guide
Purpose, Implementation And Operation Principles
Parameter Requirements
Parameter Requirements
www.isscctv.com
SecurOS 18 Administration Guide
Purpose, Implementation And Operation Principles
Parameter Requirements
Parameter Description
www.isscctv.com
SecurOS 19 Administration Guide
Purpose, Implementation And Operation Principles
Parameter Description
To capture and playback sound the Video Server should have either integrated audio on-board (check
the motherboard manual) or any additional PCI or PCI-E sound card. Alternatively, TVISS1-02, TVISS4-
02, TVISS4E-REV5 or TVISS PCI-E8 video capture card (cards) can be used to capture sound, because
they have additional audio input on-board.
Notes:
1. If there is no integrated sound card and only TVISS video capture card installed, it is necessary to
install additional sound card to playback audio records on this server.
2. Integrated or additional sound card provides sound capture only from one microphone. In case of
necessity to capture sound streams from great number of microphones one must use TVISS video
capture cards.
To use Audible Notification Service (playing sounds upon system events) to work on a particular
computer, it should have either integrated audio on-board or any additional PCI or PCI-E sound card.
www.isscctv.com
SecurOS 20 Administration Guide
Purpose, Implementation And Operation Principles
The application server should have the required number of free (not used) serial (COM) ports to
connect the ACS/alarm/fire alarm controllers.
The sections below covers some system and other requirements, that provide setup, start and correct
SecurOS operation.
www.isscctv.com
SecurOS 21 Administration Guide
Purpose, Implementation And Operation Principles
Note. Each section contains a description of the basic operation principles and configuration specifics of the
selected subsystem.
www.isscctv.com
SecurOS 22 Administration Guide
SecurOS Installation
3 SecurOS Installation
This section describes system installation on different SecurOS servers and workstations.
This section describes installation and configuration of the SecurOS managing server on computer
which assigned functionality is Video Server.
The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys and TVISS video capture boards.
The Guardant keys are used for licensing restrictions only. The TVISS boards ensure functioning of the
Video server with analog video surveillance cameras, and also are responsable for license restrictions.
The Guardant key is the electronic device constantly connected to the computer through a USB port.
The SecurOS software addresses to a key for check the license information.
The key is necessary to place before the beginning of the SecurOS software installation. To install
Guardant key, plug the key into any free (not used) USB port.
The Guardant key driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation section) is selected.
Note. The Guardant key driver can be installed later in a manual mode. For the detailed description of the
procedure see the SecurOS SecurOS Installation Guide.
www.isscctv.com
SecurOS 23 Administration Guide
SecurOS Installation
Detailed description of the procedures of installing TVISS boards and connecting cameras is available
in the SecurOS Installation Guide.
The TVISS board driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation section) is selected.
The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.
The license key is created on the basis of the SecurOS hardware unique codes (Guardant or TVISS
boards) or combinations of unique codes of the computer hardware on which SecurOS is installed.
License keys are checked according to the priority descending in the following order:
1. Guardant key;
2. TVISS board key;
3. key on the basis of the combinations of unique codes of the computer hardware (hardware code).
In addition to the unique hardware codes, the following data is also taken into account during license
key generation:
In case the license key isn't included in the SecurOS delivery set it is necessary contact Intelligent
Security Systems to request it from.
www.isscctv.com
SecurOS 24 Administration Guide
SecurOS Installation
2. To get hardware unique codes, run the Hardware Report Utility, thereto click Start button on the
Windows Task bar. Consistently choose All Programs SecurOS Hardware Report Utility
menu items.
3. The utility will display the report data in the ISS Hardware Report Utility window (for example, see
figure 1).
4. Click Copy Report to Clipboard button in the utility window. The utility will copy the report to
clipboard.
5. Create and open a new text file of any format. Paste the clipboard content to the file. Additionally
insert the following data into the file:
program language selected on the SecurOS installation;
SecurOS release number;
SecurOS edition.
6. Save the file.
7. Send the file to the Intelligent Security Systems Technical Support Team (see Getting Technical
Support section).
On receiving the license key file copy it to the SecurOS root folder.
3.1.1.3 Software Installation
This section covers a specifics of the SecurOS installation or upgrading, that make it possible to reuse
previously created objects.
Warning!
1. To install the software, you must have administrator rights for Windows OS. Proceed to software
installation only when you finish hardware installation and network configuration for any
computer.
2. It’s strongly recommended to disable the User Account Control option before installing SecurOS
software under Windows 7 and Windows Server 2008 R2.
Note. It is not supported to install the software on Windows Server 2008 R2 if it is a domain controller.
www.isscctv.com
SecurOS 25 Administration Guide
SecurOS Installation
3.1.1.3.1 Using Current Parameters of the Windows User Account needed for
PostgreSQL
During fisrt SecurOS installation Windows user account needed for PostgreSQL operation is created
with the name postgres and the same password.
Note. If current system security policy does not allow to create user account with default login and password,
specify password that meets the requirements of the active system security policy.
If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 2) enter currently used password of the
PostgreSQL user account.
2. Click Next to continue. System will recreate Windows user account with name postgres and old
password.
Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.
3.1.1.3.2 Using Current Parameters of the Database and Administrator User Account
During first SecurOS software installation default PostgreSQL administrator’s user account is created
with the name postgres and the same password, database is created with the name securos.
If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 3) enter currently used database name
www.isscctv.com
SecurOS 26 Administration Guide
SecurOS Installation
2. Click Next to continue. The database will be updated and reformatted with the old name and
administrator’s credentials.
Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.
Warning!
1. Before installing SecurOS software on 64-bit MS Windows 2008 Server R2 it is necessary to install
additional multimedia components (see Installing Multimedia Components and Services under
MS Windows Server 2008 R2);
2. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.
1. To start the SecurOS software installation run the product setup file. System will display the Choose
Setup Language window (see figure 4).
www.isscctv.com
SecurOS 27 Administration Guide
SecurOS Installation
From the drop-down list select the SecurOS InstallShield Wizard required language. Click the OK
button.
Additional Information
The Choose Setup Language information messages depends on the OS default language (the Language parameter
value (local ID)).
2. The Preparing To Install window will appear, in which the steps of the installation preparation will
be displayed.
After the end of procedure of preparation the system will automatically display the Welcome to the
InstallShield Wizard window (see figure 5).
Click the Next button in the Welcome to the InstallShield Wizard window to continue.
3. The License Agreement window will appear (see figure 6).
www.isscctv.com
SecurOS 28 Administration Guide
SecurOS Installation
Read the license agreement carefully. Select I accept the terms in the license agreement option if you
agree. Click the Next button to continue.
4. The Install Type window will appear (see figure 7).
By default the typical installation mode allowing to install Video Server software with default settings
is selected. Click the Next button to continue.
5. The Server Type window will appear (see figure 8).
www.isscctv.com
SecurOS 29 Administration Guide
SecurOS Installation
The item is excluded from the installation procedure in the SecurOS Xpress, SecurOS Lite editions.
To install Conf iguration Server software select appropriate value from the drop-down list. Click the Next
button to continue.
6. The Installation of the license key file window will appear (see figure 9).
The item is excluded from the installation procedure in the SecurOS Lite edition.
www.isscctv.com
SecurOS 30 Administration Guide
SecurOS Installation
Additional Information
Copy the license key file from the setup directory option is displayed in the Installation of the license key file
window when SecurOS setup directory contains the license key file.
if the key is not available— select the Do not copy the license key file option. The key file can be
copied in the SecurOS installation directory after installation is complete. For more information
about getting license key file see License Key section.
Click the Next button to continue.
7. The Software language selection window will appear (see figure 10).
To define SecurOS program language select the required one rfom the drop-down list.
Warning! You should specify only the language, which is permitted by your license key file. For more
information about license key see License Key section.
The item is excluded from the installation procedure in the SecurOS Lite edition.
www.isscctv.com
SecurOS 31 Administration Guide
SecurOS Installation
Uncheck the default checked Install ISS Integrated Devices Pack if it is not proposed to integrate
additional devices. Choose the check box of the Guardant or video capture board that was in the
delivery set and has already been installed on the computer. Click the Next button to continue.
9. The Ready to Install SecurOS window will appear (see figure 12).
To start the installation procedure click the Install button. The system will unpack required archives
and then will begin the installation and will display SecurOS Installation window, in which the
indicator of the process will be shown. After the installation process has successfully completed the
InstallShield Wizard Completed window will appear (see figure 13).
www.isscctv.com
SecurOS 32 Administration Guide
SecurOS Installation
The system will display an initialization window, in which steps of the procedure of system
preparation for initial start (see figure 15) will be displayed.
www.isscctv.com
SecurOS 33 Administration Guide
SecurOS Installation
After the preparation procedure has completed the system will open the System Conf iguration Wizard
window which will provide options for system configuration (see figure 16).
2. For basic configuration select the Configure using Wizard option that is active by default.
Note. Import configuration file and Start with empty database scenarios are described
below.
www.isscctv.com
SecurOS 34 Administration Guide
SecurOS Installation
The system will display window to enter new parameter values (see figure 19).
www.isscctv.com
SecurOS 35 Administration Guide
SecurOS Installation
Set and confirm new superuser's password, or click Change to default button to use default value.
Click Next button to continue.
5. System will display Users setup window (see figure 20).
To add a new users enter required values into the appropriate fields.
www.isscctv.com
SecurOS 36 Administration Guide
SecurOS Installation
New users can be created with the following user account rights:
Power user;
Simple user.
Power user can do the following:
View objects using the user interface;
Control video cameras, for example, arm camera, start and stop recording;
Control PTZ devices;
Hide user interface;
Shutdown the current SecurOS user session;
Shutdown SecurOS system.
Simple user can do the following:
View objects using the user interface;
Shutdown the current SecurOS user session.
Click Next button to continue.
www.isscctv.com
SecurOS 37 Administration Guide
SecurOS Installation
6. System will display the Computer name and video archive setup window (see figure 21).
Do the following:
If necessary edit the Computer object name in the Enter computer name field. By default the
computer name is set by system in the following way: Computer <computer_name> (see Computer
Name Restrictions section).
Choose Drives to store recorded video by selecting the corresponding drive from the Select
available logical drivers for video archive recording table. SecurOS will store the recorded video
on the drives specified in this window.
If the local export of video records in the AVI/ASF format isn't required, clear the The ability of
AVI/ ASF local exportation on video server check-box that was set by default.
If it is necessary to operate with network IP-devices (for example, IP cameras), click Add button.
System will add a new line in the List of IP-devices block. Set IP device parameters by clicking the
necessary field. Repeat the operation for all required IP devices.
www.isscctv.com
SecurOS 38 Administration Guide
SecurOS Installation
8. If video capture boards are installed on the computer the Information about installed TVISS cards
window will appear (see figure 23).
This step is excluded from the installation procedure for the SecurOS Lite edition.
www.isscctv.com
SecurOS 39 Administration Guide
SecurOS Installation
In the Video encoding system block choose the required standard for encoding video signal.
Click Next button to continue.
9. System will display the Add operator workstations (OWS) window (see figure 24).
www.isscctv.com
SecurOS 40 Administration Guide
SecurOS Installation
Note. Computer name should correspond to the value set in the operating system configuration (see My
computer Properties Computer Name).
Additional Information
The computer name also can be selected from the list of the computers connected to a network. To view the list click
the button in the Computer network name field.
If on the added Remote operator workstation it is necessary to export video in the AVI/ASF format,
then select the corresponding setting in the Export to AVI/ ASF field:
- locally on OWS — option to convert/export to AVI/ASF file will be available on an added
remote operator workstation;
- remotely on video server — option to convert/export to AVI/ASF file will be available on a video
server;
- is not necessary — option to convert/export to AVI/ASF file will not be available.
Do the described above actions for each Remote operator workstation connected to the network.
Click Next button to continue.
www.isscctv.com
SecurOS 41 Administration Guide
SecurOS Installation
Review the selected system parameters. If it is necessary to change anything click Back button. Set a
new value. Click Next button to return to the Summary information window. To create and save the
configuration click the Finish button.
After the procedure of data creation and saving has completed successfully the corresponding message
will be displayed (see figure 26).
As a result of the described actions the system will be ready for operation.
3.1.1.4.2 Restoring Configuration
The backup copy allows to quickly and easily restore system configuration.
Warning!
1. Version of the backup copy should comply with version of the currently installed SecurOS,
otherwise it is not applicable.
2. Restoring configuration is feasible only on the Conf iguration Server (see Managing Network
Configuration by Configuration Server).
To restore system configuration from backup select Import configuration file scenario in the Wizard
scenario window (see figure 27).
www.isscctv.com
SecurOS 42 Administration Guide
SecurOS Installation
To start SecurOS in manual mode from the Windows Start menu, select the following menu items: All
Programs SecurOS SecurOS (see figure 28).
Additional Information
The system also can be launched by means of the SecurOS shortcuts in the Start menu, on the Desktop or in the
Windows taskbar.
The Authorization window is used to log in. It is displayed after the system has successfully started
and loaded all configurations (see figure 29).
www.isscctv.com
SecurOS 43 Administration Guide
SecurOS Installation
User — root;
Password — securos.
Notes:
1. If superuser password was changed during system configuration (see 4 in Using The System
Configuration Wizard section) use modified value.
2. If the wrong login credentials are entered the Authorization Error window will be displayed. If the
incorrect credentials are entered 3 times in a row, the system will enter a 30-second waiting mode
after which the next attempt to login will be given.
1. Add computers to the a network for that create and set the corresponding objects in the Object Tree of
the certain Security Zone object on the Conf iguration Server.
2. On the added computers install the SecurOS software that corresponds to the computer purpose in
the network (see Types Of Servers And Workstations section).
3. Launch SecurOS and configure the system with the Wizard.
www.isscctv.com
SecurOS 44 Administration Guide
SecurOS Installation
Note. The very operation can be executed only for Video Servers, Administrator Workstations and Application
servers.
Warning! The possibility to add the given amount of the certain typed computers to the network is regulated
by the license restrictions.
3.2.1 Adding To The Network And Configuring Peripheral Servers And Operator
Workstations
In the ID field set the computer name (see Computer Name Restrictions). It should correspond to
the value defined in the OS settings (see My Computer Properties Computer Name).
In the Title field define the Computer object name as it will be displayed in the SecurOS Object Tree.
4. In the computer properties window (see figure 31) in the Role field select the computer role in the
network that should correspond to the SecurOS software installation type on the computer (see
Types of Server and Workstations section).
www.isscctv.com
SecurOS 45 Administration Guide
SecurOS Installation
Note. Parameter is a mandatory one only if the network computers are registered in the different
subnetworks.
Notes:
1. Without the parameter definition the video records saving will be impossible.
2. The parameter is a mandatory only for the Video Server.
Servers to connect — the list of computers to which the created Computer object can be connected. It
is recommended to include all accessible servers of the security network; for that to click the Select
All button.
5. If needed set the other parameters. Apply new settings.
6. For the added Computer object create the own Object Tree. The type and content of the Object Tree is
defined by a computer role in a network.
7. Repeat the steps for all added to the network computers.
www.isscctv.com
SecurOS 46 Administration Guide
SecurOS Installation
To install SecurOS software on additional servers (on other Video servers, Administrator Workstations and
Application servers) do the following:
1. To start SecurOS software installation on additional servers setting launch the product installation
file on the corresponding computer.
2. Up to the setting type selection step in the Install type window steps of the procedure are similar to
software setting on the video server (see Software Installation section).
3. In the Install type window (see figure 32) select the Advanced configuration options type.
4. In the Setup type window (see figure 33) select the required installation type.
www.isscctv.com
SecurOS 47 Administration Guide
SecurOS Installation
6. In the Installation of the license key file window choose appropriate scenario depending on the
availability of the license key (for the details see Software Installation section).
7. In the Destination Folder window set the root directory to install SecurOS.
8. In the Installation database type window (see figure 35) choose one of the following values:
www.isscctv.com
SecurOS 48 Administration Guide
SecurOS Installation
11.The further steps are similar to the software installation on the Video server (see Installing And
Configuring The SecurOS On Video Server section). When setting parameters It is recommended to
use default values.
Warning! The software language must be the one for all network computers.
www.isscctv.com
SecurOS 49 Administration Guide
SecurOS Installation
Warning! The software language must be the one for all network computers.
If Peripheral Server and Operator Workstation are running under MS Windows Server 2008 R2 it is
necessary to install additional multimedia components required for proper operation of SecurOS (see
Installing Multimedia Components and Services under MS Windows Server 2008 R2 section for
detailed description).
The SecurOS initial configuration on Video Server, Administrator Workstation or Application Server is
performed by the initial configuration Wizard that is run on system launching.
www.isscctv.com
SecurOS 50 Administration Guide
SecurOS Installation
3. In the Join existing security network window (see figure 40) do one of the following to choose the
Conf iguration Server with the current network configuration:
Set Conf iguration Server name (see Computer Name Restrictions) or IP address in the
Configuration server name or IP address field.
For automatic search for Video Server in the network click Find servers in the local network
button. The searching procedure will be started and Conf iguration Server will be displayed in the
Servers found box. Click found Conf iguration Server to select it.
Warning! During the configuration procedure the Conf iguration Server must be active and the SecurOS
security system should be launched on it.
www.isscctv.com
SecurOS 51 Administration Guide
SecurOS Installation
Click Join button. The Loading configuration window will appear that indicates the loading process
(see figure 41).
4. After the configuration loading finished successfully the corresponding system message will be
displayed. Click OK button. In the Loading configuration window click Finish button.
www.isscctv.com
SecurOS 52 Administration Guide
SecurOS Installation
The further user authorization at start of the installed additional server is done similarly to the
procedure described in Launching SecurOS On The Configuration Server section.
Note. Connection is possible only to those servers which are set in the Server to connect list of the Computer
object associated with the given Operator Workstation.
Note. Automatic authorization is possible for the user for which such possibility is specified by the
administrator. To apply automatic authorization choose the Auto login check-box. For more information
about the automatic authorization procedure see below.
www.isscctv.com
SecurOS 53 Administration Guide
SecurOS Administration Overview
Warning! After SecurOS and PostgreSQL software installation Windows OS creates the postgres account.
To configure SecurOS system use an Windows administrator account but not the postgres one.
Additional Information
The control panel also can be used to launch special system control commands (see Macros section).
Only active Desktops and Macros are displayed on the control panel (see Disabling Objects). Number of
the displayed object of each type is defined by system settings and changes dynamically. If max value is
exceeded all additional objects are hidden and can be activated from the appropriate menu:
By default after logging in the control panel is hidden. To display the control panel after logging in,
hold the Ctrl key on the keyboard and move the mouse pointer so it touches the top of the screen.
Additional Information
The control panel also can be activated by double clicking on the application icon in the Windows taskbar (system
tray), or by means of the application icon context menu.
www.isscctv.com
SecurOS 54 Administration Guide
SecurOS Administration Overview
To enter the administration mode click the button (Configure the system, see 43).
After entering the administration mode the system will display the Object Tree and Administrator toolbar.
The Administrator toolbar is intended to perform typical operations with the security system elements
which structure is present in the Object Tree. The appearance of the Object Tree and Administration
toolbar is shown on the figure 44.
Additional information
On first entering the administrator mode after the system start the SecurOS Object Tree is hidden.
All security system elements are displayed in the form of a object tree — a hierarchical structure
reflecting correlations between them. Similarly to the file system tree structure, the object tree has a root
element (default name: System). Tree elements, that are children of the root, contain all the network
objects grouped by their functional types. To display and control grouped tree elements the standard
means are used (similar to OS file manager controls).
Additional Information
Objects which are one level down the hierarchy are called child objects to the object one level above them.. The
parent objects contain child objects.
www.isscctv.com
SecurOS 55 Administration Guide
SecurOS Administration Overview
1. Group — this element is intended for grouping Objects by their functional types. The Group is
predefined within system and is created automatically when creating its first element, but can be
deleted by administrator including all children elements.
2. Object — the functional element of the security network. An object will be included in a Group only if
it is of the same object type as the other objects in the Group. An Object can be created, modified and
deleted by administrator
There are two object classes in the SecurOS network: system objects and user interface objects. System
objects reflect the network functionality, user interface objects are intended for security network
monitoring and management.
Access to an object's parameters and application of new settings is carried out by the Setup button.
Administration operations are fulfilled with the SecurOS object selected in the Object Tree. The list of
operations which can be done with an object (i. e. availability of each of the Toolbar buttons) depends
on the selected object.
Warning! Any changes to the SecurOS object parameters are saved in the system immediately after the
change of a parameter value. Rollback to the previous object parameters set is possible only at the repeated
setting of the previous values in a manual mode.
The control panel allows to switch users and shutdown the system. Click Change user/ Shutdown
system button ( ) and from the drop-down list select a necessary command (see figure 45).
After control panel is activated it permanently displayed on the desktop over all other windows. To
www.isscctv.com
SecurOS 56 Administration Guide
SecurOS Administration Overview
To perform an action directly from the Object tree (exclude object creation action), right click the object
icon in the Object tree. System will display action context menu.
If current object cannot have child objects, in drop-down list box you will see object types for its parent.
In this case newly created object will appear as a sibling node, as if you have selected the parent node
prior to creating new object.
The system configuration limits (amount of objects of each type within security network) is written in
license key file (key.iss). The message above tells that the limit of objects of the specified type is
already reached. To be able to have more objects of this type, contact our Technical Support Team to get
the new key (see Updating License Key on All Servers).
www.isscctv.com
SecurOS 57 Administration Guide
SecurOS Administration Overview
Notes:
1. Parameters in the object settings window are described in the section corresponding to the given
object for each subsystem (see Software Implementation. SecurOS Subsystems).
2. Several object types do not have editable settings, so the Setup button will become disabled once an
object of this type is selected.
2. Click the Setup button again to apply changes and close the object settings window.
Warning! You cannot close the settings window without applying changes to the object nor can you dismiss
changes made in this window. All changes are applied to the system configuration immediately upon closing
the settings window, so change object settings with care.
To delete object:
1. Select it in the objects tree and click Delete button on the Administration toolbar or select Delete
command in the context menu.
2. In the displayed window click OK button to delete object or Cancel button to return without
deleting.
Warning! This operation cannot be undone, so use it carefully. If you delete object, its child objects will be
deleted as well.
To temporarily exclude object from SecurOS network without deleting it and, thus, loosing its settings,
just disable it.
To disable object, select it in objects tree and click Disable button or choose Disable command in the
context menu. Disabled objects are marked with "cyan cross" icon.
To enable object, click Enable button or choose Enable command in the context menu.
To rename object:
1. Select object in object tree and click Rename button or select Rename item from the context menu.
2. In a dialog window specify there a new object name.
3. Click OK button to apply changes or Cancel button to escape from this dialog without changing
anything.
www.isscctv.com
SecurOS 58 Administration Guide
SecurOS Administration Overview
It is possible to move one Map object from one parent to another preserving all its settings.
3. Type in the name (or part of name) of the required object and press Enter key or click Search button.
The focus will switch to the first child object that matches the search string and search window is
closed (if Enter key is pressed) or Prev and Next buttons are activated. Window won't be closed even
an object is not found.
4. Press Enter key (or Prev and Next buttons) to resume searching or Esc key to stop searching and
close the window.
www.isscctv.com
SecurOS 59 Administration Guide
SecurOS Administration Overview
When working with table parameters the following methods are used:
To add several entries into the table, use key.
To delete entry from the table, select required row and press Ctrl + Delete keyboard shortcut.
When no individual user rights are set any user is granted with full (superuser) rights. Once you add at
least one person and define its rights within the system, SecurOS will require user name and password
when you launch server/workstation software next time. To get full access to all system components
and load the whole system database, use password and name of system superuser.
www.isscctv.com
SecurOS 60 Administration Guide
SecurOS Administration Overview
3. For these settings to take effect, force all administrator and operator workstations to reconnect to
SecurOS network.
Users access to operation with the SecurOS security system is carried out on the basis of the login
accounts defining the user rights in the system. At system installation the one user account having
unlimited rights is created by default. New user accounts and their rights are set by the system
administrator with the help of System Configuration Wizard or at the further configuration.
To create and configure new user accounts the following system objects are used:
Department object (Security Zone Users group Department) — contains a list of the User
object. The name of each User object is used at authorization as the User parameter. New users can
be registered both in the given Department object, and in any other Department object created by the
system administrator which will be included in Users group automatically.
Note. Department object is created in the objects tree only if Power user or Simple user were added during
system configuration with the help of System Configuration Wizard.
User Rights group (Security Zone User Rightsgroup) — contains the User Rights objects. Each of
the existing User Rights objects can be used repeatedly (i. e. can be assigned to any new user).
Except a set of the user rights the password of the corresponding user account is defined and stored in
the User Rights object settings.
System Configuration Wizard creates the only one superuser account with the following values: root
(user name) and securos (password). The set of the rights of such account gives to the user the full
access to all system objects and the right to execute any actions in the network. Objects of the superuser
account aren't displayed in the SecurOS Object Tree; to change a name and a set of the superuser rights
is impossible.
Warning! Superuser password can be changed with the help of Wizard (see 4 in the Using The System
Configuration Wizard) or further at system operation.
A person that has full access to all SecurOS objects is called superuser. If no user rights are defined,
SecurOS will not request password when starting system software of the server or workstation and
allows operate as superuser.
Warning! Superuser login name is root. Default superuser password is securos. Change default
superuser password to the new value (the minimal length is 7 symbols) and keep it safe before giving access
to your security network for other personnel!
www.isscctv.com
SecurOS 61 Administration Guide
SecurOS Administration Overview
Note. After that, users other than superuser cannot see System object at all.
Additional information
Outdated license key is stored in the SecurOS installation root directory in the key.iss.bak file.
Warning! After license key was updated on the Peripheral ServerSecurOS program may automatically reboot.
All workstations can be configured to notify simultaneously about license key file expiration date.
If less than certain days remain before license expiration then an information window will appear on
each workstation during operator working (see figure 50). Operator may close the window and
continue working.
Notification window appears with a certain periodicity (e. g. three times a day, with three hours
between messages).
www.isscctv.com
SecurOS 62 Administration Guide
SecurOS Administration Overview
To setup notification parameters, do these steps on each computer where reminder window should
appear:
1. Open client_config.xml file located in the SecurOS root directory.
2. Insert the following parameters into the <Main> section:
DaysForRemaining — specify a number of days before license expiration date to begin operator
notification;
RemaindersPerDay — specify a number of notifications per day;
Warning! Zero value of this parameter results in that the reminder window will be never displayed!
MinRemaindPeriod — specify a minimal time interval (in minutes) between two notifications
(must be no less than 30).
3. Save the changes and close the file.
www.isscctv.com
SecurOS 63 Administration Guide
SecurOS Administration Overview
</params>
<params name="ServersList">
<param name="0" value="192.168.3.35"/>
</params>
<params name="UserServersList">
<param name="0" value="192.168.3.35"/>
<param name="1" value="192.168.0.51"/>
<param name="2" value="s-zhulev"/>
</params>
</client>
Searching is performed with the help of the standard network technologies (see Searching Devices in
the Network section) within the local network of the Computer, which running Manager. All found
devices are assumed untuned; you can perform the following operations with such devices:
Adding IP Device;
Editing Parameters and Setting up IP Device Usage;
With devices that are already registered in the network (with the help of Manager or by standard tools)
you can perform the following operations:
Editing Parameters and Setting up IP Device Usage;
Deleting IP Device.
www.isscctv.com
SecurOS 64 Administration Guide
SecurOS Administration Overview
4.6.1 Specification
Parameter Description
System IP-devices
www.isscctv.com
SecurOS 65 Administration Guide
SecurOS Administration Overview
Parameter Description
Object Tree of the Computers having role Video Server existing within
SecurOS network. When expanding the Video Server node all Video
Capture Devices children objects including their Cameras children
objects are displayed. If device has integrated audio circuit or it is
adjusted to operate in the syncronized recording mode
(see Synchronized Audio/ Video Recording and Playback section), all
Object Tree appropriate Microphone objects are also displayed in the tree.
Notes:
1. Objects whose settings are currently being edited are displayed
in the Object Tree in italic.
2. Objects that are disabled in SecurOS, are displayed in the Object
Tree in grey (shaded), similarly to inactive Windows objects.
Object name Note. Object names are restricted with the following:
1. Name can not be empty.
2. Name should be unique.
Settings tab
www.isscctv.com
SecurOS 66 Administration Guide
SecurOS Administration Overview
Parameter Description
Check the box, if you want to use device' audio inputs (or integrated
microphone). Max number of the audio channels depends on
device Type and Model and are defined in the device integration
software. In general, number of the audio channels ≤
number of the video channels.
Use audio inputs
Limitations. To use the functionality the system must meet the
following conditions:
1. Device must be equipped with audio inputs.
2. Device integration software in the SecurOS should support
sound.
Tree consists of all SecurOS objects, that can use currently selected
IP device. Root elements of the tree are the Computers, for which at
least one of the following objects is configured:
Archive Converter;
Desktop;
Monitor;
Audio Player.
IP device Usage Tree Note. If some of the mentioned above objects is disabled in the SecurOS
Object Tree, it is not displayed in the Manager's Usage Tree.
The state when not all devices of the object selected in the Manager's
Object Tree (including children) are used by the object of the Usage
Tree (including children), is called "partial usage". In this state the
field, located on the left of such object is marked with the gray
background in the Usage Tree ( ), or, in Windows 7, with the
mark. For example, if Camera with Microphone is placed on the
Monitor of some Desktop, but this Microphone is not used by the
Audio Player located on the same Desktop in the same time, this
Desktop will be marked in the Usage Tree with the ( ) mark.
Buttons
Delete Delete Video Capture Device, selected in the Manager's Object Tree.
www.isscctv.com
SecurOS 67 Administration Guide
SecurOS Administration Overview
Parameter Description
Notes:
Apply, Cancel 1. Buttons are enabled only if settings were assigned/edited in the
Settings and/or Usage tabs.
2. If current settings were edited and Close button was clicked
before these new settings were saved or rejected, system will
display the query to save the changes.
New IP-devices
Select Video Server in the Object Tree of which a new Video Capture
Device, associated with the network IP device selected below
Add devices to video server (see Table of IP-devices below) will be created and where video
archive of this device will be created and stored. Computer, that
running IP-Device Manager is selected by default.
Note. If port number was defined for the device at the initial IP address
assigning, it is displayed in this field in standard format (for example,
Table of IP-devices
192.16.0.185:8080).
www.isscctv.com
SecurOS 68 Administration Guide
SecurOS Administration Overview
To complete the application and close IP-Device Manager window click the Close button.
This section describes the following operations performed with the help of IP-Device Manager:
Searching Devices in the Network;
Adding IP Device;
Editing Parameters and Setting up IP Device Usage;
Deleting IP Device.
Warning! If connection with Configuration Server is lost all operations are blocked until connection is
restored.
Note. When some SecurOS object settings window is opened or connection with Conf iguration Server is lost
the IP-Device Manager button is disabled.
Warning! When IP-Device Manager window is active, SecurOS object settings mode is blocked ( i.e. it is
impossible to open object settings window from the SecurOS Object Tree).
www.isscctv.com
SecurOS 69 Administration Guide
SecurOS Administration Overview
Additional Information
When placing mouse cursor over the IP address field the screen tip containing device response is displayed. In
general, tip's string consists of three field in the following format: <Device Manufacturer> <Device
Model> (<Device Name>). For example, Beward BD2570 (H.264 5M box camera).
Warning! Table of IP-devices displays all found network devices, including printers, scanners etc.
www.isscctv.com
SecurOS 70 Administration Guide
SecurOS Administration Overview
Click Model cell, in the drop-down list select the model of the device. Select default, if there is
no required model in the list. System will activate the Add button.
For the recognized device (IP address, Type and Model parameters are determined):
Select device from the Table of IP-devices.
For the arbitrary device (there is no device information in the table):
Click the Type cell in the last (empty) table row, in the drop-down list select device type.
Click Model cell, in the drop-down list select the model of the device.
5. Click Add button.
Note. If device can't be added due to license restrictions or if connection with the Conf iguration Server is lost,
system will display corresponding informational message.
System will create a new Video Capture Device with specified parameters and add it to the Manager's
Object Tree to the selected Computer; added device will be currently selected in the device tree. Camera
child object will be created for added Video Capture Device automatically; you can edit it's parameters in
the Administration Mode from the SecurOS Object Tree.
Note. Default name for each added device is Video Capture Device N, where N — next serial digital
identifier of given type of objects.
www.isscctv.com
SecurOS 71 Administration Guide
SecurOS Administration Overview
www.isscctv.com
SecurOS 72 Administration Guide
SecurOS Administration Overview
Notes:
1. Device usage can be specified even through device is disabled in SecurOS.
2. Device usage may be specified for an individual device and device group. To specify usage for all
devices, added to the arbitrary Video Server, select it in the Manager's Object Tree then, in the Usage
Tree, specify objects which should use these devices. When applying settings selected object will use
all devices of the specified computer.
www.isscctv.com
SecurOS 73 Administration Guide
Core Subsystem
5 Core Subsystem
Core subsystem communicates with the computers in SecurOS distributed network and installed
intelligent modules (such as license plate recognition module) as well as other subsystems (such as
video or audio subsystem, or telemetry subsystem).
Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.
The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log file
in real time mode.
The SecurOS core subsystem allows connecting and disconnecting of the security network nodes,
configuration and synchronization the information between the security network nodes, as well as
monitoring any changes in modules and objects status.
If any single node or a certain network segment is disconnected, it is assigned the disconnected status
and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.
Permanent updating of the security network configuration data allows configuring the security
network from any computer running the necessary administration software, and watch video form
connected video cameras, listen to audio, send commands to hardware, monitor and control alarm and
fire alarm systems from each operator's workstation within the SecurOS network.
www.isscctv.com
SecurOS 74 Administration Guide
Core Subsystem
Remote system.
Area Zone.
Region.
Event Filter.
SNMP agent.
5.2.1 System
This is a root object of the entire objects tree and provides system-wide settings. This object cannot be
deleted, moved, or disabled. This object is visible to superuser only.
Parameter Description
www.isscctv.com
SecurOS 75 Administration Guide
Core Subsystem
Parameter Description
This object is used to divide entire security network into separate security zones. Security Zones are
commonly used when the SecurOS system ranges over a large territory when independent centralized
monitoring and supervision is needed for certain physically separated zones.
Also, there is a possibility to set the filters for the events transmitting between the security zones. Using
filters, events communication can be completely or partially disabled between the different security
zones. Thus, event filters between the zones are useful to apply when a zone must be completely
isolated from the other ones (see detailed information in Setting Up Event Redirection).
The users can be also granted with different access rights to implement multi-level access control for
the security objects (see Defining Access Levels to Individual Objects). For example, in a security
center the operators can observe the territory by watching the signals from the cameras. The supervisor
can be granted the rules to control the monitoring modes, enable or disable cameras, control the
rotatable cameras, and the head of the security center can generate reports.
Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is separated
into several segments and each administrator may monitor and configure only one of those segments.
access control subsystem uses hardware identifiers (cards) with different facility codes on different
territories;
access control subsystem is distributed across several zones with different access schedule
(different holidays), and if each zone has its own departments and persons (i. e. several
organizations within one office building);
you need to store separate event logs for a subset of SecurOS objects, with different database depth.
Parent object— System.
www.isscctv.com
SecurOS 76 Administration Guide
Core Subsystem
Parameter Description
Define length of the events database (in days, max). Event database
stores events from objects that belong to this security zone only.
Possible values: [0; 9999]. If this field is empty the protocol length
Protocol database length
default value is used (7 days). Messages will be deleted
automatically when storage period expired. Removal is performed
once a day at 00:00:00 a.m. (hh:mm:ss) or when SecurOS starts.
SecurOS has the ability to setup event transmitting filters between security zones or individual
computers within the security network. Event redirection allows to completely or partially isolate one
security zone from another zone and to setup specific event flow rules within SecurOS network.
www.isscctv.com
SecurOS 77 Administration Guide
Core Subsystem
panel (see figure 59). The event redirection setup window will appear.
2. Within Event source tree (see figure 60), select a security zone or single computer to set event
filtering for (to apply settings for a single computer, single-click its icon consequently to change its
state (see below icons list and corresponding states description).
Icon meanings for event filters (see figure 61 from left to right):
Security zone receives events— security zone by default receives all events from source
security zone or computer;
Security zone does not receive events— security zone by default does not receive any
events from source security zone or computer;
Computer receives events;
Computer does not receive events;
Inherited settings— event filtering for this computer is inherited from parent security zone,
computer currently receives events. When new Computer objects are created or moved from
another security zone, they have this setting by default;
Inherited settings— same as above, computer currently receives no events.
3. Within Event target tree, select target object to filter events from the source object. To change their
icons, single-click on them consequently (see previous item for description of icons meaning).
Defaults node defines the default visibility settings for newly created security zones.
4. Define exceptions from this rule on per object basis using Exceptions table. If target security zone or
computer receives events by default, exceptions define events that should be filtered out; if target
does not receive events by default, exceptions define events that should reach the target.
www.isscctv.com
SecurOS 78 Administration Guide
Core Subsystem
Note. Each row of the exception table defines one security zone or computer and one event. The list of events
is specific to the type of the object.
5. To accept the changes, click OK button or click Cancel button to discard all changes.
5.2.3 Department
This object is used to organize persons into groups. Primarily is used jointly with the access control
subsystem to define persons to manage user rights within SecurOS network itself (see Managing User
Rights Within Security Network).
Note. Several Department objects within the same parent object are combined into the User accounts logic
group in the objects tree.
Parameter Description
This object represents a single person (either a person of access control system or a user within SecurOS
network).
Parent object— Department.
www.isscctv.com
SecurOS 79 Administration Guide
Core Subsystem
Parameter Description
Insert any text in free form, for example, person's passport number,
Additional Information position or any other description you need. Not used by the system
itself.
Insert person's phone number. Not used by the system itself. You
Phone can use this field when writing SecurOS scripts to send voice or
SMS notifications.
Insert person's e-mail address. Not used by the system itself. You
E-mail can use this field when writing SecurOS scripts to send email
notifications.
The object is used to configure settings of network domain to provide authorization in SecurOS
network. For further information see Configuration of Network Domain User Rights.
Note. Several Active Directory storage objects within the same parent object are combined into a Active
Directory storages logic group in the objects tree.
www.isscctv.com
SecurOS 80 Administration Guide
Core Subsystem
Parameter Description
Select type of protocol from the drop-down list box. Possible values:
Credentials
This object is for defining user rights within the system (see Defining Access Levels to Individual
Objects for detailed description).
Notes:
1. All users in User Rights object settings have equal access level. To attribute another set of rights to
another users group, create different User Rights object.
2. Several User Rights objects within the same parent object are combined into the User Rights logic
group in the objects tree.
If at a configuration there is at least one object of the rights (the User Rights object) with the installed
provider (the Active Directory Storage object, see Active Directory Storage) and the Users and Groups
field is not empty then to work with SecurOS use the current Windows user accounts. Thus password
check is delegated to the operating system, and it is not important to enter a password on SecurOS
loading.
www.isscctv.com
SecurOS 81 Administration Guide
Core Subsystem
Parameter Description
Objects tree with icons that depict user rights on the object. To
Rights define a user access to any object, press an icon of the object
consequently. See below fig. 66 and then for icons description.
Select this field to disable quick shutdown via control panel (menu
Forbid to hide interface Select this field if user is not allowed to hide user interface objects.
www.isscctv.com
SecurOS 82 Administration Guide
Core Subsystem
Parameter Description
Allow configure system Select the field to assign super-user rights to these users.
Users and Groups (list of users and groups that have the above rights). On selecting the Active
Directory Storage object from the Providers list, the list should be formed as described
in Configuration of Network Domain User Rights.
Select existing Person object. The name of the person will be used as
username when logging in to SecurOS.
Operator
Note. Only one user (the Person object) can be added to the
corresponding User Rights object.
Each user access level corresponds to an icon from the following list (see figure 66 from left to right):
No access— the user has no access to the object neither in administrative mode nor in operator
mode. The object, though, is still visible as a node in object's tree when in administrative mode.
Warning! If such access level is configured for certain Computer object and a number of users, then these
users cannot login to system on this computer.
View— the user has no administrative access to the object, but the object (if it is a user interface
object like Monitor or Audio Player) can be visible in operator interface. Macros (Macro objects) that
have these level can be executed from within operator interface.
Control— same as View rights, but the user can additionally control the object from within
operator interface (i. e. arm/disarm video cameras).
Configure— same as Control rights, but the user can view and change object's settings from
within administrator interface (user cannot delete existing object and cannot create child objects
under this object).
Full access— same as Configure rights plus ability to delete this object and create child objects.
Inherited rights— rights for this object are inherited from parent object (when new objects
are created, they have this access level by default).
Notes:
1. Several object types (like System, Program, Department) that do not have visual representation within
user interface on operator workstations, cannot have View and Control access level types.
2. If the user creates new User Rights object, he/she cannot define the rights for this object to exceed
the current user rights.
www.isscctv.com
SecurOS 83 Administration Guide
Core Subsystem
5.2.7 Computer
This object represents individual computer within SecurOS network (Video Server, Application server,
Administrator workstation or Operator workstation).
The servers and workstations in the SecurOS network are registered and represented as the Computer
objects in the objects tree. The servers run the SecurOS server application, and the workstations run the
SecurOS client application.
The SecurOS workstations can send and receive the events from the other security network nodes.
Filters can be used to select the events that will be transmitted from one SecurOS network computer to
the other ones and to limit computers control and network load due to events transmission (see Setting
Up Event Redirection).
Warning! Servers, connecting to which for the given computer is forbidden, are marked by green cross in the
object tree on this computer (see figure 67 and Servers to connect parameter in the Computer object settings
below). By this system events transmission is not terminated and is limited only by events transmission
settings.
Note. Several Computer objects within the same parent object are combined into the Hardware logic group in
the object tree.
www.isscctv.com
SecurOS 84 Administration Guide
Core Subsystem
Parameter Description
Select this option to choose the default Desktop object from the drop-
down list that will be shown on SecurOS startup on this computer.
If the Auto value is set then the first desktop will be displayed (with
minimal ID). If this option is not activated, no desktop will be
Activate desktop on startup displayed at startup.
www.isscctv.com
SecurOS 85 Administration Guide
Core Subsystem
Parameter Description
Note. For the detailed information about settings order and rules of the
procedure see Auto login.
Select this checkbox to disable saving the local copy of the event log
to database. Since event log is synchronized between computers and
Disable Local Protocol each computer saves its copy in local database by default, you can
turn on event log saving on several machines without risk of loosing
events.
www.isscctv.com
SecurOS 86 Administration Guide
Core Subsystem
Parameter Description
Name of the filter, which will be used when saving events into the
database. List of values consists of names of all Event filter objects
children to the current Security Zone. Optional parameter. If not set
Use event filter all system events will be saved into the database, otherwise only the
events allowed by given filter.
Warning! Filtering can reduce system performance.
Maximum protocol Max database size before data will be updated in a ring mode.
database size, MB
Disks to store archive (table of available local hard disks (HDD) with permissions to store video
and audio data on)
Warning! If the Computer's Role is Operator Workstation parameters are unavailable.
Free GB Inf ormation f ield: current free space on selected disk in GB.
www.isscctv.com
SecurOS 87 Administration Guide
Core Subsystem
1. Add server to list — to add server to the list use key. Select the required server from list of the
Computer objects.
2. Delete server f rom list— to delete server from the list select the string, than press the Ctrl + Delete key
sequence.
3. Add all available network servers — to add all network Computers to the list click Select All button.
4. Delete all servers f rom list — to clear the list click Clear All button.
5. Change the server position in the list — to move selected server up in the list click Move Up button. To
move selected server down in the list click Move Down button.
Note. The sequence of connections is defined by the position in the list, starting from the top.
1. The list can be populated only with Computers, that are in the SecurOS Object Tree.
2. If the role of computer is Operator Workstation it cannot be added to the list.
3. Each Computer can be added to the list only once.
4. Computer that is currently being configured cannot be added to the list.
5. When server is added to the list, Computer that is currently being configured automatically is added
to the similar list of this server.
Note. If the Servers to connect list of the added server is empty, configured computer will not be added to
it's list.
6. When deleting server from the list, Computer that is currently being configured will not be
automatically deleted from the list on that server.
7. When role of the computer that is currently being configured, is changed to the Operator Workstation,
the entry of this computer will be automatically deleted from the lists of all network Computers.
When this association removed (i.e. both computers won't be added each other in the lists), the
corresponding object will be marked by icon of green cross (see figure 69), irrespective of computers
connection state.
www.isscctv.com
SecurOS 88 Administration Guide
Core Subsystem
1. The Computer can connect only to servers, that are in it's servers to connect list.
2. If the list is empty, connection to all servers of the network which contain this Computer in the list of
servers or at which this list also is empty is authorized to the given Computer.
In the case of authentication process that uses SecurOS DB the Name parameter can be set to:
Name of any user, registered in the current Security Zone object within SecurOS network (Object
tree User accounts Department User account), excluding root superuser.
Notes:
1. System will display appropriate information message if entered user name is not registered in the
SecurOS DB.
2. System will display appropriate information message if entered user name is registered in the
SecurOS DB, but User rights are not defined for that user.
In the case of authentication process that uses Windows Network' Active Directory domain the Name
parameter can be set to:
Warning! Active Directory domain of the Windows network can be used for the authentication only if there
is Active Directory Storage object registered in the SecurOS and it is selected as a provider for the User rights
object (see Active Directory Storage).
Name of any Active Directory Group. For the given value auto login may be performed for any
member of selected Group.
Name of any Active Directory User. For the given value auto login may be performed for specified
user only.
www.isscctv.com
SecurOS 89 Administration Guide
Core Subsystem
"Not set" (default value). For the given value auto login may be performed for any Active Directory
User or member of any Active Directory Group, granted with the access rights defined in the User
rights object.
Monitoring center agent is used to provide a connection between given and others SecurOS security
systems (i.e. Monitoring Centers, see Video Surveillance Using Remote SecurOS Security System).
Parameter Description
Connection settings
Allow connections from the Check this box to allow only Computers with listed IP addresses to
following IP addresses only connect to security system. Optional parameter.
www.isscctv.com
SecurOS 90 Administration Guide
Core Subsystem
The object is used to provide a connection between given (Monitoring Center) and remote SecurOS
security system.
Parent object — Computer — any Computer of the SecurOS network which role is Video Server.
Parameter Description
Integration settings
When receiving or updating configuration the system will create the following objects:
1. Proxy-computers - "copies" of all of the Computer objects existing within the remote security system.
All created proxy-computers are children of the Remote system object and have names of the
following format: <Remote system Name>:<Computer Name>.
2. Video Capture Devices with ISS Video Concentrator device type related to remote Video Servers. IP
address parameter of the Video Capture Device will possess the IP address of the appropriate remote
server. All created objects are children of the Monitoring Center's Video Server and have names of the
following format: <Remote system Name>:<Remote Computer Name>.
www.isscctv.com
SecurOS 91 Administration Guide
Core Subsystem
Notes:
1. Channel number for each of the created camera will possess the ID value of appropriate Camera
existing within the remote security system.
2. No Motion Detection Zones are created for the Cameras, related to the cameras of the remote
configuration.
To configure Monitoring Center to work with local archives change the type of the created Video
Capture Devices (see p. 2). To do this open object settings window of all of the created Video Capture
Devices, select the Video Repeater value in the Type box, apply new settings.
After Video Capture Device type is changed it allows the operator to work with Cameras of the remote
servers in the same way as if they were set within local SecurOS network.
Created objects make it possible for operator to monitor the events generated by Camera and Computer
objects of the remote security system with the help of Map v2, Monitor and Event Viewer objects of the
Monitoring Center.
The object is used for SecurOS objects logical grouping based on territory location.
Note. Several Area Zone objects within the same parent object are combined into the Area Zones logic group
in the objects tree.
5.2.11 Region
Represents a separated area of the territory defined by the parent Area Zone object. Applicable when
configuring access control subsystems.
www.isscctv.com
SecurOS 92 Administration Guide
Core Subsystem
Parameter Description
Insert any text in free form, for example, specify the area location.
Comments
Not used by a system itself.
Persons
The object is designed to set the rules used to filter events that must be either displayed in the Event
Viewer window or saved into the database.
Parameter Description
Rules list
Inf ormation f ield: name of the selected source object (Id and Name
Name parameters are complementary — if the one is selected then the other is
filled automatically).
www.isscctv.com
SecurOS 93 Administration Guide
Core Subsystem
Parameter Description
Event to process. List of values depends on the object type. If not set rule
affects all object' events.
Notes: The one of the following predefined event group can be selected
besides individual or all events:
1. Alarm only.
Event 2. Information only.
3. Alarm and information.
To create a filter rule for the individual object' event select it from the list of
possible object events.
To create a filter rule for the all object' events select the blank string.
To create a filter rule for one of predefined event group select that group (in
the top of the list).
Rule result. Possible values:
Buttons
Click to display Events to test block that allows to check the rule. Rule
Test filter
checking procedure is described below.
Button is used to sort rules manually. Click to move the rule one position
Up
up.
Button is used to sort rules manually. Click to move the rule one position
Down
down.
To check the rule (i.e. to make sure what kind of action for the event this rule result in) do the
following:
1. Click Test filter in the Event Filter object settings window (see fig. 72).
2. System will display Events to test block (see fig. 74).
www.isscctv.com
SecurOS 94 Administration Guide
Core Subsystem
3. In Events to test block click Add event button. Set the event need to be tested.
Note. Rule parameters of the Events to test block are the same as described above in Rule list.
4. Click Run test button. System will execute test and display result in the Rule field:
No filter rules — list of rules contains no rules for the defined event.
Event is allowed by rule N — list of rules contains rule N that allows defined event.
Event is forbidden by rule N — list of rules contains rule N that forbids defined event.
Note. "N" stands for the sequence number of the rule in the rule list.
5. To drop down Events to test list click Remove event or Remove all button. To hide Events to test
block click Hide test filter button.
6. To save/discard changes and leave administration mode click OK/Cancel button.
www.isscctv.com
SecurOS 95 Administration Guide
Core Subsystem
Object is designed both to send events generated by system's cameras and to transmit cameras' states to
the specified computers as SNMP traps. Traps for the following events are transmitted automatically as
soon as they arise in the system:
Camera: changed state;
Camera: focused;
Camera: defocused;
Camera: unblinding;
Camera: blinding;
Camera: attached;
Camera: detached.
When changing camera' states the current states are transmitted. Received traps are processed with the
help of SNMP Manager.
Object can be used only if Management and Monitoring Tools components is installed on the
computer (see Setting up Windows Managing and Monitoring Tools section).
Note. It is allowed the only one SNMP agent object in the object tree of the local computer. If object is already
created then Create SNMP agent command is unavailable.
www.isscctv.com
SecurOS 96 Administration Guide
Core Subsystem
After operations described above are performed SecurOS will automatically send traps to the specified
IP addresses in real-time mode.
SecurOS supports managing administrator and operator rights for individual persons and individual
objects. This is done via configuration of Person objects (which define real user accounts) and User rights
object— sets of access levels of users group for each object within SecurOS security network.
Also, the access level rights can be configured for the users of already created network domain, which
includes computers of a certain security zone (see Configuration of Network Domain User Rights). In
this case, local security zone user accounts will be disabled.
Warning! If security system has more than one security zone, you must define user rights for each security
zone, otherwise you will be able to automatically login to the system with system-wide superuser rights from
any computer that belongs to unrestricted security zone!
www.isscctv.com
SecurOS 97 Administration Guide
Core Subsystem
After you have defined user rights within security network, SecurOS will require to enter user name
and password on software startup. Since every computer belongs to some security zone, you can login
under users that belong to the same security zone as the computer in question. Other username/
password combinations will not work, even if they are valid within other security zones.
1. Plan, how many different access rights your security zone should have, and what users will use each
of these rights.
2. Create a Department object (see Department) under Security Zone object.
3. Create a necessary number of Person objects (see User Account) within this Department object by the
required number of SecurOS system users (administrators/operators).
4. Create User Rights objects within Security Zone object. Its settings window (see User rights section)
contains the tree at the top that is identical to the objects tree of the security network. Edit access
rights of one or more users to each particular object by clicking its icon consequently (see User
Rights).
5. Repeat steps 2—4 for each security zone within your network. For each security zone the objects tree
would contain elements shown in figure 76.
In this section the procedure of Active Directory storage (see Active Directory storage) and User rights
objects parameters configuration is described for the domain provider (Windows NT or LDAP) that
receives SecurOS user authorization request.
www.isscctv.com
SecurOS 98 Administration Guide
Core Subsystem
To set user rights for a user, fill Users and Groups field in User rights object settings window (see User
rights section) with a series of network domain user login names separated by commas (e. g. j-smith).
To set user rights for a user group, fill Users and Groups field in User rights object settings window
with a network domain users group login and ,group postfix without space (e. g. Users,group). The
,group postfix is obligatory.
To set user rights for a user group, fill Users and Groups field in User rights object settings window
with the following string: &(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-
dev,dc=test), where Builtin is a system folder where Users users group is placed.
www.isscctv.com
SecurOS 99 Administration Guide
Interface Subsystem
6 Interface Subsystem
Interface subsystem, containing objects responsible for visual representation of the system objects and
actually used by operators working with the system.
Once registered within security network, the maps can be used by administrator to place the icons of
security equipment elements, such as cameras, alarm sensors, door detectors on them, representing
object's physical location within the controlled territory (see Map Creation below).
The operator can use maps to monitor entire territory, and also use the icons allocated on a map for fast
control the corresponding object. If an intrusion alarm has been detected, operator can immediately see
the physical location of the target area, switch to the video cameras that are located close to this area by
double-clicking on icons on map, switch lights on within that area, etc.
To deploy a map:
1. Draw a set of images that will be used as map layers (see Drawing Map Layers).
2. In objects tree locate the Computer object that represents your current administration workstation or
application server from which you are currently administering SecurOS security network, see if there
is any child Desktop object under it and create it if necessary leaving default object parameters.
3. Create child Map or Map v2 object for the selected Desktop. Once the object's settings window appears
(see object description in Map or Map v2 section), provide its position and dimensions. For Map v2
object it is necessary to choose previously created map file (see Map v2 about map file creation).
4. Click Setup button to apply changes and close object's settings window. The map window will
appear on screen with map file loaded.
5. In case of Map object— place security network objects like Camera, Sensor, Microphone on map from
within that administration workstation or application server (see Placing, Moving and Rotating
Objects on Map).
6. Move Map (or Map v2) object onto operator workstation for real-time interaction (see Moving Map
Objects onto Operator Workstations for detailed description of moving map objects).
Note. Map v2 object is an updated analog of Map object. The main difference from the old object consists in
object' configuration process (moving objects on map), user interface (map scaling, working with filters etc.),
see Map v2.
www.isscctv.com
SecurOS 100 Administration Guide
Interface Subsystem
Use of map layers is comfortable for large territory separation on several independent parts. Map layers
are raster graphical images in BMP format. To draw horizontal plans of your object from scratch, one
can use any graphical drawing software that allows to save raster images in these formats. You can also
export raster graphics directly from CAD software where you or the owner of the building develops
source documentation on the building or territory, or you can scan paper with previously printed plans
of your territory.
Note. Images in PNG, GIF or JPEG formats can be also used for Map v2 objects.
The resulting image or images can have any colors and style, but you should consider the following:
1. All plans of your territory should be done in the same graphical style for better visual perception.
2. Keep the image dimensions in pixels comparable to dimensions of the target maps on the screen of
the operator workstation to avoid redundant scrolling.
3. Colors should not distract operator from objects placed on map. Do not use gaudy colors, avoid
using red and orange colors. The more neutral the background is, the better.
4. Provide all territories with descriptive captions. Text should be clearly visible and readable.
5. Give images meaningful names (i. e. map_floor1.bmp, map_floor2.bmp, map_room123.bmp).
Note. On Map object creation, default image will be loaded that is named map.bmp and placed in \Bmp
subfolder of SecurOS program folder. For convenience, it is recommended to place all your bitmap files used
as map images for Map object into the same subdirectory.
Figure 77 shows the sample sketch of one floor of a building, which can be used in a map.
www.isscctv.com
SecurOS 101 Administration Guide
Interface Subsystem
Once the Map or Map v2 object has been fully configured, you can transfer it to the target operator
workstation, if necessary.
www.isscctv.com
SecurOS 102 Administration Guide
Interface Subsystem
Run pgAdmin system utility (Start Programs PostgreSQL 9.1 pgAdmin III).
Choose Tools Server configuration pg_hba.conf in the utility menu. The Access
Configuration Editor window will appear.
Double-click on empty string. The Client Access Configuration will appear.
Fill up the window fields:
Enable— enable this option;
Type— choose host from the list;
Database— choose all from the list;
User— choose all;
IP Address— specify network address and subnet mask (e. g., 192.168.0.0/16, that allows access
from IP addresses within the range 192.168.0.1 — 192.168.255.254);
Method— choose trust or md5;
Click OK and choose File Reload server in the window menu to accept changes.
Define a connection string to main SecurOS database using DSAdmin utility (see DSAdmin
Utility).
6.2.1 Desktop
This is a base user interface object that acts as a container to other UI objects. It is used for placement of
several components of user interface.
Warning! All user interface visual components are displayed only by means of SecurOS desktops.
Example. Let two rooms are on a secured area. There are PTZ camera and microphone in the first room and
two cameras in the second room. System administrator may configure two Desktop objects. On the first screen
there could be a PTZ control dialog window, video displaying monitor and audio player to work with
microphone. On the second screen there could be a second monitor to watch for cameras from the second
room, and a map of the whole territory to provide visual access to all the security devices and to control their
states.
www.isscctv.com
SecurOS 103 Administration Guide
Interface Subsystem
Notes:
1. Several Desktop objects within the same parent object are combined into the Desktops logic group in
the objects tree.
2. If the object name is Playback, then all its Monitor child objects will be displayed in a drop-down
list (see SecurOS User Guide for more information).
6.2.2 Map
Object represents a multi-layered graphical map of the territory under control (see below).
Parameter Description
Select this check box if you want the map to switch automatically to
Auto switching
layers that contain icons of the devices in "alarm'' state.
For the user's convenience and ability to control large territories, maps can contain several image layers
(e. g. floors of the building).
Example. For the large territory each controlled area can be represented by simple object called level. These
layers can be linked together with special icons called links, which can be imagined as hyperlinks between
several pages on web site.
These layers can be linked together with special icons called link, see figure 79 (which can be imagined
as hyperlinks between several pages on web site).
www.isscctv.com
SecurOS 104 Administration Guide
Interface Subsystem
Once created, a link icon will appear on the map (see figure 79). Link icon can be moved across the map
by pushing left mouse button on icon, dragging your mouse pointer to the new location and then
releasing the left button.
Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation, we
recommend to create another link on the target layer that points back to the source one. Thus, it will be
possible to switch between layers in both directions smoothly.
To remove layer from the map, use Remove map context menu option.
Warning! This operation deletes map's current layer without any confirmation and cannot be undone.
Original *.bmp image file will not be deleted.
To navigate forward/backward through the list of available layers, use Next Map and Previous Map
context menu options.
Note. This way of navigation is available in administrative mode only. You should link all layers together
using Add link feature before using map in operator mode.
To change title of the currently visible layer, use Set Title context menu option.
6.2.2.2 Placing, Moving and Rotating Objects on Map
To place an object on map, select the object from the object tree and click On Map button on
administration toolbar. From the list that appears select the map to which the object should be placed,
and the icon representing the object is displayed on the map.
www.isscctv.com
SecurOS 105 Administration Guide
Interface Subsystem
To move icon around, select it first by clicking on it (a currently selected icon is marked with four green
dots called handlers around it). Then drag the icon using mouse (push left mouse button on icon, drag
your mouse pointer to the new location and then release the left button).
Figure 81.
Moving icon
To rotate icon, drag any of the icon handlers to turn the icon around its center. To reflect real object's
orientation in space, icon can be rotated (useful for video cameras).
Figure 82.
Rotating
icon
Create copy— duplicates object icon on map. This is useful, for example, for alarm loops, where
single Sensor object actually represents a garland of alarm sensors attached, for example, to every
window; you can create several icons of the single object in accordance with the real number of
alarm sensors and place each icon on every window depicted on the map.
Delete— removes icon from the map without any confirmations.
www.isscctv.com
SecurOS 106 Administration Guide
Interface Subsystem
Hide— marks object as hidden. It will be still visible while in administrative mode, but will
disappear from the map in operator mode.
Show title— shows or hides icon's caption on map.
6.2.3 Map v2
Object represents a graphical editable map of the territory under control and installed SecurOS network
objects (see below).
www.isscctv.com
SecurOS 107 Administration Guide
Interface Subsystem
Parameter Description
Specify resource file with the map images and objects. Click the <+>
Resource file button to get/update the drop-down list of files and select the
required one.
Displaying the Levels tab in the Map v2 window. The tab contains
the levels list of the Map v2, that allows quick switching between
Show level list levels.
By default is checked.
Displaying the Alarms tab in the Map v2 window. The tab contains
the alarmed levels list of the Map v2, that allows quick switching
between alarmed levels.
Show alarmed levels Note. The level is considered alarmed if at least one of the object placed
on this level is alarmed.
To configure map resource file for Map v2 object use Map2 Editor application.
2. Click Create button and add at least one layer to a new map (see Working with Map Layers).
3. Set a password on map file, if necessary (see Setting Passwords).
4. Click Save button to save changes to a new map file. The standard Save As dialog will appear to
define map file name and folder where to save.
www.isscctv.com
SecurOS 108 Administration Guide
Interface Subsystem
file from the SecurOS\maps folder. If a password was previously set for the selected map file
(see Setting Passwords), a request window will appear, see figure 86.
2. Type in password in Password field and click OK button. The chosen map will be displayed in the
Map2 Editor application window.
3. Click Save button after map editing or choose File Save as to save map file with new name. If map
has not been modified, then Map hasn't been modif ied. Do you want to save it anyway?" message box
will appear. Click Yes to save map file in any case.
Note. Saving map file (if nothing is changed) can be used to change time of file modification (e. g. to refresh
file' creation date) or to rerun map (e. g. to refresh map on screen or to include new map background).
www.isscctv.com
SecurOS 109 Administration Guide
Interface Subsystem
Note. By means of Map2 Editor application it is possible to place/move/remove objects from map, add/
remove maps layers (levels). However, to operate with objects (such as, to alarm camera), use SecurOS map
interface in operator mode (see SecurOS User Guide).
To rename current layer, right-click its name in Levels area and choose Properties item from the drop-
down list (see figure 88). Type a new layer name in Label field of the displayed window.
www.isscctv.com
SecurOS 110 Administration Guide
Interface Subsystem
Note. There are two link types for Map v2 object: common and blinking named with blink in link list. The
second one works as common link but starts blinking on the corresponding layer alarm. For example, if one
layer is active on user map interface and there is an alarm on the other one then the link map icon will start to
blink.
2. Move the selected link to the map area by dragging left mouse button. Once moved, a link icon will
appear on the map (see figure 89).
Note. Link icon can be moved across the map by pushing left mouse button on icon, dragging your mouse
pointer to the new location and then releasing the left button.
To remove a layer from the map, right-click its name in Levels area and from the drop-down list
choose Erase context menu item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see Map v2). The standard Save As dialog will appear to define map file name and
folder where to save.
6.2.3.2 Placing Objects on Map
To place an object on map do the following:
1. select it in Map2 Editor object tree (Types area) and drag it to the map area.
Warning! Identifier must be completely identical (including letters case) to this object' ID value in SecurOS
system, otherwise the object would be invisible for an operator.
To replace an object icon, click it and dragging left mouse button move it to the required place.
www.isscctv.com
SecurOS 111 Administration Guide
Interface Subsystem
2. Move mouse pointer to the double-side arrow (on the right icon side).
3. Dragging left mouse button rotate the icon.
To remove an object icon from map, click it and from the drop-down list choose Erase item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see Map v2).
6.2.3.3 Setting Filters
One can use filters to browse only required objects on map (e. g., filter can be configured to display only
cameras).
To create filter:
1. Double click add new item in Filters area of Map2 Editor application window. Filters settings
window will appear (see figure 91).
Working with filters parameters (delete or edit them) is similar with the layer ones (see Working with
Map Layers).
www.isscctv.com
SecurOS 112 Administration Guide
Interface Subsystem
To protect the map from someone editing it is possible to set a password on the map file.
To set a password:
1. Click File button on the Map2 Editor toolbar.
2. Choose Set password item. New window will appear (see figure 92).
Now to open this map file a password request window will appear (see Map v2 section).
Object represents a visual log of the events that occur within entire system (see the object' user interface
description in SecurOS User Guide).
www.isscctv.com
SecurOS 113 Administration Guide
Interface Subsystem
Parameter Description
Specify object window top left corner coordinates (X, Y), as well as
X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.
Event filter that sets events displayed in the Event Viewer interface
window (see SecurOS User Guide). Optional parameter. If not set
Use event filter
all system events will be displayed. If specified, only events allowed
by selected filter will be displayed.
Time of acknowledgement Define the time for alarm event acknowledgement by the operator,
of alarm event by the in seconds.
operator
Object is used to automatically launch external application and position its window on screen.
Parameter Description
Specify object window top left corner coordinates (X, Y), as well as
width and height (W, H), in percentage of display' horizontal and
X, Y, W, H
vertical size. WIndow size can be set not for all applications when
they are called by external program.
Specify path to executable file. You can omit absolute path to the file
Program if it is located in the directory specified in the Path environment
variable.
www.isscctv.com
SecurOS 114 Administration Guide
Interface Subsystem
Use this object to define HTML forms permanently displayed on the screen of parent desktop object.
Object is intended for integration of any custom user interface created by means of HTML forms.
SecurOS includes a number of HTML forms ready to use most often to display PTZ control panel on a
desktop (see SecurOS User Guide). Object is displayed while screen is active or until SecurOS system
shut down.
Otherwise, a new HTML form can be also programmed for specific means (see SecurOS Programming
Guide).
Note. All system HTML forms are in \dialogscript subfolder of SecurOS folder.
Parameter Description
Specify object window top left corner coordinates (X, Y), as well as
X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.
Enable this option to select a target HTML form file from the
dropdown list of files located in \dialogscript subdirectory of
SecurOS program folder (if this option is not active, you can select
HTML file from any folder by using [...] button that invokes
Use standard script file standard Open dialog.).
Note. To display PTZ camera control dialog, select file with name
corresponding to PTZ protocol of the camera.
The object is used to call popup HTML windows, that are displayed on the Monitor dynamically as a
response to the external event or system behaviour. For example, HTML Dialog can be activated with
the SecurOS script when processing events. Objects of this type can be closed manually or
automatically by system (and also by scripts).
www.isscctv.com
SecurOS 115 Administration Guide
Interface Subsystem
Parameter Description
Enable this option to select a target HTML dialog file from the
dropdown list of files located in \dialogscript subdirectory of
SecurOS SecurOS program folder (if you uncheck this option, you
can select HTML file from any folder by using [...] button that
Use default directory invokes standard Open File dialog).
Note. [...] button is displayed only wneh object is configured on the local
computer. For the remote computer, including remote Operator
Workstation, the button is not displayed.
www.isscctv.com
SecurOS 116 Administration Guide
Video Subsystem
7 Video Subsystem
Video subsystem is used to operate and configure the video devices (video capture cards, analog and IP
cameras, PTZ devices) within the SecurOS network, transmit video streams between servers,
concentrators and workstations and work with live and archive video from within workstations.
SecurOS system provides a multi-zone detector to split camera surveillance area into several
independent areas (zones), which may have different motion detection parameters, such as object size
threshold or alarm states.
A Zone object corresponds to each motion detection zone (see Zone section). Basically, all zones are
divided into two types:
Example. For instance, the user needs to control an area with a gate and several windows seen above the gate.
The task is to make alarm activation each time somebody appears at a window whereas to neglect firing
alarms each time the gate is used. In this particular case, it is recommended to set two different Zone objects:
the first for the gate and the second for the windows. The window zone should be configured as Alarming (to
fire an alarm upon any motion detection), while the gate zone should be configured as Informational (to
generate a motion detection event, but not to fire an alarm). Moreover, if different windows have different
types of illumination, you can configure a lot of Zones with different contrast parameters for reliable motion
detection for each window.
www.isscctv.com
SecurOS 117 Administration Guide
Video Subsystem
Both alarming and informational zones should be armed by administrator to detect motion. A zone can
be configured to be always armed, meaning an operator does not have to arm it manually (see Zone
section). All the other zones should be armed manually.
www.isscctv.com
SecurOS 118 Administration Guide
Video Subsystem
On activation of camera cell and using its archive mode on a video monitor, some control elements
appear (see SecurOS User Guide). They are hidden after some period of inactivity.
When mouse placing over inactive camera cells, control buttons appear on a cell. Buttons appearing
may be deactivated for every cells of a certain monitor.
To set up described parameters for a certain monitor, do these steps on the computer with the monitor:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Create \HKLM\SOFTWARE\ISS\SecurOS\iss-video-gui\strings new branch.
4. Create lo-<nnn>-auto_deactivation_interval parameter in the new branch, where identifier
of the corresponding Monitor object must be substituted for <nnn>. Specify for the new parameter a
value of time for control buttons deactivation in milliseconds (default value is 10000).
5. Close the regedit utility.
6. Launch SecurOS again.
On using low speed network (see requirements in SecurOS Installation Guide) it is recommended to
configure the record buffer size by setting its parameters.
To set the record buffer parameters, do these steps on the computer keeping video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video branch, create mplayer_queue_min
parameter and set it to the minimal number of video frames in the buffer (default value is 40).
4. In the same branch create mplayer_queue_max parameter and set it to the maximal number of
video frames in the buffer (default value is 70).
5. Close the regedit utility.
6. Launch SecurOS again.
This section describes specifics of the archive recording operation and its configuration.
To avoid situations when there is no free space on disk in case of permanent writing video archive in
SecurOS format from cameras (operative video archive) one should previously set mandatory free disk
space.
To define it, do these steps on the computer keeping operative video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video, create FreeMb key there and define
mandatory free disk space (in MB) for archive recording as its value. Now archive will be recorded
www.isscctv.com
SecurOS 119 Administration Guide
Video Subsystem
on the defined disk till its free space is less than the FreeMb value.
Note. The same FreeMb parameter determines free space threshold for audio archive records.
If free space threshold is reached then the archiver will try to record to other available disks. If there is
no free disks then the ring recording will be used (old files will be deleted).
Warning! FreeMb parameter is also used for long-term video archive. Define this parameter within \HKLM
\SOFTWARE\ISS\SecurOS\NISS400\Archiver registry key on the computer keeping long-term
video archive.
When recording video archive it splits into files contain fixed frames number and after exceeding this
number a new file recording begins. When operator navigates archive records are scanned in the order
of splitting on these files. To make more efficient search on archive, administrator can change frames
number in archive files.
To change frames number in archive files, do these steps on the computer with operative video archive
disks:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video, create MaxFrames key and define
maximum number of frames in any new files of archive records.
4. Close the regedit utility.
5. Launch SecurOS again.
When recording video archive the video frames queue may cause computer RAM overflow. The turn of
record in file system is limited— 100 MB. Value can be corrected by the MaxMemMb parameter in
section of the \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video\FS register.
Warning! Installation of great values for the MaxMemMb parameter can lead to reexpenditure of address
space allocated with operating system on process and to emergency end of process.
Note. In case the disk subsystem doesn't cope with recording and thus the mechanism thin out, in the logs
\video.log file, following record is fixed: "WARN VideoFileRecorder Queue length has exceeded. Some
frames was dropped.''.
www.isscctv.com
SecurOS 120 Administration Guide
Video Subsystem
Administrator can set duplication of the operative video archive recorded from a certain cameras to a
long-term video archive in the SecurOS format on any available disk by the help of Archiver object
(see Archiver).
To avoid situations when long-term video archive is completely updated immediately rather than step
by step one should previously set mandatory size of old files to be deleted on the ring (repeat)
recording.
To define it, do these steps on the computer keeping long-term video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Archiver, create ringSize key and define
size (in MB) of old files to be deleted on the ring recording.
4. Close the regedit utility.
5. Launch SecurOS again.
Note. Administrator can set video archive converting from SecurOS format to AVI or ASF format from certain
cameras by the help of Archive Converter object (see Archive Converter). On this operation files record into
temporary files folder and are converted then.
Video and relevant markers are stored separately — video is saved to the Operative archive, Alarms and
Bookmarks are saved into the database.
Additional Information
Operative archive — rewritable archive. Once the max archive size is reached the oldest data will be rewritten with
the newest ones. By default is stored in VIDEO folder on the disk, selected in the Computer object settings.
Long-term archive — permanent data storage, produced by conversion of Operative archive with the help of Archiver
Dialog object. By default long-term archive is created in the \Archive\VIDEO folder on the disk, selected in
the Archiver object settings. For the detailed description of the Long-term archive creation procedure see SecurOS
User Guide.
Video fragments relevant to the Alarms and Bookmarks stored in the database can be exported from
Operative and Long-term archives. Export is available only if Archive Converter object which settings
define output file name format and other parameters of exported file was preliminary created in the
object tree. This Archive Converter must be selected in the Monitor object settings (Export engine
parameter).
www.isscctv.com
SecurOS 121 Administration Guide
Video Subsystem
Because of video and relevant markers are stored separately the following sampling algorithm is used
when exporting data:
1. If video fragments relevant to the given time period and camera are stored both in Operative and
Long-term archives, then only files stored in Operative archive will be exported.
2. If some video fragments relevant to the given time period and camera are missing in the Operative
archive, but are present in the Long-term archive, the fragments of Operative archive will be exported
at first, then fragments of the Long-term one.
Notes:
1. In this case two independent export tasks are created - one for Operative erchive, which is executed at
first and the second for Long-term archive.
2. If Operative archive conversion procedure failed or export task was canceled by operator then Long-
term export task is not executed.
3. By default fragments are exported to the \Exported Fragments folder of the product root
directory.
4. Names of files produced by Long-term archive conversion has long_term file type extension prefix.
For example, 1 (2012-04-17 13'23'35 - 2012-04-17
13'23'36).long_term.asf.
3. If Operative archive does not contain fragments relevant to the given time period and camera, then
Long-term fragments will be exported.
To start export click (Export entries) button on the Monitor' DVR Search Panel (see SecurOS
User Guide).
www.isscctv.com
SecurOS 122 Administration Guide
Video Subsystem
The object represents a single capturing chip of a physical video capture card installed on the computer,
or video hub or IP camera plugged in to TCP/IP network.
Example. In case of video capture cards, calculate the total number of chips on all video capture cards and
create N objects with N unique PCI channel parameters. For example, TVISS4-02 cards have four
independent video capturing chips onboard and should be represented within a system as four Video Capture
Device objects. TVISS1-02 has one video capturing chip and should be represented as a single Video Capture
Device object. By this it does not matter correspondence between chips and Video Capture Device objects.
Note. It is recommanded always start PCI channel parameters number from 00 and avoid gaps in
numbering. For example, if there are one TVISS4-02 card and two TVISS1-02 cards on the computer, create
six Video Capture Device objects and set their PCI channel parameters to 00, 01, 02, 03, 04 and
05.respectively.
Warning! This object and its children objects are accessible only when Video Server value of the Role
parameter is chosen in the parent Computer object settings (see Computer).
www.isscctv.com
SecurOS 123 Administration Guide
Video Subsystem
Parameter Description
Model If enabled select the model of Video capture devicefor given Model.
www.isscctv.com
SecurOS 124 Administration Guide
Video Subsystem
Parameter Description
Type of the video signal format (NTSC or PAL) for all other
types (if available).
www.isscctv.com
SecurOS 125 Administration Guide
Video Subsystem
Parameter Description
Password Warning! Password is displayed while typing, but on the next opening of
settings window "*" symbols are displayed in the field (the number of
symbols differs from actual password length).
7.5.1.3 Camera
This object represents a single video stream from an IP device or from an analog camera connected to a
ISS TVISS video capture board.
Note. If at least one Region object (see Region) is registered in the system, then the Region drop down list box
would be accessible to choose a Region of a new camera placement in Parameters of created object window
when creating a new Camera object.
www.isscctv.com
SecurOS 126 Administration Guide
Video Subsystem
Warning!
1. The Camera object includes general (required for each Camera), and specific parameters.
2. Set the specific parameters of the Camera object according to the Type and Model of the parent Video
Capture Device object.
3. In the settings below, only the more important (most commonly used) parameters are described.
Additional Information
The settings that are in the form of a check-box are optional. Some of these parameters can also be set externally
(especially for IP devices), i.e. through the web-config of the camera. Enabling the check-box of an optional
parameter overwrites the default value (or value from the camera web-config). If you need to change the current
value of a optional parameter after deactivating it from object settings window, the camera web-config must be
used.
Parameter Description
Select a Microphone object to record audio and video synchronously. This will
Microphone allow you to playback synchronized video a audio from an operator interface
when choosing appropriate camera from the Monitor camera list.
www.isscctv.com
SecurOS 127 Administration Guide
Video Subsystem
Parameter Description
To enable an IP device's native telemetry control, select the Use value from the
drop-down list in the box or, for analog cameras, select previously created
additional PTZ device object (see Setting up telemetry section). By default the
Pan/ Tilt/ Zoom Don't Use option is selected.
Note. PTZ control panel becomes active when operator selects this camera on a video
monitor.
Manual and alarm — enable this option to allow to start recording video
Recording mode automatically when a motion by this camera is detected, and to stop it
automatically when motion ends. Recommended for working with DVR
search panel (see SecurOS User Guide).
Note. In this mode record can be stopped only changing Camera settings.
Parameter defines the video image displaying format in the Camera cell for all
Monitors all over the SecurOS security system. At the same time for each
Monitor video image displaying format can be locally changed for the selected
Camera with the help of this Camera control (see SecurOS Quick User Guide).
Possible values:
Keep aspect ratio — original format of the video frame will be used
when displaying video. Is the default value;
Viewing
Stretch to cell — the frame is stretched to full size of the Monitor'
cell;
Exception. If Layouts type parameter of the Monitor is set to special, and 1*1 layout
is selected (Camera cell takes all Monitor working area) then image will be displayed as
4:3, even if Viewing parameter is set to Stretch to cell.
Saving specified values and closing object settings window (Closing object
OK (Cancel)
settings window without changes).
Warning! It is not recommended to set GOP (GOV) parameter greater than 32 for the connected IP cameras
and video servers. IP cameras can be configured through it's web interface. For some types of Video Capture
Devices this setting is available through Additional settings of the Camera object.
www.isscctv.com
SecurOS 128 Administration Guide
Video Subsystem
Parameter Description
The original frame rate from the camera is maintained for the
Full FPS on alarm recording period during an alarm (motion detection). Only available
if the Reduce max FPS to parameter is selected.
www.isscctv.com
SecurOS 129 Administration Guide
Video Subsystem
Parameter Description
Enable this option to protect the video archive for this camera with
a password (this will apply to newly created video records; current
archive will remain untouched).
Protect with password To view password-protected cameras from operator interface, you
will need to specify the same password in camera settings within
the Monitor object settings (see Monitor). This password will also be
requested to view and convert video archives using the Media
Export Utility (see ISS Media Export Utility).
Parameter Description
Select this check box to force the system to generate special events
Blinding detection each time blinding is detected. These events can be used in macros
or scripts.
www.isscctv.com
SecurOS 130 Administration Guide
Video Subsystem
Parameter Description
Size 50%— blinding will be detected if 50% of the frame area has low
contrast.
100%— only full blinding (entire camera view has low contrast)
will be detected.
Select this check box to turn the defocusing detector on. The system
Defocusing detection
will generate special events if the camera is ever defocused.
www.isscctv.com
SecurOS 131 Administration Guide
Video Subsystem
Warning! All parameters of the tab, excluding the Wiper parameter, will be ignored, if in the General tab the
Pan/ Tilt/ Zoom parameter was not set to Use (or to a PTZ Device).
Parameter Description
Select from the drop-down list the PTZ Protocol supported by the
current Camera model.
PTZ protocol
Note. The parameter is available depending on the type of the parent
Video Capture Device object.
If the Camera is equipped with the Wiper, select the object that can
control it.
Wiper
Note. For the details see Configuring System to Work with Wiper.
www.isscctv.com
SecurOS 132 Administration Guide
Video Subsystem
Parameter Description
7.5.1.4 Zone
Represents single detection zone of the motion detector (see Working Principles of Motion Detection
Zones for detailed information). One default zone Main is created automatically when Camera object is
created and covers all visible area of the Camera cell.
While configuring a Zone object, take into account the following parameters:
Contrast slider defines a threshold for object contrast, relative to the background. Top position of
the slider means the zone would detect motion only if a moving object differs greatly from the
surroundings. Bottom position of the slider means the zone would detect motion even if a moving
object slightly differs from the surroundings.
www.isscctv.com
SecurOS 133 Administration Guide
Video Subsystem
Size slider defines a threshold for object size. Top position of the slider means the zone would
detect motion of big objects only, bottom position of the slider means the zone would detect motion
of small objects.
Note. The values of the Contrast and Size sliders should be set by practical consideration.
Alarming flag should be active to fire an alarm on the camera upon any motion detection within
the zone. If this flag is not checked, the zone is considered informational.
Armed always flag should be active to have the zone always armed, regardless of the armed/
unarmed state of other zones on the same camera.
Smart Search flag must be activated to make it possible searching alarms by mask.
Note. Several Zone objects within the same parent object are combined into the Motion Detector logic group
in the objects tree.
www.isscctv.com
SecurOS 134 Administration Guide
Video Subsystem
Parameter Description
Zones
Alarming If the option is selected then Smart Search option will be available.
If you clear this option, the zone will be treated as "informational":
no predefined actions will be performed, the Zone object will
generate events upon detection start and end, thus allowing you to
program custom reactions via macros or scripts.
Select this option to keep armed mode for camera. Operator won't
Armed always
be able to disarm this zone.
Motion detection
www.isscctv.com
SecurOS 135 Administration Guide
Video Subsystem
Parameter Description
Analyze decimated stream, Note. The stream is decimated by i-frames. If value specified in the max
max FPS FPS parameter is less than result value of the initial decimation then the
i-frames themselves are further decimated.
Show all zones Click the button to display all camera zones.
www.isscctv.com
SecurOS 136 Administration Guide
Video Subsystem
For the detailed information about motion detection zones control see Managing Zones section.
www.isscctv.com
SecurOS 137 Administration Guide
Video Subsystem
Parameter Description
Inner zone Select from the list a Zone object corresponding to the inner zone.
Outer zone Select from the list a Zone object corresponding to the outer zone.
Represents interface to connect PTZ devices (e. g. RS485 port or serial communication port with RS232
to RS485 converter attached if PTZ device works through the RS232/RS485 interface, or a network PTZ
camera), and a specific PTZ protocol.
www.isscctv.com
SecurOS 138 Administration Guide
Video Subsystem
Parameter Description
Select from the list box the required PTZ protocol to control PTZ
PTZ protocol
device.
Select from the list a method of parity control for data transmitting
Parity through the serial port (consult PTZ device documentation for
information on required settings).
Enable this option to work with PTZ device over the network.
Represents physical PTZ device connected with a camera through RS485 interface or integrated with an
analog/digital PTZ camera (or dome camera), and a list of its preset positions (presets).
Warning! When connecting an analog camera to video server, including video hub IP-devices, specify ID of
the new object that equals to identifier specified in video-HUB serial port settings (when connecting through
RS232/RS485 interface), or identifier of unique RS485 interface address of the corresponding physical device
or camera. RS485 address is set on device by DIP switches (consult PTZ device documentation for more
information). ID should be in 0...255 range as single RS485 line can address up to 256 devices.
Notes:
1. Choose name of the object from the Pan/ Tilt/ Zoom list in the camera object settings window
corresponding to the camera controlled by this PTZ device (see Camera).
2. To control PTZ device through HTML form, it is necessary to indicate an identifier of the
corresponding PTZ Device object in the Address field of the PTZ dialog window (see SecurOS User
Guide).
www.isscctv.com
SecurOS 139 Administration Guide
Video Subsystem
Parameter Description
Used to get archives from the video servers and convert video to ASF, AVI or ISS format.
Warning! To play quick converted video It is strongly recommended to use VLC media player.
www.isscctv.com
SecurOS 140 Administration Guide
Video Subsystem
Parameter Description
Container
www.isscctv.com
SecurOS 141 Administration Guide
Video Subsystem
Parameter Description
Select format of converted file from the drop-down list: AVI, ASF or
ISS. Default value is - ASF.
File type Note. When ISS type is selected then archive is copied into the
specified folder without changing its original proprietary format.
Converted archive can be further played back with the help of the ISS
Media Export Utility.
Max size of the each elementary file of full archive, MB. Default
value is 2000.
Split into files up to
Warning! Due to architectural limitations of the AVI container format file
size cannot exceed 2000 MB if File type parameter is set to AVI.
Codec MJPEG;
MPEG-4.
FPS divider Set the factor of decimation. Range of values: [2; 100].
PCM;
Codec
WMA (for ASF contailer);
www.isscctv.com
SecurOS 142 Administration Guide
Video Subsystem
Parameter Description
www.isscctv.com
SecurOS 143 Administration Guide
Video Subsystem
Parameter Description
www.isscctv.com
SecurOS 144 Administration Guide
Video Subsystem
Parameter Description
Warning! Windows Media Player installed on Windows XP does not play video files converted to asf format
with MJPEG codec.
7.5.1.9 Archiver
Object is used to write video from predefined cameras to long-term archive (video in SecurOS format)
and to play it back.
Note. To create long-term archive it is necessary to create the Archiver Dialog object. To play created archives
use Monitor or ISS Media Export Utility.
Searching for the long-term archive records to play them back is performed by an Camera object
identifier in accordance with the following algorithm:
www.isscctv.com
SecurOS 145 Administration Guide
Video Subsystem
1. If Archiver is defined in the Monitor object settings, system searches if the Camera is specified in the
settings of this Archiver object.
2. If requested Camera is not found in the settings of given Archiver object, further Camera searching is
performed by ascending Archiver ID value for all of the Archiver objects existing within security
system.
3. Camera searching is stopped when requested Camera is found within settings of the any Archiver
existing within system. Then system will search long-term archive appropriate for found Camera on
the hard drives of the Computer, that is parent object for the found Archiver.
4. Further searching is terminated if long-term archive is not found.
Warning! If object is disabled (see Disabling Objects), in order to convert archive records with the help of
Monitor (see Export Video Using Monitor) it is necessary to restart the SecurOS.
It is recommended to define the required free disk space before archive recording, see Archive
Recording section.
Parameter Description
Drives
Cameras
Click this button to populate the Cameras table with all cameras
All within SecurOS security network. To select camera use either the
object ID or Title.
www.isscctv.com
SecurOS 146 Administration Guide
Video Subsystem
Parameter Description
Choose the frame rate (in long-term archive) from the list (value
Frames per second from 1 to 30). If specified value is less than operative archive frame
rate, then decimation will be done.
Specify the archive depth: the long-term archive of the camera will
Days
be stored the set quantity of days then it will be removed by system.
This object is used for image (frame) processing and to subsequent export it to a file or database.
When exporting image to the file it is saved on the hard drive of the parent Computer or can be stored in
any Database adjusted in the SecurOS object tree when exporting to the database.
To process and export processed frames the EXPORT command built with the Program object is used.
For the complete export program syntax see SecurOS Programming Guide.
Additional Information
In addition to the parameters specified directly in command string, the export procedure is controlled with the
additional parameters stored in the HKEY_LOCAL_MACHINE\SOFTWARE\ISS\SecurOS\Niss400
\Image Processor system registry key:
deltaArchive — time shift, in seconds, counted out of the export time value (T) specified in command
string. Is used to specify frame search range in archive record which calculated as follows:
[T - deltaArchive; T + deltaArchive]. Default value is 600.
downloadTimeout — timeout to download frame to the archive, in seconds. Is used when exporting frames
in real-time. Default value is 20.
www.isscctv.com
SecurOS 147 Administration Guide
Video Subsystem
7.5.2.1 Monitor
Object is used to display video streams from the cameras and to create an operator interface with tools
for any camera control and video archive operations.
Note. It is not recommended using more than one Monitor object per physical Display. It is not possible using
Video card hardware acceleration if using more than one monitor per Display which causes extra high CPU
load.
Parameter Description
Display
www.isscctv.com
SecurOS 148 Administration Guide
Video Subsystem
Parameter Description
Size
Cameras (table with list of used cameras and their video settings). If camera is not listed it will use
the default video settings and video stream will flow directly from the video server.
Click this button to populate the Cameras table with all cameras
Add all
available within security network.
Optional: select the maximum frame rate of the video feed delivered
to clients. The frame rate cannot exceed physical frame rate of the
fps
video from the camera. If not specified, original frame rate is used.
This settings can be used to reduce security network load.
Note. Titles are displayed only when Display titles option is enabled
(see below).
www.isscctv.com
SecurOS 149 Administration Guide
Video Subsystem
Parameter Description
Monitor type
LPR— the same as DVR only but only one active camera is
shown, Search DVR panel is absent;
Show all cameras from table Select this option to display a fixed list of cameras specified in the
above Cameras table on the monitor (this mode is enabled by default).
Check this option for the monitor to display control toolbar (toolbar
options include switching between layouts, cameras, list cameras by
Show control toolbar
pages manually or automatically, view alarm log for target cameras,
etc.).
Check this option to show camera block in user interface (on the
Show camera list
given monitor).
www.isscctv.com
SecurOS 150 Administration Guide
Video Subsystem
Parameter Description
Common options
www.isscctv.com
SecurOS 151 Administration Guide
Video Subsystem
Parameter Description
Check this option to display internal camera IDs along with names.
Show camera IDs
Used primarily for script debugging purposes.
Disable PTZ control via Check this option to disable PTZ control by mouse using Monitor
mouse (see SecurOS User Guide).
Disable frame export and Check this option to disable frame export and printing using
print Monitor (see SecurOS User Guide).
Check this option to disable image adjustment for the camera cell
Disable image adjustment using Monitor. Digital zoom, Grid and Contrast filters options will
be disabled (see SecurOS User Guide).
Warning! To display correctly all interface elements in the monitor DVR mode, it is recommended to set
physical display resolution to no less than 1280x1024 and the W, H monitor parameters to not less than 80.
Interface object used to manage the remote servers video converting to AVI and ASF format as well as
to get information about converting status (see SecurOS User Guide).
www.isscctv.com
SecurOS 152 Administration Guide
Video Subsystem
Parameter Description
Export engine Choose previously created Archive Converter object from the list.
Used to manage the archiving video and get information (log) about archiving status.
Parameter Description
www.isscctv.com
SecurOS 153 Administration Guide
Video Subsystem
Parameter Description
Click this button to populate the table with all accessible Archiver
All
objects within SecurOS security network.
Original problem: a single computer with one TVISS1-02 (single-chip) video capture card and two
CCTV cameras connected to it. Computer should be used not only to capture and record video, but to
monitor cameras also.
Solution: (see figure 114):
1. Open Computer object settings window (see Editing Object's Settings section) and for at least one
hard drive in Disks to store archive table (for example, for C:\) set Video parameter to Read/
Write and Role parameter to Video Server.
2. Create Video Capture Device object (see Creating Objects).
3. Create Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the first camera is attached
to.
4. Create second Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the second camera is
attached to.
5. Create Desktop object.
6. Create Monitor object. In its settings window click All button to assign all cameras to this monitor
and set the following parameters:
www.isscctv.com
SecurOS 154 Administration Guide
Video Subsystem
X— 0.
Y— 0.
W— 100.
H— 100.
7. Exit administration mode.
Now you will see a full-screen monitor with live video from two cameras.
Original problem: a video server with one TVISS4-02 (4 chips) video capture card and two CCTV
cameras connected to it; each camera uses its own chip for better performance. One separate operator
workstation to monitor cameras (see figure 115).
Solution: (see figure 115):
1. For the Computer which role is Video Server open its object settings window (see Editing Object's
Settings section) and for at least one hard drive in Disks to store archive table (for example, for C:\)
set Video parameter to Read/Write and Role parameter to Video Server.
2. Create Video Capture Device object (see Creating Objects).
3. Create Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the first camera is attached
to.
4. Create second Video Capture Device object with the parameter:
PCI channel— 01 (unique PCI channel number).
5. Create second Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the second camera is
attached to.
6. Create Computer object with identifier (ID) equal to NetBIOS name of computer to be used as
workstation, and set the following parameter:
Network address— IP address or DNS/WINS name of the computer within local TCP/IP network.
Role— set to Operator workstation value.
www.isscctv.com
SecurOS 155 Administration Guide
Video Subsystem
When client has started, you will see on its display a full-screen monitor with live video from two
server-side cameras.
www.isscctv.com
SecurOS 156 Administration Guide
Video Subsystem
www.isscctv.com
SecurOS 157 Administration Guide
Video Subsystem
Note. At this step it is possible to set a PTZ-control. The configuration sequence is described in the Setting up
Telemetry section. This step can also be done later.
www.isscctv.com
SecurOS 158 Administration Guide
Video Subsystem
www.isscctv.com
SecurOS 159 Administration Guide
Video Subsystem
Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.
After PTZ Device configuration, at activation of a cell of each controlled camera placed on the Monitor,
the Pan/ Tilt/ Zoom button will be displayed.
When activating the controlled camera on the operator Monitor the PTZ Device Control Panel will be
activated.
www.isscctv.com
SecurOS 160 Administration Guide
Video Subsystem
Note. Control of IP cameras that do not have native telemetry, can be carried out using an external PTZ
controller (See Section Setting up telemetry with PTZ Controller Creation).
www.isscctv.com
SecurOS 161 Administration Guide
Video Subsystem
5. To disable shared PTZ control mode used by default, check the Disable shared PTZ control box
(see Separate Telemetry Control section).
6. Apply new settings.
Separate control mode assumes that camera is operated in specific mode which allows operator to
capture PTZ controls of this camera exclusively. Controlled camera can be in the object tree of any
Server or Operator Workstation of the SecurOS network.
Warning! Only cameras equipped with native PTZ device (i.e. cameras, that do not require a separate PTZ
controller object) can be operated in separate control mode.
It is assumed that separate control mode session starts at the moment when any telemetry control
command is being transmitted: turn in any direction, start/stop tour, focusing and scaling commands
initiated with the help of the Camera control elements (not a system).
www.isscctv.com
SecurOS 162 Administration Guide
Video Subsystem
If telemetry controls is captured by any user, then system will ignore all other telemetry commands
initiated by monitor, joystick, Macros or Programs, even they were executed by the user who captured
controls (i.e. were sent from the same Computer of the security network).
When working in the separate control mode PTZ control panel of the Monitor and PTZ control button in
the Camera cell are disabled for all users except for user who captured controls.
Telemetry control mode is configured in the Camera object settings window. By default PTZ device is in
shared control mode. To activate separate control mode check the Disable shared PTZ control box on
the PTZ tab (see figure 124)
Note. This method is used to configure PTZ both for all types of analog cameras and for IP cameras not
equipped with a PTZ device.
www.isscctv.com
SecurOS 163 Administration Guide
Video Subsystem
5. In the PTZ Controller object settings window (see figure 126) from the drop-down list select the
required PTZ protocol; choose the Use remote device check-box; from the drop-down list select the
video capture device associated with the camera that will be controlled by the PTZ device.
6. In the Object Tree select the previously created PTZ Controller object, and create a PTZ Device child
object for it.
7. In the Parameters of created object window (see figure 127) set the required values.
8. In the PTZ Device object properties window (see figure 128) if needed set the preliminary setting of
the PTZ device allowing quickly to move the camera in one of the given fixed positions. Detailed
description of the procedure of setting up presets is described in the PTZ Device section.
www.isscctv.com
SecurOS 164 Administration Guide
Video Subsystem
www.isscctv.com
SecurOS 165 Administration Guide
Video Subsystem
To use joystick for PTZ video monitor control (see SecurOS User Guide) it is necessary to install and
configure it.
Warning! Calibration procedure is absolutely necessary otherwise a joystick will not function in SecurOS!
www.isscctv.com
SecurOS 166 Administration Guide
Audio Subsystem
8 Audio Subsystem
The audio subsystem is used to operate and configure the audio devices (audio capture cards,
microphones) within the SecurOS security network, transmit audio streams between servers and
workstations and also work with live and archived audio from within workstations.
Possibilities to use system objects to record and playback audio streams are different for each mode and
depend on their settings. Features of each mode are described in detail below.
In this mode, the video stream is recorded synchronously with the audio stream, which allows to
analyze not only video, but also audio information when playing back records.
Synchronized audio/video recording is configured by making a logical link between the Camera and
the Microphone object. Physical devices are linked during the Camera object configuration (see Camera
section).
Synchronized audio/video recording and playback is performed by using controls of the Monitor's cell
(see Monitor), that displays live video from Camera, to which the appropriate Microphone is linked to.
Warning! A Microphone linked to a Camera can never be used separately from the Camera to record arbitrary
audio.
It's impossible to control synchronized recording with the help of the Audio Player interface object.
Microphones associated to the Camera are displayed in the Audio Player's list of available microphones
in <Microphone Name> [Microphone ID]:Camera[Camera ID] format.
For the detailed description of the system configuration operations required to provide synchronized
audio recording mode see Example of System Configuration for Synchronized Audio/ Video
Recording and Playback section.
Separate recording of the arbitrary audio stream is done with the help of Microphone, that is not linked
to the Camera object.
To control separate recording and playback mode the Audio Player system object is typically used.
www.isscctv.com
SecurOS 167 Administration Guide
Audio Subsystem
Microphones, that can provide separate recording (i. e. that are not linked to the Camera object) are
displayed in Audio Player's list of the available microphones in the <Microphone
Name> [Microphone ID] format.
The object is designed to configure and initialize within SecurOS network the following typical audio
sources:
IP-devices;
physical audio capture devices installed on the computer, including the following:
sound cards;
sound circuits of the TVISS video capture cards;
microphones connected to the computer's audio inputs.
SoundMixer module.
Additional Information
The SoundMixer module is intended for combining multiple input signals of different audio sources into a single
combined output signal. Recording and further playing back of the combined signal is done with the help of the
Audio Player interface object (see Audio Player section).
www.isscctv.com
SecurOS 168 Administration Guide
Audio Subsystem
Parameter Description
For IP-device Login — user name to access device. Value is set with the help of
device's configuration interfaces (see original device' User Manual);
www.isscctv.com
SecurOS 169 Administration Guide
Audio Subsystem
Parameter Description
Note. In case of some microphones are connected to the audio card only
one of them can be used.
www.isscctv.com
SecurOS 170 Administration Guide
Audio Subsystem
8.2.1.2 Microphone
This object represents a single mono audio channel. To record stereo signal, use two Microphone objects
created under the same Audio Capture Device object and using two different channels (Left and Right).
Parameter Description
www.isscctv.com
SecurOS 171 Administration Guide
Audio Subsystem
Parameter Description
Voice Operated Control (feature of automatic sound recording upon reaching threshold volume).
Note. This set of parameters is valid only for separate audio recording mode (see Separate Audio
Recording and Playing Back section).
The following are the user interface objects of the audio subsystem:
Audio Player.
This is an interface object used to listen to live and recorded audio from microphones (see SecurOS
User Guide).
Warning! Due to system restrictions it is not allowed to create more than one Audio Player child object for
each Desktop object in the SecurOS object tree.
www.isscctv.com
SecurOS 172 Administration Guide
Audio Subsystem
Parameter Description
Specify the object window's top left corner coordinates (X, Y) as well
X, Y, W, H as its width and height (W, H), as percentages of the displays'
horizontal and vertical size.
Check this box to hide the Audio Player window when activating the
parent Desktop. By default this box is not checked. When hide mode
Hide
is enabled it is impossible to work with available Microphones (i.e.
microphones not linked to cameras).
Sound Card Select from the list an audio output line to the play audio files.
Select from the list the target channel to play audio from. You can
Channel to play select either mono or stereo output (stereo means pseudo-stereo: it
just plays the same mono sound on both channels).
Table of audio sources (a list of registered audio sources that should be available from this audio
player)
www.isscctv.com
SecurOS 173 Administration Guide
Audio Subsystem
Parameter Description
This option should be used if you want to store audio archive with
the best possible quality (16 Bit PCM compression), but want to
Compression
listen to audio compressed with either IMA ADPCM or GSM 6.10
compression, thus reducing network load at the cost of some audio
quality loss.
Click this button to populate the table with all the microphones
Add all
within the SecurOS network.
www.isscctv.com
SecurOS 174 Administration Guide
Audio Subsystem
Warning! To watch live video and audio, the Audio Player object (with Microphone) and Monitor (with
appropriate Camera to which this Microphone is linked to) object must be placed on the same Desktop.
www.isscctv.com
SecurOS 175 Administration Guide
I/O Subsystem
9 I/O Subsystem
The functionality is available in the following platforms: SecurOS Enterprise, SecurOS Prof essional,
SecurOS Xpress.
The I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays)
within the SecurOS network.
Note. General purpose I/O devices are connected to TVISS-4IO boards or to supported IP devices (see
SecurOS Installation Guide).
9.1.1 Sensor
This object represents a physical sensor device or a daisy chain of sensors (security loop).
Note. Several Sensor objects within the same parent object are combined into the Sensors logic group in the
object tree.
Parameter Description
www.isscctv.com
SecurOS 176 Administration Guide
I/O Subsystem
Parameter Description
Select the most appropriate sensor type (this only changes device's
Hardware
icon on map, not its behavior).
9.1.2 Relay
This object represents a electrically operated switch (e. g. relay) that controls any device.
Note. Several Relay objects within the same parent object are combined into the Relays logic group in the
object tree.
Parameter Description
Relay number Select the channel number the relay is connected to.
Select the most appropriate device type controlled by this relay (this
Hardware parameter changes device's icon on map). Possible values: Lock,
Woofer, Light, Wiper.
External device
www.isscctv.com
SecurOS 177 Administration Guide
I/O Subsystem
This object is designed to control user interface objects (for example, Monitor), cameras (like PTZ
devices) and their modes, to execute operations with layouts, record operations, etc. The list of
supported commands depends on the object's program realization in SecurOS.
Several CCTV Keyboard or joystick objects within the same parent object are combined into the CCTV
Keyboards logical group.
Bosch Intuikey;
Panasonic WV-CU950;
Pelco KBD300A.
Warning!
1. CCTV Keyboards listed above are not USB devices.
2. CCTV joysticks supporting USB-interface are connected to the system directly, without an CCTV
Keyboard or joystick object creation.
3. Please view DevicesIntegrationList for additionally supported USB joysticks.
www.isscctv.com
SecurOS 178 Administration Guide
I/O Subsystem
Parameter Description
www.isscctv.com
SecurOS 179 Administration Guide
I/O Subsystem
Monitors tab is used to create a list of Monitors, that can be controlled with the configured device.
Note. At the moment only one Monitor can be controlled with the CCTV Keyboard or joystick.
Parameter Description
List of the Monitors that can be controlled with the given CCTV
Selected monitors
Keyboard or joystick object.
Monitor, which will be selected for control with the CCTV Keyboard
by default after SecurOS startup. Possible values: any Monitor from
the list of Selected monitors.
Default active monitor
Note. In order to change controlled Monitor when working with the
system simply enter it's ID (see User Manual for the appropriate CCTV
keyboard).
www.isscctv.com
SecurOS 180 Administration Guide
I/O Subsystem
Parameter Description
Monitors tab and its actions are described in the Bosch IntuiKey section.
www.isscctv.com
SecurOS 181 Administration Guide
I/O Subsystem
Parameter Description
Monitors tab and its actions are described in the Bosch IntuiKey section.
www.isscctv.com
SecurOS 182 Administration Guide
I/O Subsystem
The ability to support wiper and wiper configuration parameters are normally specified in the camera
specification.
Wiper configuration and control are performed with the help of the following SecurOS objects:
Relay — is used to configure Wiper control parameters;
Camera — object settings define the Relay object, that is used to control the Wiper for the given
camera;
Monitor — object settings define the button display mode in the Camera cell.
5. Add created Camera to the Monitor. Wiper control button ( ) will be displayed in the Camera cell
by default. To hide the button select the Disable wiper control check box in the Monitor object
settings window.
Note. The wiper control button displaying mode also depends on the set of access rights assigned to the user.
www.isscctv.com
SecurOS 183 Administration Guide
Notification Subsystem
10 Notification Subsystem
The notification subsystem allows to inform personnel of events within the security network by the
means of e-mail, voice phone calls, SMS messaging and audible notifications. Notifications for object
events can be configured using Macros or Scripts (see SecurOS Programming Guide).
This object represents an SMTP service which will be used to send E-mail notifications.
Parameter Description
www.isscctv.com
SecurOS 184 Administration Guide
Notification Subsystem
Parameter Description
Secure connection
Object represents an individual e-mail message (or a message template). Use Macros and Programs to
send e-mail messages.
Parameter Description
www.isscctv.com
SecurOS 185 Administration Guide
Notification Subsystem
Parameter Description
Represents a mobile phone or other similar device connected to the computer via a serial (COM) port or
via a USB port.
Parameter Description
Select device from the list. Click Refresh button to rescan serial
ports for available devices and update the list. The following phones
Device models are compatible: Sony Ericsson (1018, J105i, K810, K790i,
Z610i), Nokia (N76, N86, C5, 6120, 6300, 6555, 6700, 5130, 5310,
3500), Motorola C650, Samsung D900.
www.isscctv.com
SecurOS 186 Administration Guide
Notification Subsystem
Parameter Description
Type in the message body. You can enter up to 255 symbols. Use
Message
ASCII (latin) characters only!
This object represents a sound card that should be used to playback event-specific audio recordings.
The correspondence between individual audio files and object events can be viewed and altered via the
DDI utility (see ISS Object Types Database Editor). All audio files should be placed in the \wav
subdirectory of the SecurOS program folder.
Parameter Description
Sound card Select an audio output line to play the audio files through.
www.isscctv.com
SecurOS 187 Administration Guide
Automation Subsystem
11 Automation Subsystem
The automation subsystem provides the means to configure custom reactions to specific events within
the SecurOS network, thus building custom logic within the entire security network.
Time zones are used to set the schedule for user access control to the security objects and zones, and to
schedule system reactions to events triggered by the system.
The time zone sets the time interval when the events triggered by the program are handled by the
system. When some event which is programmed to execute an alarm or any other programmed reaction
happens within the limits of the time zone assigned for this program, the program behaves as it was
defined. If the event falls out of this time zone, the system will show no reaction.
Example. If you select time interval from 08:00 to 22:00 and specify Monday and Wednesday as the days of
week for a time zone, the event handling rules will be applied from 08:00 to 22:00 on Mondays and
Wednesdays starting from the date you set as a start date, and within the number of days you specified.
Note. If no time zones are defined, you can select only Always or Never options or any reaction triggered
by the program to be shown by the system.
11.1.2 Macros
Macros are used to define the links between the events and system actions. Every system object has its
own set of events, and you can use visual tools to select the system reactions for them. These definitions
are stored as a special system object called Macro.
11.1.3 Scripting
SecurOS provides the scripting language that can be used to describe and program complex scenarios.
In these scenarios, you can define the system behavior for some specific cases or just set the system
reactions to the events triggered by SecurOS objects. You can use scripting tools for any physical or
virtual system object, for example, camera, desktop or reader.
www.isscctv.com
SecurOS 188 Administration Guide
Automation Subsystem
SecurOS provides the capability to exchange data with external / 3rd party systems. Data exchange is
implemented by the means of a special IIDK (ISS Integration Development Kit) protocol. Using this
data exchange protocol, an external computer/system can be connected to the SecurOS network to
transmit events to the security network and to control the SecurOS objects (see IIDK Manual).
The SecurOS system also supports interaction with other client applications by the ST API text network
protocol (Simple Text API, see Simple Text API section). This protocol is used by the ST-SDK server
application that is a TCP server. The server supports interactions between the client application and the
SecurOS objects using commands and messages translated to the communicated sites.
This object represents a time schedule and is used to define activity time for macros and programs. For
each time zone specify time intervals, days of week, single dates and periods at which certain actions of
macros and scripts will be executed. Time zone rules will be active for the specified days.
Note. Several Time Zone objects within the same parent object are combined into the Time Zones logic group
in the object tree.
www.isscctv.com
SecurOS 189 Administration Guide
Automation Subsystem
Parameter Description
Fill in the table of time intervals within a day (From, To). Last
minute of the interval is included into the interval. Time should be
specified in the HH:MM format. The number of time intervals is not
Time intervals
limited. Time intervals may overlap, but this is generally not
recommended. For each interval, dates or periods of execution are
chosen (see below).
Check this option to make the selected time interval of the Time zone
active on dates defined as "holidays'' within the Security Zone object
settings (see Security Zone). If Days of week or Date, Period are
Holidays not set then selected time interval will be active only on Holidays. If
they are selected, rules of Time Zone will be active both on Holidays
and the schedule defined within the time zone (Days of week or
Date, Period).
Enable Date field and select start date to make the time zone
correspond not to days of the week, but to single repeating days
with period of any length. Specify period in Period field (in days).
This means that time zone will be active every single N-th day
Date, Period starting from the specified date.
Note. To make more complex time schedules like two active days
followed by two inactive, you should create several Time Zone objects
and specify the same period but shifted start dates.
11.2.2 Macro
Used to define SecurOS system behavior by catching specific system events and generating custom
reactions for those events.
Note. Several Macro objects within the same parent object are combined into the Macros logic group in the
object tree.
www.isscctv.com
SecurOS 190 Administration Guide
Automation Subsystem
Parameter Description
Select this checkbox to hide the macro on the Control panel of all
computers in the security network. By default, all macros can be
Hidden executed manually on application servers, administrator
workstations or operator workstations which belong to the same
security zone as the Macro object itself.
Event (table of source events that trigger macro execution, all events are equal in rights and any
single event can trigger the macro).
Choose source object ID. You can omit ID to refer to any objects of
Id
the specified type within the security network.
Inf ormation f ield: title of the object (appears automatically after you
Title
select object type and specific ID).
Actions (table of target objects and actions to perform on them on macro execution; actions are
executed in the order they appear in the table).
www.isscctv.com
SecurOS 191 Administration Guide
Automation Subsystem
Parameter Description
Choose object ID. You can omit ID to refer to any objects of the
Id
specified type within the security network.
Inf ormation f ield: title of the object (appears automatically after you
Title
select object type and specific ID).
11.2.3 Program
Used to define programs (scripts) to help automate and customize SecurOS (see SecurOS
Programming Guide).
Note. Several Program objects within the same parent object are combined into the Programs logic group in
the object tree.
Parameter Description
Select Time Zone (see Time Zone section) object from the list to specify the
time period(s) when this script is active (if selected time zone is inactive
the script does not operate). Never (never operate) or Always (always
Time Zone operate) also can be selected as the time zone value.
Note. By default this parameter is set to Never: newly created script is inactive
unless you specify a different time zone.
Click this button to open a dialog, where you can setup, on what particular
Run on computers of the parent security zone this script will run on. By default,
the script is executed simultaneously on all servers of the security zone.
www.isscctv.com
SecurOS 192 Administration Guide
Automation Subsystem
Parameter Description
Click the button and choose the required action from the drop-down list:
Script text area Fill in the text area with the script body itself.
The text of a removed program can be restored. To restore the program do the following:
1. Export program code to a file before deleting the Program object.
2. Import program code from file into a new Program object.
Warning! Time Zone and Run on parameter values of the deleted object are not saved and cannot be
restored!
This is a service for external connection to SecurOS via the IIDK protocol. Create this object on one or
more computers that will act as IIDK servers (see IIDK Manual for more information).
Server for processing client application queries by the ST-SDK protocol. Create this object on one or
more computers that will act as an ST-SDK server in the SecurOS network.
www.isscctv.com
SecurOS 193 Administration Guide
Automation Subsystem
Parameter Description
Enable this option to prompt SecurOS user name and password for
Authentication required
any new connection to the server.
11.3.1 Macros
Macros are used to define the links between the events and system actions. On occurrence of the event
described in the macro command, the predetermined actions are executed automatically. The macro
command can also be launched by an operator manually. Most of the system objects have a list of
corresponding events and reactions.
Buttons to execute the created Macros are displayed on the system Control Panel (see figure 153).
www.isscctv.com
SecurOS 194 Administration Guide
Automation Subsystem
11.3.2 Scripts
Programs (scripts) are a more advanced and versatile (in comparison with macros) way to handle
event/reaction logic in the system.
Note. For the detailed description of the programs see SecurOS Programming Guide.
www.isscctv.com
SecurOS 195 Administration Guide
Light Integration
12 Light Integration
This section describes light integration of SecurOS with the external FAAC (Fire Alarm/Access
Control) and radiation monitoring systems.
Note. The list of the external system events supported by SecurOS is specified within the program code of the
Bolid, FortNet or Yantar internal module of integration.
Processing of the events generated by the external system can result in the changing state of the
external system object placed on Map (Map v2), displaying SecurOS form that requires an operator's
action (for example, displaying short message window to call police) or sending a control action to the
external system modules (only for which this possibility is specified in external system).
The program interface with the external system is provided by the SecurOS internal executor, that
corresponds to Bolid, FortNet or Yantar integration.
The root <integration_name> integration object is used to describe and control the external system from
inside SecurOS. The integration object tree (external system modules tree) is built automatically on the
base of the file, that describes external system configuration (see Setting Up Integration).
After the object tree is built, any of its entries can be placed on the Map (Map v2). Further operation with
objects of the external system placed on Map (Map v2) is similar to operations with typical SecurOS
objects placed on the Map (Map v2).
One of the following methods can be used to transfer control actions to the external module:
using Macro (see Macro);
executing Program (see Program);
as a result of operation executed with the object placed on Map (Map v2) (see Map or Map v2).
Logging of interactions between SecurOS and the external system and operations with the integration
object tree is performed separately - events generated by the external system are stored in the SecurOS
log, while operations with the external system object tree are stored in an independent log-file.
www.isscctv.com
SecurOS 196 Administration Guide
Light Integration
2. Click the Update configuration button. The internal integration module receives data from the
external system and builds the integration object tree (see SecurOS Integrations).
3. To complete configuration click OK.
Intelligent Security Systems ensures stable operation of the integration for the following versions of the
external system software:
Bolid — ORION Pro version 1.11, release 2, build 1908;
FortNet — АРМ 1.4.2.15;
Yantar — Amber System - 5.2.3.
www.isscctv.com
SecurOS 197 Administration Guide
Light Integration
12.3.1 Bolid
Bolid integration object is used to provide integration with the FAAC (Fire Alarm/Access Control) Bolid
system:
Parameter Description
www.isscctv.com
SecurOS 198 Administration Guide
Light Integration
Warning! Modules of the external system can be controlled with the help of Macros, Programs and Map
(Map v2) object control commands. Map (Map v2) or Event Viewer objects are used to monitor object states.
12.3.2 FortNet
FortNet integration object is used to provide integration with the AC (Access Control) FortNet system:
Parameter Description
www.isscctv.com
SecurOS 199 Administration Guide
Light Integration
FortNet relay.
Warning! Modules of the external system can be controlled with the help of Macros, Programs and Map
(Map v2) object control commands. Map (Map v2) or Event Viewer objects are used to monitor object states.
12.3.3 Yantar
The Yantar object is used to provide integration with the Yantar radiation monitoring system:
Parameter Description
Login User name to log into the Yantar radiation monitoring system.
Password User's password to log into the Yantar radiation monitoring system.
Warning! It is not possible to transfer control actions to the Yantar modules. Map (Map v2) or Event Viewer
objects are used to monitor object states.
www.isscctv.com
SecurOS 200 Administration Guide
Keyboard Shortcuts
13 Keyboard Shortcuts
This section describes shortcuts used to perform actions on different SecurOS objects.
Shortcut Description
Open all children branches for the selected object (plus additional
*
level on each key button pressed)
+ (Num Pad) Open a child branch for the selected object (one level)
Enter Look for the next object with the search parameters.
www.isscctv.com
SecurOS 201 Administration Guide
Appendixes
14 Appendixes
This section contains a description of system utilities and other additional information useful to
configure and operate the system.
3. Click Yes to continue. Further installation steps are similar to ones for the initial installation (see
SecurOS Installation).
www.isscctv.com
SecurOS 202 Administration Guide
Appendixes
Select Remove option to uninstall the software, click Next button to continue.
In the Start Windows menu choose the following menu options All Programs SecurOS
Uninstall SecurOS.
SecurOS software will be uninstalled automatically.
Aside from uninstalling the software, you may want to delete all video and audio archives as well as
the configuration database, all of which are not deleted automatically by the InstallShield Wizard.
Thus, this step should be done manually: to delete archives, delete any \Video and \Audio folders
located in the root directory of your logical drive(s) (C:\Video, C:\Audio, D:\Video, D:\Audio
etc.).
To delete the configuration database (PostreSQL) launch the uninstall-postgresql.exe file from
the C:\Program Files\PostgreSQL\X.Y directory, or use Add or Remove Programs option. The
PostgreSQL directory in C:\Program Files\ will have to be deleted as well.
Since SecurOS Release 7.0 utilizes advanced technology to provide synchronization of the network
configuration, the SecurOS Release 6.2 updating procedure is relative to the new architectural
requirements.
To update installed SecurOS Release 6.2 software, determine the network server of any type (Video
Server, Application Server or Administration Workstation) which will be assigned as the Conf iguration
Server, then do the following:
1. Software Updating On Configuration Server;
2. Updating Software On Peripheral Servers.
www.isscctv.com
SecurOS 203 Administration Guide
Appendixes
For details on the server configuration procedure when updating SecurOS software see the relevant
sections below.
14.1.3.1 Software Updating On Configuration Server
To update the Conf iguration Server do the following for the specific steps of the typical update
procedure:
1. Run the SecurOS setup file on the assigned Conf iguration Server.
2. During installation select Configuration Server to specify the server type.
When the server will start after software installation is completed, the last configuration stored on the
server before updating will be loaded.
Warning! Initial configuration (see Initial Configuration) with the help of the System Configuration Wizard
is not performed on the updated Conf iguration Server.
Note. It is assumed that the software update procedure on the Conf iguration Server is successfully completed.
To configure Peripheral Servers do the following for the specific steps of the typical update procedure:
1. During the installation select Peripheral Server to specify the server type.
2. Launch SecurOS after the InstallShield Wisard is completed (see Launching And Configuring
SecurOS On Peripheral Servers).
3. System will display the following message (see figure 160):
At this step it is necessary to delete the Release 6.2 configuration database from configured Peripheral
Server to ensure correct connection to the Conf iguration Server and allow for copying of the
configuration file. To delete old database and continue configuring click No.
4. System will launch the System Configuration Wizard and display the Security network server type
window (see figure 161).
www.isscctv.com
SecurOS 204 Administration Guide
Appendixes
By default, the system object tree consists of the following objects after SecurOS installation and starting
with empty database: System, SecurOS, Computer, Desktop, Monitor.
Note. It is not recommended to select system drive with Operating System installed for read/write settings.
2. Create the Video Capture Device object(s). This object represents the device the video signal is coming
from (TVISS board, IP camera, IP encoder, etc.). Configure the Video Capture Device parameters:
Type — select device type corresponding to the device where video is coming from:
If video is coming from camera connected to one of the TVISS boards, select the corresponding
TVISS option.
www.isscctv.com
SecurOS 205 Administration Guide
Appendixes
Notes:
1. For cameras connected to TVISS-RT/MX boards, one Video Capture Device object will be created (per
board) with multiple Cameras as child objects.
2. For single lens IP cameras, one Video Capture Device object will have one Camera child object.
3. For cameras with more than one lens, one Camera object will be created for each lens. The Camera
objects will be child objects of the same Video Capture Device.
4. For cameras connected to IP encoders, one Video Capture Device object will have as many Camera child
objects as cameras connected to the encoder.
ISS Hardware Report Utility (HardwareReportUtility.exe) reports all installed TVISSx video
www.isscctv.com
SecurOS 206 Administration Guide
Appendixes
Location:
SecurOS folder>/Tools/HardwareReportUtility.exe
Start menu:
Start Programs SecurOS Hardware Report Utility
This utility is used to detect all installed TVISSx video capture cards and Guardant keys (see
figure 162). The report is used to generate the system license key file key.iss by the Intelligent
Security Systems Technical Support Team.
www.isscctv.com
SecurOS 207 Administration Guide
Appendixes
This utility can also be used to check the correct installation of the above hardware devices and
associated drivers: if the hardware identifier is missing, this means that device drivers were not
installed properly.
Location:
SecurOS folder>\Tools\ISSInfo.exe
This utility is intended for collecting technical information about the SecurOS installation and your
computer (see figure 163). This information is necessary to resolve problems and will always be
requested by the Technical Support Team.
www.isscctv.com
SecurOS 208 Administration Guide
Appendixes
The \ISSInfo\cur folder contains log and dump files, program and script files, and also the
key.iss file.
The \ISSInfo\devices folder contains xml library files of integrated cameras and video servers.
Note. ISS System Report Utility does not collect any private information.
To start the process, click the Go button. The \Tools\ISSInfo subfolder with the collected data will
be created. The contents of this directory will be zipped/compressed into single archive file and will be
placed into the specified directory. You can change the output directory before starting the process of
data collection by pressing the Select button and choosing the target directory and the file name.
If the Include full crash dumps option is selected, then all the logs and both minimal and full dumps
generated after system crash will be included in the ISSInfo report (increasing the report size).
Otherwise only logs and minimals dumps will be included.
If the Collect additional databases option is selected, then all SecurOS related databases will be
included into ISSInfo report. Otherwise only the configuration database (securos) will be included.
www.isscctv.com
SecurOS 209 Administration Guide
Appendixes
Location:
SecurOS folder>$\backslash$Backup.exe
Start menu:
Start Programs SecurOS ISS Media Export Utility
This utility (see figure 164) is used to playback and also export video and audio archives from native to
AVI/ASF format.
Warning! The utility can be used to export video archives on video servers only.
To export video:
1. Specify ID of Camera object.
2. Define the Start time and Stop time for the archive search.
3. Optionally, define password for video archive in Export Settings dialog (see figure 164) (click the
Settings button to open dialog). You will be asked for a password if current password is not suitable
for selected camera.
4. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
5. Click the Rescan archive button to scan for media that fits the specified time range. If the archive is
password-protected and the password from Export Settings dialog is not set or invalid, you will be
asked for the password.
6. Use the slider or the Rewind/Forward buttons to navigate through the selected time range. Use the
Play/Stop buttons to start and stop playback.
www.isscctv.com
SecurOS 210 Administration Guide
Appendixes
Note. While playing or navigating through the archive click the Save frame to BMP button to export a single
video frame in BMP format. Files will be saved to the directory specified in the Export Settings dialog.
Warning! To play quick converted video It is recommended to use the VLC media player.
Parameter Description
Common
www.isscctv.com
SecurOS 211 Administration Guide
Appendixes
Parameter Description
Use this option to split large output files to several smaller ones
with the specified size in megabytes. Default value is 650 MB.
Max. file size, MB
Warning! Due to architectural limitations of the AVI container format, file
size cannot exceed 2000 MB if the File type parameter is set to AVI.
File type Select option corresponding to output file format (AVI or ASF).
Export
Video only Select the checkbox to export only video (without audio).
Notes:
Quick video export
1. Video codec, Video quality, FPS Divider, File and Position
parameters will be ignored in Quick video export mode.
2. If Quick video export is selected, but the conversion is not
possible for some reason, then the parameters specified above
will be used.
Notes:
Quick audio export
1. Audio codec and Audio quality parameters will be ignored in
Quick audio export mode.
2. If Quick audio export is selected, but the conversion is not
possible for some reason, then the parameters specified above
will be used.
www.isscctv.com
SecurOS 212 Administration Guide
Appendixes
Parameter Description
Logo
Media Export Utility command-line syntax (example contains only frequently used parameters):
Search parameters
Search directory
Warning! If --archive-folder or --archive-path parameters are not set then only the operative
archive will be searched.
--archive-path <absolute path> Archive will be searched only in the specified directory.
Export parameters
www.isscctv.com
SecurOS 213 Administration Guide
Appendixes
Example 1:
Description: export video archive of camera 1 for the defined period spanning to fragments up to 2 Mb.
Example 2:
Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).
Note. Camera number and other settings are taken from the utility configuration.
Location:
<SecurOS root folder>\Tools\gtusbconfig.exe
www.isscctv.com
SecurOS 214 Administration Guide
Appendixes
This utility is used to configure parameters of USB video capture devices. These devices correspond to
selection of USB 2.0 value from the Type list of the Video Capture Device object settings (see Video
Capture Device).
Note. The utility supports Grand AV USB 2.0 Pro and X Guard USB devices manufactured by Grandtec.
Warning! Before utility starts, it is necessary to install drivers and plug-in the video capture device, then run
SecurOS system, create and configure corresponding object in SecurOS.
On starting utility, the video capture device properties window appears (see figure 166). When finish
configuration, click OK button to apply parameters or Cancel to cancel.
Parameter Description
Video Sources
www.isscctv.com
SecurOS 215 Administration Guide
Appendixes
Parameter Description
Debug Mode Enable this field to activate debug mode of the device.
Factory Default
Location:
SecurOS folder>\Tools\RegService.exe
This utility configures SecurOS to run as a Windows service or as a normal Win32 application
(see figure 167). If you choose Run as service, SecurOS will start automatically at Operating System
startup.
To properly configure SecurOS as a Windows service it is recommended to use the SecurOS Control
Service utility that itself runs SecurOS as a service.
Warning! For security reasons in Windows 7 and Windows 2008 Server, Services only run in a session with
zero identifier. While in the 0 session, interactive applications cannot be loaded. For this reason, the
functionality of the SecurOS Administrator Workstation and SecurOS Operator Workstation when running in
daemon mode is limited. Interaction with the application interface in this case can only be done through the
Interactive Services Detection.
Warning! After SecurOS is updated it is necessary to configure SecurOS to run as a Windows service.
Location:
SecurOS folder>\securos_svc.exe
Help information on syntax and utility keys is displayed when running this utility from the command
line with the -h parameter.
www.isscctv.com
SecurOS 216 Administration Guide
Appendixes
It is recommended to register automatic start of SecurOS service for correct work of SecurOS and to set
dependency on PostgreSQL service:
securos\_svc.exe -i 2 -l "PostgreSQL8.4"
It is necessary to check real name of PostgreSQL service on your computer (the above example uses
PostgreSQL8.4).
After such registration, upon starting of SecurOS service it will wait until the PostgreSQL service starts.
Note. It is recommended to use automatic Windows login in the case when SecurOS is configured as a
Windows service (see automatic login configuration description in Windows XP Automatic Login
Configuration.
Location:
SecurOS root folder>\dsadmin.exe
This utility stores the connection strings to the 3 default SecurOS databases. The SecurOS database is
intended for storing settings for all the system objects. The Protocol database stores records of the
events/reactions occurring in the system. The fsindex database stores data about recording/motion
alarms and about bookmarks.
Note. All connection strings are automatically defined during SecurOS installation.
www.isscctv.com
SecurOS 217 Administration Guide
Appendixes
Basic Data — string to connect to general database which holds settings for all the system objects
(the Securos database).
Protocol — string to connect to database of the events occurring in the system (the Protocol
database).
Synchro Source — string to connect to database of synchronization (optional).
Videoi — data recording about alarms and about video archive bookmarks (the fsindex
database).
Note. There is an additional field New feature to set and configure a new database.
To change a connection string, click its Build button. To test a connection — Test button.
On Build button click Data Link Properties and a window will appear that will help build the
connection string:
To apply changes in connection strings, click OK button. The changes will be applied and the utility
window will be closed.
Location:
<SecurOS root folder>\idb.exe
www.isscctv.com
SecurOS 218 Administration Guide
Appendixes
Parameter Description
Clicking Select DB button will cause Data Link Properties window displaying. For the detailed
description see DSAdmin Utility.
Location:
SecurOS root folder>\Tools\DDI.exe
This utility allows the viewing and editing of the SecurOS object types database. This utility can also be
used to preview files or alter file names for sound notifications (see figure 170).
www.isscctv.com
SecurOS 219 Administration Guide
Appendixes
The left pane of the utility window contains the list of all possible system objects, which can be used by
the loaded SecurOS configuration. The right pane contains the following tabs, which allow to view and
edit properties of the different types of the SecurOS objects:
Names — displays the selected object name and its group name. Also may be used to search for
object by its name or type (see Names Tab).
Events — contains the selected object events and its parameters: event description, window type,
sound support, net blocking and log (see Events Tab).
Reacts — contains the selected object commands and its parameters: command description and
flags (see Reacts Tab).
Markers — contains a list of the selected object markers (see Markers Tab).
States — contains a list of the selected object's possible states and its parameters: image file name,
description, enabling blinking, etc. (see States Tab).
State rules — displays rules for changing states of the selected object's type (see State Rules Tab).
To see certain object information, select it in the objects tree. Data on the chosen object will be displayed
on tabs.
www.isscctv.com
SecurOS 220 Administration Guide
Appendixes
Table 63. Events Tab Table - Column settings and Edit window actions
Parameter Description
www.isscctv.com
SecurOS 221 Administration Guide
Appendixes
Parameter Description
Event will not be logged in the system log. Enable this field to turn
Don't log
off event logging.
To edit system event table cells, select a field for editing and right-click. Context menu with available
actions will appear.
Add — add event into the table (all parameters will be specified). Edit window will appear where
all fields of the event can be specified (see above).
Note. Only events that always exist for a chosen object can be created (on developing system stage).
Edit — edit chosen event parameters. Events parameter editing window will appear.
Delete — delete chosen events. Deleted events will no longer have an effect on the system.
Copy events — copy event parameters into clipboard.
Paste events — add event from clipboard into the table.
Add event for all objects — equal to Add item, but event is added for all system objects.
www.isscctv.com
SecurOS 222 Administration Guide
Appendixes
Figure 172. Reacts tab of Object types database editor and Add window
Table 64. Reacts tab Table - Column settings and Edit window actions
Parameter Description
To edit system reacts table cells, select a field for editing and right-click. Context menu with available
actions will appear.
Add — add react into the table (all parameters will be specified). Edit window will appear where
all fields of the reaction can be specified (see above).
Note. Only reacts that always exist for a chosen object can be created (on developing system stage).
www.isscctv.com
SecurOS 223 Administration Guide
Appendixes
Edit — edit chosen react parameters. Reacts parameter editing window will appear.
Delete — delete chosen reacts. Deleted reacts will no longer have an affect on the system.
Copy reacts — copy react parameters into clipboard.
Paste reacts — add react parameters from clipboard into the table.
Figure 173. Markers tab of Object types database editor and Markers window
Table 65. Markers tab Table - Column settings and Markers window actions
Parameter Description
To edit markers table cells, select a field for editing and right-click. Context menu with available actions
will appear.
Add — add icon into the table (all parameters will be specified). Edit window will appear where all
fields of the new icon can be specified (see above).
www.isscctv.com
SecurOS 224 Administration Guide
Appendixes
Note. Corresponding file has to be in the \Bmp sub-folder of system root directory.
Edit — edit chosen icon parameters. Icons parameter editing window will appear.
Delete — delete chosen icons. Deleted icons will no longer have an affect on the system.
Copy markers — copy icon parameters into clipboard.
Paste markers — add icon parameters from clipboard into the table.
Figure 174. States tab of Object types database editor and State window
Table 66. States tab Table columns settings and States window actions
Parameter Description
Name of icon file (with bmp extension) displaying the object state on
map.
Image
Note. Corresponding file has to be in \Bmp subfolder of system root
folder!
www.isscctv.com
SecurOS 225 Administration Guide
Appendixes
Parameter Description
To edit states table cells, select a field for editing and right-click it. Context menu with available actions
will appear.
Add — add state into the table (all parameters will be specified). Edit window will appear where all
fields of the new state can be specified (see above).
Edit — edit chosen state parameters. States parameter editing window will appear.
Delete — delete chosen states. Deleted state will not be used in system working.
Copy states — copy state parameters into clipboard.
Paste states — add state from clipboard into the table.
Note. If correspondence is not established, then the object transforms to default state.
www.isscctv.com
SecurOS 226 Administration Guide
Appendixes
Figure 175. State rules tab of Object types database editor and State rules window
Table 67. State rules tab Table - Column settings and State rules window actions
Parameter Description
Initial event for transmission. Select from the list of available events
Event
for chosen object.
To edit state rules table cells, select a field for editing and right-click. Context menu with available
actions will appear.
Add — add state rule into the table (all parameters will be specified). Edit window will appear
where all fields of the new state rule can be specified (see above).
Edit — edit chosen rule parameters. State rules parameter editing window will appear.
Delete — delete chosen rule. Deleted rules will no longer have an affect on the system.
Copy state rules — copy state rule parameters into clipboard.
Paste state rules — add state rule from clipboard into the table.
www.isscctv.com
SecurOS 227 Administration Guide
Appendixes
Warning! The third-party applications should not use the ports that are used in the SecurOS software.
You should check your firewall settings and open the following ports in both directions for SecurOS
executable files *.exe located in SecurOS program directory.
Table 68. TCP/IP Ports
Core
Core services
Video subsystem
Audio subsystem
Microphone 21004
Alarm subsystem
Notification subsystem
www.isscctv.com
SecurOS 228 Administration Guide
Appendixes
LPR Module
Transit Module
Engine 21080
Operator UI 21061
Engine 22110
POS Module
"Vista" 21015
"Rubezh" 21002
"Flex" 21043
"Apollo" 21014
"Bolid" 21025
www.isscctv.com
SecurOS 229 Administration Guide
Appendixes
Windows Server 2008 is completely a server operating system. There are no multimedia components
and services installed when you perform initial OS install. However, these system components are
necessary for proper SecurOS operation including audio subsystem, video capture boards and archive
converter and must be installed manually. To install required components and services do the
following:
1. Download Windows Media Services 2008 for Windows Server 2008 R2 Update Package from
Microsoft Download Center:
http:/ / www.microsoft.com/ en-us/ download/ details.aspx?id=20424
2. Install downloaded package files.
3. Enter Server Manager menu and do the following:
Select Roles tab;
Click Add Roles button;
Install Streaming Media Services with the Wizard and restart server if required.
4. Enter Server Manager menu and do the following:
Select Features tab;
Click Add Features button;
Install Desktop Experience with the Wizard and restart server.
5. Reboot Windows Server 2008.
Note. All actions must be performed under local or domain administrator account.
On the computer with Mail service installed open Control Panel and choose Add or Remove Programs,
then Add/ Remove Windows Components.
Choose Internet Information Services (IIS) from the list and click the Details button (see figure 176).
www.isscctv.com
SecurOS 230 Administration Guide
Appendixes
Enable SMTP Service in the list (see figure 177). Click OK and Next buttons.
To configure SMTP server for message delivery, after SMTP service installation:
1. Open Control Panel Administrative Tools Internet Information Services.
2. On the left side of the new window (see figure 178) right-click Default SMTP Virtual server (or
www.isscctv.com
SecurOS 231 Administration Guide
Appendixes
www.isscctv.com
SecurOS 232 Administration Guide
Appendixes
7. Click OK to close SMTP server properties window and save all changes.
8. Choose Action Run to run SMTP server service.
Note. All actions must be performed under local or domain administrator account.
Warning! Be careful when editing registry. Wrong use of the registry editor may result in serious problems
requiring Operating System re-installation.
Note. If DefaultPassword parameter value is not specified, then auto-login will be deactivated.
www.isscctv.com
SecurOS 233 Administration Guide
Appendixes
To disable auto-login procedure or login to system under another user account, click-hold Shift button
after logoff or Windows XP/Vista/Win 7 restart. To apply this procedure permanently, specify 1 value
for ForceAutoLogon parameter in
\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon registry branch.
Warning! After auto-login configuration, each person that can physically access the computer, will get access
to its resources including all networks connected to this computer. In this case, password is publicly saved in
registry. Registry branch is accessible in remote mode by members of the Authorized Users group. Therefore,
auto-login procedure is justified when system physical security is guaranteed and registry access is forbidden
for users without special permission.
It is recommended to disable system warnings on full disk for operator workstations / video servers.
Current section contains service information that is necessary on addressing to Intelligent Security
Systems Technical Support.
Note. Collected data have to be send by e-mail on Intelligent Security Systems Technical Support e-mail
address (see Getting Technical Support).
www.isscctv.com
SecurOS 234 Administration Guide
Appendixes
8. System and diagnostic information on computer and SecurOS system configuration obtained from
the ISS System Report Utility (see ISS System Report Utility for detailed information about utility).
If it is impossible to run the utility provide the following information:
(*) video capture cards serial number and Dallas code.
Note. Equipment Dallas code can be found by the ISS Hardware Report utility (see ISS Hardware Report
Utility for detailed information about utility).
(*) name and version of the installed Intelligent Security Systems company software.
video capture cards driver version.
total number of video servers, remote administrator and monitoring (operator) workstations in the
system.
operating system (name and service pack version).
9. Another useful information, if possible. For example:
computer equipment configuration.
central processors load.
main and virtual memory used volumes.
network load.
network and network neighborhood configuration.
www.isscctv.com
SecurOS 235 Administration Guide
Index
www.isscctv.com
SecurOS 236 Administration Guide
Index
www.isscctv.com
SecurOS 237 Administration Guide
Index
www.isscctv.com
SecurOS 238 Administration Guide
Index
www.isscctv.com
SecurOS 239 Administration Guide
Index
Script text area, parameter, 192 Time Zone object description, 188
Security Zone object description, 75 Time Zone, parameter, 191
SecurOS Control Service utility, 215 Title (Presets) property,
Sensitivity property, Camera, 132
Camera, 130 Title property,
Light Detector, 137 Archiver, 146
Sensor, object, description, 175 Title, parameter,
Server property, 80 Macro (Actions), 191
Servers to connect property, 86 Macro (Event), 190
Session timeout, ms, parameter, 193 To, parameter, 184
Short Message object description, 185 Token property,
Short Message Service object description, 185 Monitor, 148
Show alarm cameras only property, 149 Type property,
Show alarmed levels property, 107 Microphone, 170
Show all cameras from table above property, 149 Video Capture Device, 123
Show all zones property, 135 Type, parameter,
Show camera IDs property, 151 Audio Capture Device, 168
Show camera list property, 149 Macro (Actions), 190
Show control toolbar property, 149 Macro (Event), 190
Show level list property, 107
Show PTZ control property, 151 U
Show single active camera only property, 150
Use credentials provided at system log on property, 80
Simple Text API object description, 192
Use default directory property, 115
Size property,
Use event filter property, 113
Camera, 130 Use event filter, property, 86
Zone, 135 Use primary domain controller property, 80
Smart Search property, 134
Use remote device property, 138
SMTP Server requires authentication, parameter, 184
Use secure connection, parameter, 184
SMTP Server, parameter, 183
Use SSL property, 80
SNMP agent object description, 95
Use standard script file property, 114
Sound card, parameter,
User account object, 96
Audible Notification Service, 186 User Account object description, 78
Audio Player, 172 User name, Password property, 80
SoundMixer object, 167
User property,
Source, parameter, 172
Video Capture Device, 124
Speed property, 138
User Rights object,
Split into files up to property, 141
settings for LDAP provider, 98
Store at least property,
settings for Windows NT provider, 98
Camera, 128 User Rights object description, 80
Store bookmarks and alarms NNN days property, 86
Subject, parameter, 185
superuser, 60
V
System object description, 74 Video Capture Device object description, 122
Video Capture Devices object description, 122
T Video property,
Computer, 86
technical support,
Zone, 135
gathering system information utility, 206 videomonitor,
how to get, 9
additional settings, 118
how to prepare service information, 233 Viewing property,
Time intervals, parameter, 189
Camera, 127
Time of acknowledgement of alarm event by the
operator property, 113
www.isscctv.com
SecurOS 240 Administration Guide
Index
W
Wiper property,
Camera, 131
Write secondary event parameters into protocol DB
property, 85
X
X, Y property, 115
X, Y, W, H property,
Archive Converter Dialog, 152
Archiver Dialog, 152
Event Viewer, 113
External Window, 113
HTML Form, 114
Map, 103
Map v2, 107
X, Y, W, H, parameter,
Audio Player, 172
X, Y, W, H, property,
Monitor, 148
Z
Zone,
working principles, 116
Zone object description, 132
Zone types property, 134
www.isscctv.com