0% found this document useful (0 votes)
1K views240 pages

SecurOS Administration Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views240 pages

SecurOS Administration Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 240

Version 7

Administration Guide
SecurOS Administration Guide (AG - EN, build 2 on 20.09.2013).

© Copyright Intelligent Security Systems, 2013.

Printed in US.

Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Administration Guide
Contents

Contents
1 Preface 9
1.1 Scope
........................................................................... 9
1.2 Target
. . . Audience
........................................................................ 9
1.3 Using
. . .This
. . . .Manual
.................................................................... 9
1.4 Getting
. . . .Technical
. . . . . . . . .Support
.............................................................. 9
1.5 SecurOS
. . . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
...................................................... 10
1.6 Design
. . . . .Convention
...................................................................... 10
1.7 Design
. . . . .Elements
...................................................................... 11

2 Purpose, Implementation And Operation Principles 12


2.1 SecurOS
. . . . . . Architecture
..................................................................... 12
2.1.1 Types Of. . .Servers
. . . . . . .And
. . . .Workstations
....................................................................... 12
2.1.1.1 Classification by . .Functionality
........................................................................ 12
2.1.1.1.1 Video Server .......................................................................... 12
2.1.1.1.2 Operator Workstation
.......................................................................... 13
2.1.1.1.3 Application . . Server
........................................................................ 13
2.1.1.1.4 Administrator . . . .Workstation
...................................................................... 13
2.1.1.2 Classification of. .Roles . . . . .in. .Configuration
. . . . . . . . . . .Management
...................................................... 13
2.1.1.2.1 Configuration . . . .Server
...................................................................... 13
2.1.1.2.2 Peripheral. .Server ........................................................................ 14
2.1.1.2.3 Managing. Network . . . . . . .Configuration
. . . . . . . . . . .by. . Configuration
. . . . . . . . . . . Server
.......................................... 14
2.1.1.2.3.1 How. To . . .Adjust
. . . . . Servers
. . . . . . .When
. . . . .Deploying
. . . . . . . . Network
............................................. 14
2.1.1.2.3.2 Configuration
. . . . . . . . Update
. . . . . . Procedure
............................................................ 14
2.1.1.2.3.3 Restoring . . . . . Configuration
. . . . . . . . . . . from
. . . . Backup
. . . . . . .Copy
............................................... 15
2.1.2 Types Of
. . .System
. . . . . . .Configuration
........................................................................... 15
2.1.2.1 Standalone Configuration
.......................................................................... 15
2.1.2.2 Client-Server Configuration
.......................................................................... 15
2.1.2.3 Distributed Network . . . . .Environment
..................................................................... 15
2.1.3 Video Surveillance
. . . . . . . . . . . Using
. . . . . .Remote
. . . . . . .SecurOS
. . . . . . . .Security
. . . . . . .System
.............................................. 15
2.2 Software
. . . . . . And
. . . . Hardware
. . . . . . . . .Platform
........................................................ 16
2.2.1 Application
. . . . .Server
. . . . . .System
. . . . . . .Requirements
................................................................... 17
2.2.2 Administrator
. . . . . . .Workstation
. . . . . . . . . . .System
. . . . . . Requirements
............................................................. 17
2.2.3 Operator
. . .Workstation
. . . . . . . . . . .System
. . . . . . Requirements
................................................................. 18
2.2.4 Video Server
. . . . . . System
. . . . . . .Requirements
........................................................................ 19
2.2.5 Audio Subsystem
. . . . . . . . . . Requirements
........................................................................... 19
2.2.6 Notification
. . . . . Subsystem
. . . . . . . . . .Requirements
...................................................................... 19
2.2.7 Access. .Control/Fire
. . . . . . . . . .Alarm
. . . . . Subsystem
. . . . . . . . . . Requirements
.......................................................... 20
2.2.8 Environment
. . . . . . Requirements
............................................................................... 20
2.2.8.1 Computer Name . . Restrictions
........................................................................ 20
2.3 Software
. . . . . . Implementation.
. . . . . . . . . . . . . . .SecurOS'
. . . . . . . . Subsystems
.............................................. 20

3 SecurOS Installation 22
3.1 Installing
. . . . . . .And
. . . .Configuring
. . . . . . . . . . The
. . . .Configuration
. . . . . . . . . . . . Server
...................................... 22
3.1.1 Installing
. . . and
. . . .Configuring
. . . . . . . . . . the
. . . .SecurOS
. . . . . . . on
. . .Video
. . . . . Server
................................................. 22
3.1.1.1 Hardware Installation .......................................................................... 22
3.1.1.1.1 Guardant .Key . . . Installation
...................................................................... 22
3.1.1.1.2 TVISS Boards . . . . .Installation
. . . . . . . . .and
. . .Cameras
. . . . . . . .Connection
................................................. 22
3.1.1.2 License Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1.1.2.1 The Key is . .a. part
. . . .of
. .a. product
................................................................ 23

www.isscctv.com
SecurOS 4 Administration Guide
Contents

3.1.1.2.2 Request the. . .key


. . . by
. . .e-mail
................................................................. 23
3.1.1.3 Software Installation
.......................................................................... 24
3.1.1.3.1 Using Current
. . . . Parameters
. . . . . . . . . .of
. .the
. . .Windows
. . . . . . . .User
. . . .Account
. . . . . . .needed
. . . . . .for
. . .PostgreSQL
........................... 25
3.1.1.3.2 Using Current
. . . . Parameters
. . . . . . . . . .of
. .the
. . .Database
. . . . . . . .and
. . . Administrator
. . . . . . . . . . . User
. . . . .Account
............................ 25
3.1.1.3.3 Software Installation
. . . . . . . . . Procedure
................................................................. 26
3.1.1.4 Initial Configuration
.......................................................................... 32
3.1.1.4.1 Initial Configuration
. . . . . . . . .Using
. . . . .The
. . .System
. . . . . . .Configuration
. . . . . . . . . . .Wizard
....................................... 32
3.1.1.4.2 Restoring.Configuration
......................................................................... 41
3.1.1.4.3 Start with.Empty
. . . . . Database
.................................................................... 42
3.1.2 Launching
. . . . SecurOS
. . . . . . . . On
. . . The
. . . .Configuration
. . . . . . . . . . . .Server
...................................................... 42
3.2 Installing,
. . . . . . .Launching
. . . . . . . . . .and
. . . .Configuring
. . . . . . . . . . Peripheral
. . . . . . . . . .Servers
. . . . . . .and
. . . Operator
. . . . . . . . .Workstations
............... 43
3.2.1 Adding. .To . .The
. . . .Network
. . . . . . . And
. . . .Configuring
. . . . . . . . . . .Peripheral
. . . . . . . . .Servers
. . . . . . .And
. . . Operator
. . . . . . . . Workstations
............................ 44
3.2.2 SecurOS . . .Installation
. . . . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
............................................................ 46
3.2.3 SecurOS . . .Installation
. . . . . . . . . .On
. . .Operator
. . . . . . . .Workstation
............................................................. 49
3.2.4 Installing
. . . Additional
. . . . . . . . . Multimedia
. . . . . . . . . .Components
............................................................... 49
3.2.5 Launching
. . . . And
. . . . Configuring
. . . . . . . . . . .SecurOS
. . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
.............................................. 49
3.2.6 Launching
. . . . SecurOS
. . . . . . . . On
. . . Operator
. . . . . . . . Workstation
.............................................................. 52

4 SecurOS Administration Overview 53


4.1 Working
. . . . . .With
. . . . Control
. . . . . . . Panel
.......................................................... 53
4.1.1 Control. .Panel
. . . . .Activation
.............................................................................. 53
4.1.2 Administration
. . . . . . . .Mode
............................................................................. 54
4.1.2.1 Object Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.1.2.2 Administrator Toolbar
.......................................................................... 55
4.1.3 User Session
. . . . . . .Administration
.............................................................................. 55
4.1.4 Hide Control
. . . . . .Panel
............................................................................... 55
4.2 Working
. . . . . .with
. . . .Objects
................................................................. 56
4.2.1 Creating
. . .Objects
.................................................................................. 56
4.2.1.1 Creating Objects
. . Limits
........................................................................ 56
4.2.2 Editing. .Object's
. . . . . . .Settings
............................................................................ 57
4.2.3 Deleting
. . Objects
................................................................................... 57
4.2.4 Disabling
. . . Objects
.................................................................................. 57
4.2.5 Renaming
. . . .Objects
................................................................................. 57
4.2.6 Moving. .Objects
................................................................................... 58
4.2.7 Searching
. . . .Objects
. . . . . . .by
. . Name
........................................................................ 58
4.3 Working
. . . . . .with
. . . .Object
. . . . . . Table
. . . . . Parameters
...................................................... 59
4.4 Managing
. . . . . . . User
. . . . .Rights
. . . . . .Within
. . . . . .Security
. . . . . . . Network
............................................ 59
4.4.1 User Registration.
. . . . . . . . . . .Setting
. . . . . .up
. . .User
. . . . Rights
............................................................. 60
4.4.1.1 Default User Accounts .......................................................................... 60
4.4.2 Changing
. . . .Superuser
. . . . . . . . .Password
........................................................................ 60
4.5 Updating
. . . . . . .License
. . . . . . .Key
. . . .on
. . All
. . .Servers
.................................................... 61
4.5.1 License
. .Expiration
. . . . . . . . . Reminder
.......................................................................... 61
4.6 IP-Device
. . . . . . .Manager
.................................................................... 63
4.6.1 Specification
..................................................................................... 64
4.6.2 Basic Operations
..................................................................................... 68
4.6.2.1 Launching Manager
.......................................................................... 68
4.6.2.2 Searching Devices
. . . .in
. .the
. . .Network
................................................................. 69
4.6.2.3 Adding IP Device
.......................................................................... 69
4.6.2.4 Editing Parameters
. . . . and
. . . .Setting
. . . . . .up
. . IP
. . Device
. . . . . . Usage
.................................................. 70
4.6.2.5 Deleting IP Device
.......................................................................... 72

5 Core Subsystem 73
5.1 Working
. . . . . .Principles
..................................................................... 73
5.2 Object
. . . . Reference
....................................................................... 73
5.2.1 System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

www.isscctv.com
SecurOS 5 Administration Guide
Contents

5.2.2 Security
. . Zone
................................................................................... 75
5.2.2.1 Setting Up Event
. . .Redirection
....................................................................... 76
5.2.3 Department
..................................................................................... 78
5.2.4 User Account
..................................................................................... 78
5.2.5 Active .Directory
. . . . . . . .Storage
............................................................................ 79
5.2.6 User Rights
..................................................................................... 80
5.2.7 Computer..................................................................................... 83
5.2.7.1 Servers to connect .......................................................................... 86
5.2.7.1.1 Operations . .with
. . . .the
. . .Servers
. . . . . . to
. . connect
. . . . . . .List
.................................................. 87
5.2.7.1.2 Servers to. .connect
. . . . . . List
. . . .Operations
. . . . . . . . .Rules
..................................................... 87
5.2.7.2 Auto login .......................................................................... 88
5.2.8 Monitoring
. . . . .center
. . . . . agent
........................................................................... 89
5.2.9 Remote . .system
................................................................................... 90
5.2.10 Area Zone
..................................................................................... 91
5.2.11 Region..................................................................................... 91
5.2.12 Event. Filter
.................................................................................... 92
5.2.13 SNMP. .agent
................................................................................... 95
5.2.13.1 Setting up Windows . . . . . .Management
. . . . . . . . . . .and
. . .Monitoring
. . . . . . . . .Tools
............................................. 95
5.3 Configuration
. . . . . . . . . . .Examples
................................................................ 96
5.3.1 Defining
. . .Access
. . . . . .Levels
. . . . . .to
. . Individual
. . . . . . . . .Objects
........................................................... 96
5.3.2 Configuration
. . . . . . .of
. . Network
. . . . . . . .Domain
. . . . . . .User
. . . .Rights
......................................................... 97
5.3.2.1 Settings for Windows . . . . . .NT
. . .Provider
................................................................. 97
5.3.2.2 Settings for LDAP . . . Provider
....................................................................... 98

6 Interface Subsystem 99
6.1 Maps
. . . Working
. . . . . . . .Principles
................................................................ 99
6.1.1 Map Creation
..................................................................................... 99
6.1.2 Drawing
. . . Map
. . . . .Layers
............................................................................. 100
6.1.3 Moving
. . .Map
. . . .Objects
. . . . . . .onto
. . . .Operator
. . . . . . . .Workstations
........................................................... 101
6.2 Object
. . . . . Reference
...................................................................... 102
6.2.1 Desktop
..................................................................................... 102
6.2.2 Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
6.2.2.1 Working with Map . . . . Layers
...................................................................... 103
6.2.2.2 Placing, Moving . . .and
. . .Rotating
. . . . . . . Objects
. . . . . . .on
. .Map
.................................................... 104
6.2.2.3 Performing Additional
. . . . . . . Operations
. . . . . . . . . on
. . .Objects
....................................................... 105
6.2.3 Map v2..................................................................................... 106
6.2.3.1 Working with Map
. . . . Layers
...................................................................... 109
6.2.3.2 Placing Objects. . .on
. .Map
..................................................................... 110
6.2.3.3 Setting Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.2.3.4 Setting Passwords
.......................................................................... 112
6.2.4 Event. Viewer
.................................................................................... 112
6.2.5 External
. . . Window
.................................................................................. 113
6.2.6 HTML. Form
.................................................................................... 114
6.2.7 HTML. Dialog
.................................................................................... 114
6.3 Setting
. . . . . .Map
. . . .v2
................................................................. 115

7 Video Subsystem 116


7.1 Video
. . . . .Stream
. . . . . . Decimation
................................................................ 116
7.2 Working
. . . . . . .Principles
. . . . . . . . .of
. . Motion
. . . . . . .Detection
. . . . . . . . Zones
.......................................... 116
7.2.1 Managing
. . . . .Motion
. . . . . .Detection
. . . . . . . . .Zones
................................................................. 117
7.2.1.1 Creating Zones .......................................................................... 117
7.2.1.2 Showing Zones .......................................................................... 117
7.3 Special
. . . . . .Settings
. . . . . . . .for
. . .Video
. . . . .Subsystem
. . . . . . . . . .Components
........................................... 117
7.3.1 Camera
. . .Imaging
. . . . . . . Control
........................................................................... 117
7.3.2 Video. Monitor
. . . . . . . Settings
............................................................................. 118
7.3.3 Record
. . .Buffer
. . . . . Settings
............................................................................. 118

www.isscctv.com
SecurOS 6 Administration Guide
Contents

7.3.4 Archive
. . .Recording
.................................................................................. 118
7.3.4.1 Disk Volume Settings
.......................................................................... 118
7.3.4.2 Video Recording
. . . Settings
....................................................................... 119
7.3.4.3 Long-term Archive
. . . . .Settings
. . . . . . .And
. . . Archive
. . . . . . .Converter
.................................................... 120
7.4 Export
. . . . . Video
. . . . . .Using
. . . . . Monitor
........................................................... 120
7.5 Object
. . . . . Reference
...................................................................... 121
7.5.1 System. . .Objects
.................................................................................. 121
7.5.1.1 Video Capture. .Devices
........................................................................ 122
7.5.1.2 Video Capture. .Device
........................................................................ 122
7.5.1.3 Camera .......................................................................... 125
7.5.1.4 Zone .......................................................................... 132
7.5.1.5 Light Detector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
7.5.1.6 PTZ Controller.......................................................................... 137
7.5.1.7 PTZ Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
7.5.1.8 Archive Converter
.......................................................................... 139
7.5.1.9 Archiver .......................................................................... 144
7.5.1.10 Image Processor
.......................................................................... 146
7.5.2 User Interface
. . . . . . . . Objects
............................................................................. 146
7.5.2.1 Monitor .......................................................................... 147
7.5.2.2 Archive Converter . . . . Dialog
...................................................................... 151
7.5.2.3 Archiver Dialog .......................................................................... 152
7.6 Configuration
. . . . . . . . . . . .Examples
............................................................... 153
7.6.1 Standalone
. . . . . .Configuration
............................................................................... 153
7.6.2 Video. Server
. . . . . .+
. .Operator
. . . . . . . .Workstation
.................................................................... 154
7.6.3 Setting. . Up
. . . Camera
................................................................................ 155
7.6.3.1 Adding Video .Capture . . . . . . .Device
.................................................................. 155
7.6.3.2 Adding Camera . . .to. .System
..................................................................... 156
7.6.3.3 Adding Camera . . .to. .Monitor
..................................................................... 157
7.6.3.4 Adding User Rights .......................................................................... 158
7.6.3.5 Setting up telemetry .......................................................................... 159
7.6.3.5.1 Setting up . . .telemetry
. . . . . . . for
. . .IP
. .devices
........................................................... 159
7.6.3.5.1.1 Separate . . . . . .Telemetry
. . . . . . . . Control
............................................................ 161
7.6.3.5.2 Setting up . . .telemetry
. . . . . . . with
. . . .PTZ
. . . .Controller
. . . . . . . .Creation
................................................ 162
7.6.4 Joystick
. . . Configuration
.................................................................................. 165

8 Audio Subsystem 166


8.1 Operation
. . . . . . . . Modes
................................................................... 166
8.1.1 Synchronized
. . . . . . . .Audio/Video
. . . . . . . . . . .Recording
. . . . . . . . .and
. . . .Playback
..................................................... 166
8.1.2 Separate
. . . .Audio
. . . . . Recording
. . . . . . . . . .and
. . . Playback
............................................................... 166
8.2 Object
. . . . . Reference
...................................................................... 167
8.2.1 System. . .Objects
.................................................................................. 167
8.2.1.1 Audio Capture. .Device
........................................................................ 167
8.2.1.2 Microphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
8.2.2 User Interface
. . . . . . . . Objects
............................................................................. 171
8.2.2.1 Audio Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
8.3 Example of System Configuration for Synchronized Audio/Video Recording and
...........................................................................
Playback 173

9 I/O Subsystem 175


9.1 Object
. . . . . Reference
...................................................................... 175
9.1.1 Sensor..................................................................................... 175
9.1.2 Relay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
9.1.3 CCTV. Keyboard
. . . . . . . . .or
. .joystick
......................................................................... 177
9.1.3.1 Bosch Intuikey .......................................................................... 178
9.1.3.2 Panasonic WV-CU950 .......................................................................... 180
9.1.3.3 Pelco KBD300A .......................................................................... 181

www.isscctv.com
SecurOS 7 Administration Guide
Contents

9.2 Configuring
. . . . . . . . . .System
. . . . . . .to
. .Work
. . . . .with
. . . . Wiper
............................................... 181

10 Notification Subsystem 183


10.1 Object
. . . . . . Reference
..................................................................... 183
10.1.1 E-mail
. . .Message
. . . . . . . .Service
.......................................................................... 183
10.1.2 E-mail
. . .Message
.................................................................................. 184
10.1.3 Short
. .Message
. . . . . . . .Service
........................................................................... 185
10.1.4 Short
. .Message
................................................................................... 185
10.1.5 Audible
. . . .Notification
. . . . . . . . . .Service
....................................................................... 186

11 Automation Subsystem 187


11.1 Working
. . . . . . . .Principles
................................................................... 187
11.1.1 Time. .Zones
................................................................................... 187
11.1.2 Macros
..................................................................................... 187
11.1.3 Scripting
..................................................................................... 187
11.1.4 Integration
. . . . . . .with
. . . .3rd
. . .Party
. . . . .Systems
.................................................................. 188
11.2 Object
. . . . . . Reference
..................................................................... 188
11.2.1 Time. .Zone
................................................................................... 188
11.2.2 Macro
..................................................................................... 189
11.2.3 Program
..................................................................................... 191
11.2.4 IIDK.Interface
.................................................................................... 192
11.2.5 Simple
. . . Text
. . . . API
.............................................................................. 192
11.3 Setting
. . . . . . .up
. . .Macros
. . . . . . and
. . . .Scripts
....................................................... 193
11.3.1 Macros
..................................................................................... 193
11.3.2 Scripts
..................................................................................... 194

12 Light Integration 195


12.1 General
. . . . . . . Description
.................................................................... 195
12.2 Setting
. . . . . . .Up
. . .Integration
................................................................. 195
12.3 SecurOS
. . . . . . . . Integrations
................................................................... 196
12.3.1 Bolid
..................................................................................... 197
12.3.2 FortNet
..................................................................................... 198
12.3.3 Yantar
..................................................................................... 199

13 Keyboard Shortcuts 200


13.1 Administration
. . . . . . . . . . . . . Toolbar
.............................................................. 200

14 Appendixes 201
14.1 Appendix
. . . . . . . . .A.
. .Upgrading/Uninstalling
. . . . . . . . . . . . . . . . . . . . .Software
........................................... 201
14.1.1 Upgrading
. . . . . . Software
............................................................................... 201
14.1.2 Uninstalling
. . . . . . . .Software
............................................................................. 201
14.1.3 Release
. . . .6.2
. . .Updating
. . . . . . . . Procedure
...................................................................... 202
14.1.3.1 Software Updating . . . . . .On
. . .Configuration
. . . . . . . . . . .Server
...................................................... 203
14.1.3.2 Updating Software . . . . . .On
. . .Peripheral
. . . . . . . .Servers
......................................................... 203
14.2 Appendix
. . . . . . . . .B.
. . Quick
. . . . . .Video
. . . . .Subsystem
. . . . . . . . . . Configuration
........................................... 204
14.3 Appendix
. . . . . . . . .C.
. . System
. . . . . . .Utilities
......................................................... 205
14.3.1 ISS Hardware
. . . . . . . . .Report
. . . . . .Utility
...................................................................... 206
14.3.2 ISS System
. . . . . . .Report
. . . . . . Utility
........................................................................ 207
14.3.3 ISS Media
. . . . . .Export
. . . . . .Utility
......................................................................... 209
14.3.3.1 Export Settings . . . dialog
....................................................................... 210
14.3.3.2 Command-line . . .parameters
....................................................................... 212
14.3.4 gtUSB
. . .Configuration
. . . . . . . . . . . .Utility
...................................................................... 213
14.3.5 ISS Startup
. . . . . . .Configuration
. . . . . . . . . . . .Utility
.................................................................. 215

www.isscctv.com
SecurOS 8 Administration Guide
Contents

14.3.6 DSAdmin
. . . . . Utility
................................................................................ 216
14.3.7 ISS Database
. . . . . . . . .Update
. . . . . .Utility
...................................................................... 217
14.3.8 ISS Object
. . . . . . Types
. . . . . .Database
. . . . . . . .Editor
................................................................. 218
14.3.8.1 Names Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
14.3.8.2 Events Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
14.3.8.3 Reacts Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
14.3.8.4 Markers Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
14.3.8.5 States Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
14.3.8.6 State Rules Tab .......................................................................... 225
14.4 Appendix
. . . . . . . . .D.
. . TCP/IP
. . . . . . .Ports
. . . . .Used
. . . . .by
. .SecurOS
............................................. 227
14.5 Appendix
. . . . . . . . .E.
. .Additional
. . . . . . . . . Windows
. . . . . . . . .Settings
.............................................. 229
14.5.1 Installing
. . . . . Multimedia
. . . . . . . . . .Components
. . . . . . . . . . . and
. . . .Services
. . . . . . . .under
. . . . .MS
. . . Windows
. . . . . . . . .Server
. . . . . 2008
. . . . .R2
.................... 229
14.5.2 SMTP. . Mail
. . . . Server
. . . . . . Installation
. . . . . . . . . .and
. . . .Configuration
........................................................... 229
14.5.3 Windows
. . . . . XP/Vista/Win7
. . . . . . . . . . . . .Automatic
. . . . . . . . .Login
. . . . .Configuration
..................................................... 232
14.5.4 Disabling
. . . . . Disk
. . . . .Cleanup
. . . . . . .Master
.................................................................... 233
14.6 Appendix
. . . . . . . . .F.
. .Technical
. . . . . . . . .Support
. . . . . . . Information
................................................ 233

Index 235

www.isscctv.com
SecurOS 9 Administration Guide
Preface

1 Preface
This section contains general information about the document, the means of its design and use, as well
as on how to get additional technical support for the product.

1.1 Scope
Current manual provides general information about SecurOS architecture, describes the process of
configuring security network and system objects, gives some troubleshooting tips and
recommendations.

It is assumed that the user have already deployed the security network physically and installed
SecurOS software on all computers of this network.

1.2 Target Audience


This manual is designed for SecurOS system installers and administrators. It is assumed the user has
advanced computer skills, has practical experience with TCP/IP networking, serial (COM) ports and
general CCTV knowledge. The user should have read SecurOS Installation Guide prior to reading this
document, because it gives introductory information on how to plan their system.

1.3 Using This Manual


This document is organized in such a way that the user can use both its printed and the electronic
version. In the latter case one can use the Adobe Reader's Bookmarks feature as well as cross-reference
hyperlinks to navigate through content. In several topics this manual refers to other SecurOS manuals
(SecurOS Installation Guide, SecurOS User Guide etc.). One can find these manuals as separate files
on SecurOS installation CD or download them from our web site (www.isscctv.com).

To get online help (Microsoft HTML Help) just press F1 key when running SecurOS in administration
mode. You can get context help for the given object by pressing F1 key when its settings window is
active.

1.4 Getting Technical Support

If you have any questions after reading this manual, please address them to your system administrator
or supervisor.

For any further information you can contact our Technical Support Team:

in USA:
phone: +1 732 855 1111 (Monday to Friday, 9am - 6pm EST);
e-mail: [email protected]

www.isscctv.com
SecurOS 10 Administration Guide
Preface

in Russia:
phone: +7 (495) 645 21 21 (Monday to Thursday, 9am - 6pm MST; Friday 9am - 5pm MST);
e-mail: [email protected]
in Brazil:
phone: +55 11 2262 2894 (Monday to Friday, 9am - 6pm BRST);
e-mail: [email protected]
in Chile:
phone: +56 2 897 7320 (Monday to Friday, 9am - 6pm CLST);
e-mail: [email protected]
in Peru:
phone: +51 1 711 8465 (Monday to Friday, 9am - 6pm CLST);
e-mail: [email protected]

To solve problems faster, we recommend preparing service information described in Technical


Support Information before addressing the Technical Support Team.

1.5 SecurOS Editions Naming Convention


This document represents a common manual for several editions of the "SecurOS security system'' that
differs on functional capabilities:

SecurOS Enterprise;
SecurOS Prof essional;
SecurOS Xpress;
SecurOS Lite.

For the product designation regardless of its edition the SecurOS united term is used in the framework
of the given document.

Sections that describe the functionality available for some editions are marked by the special footnote
which example is presented below:

The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional,


SecurOS Xpress, SecurOS Lite.

1.6 Design Convention


For various terms and titles representation the following fonts and formatting tools are used in this
document.

Font Description

Used on writing the workstation names, utilities or screens,


bold type windows and dialog boxes as well as the names of their elements
(GUI elements).

www.isscctv.com
SecurOS 11 Administration Guide
Preface

Font Description

italic type Used to mark out the SecurOS objects.

bold italic type Used to mark out the elements of homogeneous lists.

Used to mark out macros text and programming code, file names
and paths to them. Also it is used to specify the necessary options,
monospace
to mark out values specified by the user from the keyboard
(manually).

Used to mark out the cross-references within the document and


green
links to the external available ones.

1.7 Design Elements


Warning! Serves to attract the user attention to information which is necessary for the correct perception of
the text set out below. Typically, this information has a warning character.

Note. Note text in topic body.

Additional Information
Used to display a complementary information. The element contains, for example, the description of embodiments
of the operation or reference to additional literature.

www.isscctv.com
SecurOS 12 Administration Guide
Purpose, Implementation And Operation Principles

2 Purpose, Implementation And


Operation Principles
SecurOS software is designed to control video surveillance and analytic systems deployed within local
or global networks. Simple scaling of software and hardware platforms allows to create video
surveillance systems of any complexity — from local systems which are intended to control small- and
middle-scale objects to complex systems that allow to control physical and organizational structures
and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise.

2.1 SecurOS Architecture


This section describes SecurOS's types of servers and workstations and their general features
depending on software installation types. Basic system configurations, determined by type and number
of used SecurOS servers and workstations are considered in addition.

2.1.1 Types Of Servers And Workstations

Computers of the SecurOS network are distinguished by their functionality and have specific roles in
network configuration management procedure.

This section contains general information on types of SecurOS servers and workstations, their intended
purposes, basic capabilities and operational specifics.

2.1.1.1 Classification by Functionality


All computers connected to the SecurOS network are divided by the functionality into the following
main categories that define the SecurOS software installation type:

Video Server.
Operator Workstation.
Administrator Workstation.
Application Server.

The system administrator defines the installation type while planning the system architecture and sets
it during the installation procedure. On each computer on the network only one installation type is
allowed. A brief description of the installation types can be seen below.

2.1.1.1.1 Video Server


The Video Server is a computer that is used to connect cameras (CCTV analog and/or IP cameras), to
receive video from them, or to connect audio captured devices. In addition to the direct connection of
cameras this installation type allows to install or connect the various security devices (fire alarm system
controllers, access control subsystem controllers, etc.) and intelligent software modules (e. g., License
Plate Recognition Module). Using the Video Server one can also administrate the SecurOS security
network.

www.isscctv.com
SecurOS 13 Administration Guide
Purpose, Implementation And Operation Principles

2.1.1.1.2 Operator Workstation


The Operator Workstation is a client computer in the security network designed for remote viewing of
video from surveillance cameras, listening to audio, managing various devices such as PTZ devices,
doors, fire alarm and other subsystems.

2.1.1.1.3 Application Server


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional.

The Application Server implements all the Video Server functionality except for connecting cameras, and
receiving video and audio streams. Using the Application Server one can also administrate the SecurOS
security network.

2.1.1.1.4 Administrator Workstation


The functionality is available in the SecurOS Enterprise edition only.

The Administrator Workstation is a client computer similar to the operator workstation but has an
additional administrator interface for configuring the security network. On such a computer one can
perform the following administrator operations:

Create and configure the system objects.


Delete existing objects.
Change the parameters of the created and operating objects.

2.1.1.2 Classification of Roles in Configuration Management


Role of the server defines it's place in SecurOS network configuration management procedure. Each
SecurOS network computer must be assigned one of the following:
Configuration Server.
Peripheral Server.

2.1.1.2.1 Configuration Server


Reliable operation of the security system within the network which consists of several typical servers
that allow to configure system independently is possible only if system settings are actual on the each
of network servers at the moment.

Actual system configuration is updated and then duplicated to each network server with the help of
Conf iguration Server. Conf iguration Server is the dedicated network server which implements enhanced
functionality against typical.

Conf iguration Server is assigned during system installation and can not be reassigned at system
operation. Conf iguration Server can be represented by any of the typical network computers — Video
Server, Application Server or Administrator Workstation.

Warning! The only one network server can be assigned Conf iguration Server.

In the SecurOS Xpress, SecurOS Lite editions Video Server implements the configuration server.

www.isscctv.com
SecurOS 14 Administration Guide
Purpose, Implementation And Operation Principles

Actual system configuration is stored on the Conf iguration Server. Each of Peripheral Servers stores
working copy of the system configuration.
2.1.1.2.2 Peripheral Server
The Peripheral Server is an any of network servers, except Conf iguration Server. Peripheral server is
assigned during the system installation and can be represented by any of the typical network
computers — Video Server, Application Server or Administrator Workstation.

Warning!
1. Peripheral Server can't apply configuration changes independently.
2. Operation period is restricted for the Peripheral Servers not connected to the Conf iguration
Server. If connection with the Conf iguration Server is not resumed within 90 days of
disconnection then system will automatically shutdown on given Peripheral Server and all
Operator Workstations connected to it.

2.1.1.2.3 Managing Network Configuration by Configuration Server


This section describes an order of server configuration when network deploying and also algorithms
for network management and recovery.

2.1.1.2.3.1 How To Adjust Servers When Deploying Network

At the initial system configuring Conf iguration Server must be adjusted (i. e. installed and configured)
first (see Installing And Configuring The Configuration Server section).

2.1.1.2.3.2 Configuration Update Procedure

System configuration is updated accordingly to the following algorithm:

Note. Described algorithm is applicable to the any type of operations with tree's objects and its settings,
including creating, editing and deleting.

1. Using any of Peripheral Servers administrator (or operator) changes tree structure and/or object
settings for that Computer (or Computers), configuration of which is need to be modified.
2. Peripheral Server used to modify configuration generates an appropriate request to the Conf iguration
Server.

Notes:
1. If Conf iguration Server is used to modify configuration changes are applied on Conf iguration Server
directly, with no request.
2. When Conf iguration Server is unavailable it's not possible to modify system configuration using
Peripheral Server.

3. Conf iguration Server processes received request and applies changes first renewing it's own objects
tree and objects settings, than generates and sends to each of the Peripheral Servers a command to
update state of the appropriate objects in its working copies. If Peripheral Server is switched off when
changes must be applied, the command will be sent when connection with the Conf iguration Server
will be restored.
4. Having received the command to update its working copy each of the Peripheral Servers applies the

www.isscctv.com
SecurOS 15 Administration Guide
Purpose, Implementation And Operation Principles

changes by updating own objects tree and/or settings of appropriate objects.

Note. The queries are processed by Conf iguration Server consistently in order of creation. Only one request is
processed by Conf iguration Server at the moment. The next request processing is locked until current request is
closed and changes are applied on the Conf iguration Server.

2.1.1.2.3.3 Restoring Configuration from Backup Copy

The configuration can be restored from backup copy. Backup copy can be created by any of network
servers, but restore procedure can be executed only on the Conf iguration Server.

Warning! Only backup copy of the currently installed SecurOS version is applicable.

2.1.2 Types Of System Configuration

This section describes basic system configurations determined by type and number of used SecurOS's
servers and workstations.

2.1.2.1 Standalone Configuration


Standalone configuration assumes that SecurOS modules and database are installed on the single
network server. This configuration is typical for the small-scaled entry-level systems.

2.1.2.2 Client-Server Configuration


In client-server configuration server and client components are deployed on different network
computers of the SecurOS network, which provide specific functionalities according to the types of the
components installed. This configuration is typical for the middle-level systems.

2.1.2.3 Distributed Network Environment


In this configurations each security system cluster is maintained with the individual instance of the
SecurOS, which is implemented in Client-Server architecture. This configuration is intended to use for
security systems within branched networks and intense data streams and makes it possible to reduce
loading on the server components.

2.1.3 Video Surveillance Using Remote SecurOS Security System

The functionality is available in the SecurOS Enterprise edition only.

In certain cases it may be required to create several independent security systems with a single top level
control center. This case is possible, for example, for banking area, when all branches are monitored
with the help of single Monitoring Center.

Two types of the Monitoring Center differing by functionality can be created and configured within
SecurOS:
1. Monitoring Center working with remote video archives;
2. Monitoring Center working with local video archives.

www.isscctv.com
SecurOS 16 Administration Guide
Purpose, Implementation And Operation Principles

Remote security system is controlled and monitored via a set of objects, which are created on the
Monitoring Center server when it is configured (see Remote system). To work with video stream, the
copies of cameras presented in the remote system are created on the Monitoring Center's server. The
operator can perform different actions with the video depending on the Monitoring Center type: in the
first case, the video stream is only available for viewing (access to the archive file created by the remote
system camera is allowed), and in the second case can be recorded locally on the Monitoring Center
server (access to the archive file created by the remote system camera is forbidden).

Monitoring Center working with remote video archives

Monitoring Center working with remote video archives allows operator to perform the following
operations:
1. Viewing video provided by the remote system's Cameras in real time mode;
2. Working with Alarms and Bookmarks;
3. Converting video archive stored on the remote server;
4. Controlling Cameras on the remote servers using PTZ.

Monitoring Center working with local video archives

Monitoring Center working with local video archives allows operator to perform the following
operations:
1. Viewing video provided by the remote system's Cameras in real time mode;
2. Recording video stream provided by the the remote system's Camera. Recording is executed locally
on the Monitoring Center's server;
3. Controlling Cameras on the remote servers using PTZ;
4. Other operations using camera cell control elements.

In other words, Monitoring Center working with local video archives allows operator to control video
stream, coming from the remote servers's Cameras in the same way as if they were set within local
SecurOS security network.

When planning the system architecture it should be considered that a Monitoring Center working with
local video archives requires a much greater TCP/IP bandwidth than the Monitoring Center working
with remote video archives. Monitoring Center working with remote video archives is capable to
control up to 500 Cameras of the remote security system simultaneously. Number of cameras controlled
by "local" Monitoring Center depends on system characteristics of the Video Server, where Monitoring
Center is deployed (see Video Server System Requirements).

To provide Monitoring Center functionality within SecurOS security system the Monitoring center
agent and Remote system objects of Core subsystem were designed.

2.2 Software And Hardware Platform


This section covers software and hardware requirements for computers to install typical SecurOS
software.

www.isscctv.com
SecurOS 17 Administration Guide
Purpose, Implementation And Operation Principles

2.2.1 Application Server System Requirements

Table 1. Application Server System Requirements

Parameter Requirements

Windows XP (Service Pack 3) — 32-bit and 64-bit; Windows


Server 2003 R2 (Service Pack 2) — Standard Edition,
Enterprise Edition — 32-bit and 64-bit; Windows Server
OS 2008 R2 (Service Pack 1) — Standard Edition, Enterprise
Edition — 64-bit, Windows 7 (Service Pack 1) — Home Basic,
Home Premium, Professional, Enterprise, Ultimate — 32-bit
and 64-bit

Intel Core 2 Duo 3,0 GHz (E8300)/AMD Athlon II X3 or


above. Intel Core 2 Quad Q9400/AMD Phenom II X4 945 is
CPU
recommended. CPU should support SSE2 instruction, SSE3
support is desirable.

RAM Not less than 1 GB

HDD to store video archive Not less than 40 GB

HDD free space for software Not less than 500 MB


installation

HDD free space for PostgreSQL Not less than 500 MB


installation

To display video from more than 8 cameras: SVGA-card with


128 MB onboard (min), memory bus not less than 128-bit.
Video adapter
SVGA-card with 256 MB onboard, memory bus not less than
128-bit is recommended (for example, AMD HD 5550)

TCP/ IP network speed Not less than 100 Mbps. 1000 Mbps is recommended

2.2.2 Administrator Workstation System Requirements

Table 2. Administrator Workstation System Requirements

Parameter Requirements

Windows XP (Service Pack 3) — 32-bit and 64-bit; Windows


Server 2003 R2 (Service Pack 2) — Standard Edition,
Enterprise Edition — 32-bit and 64-bit; Windows Server
OS 2008 R2 (Service Pack 1) — Standard Edition, Enterprise
Edition — 64-bit, Windows 7 (Service Pack 1) — Home Basic,
Home Premium, Professional, Enterprise, Ultimate — 32-bit
and 64-bit

Intel Core 2 Duo 1,8 GHz (E6320)/AMD Athlon II X3 or


CPU
above.

RAM Not less than 1 GB

HDD Not less than 40 GB

www.isscctv.com
SecurOS 18 Administration Guide
Purpose, Implementation And Operation Principles

Parameter Requirements

HDD free space for software Not less than 500 MB


installation

HDD free space for PostgreSQL Not less than 500 MB


installation

To display video from more than 8 cameras: SVGA-card with


128 MB onboard (min), memory bus not less than 128-bit.
Video adapter
SVGA-card with 256 MB onboard, memory bus not less than
128-bit is recommended (for example, AMD HD 5550)

TCP/ IP network speed Not less than 100 Mbps. 1000 Mbps is recommended

2.2.3 Operator Workstation System Requirements

Table 3. Operator Workstation System Requirements

Parameter Description

Windows XP (Service Pack 3) — 32-bit and 64-bit; Windows


Server 2003 R2 (Service Pack 2) — Standard Edition,
Enterprise Edition — 32-bit and 64-bit; Windows Server
OS 2008 R2 (Service Pack 1) — Standard Edition, Enterprise
Edition — 64-bit, Windows 7 (Service Pack 1) — Home Basic,
Home Premium, Professional, Enterprise, Ultimate — 32-bit
and 64-bit

Intel Core 2 Duo 3,0 GHz (E8300)/AMD Athlon II X3 or


above. Intel Core 2 Quad Q9400/AMD Phenom II X4 945 is
CPU
recommended. CPU should support SSE2 instruction, SSE3
support is desirable.

RAM Not less than 1 GB 3 GB is recommended

HDD Not less than 40 GB

HDD free space for software Not less than 500 MB


installation

HDD free space for operation Not less than 200 MB

To display video from more than 8 cameras: SVGA-card with


128 MB onboard (min), memory bus not less than 128-bit.
Video adapter
SVGA-card with 256 MB onboard, memory bus not less than
128-bit is recommended (for example, AMD HD 5550)

Not less than 100 Mbps. 1000 Mbps is recommended to view


TCP/ IP network speed
uncompressed video from several cameras simultaneously

www.isscctv.com
SecurOS 19 Administration Guide
Purpose, Implementation And Operation Principles

2.2.4 Video Server System Requirements

Table 4. Video Server System Requirements

Parameter Description

Windows XP (Service Pack 3) — 32-bit and 64-bit; Windows


Server 2003 R2 (Service Pack 2) — Standard Edition,
Enterprise Edition — 32-bit and 64-bit; Windows Server
OS 2008 R2 (Service Pack 1) — Standard Edition, Enterprise
Edition — 64-bit, Windows 7 (Service Pack 1) — Home Basic,
Home Premium, Professional, Enterprise, Ultimate — 32-bit
and 64-bit

Intel Core 2 Duo 3,0 GHz (E8300)/AMD Athlon II X3 or


above. Intel Core 2 Quad Q9400/AMD Phenom II X4 945 is
CPU
recommended. CPU should support SSE2 instruction, SSE3
support is desirable.

RAM Not less than 2 GB. 3 GB is recommended

HDD Not less than 150 GB

HDD free space for software Not less than 500 MB


installation

HDD free space for PostgreSQL Not less than 500 MB


installation

To display video from more than 8 cameras: SVGA-card with


128 MB onboard (min), memory bus not less than 128-bit.
Video adapter
SVGA-card with 256 MB onboard, memory bus not less than
128-bit is recommended (for example, AMD HD 5550)

TCP/ IP network speed Not less than 100 Mbps. 1000 Mbps is recommended

2.2.5 Audio Subsystem Requirements

To capture and playback sound the Video Server should have either integrated audio on-board (check
the motherboard manual) or any additional PCI or PCI-E sound card. Alternatively, TVISS1-02, TVISS4-
02, TVISS4E-REV5 or TVISS PCI-E8 video capture card (cards) can be used to capture sound, because
they have additional audio input on-board.

Notes:
1. If there is no integrated sound card and only TVISS video capture card installed, it is necessary to
install additional sound card to playback audio records on this server.
2. Integrated or additional sound card provides sound capture only from one microphone. In case of
necessity to capture sound streams from great number of microphones one must use TVISS video
capture cards.

2.2.6 Notification Subsystem Requirements

To use Audible Notification Service (playing sounds upon system events) to work on a particular
computer, it should have either integrated audio on-board or any additional PCI or PCI-E sound card.

www.isscctv.com
SecurOS 20 Administration Guide
Purpose, Implementation And Operation Principles

2.2.7 Access Control/Fire Alarm Subsystem Requirements

The application server should have the required number of free (not used) serial (COM) ports to
connect the ACS/alarm/fire alarm controllers.

2.2.8 Environment Requirements

The sections below covers some system and other requirements, that provide setup, start and correct
SecurOS operation.

2.2.8.1 Computer Name Restrictions


Names of computers on which the SecurOS software can be installed, should comply with the
following requirements:

1. The length of a name should not exceed 16 symbols.


2. The blanks, tabs and following characters are restricted:
` ~ ! @ # $ % ^ & * ( ) = + _ [ ] { } |; : . ' \ " № , < > / ?
3. The name cannot consist of digits only.

Note. This section is referenced by operations of reating/editing/checking value of the computer_name


parameter.

2.3 Software Implementation. SecurOS' Subsystems


Configuration, basic features and objects of different parts (subsystems) of the SecurOS system are
described separately in the subsequent parts of the document. The following subsystems are involved
in SecurOS system structure:
Core subsystem, containing objects and their settings corresponding to main system components,
such as users and computers. Also organization structure of the system and data storage are
configured within this subsystem, as well as system statistics collection parameters (see Core
Subsystem).
Interface subsystem, containing objects responsible for visual representation of the system objects
and actually used by operators working with the system. These are desktops, external application
windows, maps, HTML forms and dialogs, system event viewer (see Interface Subsystem).
Video subsystem, which components are responsible for main video streams control, video cameras
displaying and recording process, video playback and live video monitoring, video motion
detectors and video archives (see Video Subsystem).
Audio subsystem, containing control facilities of audio recording and playback devices (see Audio
Subsystem).
I/O subsystem, which contains objects responsible for input/output peripheral devices (fire alarm
controllers, relays and various detectors) (see I/ O Subsystem).
Notification subsystem that comprises objects for notification of users about system events by
media messages (see Notification Subsystem).
Automation subsystem, which contains tools for system scripts and macros programming,
configuration an interpretation, time zones automation controls (see Automation Subsystem).

www.isscctv.com
SecurOS 21 Administration Guide
Purpose, Implementation And Operation Principles

Note. Each section contains a description of the basic operation principles and configuration specifics of the
selected subsystem.

www.isscctv.com
SecurOS 22 Administration Guide
SecurOS Installation

3 SecurOS Installation
This section describes system installation on different SecurOS servers and workstations.

3.1 Installing And Configuring The Configuration Server


This section describes installation and configuration of the SecurOS's managing server.

3.1.1 Installing and Configuring the SecurOS on Video Server

This section describes installation and configuration of the SecurOS managing server on computer
which assigned functionality is Video Server.

3.1.1.1 Hardware Installation


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional,
SecurOS Xpress.

The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys and TVISS video capture boards.

The Guardant keys are used for licensing restrictions only. The TVISS boards ensure functioning of the
Video server with analog video surveillance cameras, and also are responsable for license restrictions.

3.1.1.1.1 Guardant Key Installation

The Guardant key is the electronic device constantly connected to the computer through a USB port.
The SecurOS software addresses to a key for check the license information.

The key is necessary to place before the beginning of the SecurOS software installation. To install
Guardant key, plug the key into any free (not used) USB port.

The Guardant key driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation section) is selected.

Note. The Guardant key driver can be installed later in a manual mode. For the detailed description of the
procedure see the SecurOS SecurOS Installation Guide.

3.1.1.1.2 TVISS Boards Installation and Cameras Connection


For installation of the TVISS video capture boards, they must placed in a available PCI/PCIe slot on the
motherboard of the video server. A special cable (dongle) will be provided to connect the board to the
video surveillance cameras. These steps must be done before the beginning of the SecurOS software
installation.

www.isscctv.com
SecurOS 23 Administration Guide
SecurOS Installation

Detailed description of the procedures of installing TVISS boards and connecting cameras is available
in the SecurOS Installation Guide.

The TVISS board driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation section) is selected.

3.1.1.2 License Key


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional,
SecurOS Xpress.

The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.

The license key is created on the basis of the SecurOS hardware unique codes (Guardant or TVISS
boards) or combinations of unique codes of the computer hardware on which SecurOS is installed.

License keys are checked according to the priority descending in the following order:

1. Guardant key;
2. TVISS board key;
3. key on the basis of the combinations of unique codes of the computer hardware (hardware code).

In addition to the unique hardware codes, the following data is also taken into account during license
key generation:

program language selected on the SecurOS installation;


default language of the installed operating system (Language parameter (local ID));
SecurOS release version;
SecurOS edition.

The license key is usually provided in one of the following ways:

in the product delivery set, on the software CD;


by e-mail.

3.1.1.2.1 The Key is a part of a product


If the license key is provided on a disk in the delivery set, then it is necessary to specify the key location
in the Installation of the license key file window at the corresponding step of the SecurOS installation
procedure (see Software Installation section).

3.1.1.2.2 Request the key by e-mail

In case the license key isn't included in the SecurOS delivery set it is necessary contact Intelligent
Security Systems to request it from.

For key request registration perform the following steps:

1. Install the SecurOS hard and software on the computer.

www.isscctv.com
SecurOS 24 Administration Guide
SecurOS Installation

2. To get hardware unique codes, run the Hardware Report Utility, thereto click Start button on the
Windows Task bar. Consistently choose All Programs SecurOS Hardware Report Utility
menu items.
3. The utility will display the report data in the ISS Hardware Report Utility window (for example, see
figure 1).

Figure 1. Hardware Report Utility window

4. Click Copy Report to Clipboard button in the utility window. The utility will copy the report to
clipboard.
5. Create and open a new text file of any format. Paste the clipboard content to the file. Additionally
insert the following data into the file:
program language selected on the SecurOS installation;
SecurOS release number;
SecurOS edition.
6. Save the file.
7. Send the file to the Intelligent Security Systems Technical Support Team (see Getting Technical
Support section).

On receiving the license key file copy it to the SecurOS root folder.
3.1.1.3 Software Installation
This section covers a specifics of the SecurOS installation or upgrading, that make it possible to reuse
previously created objects.

Warning!
1. To install the software, you must have administrator rights for Windows OS. Proceed to software
installation only when you finish hardware installation and network configuration for any
computer.
2. It’s strongly recommended to disable the User Account Control option before installing SecurOS
software under Windows 7 and Windows Server 2008 R2.

Note. It is not supported to install the software on Windows Server 2008 R2 if it is a domain controller.

www.isscctv.com
SecurOS 25 Administration Guide
SecurOS Installation

3.1.1.3.1 Using Current Parameters of the Windows User Account needed for
PostgreSQL

During fisrt SecurOS installation Windows user account needed for PostgreSQL operation is created
with the name postgres and the same password.

Note. If current system security policy does not allow to create user account with default login and password,
specify password that meets the requirements of the active system security policy.

If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 2) enter currently used password of the
PostgreSQL user account.

Figure 2. Database update and formatting Window

2. Click Next to continue. System will recreate Windows user account with name postgres and old
password.

Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.

3.1.1.3.2 Using Current Parameters of the Database and Administrator User Account
During first SecurOS software installation default PostgreSQL administrator’s user account is created
with the name postgres and the same password, database is created with the name securos.

If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 3) enter currently used database name

www.isscctv.com
SecurOS 26 Administration Guide
SecurOS Installation

and database administrator’s credentials.

Figure 3. Database update and formatting Window

2. Click Next to continue. The database will be updated and reformatted with the old name and
administrator’s credentials.

Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.

3.1.1.3.3 Software Installation Procedure

Warning!
1. Before installing SecurOS software on 64-bit MS Windows 2008 Server R2 it is necessary to install
additional multimedia components (see Installing Multimedia Components and Services under
MS Windows Server 2008 R2);
2. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.

To install the software on a Video Server do the following:

1. To start the SecurOS software installation run the product setup file. System will display the Choose
Setup Language window (see figure 4).

www.isscctv.com
SecurOS 27 Administration Guide
SecurOS Installation

Figure 4. Choose Setup Language window

From the drop-down list select the SecurOS InstallShield Wizard required language. Click the OK
button.

Additional Information
The Choose Setup Language information messages depends on the OS default language (the Language parameter
value (local ID)).

2. The Preparing To Install window will appear, in which the steps of the installation preparation will
be displayed.
After the end of procedure of preparation the system will automatically display the Welcome to the
InstallShield Wizard window (see figure 5).

Figure 5. Welcome to the InstallShield Wizard window

Click the Next button in the Welcome to the InstallShield Wizard window to continue.
3. The License Agreement window will appear (see figure 6).

www.isscctv.com
SecurOS 28 Administration Guide
SecurOS Installation

Figure 6. License Agreement window

Read the license agreement carefully. Select I accept the terms in the license agreement option if you
agree. Click the Next button to continue.
4. The Install Type window will appear (see figure 7).

Figure 7. Install Type window

By default the typical installation mode allowing to install Video Server software with default settings
is selected. Click the Next button to continue.
5. The Server Type window will appear (see figure 8).

www.isscctv.com
SecurOS 29 Administration Guide
SecurOS Installation

The item is excluded from the installation procedure in the SecurOS Xpress, SecurOS Lite editions.

Figure 8. Server Type window

To install Conf iguration Server software select appropriate value from the drop-down list. Click the Next
button to continue.
6. The Installation of the license key file window will appear (see figure 9).

The item is excluded from the installation procedure in the SecurOS Lite edition.

Figure 9. Installation of the license key file window

www.isscctv.com
SecurOS 30 Administration Guide
SecurOS Installation

Depending on the availability of the license key, do one of the following:


if the key is available:
- select the Copy the license key from the specified directory option, click Browse button and
specify the directory that contains license key file using file manager;
- select the Copy the license key file from the setup directory option if setup directory contains
the license key file.

Additional Information
Copy the license key file from the setup directory option is displayed in the Installation of the license key file
window when SecurOS setup directory contains the license key file.

if the key is not available— select the Do not copy the license key file option. The key file can be
copied in the SecurOS installation directory after installation is complete. For more information
about getting license key file see License Key section.
Click the Next button to continue.
7. The Software language selection window will appear (see figure 10).

Figure 10. Software language selection window

To define SecurOS program language select the required one rfom the drop-down list.

Warning! You should specify only the language, which is permitted by your license key file. For more
information about license key see License Key section.

Click the Next button to continue.


8. The Device driver selection window will appear (see figure 11).

The item is excluded from the installation procedure in the SecurOS Lite edition.

www.isscctv.com
SecurOS 31 Administration Guide
SecurOS Installation

Figure 11. Device driver selection window

Uncheck the default checked Install ISS Integrated Devices Pack if it is not proposed to integrate
additional devices. Choose the check box of the Guardant or video capture board that was in the
delivery set and has already been installed on the computer. Click the Next button to continue.
9. The Ready to Install SecurOS window will appear (see figure 12).

Figure 12. Ready to Install SecurOS window

To start the installation procedure click the Install button. The system will unpack required archives
and then will begin the installation and will display SecurOS Installation window, in which the
indicator of the process will be shown. After the installation process has successfully completed the
InstallShield Wizard Completed window will appear (see figure 13).

www.isscctv.com
SecurOS 32 Administration Guide
SecurOS Installation

Figure 13. InstallShield Wizard Completed window

Click the Finish button to exit the installation program.


3.1.1.4 Initial Configuration
Initial SecurOS configuration is carried out on the Conf iguration Server with the help of the System
Conf iguration Wizard, which is automatically started at the first start of the software and offers various
options of configurations. Base configuration at which the configuration data is entered by the
administrator, is carried out by means of the First Start Conf iguration Wizard. Upon the configuration
finish, the system will be completely ready for use.

3.1.1.4.1 Initial Configuration Using The System Configuration Wizard


To configure SecurOS for the first time by means of the Wizard, perform the following steps:
1. Launch SecurOS by going to the Windows Start menu and selecting the following menu options All
Programs SecurOS SecurOS (see figure 14).

Figure 14. Start menu (All programs)

The system will display an initialization window, in which steps of the procedure of system
preparation for initial start (see figure 15) will be displayed.

www.isscctv.com
SecurOS 33 Administration Guide
SecurOS Installation

Figure 15. SecurOS initialization window

After the preparation procedure has completed the system will open the System Conf iguration Wizard
window which will provide options for system configuration (see figure 16).
2. For basic configuration select the Configure using Wizard option that is active by default.

Figure 16. Wizard scenario window


Click Next button to continue.

Note. Import configuration file and Start with empty database scenarios are described
below.

www.isscctv.com
SecurOS 34 Administration Guide
SecurOS Installation

3. The License view window will appear (see figure 17).

Figure 17. License view window


Window displays license restrictions for the currently installed SecurOS. Click Next button to continue.
4. The Superuser password setup window will appear (see figure 18).

Figure 18. Superuser password setup window


To confirm default superuser password click Confirm password button. To change superuser
password click Change password button.

The system will display window to enter new parameter values (see figure 19).

www.isscctv.com
SecurOS 35 Administration Guide
SecurOS Installation

Figure 19. Change superuser password window

Set and confirm new superuser's password, or click Change to default button to use default value.
Click Next button to continue.
5. System will display Users setup window (see figure 20).

Figure 20. User setup window

To add a new users enter required values into the appropriate fields.

www.isscctv.com
SecurOS 36 Administration Guide
SecurOS Installation

New users can be created with the following user account rights:
Power user;
Simple user.
Power user can do the following:
View objects using the user interface;
Control video cameras, for example, arm camera, start and stop recording;
Control PTZ devices;
Hide user interface;
Shutdown the current SecurOS user session;
Shutdown SecurOS system.
Simple user can do the following:
View objects using the user interface;
Shutdown the current SecurOS user session.
Click Next button to continue.

www.isscctv.com
SecurOS 37 Administration Guide
SecurOS Installation

6. System will display the Computer name and video archive setup window (see figure 21).

Figure 21. Computer name and video archive setup window

Do the following:
If necessary edit the Computer object name in the Enter computer name field. By default the
computer name is set by system in the following way: Computer <computer_name> (see Computer
Name Restrictions section).
Choose Drives to store recorded video by selecting the corresponding drive from the Select
available logical drivers for video archive recording table. SecurOS will store the recorded video
on the drives specified in this window.
If the local export of video records in the AVI/ASF format isn't required, clear the The ability of
AVI/ ASF local exportation on video server check-box that was set by default.

Additional Inf ormation


The given parameter regulates the possibility to create the additional objects (allowing to save video records on a
hard disk of the given computer) on the video server.

Click Next button to continue.


7. System will display the Add and configure IP devices window (see figure 22).

If it is necessary to operate with network IP-devices (for example, IP cameras), click Add button.
System will add a new line in the List of IP-devices block. Set IP device parameters by clicking the
necessary field. Repeat the operation for all required IP devices.

www.isscctv.com
SecurOS 38 Administration Guide
SecurOS Installation

Figure 22. Add and configure IP devices window

Click Next button to continue.

Note. IP devices can be added later.

8. If video capture boards are installed on the computer the Information about installed TVISS cards
window will appear (see figure 23).

This step is excluded from the installation procedure for the SecurOS Lite edition.

www.isscctv.com
SecurOS 39 Administration Guide
SecurOS Installation

Figure 23. Information about installed TVISS cards window

In the Video encoding system block choose the required standard for encoding video signal.
Click Next button to continue.
9. System will display the Add operator workstations (OWS) window (see figure 24).

Figure 24. Add operator workstations (OWS) window

To add a Operator workstation to the configuration do the following:


Click Add button. The system will add a new line to the List of operator workstations block. In the
Computer network name field set computer name which will be connected to the SecurOS
network as an Operator workstation.

www.isscctv.com
SecurOS 40 Administration Guide
SecurOS Installation

Note. Computer name should correspond to the value set in the operating system configuration (see My
computer Properties Computer Name).

Additional Information
The computer name also can be selected from the list of the computers connected to a network. To view the list click
the  button in the Computer network name field.

If on the added Remote operator workstation it is necessary to export video in the AVI/ASF format,
then select the corresponding setting in the Export to AVI/ ASF field:
- locally on OWS — option to convert/export to AVI/ASF file will be available on an added
remote operator workstation;
- remotely on video server — option to convert/export to AVI/ASF file will be available on a video
server;
- is not necessary — option to convert/export to AVI/ASF file will not be available.
Do the described above actions for each Remote operator workstation connected to the network.
Click Next button to continue.

Note. Remote operator workstations configuration can be done later.

10.The Summary information window will appear (see figure 25).

Figure 25. Summary information window

www.isscctv.com
SecurOS 41 Administration Guide
SecurOS Installation

Review the selected system parameters. If it is necessary to change anything click Back button. Set a
new value. Click Next button to return to the Summary information window. To create and save the
configuration click the Finish button.

After the procedure of data creation and saving has completed successfully the corresponding message
will be displayed (see figure 26).

Figure 26. Successful configuration saving message

As a result of the described actions the system will be ready for operation.
3.1.1.4.2 Restoring Configuration
The backup copy allows to quickly and easily restore system configuration.

Warning!
1. Version of the backup copy should comply with version of the currently installed SecurOS,
otherwise it is not applicable.
2. Restoring configuration is feasible only on the Conf iguration Server (see Managing Network
Configuration by Configuration Server).

To restore system configuration from backup select Import configuration file scenario in the Wizard
scenario window (see figure 27).

Figure 27. Wizard scenario Window

Click the Next button to continue and follow the Wizard.

www.isscctv.com
SecurOS 42 Administration Guide
SecurOS Installation

3.1.1.4.3 Start with Empty Database


To start system with empty database select appropriate scenario in the Wizard scenario window
(see figure 27). If this scenario is used the system start with minimal configuration containing one of
each following types: Security zone, Computer, Desktop and Monitor. Further system configuration is
performed in manual mode.

3.1.2 Launching SecurOS On The Configuration Server

To start SecurOS in manual mode from the Windows Start menu, select the following menu items: All
Programs SecurOS SecurOS (see figure 28).

Figure 28. Start menu (All programs)

Additional Information
The system also can be launched by means of the SecurOS shortcuts in the Start menu, on the Desktop or in the
Windows taskbar.

The Authorization window is used to log in. It is displayed after the system has successfully started
and loaded all configurations (see figure 29).

www.isscctv.com
SecurOS 43 Administration Guide
SecurOS Installation

Figure 29. Authorization window

For logging in use the data of the superuser account:

User — root;
Password — securos.

Notes:
1. If superuser password was changed during system configuration (see 4 in  Using The System
Configuration Wizard section) use modified value.
2. If the wrong login credentials are entered the Authorization Error window will be displayed. If the
incorrect credentials are entered 3 times in a row, the system will enter a 30-second waiting mode
after which the next attempt to login will be given.

3.2 Installing, Launching and Configuring Peripheral Servers and


Operator Workstations
To add other Video Servers, Administrator Workstations, Application servers or Operator Workstations to the
network it is necessary to do the following:

1. Add computers to the a network for that create and set the corresponding objects in the Object Tree of
the certain Security Zone object on the Conf iguration Server.
2. On the added computers install the SecurOS software that corresponds to the computer purpose in
the network (see Types Of Servers And Workstations section).
3. Launch SecurOS and configure the system with the Wizard.

www.isscctv.com
SecurOS 44 Administration Guide
SecurOS Installation

Note. The very operation can be executed only for Video Servers, Administrator Workstations and Application
servers.

Warning! The possibility to add the given amount of the certain typed computers to the network is regulated
by the license restrictions.

3.2.1 Adding To The Network And Configuring Peripheral Servers And Operator
Workstations

To add a computer to the Object Tree do the following:

1. Enter the Administration Mode on the Conf iguration Server.


2. In the Object Tree select the Hardware group, create a Computer child object.
3. In the Parameters of created object window (see figure 30) set the required values:

Figure 30. Parameters of created object

In the ID field set the computer name (see Computer Name Restrictions). It should correspond to
the value defined in the OS settings (see My Computer Properties Computer Name).
In the Title field define the Computer object name as it will be displayed in the SecurOS Object Tree.
4. In the computer properties window (see figure 31) in the Role field select the computer role in the
network that should correspond to the SecurOS software installation type on the computer (see
Types of Server and Workstations section).

www.isscctv.com
SecurOS 45 Administration Guide
SecurOS Installation

Figure 31. Computer object settings window

Set the following necessary parameters:


Network address — the network address of the adding Computer object.

Note. Parameter is a mandatory one only if the network computers are registered in the different
subnetworks.

Disks to store archive — disks to save video records.

Notes:
1. Without the parameter definition the video records saving will be impossible.
2. The parameter is a mandatory only for the Video Server.

Servers to connect — the list of computers to which the created Computer object can be connected. It
is recommended to include all accessible servers of the security network; for that to click the Select
All button.
5. If needed set the other parameters. Apply new settings.
6. For the added Computer object create the own Object Tree. The type and content of the Object Tree is
defined by a computer role in a network.
7. Repeat the steps for all added to the network computers.

www.isscctv.com
SecurOS 46 Administration Guide
SecurOS Installation

3.2.2 SecurOS Installation On Peripheral Servers


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional.

To install SecurOS software on additional servers (on other Video servers, Administrator Workstations and
Application servers) do the following:
1. To start SecurOS software installation on additional servers setting launch the product installation
file on the corresponding computer.
2. Up to the setting type selection step in the Install type window steps of the procedure are similar to
software setting on the video server (see Software Installation section).
3. In the Install type window (see figure 32) select the Advanced configuration options type.

Figure 32. Install Type window

4. In the Setup type window (see figure 33) select the required installation type.

Figure 33. Setup type window Administrator Workstation

5. In the Server type window (see figure 34) set Peripheral Server.

www.isscctv.com
SecurOS 47 Administration Guide
SecurOS Installation

Figure 34. Server Type window

6. In the Installation of the license key file window choose appropriate scenario depending on the
availability of the license key (for the details see Software Installation section).
7. In the Destination Folder window set the root directory to install SecurOS.
8. In the Installation database type window (see figure 35) choose one of the following values:

Figure 35. Installation database type window

Local— the local SecurOS database will be created and used.


Remote— the database from the remote server will be used.
9. If the Local value is set then the PostgreSQL installation parameters window will appear (see
figure 36).

www.isscctv.com
SecurOS 48 Administration Guide
SecurOS Installation

Figure 36. PostgreSQL installation parameters window

It is recommended to use default values in the PostgreSQL installation parameters window.


10.In the Database window (see figure 37) set a local database name. It is recommended to use default
value.

Figure 37. Database window

11.The further steps are similar to the software installation on the Video server (see Installing And
Configuring The SecurOS On Video Server section). When setting parameters It is recommended to
use default values.

Warning! The software language must be the one for all network computers.

www.isscctv.com
SecurOS 49 Administration Guide
SecurOS Installation

3.2.3 SecurOS Installation On Operator Workstation

To install SecurOS software on the Operator Workstation do the following:


1. To start SecurOS software installation on operator workstation launch the product installation file on
the computer.
2. Up to the setting type selection step in the Install type window the steps of the procedure are similar
to software setting on the video server (see Software Installation section).
3. In the Install type window select the Advanced configuration options type.
4. In the Setup type window (see figure 38) select the Operator Workstation installation type.

Figure 38. Setup type window

5. Follow the further InstallShield Wizard instructions.

Warning! The software language must be the one for all network computers.

3.2.4 Installing Additional Multimedia Components

If Peripheral Server and Operator Workstation are running under MS Windows Server 2008 R2 it is
necessary to install additional multimedia components required for proper operation of SecurOS (see
Installing Multimedia Components and Services under MS Windows Server 2008 R2 section for
detailed description).

3.2.5 Launching And Configuring SecurOS On Peripheral Servers


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional.

The SecurOS initial configuration on Video Server, Administrator Workstation or Application Server is
performed by the initial configuration Wizard that is run on system launching.

To launch and configure SecurOS do the following:


1. In the Start Windows menu consistently choose the following menu options: All programs
SecurOS SecurOS.
2. In the Security network server type window (see figure 39) select Peripheral server option.

www.isscctv.com
SecurOS 50 Administration Guide
SecurOS Installation

Figure 39. Security network server type window

3. In the Join existing security network window (see figure 40) do one of the following to choose the
Conf iguration Server with the current network configuration:
Set Conf iguration Server name (see Computer Name Restrictions) or IP address in the
Configuration server name or IP address field.
For automatic search for Video Server in the network click Find servers in the local network
button. The searching procedure will be started and Conf iguration Server will be displayed in the
Servers found box. Click found Conf iguration Server to select it.

Warning! During the configuration procedure the Conf iguration Server must be active and the SecurOS
security system should be launched on it.

www.isscctv.com
SecurOS 51 Administration Guide
SecurOS Installation

Figure 40. Join existing security network window

Click Join button. The Loading configuration window will appear that indicates the loading process
(see figure 41).

Figure 41. Loading configuration window

4. After the configuration loading finished successfully the corresponding system message will be
displayed. Click OK button. In the Loading configuration window click Finish button.

www.isscctv.com
SecurOS 52 Administration Guide
SecurOS Installation

The further user authorization at start of the installed additional server is done similarly to the
procedure described in Launching SecurOS On The Configuration Server section.

3.2.6 Launching SecurOS On Operator Workstation

To launch SecurOS system on Operator Workstation do the following:


1. In the Windows Start menu consistently choose the following menu options: All programs
SecurOS SecurOS.
2. In the Authorization window (see figure 42) set the server to connect to IP address in the Connect to
fiend, User and Password that corresponds to personal accounts.
For more information about the authorization see SecurOS Quick User Guide.

Note. Connection is possible only to those servers which are set in the Server to connect list of the Computer
object associated with the given Operator Workstation.

Figure 42. Authorization window

Note. Automatic authorization is possible for the user for which such possibility is specified by the
administrator. To apply automatic authorization choose the Auto login check-box. For more information
about the automatic authorization procedure see below.

www.isscctv.com
SecurOS 53 Administration Guide
SecurOS Administration Overview

4 SecurOS Administration Overview


Administration mode is used to configure security network and it components. It is accessible from
any Application Server and Administrator Workstation. All security system components remains
completely functional when entering administration mode (without any restrictions).

Warning! After SecurOS and PostgreSQL software installation Windows OS creates the postgres account.
To configure SecurOS system use an Windows administrator account but not the postgres one.

4.1 Working With Control Panel


The control panel is intended for selecting/switching Desktops, entering the administrative mode, and
user session management. Control panel is represented on figure 43.

Figure 43. SecurOS Control Panel

Additional Information
The control panel also can be used to launch special system control commands (see Macros section).

Only active Desktops and Macros are displayed on the control panel (see Disabling Objects). Number of
the displayed object of each type is defined by system settings and changes dynamically. If max value is
exceeded all additional objects are hidden and can be activated from the appropriate menu:

 — for the Desktops;

 — for the Macros.

4.1.1 Control Panel Activation

By default after logging in the control panel is hidden. To display the control panel after logging in,
hold the Ctrl key on the keyboard and move the mouse pointer so it touches the top of the screen.

Additional Information
The control panel also can be activated by double clicking on the application icon in the Windows taskbar (system
tray), or by means of the application icon context menu.

www.isscctv.com
SecurOS 54 Administration Guide
SecurOS Administration Overview

4.1.2 Administration Mode

To enter the administration mode click the  button (Configure the system, see 43).

To leave the administration mode click the   button iteratively.

After entering the administration mode the system will display the Object Tree and Administrator toolbar.
The Administrator toolbar is intended to perform typical operations with the security system elements
which structure is present in the Object Tree. The appearance of the Object Tree and Administration
toolbar is shown on the figure 44.

Figure 44. Object Tree and Administrator Toolbar

Additional information
On first entering the administrator mode after the system start the SecurOS Object Tree is hidden.

4.1.2.1 Object Tree

All security system elements are displayed in the form of a object tree — a hierarchical structure
reflecting correlations between them. Similarly to the file system tree structure, the object tree has a root
element (default name: System). Tree elements, that are children of the root, contain all the network
objects grouped by their functional types. To display and control grouped tree elements the standard
means are used (similar to OS file manager controls).

Additional Information
Objects which are one level down the hierarchy are called child objects to the object one level above them.. The
parent objects contain child objects.

There are two element types in the tree:

www.isscctv.com
SecurOS 55 Administration Guide
SecurOS Administration Overview

1. Group — this element is intended for grouping Objects by their functional types. The Group is
predefined within system and is created automatically when creating its first element, but can be
deleted by administrator including all children elements.
2. Object — the functional element of the security network. An object will be included in a Group only if
it is of the same object type as the other objects in the Group. An Object can be created, modified and
deleted by administrator

There are two object classes in the SecurOS network: system objects and user interface objects. System
objects reflect the network functionality, user interface objects are intended for security network
monitoring and management.

The Object Tree is used to configure/manage any aspect of the system.


4.1.2.2 Administrator Toolbar
The Administrator Toolbar contains the controls (buttons) allowing to make typical operations of the
system administrator: create/delete/rename object, set object parameters, temporarily disable an object
from the security network and move an object onto a map (if working with the Map object).

To create and add a new object click the Create button.

Access to an object's parameters and application of new settings is carried out by the Setup button.

Administration operations are fulfilled with the SecurOS object selected in the Object Tree. The list of
operations which can be done with an object (i. e. availability of each of the Toolbar buttons) depends
on the selected object.

Warning! Any changes to the SecurOS object parameters are saved in the system immediately after the
change of a parameter value. Rollback to the previous object parameters set is possible only at the repeated
setting of the previous values in a manual mode.

4.1.3 User Session Administration

The control panel allows to switch users and shutdown the system. Click Change user/ Shutdown

system button ( ) and from the drop-down list select a necessary command (see figure 45).

Figure 45. Change user/ Shutdown system menu


options

4.1.4 Hide Control Panel

After control panel is activated it permanently displayed on the desktop over all other windows. To

hide it manually click Hide Control Panel button ( ).

www.isscctv.com
SecurOS 56 Administration Guide
SecurOS Administration Overview

4.2 Working with Objects


To perform actions on objects, administration toolbar provides a set of buttons (see figure 46):
Create — create new child object under currently selected parent object.
Delete — delete object.
Disable — disable object.
Move — move object to other parent object, rename object.
Setup — open/close object's settings window.
On Map — place object on map (available if any map object exists). Object is placed on a map only
if it is represented by Map object in the system (this action does not relate to maps represented by
Map v2 object).

Figure 46. Administration toolbar buttons

To perform an action directly from the Object tree (exclude object creation action), right click the object
icon in the Object tree. System will display action context menu.

4.2.1 Creating Objects

To create a new object:


1. Select a parent object in object tree.
2. On the Administration toolbar click Create button and choose necessary object type from a drop-
down list box.
3. A dialog window will appear containing base object settings (ID and Name). Enter these parameters
and click OK button to confirm object creation or Cancel button to return without creating an object.

If current object cannot have child objects, in drop-down list box you will see object types for its parent.
In this case newly created object will appear as a sibling node, as if you have selected the parent node
prior to creating new object.

Once an object is created, its settings window will appear automatically.

4.2.1.1 Creating Objects Limits


When I try to create an object, a message ``Current system configuration does not permit to create
more than N `XXX' objects'' appears. Why?

The system configuration limits (amount of objects of each type within security network) is written in
license key file (key.iss). The message above tells that the limit of objects of the specified type is
already reached. To be able to have more objects of this type, contact our Technical Support Team to get
the new key (see Updating License Key on All Servers).

www.isscctv.com
SecurOS 57 Administration Guide
SecurOS Administration Overview

4.2.2 Editing Object's Settings

To edit or view object's settings:


1. Select the object in the object tree and click the Setup button in the Administration toolbar. A
window with the object's settings will appear on the right side of the screen.

Notes:
1. Parameters in the object settings window are described in the section corresponding to the given
object for each subsystem (see Software Implementation. SecurOS Subsystems).
2. Several object types do not have editable settings, so the Setup button will become disabled once an
object of this type is selected.

2. Click the Setup button again to apply changes and close the object settings window.

Warning! You cannot close the settings window without applying changes to the object nor can you dismiss
changes made in this window. All changes are applied to the system configuration immediately upon closing
the settings window, so change object settings with care.

4.2.3 Deleting Objects

To delete object:
1. Select it in the objects tree and click Delete button on the Administration toolbar or select Delete
command in the context menu.
2. In the displayed window click OK button to delete object or Cancel button to return without
deleting.

Warning! This operation cannot be undone, so use it carefully. If you delete object, its child objects will be
deleted as well.

4.2.4 Disabling Objects

To temporarily exclude object from SecurOS network without deleting it and, thus, loosing its settings,
just disable it.

To disable object, select it in objects tree and click Disable button or choose Disable command in the
context menu. Disabled objects are marked with "cyan cross" icon.

To enable object, click Enable button or choose Enable command in the context menu.

4.2.5 Renaming Objects

It is possible to rename any object preserving all its settings.

To rename object:
1. Select object in object tree and click Rename button or select Rename item from the context menu.
2. In a dialog window specify there a new object name.
3. Click OK button to apply changes or Cancel button to escape from this dialog without changing
anything.

www.isscctv.com
SecurOS 58 Administration Guide
SecurOS Administration Overview

4.2.6 Moving Objects

It is possible to move one Map object from one parent to another preserving all its settings.

Warning! Only the Map object makes possible to move objects.

To move/rename a Map object:


1. Select object in object tree and click Move button or select Move item from the context menu.
2. Specify there a new parent object or object name.
3. Click OK button to apply changes or Cancel button to escape from this dialog without changing
anything.

Note. A restart of SecurOS may be required to apply the changes.

4.2.7 Searching Objects by Name

To find child objects by their names or parts of names:


1. Select parent object in tree and right-click it.
2. Choose Find context menu item. Search dialog window will appear.

Figure 47. Searching Object Window

3. Type in the name (or part of name) of the required object and press Enter key or click Search button.
The focus will switch to the first child object that matches the search string and search window is
closed (if Enter key is pressed) or Prev and Next buttons are activated. Window won't be closed even
an object is not found.
4. Press Enter key (or Prev and Next buttons) to resume searching or Esc key to stop searching and
close the window.

www.isscctv.com
SecurOS 59 Administration Guide
SecurOS Administration Overview

4.3 Working with Object Table Parameters


Object setting window can include both a single parameter text boxes and tables. Example of the table
parameter (Disks to store archive) is shown on figure 48.

Figure 48. Example of the object table parameter

When working with table parameters the following methods are used:
To add several entries into the table, use key.
To delete entry from the table, select required row and press Ctrl + Delete keyboard shortcut.

4.4 Managing User Rights Within Security Network


Once deploying security network, you can manage its internal security scheme and restrict access to its
administration interface, give some administrators the ability to administer only a part of SecurOS
security network, or explicitly define, what UI objects each operator can see, what cameras she/he can
control and what she/he cannot, etc.

When no individual user rights are set any user is granted with full (superuser) rights. Once you add at
least one person and define its rights within the system, SecurOS will require user name and password
when you launch server/workstation software next time. To get full access to all system components
and load the whole system database, use password and name of system superuser.

To implement access control within SecurOS network:


1. Change the default SecurOS superuser password and keep it safe (see Changing Superuser
Password).
2. Manage user rights for individual administrators/operators on per object basis (see Defining Access
Levels to Individual Objects).

www.isscctv.com
SecurOS 60 Administration Guide
SecurOS Administration Overview

3. For these settings to take effect, force all administrator and operator workstations to reconnect to
SecurOS network.

4.4.1 User Registration. Setting up User Rights

Users access to operation with the SecurOS security system is carried out on the basis of the login
accounts defining the user rights in the system. At system installation the one user account having
unlimited rights is created by default. New user accounts and their rights are set by the system
administrator with the help of System Configuration Wizard or at the further configuration.

To create and configure new user accounts the following system objects are used:
Department object (Security Zone Users group Department) — contains a list of the User
object. The name of each User object is used at authorization as the User parameter. New users can
be registered both in the given Department object, and in any other Department object created by the
system administrator which will be included in Users group automatically.

Note. Department object is created in the objects tree only if Power user or Simple user were added during
system configuration with the help of System Configuration Wizard.

User Rights group (Security Zone User Rightsgroup) — contains the User Rights objects. Each of
the existing User Rights objects can be used repeatedly (i. e. can be assigned to any new user).

Except a set of the user rights the password of the corresponding user account is defined and stored in
the User Rights object settings.

4.4.1.1 Default User Accounts

System Configuration Wizard creates the only one superuser account with the following values: root
(user name) and securos (password). The set of the rights of such account gives to the user the full
access to all system objects and the right to execute any actions in the network. Objects of the superuser
account aren't displayed in the SecurOS Object Tree; to change a name and a set of the superuser rights
is impossible.

Warning! Superuser password can be changed with the help of Wizard (see 4 in the Using The System
Configuration Wizard) or further at system operation.

4.4.2 Changing Superuser Password

A person that has full access to all SecurOS objects is called superuser. If no user rights are defined,
SecurOS will not request password when starting system software of the server or workstation and
allows operate as superuser.

Warning! Superuser login name is root. Default superuser password is securos. Change default
superuser password to the new value (the minimal length is 7 symbols) and keep it safe before giving access
to your security network for other personnel!

To change superuser password:


1. Log in as superuser.
2. Open settings window for the root System object and click Change Superuser Password button
(see figure 49).

www.isscctv.com
SecurOS 61 Administration Guide
SecurOS Administration Overview

Figure 49. System object settings window

3. Provide current password and a new password twice.

Note. After that, users other than superuser cannot see System object at all.

4.5 Updating License Key on All Servers


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional,
SecurOS Xpress.

To update license key on all servers:


1. Copy the latest version of the key.iss to the SecurOS program directory on the Conf iguration Server.

2. Run SecurOS program on the Conf iguration Server.


3. System will automatically update the license key on any of the Peripheral Server when given server
will connect to the Conf iguration Server for the next time.

Additional information
Outdated license key is stored in the SecurOS installation root directory in the key.iss.bak file.

Warning! After license key was updated on the Peripheral ServerSecurOS program may automatically reboot.

4.5.1 License Expiration Reminder

All workstations can be configured to notify simultaneously about license key file expiration date.

If less than certain days remain before license expiration then an information window will appear on
each workstation during operator working (see figure 50). Operator may close the window and
continue working.

Notification window appears with a certain periodicity (e. g. three times a day, with three hours
between messages).

www.isscctv.com
SecurOS 62 Administration Guide
SecurOS Administration Overview

Figure 50. License expiration information window

To setup notification parameters, do these steps on each computer where reminder window should
appear:
1. Open client_config.xml file located in the SecurOS root directory.
2. Insert the following parameters into the <Main> section:
DaysForRemaining — specify a number of days before license expiration date to begin operator
notification;
RemaindersPerDay — specify a number of notifications per day;

Warning! Zero value of this parameter results in that the reminder window will be never displayed!

MinRemaindPeriod — specify a minimal time interval (in minutes) between two notifications
(must be no less than 30).
3. Save the changes and close the file.

Listing 1. client_config.xml example

<?xml version="1.0" encoding="UTF-8" standalone="no"?>


<client>
<params name="Common">
<param name="CoreAddress" value="localhost"/>
</params>
<params name="Main">
<param name="AutoLogin" value="false"/>
<param name="CoreRestartTimeout" value="30000"/>
<param name="CurDayRemaindCount" value="0"/>
<param name="DaysForRemaining" value="15"/>
<param name="KeepCoreAlive" value="true"/>
<param name="KeepProcessesAlive" value="true"/>
<param name="LastRemaind" value="2013-03-22 13:58:39"/>
<param name="LastUser" value="root"/>
<param name="MinRemaindPeriod" value="180"/>
<param name="ProcessWaitTimeout" value="30000"/>
<param name="RemaindersPerDay" value="10"/>

www.isscctv.com
SecurOS 63 Administration Guide
SecurOS Administration Overview

</params>
<params name="ServersList">
<param name="0" value="192.168.3.35"/>
</params>
<params name="UserServersList">
<param name="0" value="192.168.3.35"/>
<param name="1" value="192.168.0.51"/>
<param name="2" value="s-zhulev"/>
</params>
</client>

4.6 IP-Device Manager


IP-Device Manager is designed to search IP devices within the SecurOS security network and to control
their settings.

Searching is performed with the help of the standard network technologies (see Searching Devices in
the Network section) within the local network of the Computer, which running Manager. All found
devices are assumed untuned; you can perform the following operations with such devices:
Adding IP Device;
Editing Parameters and Setting up IP Device Usage;

With devices that are already registered in the network (with the help of Manager or by standard tools)
you can perform the following operations:
Editing Parameters and Setting up IP Device Usage;
Deleting IP Device.

www.isscctv.com
SecurOS 64 Administration Guide
SecurOS Administration Overview

4.6.1 Specification

Main application window is represented on figure 51.

Figure 51. IP-Device Manager

The window consists of the following controls (see table 5):

Table 5. IP-Device Manager controls

Parameter Description

System IP-devices

www.isscctv.com
SecurOS 65 Administration Guide
SecurOS Administration Overview

Parameter Description

Object Tree of the Computers having role Video Server existing within
SecurOS network. When expanding the Video Server node all Video
Capture Devices children objects including their Cameras children
objects are displayed. If device has integrated audio circuit or it is
adjusted to operate in the syncronized recording mode
(see Synchronized Audio/ Video Recording and Playback section), all
Object Tree appropriate Microphone objects are also displayed in the tree.

Notes:
1. Objects whose settings are currently being edited are displayed
in the Object Tree in italic.
2. Objects that are disabled in SecurOS, are displayed in the Object
Tree in grey (shaded), similarly to inactive Windows objects.

Name of the object selected in the Object Tree (see above).

Object name Note. Object names are restricted with the following:
1. Name can not be empty.
2. Name should be unique.

Settings tab

Type and model of the device, selected in the Object Tree.


Type, Model
Information field, not editable by the user.

IP address IP address of the device.

Login/Password to access the device. By default when device is


added, the values assigned to admin/admin.
Login, Password
Warning! If login and password were assigned earlier (when device was
physically added to the network) through web-interface of the device, enter
given values, otherwise access to the device will be denied.

Check the box if the added device is an IP-video server with a


variety of physical video inputs, or IP camera with several lenses.

Limitations. To use the functionality the system must meet the


Multichannel device following conditions:
1. Device should support several independent video streams.
2. Device integration software should support multichannel
systems.

Number of used independent video channels of the multichannel


device.
Number of channels
Note. Max number of the video channels depends on device Type and
Model.

www.isscctv.com
SecurOS 66 Administration Guide
SecurOS Administration Overview

Parameter Description

Check the box, if you want to use device' audio inputs (or integrated
microphone). Max number of the audio channels depends on
device Type and Model and are defined in the device integration
software. In general, number of the audio channels ≤
number of the video channels.
Use audio inputs
Limitations. To use the functionality the system must meet the
following conditions:
1. Device must be equipped with audio inputs.
2. Device integration software in the SecurOS should support
sound.

Usage tab (see figure 52)

Tree consists of all SecurOS objects, that can use currently selected
IP device. Root elements of the tree are the Computers, for which at
least one of the following objects is configured:

Archive Converter;

Desktop;

Monitor;

Audio Player.

When displaying objects are grouped in compliance with their


hierarchy in the SecurOS, i.e. like in the SecurOS Object Tree.

IP device Usage Tree Note. If some of the mentioned above objects is disabled in the SecurOS
Object Tree, it is not displayed in the Manager's Usage Tree.

Those SecurOS object, which currently use selected IP device, are


displayed in the Tree with the appropriate mark.

The state when not all devices of the object selected in the Manager's
Object Tree (including children) are used by the object of the Usage
Tree (including children), is called "partial usage". In this state the
field, located on the left of such object is marked with the gray
background in the Usage Tree ( ), or, in Windows 7, with the 
mark. For example, if Camera with Microphone is placed on the
Monitor of some Desktop, but this Microphone is not used by the
Audio Player located on the same Desktop in the same time, this
Desktop will be marked in the Usage Tree with the ( ) mark.

Buttons

Delete Delete Video Capture Device, selected in the Manager's Object Tree.

www.isscctv.com
SecurOS 67 Administration Guide
SecurOS Administration Overview

Parameter Description

Save the new entered or edited device settings/Discard changes and


save current settings.

Notes:
Apply, Cancel 1. Buttons are enabled only if settings were assigned/edited in the
Settings and/or Usage tabs.
2. If current settings were edited and Close button was clicked
before these new settings were saved or rejected, system will
display the query to save the changes.

New IP-devices

Start searching non-configured IP devices in the local network of the


Search
SecurOS Computer, that running IP-Device Manager.

Select Video Server in the Object Tree of which a new Video Capture
Device, associated with the network IP device selected below
Add devices to video server (see Table of IP-devices below) will be created and where video
archive of this device will be created and stored. Computer, that
running IP-Device Manager is selected by default.

Table contains found non-configured IP devices.

Note. IP device is assumed non-configured, if there is no parent Video


Capture Device in the SecurOS network, that has IP address specified in
the IP address field (see below).

IP address — IP address of the found device.

Note. If port number was defined for the device at the initial IP address
assigning, it is displayed in this field in standard format (for example,
Table of IP-devices
192.16.0.185:8080).

Type — type of the IP device. Filled in automatically on the base


of the recognition results.

Model — model of the IP device. Filled in automatically on the


base of the recognition results.

Add — add selected network IP device to the specified Video


Server.

www.isscctv.com
SecurOS 68 Administration Guide
SecurOS Administration Overview

Figure 52. Usage tab

To complete the application and close IP-Device Manager window click the Close button.

4.6.2 Basic Operations

This section describes the following operations performed with the help of IP-Device Manager:
Searching Devices in the Network;
Adding IP Device;
Editing Parameters and Setting up IP Device Usage;
Deleting IP Device.

Warning! If connection with Configuration Server is lost all operations are blocked until connection is
restored.

4.6.2.1 Launching Manager


To launch IP-Device Manager do the following:
1. Enter the Administration Mode.
2. On the Administrator Toolbar (see figure 53) click the IP-Device Manager button.

Figure 53. Launching IP-Device Manager

Note. When some SecurOS object settings window is opened or connection with Conf iguration Server is lost
the IP-Device Manager button is disabled.

3. System will display the IP-Device Manager window (see Specification).

Warning! When IP-Device Manager window is active, SecurOS object settings mode is blocked ( i.e. it is
impossible to open object settings window from the SecurOS Object Tree).

www.isscctv.com
SecurOS 69 Administration Guide
SecurOS Administration Overview

4.6.2.2 Searching Devices in the Network


To search devices in the network the Universal Plug&Play technology is used. Searching parameters
are completely defined by UP&P internal mechanism with no restrictions (for example, by searching
duration) on SecurOS side.

To search IP devices in the SecurOS network do the following:


1. Enter the Administration Mode and launch IP-Device Manager.
2. In the New IP-devices block click the Search button. System will perform the search and display all
found devices in the Table of IP-devices (see figure 54).

Figure 54. Device search results

Additional Information
When placing mouse cursor over the IP address field the screen tip containing device response is displayed. In
general, tip's string consists of three field in the following format: <Device Manufacturer> <Device
Model> (<Device Name>). For example, Beward BD2570 (H.264 5M box camera).

Warning! Table of IP-devices displays all found network devices, including printers, scanners etc.

4.6.2.3 Adding IP Device


To add a IP device do the following:
1. Enter the Administration Mode and launch IP-Device Manager.
2. In the New IP-devices block of the Manager window click the Search button. After query is finished
Manager displays the list of untuned devices in the Table of IP-devices.
3. In the Add devices to video server field select the Computer of the SecurOS network, where device
should be added.
4. In the Table of IP-devices select device, which should be added to the network, then do the
following:
For the unrecognized device (only IP address is determined):
In the selected device row click Type cell, in the drop-down list select device type (see figure 55).

www.isscctv.com
SecurOS 70 Administration Guide
SecurOS Administration Overview

Figure 55. Select the Type of device

Click Model cell, in the drop-down list select the model of the device. Select default, if there is
no required model in the list. System will activate the Add button.
For the recognized device (IP address, Type and Model parameters are determined):
Select device from the Table of IP-devices.
For the arbitrary device (there is no device information in the table):
Click the Type cell in the last (empty) table row, in the drop-down list select device type.
Click Model cell, in the drop-down list select the model of the device.
5. Click Add button.

Note. If device can't be added due to license restrictions or if connection with the Conf iguration Server is lost,
system will display corresponding informational message.

System will create a new Video Capture Device with specified parameters and add it to the Manager's
Object Tree to the selected Computer; added device will be currently selected in the device tree. Camera
child object will be created for added Video Capture Device automatically; you can edit it's parameters in
the Administration Mode from the SecurOS Object Tree.

Note. Default name for each added device is Video Capture Device N, where N — next serial digital
identifier of given type of objects.

6. Perform the Editing Parameters and Setting up IP Device Usage operation.

4.6.2.4 Editing Parameters and Setting up IP Device Usage


To specify/edit device settings do the following:
1. In the Manager's Object Tree select the device whose settings you want to specify/edit.
2. Edit device settings in the System IP-devices block (see figure 56).

www.isscctv.com
SecurOS 71 Administration Guide
SecurOS Administration Overview

Figure 56. Setting up audio inputs

If necessary, change device name in the Object name field.


In the Settings tab:
if necessary, specify or edit IP address;
if necessary, change default Login/Password to access the Video Capture Device (admin/admin);
in case of multichannel device activate Multichannel device checkbox and specify required
number of channels. Depending on specified value there will be created appropriate number of
Camera object, child to the given Video Capture Device in the SecurOS Object Tree which will be
displayed in the Manager's Object Tree, too. Camera with the minimal identifier will be assigned
to a Channel number equal to 1, further channels are numbered with increments of 1.
if the added device supports sounds, activate Use audio inputs checkbox. Audio Capture Device
with one or some (for multichannel device) Microphone child object(s) will be automatically
created in the SecurOS Object Tree. In the Manager's Object Tree such microphones will be linked
with the appropriate number of device's cameras (see figure 56), and in the SecurOS Object Tree
will be specified in the settings of the appropriate Cameras.

In the Usage tab:


Activate checkboxes for those SecurOS objects, which will use currently selected device, or
deactivate for those, which should stop using device (see figure 57).

www.isscctv.com
SecurOS 72 Administration Guide
SecurOS Administration Overview

Figure 57. Usage tab

Notes:
1. Device usage can be specified even through device is disabled in SecurOS.
2. Device usage may be specified for an individual device and device group. To specify usage for all
devices, added to the arbitrary Video Server, select it in the Manager's Object Tree then, in the Usage
Tree, specify objects which should use these devices. When applying settings selected object will use
all devices of the specified computer.

3. Click Apply button.

4.6.2.5 Deleting IP Device


To delete IP device do the following:
1. Enter the Administration Mode and launch IP-Device Manager.
2. In the Manager's Object Tree select the device you want to delete.
3. In the System IP-devices block click Delete button. Selected device will be deleted from all Video
Servers along with all child or linked objects.

www.isscctv.com
SecurOS 73 Administration Guide
Core Subsystem

5 Core Subsystem
Core subsystem communicates with the computers in SecurOS distributed network and installed
intelligent modules (such as license plate recognition module) as well as other subsystems (such as
video or audio subsystem, or telemetry subsystem).

5.1 Working Principles


The core subsystem is the SecurOS core and it monitors the status of all connected objects, modules and
devices.

Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.

The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log file
in real time mode.

The SecurOS core subsystem allows connecting and disconnecting of the security network nodes,
configuration and synchronization the information between the security network nodes, as well as
monitoring any changes in modules and objects status.

If any single node or a certain network segment is disconnected, it is assigned the disconnected status
and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.

Permanent updating of the security network configuration data allows configuring the security
network from any computer running the necessary administration software, and watch video form
connected video cameras, listen to audio, send commands to hardware, monitor and control alarm and
fire alarm systems from each operator's workstation within the SecurOS network.

5.2 Object Reference


Core subsystem involves the following objects:
System.
Security Zone.
Department.
User Account.
Active Directory Storage.
User Rights.
Computer.
Monitoring center agent.

www.isscctv.com
SecurOS 74 Administration Guide
Core Subsystem

Remote system.
Area Zone.
Region.
Event Filter.
SNMP agent.

5.2.1 System

This is a root object of the entire objects tree and provides system-wide settings. This object cannot be
deleted, moved, or disabled. This object is visible to superuser only.

Parent object— none (root object).

Figure 58. System object settings window

Table 6. System object settings

Parameter Description

Insert name of the object as it appears in objects tree. Not used in


Name of the system
any other way.

Click this button to change superuser password (see Changing


Change superuser password
Superuser Password).

OK (Cancel) Save/discard changes.

System backup block

Select a pattern configuration from the drop-down list (all available


XML-file patterns are saved in sys_config subdirectory of
Configuration
SecurOS program directory). Click on this field to change a name of
pattern (default name is default).

www.isscctv.com
SecurOS 75 Administration Guide
Core Subsystem

Parameter Description

Click this button to save current configuration as a pattern to the


XML-file, which name is specified in the Configuration text box.
Then, sys_config folder will be created in SecurOS directory (if it
was not there). SecurOS objects database configuration will be saved
Save configuration to selected_name.xml XML-file in the created folder.
Warning! It is not recommended to save the configuration as wizard.xml
because this file name is reserved and used for last successful configuration
saving.

5.2.2 Security Zone

This object is used to divide entire security network into separate security zones. Security Zones are
commonly used when the SecurOS system ranges over a large territory when independent centralized
monitoring and supervision is needed for certain physically separated zones.

Also, there is a possibility to set the filters for the events transmitting between the security zones. Using
filters, events communication can be completely or partially disabled between the different security
zones. Thus, event filters between the zones are useful to apply when a zone must be completely
isolated from the other ones (see detailed information in Setting Up Event Redirection).

The users can be also granted with different access rights to implement multi-level access control for
the security objects (see Defining Access Levels to Individual Objects). For example, in a security
center the operators can observe the territory by watching the signals from the cameras. The supervisor
can be granted the rules to control the monitoring modes, enable or disable cameras, control the
rotatable cameras, and the head of the security center can generate reports.

Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is separated
into several segments and each administrator may monitor and configure only one of those segments.

Note. A separate events log is used for each security zone.

It is recommended to use several security zones if:

access control subsystem uses hardware identifiers (cards) with different facility codes on different
territories;
access control subsystem is distributed across several zones with different access schedule
(different holidays), and if each zone has its own departments and persons (i. e. several
organizations within one office building);
you need to store separate event logs for a subset of SecurOS objects, with different database depth.

Parent object— System.

www.isscctv.com
SecurOS 76 Administration Guide
Core Subsystem

Figure 59. Security Zone object settings window

Table 7. Security Zone object settings

Parameter Description

Define length of the events database (in days, max). Event database
stores events from objects that belong to this security zone only.
Possible values: [0; 9999]. If this field is empty the protocol length
Protocol database length
default value is used (7 days). Messages will be deleted
automatically when storage period expired. Removal is performed
once a day at 00:00:00 a.m. (hh:mm:ss) or when SecurOS starts.

Optional: specify default facility code for identification cards used


Facility code in access control system. You can override this setting on a per user
basis in User account object settings (see User Account).

Fill in a table containing list of dates (in DD.MM.YY format) that


Holidays will be used by access control subsystem as holidays. These
holidays are also used in time zones (see Time Zone).

Select from the list of accessible macros (Macro objects, see Macro)


Run macro at start
the one which will be activated on the system start, if necessary.

See Setting Up Event Redirection.


Setting Up Event
Redirection The functionality is available in the following editions: SecurOS Enterprise,
SecurOS Professional.

5.2.2.1 Setting Up Event Redirection


The functionality is available in the following editions: SecurOS Enterprise, SecurOS Prof essional.

SecurOS has the ability to setup event transmitting filters between security zones or individual
computers within the security network. Event redirection allows to completely or partially isolate one
security zone from another zone and to setup specific event flow rules within SecurOS network.

To setup event redirection it contains:


1. Open the settings window for the Security Zone object and click Event redirection button from this

www.isscctv.com
SecurOS 77 Administration Guide
Core Subsystem

panel (see figure 59). The event redirection setup window will appear.
2. Within Event source tree (see figure 60), select a security zone or single computer to set event
filtering for (to apply settings for a single computer, single-click its icon consequently to change its
state (see below icons list and corresponding states description).

Figure 60. Event redirections setup window

Icon meanings for event filters (see figure 61 from left to right):

Figure 61. Types of event filtering


modes

Security zone receives events— security zone by default receives all events from source
security zone or computer;
Security zone does not receive events— security zone by default does not receive any
events from source security zone or computer;
Computer receives events;
Computer does not receive events;
Inherited settings— event filtering for this computer is inherited from parent security zone,
computer currently receives events. When new Computer objects are created or moved from
another security zone, they have this setting by default;
Inherited settings— same as above, computer currently receives no events.
3. Within Event target tree, select target object to filter events from the source object. To change their
icons, single-click on them consequently (see previous item for description of icons meaning).
Defaults node defines the default visibility settings for newly created security zones.
4. Define exceptions from this rule on per object basis using Exceptions table. If target security zone or
computer receives events by default, exceptions define events that should be filtered out; if target
does not receive events by default, exceptions define events that should reach the target.

www.isscctv.com
SecurOS 78 Administration Guide
Core Subsystem

Note. Each row of the exception table defines one security zone or computer and one event. The list of events
is specific to the type of the object.

5. To accept the changes, click OK button or click Cancel button to discard all changes.

5.2.3 Department

This object is used to organize persons into groups. Primarily is used jointly with the access control
subsystem to define persons to manage user rights within SecurOS network itself (see Managing User
Rights Within Security Network).

Note. Several Department objects within the same parent object are combined into the User accounts logic
group in the objects tree.

Parent object — Security Zone.

Figure 62. Department object settings window

Table 8. Department object settings

Parameter Description

Id Inf ormation f ield: object identifier. Read-only.

Enter meaningful object name as it appears in objects tree (e. g.


Name
department name).

5.2.4 User Account

This object represents a single person (either a person of access control system or a user within SecurOS
network).

Parent object— Department.

Figure 63. User Account object settings window

www.isscctv.com
SecurOS 79 Administration Guide
Core Subsystem

Table 9. User Account object settings

Parameter Description

Id Inf ormation f ield: object identifier. Read-only.

Name Insert meaningful person name.

Insert any text in free form, for example, person's passport number,
Additional Information position or any other description you need. Not used by the system
itself.

Insert person's phone number. Not used by the system itself. You
Phone can use this field when writing SecurOS scripts to send voice or
SMS notifications.

Insert person's e-mail address. Not used by the system itself. You
E-mail can use this field when writing SecurOS scripts to send email
notifications.

5.2.5 Active Directory Storage


The functionality is available in the SecurOS Enterprise edition only.

The object is used to configure settings of network domain to provide authorization in SecurOS
network. For further information see Configuration of Network Domain User Rights.

Note. Several Active Directory storage objects within the same parent object are combined into a Active
Directory storages logic group in the objects tree.

Parent object— Security Zone.

Figure 64. Active Directory Storage object settings window

www.isscctv.com
SecurOS 80 Administration Guide
Core Subsystem

Table 10. Active Directory storage object settings

Parameter Description

Select type of protocol from the drop-down list box. Possible values:

Provider Windows NT (local or domain)— only for Windows.

LDAP (domain)— for Windows and Linux.

Enable this checkbox to use primary domain controller for


Use primary domain connection.
controller Warning! If the field is checked boxes of the two next parameters are
unavailable.

Server Specify server or local computer name.

Optional: specify server network port for connection. Used on


Port
specific server setting.

Use SSL Reserved for future use.

Credentials

Enable this checkbox to use name and password of Windows user


Use credentials provided at currently logged in.
system log on Warning! If the field is checked boxes of the two next parameters are
unavailable.

Specify user name and password for authentication on server. These


User name, Password and the following fields are not active when the previous field is
activated.

Log on using Secure Reserved for future use.


Password Authentication
(SPA)

5.2.6 User Rights

This object is for defining user rights within the system (see Defining Access Levels to Individual
Objects for detailed description).

Notes:
1. All users in User Rights object settings have equal access level. To attribute another set of rights to
another users group, create different User Rights object.
2. Several User Rights objects within the same parent object are combined into the User Rights logic
group in the objects tree.

If at a configuration there is at least one object of the rights (the User Rights object) with the installed
provider (the Active Directory Storage object, see Active Directory Storage) and the Users and Groups
field is not empty then to work with SecurOS use the current Windows user accounts. Thus password
check is delegated to the operating system, and it is not important to enter a password on SecurOS
loading.

Parent object— Security Zone.

www.isscctv.com
SecurOS 81 Administration Guide
Core Subsystem

Figure 65. User Rights object settings window

Table 11. User Rights object settings

Parameter Description

Objects tree with icons that depict user rights on the object. To
Rights define a user access to any object, press an icon of the object
consequently. See below fig. 66 and then for icons description.

Select this field to disable quick shutdown via control panel (menu 

(Change user/ Shutdown system) Shutdown).


Disable system shutdown Note. To shutdown client/server software, one should select Log Off
for user

command from menu (Change user/ Shutdown system), in


the authorization window provide user name and password which
allow system shutdown. Click Shutdown button to confirm shutdown.

Forbid to hide interface Select this field if user is not allowed to hide user interface objects.

www.isscctv.com
SecurOS 82 Administration Guide
Core Subsystem

Parameter Description

Allow configure system Select the field to assign super-user rights to these users.

Choose SecurOS (local) value to accept rights to access the


selected objects for users from the Users and Groups table (see
Providers below) or choose the Active Directory Storage object name as it
appears in objects tree to accept certain rights to user/users group
of network domain (see Active Directory Storage).

Users and Groups (list of users and groups that have the above rights). On selecting the Active
Directory Storage object from the Providers list, the list should be formed as described
in Configuration of Network Domain User Rights.

Select existing Person object. The name of the person will be used as
username when logging in to SecurOS.
Operator
Note. Only one user (the Person object) can be added to the
corresponding User Rights object.

Password Enter non-empty password for this person.

Figure 66. Types of user rights and


corresponding icons

Each user access level corresponds to an icon from the following list (see figure 66 from left to right):

No access— the user has no access to the object neither in administrative mode nor in operator
mode. The object, though, is still visible as a node in object's tree when in administrative mode.

Warning! If such access level is configured for certain Computer object and a number of users, then these
users cannot login to system on this computer.

View— the user has no administrative access to the object, but the object (if it is a user interface
object like Monitor or Audio Player) can be visible in operator interface. Macros (Macro objects) that
have these level can be executed from within operator interface.
Control— same as View rights, but the user can additionally control the object from within
operator interface (i. e. arm/disarm video cameras).
Configure— same as Control rights, but the user can view and change object's settings from
within administrator interface (user cannot delete existing object and cannot create child objects
under this object).
Full access— same as Configure rights plus ability to delete this object and create child objects.
Inherited rights— rights for this object are inherited from parent object (when new objects
are created, they have this access level by default).

Notes:
1. Several object types (like System, Program, Department) that do not have visual representation within
user interface on operator workstations, cannot have View and Control access level types.
2. If the user creates new User Rights object, he/she cannot define the rights for this object to exceed
the current user rights.

www.isscctv.com
SecurOS 83 Administration Guide
Core Subsystem

5.2.7 Computer

This object represents individual computer within SecurOS network (Video Server, Application server,
Administrator workstation or Operator workstation).

The servers and workstations in the SecurOS network are registered and represented as the Computer
objects in the objects tree. The servers run the SecurOS server application, and the workstations run the
SecurOS client application.

The SecurOS workstations can send and receive the events from the other security network nodes.
Filters can be used to select the events that will be transmitted from one SecurOS network computer to
the other ones and to limit computers control and network load due to events transmission (see Setting
Up Event Redirection).

Warning! Servers, connecting to which for the given computer is forbidden, are marked by green cross in the
object tree on this computer (see figure 67 and Servers to connect parameter in the Computer object settings
below). By this system events transmission is not terminated and is limited only by events transmission
settings.

Figure 67. Object Tree containing Computers with denied


connection

Note. Several Computer objects within the same parent object are combined into the Hardware logic group in
the object tree.

Parent object — Security Zone.

www.isscctv.com
SecurOS 84 Administration Guide
Core Subsystem

Figure 68. Computer object settings window

Table 12. Computer object settings

Parameter Description

Choose functional type corresponding to required computer role in


the network. Possible values:

Operator Workstation — computer will operate as network


Role
client (even in case of other type of SecurOS installation);

Video Server, Administrator Workstation,


Application Server — computer will operate as a server.

Select this option to choose the default Desktop object from the drop-
down list that will be shown on SecurOS startup on this computer.
If the Auto value is set then the first desktop will be displayed (with
minimal ID). If this option is not activated, no desktop will be
Activate desktop on startup displayed at startup.

Note. Within this Manual term Desktop corresponds to out-of-date term


Screen.

www.isscctv.com
SecurOS 85 Administration Guide
Core Subsystem

Parameter Description

If this option is turned on, user is not allowed to shutdown the


system (Shutdown command of the Change user/ Shutdown

Block system shutdown in system menu ( ) on the Control Panel is unavailable).


NT service mode Option is available if SecurOS has been run as Windows' service
(see ISS Startup Configuration Utility).
The functionality is available in the following editions: SecurOS Enterprise,
SecurOS Prof essional.

Network connection (settings to connect to the SecurOS network)

Specify IP address of the current computer within TCP/IP network.


You can choose from the list or use [<] button to determine
computer's IP automatically.
Network address
Warning! If the computers are located in different subnetworks, it's
unavailable to get the IP address automatically. In this case parameter is
mandatory, use the keyboard to enter the value manually.

Auto login (settings for automatic log on to security network)

Select the name of registered user or group to log on automatically


(i. e. without entering Username and Password in the
Authorization window). You will be able to select option and set up
its value only if you are logged on as root. It is impossible to set up
Name the field value to root.

Note. For the detailed information about settings order and rules of the
procedure see Auto login.

Local protocol settings


Warning! If the Computer's Role is Operator Workstation parameters are unavailable.

Select this checkbox to disable saving the local copy of the event log
to database. Since event log is synchronized between computers and
Disable Local Protocol each computer saves its copy in local database by default, you can
turn on event log saving on several machines without risk of loosing
events.

Select this checkbox to enable messages parameters recording in


PROTOCOL_PARAMS database.
Write secondary event Warning! The option is used in connection with the ISS intellectual
parameters into protocol DB modules only (see www.isscctv.com). In other cases using this option can
reduce system performance, therefore it is recommended to clear the
checkbox.

www.isscctv.com
SecurOS 86 Administration Guide
Core Subsystem

Parameter Description

Name of the filter, which will be used when saving events into the
database. List of values consists of names of all Event filter objects
children to the current Security Zone. Optional parameter. If not set
Use event filter all system events will be saved into the database, otherwise only the
events allowed by given filter.
Warning! Filtering can reduce system performance.

Maximum protocol Max database size before data will be updated in a ring mode.
database size, MB

Disks to store archive (table of available local hard disks (HDD) with permissions to store video
and audio data on)
Warning! If the Computer's Role is Operator Workstation parameters are unavailable.

Drive name to store archives (letter). If local computer is being


configured the list consists only of available drive letters. Select
Drive required letter. If remote computer is being configured the list
consists of all letters from A to Z. In this case select required letter.
Select the required disk letter.

Free GB Inf ormation f ield: current free space on selected disk in GB.

Choose settings for video archiving. Possible values:

empty> — access denied.


Video Read Only — video archive can be read from this disk, but
writing to this disk is disabled.

Read/Write — reading from and writing to this disk is allowed.

Choose settings for audio archiving. Possible values:

Audio empty> — access denied.

Read/Write — reading from and writing to this disk is allowed.

Duration of storage for bookmarks and alarms in DB, days.


Bookmark storage period starts from the beginning of the
bookmark's validity; alarm storage period— from the time when
Store bookmarks and alarm starts. Checking of expiration is performed every hour or
alarms NNN days when SecurOS starts. [0; 3660]. Default value — not set. If
value is not set bookmarks and alarms will be deleted along with
the operative archive will.
Warning! Field is available only if Computer's Role is Video Server.

Servers to connect see Servers to connect section.

5.2.7.1 Servers to connect


The parameter contains the list of servers that are available to connect to in the SecurOS network and is
designed to ensure the synchronization of network configurations, that is stored on the server to which
this computer will connect to, when connecting and data exchange while running system.

www.isscctv.com
SecurOS 87 Administration Guide
Core Subsystem

5.2.7.1.1 Operations with the Servers to connect List


The following operations are available with the list:

1. Add server to list — to add server to the list use  key. Select the required server from list of the
Computer objects.
2. Delete server f rom list— to delete server from the list select the string, than press the Ctrl + Delete key
sequence.
3. Add all available network servers — to add all network Computers to the list click Select All button.
4. Delete all servers f rom list — to clear the list click Clear All button.
5. Change the server position in the list — to move selected server up in the list click Move Up button. To
move selected server down in the list click Move Down button.

Note. The sequence of connections is defined by the position in the list, starting from the top.

5.2.7.1.2 Servers to connect List Operations Rules


When setting up Servers to connect parameter value the following rules are valid:

1. The list can be populated only with Computers, that are in the SecurOS Object Tree.
2. If the role of computer is Operator Workstation it cannot be added to the list.
3. Each Computer can be added to the list only once.
4. Computer that is currently being configured cannot be added to the list.
5. When server is added to the list, Computer that is currently being configured automatically is added
to the similar list of this server.

Note. If the Servers to connect list of the added server is empty, configured computer will not be added to
it's list.

6. When deleting server from the list, Computer that is currently being configured will not be
automatically deleted from the list on that server.
7. When role of the computer that is currently being configured, is changed to the Operator Workstation,
the entry of this computer will be automatically deleted from the lists of all network Computers.

When this association removed (i.e. both computers won't be added each other in the lists), the
corresponding object will be marked by icon of green cross (see figure 69), irrespective of computers
connection state.

www.isscctv.com
SecurOS 88 Administration Guide
Core Subsystem

Figure 69. Object Tree containing computers with denied


connection

When connecting the following rules are valid:

1. The Computer can connect only to servers, that are in it's servers to connect list.
2. If the list is empty, connection to all servers of the network which contain this Computer in the list of
servers or at which this list also is empty is authorized to the given Computer.

5.2.7.2 Auto login


Feature of auto login of user in the SecurOS depends on used user authentication method.

In the case of authentication process that uses SecurOS DB the Name parameter can be set to:

Name of any user, registered in the current Security Zone object within SecurOS network (Object
tree User accounts Department User account), excluding root superuser.

Notes:
1. System will display appropriate information message if entered user name is not registered in the
SecurOS DB.
2. System will display appropriate information message if entered user name is registered in the
SecurOS DB, but User rights are not defined for that user.

"Not set" (default value).

Warning! Auto login is impossible if default value is used.

In the case of authentication process that uses Windows Network' Active Directory domain the Name
parameter can be set to:

Warning! Active Directory domain of the Windows network can be used for the authentication only if there
is Active Directory Storage object registered in the SecurOS and it is selected as a provider for the User rights
object (see Active Directory Storage).

Name of any Active Directory Group. For the given value auto login may be performed for any
member of selected Group.
Name of any Active Directory User. For the given value auto login may be performed for specified
user only.

www.isscctv.com
SecurOS 89 Administration Guide
Core Subsystem

"Not set" (default value). For the given value auto login may be performed for any Active Directory
User or member of any Active Directory Group, granted with the access rights defined in the User
rights object.

5.2.8 Monitoring center agent

Monitoring center agent is used to provide a connection between given and others SecurOS security
systems (i.e. Monitoring Centers, see Video Surveillance Using Remote SecurOS Security System).

Parent object — Computer — any of the SecurOS network Servers.

Figure 70. Monitoring center agent object settings window.

Table 13. Monitoring center agent object settings

Parameter Description

Connection settings

Communication port for interaction between two SecurOS security


Port
systems. Default value is 28345.

Allow connections from the Check this box to allow only Computers with listed IP addresses to
following IP addresses only connect to security system. Optional parameter.

List of the IP addresses of computers, that are allowed to connect to


the given SecurOS security system.
List of allowable IP
addresses Note. To add IP address to the list of available addresses enter its value
into the text box above the list, then click Add button.

www.isscctv.com
SecurOS 90 Administration Guide
Core Subsystem

5.2.9 Remote system

The object is used to provide a connection between given (Monitoring Center) and remote SecurOS
security system.

Parent object — Computer — any Computer of the SecurOS network which role is Video Server.

Figure 71. Remote system object settings


window

Table 14. Remote system object settings

Parameter Description

Integration settings

Is used to select Computer within SecurOSsecurity system to connect


Host
to. Specify the IP address. Mandatory parameter.

Communication port for interaction between two SecurOS security


Port
systems. Mandatory parameter. Default value is 28345.

Setting up Monitoring Center To Work with Remote Archives

To configure Monitoring Center to work with remote archives do the following:


1. Create and configure Monitoring center agent object on any of remote system's server and Remote
system object on any of the Monitoring Center's server;
2. Click Update configuration in the Remote system object settings window.

When receiving or updating configuration the system will create the following objects:
1. Proxy-computers - "copies" of all of the Computer objects existing within the remote security system.
All created proxy-computers are children of the Remote system object and have names of the
following format: <Remote system Name>:<Computer Name>.
2. Video Capture Devices with ISS Video Concentrator device type related to remote Video Servers. IP
address parameter of the Video Capture Device will possess the IP address of the appropriate remote
server. All created objects are children of the Monitoring Center's Video Server and have names of the
following format: <Remote system Name>:<Remote Computer Name>.

www.isscctv.com
SecurOS 91 Administration Guide
Core Subsystem

3. Cameras, related to Cameras, existing on the remote server.

Notes:
1. Channel number for each of the created camera will possess the ID value of appropriate Camera
existing within the remote security system.
2. No Motion Detection Zones are created for the Cameras, related to the cameras of the remote
configuration.

Setting up Monitoring Center To Work with Local Archives

To configure Monitoring Center to work with local archives change the type of the created Video
Capture Devices (see p. 2). To do this open object settings window of all of the created Video Capture
Devices, select the Video Repeater value in the Type box, apply new settings.

After Video Capture Device type is changed it allows the operator to work with Cameras of the remote
servers in the same way as if they were set within local SecurOS network.

Created objects make it possible for operator to monitor the events generated by Camera and Computer
objects of the remote security system with the help of Map v2, Monitor and Event Viewer objects of the
Monitoring Center.

5.2.10 Area Zone

The object is used for SecurOS objects logical grouping based on territory location.

Parent object— Security Zone.

Object has no settings to alter.

Note. Several Area Zone objects within the same parent object are combined into the Area Zones logic group
in the objects tree.

5.2.11 Region

Represents a separated area of the territory defined by the parent Area Zone object. Applicable when
configuring access control subsystems.

Parent object — Area Zone.

Figure 72. Region object settings window

www.isscctv.com
SecurOS 92 Administration Guide
Core Subsystem

Table 15. Region object settings

Parameter Description

Insert any text in free form, for example, specify the area location.
Comments
Not used by a system itself.

Persons

Define a list of the Person object names allowed to configure the


Name
access to this area.

5.2.12 Event Filter

The object is designed to set the rules used to filter events that must be either displayed in the Event
Viewer window or saved into the database.

Parent object — Security Zone.

Figure 73. Event Filter object settings window

Table 16. Event Filter object settings

Parameter Description

Rules list

Type Type of the system event source object.

Id ID of the system event source object.

Inf ormation f ield: name of the selected source object (Id and Name
Name parameters are complementary — if the one is selected then the other is
filled automatically).

www.isscctv.com
SecurOS 93 Administration Guide
Core Subsystem

Parameter Description

Event to process. List of values depends on the object type. If not set rule
affects all object' events.

Notes: The one of the following predefined event group can be selected
besides individual or all events:
1. Alarm only.
Event 2. Information only.
3. Alarm and information.

To create a filter rule for the individual object' event select it from the list of
possible object events.
To create a filter rule for the all object' events select the blank string.
To create a filter rule for one of predefined event group select that group (in
the top of the list).
Rule result. Possible values:

Forbid — event will be discarded (not displayed in the Event Viewer


Mode window or saved into the database).

Allow — event will be allowed (displayed in the Event Viewer window


or saved into the database).

Buttons

Add rule Click to add a new rule to the list.

Remove rule Click to remove selected rule from the list.

Remove all Click to remove all rules from the list.

Click to display Events to test block that allows to check the rule. Rule
Test filter
checking procedure is described below.

Button is used to sort rules manually. Click to move the rule one position
Up
up.

Button is used to sort rules manually. Click to move the rule one position
Down
down.

OK Click to save the changes and leave administration mode.

Cancel Click to discard the changes and leave administration mode.

To check the rule (i.e. to make sure what kind of action for the event this rule result in) do the
following:
1. Click Test filter in the Event Filter object settings window (see fig. 72).
2. System will display Events to test block (see fig. 74).

www.isscctv.com
SecurOS 94 Administration Guide
Core Subsystem

Figure 74. Events to test block

3. In Events to test block click Add event button. Set the event need to be tested.

Note. Rule parameters of the Events to test block are the same as described above in Rule list.

4. Click Run test button. System will execute test and display result in the Rule field:
No filter rules — list of rules contains no rules for the defined event.
Event is allowed by rule N — list of rules contains rule N that allows defined event.
Event is forbidden by rule N — list of rules contains rule N that forbids defined event.

Note. "N" stands for the sequence number of the rule in the rule list.

5. To drop down Events to test list click Remove event or Remove all button. To hide Events to test
block click Hide test filter button.
6. To save/discard changes and leave administration mode click OK/Cancel button.

Filtering algorithm is as follows:

Rules are applied consequently in order of appearance in the Rules list.


Only the first corresponded rule is implemented for the event.
If there is no one explicit rule that allows event then event will be discarded.

www.isscctv.com
SecurOS 95 Administration Guide
Core Subsystem

5.2.13 SNMP agent

Object is designed both to send events generated by system's cameras and to transmit cameras' states to
the specified computers as SNMP traps. Traps for the following events are transmitted automatically as
soon as they arise in the system:
Camera: changed state;
Camera: focused;
Camera: defocused;
Camera: unblinding;
Camera: blinding;
Camera: attached;
Camera: detached.
When changing camera' states the current states are transmitted. Received traps are processed with the
help of SNMP Manager.

Object can be used only if Management and Monitoring Tools components is installed on the
computer (see Setting up Windows Managing and Monitoring Tools section).

Parent object — Computer.

Object has no settings to alter.

Note. It is allowed the only one SNMP agent object in the object tree of the local computer. If object is already
created then Create SNMP agent command is unavailable.

5.2.13.1 Setting up Windows Management and Monitoring Tools


To set up SNMP traps sending procedure do the following:
1. Install the Simple Network Management Protocol service:
for the Windows XP SP3, Windows Server 2003 SP2:
run Add or Remove Programs tool (Start Control Panel Add or Remove Programs);
click the Add/Remove Window components tab and install the Management and Monitoring
Tools component;
restart Windows.
for the Windows 7, Windows Server 2008 R2:
run Programs and features tool (Control Panel Programs and features);
click the Turn Windows features on or off tab and select Simple Network Management
Protocol (SNMP) component including children;
restart Windows.
2. Run Services tool (Control Panel Administrative Tools Services) and open the SNMP service
(SNMP Service) Properties.
3. Click the General tab and select Startup type: Automatic.
4. Click the Traps tab (see figure 75) and specify Community name and Trap destinations parameters.

www.isscctv.com
SecurOS 96 Administration Guide
Core Subsystem

Figure 75. Traps tab of the SNMP Service settings window

5. Create the SNMP agent object in the SecurOS object tree.

After operations described above are performed SecurOS will automatically send traps to the specified
IP addresses in real-time mode.

5.3 Configuration Examples


This section describes specifics of the core subsystem objects and involves examples of their
configuration.

5.3.1 Defining Access Levels to Individual Objects

SecurOS supports managing administrator and operator rights for individual persons and individual
objects. This is done via configuration of Person objects (which define real user accounts) and User rights
object— sets of access levels of users group for each object within SecurOS security network.

Also, the access level rights can be configured for the users of already created network domain, which
includes computers of a certain security zone (see Configuration of Network Domain User Rights). In
this case, local security zone user accounts will be disabled.

Warning! If security system has more than one security zone, you must define user rights for each security
zone, otherwise you will be able to automatically login to the system with system-wide superuser rights from
any computer that belongs to unrestricted security zone!

www.isscctv.com
SecurOS 97 Administration Guide
Core Subsystem

After you have defined user rights within security network, SecurOS will require to enter user name
and password on software startup. Since every computer belongs to some security zone, you can login
under users that belong to the same security zone as the computer in question. Other username/
password combinations will not work, even if they are valid within other security zones.

To implement the security scheme with user access restrictioins:

1. Plan, how many different access rights your security zone should have, and what users will use each
of these rights.
2. Create a Department object (see Department) under Security Zone object.
3. Create a necessary number of Person objects (see User Account) within this Department object by the
required number of SecurOS system users (administrators/operators).
4. Create User Rights objects within Security Zone object. Its settings window (see User rights section)
contains the tree at the top that is identical to the objects tree of the security network. Edit access
rights of one or more users to each particular object by clicking its icon consequently (see User
Rights).
5. Repeat steps 2—4 for each security zone within your network. For each security zone the objects tree
would contain elements shown in figure 76.

Figure 76. Objects tree with Department,Person and User


Rights objects

5.3.2 Configuration of Network Domain User Rights

In this section the procedure of Active Directory storage (see Active Directory storage) and User rights
objects parameters configuration is described for the domain provider (Windows NT or LDAP) that
receives SecurOS user authorization request.

5.3.2.1 Settings for Windows NT Provider

To set domain parameters for Windows NT provider:


1. In Active Directory storage object settings window choose Windows NT (local or domain) value
from Provider drop-down list box.
2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server. You do not
need to fill Port field (port for Windows NT provider).
3. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be defined for domain controller, see item 2).
4. If User name and Password fields are filled, select Log on using Secure Password Authentication
(SPA) check box.

www.isscctv.com
SecurOS 98 Administration Guide
Core Subsystem

To set user rights for a user, fill Users and Groups field in User rights object settings window (see User
rights section) with a series of network domain user login names separated by commas (e. g. j-smith).

To set user rights for a user group, fill Users and Groups field in User rights object settings window
with a network domain users group login and ,group postfix without space (e. g. Users,group). The
,group postfix is obligatory.

5.3.2.2 Settings for LDAP Provider

To set domain parameters for LDAP provider:


1. In Active Directory storage object settings window (see Active Directory storage section) choose LDAP
(domain) value from Provider drop-down list box.
2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server.
3. Optional: fill Port field with 389 value (number of LDAP server port).
4. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be defined for domain controller, see item 2).
5. If User name and Password fields are filled, select Log on using Secure Password Authentication
(SPA) check box.
To set user rights for a user, fill Users and Groups field in User rights object settings window with a
series of the following strings: &(objectClass=user)(sAMAccountName=j-smith).

To set user rights for a user group, fill Users and Groups field in User rights object settings window
with the following string: &(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-
dev,dc=test), where Builtin is a system folder where Users users group is placed.

www.isscctv.com
SecurOS 99 Administration Guide
Interface Subsystem

6 Interface Subsystem
Interface subsystem, containing objects responsible for visual representation of the system objects and
actually used by operators working with the system.

6.1 Maps Working Principles


In order to keep control on entire territory or building in the SecurOS system it is recommended to use
map—multi-layer graphical plans of entire territory under control, floors or single rooms (the level of
details depends on your needs).

Once registered within security network, the maps can be used by administrator to place the icons of
security equipment elements, such as cameras, alarm sensors, door detectors on them, representing
object's physical location within the controlled territory (see Map Creation below).

The operator can use maps to monitor entire territory, and also use the icons allocated on a map for fast
control the corresponding object. If an intrusion alarm has been detected, operator can immediately see
the physical location of the target area, switch to the video cameras that are located close to this area by
double-clicking on icons on map, switch lights on within that area, etc.

6.1.1 Map Creation

To deploy a map:
1. Draw a set of images that will be used as map layers (see Drawing Map Layers).
2. In objects tree locate the Computer object that represents your current administration workstation or
application server from which you are currently administering SecurOS security network, see if there
is any child Desktop object under it and create it if necessary leaving default object parameters.
3. Create child Map or Map v2 object for the selected Desktop. Once the object's settings window appears
(see object description in Map or Map v2 section), provide its position and dimensions. For Map v2
object it is necessary to choose previously created map file (see Map v2 about map file creation).
4. Click Setup button to apply changes and close object's settings window. The map window will
appear on screen with map file loaded.
5. In case of Map object— place security network objects like Camera, Sensor, Microphone on map from
within that administration workstation or application server (see Placing, Moving and Rotating
Objects on Map).
6. Move Map (or Map v2) object onto operator workstation for real-time interaction (see Moving Map
Objects onto Operator Workstations for detailed description of moving map objects).

Note. Map v2 object is an updated analog of Map object. The main difference from the old object consists in
object' configuration process (moving objects on map), user interface (map scaling, working with filters etc.),
see Map v2.

www.isscctv.com
SecurOS 100 Administration Guide
Interface Subsystem

6.1.2 Drawing Map Layers

Use of map layers is comfortable for large territory separation on several independent parts. Map layers
are raster graphical images in BMP format. To draw horizontal plans of your object from scratch, one
can use any graphical drawing software that allows to save raster images in these formats. You can also
export raster graphics directly from CAD software where you or the owner of the building develops
source documentation on the building or territory, or you can scan paper with previously printed plans
of your territory.

Note. Images in PNG, GIF or JPEG formats can be also used for Map v2 objects.

The resulting image or images can have any colors and style, but you should consider the following:

1. All plans of your territory should be done in the same graphical style for better visual perception.
2. Keep the image dimensions in pixels comparable to dimensions of the target maps on the screen of
the operator workstation to avoid redundant scrolling.
3. Colors should not distract operator from objects placed on map. Do not use gaudy colors, avoid
using red and orange colors. The more neutral the background is, the better.
4. Provide all territories with descriptive captions. Text should be clearly visible and readable.
5. Give images meaningful names (i. e. map_floor1.bmp, map_floor2.bmp, map_room123.bmp).

Note. On Map object creation, default image will be loaded that is named map.bmp and placed in \Bmp
subfolder of SecurOS program folder. For convenience, it is recommended to place all your bitmap files used
as map images for Map object into the same subdirectory.

Figure 77 shows the sample sketch of one floor of a building, which can be used in a map.

www.isscctv.com
SecurOS 101 Administration Guide
Interface Subsystem

Figure 77. Sample of an image that can be used as a map

6.1.3 Moving Map Objects onto Operator Workstations

Once the Map or Map v2 object has been fully configured, you can transfer it to the target operator
workstation, if necessary.

To move map to another computer within security network:


1. In case of Map object— manually copy all .bmp files, referenced by this map, from your computer to
target computer's \Bmp subdirectory under SecurOS program directory.
2. In case of Map v2 object— Manually copy the *.map resource file of this map from your computer to
target computer's \Maps subdirectory under SecurOS program directory.
3. Setup or edit a map (place objects on map, move them, rotate, etc.).
4. Ensure that the Computer object representing the target computer exists in your SecurOS
configuration, and that it contains at least one Desktop object. Create these objects if necessary.
5. Create the Map or Map v2 object within the Desktop object of the target computer. In case of Map v2
object— specify map resource file transferred from server in the object settings.
6. In case of Map object— make these actions on the target client computer (operator workstation) to
configure server database connection:

www.isscctv.com
SecurOS 102 Administration Guide
Interface Subsystem

Run pgAdmin system utility (Start Programs PostgreSQL 9.1 pgAdmin III).
Choose Tools Server configuration pg_hba.conf in the utility menu. The Access
Configuration Editor window will appear.
Double-click on empty string. The Client Access Configuration will appear.
Fill up the window fields:
Enable— enable this option;
Type— choose host from the list;
Database— choose all from the list;
User— choose all;
IP Address— specify network address and subnet mask (e. g., 192.168.0.0/16, that allows access
from IP addresses within the range 192.168.0.1 — 192.168.255.254);
Method— choose trust or md5;
Click OK and choose File Reload server in the window menu to accept changes.
Define a connection string to main SecurOS database using DSAdmin utility (see DSAdmin
Utility).

6.2 Object Reference


Interface subsystem involves the following objects:
Desktop.
Map.
Map v2.
Event Viewer.
External Window.
HTML Form.
HTML Dialog.

6.2.1 Desktop

This is a base user interface object that acts as a container to other UI objects. It is used for placement of
several components of user interface.

Parent object— Computer.

Warning! All user interface visual components are displayed only by means of SecurOS desktops.

Example. Let two rooms are on a secured area. There are PTZ camera and microphone in the first room and
two cameras in the second room. System administrator may configure two Desktop objects. On the first screen
there could be a PTZ control dialog window, video displaying monitor and audio player to work with
microphone. On the second screen there could be a second monitor to watch for cameras from the second
room, and a map of the whole territory to provide visual access to all the security devices and to control their
states.

www.isscctv.com
SecurOS 103 Administration Guide
Interface Subsystem

Notes:
1. Several Desktop objects within the same parent object are combined into the Desktops logic group in
the objects tree.
2. If the object name is Playback, then all its Monitor child objects will be displayed in a drop-down
list (see SecurOS User Guide for more information).

Object has no settings to alter.

6.2.2 Map

Object represents a multi-layered graphical map of the territory under control (see below).

Parent object — Desktop.

Figure 78. Map object settings


window

Table 17. Map object settings

Parameter Description

Specify object window top left corner coordinates (X, Y) as well as


X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Select this check box if you want the map to switch automatically to
Auto switching
layers that contain icons of the devices in "alarm'' state.

6.2.2.1 Working with Map Layers

For the user's convenience and ability to control large territories, maps can contain several image layers
(e. g. floors of the building).

Example. For the large territory each controlled area can be represented by simple object called level. These
layers can be linked together with special icons called links, which can be imagined as hyperlinks between
several pages on web site.

To add a new image as a map layer:


1. In the map context menu click Add map item.
2. Choose *.bmp file for a new layer from standard Open file dialog box.
3. Provide the descriptive title of a new layer.
4. Click OK button to create layer or press Esc key to close dialog without adding a layer.

These layers can be linked together with special icons called link, see figure 79 (which can be imagined
as hyperlinks between several pages on web site).

www.isscctv.com
SecurOS 104 Administration Guide
Interface Subsystem

Figure 79. Map object link icon

To link two layers together:


1. Right-click icon free map area and select Add link context menu command.
2. Choose the target layer you want to link to and caption of the link (at least two map layers already
registered are necessary prior to using this feature).
3. Click OK button to create the link or Cancel button to quit dialog without adding a link.

Once created, a link icon will appear on the map (see figure 79). Link icon can be moved across the map
by pushing left mouse button on icon, dragging your mouse pointer to the new location and then
releasing the left button.

Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation, we
recommend to create another link on the target layer that points back to the source one. Thus, it will be
possible to switch between layers in both directions smoothly.

To remove layer from the map, use Remove map context menu option.

Warning! This operation deletes map's current layer without any confirmation and cannot be undone.
Original *.bmp image file will not be deleted.

To navigate forward/backward through the list of available layers, use Next Map and Previous Map
context menu options.

Note. This way of navigation is available in administrative mode only. You should link all layers together
using Add link feature before using map in operator mode.

To change title of the currently visible layer, use Set Title context menu option.
6.2.2.2 Placing, Moving and Rotating Objects on Map
To place an object on map, select the object from the object tree and click On Map button on
administration toolbar. From the list that appears select the map to which the object should be placed,
and the icon representing the object is displayed on the map.

www.isscctv.com
SecurOS 105 Administration Guide
Interface Subsystem

Figure 80. Map with Camera object icon on it

To move icon around, select it first by clicking on it (a currently selected icon is marked with four green
dots called handlers around it). Then drag the icon using mouse (push left mouse button on icon, drag
your mouse pointer to the new location and then release the left button).

Figure 81.
Moving icon

To rotate icon, drag any of the icon handlers to turn the icon around its center. To reflect real object's
orientation in space, icon can be rotated (useful for video cameras).

Figure 82.
Rotating
icon

6.2.2.3 Performing Additional Operations on Objects


To open an icon's context menu, right click on it.

Figure 83. Map icon's


context menu

Context menu contains following options (see figure 83):

Create copy— duplicates object icon on map. This is useful, for example, for alarm loops, where
single Sensor object actually represents a garland of alarm sensors attached, for example, to every
window; you can create several icons of the single object in accordance with the real number of
alarm sensors and place each icon on every window depicted on the map.
Delete— removes icon from the map without any confirmations.

www.isscctv.com
SecurOS 106 Administration Guide
Interface Subsystem

Hide— marks object as hidden. It will be still visible while in administrative mode, but will
disappear from the map in operator mode.
Show title— shows or hides icon's caption on map.

6.2.3 Map v2

Object represents a graphical editable map of the territory under control and installed SecurOS network
objects (see below).

Parent object— Desktop.

Figure 84. Map v2 object settings window

www.isscctv.com
SecurOS 107 Administration Guide
Interface Subsystem

Table 18. Map v2 object settings

Parameter Description

Specify object window top left corner coordinates (X, Y) as well as


X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Display Choose ID of physical display this monitor belong to.

Specify resource file with the map images and objects. Click the <+>
Resource file button to get/update the drop-down list of files and select the
required one.

Displaying the Levels tab in the Map v2 window. The tab contains
the levels list of the Map v2, that allows quick switching between
Show level list levels.

By default is checked.

Displaying the Alarms tab in the Map v2 window. The tab contains
the alarmed levels list of the Map v2, that allows quick switching
between alarmed levels.
Show alarmed levels Note. The level is considered alarmed if at least one of the object placed
on this level is alarmed.

By default is checked. Unavailable if Show level list is not checked.

OK (Cancel) Save/discard changes.

To configure map resource file for Map v2 object use Map2 Editor application.

To create map file using Map2 Editor application:


1. Launch map2.exe file (placed in SecurOS installation folder). The Map2 Editor application window
will appear.

Figure 85. Map2 Editor toolbar

2. Click Create button and add at least one layer to a new map (see Working with Map Layers).
3. Set a password on map file, if necessary (see Setting Passwords).
4. Click Save button to save changes to a new map file. The standard Save As dialog will appear to
define map file name and folder where to save.

To edit map file using Map2 Editor application:


1. Click Open button in Map2 Editor application window (see figure 85) and choose the required map

www.isscctv.com
SecurOS 108 Administration Guide
Interface Subsystem

file from the SecurOS\maps folder. If a password was previously set for the selected map file
(see Setting Passwords), a request window will appear, see figure 86.

Figure 86. Password request window

2. Type in password in Password field and click OK button. The chosen map will be displayed in the
Map2 Editor application window.
3. Click Save button after map editing or choose File Save as to save map file with new name. If map
has not been modified, then Map hasn't been modif ied. Do you want to save it anyway?" message box
will appear. Click Yes to save map file in any case.

Note. Saving map file (if nothing is changed) can be used to change time of file modification (e. g. to refresh
file' creation date) or to rerun map (e. g. to refresh map on screen or to include new map background).

Figure 87. Map2 Editor window

The application window consists of the 4 areas:

www.isscctv.com
SecurOS 109 Administration Guide
Interface Subsystem

Types— to choose/place objects;


Map image;
Levels— to create/choose/work with map levels;
Filters— to create/choose/work with filters.

Note. By means of Map2 Editor application it is possible to place/move/remove objects from map, add/
remove maps layers (levels). However, to operate with objects (such as, to alarm camera), use SecurOS map
interface in operator mode (see SecurOS User Guide).

6.2.3.1 Working with Map Layers

To add a new image as a map layer:


1. Double-click add new item in Levels area of Map2 Editor application window. Levels settings
window will appear.

Figure 88. Levels settings window

2. Type in new layer name in Label field.


3. Set map image file in Image field (JPEG, BMP, PNG, GIF file formats are supported).
4. Click OK button.

To rename current layer, right-click its name in Levels area and choose Properties item from the drop-
down list (see figure 88). Type a new layer name in Label field of the displayed window.

To set link between layers:


1. Choose the required link from the Level Shortcuts item in Types area (see the note below).

www.isscctv.com
SecurOS 110 Administration Guide
Interface Subsystem

Note. There are two link types for Map v2 object: common and blinking named with blink in link list. The
second one works as common link but starts blinking on the corresponding layer alarm. For example, if one
layer is active on user map interface and there is an alarm on the other one then the link map icon will start to
blink.

2. Move the selected link to the map area by dragging left mouse button. Once moved, a link icon will
appear on the map (see figure 89).

Figure 89. Link map icon

Note. Link icon can be moved across the map by pushing left mouse button on icon, dragging your mouse
pointer to the new location and then releasing the left button.

To remove a layer from the map, right-click its name in Levels area and from the drop-down list
choose Erase context menu item.

To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see Map v2). The standard Save As dialog will appear to define map file name and
folder where to save.
6.2.3.2 Placing Objects on Map
To place an object on map do the following:
1. select it in Map2 Editor object tree (Types area) and drag it to the map area.

Figure 90. Selected


icon

2. Release mouse button.


3. Insert object ID into the appeared query window.

Warning! Identifier must be completely identical (including letters case) to this object' ID value in SecurOS
system, otherwise the object would be invisible for an operator.

To replace an object icon, click it and dragging left mouse button move it to the required place.

To rotate an object icon:


1. Click it.

www.isscctv.com
SecurOS 111 Administration Guide
Interface Subsystem

2. Move mouse pointer to the double-side arrow (on the right icon side).
3. Dragging left mouse button rotate the icon.

To remove an object icon from map, click it and from the drop-down list choose Erase item.

To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see Map v2).
6.2.3.3 Setting Filters
One can use filters to browse only required objects on map (e. g., filter can be configured to display only
cameras).

To create filter:
1. Double click add new item in Filters area of Map2 Editor application window. Filters settings
window will appear (see figure 91).

Figure 91. Filter settings window

2. Type in a new filter name in Name field.


3. Choose objects to be displayed on the map from the Show types objects tree (see the note below).
4. Click OK button.

New filter name will be displayed in Filters area.

Note. It is possible to choose one of the following cameras filter:


Show all cameras (the Cameras item is activated in Show types objects tree);
Show only PTZ cameras (the ptz item is activated in Show types objects tree);
Show only cameras of a remote video capture device (the ip item is activated in Show types objects
tree).

Working with filters parameters (delete or edit them) is similar with the layer ones (see Working with
Map Layers).

www.isscctv.com
SecurOS 112 Administration Guide
Interface Subsystem

6.2.3.4 Setting Passwords

To protect the map from someone editing it is possible to set a password on the map file.

To set a password:
1. Click File button on the Map2 Editor toolbar.
2. Choose Set password item. New window will appear (see figure 92).

Figure 92. Setting password

3. Type in password and click OK button.

Now to open this map file a password request window will appear (see Map v2 section).

6.2.4 Event Viewer

Object represents a visual log of the events that occur within entire system (see the object' user interface
description in SecurOS User Guide).

Parent object — Desktop.

Figure 93. Event Viewer object settings window

www.isscctv.com
SecurOS 113 Administration Guide
Interface Subsystem

Table 19. Event Viewer object settings

Parameter Description

Specify object window top left corner coordinates (X, Y), as well as
X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Display Choose ID of physical display this monitor belong to.

Event filter that sets events displayed in the Event Viewer interface
window (see SecurOS User Guide). Optional parameter. If not set
Use event filter
all system events will be displayed. If specified, only events allowed
by selected filter will be displayed.

Operator reaction on alarm event

Enable Check this option to enable operator reaction on alarm event.

Time of acknowledgement Define the time for alarm event acknowledgement by the operator,
of alarm event by the in seconds.
operator

6.2.5 External Window

Object is used to automatically launch external application and position its window on screen.

Parent object — Desktop.

Figure 94. External Window


object settings window

Table 20. External Window object settings

Parameter Description

Specify object window top left corner coordinates (X, Y), as well as
width and height (W, H), in percentage of display' horizontal and
X, Y, W, H
vertical size. WIndow size can be set not for all applications when
they are called by external program.

Specify path to executable file. You can omit absolute path to the file
Program if it is located in the directory specified in the Path environment
variable.

www.isscctv.com
SecurOS 114 Administration Guide
Interface Subsystem

6.2.6 HTML Form

Use this object to define HTML forms permanently displayed on the screen of parent desktop object.

Object is intended for integration of any custom user interface created by means of HTML forms.
SecurOS includes a number of HTML forms ready to use most often to display PTZ control panel on a
desktop (see SecurOS User Guide). Object is displayed while screen is active or until SecurOS system
shut down.

Otherwise, a new HTML form can be also programmed for specific means (see SecurOS Programming
Guide).

Note. All system HTML forms are in \dialogscript subfolder of SecurOS folder.

Parent object — Desktop.

Figure 95. HTML Form object settings window

Table 21. HTML Form object settings

Parameter Description

Specify object window top left corner coordinates (X, Y), as well as
X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Enable this option to select a target HTML form file from the
dropdown list of files located in \dialogscript subdirectory of
SecurOS program folder (if this option is not active, you can select
HTML file from any folder by using [...] button that invokes
Use standard script file standard Open dialog.).

Note. To display PTZ camera control dialog, select file with name
corresponding to PTZ protocol of the camera.

6.2.7 HTML Dialog

The object is used to call popup HTML windows, that are displayed on the Monitor dynamically as a
response to the external event or system behaviour. For example, HTML Dialog can be activated with
the SecurOS script when processing events. Objects of this type can be closed manually or
automatically by system (and also by scripts).

Parent object — Computer.

www.isscctv.com
SecurOS 115 Administration Guide
Interface Subsystem

Figure 96. HTML Dialog object settings window

Table 22. HTML Dialog object settings

Parameter Description

Specify coordinates of the window left top corner on screen in


X, Y
percent, relative to desktop left top corner.

Enable this option to attach dialog position to the center of the


Center on screen
desktop.

Enable this option to select a target HTML dialog file from the
dropdown list of files located in \dialogscript subdirectory of
SecurOS SecurOS program folder (if you uncheck this option, you
can select HTML file from any folder by using [...] button that
Use default directory invokes standard Open File dialog).

Note. [...] button is displayed only wneh object is configured on the local
computer. For the remote computer, including remote Operator
Workstation, the button is not displayed.

Events Deprecated, do not use.

6.3 Setting Map v2


The Map v2 represents the application, allowing to allocate on the plan of protected territory icons of
security network elements according to their physical layout. The operator can use maps for monitoring
of all territory, and also use the icons allocated on a map for fast control of the corresponding object.

To create and register maps in the security network do the following:


1. Create the plan of protected object (or object zones) using any graphics editor.
2. Using the map2.exe application place security network elements icons on the plan.
3. In the SecurOS Object Tree create a Map v2 object.
4. Configure the Map v2 created object, having compared it the created protected territory plan with the
elements icon placed on it and set other parameters.

www.isscctv.com
SecurOS 116 Administration Guide
Video Subsystem

7 Video Subsystem
Video subsystem is used to operate and configure the video devices (video capture cards, analog and IP
cameras, PTZ devices) within the SecurOS network, transmit video streams between servers,
concentrators and workstations and work with live and archive video from within workstations.

7.1 Video Stream Decimation


For any value of FPS, specified in one of the Monitor, Camera or Zone (Zone settings tab) object, will
cause decimation of the original video stream by i-frames. Decimation is two-stage procedure:
On the first stage video frame rate is down to I-frame frequency, which is calculated as own video
stream frequency divided by value of GOP length(GOV length, Intra-Period or Intra-Refresh
Period) parameter, specified in the IP camera settings. For example, if original video stream
frequency is 30 fps and GOP length parameter value is set to 10, then decimated video stream
frequency makes 3 fps.
On the second stage frequency, obtained on the first stage, is compared with FPS value, specified in
the Monitor, Camera or Zone object settings:
If FPS value is greater than frequency, obtained by initial decimation, then no further decimation
performed;
If parameter value is less than frequency, obtained by initial decimation, then further decimation
of I-frames is performed (frequency is reduced to parameter value). For example, if I-frames
frequency is 16 fps and FPS is 8 fps, in the final video each second I-frame will be decimated.

7.2 Working Principles of Motion Detection Zones

SecurOS system provides a multi-zone detector to split camera surveillance area into several
independent areas (zones), which may have different motion detection parameters, such as object size
threshold or alarm states.

A Zone object corresponds to each motion detection zone (see Zone section). Basically, all zones are
divided into two types:

Alarming— designed to fire an alarm immediately upon motion detection.


Inf ormational— — designed to generate a ``motion detected'' event, that can be used for scripting
and other purposes. This event would not fire an alarm on the camera, though.

Example. For instance, the user needs to control an area with a gate and several windows seen above the gate.
The task is to make alarm activation each time somebody appears at a window whereas to neglect firing
alarms each time the gate is used. In this particular case, it is recommended to set two different Zone objects:
the first for the gate and the second for the windows. The window zone should be configured as Alarming (to
fire an alarm upon any motion detection), while the gate zone should be configured as Informational (to
generate a motion detection event, but not to fire an alarm). Moreover, if different windows have different
types of illumination, you can configure a lot of Zones with different contrast parameters for reliable motion
detection for each window.

www.isscctv.com
SecurOS 117 Administration Guide
Video Subsystem

Both alarming and informational zones should be armed by administrator to detect motion. A zone can
be configured to be always armed, meaning an operator does not have to arm it manually (see Zone
section). All the other zones should be armed manually.

7.2.1 Managing Motion Detection Zones

This section describes basic operations with Motion Detection Zones.

7.2.1.1 Creating Zones


Zones separated from the Main zone are recommended to create for each secured area within the
camera view.

7.2.1.2 Showing Zones

Figure 97. Camera cell with alarmed zone

To show all zones for a camera:


1. Right-click Armed button of the desired camera cell.
2. Choose Always show zones menu item. The zones, where motion has been detected, are be
highlighted with red color (see figure 97).

7.3 Special Settings for Video Subsystem Components


This section describes specifics of the video subsystem objects configuration procedure.

7.3.1 Camera Imaging Control

Administrator can configure camera imaging in two different ways:


1. In Camera object settings window (see Camera section);
2. Using operator workstation UI (see SecurOS User Guide). Assuming that a Video Capture Device and
a Camera objects have been created, administrator has to create a Desktop and a Monitor in order for
camera frame to appear.

www.isscctv.com
SecurOS 118 Administration Guide
Video Subsystem

7.3.2 Video Monitor Settings

On activation of camera cell and using its archive mode on a video monitor, some control elements
appear (see SecurOS User Guide). They are hidden after some period of inactivity.

When mouse placing over inactive camera cells, control buttons appear on a cell. Buttons appearing
may be deactivated for every cells of a certain monitor.

To set up described parameters for a certain monitor, do these steps on the computer with the monitor:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Create \HKLM\SOFTWARE\ISS\SecurOS\iss-video-gui\strings new branch.
4. Create lo-<nnn>-auto_deactivation_interval parameter in the new branch, where identifier
of the corresponding Monitor object must be substituted for <nnn>. Specify for the new parameter a
value of time for control buttons deactivation in milliseconds (default value is 10000).
5. Close the regedit utility.
6. Launch SecurOS again.

7.3.3 Record Buffer Settings

On using low speed network (see requirements in SecurOS Installation Guide) it is recommended to
configure the record buffer size by setting its parameters.

To set the record buffer parameters, do these steps on the computer keeping video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video branch, create mplayer_queue_min
parameter and set it to the minimal number of video frames in the buffer (default value is 40).
4. In the same branch create mplayer_queue_max parameter and set it to the maximal number of
video frames in the buffer (default value is 70).
5. Close the regedit utility.
6. Launch SecurOS again.

7.3.4 Archive Recording

This section describes specifics of the archive recording operation and its configuration.

7.3.4.1 Disk Volume Settings

To avoid situations when there is no free space on disk in case of permanent writing video archive in
SecurOS format from cameras (operative video archive) one should previously set mandatory free disk
space.

To define it, do these steps on the computer keeping operative video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video, create FreeMb key there and define
mandatory free disk space (in MB) for archive recording as its value. Now archive will be recorded

www.isscctv.com
SecurOS 119 Administration Guide
Video Subsystem

on the defined disk till its free space is less than the FreeMb value.

Note. The same FreeMb parameter determines free space threshold for audio archive records.

If free space threshold is reached then the archiver will try to record to other available disks. If there is
no free disks then the ring recording will be used (old files will be deleted).

Warning! FreeMb parameter is also used for long-term video archive. Define this parameter within \HKLM
\SOFTWARE\ISS\SecurOS\NISS400\Archiver registry key on the computer keeping long-term
video archive.

4. Close the regedit utility.


5. Launch SecurOS again.

7.3.4.2 Video Recording Settings

When recording video archive it splits into files contain fixed frames number and after exceeding this
number a new file recording begins. When operator navigates archive records are scanned in the order
of splitting on these files. To make more efficient search on archive, administrator can change frames
number in archive files.

To change frames number in archive files, do these steps on the computer with operative video archive
disks:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video, create MaxFrames key and define
maximum number of frames in any new files of archive records.
4. Close the regedit utility.
5. Launch SecurOS again.

When recording video archive the video frames queue may cause computer RAM overflow. The turn of
record in file system is limited— 100 MB. Value can be corrected by the MaxMemMb parameter in
section of the \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video\FS register.

Warning! Installation of great values for the MaxMemMb parameter can lead to reexpenditure of address
space allocated with operating system on process and to emergency end of process.

Note. In case the disk subsystem doesn't cope with recording and thus the mechanism thin out, in the logs
\video.log file, following record is fixed: "WARN VideoFileRecorder Queue length has exceeded. Some
frames was dropped.''.

www.isscctv.com
SecurOS 120 Administration Guide
Video Subsystem

7.3.4.3 Long-term Archive Settings And Archive Converter


The functionality is available in the SecurOS Enterprise edition only.

Administrator can set duplication of the operative video archive recorded from a certain cameras to a
long-term video archive in the SecurOS format on any available disk by the help of Archiver object
(see Archiver).

To avoid situations when long-term video archive is completely updated immediately rather than step
by step one should previously set mandatory size of old files to be deleted on the ring (repeat)
recording.

To define it, do these steps on the computer keeping long-term video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click OK).
3. Open \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Archiver, create ringSize key and define
size (in MB) of old files to be deleted on the ring recording.
4. Close the regedit utility.
5. Launch SecurOS again.

Note. Administrator can set video archive converting from SecurOS format to AVI or ASF format from certain
cameras by the help of Archive Converter object (see Archive Converter). On this operation files record into
temporary files folder and are converted then.

7.4 Export Video Using Monitor


Monitor's standard tools allow to export video fragments labeled with specific markers. These markers
are Alarms and Bookmarks.

Alarm — sign of detected motion in detection zone.


Bookmark — manually set time stamp relevant to the position (or the segment) of video record
which attacts operator's attention or may be of interest for the further analysis and so on.

Video and relevant markers are stored separately — video is saved to the Operative archive, Alarms and
Bookmarks are saved into the database.

Additional Information
Operative archive — rewritable archive. Once the max archive size is reached the oldest data will be rewritten with
the newest ones. By default is stored in VIDEO folder on the disk, selected in the Computer object settings.
Long-term archive — permanent data storage, produced by conversion of Operative archive with the help of Archiver
Dialog object. By default long-term archive is created in the \Archive\VIDEO folder on the disk, selected in
the Archiver object settings. For the detailed description of the Long-term archive creation procedure see SecurOS
User Guide.

Video fragments relevant to the Alarms and Bookmarks stored in the database can be exported from
Operative and Long-term archives. Export is available only if Archive Converter object which settings
define output file name format and other parameters of exported file was preliminary created in the
object tree. This Archive Converter must be selected in the Monitor object settings (Export engine
parameter).

www.isscctv.com
SecurOS 121 Administration Guide
Video Subsystem

Because of video and relevant markers are stored separately the following sampling algorithm is used
when exporting data:

1. If video fragments relevant to the given time period and camera are stored both in Operative and
Long-term archives, then only files stored in Operative archive will be exported.
2. If some video fragments relevant to the given time period and camera are missing in the Operative
archive, but are present in the Long-term archive, the fragments of Operative archive will be exported
at first, then fragments of the Long-term one.

Notes:
1. In this case two independent export tasks are created - one for Operative erchive, which is executed at
first and the second for Long-term archive.
2. If Operative archive conversion procedure failed or export task was canceled by operator then Long-
term export task is not executed.
3. By default fragments are exported to the \Exported Fragments folder of the product root
directory.
4. Names of files produced by Long-term archive conversion has long_term file type extension prefix.
For example, 1 (2012-04-17 13'23'35 - 2012-04-17
13'23'36).long_term.asf.

3. If Operative archive does not contain fragments relevant to the given time period and camera, then
Long-term fragments will be exported.

To start export click  (Export entries) button on the Monitor' DVR Search Panel (see SecurOS
User Guide).

7.5 Object Reference


Video subsystem involves the following object classes:
System Objects.
User Interface Objects.

7.5.1 System Objects

The following objects are the system:


Video Capture Devices.
Video Capture Device.
Camera.
Zone.
Light Detector.
PTZ Controller.
PTZ Device.
Archive Converter.
Archiver.

www.isscctv.com
SecurOS 122 Administration Guide
Video Subsystem

7.5.1.1 Video Capture Devices

This object is used to logically grouping Video Capture Device objects.

Parent object— Computer.

Object has no settings to alter.

7.5.1.2 Video Capture Device

The object represents a single capturing chip of a physical video capture card installed on the computer,
or video hub or IP camera plugged in to TCP/IP network.

Example. In case of video capture cards, calculate the total number of chips on all video capture cards and
create N objects with N unique PCI channel parameters. For example, TVISS4-02 cards have four
independent video capturing chips onboard and should be represented within a system as four Video Capture
Device objects. TVISS1-02 has one video capturing chip and should be represented as a single Video Capture
Device object. By this it does not matter correspondence between chips and Video Capture Device objects.

Note. It is recommanded always start PCI channel parameters number from 00 and avoid gaps in
numbering. For example, if there are one TVISS4-02 card and two TVISS1-02 cards on the computer, create
six Video Capture Device objects and set their PCI channel parameters to 00, 01, 02, 03, 04 and
05.respectively.

Warning! This object and its children objects are accessible only when Video Server value of the Role
parameter is chosen in the parent Computer object settings (see Computer).

Parent object— Video Capture Devices.

www.isscctv.com
SecurOS 123 Administration Guide
Video Subsystem

Figure 98. Video Capture Device object settings


window

Table 23. Video Capture Device object settings

Parameter Description

If you connect analog camera — select TVISS-H264 or TVISS-RT/


MX (depending on the TVISS card installed), when connecting IP-
camera — select the value corresponding to the brand of the device,
and select ISS Video Concentrator for the video-HUB.
Type
Virtual type stands for software emulation, that uses specially
prepared video clip as a video source. This option can be used to
test configuration without real video capture cards and cameras
installed.

Model If enabled select the model of Video capture devicefor given Model.

If TVISS-H264, TVISS-RT/MX or Virtual values are selected in


PCI channel
the Type field then select unique PCI channel number.

www.isscctv.com
SecurOS 124 Administration Guide
Video Subsystem

Parameter Description

Choose video signal characteristic from the list (depends on the


device type):

Type of the video signal source direction for Mobotix device


(PTZ protocol, two lenses camera). Possible values: Left— left
camera lens, Right— right camera lens, Both— both camera
Format lenses, RiL— scaled right window video image is displayed on
the top of left window video, LiR— scaled left window video
image is displayed on the top of right window video, Auto—
default value.

Type of the video signal format (NTSC or PAL) for all other
types (if available).

Live Resolution Not used for all device types.

Choose frame size of compressed video feed( valid for Samsung-


C6475). Possible values:

Normal— CIF1 (1/4 of original frame size).

Compressed resolution High— CIF2 (half-frame).

Full— CIF4 (full frame).

Note. For other devices resolution has to be changed in corresponding


Camera object settings.

Acquisition Rate/ Not used for all device types.


Compressed

Specify acquisition rate of raw video capture (valid for TVISS1,


TVISS4). Possible values:

Acquisition Rate/ Row Max— every frame is processed.

Normal— every second frame is processed, others are skipped.

Min— every third frame is processed, others are skipped.

Specify IP address or DNS/WINS name of the video device in the


TCP/IP network for all device Types exclude TVISS-H264,
TVISS-RT/MX and Virtual.
IP address
Note. Never use IP address if the device uses DHCP (dynamic IPs), use
symbolic DNS name of the device instead!

Specify a user name for IP camera connection. Default value


User securos should be kept for all device types otherwise specify name
to access IP camera with defibed address.

www.isscctv.com
SecurOS 125 Administration Guide
Video Subsystem

Parameter Description

Specify individual device password or use default value.

Password Warning! Password is displayed while typing, but on the next opening of
settings window "*" symbols are displayed in the field (the number of
symbols differs from actual password length).

Select from the list configuration parameters of the digitization. The


list is active only for TVISS PCI-E8, TVISS1 and TVISS4 device types
in multiplexing mode.
Capture settings
Mode— select digitization mode. Allows to get maximal value
of the f ps parameter. The Normal value is the optimal mode.

Gain— specify gain level value moving slider.

Enable this option to use hardware watchdog function on the


specified device (system will restart computer in case of hanging).
Activate watchdog Valid for TVISS PCI-E8, TVISS1 and TVISS4 device types only, see
the corresponding video capture card Maintenance Guide for more
information.

7.5.1.3 Camera

This object represents a single video stream from an IP device or from an analog camera connected to a
ISS TVISS video capture board.

Note. If at least one Region object (see Region) is registered in the system, then the Region drop down list box
would be accessible to choose a Region of a new camera placement in Parameters of created object window
when creating a new Camera object.

Parent object — Video Capture Device.

www.isscctv.com
SecurOS 126 Administration Guide
Video Subsystem

Figure 99. Camera object settings window. General Tab

Warning!
1. The Camera object includes general (required for each Camera), and specific parameters.
2. Set the specific parameters of the Camera object according to the Type and Model of the parent Video
Capture Device object.
3. In the settings below, only the more important (most commonly used) parameters are described.

Additional Information
The settings that are in the form of a check-box are optional. Some of these parameters can also be set externally
(especially for IP devices), i.e. through the web-config of the camera. Enabling the check-box of an optional
parameter overwrites the default value (or value from the camera web-config). If you need to change the current
value of a optional parameter after deactivating it from object settings window, the camera web-config must be
used.

Table 24. Camera object settings. General Tab

Parameter Description

Channel Select camera's channel number from the list.

Select a Microphone object to record audio and video synchronously. This will
Microphone allow you to playback synchronized video a audio from an operator interface
when choosing appropriate camera from the Monitor camera list.

www.isscctv.com
SecurOS 127 Administration Guide
Video Subsystem

Parameter Description

To enable an IP device's native telemetry control, select the Use value from the
drop-down list in the box or, for analog cameras, select previously created
additional PTZ device object (see Setting up telemetry section). By default the
Pan/ Tilt/ Zoom Don't Use option is selected.

Note. PTZ control panel becomes active when operator selects this camera on a video
monitor.

Select the mode from the following:

Manual — video recording will start either by operator' command or with


the help of the Automation subsystem.

Manual and alarm — enable this option to allow to start recording video
Recording mode automatically when a motion by this camera is detected, and to stop it
automatically when motion ends. Recommended for working with DVR
search panel (see SecurOS User Guide).

Continuous — video recording will be performed constantly.

Note. In this mode record can be stopped only changing Camera settings.

Parameter defines the video image displaying format in the Camera cell for all
Monitors all over the SecurOS security system. At the same time for each
Monitor video image displaying format can be locally changed for the selected
Camera with the help of this Camera control (see SecurOS Quick User Guide).
Possible values:

Keep aspect ratio — original format of the video frame will be used
when displaying video. Is the default value;
Viewing
Stretch to cell — the frame is stretched to full size of the Monitor'
cell;
Exception. If Layouts type parameter of the Monitor is set to special, and 1*1 layout
is selected (Camera cell takes all Monitor working area) then image will be displayed as
4:3, even if Viewing parameter is set to Stretch to cell.

Force 4:3 — when displaying, video will be scaled to 4:3.

Saving specified values and closing object settings window (Closing object
OK (Cancel)
settings window without changes).

Warning! It is not recommended to set GOP (GOV) parameter greater than 32 for the connected IP cameras
and video servers. IP cameras can be configured through it's web interface. For some types of Video Capture
Devices this setting is available through Additional settings of the Camera object.

www.isscctv.com
SecurOS 128 Administration Guide
Video Subsystem

Figure 100. Camera object settings window. Archive Tab

Table 25. Camera object settings. Archive Tab

Parameter Description

Specify the duration of pre-recording phase, in seconds. The more


the length of this phase, the more RAM is used to cache video.
Duration of pre-recording
Range of values: [0; 999]. If not set or set to 0, pre-recording won't
be used.

Specify the duration of post-recording phase, in seconds. Range of


Duration of post-recording
values: [0; 999]. If not set or set to 0, post-recording won't be used.

Use this parameter if you reduce the recording FPS. Range of


Reduce max FPS to values: [1; 99]. The mechanism of frame rate deduction is described
in section Video Stream Decimation.

The original frame rate from the camera is maintained for the
Full FPS on alarm recording period during an alarm (motion detection). Only available
if the Reduce max FPS to parameter is selected.

Specify a minimum depth of video archive, in days. This is a


recommended value. If the free space on the hard disk comes to an
end, system automatically deletes eldest records, but tries its best to
Store at least preserve archive for that camera for the specified amount of days. If
the oldest records were deleted, and still there is not enough space
to store new archives, the server will give up and delete the records
of this camera disregarding this value. Range of values: [1; 9999].

www.isscctv.com
SecurOS 129 Administration Guide
Video Subsystem

Parameter Description

Specify a maximum depth of video archive, in days. Server will


automatically delete all records that are older than the specified
threshold value. The process of archive truncation launches at night,
Remove after
between 00:00 and 02:00. If you keep this field blank, the archive
will be kept as long as there is free space on hard disk to store new
archive fragments. Range of values: [1; 9999].

Enable this option to protect the video archive for this camera with
a password (this will apply to newly created video records; current
archive will remain untouched).

Protect with password To view password-protected cameras from operator interface, you
will need to specify the same password in camera settings within
the Monitor object settings (see Monitor). This password will also be
requested to view and convert video archives using the Media
Export Utility (see ISS Media Export Utility).

Figure 101. Camera object settings window. Detectors Tab

Table 26. Camera object settings. Detectors Tab

Parameter Description

Select this check box to force the system to generate special events
Blinding detection each time blinding is detected. These events can be used in macros
or scripts.

www.isscctv.com
SecurOS 130 Administration Guide
Video Subsystem

Parameter Description

Move slider to specify detection size sensitivity. Boundary values:

0%— camera is treated as always blinded.

Size 50%— blinding will be detected if 50% of the frame area has low
contrast.

100%— only full blinding (entire camera view has low contrast)
will be detected.

Move slider to specify detection contrast sensitivity. Boundary


values:

Min— only areas of minimal contrast are taken into


Contrast
consideration (e. g. evenly colored surfaces like sheet of paper).

Max— areas with higher contrast are also taken into


consideration.

Select this check box to turn the defocusing detector on. The system
Defocusing detection
will generate special events if the camera is ever defocused.

Move slider to specify defocusing detector sensitivity. Boundary


values:
Sensitivity
0%— detector is not sensitive at all; camera is always focused.

100%— detector is very sensitive; camera is always defocused.

www.isscctv.com
SecurOS 131 Administration Guide
Video Subsystem

Figure 102. Camera object settings window. PTZ tab

Warning! All parameters of the tab, excluding the Wiper parameter, will be ignored, if in the General tab the
Pan/ Tilt/ Zoom parameter was not set to Use (or to a PTZ Device).

Table 27. Camera object settings. PTZ tab

Parameter Description

Select from the drop-down list the PTZ Protocol supported by the
current Camera model.
PTZ protocol
Note. The parameter is available depending on the type of the parent
Video Capture Device object.

PTZ channel Select the PTZ channel number.

Check this box on to activate separate telemetry control mode (see


Disable shared PTZ control
Separate Telemetry Control).

If the Camera is equipped with the Wiper, select the object that can
control it.
Wiper
Note. For the details see Configuring System to Work with Wiper.

Presets (table of pre-installed settings)

Type ID of preset specified in the PTZ device which is selected in


Identifier
the Camera object settings to control it.

www.isscctv.com
SecurOS 132 Administration Guide
Video Subsystem

Parameter Description

Specify preset' title. A list of these presets will be displayed in the


Title
operator interface when working with this PTZ device.

Figure 103. Camera object settings window. Advanced tab

Note. The Arecont AV2155 parameter set is presented on figure 103.

Specify additional parameters depending on Camera model.

7.5.1.4 Zone

Represents single detection zone of the motion detector (see Working Principles of Motion Detection
Zones for detailed information). One default zone Main is created automatically when Camera object is
created and covers all visible area of the Camera cell.

While configuring a Zone object, take into account the following parameters:

Contrast slider defines a threshold for object contrast, relative to the background. Top position of
the slider means the zone would detect motion only if a moving object differs greatly from the
surroundings. Bottom position of the slider means the zone would detect motion even if a moving
object slightly differs from the surroundings.

www.isscctv.com
SecurOS 133 Administration Guide
Video Subsystem

Size slider defines a threshold for object size. Top position of the slider means the zone would
detect motion of big objects only, bottom position of the slider means the zone would detect motion
of small objects.

Note. The values of the Contrast and Size sliders should be set by practical consideration.

Alarming flag should be active to fire an alarm on the camera upon any motion detection within
the zone. If this flag is not checked, the zone is considered informational.
Armed always flag should be active to have the zone always armed, regardless of the armed/
unarmed state of other zones on the same camera.
Smart Search flag must be activated to make it possible searching alarms by mask.

Note. Several Zone objects within the same parent object are combined into the Motion Detector logic group
in the objects tree.

Parent object— Camera.

Figure 104. Zone object settings window

www.isscctv.com
SecurOS 134 Administration Guide
Video Subsystem

Table 28. Zone object settings

Parameter Description

The Zone settings tab

Zones

Zone can be represented with one of the following types:


Detector zone — intended for motion detection in selected
area of the Camera image;
Zone types Blackened zone — is used to hide the part of the Camera image
area;
(drop-down list)
Generic zone — stores information about zone arrangement.
Warning! Alarming, Armed always and Smart Search parameters are
available for editing only if Zone type parameter is set to Detector
zone.

Enable this option to treat motion detection within this zone as an


alarm (camera will enter alarmed state, recording will be stared
automatically, etc.).

Alarming If the option is selected then Smart Search option will be available.
If you clear this option, the zone will be treated as "informational":
no predefined actions will be performed, the Zone object will
generate events upon detection start and end, thus allowing you to
program custom reactions via macros or scripts.

Select this option to keep armed mode for camera. Operator won't
Armed always
be able to disarm this zone.

Select this option if you want to enable DVR search panel,


see SecurOS User Guide). If the checkbox was selected the data
recording in the fsindex data base (detection is made at camera
statement on protection) that further allows to carry out search of
alarms in certain parameters. The search of alarms becomes
accessible in monitor DVR-mode.
Smart Search Warning! All records will be registered in SecurOS database in case of
PostgreSQL database only. In case of other databases, records will not be
recorded and search will be impossible.

Note. Alarm time intervals are registered irrespective of archive


existence for that time. It is implied that the camera writes video
constantly or on motion detector triggering.

Motion detection

Move slider to specify detected object contrast sensitivity. Boundary


values:
Contrast
min— even low-contrast objects will be detected.

max— only objects with high contrast will be detected.

www.isscctv.com
SecurOS 135 Administration Guide
Video Subsystem

Parameter Description

Move slider to specify detected object size sensitivity. Boundary


values:
Size
min— even smallest objects will be detected.

max— only large objects will be detected.

Common values for zones Camera

Select Analyze decimated stream check-box if it is allowed to use


stream with redused FPS when detecting motion. Specify, if
necessary, maximum frame per second value sufficient to detect
motion (max FPS spin box).

Analyze decimated stream, Note. The stream is decimated by i-frames. If value specified in the max
max FPS FPS parameter is less than result value of the initial decimation then the
i-frames themselves are further decimated.

By default check-box is not selected, max FPS parameter is disabled.


After check-box activation the range of max FPS parameter values is
[1; 99].

Specify image quality used when analyzing motion. Term quality


Quality stands for number of pixels for image unit. Possible values from
1/32 till 1 (of initial image). Default value— 1/16.

Set number of last camera frames used on motion analysis. If there


Memory frames is not enough frames then the motion detection procedure is not
starts. Possible values from 4 till 128 (frames). Default value— 8.

The Mask editor tab (see figure 105)

Video Area to display camera zones.

Fill all Click the button to fill all frame by mask.

Clear all Click the button to clear the camera mask.

Show all zones Click the button to display all camera zones.

OK (Cancel) Exit settings with (without) saving.

www.isscctv.com
SecurOS 136 Administration Guide
Video Subsystem

Figure 105. Zone object settings window. Mask editor

For the detailed information about motion detection zones control see Managing Zones section.

To edit zone mask:


1. Click the Mask editor tab on the Zone object property window.
2. Draw a rectangle inside the camera cell holding right mouse button, then release it. This part of the
camera screen would be excluded from the zone.
3. Draw some rectangles inside the camera cell holding left mouse button, then release it. This part of
the camera screen would be added to the zone.

7.5.1.5 Light Detector

Represents detector of contrast between inner and outer zones.

Parent object— Camera.

www.isscctv.com
SecurOS 137 Administration Guide
Video Subsystem

Figure 106. Light Detector object settings window

Table 29. Light Detector object settings

Parameter Description

Move slider to specify detection light sensitivity. Boundary values:

Sensitivity min— even smallest light difference will be detected;

max— only high light difference will be detected.

Inner zone Select from the list a Zone object corresponding to the inner zone.

Outer zone Select from the list a Zone object corresponding to the outer zone.

Select from the list a Zone object corresponding to the secondary


Outer zone (secondary) (additional) outer zone for checking light level by comparison with
two independent zones.

7.5.1.6 PTZ Controller

Represents interface to connect PTZ devices (e. g. RS485 port or serial communication port with RS232
to RS485 converter attached if PTZ device works through the RS232/RS485 interface, or a network PTZ
camera), and a specific PTZ protocol.

Parent object— Computer.

Figure 107. PTZ Controller


object settings window

www.isscctv.com
SecurOS 138 Administration Guide
Video Subsystem

Table 30. PTZ Controller object settings

Parameter Description

Select from the list box the required PTZ protocol to control PTZ
PTZ protocol
device.

Select computer's (or video hub's) serial communication port that


has RS232 to RS485 converter attached. For PTZ devices integrated
Port
with camera, use default value, as well as for Speed and Parity
fields (see below).

Select speed of the data transmission (consult PTZ device


Speed documentation for information on required speed value). The lesser
speed, the more reliable is communication. Default value— 9600.

Select from the list a method of parity control for data transmitting
Parity through the serial port (consult PTZ device documentation for
information on required settings).

Enable options corresponding to DTR or/and RTS data flow


control.
DTR, RTS Note. If the PelcoNET 350 device type was selected for the Video
Capture Device and DTR option is checked and RTS is not checked, then
RS-232 protocol will be used, otherwise RS-485/ 422 will.

Enable this option to work with PTZ device over the network.

Optional: select video hub connected to the device (e. g. VideoHub


or LinuxHub) or IP camera with integrated PTZ device (e. g. AXIS
Use remote device or Bosch) from the drop down list box to use it as a proxy to
transmit PTZ commands. If a video hub is selected, the port settings
above will apply to hub's serial port (video hubs usually have single
serial communication port).

7.5.1.7 PTZ Device

Represents physical PTZ device connected with a camera through RS485 interface or integrated with an
analog/digital PTZ camera (or dome camera), and a list of its preset positions (presets).

Warning! When connecting an analog camera to video server, including video hub IP-devices, specify ID of
the new object that equals to identifier specified in video-HUB serial port settings (when connecting through
RS232/RS485 interface), or identifier of unique RS485 interface address of the corresponding physical device
or camera. RS485 address is set on device by DIP switches (consult PTZ device documentation for more
information). ID should be in 0...255 range as single RS485 line can address up to 256 devices.

Notes:
1. Choose name of the object from the Pan/ Tilt/ Zoom list in the camera object settings window
corresponding to the camera controlled by this PTZ device (see Camera).
2. To control PTZ device through HTML form, it is necessary to indicate an identifier of the
corresponding PTZ Device object in the Address field of the PTZ dialog window (see SecurOS User
Guide).

Parent object— PTZ Controller.

www.isscctv.com
SecurOS 139 Administration Guide
Video Subsystem

Figure 108. PTZ device object settings window

Table 31. PTZ Device object settings

Parameter Description

Choose preset identifier.


Id Warning! It must coincide with corresponding preset ID configured in the
PTZ device hardware settings (otherwise preset may work wrong).

Specify a name of preset. A list of these presets will be displayed in


Name
the operator interface when working with this PTZ device.

7.5.1.8 Archive Converter

Used to get archives from the video servers and convert video to ASF, AVI or ISS format.

Warning! To play quick converted video It is strongly recommended to use VLC media player.

Parent object— Computer.

www.isscctv.com
SecurOS 140 Administration Guide
Video Subsystem

Figure 109. Archive Converter object settings window

Table 32. Archive Converter object settings

Parameter Description

List of cameras available within given Security zone. Check


Cameras appropriate box left of the camera to convert archive created for the
selected camera.

Container

www.isscctv.com
SecurOS 141 Administration Guide
Video Subsystem

Parameter Description

Select format of converted file from the drop-down list: AVI, ASF or
ISS. Default value is - ASF.

File type Note. When ISS type is selected then archive is copied into the
specified folder without changing its original proprietary format.
Converted archive can be further played back with the help of the ISS
Media Export Utility.

Max size of the each elementary file of full archive, MB. Default
value is 2000.
Split into files up to
Warning! Due to architectural limitations of the AVI container format file
size cannot exceed 2000 MB if File type parameter is set to AVI.

Video (video conversion parameters)

Select video codec to convert archive video. Possible values:

Codec MJPEG;

MPEG-4.

Quality Select the quality of converted video.

Check this box to keep original video format when converting


archive. Makes it possible to increase conversion rate significantly
Quick video export
and to reduce CPU loading. Can only be used for H.263, H.264,
MJPEG and MPEG-4 formats.

Decimation Check this box to decimate video when converting.

FPS divider Set the factor of decimation. Range of values: [2; 100].

Check this box to decimate the original video stream only by i-


frames. Archive will be pre-decimated on that Video Server where it
is stored.
Decimate on the server
Warning! Using Decimate on the server parameter allows to
reduce network loading. However, this increases Video Server CPU's
loading.

Audio (audio conversion parameters)

Select audio codec to convert archive audio. Possible values:

PCM;
Codec
WMA (for ASF contailer);

MP3 (for AVI container).

Quality Select the quality of converted audio.

Check this box to keep original audio format when converting


Quick audio export archive. Can only be used for GSM, PCM and ADPCM formats. ADPCM
format will be converted to the PCM format.

www.isscctv.com
SecurOS 142 Administration Guide
Video Subsystem

Parameter Description

Export (export parameters)

Specify directory to store converted files. Possible values: any


available directory on the hard drives of local machine. Default
value is c:\export. Optional parameter.
Export to
Note. When setting up parameter value it is possible to use file name
macros (see Name pattern parameter description).

www.isscctv.com
SecurOS 143 Administration Guide
Video Subsystem

Parameter Description

Template for the created file names. Can be formed of any


combination of valid characters and macro substitutions.

Optional parameter. Default value is {CAMID}


({EXPORT_START_TIME} - {EXPORT_STOP_TIME})

The following characters are valid:


[0-9], [a-z], [A-Z], [а-я], [А-Я],

as well as any additional characters, that are permitted to be used in


the file names by used OS.

The following macro substitutions are available (curly brackets are


necessary):

{SID} — export session number. Set to zero when the SecurOS


application is started.

{CAMID} — camera identifier;

{CAMNAME} — camera name;

{COMPID} — computer (video server) identifier;

COMMENT} — export initiator comment, used when the


conversion is started from a program or a bookmark is exported;

{CUR_YEAR} — current year in "YYYY" format;


Name pattern
{CUR_MONTH} — current month in "MM" format. Nonsignificant
zero is cut off when displaying in the file name;

{CUR_DAY} — current day in "DD" format. Nonsignificant zero is


cut off when displaying in the file name;

{CUR_HOUR} — current hour in "HH" format. Nonsignificant zero


is cut off when displaying in the file name;

{CUR_MINUTE} — current minute in "MM" format. Nonsignificant


zero is cut off when displaying in the file name;

{CUR_SEC} — current second in "SS" format. Nonsignificant


zero is cut off when displaying in the file name;

{CUR_FRAC} — current millisecond in "SSS" format.


Nonsignificant zero is cut off when displaying in the file name;

{CUR_DATE} — current date in "YYY-MM-DD" format (for


example, "2011-12-31");

{CUR_TIME} — current time in "HH'MM'SS" format (for


example, "23'05'06");

{EXPORT_START_TIME} — export period start time in "YYYY-


MM-DD HH'MM'SS" format (for example, "2011-12-31
23'02'06");

www.isscctv.com
SecurOS 144 Administration Guide
Video Subsystem

Parameter Description

{EXPORT_START_YEAR} — export period start year;

{EXPORT_START_MONTH} — export period start month number;

{EXPORT_START_MONTH_STR} — export period start month


name;

{EXPORT_START_DAY} — export period start day;

{EXPORT_START_HOUR} — export period start hour;

{EXPORT_START_MINUTE} — export period start minute;

{EXPORT_START_SEC} — export period start second;

{EXPORT_START_FRAC} — export period start millisecond;

{EXPORT_STOP_TIME} — export period end time in "YYYY-MM-


DD HH'MM'SS" format (for example, "2011-12-31
23'02'06");

{EXPORT_STOP_YEAR} — export period end year;

{EXPORT_STOP_MONTH} — export period end month number;

{EXPORT_STOP_MONTH_STR} — export period end month


name;

{EXPORT_STOP_DAY} — export period end day;

{EXPORT_STOP_HOUR} — export period end hour;

{EXPORT_STOP_MINUTE} — export period end minute;

{EXPORT_STOP_SEC} — export period end second;

{EXPORT_STOP_FRAC} — export period end millisecond.

Warning! Windows Media Player installed on Windows XP does not play video files converted to asf format
with MJPEG codec.

7.5.1.9 Archiver

The functionality is available in the SecurOS Enterprise edition only.

Object is used to write video from predefined cameras to long-term archive (video in SecurOS format)
and to play it back.

Note. To create long-term archive it is necessary to create the Archiver Dialog object. To play created archives
use Monitor or ISS Media Export Utility.

Searching for the long-term archive records to play them back is performed by an Camera object
identifier in accordance with the following algorithm:

www.isscctv.com
SecurOS 145 Administration Guide
Video Subsystem

1. If Archiver is defined in the Monitor object settings, system searches if the Camera is specified in the
settings of this Archiver object.
2. If requested Camera is not found in the settings of given Archiver object, further Camera searching is
performed by ascending Archiver ID value for all of the Archiver objects existing within security
system.
3. Camera searching is stopped when requested Camera is found within settings of the any Archiver
existing within system. Then system will search long-term archive appropriate for found Camera on
the hard drives of the Computer, that is parent object for the found Archiver.
4. Further searching is terminated if long-term archive is not found.

Warning! If object is disabled (see Disabling Objects), in order to convert archive records with the help of
Monitor (see Export Video Using Monitor) it is necessary to restart the SecurOS.

It is recommended to define the required free disk space before archive recording, see Archive
Recording section.

Parent object — Computer.

Figure 110. Archiver object settings window

Table 33. Archiver object settings

Parameter Description

Drives

Fetch Click this button to update HDD table.

List of local hard drives. Enable or disable reading/writing to one of


HDD the hard disks by selecting the corresponding value from the drop-
down list box in Mode row.

Cameras

Click this button to populate the Cameras table with all cameras
All within SecurOS security network. To select camera use either the
object ID or Title.

www.isscctv.com
SecurOS 146 Administration Guide
Video Subsystem

Parameter Description

Id Select ID of a Camera object.

Select name of a Camera object. You can use either ID or Title to


Title
specify target camera.

Choose the frame rate (in long-term archive) from the list (value
Frames per second from 1 to 30). If specified value is less than operative archive frame
rate, then decimation will be done.

Specify the archive depth: the long-term archive of the camera will
Days
be stored the set quantity of days then it will be removed by system.

7.5.1.10 Image Processor

This object is used for image (frame) processing and to subsequent export it to a file or database.

Parent object — Computer.

Object has no settings to alter.

Processing images assumes the following operations:


cropping initial image to the specified size and position relative to the source values;
drawing unfilled rectangles with specified color, line width and position.

When exporting image to the file it is saved on the hard drive of the parent Computer or can be stored in
any Database adjusted in the SecurOS object tree when exporting to the database.

To process and export processed frames the EXPORT command built with the Program object is used.
For the complete export program syntax see SecurOS Programming Guide.

Additional Information
In addition to the parameters specified directly in command string, the export procedure is controlled with the
additional parameters stored in the HKEY_LOCAL_MACHINE\SOFTWARE\ISS\SecurOS\Niss400
\Image Processor system registry key:
deltaArchive — time shift, in seconds, counted out of the export time value (T) specified in command
string. Is used to specify frame search range in archive record which calculated as follows:
[T - deltaArchive; T + deltaArchive]. Default value is 600.
downloadTimeout — timeout to download frame to the archive, in seconds. Is used when exporting frames
in real-time. Default value is 20.

7.5.2 User Interface Objects

The following objects are the interface:


Monitor.
Archive Converter Dialog.
Archiver Dialog.

www.isscctv.com
SecurOS 147 Administration Guide
Video Subsystem

7.5.2.1 Monitor

Object is used to display video streams from the cameras and to create an operator interface with tools
for any camera control and video archive operations.

Note. It is not recommended using more than one Monitor object per physical Display. It is not possible using
Video card hardware acceleration if using more than one monitor per Display which causes extra high CPU
load.

Parent object— Desktop.

Figure 111. Monitor object settings window

Table 34. Monitor object settings

Parameter Description

Display

www.isscctv.com
SecurOS 148 Administration Guide
Video Subsystem

Parameter Description

Id Choose ID of physical display this Monitor belongs to.

Select desired monitor cell aspect ratio. Possible values:

normal — is recommended to display 4:3 video stream on the


display with 4:3 aspect ratio and 16:9 video stream on the
wide-screen display;
Layouts type special — is recommended to display 4:3 video stream on the
wide-screen display.
Warning! If special type is selected then the frame can be horizontally
squeezed when displaying video stream on the 4:3 display.

Default value is normal.

Size

Specify object window top left corner coordinates (X, Y) as well as


X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Cameras (table with list of used cameras and their video settings). If camera is not listed it will use
the default video settings and video stream will flow directly from the video server.

Click this button to populate the Cameras table with all cameras
Add all
available within security network.

Id Select ID of a Camera object.

Select name of the Camera object. Like ID field can be used to


Camera
specify target camera.

Optional: select the maximum frame rate of the video feed delivered
to clients. The frame rate cannot exceed physical frame rate of the
fps
video from the camera. If not specified, original frame rate is used.
This settings can be used to reduce security network load.

Optional: select the compression type of the video that will be


transmitted to the clients (if the source and target compression
Compression
levels differ, video will be recompressed). If not specified, original
compression is used.

Optional: specify the token string (unique ID) to activate titles as


overlay on video of this camera' cell using SecurOS script
commands. That is if you want to display titles, use cam_N (where N
is the ID of the Camera object) or any other string as token, and use
Token this value as a parameter for script commands' of adding or deleting
titles.

Note. Titles are displayed only when Display titles option is enabled
(see below).

www.isscctv.com
SecurOS 149 Administration Guide
Video Subsystem

Parameter Description

Optional: if the source camera is password-protected specify the


password to be able to watch video from this camera. If a password
Password
does not match, in monitor you will see a green canvas instead of
real video.

Monitor type

Choose monitor mode. Possible values:

Normal— default mode. All cameras are in live video mode,


operator may enter and leave archive mode by any camera.
Operator may enter and leave DVR mode. PTZ control panel is
available if the Show PTZ control option is activated (see
below);

Live only— all cameras are in live mode. Operator is


forbidden to enter in archive mode. DVR button is absent;

Archive only— all cameras are in archive mode. Operator is


Mode forbidden to leave archive mode. Operator may enter and leave
DVR mode. PTZ control panel is absent;

DVR only— all cameras are in archive mode. Operator is


forbidden to leave archive mode. Monitor in DVR mode. DVR
button is absent. PTZ control panel is absent;

LPR— the same as DVR only but only one active camera is
shown, Search DVR panel is absent;

Map (2x vertical)— mode for wide screen live video


viewing, no more than two active camera can be shown, control
panels and cameras block are absent.

Show all cameras from table Select this option to display a fixed list of cameras specified in the
above Cameras table on the monitor (this mode is enabled by default).

Specify a delay in seconds between automatic switching of named


Dwell time layouts or page flipping on a monitor. Default value is 3.
See SecurOS User Guide for more information on that feature.

Check this option for the monitor to display control toolbar (toolbar
options include switching between layouts, cameras, list cameras by
Show control toolbar
pages manually or automatically, view alarm log for target cameras,
etc.).

Check this option to show camera block in user interface (on the
Show camera list
given monitor).

Check this option to automatically display on this monitor a set of


cameras that are currently in alarm state for the current Computer
Show alarm cameras only
object. Set the values in Min and Max fields (see below) to limit the
minimum and the maximum number of displayed alarm cameras.

www.isscctv.com
SecurOS 150 Administration Guide
Video Subsystem

Parameter Description

Optional: Specify the minimum (1...16) and maximum (1...16)


numbers of alarm cameras displayed. Numbers will be rounded up
to a higher value of either 1, 4, 9 or 16 in accordance with a layout
Min, Max
selected for the monitor. If there will be more than Max alarm
cameras at the same time, only the most recent cameras will be
displayed.

Check this option to automatically display each time on this


monitor only one currently active camera from another monitor or
selected on a map in the same Desktop. If another monitor does not
exist or camera on the map is not selected then nothing will be
displayed on the given monitor.

The table of cameras is used to define or override video settings for


some cameras to display. If the camera is not in the list, its default
Show single active camera video settings will be used.
only
Notes:
1. It is recommended to create such an active monitor for more
comfortable work with another monitor (or with a map)
containing large number of cameras.
2. In case of using map and an active monitor on the same desktop,
operator can easily see video from any camera on a map by
simply selecting it on this map.

Common options

Select hardware acceleration type for displaying video. Possible


values:

No— software rendering is used;


Warning! Software rendering consumes a lot of CPU resources; use
hardware acceleration whenever possible.
Hardware Acceleration Overlay and Direct3D — differences between these types
are typically insignificant. Try to experiment with both types
and see what mode is supported by your video card, gives better
picture quality and, possibly, lesser CPU usage.
Warning! If it is necessary to display titles on user monitor make sure that
the current video capture board supports hardware acceleration and set
appropriate value.

Select Archive Converter object used to export video (see Archive


Converter).
Export Engine
Warning! It is not possible to export a video sequence if this parameter is
empty!

www.isscctv.com
SecurOS 151 Administration Guide
Video Subsystem

Parameter Description

Select Archiver object used to write video in archive (see Archiver).


On selecting archive mode (see SecurOS User Guide for more
information) Long-term mode will become accessible.
Archive Engine
Note. The monitor will play archive video from cameras that are defined
in Archiver object settings.

Check this option to display internal camera IDs along with names.
Show camera IDs
Used primarily for script debugging purposes.

Enable or disable displaying of titles for all cameras on the monitor.


For displaying titles use scripts commands. If you disable this
Display titles
option, titles will not be shown on all cameras, regardless of Token
option value (see above).

Disable visualization Disable the mouse pointed camera cell zoom.

Settings of control cameras

Check this option to disable recording control using Monitor


Disable recording control
(see  SecurOS User Guide).

Check this option to disable camera' alarm mode control using


Disable alarm mode control
Monitor (see SecurOS User Guide).

Disable PTZ control via Check this option to disable PTZ control by mouse using Monitor
mouse (see SecurOS User Guide).

Check this option to disable wiper control using Monitor


Disable wiper control
(see SecurOS User Guide).

Disable frame export and Check this option to disable frame export and printing using
print Monitor (see SecurOS User Guide).

Check this option to disable image adjustment for the camera cell
Disable image adjustment using Monitor. Digital zoom, Grid and Contrast filters options will
be disabled (see SecurOS User Guide).

Check this option to show PTZ control panel (see SecurOS User


Guide).
Show PTZ control
The panel is active only for active PTZ camera displaying video in
live mode. Otherwise PTZ control panel is blocked.

Warning! To display correctly all interface elements in the monitor DVR mode, it is recommended to set
physical display resolution to no less than 1280x1024 and the W, H monitor parameters to not less than 80.

7.5.2.2 Archive Converter Dialog

Interface object used to manage the remote servers video converting to AVI and ASF format as well as
to get information about converting status (see SecurOS User Guide).

Parent object — Desktop.

www.isscctv.com
SecurOS 152 Administration Guide
Video Subsystem

Figure 112. Archive Converter Dialog object settings window

Table 35. Archive Converter Dialog object settings

Parameter Description

Specify object window top left corner coordinates (X, Y) as well as


X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Display Select ID of physical display this object belongs to.

Export engine Choose previously created Archive Converter object from the list.

7.5.2.3 Archiver Dialog


The functionality is available in the SecurOS Enterprise edition only.

Used to manage the archiving video and get information (log) about archiving status.

Parent object— Desktop.

Figure 113. Archiver Dialog object settings window

Table 36. Archiver Dialog object settings

Parameter Description

Specify object window top left corner coordinates (X, Y) as well as


X, Y, W, H width and height (W, H), in percentage of display' horizontal and
vertical size.

Display Select ID of physical display this object belongs to.

www.isscctv.com
SecurOS 153 Administration Guide
Video Subsystem

Parameter Description

Archivers (list of Archiver objects).

Click this button to populate the table with all accessible Archiver
All
objects within SecurOS security network.

Id Select ID of an Archiver object.

Name Select name of an Archiver object.

7.6 Configuration Examples

This section includes examples of how to adjust typical configurations.

7.6.1 Standalone Configuration

Original problem: a single computer with one TVISS1-02 (single-chip) video capture card and two
CCTV cameras connected to it. Computer should be used not only to capture and record video, but to
monitor cameras also.

Figure 114. Object tree for standalone configuration

Solution: (see figure 114):
1. Open Computer object settings window (see Editing Object's Settings section) and for at least one
hard drive in Disks to store archive table (for example, for C:\) set Video parameter to Read/
Write and Role parameter to Video Server.
2. Create Video Capture Device object (see Creating Objects).
3. Create Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the first camera is attached
to.
4. Create second Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the second camera is
attached to.
5. Create Desktop object.
6. Create Monitor object. In its settings window click All button to assign all cameras to this monitor
and set the following parameters:

www.isscctv.com
SecurOS 154 Administration Guide
Video Subsystem

X— 0.
Y— 0.
W— 100.
H— 100.
7. Exit administration mode.

Now you will see a full-screen monitor with live video from two cameras.

7.6.2 Video Server + Operator Workstation

Original problem: a video server with one TVISS4-02 (4 chips) video capture card and two CCTV
cameras connected to it; each camera uses its own chip for better performance. One separate operator
workstation to monitor cameras (see figure 115).

Figure 115. Object tree for server-workstation configuration

Solution: (see figure 115):
1. For the Computer which role is Video Server open its object settings window (see Editing Object's
Settings section) and for at least one hard drive in Disks to store archive table (for example, for C:\)
set Video parameter to Read/Write and Role parameter to Video Server.
2. Create Video Capture Device object (see Creating Objects).
3. Create Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the first camera is attached
to.
4. Create second Video Capture Device object with the parameter:
PCI channel— 01 (unique PCI channel number).
5. Create second Camera object with the following parameter:
Channel number— set the actual number of the labeled BNC connector the second camera is
attached to.
6. Create Computer object with identifier (ID) equal to NetBIOS name of computer to be used as
workstation, and set the following parameter:
Network address— IP address or DNS/WINS name of the computer within local TCP/IP network.
Role— set to Operator workstation value.

www.isscctv.com
SecurOS 155 Administration Guide
Video Subsystem

7. Create Desktop object.


8. Create Monitor object. In its settings window click All button to assign all cameras to this monitor
and set the following parameters:
X— 0.
Y— 0.
W— 100.
H— 100.
9. Launch SecurOS client on operator workstation and specify video server IP address (or DNS/WINS
name) when prompted.

When client has started, you will see on its display a full-screen monitor with live video from two
server-side cameras.

7.6.3 Setting Up Camera

Setting up a camera includes the following operations:

1. Adding Video Capture Device.


2. Adding Camera to System.
3. Adding Camera to Monitor.
4. Adding User Rights.
5. Setting up telemetry.

7.6.3.1 Adding Video Capture Device


To add a Video Capture Device do the following:

1. Enter the Administration Mode.


2. In the Object Tree select the Computer object to which the added device will be connected.
3. Create a Video Capture Device child object.
4. In the Parameters of created object window (see figure 116) set the required values.

Figure 116. Parameters of created object

5. In the object properties window (see figure117) set the required values.

www.isscctv.com
SecurOS 156 Administration Guide
Video Subsystem

Figure 117. The Video Capture Device object


properties window

6. Apply new settings.

7.6.3.2 Adding Camera to System


To add a Camera do the following:

1. Enter the Administration Mode.


2. In the Object Tree select the created Video Capture Device object.
3. Create a Camera child object.
4. In the Parameters of created object window (see figure 118) set the required values.

www.isscctv.com
SecurOS 157 Administration Guide
Video Subsystem

Figure 118. Parameters of created object

5. In the object properties window (see figure119) set the required values.

Note. At this step it is possible to set a PTZ-control. The configuration sequence is described in the Setting up
Telemetry section. This step can also be done later.

Figure 119. The Camera object properties window

6. Apply new settings.

7.6.3.3 Adding Camera to Monitor


To display video from the added camera in the Monitor cell do following :

1. Enter the Administration Mode.


2. In the Object Tree select the Monitor on which it is necessary to add the Camera (Security Zone

www.isscctv.com
SecurOS 158 Administration Guide
Video Subsystem

Hardware group Computer Desktops group Desktop Monitor).


3. Open the Monitor object settings window.
4. Add a line in the list of displayed cameras (click the mouse on the last line, press the  key). In the
Camera list select the necessary Camera (see figure 120). If needed set the Camera parameters.

Figure 120. Monitor object settings window

5. Apply new settings.

7.6.3.4 Adding User Rights


For the users created by the system by default, the rights to child objects are inherited from the parent
objects. In case it is not enough rights inherited by default to control a recently created object, such
rights can be assigned manually. For adding user rights to control a recently created object, do the
following:

1. Enter the Administration Mode.


2. In the SecurOS Object Tree select the current User Rights for which it is necessary to grant access to
control the created Camera.
3. In the User Rights settings window (see figure 121) select the Camera object you need, and set the
required access level (using the icon on the left side of the object name).

www.isscctv.com
SecurOS 159 Administration Guide
Video Subsystem

Figure 121. The User Rights object properties window

Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.

4. Apply new settings.

7.6.3.5 Setting up telemetry


Depending on the camera and video encoder type supporting PTZ Devices the configuration
procedures of the last ones in SecurOS are different. For the majority of cameras configuration it is
enough to set the PTZ Device without creation the PTZ Controller.

After PTZ Device configuration, at activation of a cell of each controlled camera placed on the Monitor,
the Pan/ Tilt/ Zoom button will be displayed.

When activating the controlled camera on the operator Monitor the PTZ Device Control Panel will be
activated.

7.6.3.5.1 Setting up telemetry for IP devices


To configure PTZ control for IP devices please follow the next steps:

1. Enter the Administration Mode.


2. In the SecurOS Object Tree select the Camera object (see Setting Up Camera section) for which it is

www.isscctv.com
SecurOS 160 Administration Guide
Video Subsystem

necessary to configure PTZ control.


3. In the General tab, (see fig. 122) from the Pan/ tilt/ zoom drop-down menu select the Use option.

Figure 122. General tab of Camera object settings window

Note. Control of IP cameras that do not have native telemetry, can be carried out using an external PTZ
controller (See Section Setting up telemetry with PTZ Controller Creation).

4. In the PTZ tab (see fig. 123) configure the necessary parameters.

www.isscctv.com
SecurOS 161 Administration Guide
Video Subsystem

Figure 123. PTZ tab of Camera object settings window

5. To disable shared PTZ control mode used by default, check the Disable shared PTZ control box
(see Separate Telemetry Control section).
6. Apply new settings.

7.6.3.5.1.1 Separate Telemetry Control

Separate control mode assumes that camera is operated in specific mode which allows operator to
capture PTZ controls of this camera exclusively. Controlled camera can be in the object tree of any
Server or Operator Workstation of the SecurOS network.

Warning! Only cameras equipped with native PTZ device (i.e. cameras, that do not require a separate PTZ
controller object) can be operated in separate control mode.

When system is running in the separate control mode it:


disables possibility to control telemetry of the given camera from all other Servers and Operator
Workstations of the security network;
resumes shared control mode if there are no commands initiated during 5 second timeout since the
last command was sent from given Computer.

It is assumed that separate control mode session starts at the moment when any telemetry control
command is being transmitted: turn in any direction, start/stop tour, focusing and scaling commands
initiated with the help of the Camera control elements (not a system).

www.isscctv.com
SecurOS 162 Administration Guide
Video Subsystem

If telemetry controls is captured by any user, then system will ignore all other telemetry commands
initiated by monitor, joystick, Macros or Programs, even they were executed by the user who captured
controls (i.e. were sent from the same Computer of the security network).

When working in the separate control mode PTZ control panel of the Monitor and PTZ control button in
the Camera cell are disabled for all users except for user who captured controls.

When working in shared PTZ control mode, then:


commands initiated by Macros or Programs are executed;
PTZ control is not blocked.

Telemetry control mode is configured in the Camera object settings window. By default PTZ device is in
shared control mode. To activate separate control mode check the Disable shared PTZ control box on
the PTZ tab (see figure 124)

Figure 124. Camera object settings window. PTZ tab

7.6.3.5.2 Setting up telemetry with PTZ Controller Creation

Note. This method is used to configure PTZ both for all types of analog cameras and for IP cameras not
equipped with a PTZ device.

To configure telemetry for the such types of cameras do the following:

1. Enter the Administration Mode.


2. In the SecurOS Object Tree select Computer for which create a Video Capture Device child object with a

www.isscctv.com
SecurOS 163 Administration Guide
Video Subsystem

child Camera object.


3. Create for the current Computer object a PTZ Controller child object.
4. In the Parameters of created object window (see figure 125) set the required values.

Figure 125. Parameters of created object

5. In the PTZ Controller object settings window (see figure 126) from the drop-down list select the
required PTZ protocol; choose the Use remote device check-box; from the drop-down list select the
video capture device associated with the camera that will be controlled by the PTZ device.

Figure 126. PTZ controller


object settings window

6. In the Object Tree select the previously created PTZ Controller object, and create a PTZ Device child
object for it.
7. In the Parameters of created object window (see figure 127) set the required values.

Figure 127. Parameters of created object

8. In the PTZ Device object properties window (see figure 128) if needed set the preliminary setting of
the PTZ device allowing quickly to move the camera in one of the given fixed positions. Detailed
description of the procedure of setting up presets is described in the PTZ Device section.

www.isscctv.com
SecurOS 164 Administration Guide
Video Subsystem

Figure 128. PTZ device object settings window

9. Apply new settings.


10.In the Object Tree select the Camera object (see Setting Up Camera section), for which it is necessary
to configure PTZ Device, and enter the parameters editing mode.
11.In the General tab of the Camera object settings window (see fig. 129), select the previously created
PTZ Device object from the Pan/ Tilt/ Zoom parameter drop-down menu.

Figure 129. General tab of Camera object settings window

12.In the PTZ tab (see fig. 130) configure the parameters.

www.isscctv.com
SecurOS 165 Administration Guide
Video Subsystem

Figure 130. PTZ tab of Camera object settings window

13.Apply new settings.

7.6.4 Joystick Configuration

To use joystick for PTZ video monitor control (see SecurOS User Guide) it is necessary to install and
configure it.

To install and configure joystick do the following:


1. Connect joystick to operator workstation. The device will be detected automatically or drivers should
be installed.
2. Find the installed joystick in the devices list (Control Panel Game Controllers) and write down its
name exactly as in the list (for example, Joystick_Name).
3. Copy default.xml file describing the joystick configuration in the folder \Joy_config (within
SecurOS system folder) into Joystick_Name.xml in the same folder.
4. Click Properties button in game controllers list, then Calibration tab in the appeared window.
Calibrate installed joystick buttons and control sticks.

Warning! Calibration procedure is absolutely necessary otherwise a joystick will not function in SecurOS!

www.isscctv.com
SecurOS 166 Administration Guide
Audio Subsystem

8 Audio Subsystem
The audio subsystem is used to operate and configure the audio devices (audio capture cards,
microphones) within the SecurOS security network, transmit audio streams between servers and
workstations and also work with live and archived audio from within workstations.

8.1 Operation Modes


Working with an audio stream can be carried out in one of the following modes:
1. Synchronized Audio/ Video Recording and Playback;
2. Separate Audio Recording and Playback.

Possibilities to use system objects to record and playback audio streams are different for each mode and
depend on their settings. Features of each mode are described in detail below.

8.1.1 Synchronized Audio/Video Recording and Playback

In this mode, the video stream is recorded synchronously with the audio stream, which allows to
analyze not only video, but also audio information when playing back records.

Synchronized audio/video recording is configured by making a logical link between the Camera and
the Microphone object. Physical devices are linked during the Camera object configuration (see Camera
section).

Synchronized audio/video recording and playback is performed by using controls of the Monitor's cell
(see Monitor), that displays live video from Camera, to which the appropriate Microphone is linked to.

Warning! A Microphone linked to a Camera can never be used separately from the Camera to record arbitrary
audio.

It's impossible to control synchronized recording with the help of the Audio Player interface object.
Microphones associated to the Camera are displayed in the Audio Player's list of available microphones
in <Microphone Name> [Microphone ID]:Camera[Camera ID] format.

For the detailed description of the system configuration operations required to provide synchronized
audio recording mode see Example of System Configuration for Synchronized Audio/ Video
Recording and Playback section.

8.1.2 Separate Audio Recording and Playback

Separate recording of the arbitrary audio stream is done with the help of Microphone, that is not linked
to the Camera object.

To control separate recording and playback mode the Audio Player system object is typically used.

www.isscctv.com
SecurOS 167 Administration Guide
Audio Subsystem

Microphones, that can provide separate recording (i. e. that are not linked to the Camera object) are
displayed in Audio Player's list of the available microphones in the <Microphone
Name> [Microphone ID] format.

8.2 Object Reference


The audio subsystem involves the following classes of objects:
System Objects.
User Interface Objects.

8.2.1 System Objects

The following are the system objects:


Audio Capture Device.
Microphone.

8.2.1.1 Audio Capture Device

The object is designed to configure and initialize within SecurOS network the following typical audio
sources:
IP-devices;
physical audio capture devices installed on the computer, including the following:
sound cards;
sound circuits of the TVISS video capture cards;
microphones connected to the computer's audio inputs.
SoundMixer module.

Additional Information
The SoundMixer module is intended for combining multiple input signals of different audio sources into a single
combined output signal. Recording and further playing back of the combined signal is done with the help of the
Audio Player interface object (see Audio Player section).

Parent object— Computer.

www.isscctv.com
SecurOS 168 Administration Guide
Audio Subsystem

Figure 131. Audio Capture Device object settings window

Table 37. Audio Capture Device object settings

Parameter Description

General (type independent general parameters of sound source)

Select audio source type. Mandatory parameter. Default value—"not


Type
set".

Select audio source model. Mandatory parameter. Default value—


Model
"default".

Select audio source frequency (Hz). Mandatory parameter. Default


value— min from list of available, for selected device Type.
Samplerate
Note. The higher the samplerate the better the audio record quality, but
more disk space will be required.

Additional (type dependent additional parameters of sound source)

Set the following parameters (see figure 131):

IP address —IP-address of sound source in the SecurOS network.


Default value is "000.000.000.000";

For IP-device Login — user name to access device. Value is set with the help of
device's configuration interfaces (see original device' User Manual);

Password — user password to access device. Value is set with the


help of device's configuration interfaces (see original device' User
Manual).

www.isscctv.com
SecurOS 169 Administration Guide
Audio Subsystem

Parameter Description

Set the following parameters (see figure 132):

PCI channel — PCI channel number to connect device. Mandatory


parameter. Range of values: [1; 32]. Parameter value is unique
For Sound Card or Sound for each Audio Capture Device child to Computer system object.
Circuits of the TVISS Default value — min from range of available, excluding already
Video Capture Cards assigned values to other Audio Capture Devices.

Note. In case of some microphones are connected to the audio card only
one of them can be used.

Create a list of microphones selecting them from the available


microphones in the system (see figure 133):

ID — Microphone object identifier;

For SoundMixer module Microphone — Microphone object name.

Note. The list of available Microphones is populated with ones existing in


the system already (excluding the Microphones which are child objects to
the Audio Capture Device object being currently configured).

Figure 132. Sound Card or Video Capture Device Settings Window

Figure 133. SoundMixer Module Settings Window

www.isscctv.com
SecurOS 170 Administration Guide
Audio Subsystem

8.2.1.2 Microphone

This object represents a single mono audio channel. To record stereo signal, use two Microphone objects
created under the same Audio Capture Device object and using two different channels (Left and Right).

Parent object— Audio Capture Device.

Figure 134. Microphone object settings window

Table 38. Microphone object settings

Parameter Description

Select a channel from the list of available channels of the parent


Audio Capture Device object. The same input channel can be shared
Channel between any number of Microphone objects. This is useful for
recording audio in several formats or to several locations
simultaneously.

Choose an audio compression codec. Possible values:

16 Bit PCM— no compression, best sound quality, stream rate


is 128 Kbps at 8 KHz sampling rate;

Compression IMA ADPCM— average compression quality, good sound quality,


stream rate is 32 Kbps at 8 KHz;

GSM 6.10— best compression, average sound quality (this


codec is intended primarily to compress speech), stream rate is
13 Kbps at 8 KHz sample rate.

Type Reserved for future use. Possible value— WAV.

Information field: Read-only indicator of current volume level. Used


Level
to test microphone on-the-fly.

Choose gain level (-12...12 dB). Increase gain if your audio


Gain source is weak. Use Level indicator above to visually control
volume level.

www.isscctv.com
SecurOS 171 Administration Guide
Audio Subsystem

Parameter Description

Voice Operated Control (feature of automatic sound recording upon reaching threshold volume).

Note. This set of parameters is valid only for separate audio recording mode (see Separate Audio
Recording and Playing Back section).

Move slider to specify threshold level (from -60 to 0 dB). When


volume reaches this level, automatic sound recording starts. Use
Level
Level indicator above to visually estimate current volume level. If
set to Off, voice operated control feature is disabled.

Specify the pot-recording time (sec) in case recording is activated


Delay
through the Voice Operated Control mode.

8.2.2 User Interface Objects

The following are the user interface objects of the audio subsystem:
Audio Player.

8.2.2.1 Audio Player

This is an interface object used to listen to live and recorded audio from microphones (see SecurOS
User Guide).

Warning! Due to system restrictions it is not allowed to create more than one Audio Player child object for
each Desktop object in the SecurOS object tree.

Parent object— Desktop.

www.isscctv.com
SecurOS 172 Administration Guide
Audio Subsystem

Figure 135. Audio Player object settings window

Table 39. Audio Player object settings

Parameter Description

Specify the object window's top left corner coordinates (X, Y) as well
X, Y, W, H as its width and height (W, H), as percentages of the displays'
horizontal and vertical size.

Check this box to hide the Audio Player window when activating the
parent Desktop. By default this box is not checked. When hide mode
Hide
is enabled it is impossible to work with available Microphones (i.e.
microphones not linked to cameras).

Identifier of the physical monitor, where Audio Player window


ID
should be displayed. Possible values: [1; 16]. Default value is 1.

Sound Card Select from the list an audio output line to the play audio files.

Select from the list the target channel to play audio from. You can
Channel to play select either mono or stereo output (stereo means pseudo-stereo: it
just plays the same mono sound on both channels).

Table of audio sources (a list of registered audio sources that should be available from this audio
player)

Source Select one or more Microphone object(s) from the list.

www.isscctv.com
SecurOS 173 Administration Guide
Audio Subsystem

Parameter Description

Optional: select the compression with which audio will be delivered


from the server to the client. If the compression differs from that on
the server, audio will be re-compressed on the fly. Since re-
compression increases CPU load, use this parameter with caution.

This option should be used if you want to store audio archive with
the best possible quality (16 Bit PCM compression), but want to
Compression
listen to audio compressed with either IMA ADPCM or GSM 6.10
compression, thus reducing network load at the cost of some audio
quality loss.

If you do not select the compression or set it to Default, live audio


will be transmitted with best quality (16 Bit PCM) and archived
audio will be transmitted in the original format it was saved in.

Click this button to populate the table with all the microphones
Add all
within the SecurOS network.

Clear all Click this button to clear the entire table.

OK Save the changes and close the object settings window.

Cancel Close object settings window without saving changes.

8.3 Example of System Configuration for Synchronized Audio/Video


Recording and Playback

Figure 136. Object Tree for Workstation Configured for Synchronized


Audio/ Video Recording

To configure synchronized Audio/Video Recording and Playback Mode do the following:


1. In the object tree choose the Computer object which represents the physical computer with the
installed or connected appropriate hardware, then create a Audio Capture Device child object
(see Audio Capture Device). Set up its specific parameters depending on device type.
2. For the created Audio Capture Device create a Microphone child object (see Microphone). Default

www.isscctv.com
SecurOS 174 Administration Guide
Audio Subsystem

parameter values are normally sufficient for audio recording.


3. To link a created microphone to a certain camera, select the appropriate microphone in the Camera
object's Microphone parameter drop-down list (see Camera). After that it will be possible to watch
the live video with audio. Audio/video will also be recorded synchronously.
4. Choose the Desktops group of the corresponding Computer object and create a Desktop child object.
5. Create a Audio Player child object (see Audio Player) under the Desktop object created in the previous
step. In it's Source list, select the Microphone previously selected in the Camera object settings
(see step 3).
6. If necessary create a Monitor object on the same Desktop and place the Camera (with linked
Microphone) on it.

Warning! To watch live video and audio, the Audio Player object (with Microphone) and Monitor (with
appropriate Camera to which this Microphone is linked to) object must be placed on the same Desktop.

www.isscctv.com
SecurOS 175 Administration Guide
I/O Subsystem

9 I/O Subsystem
The functionality is available in the following platforms: SecurOS Enterprise, SecurOS Prof essional,
SecurOS Xpress.

The I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays)
within the SecurOS network.

Note. General purpose I/O devices are connected to TVISS-4IO boards or to supported IP devices (see
SecurOS Installation Guide).

9.1 Object Reference


The I/O subsystem includes the following objects:
Sensor.
Relay.
CCTV Keyboard or joystick.

9.1.1 Sensor

This object represents a physical sensor device or a daisy chain of sensors (security loop).

Note. Several Sensor objects within the same parent object are combined into the Sensors logic group in the
object tree.

Parent object— Video Capture Device.

Figure 137. Sensor object settings


window

Table 40. Sensor object settings

Parameter Description

Select channel number the sensor is connected to (see SecurOS


Channel
Installation Guide for more information on channel numbering).

www.isscctv.com
SecurOS 176 Administration Guide
I/O Subsystem

Parameter Description

Select the type of alarm condition. Possible values:

Alarm when switch on — check this option to trigger alarm


Alarm condition state when contacts are short circuited;

Alarm when switch off — check this option to trigger alarm


state when contacts are open.

Select the most appropriate sensor type (this only changes device's
Hardware
icon on map, not its behavior).

9.1.2 Relay

This object represents a electrically operated switch (e. g. relay) that controls any device.

Note. Several Relay objects within the same parent object are combined into the Relays logic group in the
object tree.

Parent object— Video Capture Device.

Figure 138. Relay object settings window

Table 41. Relay object settings

Parameter Description

Relay number Select the channel number the relay is connected to.

Select the most appropriate device type controlled by this relay (this
Hardware parameter changes device's icon on map). Possible values: Lock,
Woofer, Light, Wiper.

External device

Select the protocol to connect to the control device (the parameter is


Protocol
used to control a Wiper).

Select the channel to connect to the control device (the parameter is


Channel
used to control a Wiper).

www.isscctv.com
SecurOS 177 Administration Guide
I/O Subsystem

9.1.3 CCTV Keyboard or joystick

This object is designed to control user interface objects (for example, Monitor), cameras (like PTZ
devices) and their modes, to execute operations with layouts, record operations, etc. The list of
supported commands depends on the object's program realization in SecurOS.

This functionality is available in the following platforms: SecurOS Enterprise, SecurOS Prof essional,


SecurOS Xpress.

Several CCTV Keyboard or joystick objects within the same parent object are combined into the CCTV
Keyboards logical group.

Parent object — Computer.

SecurOS supports the following types of keyboards:

Bosch Intuikey;
Panasonic WV-CU950;
Pelco KBD300A.

Device type is selected in the object settings window.

Warning!
1. CCTV Keyboards listed above are not USB devices.
2. CCTV joysticks supporting USB-interface are connected to the system directly, without an CCTV
Keyboard or joystick object creation.
3. Please view DevicesIntegrationList for additionally supported USB joysticks.

www.isscctv.com
SecurOS 178 Administration Guide
I/O Subsystem

9.1.3.1 Bosch Intuikey

Figure 139. Bosch Intuikey object settings window

Table 42. Bosch Intuikey object settings

Parameter Description

Serial port Serial port to connect device.

Press to check if device is available when connecting using the


Test
specified port number.

Code page Code page specifying program interface language.

Programmable buttons and assigned actions. List is populated with


Main Menu
SecurOS commands that are supported by the device.

Press to save specified values and close object settings window


OK (Cancel)
(close object settings window without saving changes).

www.isscctv.com
SecurOS 179 Administration Guide
I/O Subsystem

Figure 140. Device settings window. Monitors tab

Monitors tab is used to create a list of Monitors, that can be controlled with the configured device.

Note. At the moment only one Monitor can be controlled with the CCTV Keyboard or joystick.

Table 43. Monitors tab

Parameter Description

List of all Monitor objects existing in the system exclude Selected


monitors (i.e. all system Monitors that can be controlled with the
Available monitors
CCTV keyboard, but this option is not specified in the CCTV
Keyboard or joystick object settings).

List of the Monitors that can be controlled with the given CCTV
Selected monitors
Keyboard or joystick object.

Monitor, which will be selected for control with the CCTV Keyboard
by default after SecurOS startup. Possible values: any Monitor from
the list of Selected monitors.
Default active monitor
Note. In order to change controlled Monitor when working with the
system simply enter it's ID (see User Manual for the appropriate CCTV
keyboard).

www.isscctv.com
SecurOS 180 Administration Guide
I/O Subsystem

9.1.3.2 Panasonic WV-CU950

Figure 141. Panasonic WV-CU950 object settings window

Table 44. Panasonic WV-CU950 object settings

Parameter Description

IP address IP address of the device.

Programmable buttons and assigned actions. List is populated with


Functional buttons
SecurOS commands that are supported by the device.

Joystick's programmable buttons and assigned actions. List is


Joystick buttons populated with SecurOS commands that are supported by the
device.

Press to save specified values and close object settings window


OK (Cancel)
(close object settings window without saving changes).

Monitors tab and its actions are described in the Bosch IntuiKey section.

www.isscctv.com
SecurOS 181 Administration Guide
I/O Subsystem

9.1.3.3 Pelco KBD300A

Figure 142. Pelco KBD300A object settings window

Table 45. KBD300A object settings

Parameter Description

Serial port Serial port to connect device.

Press to check if device is available when connecting using the


Test
specified port number.

Programmable buttons and assigned actions. List is populated with


Button programming
SecurOS commands that are supported by device.

Press to save specified values and close object settings window


OK (Cancel)
(close object settings window without saving changes).

Monitors tab and its actions are described in the Bosch IntuiKey section.

9.2 Configuring System to Work with Wiper


The wiper is an optional component of the PTZ device designed to be mounted on the video camera
and used to clean the lens remotely.

www.isscctv.com
SecurOS 182 Administration Guide
I/O Subsystem

The ability to support wiper and wiper configuration parameters are normally specified in the camera
specification.

Wiper configuration and control are performed with the help of the following SecurOS objects:
Relay — is used to configure Wiper control parameters;
Camera — object settings define the Relay object, that is used to control the Wiper for the given
camera;
Monitor — object settings define the button display mode in the Camera cell.

To configure the Wiper for a just installed camera, do the following:


1. In the SecurOS object tree create the Video capture device object with child Camera object
appropriate to the camera mounted;
2. Create Relay child object for the created Video capture device;
3. In the Relay object settings window select the appropriate Hardware (Wiper). Define its Protocol and
Channel control parameters if necessary;
4. In the created Camera object settings window click the Pan/ Tilt/ Zoom button, then select the created
Relay in the Wiper box of the PTZ device settings window;

5. Add created Camera to the Monitor. Wiper control button ( ) will be displayed in the Camera cell
by default. To hide the button select the Disable wiper control check box in the Monitor object
settings window.

Note. The wiper control button displaying mode also depends on the set of access rights assigned to the user.

www.isscctv.com
SecurOS 183 Administration Guide
Notification Subsystem

10 Notification Subsystem
The notification subsystem allows to inform personnel of events within the security network by the
means of e-mail, voice phone calls, SMS messaging and audible notifications. Notifications for object
events can be configured using Macros or Scripts (see SecurOS Programming Guide).

10.1 Object Reference


The notification subsystem includes the following objects:
E-mail Message Service.
E-mail Message.
Short Message Service.
Short Message.
Audible Notification Service.

10.1.1 E-mail Message Service

This object represents an SMTP service which will be used to send E-mail notifications.

Parent object— Computer.

Figure 143. E-mail Message Service object settings


window

Table 46. E-mail Message Service object settings

Parameter Description

Specify IP address or DNS/WINS name of the SMTP server. You


can either use local or external SMTP servers, or install SMTP
SMTP Server
service on the local computer (see SMTP Mail Server Installation
and Configuration).

www.isscctv.com
SecurOS 184 Administration Guide
Notification Subsystem

Parameter Description

Port Specify SMTP server port. Default value is 25.

Select this checkbox if your SMTP server requires authentication.


SMTP Server requires
authentication Warning! If this field is checked, then the checkboxes of the next two
parameters will be activated.

Login, Password Specify login and password for SMTP authentication.

Secure connection

Select this checkbox to enable connection via encrypted channel


Use secure connection
using the selected protocol.

Choose the connection protocol. Possible values:

Auto— default value, protocol selection depends on server


Protocol
setup (possible protocols: SSL 3.0, TLS 1.0).

SSL— use the SSL 3.0 protocol.

10.1.2 E-mail Message

Object represents an individual e-mail message (or a message template). Use Macros and Programs to
send e-mail messages.

Parent object— E-mail Message Service.

Figure 144. E-mail Message object settings window

Table 47. E-mail Message object settings

Parameter Description

Specify e-mail address of a recipient. You can specify several


To addresses separated by a semicolon. For example,
[email protected]; [email protected].

Specify e-mail address of a sender. You can specify several


From
addresses separated by a semicolon.

www.isscctv.com
SecurOS 185 Administration Guide
Notification Subsystem

Parameter Description

Specify e-mail address to which you want to send copy of the


CC message. You can specify several addresses separated by a
semicolon.

Specify subject of the message. You can specify variable parameters


here in #param_name\# format. The real parameters are
Subject
substituted automatically when the message is sent. Parameters are
useful when sending e-mail messages from scripts.

Type in the message body. You can specify variable parameters


Message field
here.

Select the files that should be attached to the message. Format: a


string, max length— 250 symbols. You can define the exact path or
just a file name. In the latter case the system will search for the
Attachment specified file in the product folder. You can select the file using the
Open button. If you need to specify more than one file, type their
names, separated by commas (for example, C:\temp\image.jpg,
C:\temp\log.txt).

Optional: select archiver to compress the selected file(s). Each of the


Pack attached files will be compressed into separate archives. Possible
values: no compress, 7Z, GZIP, ZIP.

10.1.3 Short Message Service

Represents a mobile phone or other similar device connected to the computer via a serial (COM) port or
via a USB port.

Parent object— Computer.

Figure 145. Short Message Service object settings window

Table 48. Short Message Service object settings

Parameter Description

Select device from the list. Click Refresh button to rescan serial
ports for available devices and update the list. The following phones
Device models are compatible: Sony Ericsson (1018, J105i, K810, K790i,
Z610i), Nokia (N76, N86, C5, 6120, 6300, 6555, 6700, 5130, 5310,
3500), Motorola C650, Samsung D900.

10.1.4 Short Message

This object represents an individual SMS message.

Parent object— Short Message Service.

www.isscctv.com
SecurOS 186 Administration Guide
Notification Subsystem

Figure 146. Short Message object settings window

Table 49. Short Message object settings

Parameter Description

Specify a number of the target mobile phone to send message to.


Use international phone format: ``+'' character, country code, city
Phone
code, local phone number. Maximum phone length is 30 symbols
(for example, +74951234567).

Type in the message body. You can enter up to 255 symbols. Use
Message
ASCII (latin) characters only!

10.1.5 Audible Notification Service

This object represents a sound card that should be used to playback event-specific audio recordings.
The correspondence between individual audio files and object events can be viewed and altered via the
DDI utility (see ISS Object Types Database Editor). All audio files should be placed in the \wav
subdirectory of the SecurOS program folder.

Parent object— Computer.

Figure 147. Audible Notification Service object settings


window

Table 50. Audible Notification Service object settings

Parameter Description

Sound card Select an audio output line to play the audio files through.

Select output sound channels (Left, Right, or Left+Right). Use


Channel
NONE value to temporarily disable audible notifications.

Select this checkbox to disable audible notifications if a Event Viewer


Disable if Event Viewer object exists. To use this option it is necessary to enable the Event
exists Viewer object on the computer where the Audible notif ication service is
configured.

www.isscctv.com
SecurOS 187 Administration Guide
Automation Subsystem

11 Automation Subsystem
The automation subsystem provides the means to configure custom reactions to specific events within
the SecurOS network, thus building custom logic within the entire security network.

11.1 Working Principles


This section contains general information about what the automation subsystem objects are intended
for.

11.1.1 Time Zones

Time zones are used to set the schedule for user access control to the security objects and zones, and to
schedule system reactions to events triggered by the system.

The time zone sets the time interval when the events triggered by the program are handled by the
system. When some event which is programmed to execute an alarm or any other programmed reaction
happens within the limits of the time zone assigned for this program, the program behaves as it was
defined. If the event falls out of this time zone, the system will show no reaction.

Example. If you select time interval from 08:00 to 22:00 and specify Monday and Wednesday as the days of
week for a time zone, the event handling rules will be applied from 08:00 to 22:00 on Mondays and
Wednesdays starting from the date you set as a start date, and within the number of days you specified.

Note. If no time zones are defined, you can select only Always or Never options or any reaction triggered
by the program to be shown by the system.

11.1.2 Macros

Macros are used to define the links between the events and system actions. Every system object has its
own set of events, and you can use visual tools to select the system reactions for them. These definitions
are stored as a special system object called Macro.

11.1.3 Scripting

SecurOS provides the scripting language that can be used to describe and program complex scenarios.
In these scenarios, you can define the system behavior for some specific cases or just set the system
reactions to the events triggered by SecurOS objects. You can use scripting tools for any physical or
virtual system object, for example, camera, desktop or reader.

Writing scripts is described in the SecurOS Programming Guide.

www.isscctv.com
SecurOS 188 Administration Guide
Automation Subsystem

11.1.4 Integration with 3rd Party Systems


This functionality is available in the SecurOS Enterprise platform only.

SecurOS provides the capability to exchange data with external / 3rd party systems. Data exchange is
implemented by the means of a special IIDK (ISS Integration Development Kit) protocol. Using this
data exchange protocol, an external computer/system can be connected to the SecurOS network to
transmit events to the security network and to control the SecurOS objects (see IIDK Manual).
The SecurOS system also supports interaction with other client applications by the ST API text network
protocol (Simple Text API, see Simple Text API section). This protocol is used by the ST-SDK server
application that is a TCP server. The server supports interactions between the client application and the
SecurOS objects using commands and messages translated to the communicated sites.

11.2 Object Reference


Automation subsystem includes the following objects:
Time Zone.
Macro.
Program.
IIDK Interface.
Simple Text API.

11.2.1 Time Zone

This object represents a time schedule and is used to define activity time for macros and programs. For
each time zone specify time intervals, days of week, single dates and periods at which certain actions of
macros and scripts will be executed. Time zone rules will be active for the specified days.

Note. Several Time Zone objects within the same parent object are combined into the Time Zones logic group
in the object tree.

Parent object— Security Zone.

Figure 148. Time Zone object settings window

www.isscctv.com
SecurOS 189 Administration Guide
Automation Subsystem

Table 51. Time Zone object settings

Parameter Description

Fill in the table of time intervals within a day (From, To). Last
minute of the interval is included into the interval. Time should be
specified in the HH:MM format. The number of time intervals is not
Time intervals
limited. Time intervals may overlap, but this is generally not
recommended. For each interval, dates or periods of execution are
chosen (see below).

Select days of week on which specified time intervals are active


(logical AND operation is used between days and time intervals
Days of week
with a day). Note that by default none of the days are selected and
the time zone is not active.

Check this option to make the selected time interval of the Time zone
active on dates defined as "holidays'' within the Security Zone object
settings (see Security Zone). If Days of week or Date, Period are
Holidays not set then selected time interval will be active only on Holidays. If
they are selected, rules of Time Zone will be active both on Holidays
and the schedule defined within the time zone (Days of week or
Date, Period).

Enable Date field and select start date to make the time zone
correspond not to days of the week, but to single repeating days
with period of any length. Specify period in Period field (in days).
This means that time zone will be active every single N-th day
Date, Period starting from the specified date.

Note. To make more complex time schedules like two active days
followed by two inactive, you should create several Time Zone objects
and specify the same period but shifted start dates.

11.2.2 Macro

Used to define SecurOS system behavior by catching specific system events and generating custom
reactions for those events.

Note. Several Macro objects within the same parent object are combined into the Macros logic group in the
object tree.

Parent object— Security Zone.

www.isscctv.com
SecurOS 190 Administration Guide
Automation Subsystem

Figure 149. Macro object settings window

Table 52. Macro object settings

Parameter Description

Enable this option to prevent the event MACRO(X)RUN from being


processed on any other computer located on the same network. If
the macro is executed manually then it can not affect the other
computers in the same security network. In the case when the macro
Local is executed by some event it will be processed by all computers of
the network which received the event. If the macro is executed at
system startup then it is executed similarly to a manually executed
macro. If this parameter is left unchecked then macro will be
executed on all computers of the network.

Select this checkbox to hide the macro on the Control panel of all
computers in the security network. By default, all macros can be
Hidden executed manually on application servers, administrator
workstations or operator workstations which belong to the same
security zone as the Macro object itself.

Event (table of source events that trigger macro execution, all events are equal in rights and any
single event can trigger the macro).

Type Choose source object type.

Choose source object ID. You can omit ID to refer to any objects of
Id
the specified type within the security network.

Inf ormation f ield: title of the object (appears automatically after you
Title
select object type and specific ID).

Choose source object event. List of values depends on the object


Event
type. Omit this field to refer to any events of this object type.

Actions (table of target objects and actions to perform on them on macro execution; actions are
executed in the order they appear in the table).

Type Choose target object type.

www.isscctv.com
SecurOS 191 Administration Guide
Automation Subsystem

Parameter Description

Choose object ID. You can omit ID to refer to any objects of the
Id
specified type within the security network.

Inf ormation f ield: title of the object (appears automatically after you
Title
select object type and specific ID).

Choose action to perform on object. The list of actions depends on


Action
the type of the object.

Parameters of the selected action. Parameters are set as a string,


Parameters maximum length— 255 symbols. The string format is similar to the
program parameter one, see Program.

11.2.3 Program

Used to define programs (scripts) to help automate and customize SecurOS (see SecurOS
Programming Guide).

Note. Several Program objects within the same parent object are combined into the Programs logic group in
the object tree.

Parent object— Security Zone.

Figure 150. Program object settings window

Table 53. Program object settings

Parameter Description

Select Time Zone (see Time Zone section) object from the list to specify the
time period(s) when this script is active (if selected time zone is inactive
the script does not operate). Never (never operate) or Always (always
Time Zone operate) also can be selected as the time zone value.

Note. By default this parameter is set to Never: newly created script is inactive
unless you specify a different time zone.

Click this button to open a dialog, where you can setup, on what particular
Run on computers of the parent security zone this script will run on. By default,
the script is executed simultaneously on all servers of the security zone.

www.isscctv.com
SecurOS 192 Administration Guide
Automation Subsystem

Parameter Description

Click the button and choose the required action from the drop-down list:

Import program code from file — to load code from file;


Import/ Export
Export program code to file — to save code copy to file. File name
format is <program_id>.nis.

Script text area Fill in the text area with the script body itself.

The text of a removed program can be restored. To restore the program do the following:
1. Export program code to a file before deleting the Program object.
2. Import program code from file into a new Program object.

Warning! Time Zone and Run on parameter values of the deleted object are not saved and cannot be
restored!

11.2.4 IIDK Interface


The functionality is available in the SecurOS Enterprise platform only.

This is a service for external connection to SecurOS via the IIDK protocol. Create this object on one or
more computers that will act as IIDK servers (see IIDK Manual for more information).

Parent object— Computer.

Object has no settings to alter.

11.2.5 Simple Text API


The functionality is available in the SecurOS Enterprise platform only.

Server for processing client application queries by the ST-SDK protocol. Create this object on one or
more computers that will act as an ST-SDK server in the SecurOS network.

Parent object— Computer.

Figure 151. Simple Text API object


settings window

www.isscctv.com
SecurOS 193 Administration Guide
Automation Subsystem

Table 54. Simple Text API object settings

Parameter Description

Specify port number opened for connection with this server.


Port Warning! There should be open access to the specified port in the Windows
firewall settings.

Specify timeout to close client application connection due to inactive


Session timeout, ms state (no queries received from application within the timeout
period).

Enable this option to prompt SecurOS user name and password for
Authentication required
any new connection to the server.

11.3 Setting up Macros and Scripts


This section describes specifics of configuring and using the macros and programs.

11.3.1 Macros

Macros are used to define the links between the events and system actions. On occurrence of the event
described in the macro command, the predetermined actions are executed automatically. The macro
command can also be launched by an operator manually. Most of the system objects have a list of
corresponding events and reactions.

Note. A detailed description of macros can be found in the SecurOS Programming Guide.

To configure Macros perform the following steps:


1. Enter the Administration Mode.
2. In the SecurOS Object Tree create a Macro which is a child object of the Security Zone object.
3. In the Parameters of created object window set the required values.
4. In the object properties window (see figure 152) create the macro command description.

Figure 152. The object settings window

5. Apply new settings.

Buttons to execute the created Macros are displayed on the system Control Panel (see figure 153).

www.isscctv.com
SecurOS 194 Administration Guide
Automation Subsystem

Figure 153. Control panel. Available Macros

11.3.2 Scripts

Programs (scripts) are a more advanced and versatile (in comparison with macros) way to handle
event/reaction logic in the system.

Note. For the detailed description of the programs see SecurOS Programming Guide.

To create a Program do the following:

1. Enter the Administration Mode.


2. In the SecurOS Object Tree create a Program which is a child object of the Security Zone object.
3. In the Parameters of created object window set the required values.
4. In the Program object properties window, type in the program code.
5. Apply new settings.

www.isscctv.com
SecurOS 195 Administration Guide
Light Integration

12 Light Integration
This section describes light integration of SecurOS with the external FAAC (Fire Alarm/Access
Control) and radiation monitoring systems.

12.1 General Description


SecurOS allows to integrate some FAAC (Fire Alarm/Access Control) or radiation monitoring
systems — Bolid, FortNet and Yantar. The interaction model presumes that the external module
transfers some events to SecurOS where these events can be processed.

Note. The list of the external system events supported by SecurOS is specified within the program code of the
Bolid, FortNet or Yantar internal module of integration.

Processing of the events generated by the external system can result in the changing state of the
external system object placed on Map (Map v2), displaying SecurOS form that requires an operator's
action (for example, displaying short message window to call police) or sending a control action to the
external system modules (only for which this possibility is specified in external system).

The program interface with the external system is provided by the SecurOS internal executor, that
corresponds to Bolid, FortNet or Yantar integration.

The root <integration_name> integration object is used to describe and control the external system from
inside SecurOS. The integration object tree (external system modules tree) is built automatically on the
base of the file, that describes external system configuration (see Setting Up Integration).

After the object tree is built, any of its entries can be placed on the Map (Map v2). Further operation with
objects of the external system placed on Map (Map v2) is similar to operations with typical SecurOS
objects placed on the Map (Map v2).

One of the following methods can be used to transfer control actions to the external module:
using Macro (see Macro);
executing Program (see Program);
as a result of operation executed with the object placed on Map (Map v2) (see Map or Map v2).

Logging of interactions between SecurOS and the external system and operations with the integration
object tree is performed separately - events generated by the external system are stored in the SecurOS
log, while operations with the external system object tree are stored in an independent log-file.

12.2 Setting Up Integration


To configure integration do the following:
1. In the SecurOS object tree create the Integration point object (child of the Computer object):

www.isscctv.com
SecurOS 196 Administration Guide
Light Integration

Figure 154. Integration point object settings


window

2. Click the Update configuration button. The internal integration module receives data from the
external system and builds the integration object tree (see SecurOS Integrations).
3. To complete configuration click OK.

12.3 SecurOS Integrations


SecurOS software distributive contains the dynamic link libraries that provide integration with the
following external systems:
Bolid;
FortNet;
Yantar.

The parent object for all integration types is Computer.

Intelligent Security Systems ensures stable operation of the integration for the following versions of the
external system software:
Bolid — ORION Pro version 1.11, release 2, build 1908;
FortNet — АРМ 1.4.2.15;
Yantar — Amber System - 5.2.3.

www.isscctv.com
SecurOS 197 Administration Guide
Light Integration

12.3.1 Bolid

Bolid integration object is used to provide integration with the FAAC (Fire Alarm/Access Control) Bolid
system:

Figure 155. Bolid integration object settings


window

Table 55. Bolid integration object settings

Parameter Description

IP address or network name of the computer where the Bolid


Host integration internal executor is running. Default value is
localhost.

Communication port for interaction between the external system


Port
and the Bolid integration internal executor. Default value is 8085.

User name to log into the Bolid system. Default value is


Login
ADMINISTRATOR.

User's password to log into the Bolid system. Default value is


Password
ORION.

Receiving configuration data from the external system and


Update configuration
rebuilding the external system's object tree within SecurOS.

OK (Cancel) Save/discard changes.

SecurOS supports the following Bolid system's objects (modules):


Bolid controller;
Bolid device;
Bolid reader;
Bolid loop;
Bolid relay.

www.isscctv.com
SecurOS 198 Administration Guide
Light Integration

Warning! Modules of the external system can be controlled with the help of Macros, Programs and Map
(Map v2) object control commands. Map (Map v2) or Event Viewer objects are used to monitor object states.

12.3.2 FortNet

FortNet integration object is used to provide integration with the AC (Access Control) FortNet system:

Figure 156. FortNet integration object settings


window

Table 56. FortNet integration object settings

Parameter Description

IP address or network name of the computer where the FortNet


Host integration internal executor is running. Default value is
localhost.

Communication port for interaction between the external system


Port
and the FortNet integration internal executor. Default value is 8090.

Receiving configuration data from the external system and


Update configuration
rebuilding the external system's object tree within SecurOS.

OK (Cancel) Save/discard changes.

SecurOS supports the following FortNet system's objects (modules):


FortNet computer;
FortNet controller;
FortNet controller loop;
FortNet controller card reader;
FortNet controller relay;
FortNet check point;
FortNet check point card reader;
FortNet loop group;
FortNet loop;
FortNet relay group;

www.isscctv.com
SecurOS 199 Administration Guide
Light Integration

FortNet relay.

Warning! Modules of the external system can be controlled with the help of Macros, Programs and Map
(Map v2) object control commands. Map (Map v2) or Event Viewer objects are used to monitor object states.

12.3.3 Yantar

The Yantar object is used to provide integration with the Yantar radiation monitoring system:

Figure 157. Yantar object settings window

Table 57. Yantar object settings

Parameter Description

IP address or network name of the computer where the Yantar


Host integration internal executor is running. Default value is
localhost.

Login User name to log into the Yantar radiation monitoring system.

Password User's password to log into the Yantar radiation monitoring system.

Receiving configuration data from the external system and


Update configuration
rebuilding the external system's object tree within SecurOS.

OK (Cancel) Save/discard changes.

SecurOS supports the following Yantar system's objects (modules):


Yantar root location;
Yantar gamma-ray sensor;
Yantar neutron sensor.

Warning! It is not possible to transfer control actions to the Yantar modules. Map (Map v2) or Event Viewer
objects are used to monitor object states.

www.isscctv.com
SecurOS 200 Administration Guide
Keyboard Shortcuts

13 Keyboard Shortcuts
This section describes shortcuts used to perform actions on different SecurOS objects.

13.1 Administration Toolbar


Table 58. Object tree keyboard shortcuts

Shortcut Description

Delete Delete the selected object

Enter Open the selected object properties window

Space Disable/enable the selected object

Ctrl+N Show object creation menu

Open all children branches for the selected object (plus additional
*
level on each key button pressed)

+ (Num Pad) Open a child branch for the selected object (one level)

- (Num Pad) Close a child branch for the selected object

Ctrl+F Open the search object window in object tree.

Enter Look for the next object with the search parameters.

Call context help section when object parameter settings window is


F1
opened

www.isscctv.com
SecurOS 201 Administration Guide
Appendixes

14 Appendixes
This section contains a description of system utilities and other additional information useful to
configure and operate the system.

14.1 Appendix A. Upgrading/Uninstalling Software


This section describes SecurOS upgrading and uninstalling specifics.

14.1.1 Upgrading Software

To upgrade software do the following:


1. Start the installation program by launching the setup file of the new software version.
2. Wizard will display the following window (see figure 158).

Figure 158. Software upgrade query

3. Click Yes to continue. Further installation steps are similar to ones for the initial installation (see
SecurOS Installation).

14.1.2 Uninstalling Software

Uninstalling SecurOS is done in two steps:


uninstalling software;
removing video/audio archives and configuration database (optional).
To uninstall SecurOS software do one of the following:
Launch the setup file of the currently installed software version. The system will display the
Program Maintenance window (see figure 159)

www.isscctv.com
SecurOS 202 Administration Guide
Appendixes

Figure 159. Program Maintenance Window

Select Remove option to uninstall the software, click Next button to continue.
In the Start Windows menu choose the following menu options All Programs SecurOS
Uninstall SecurOS.
SecurOS software will be uninstalled automatically.

Aside from uninstalling the software, you may want to delete all video and audio archives as well as
the configuration database, all of which are not deleted automatically by the InstallShield Wizard.

Thus, this step should be done manually: to delete archives, delete any \Video and \Audio folders
located in the root directory of your logical drive(s) (C:\Video, C:\Audio, D:\Video, D:\Audio
etc.).

To delete the configuration database (PostreSQL) launch the uninstall-postgresql.exe file from
the C:\Program Files\PostgreSQL\X.Y directory, or use Add or Remove Programs option. The
PostgreSQL directory in C:\Program Files\ will have to be deleted as well.

14.1.3 Release 6.2 Updating Procedure

Since SecurOS Release 7.0 utilizes advanced technology to provide synchronization of the network
configuration, the SecurOS Release 6.2 updating procedure is relative to the new architectural
requirements.

To update installed SecurOS Release 6.2 software, determine the network server of any type (Video
Server, Application Server or Administration Workstation) which will be assigned as the Conf iguration
Server, then do the following:
1. Software Updating On Configuration Server;
2. Updating Software On Peripheral Servers.

www.isscctv.com
SecurOS 203 Administration Guide
Appendixes

For details on the server configuration procedure when updating SecurOS software see the relevant
sections below.
14.1.3.1 Software Updating On Configuration Server
To update the Conf iguration Server do the following for the specific steps of the typical update
procedure:

1. Run the SecurOS setup file on the assigned Conf iguration Server.
2. During installation select Configuration Server to specify the server type.

When the server will start after software installation is completed, the last configuration stored on the
server before updating will be loaded.

Warning! Initial configuration (see Initial Configuration) with the help of the System Configuration Wizard
is not performed on the updated Conf iguration Server.

14.1.3.2 Updating Software On Peripheral Servers

Note. It is assumed that the software update procedure on the Conf iguration Server is successfully completed.

To configure Peripheral Servers do the following for the specific steps of the typical update procedure:
1. During the installation select Peripheral Server to specify the server type.
2. Launch SecurOS after the InstallShield Wisard is completed (see Launching And Configuring
SecurOS On Peripheral Servers).
3. System will display the following message (see figure 160):

Figure 160. Query to Specify Server Type

At this step it is necessary to delete the Release 6.2 configuration database from configured Peripheral
Server to ensure correct connection to the Conf iguration Server and allow for copying of the
configuration file. To delete old database and continue configuring click No.
4. System will launch the System Configuration Wizard and display the Security network server type
window (see figure 161).

www.isscctv.com
SecurOS 204 Administration Guide
Appendixes

Figure 161. Security network server type

Select Peripheral Server option.


5. Further steps of the configuration procedure are similar to the SecurOS's first launch on the Peripheral
servers (see Launching And Configuring SecurOS On Peripheral Servers section).

14.2 Appendix B. Quick Video Subsystem Configuration

By default, the system object tree consists of the following objects after SecurOS installation and starting
with empty database: System, SecurOS, Computer, Desktop, Monitor.

To create and configure a basic object of the video subsystem:


1. Configure Computer object parameters:
Network address — click [<] button near the field (127.0.0.1 value is set when there is no
network connection).
Disks to store archive — choose Read/Write from the list in Video and Audio column of the
table. Then video and audio archive will be recorded on to selected drives.

Note. It is not recommended to select system drive with Operating System installed for read/write settings.

2. Create the Video Capture Device object(s). This object represents the device the video signal is coming
from (TVISS board, IP camera, IP encoder, etc.). Configure the Video Capture Device parameters:
Type — select device type corresponding to the device where video is coming from:
If video is coming from camera connected to one of the TVISS boards, select the corresponding
TVISS option.

www.isscctv.com
SecurOS 205 Administration Guide
Appendixes

If video is coming from an IP camera/encoder, select the corresponding manufacturer of the IP


camera/encoder.
For use of IP devices using standards protocols, the ONVIF, or Generic RTSP options can be
used. The Device must support these Protocols.
To play pre-recorded videos (for demo or testing purposes) the Virtual or Player AVI options
can be used.
PCI Channel, Format — if using TVISS boards, set these parameters accordingly.
IP Address, User, Password — if using IP devices set these parameters accordingly.
3. Create the Camera object (child object of the Video Capture Device object). This object represents a
single video stream. Specify the camera identifier in the ID field (you can begin with 1 and keep
incrementing by 1), then specify its Title (e. g. Office, Street, Home etc.). You may also use default
ID/Name.

Notes:
1. For cameras connected to TVISS-RT/MX boards, one Video Capture Device object will be created (per
board) with multiple Cameras as child objects.
2. For single lens IP cameras, one Video Capture Device object will have one Camera child object.
3. For cameras with more than one lens, one Camera object will be created for each lens. The Camera
objects will be child objects of the same Video Capture Device.
4. For cameras connected to IP encoders, one Video Capture Device object will have as many Camera child
objects as cameras connected to the encoder.

Configure the Camera object parameters:


Channel number — select from spin box:
If this camera is connected to a TVISS board, then this number should correspond to the number
on the label of the input of the communication cable (dongle).
If this camera is a single lens IP camera, then default value of 1 can be used.
If camera with more than 1 lens is being used, then one Camera object will be created for each
lens. The Camera objects will have different channel numbers, incrementing from 1.
If this camera is connected to an IP encoder, then the number should correspond to the port the
camera is connected to.
Pan/ Tilt/ Zoom — select Use to use IP-camera native telemetry, or specify previously created third-
party PTZ device which will be used to control the analog camera.
Image Settings — specify parameters on the Advanced tab.
4. Configure Monitor object parameters:
Add cameras to the monitor. To add all the cameras of the system, click Add all button near the
Cameras table. To add cameras individually, double click in the first empty field under the Id
column (in the Camera table) and select the corresponding camera identifier. To add next camera,
select the last row of the table and press  key. To delete a camera from the table, select
corresponding row and press Ctrl+Delete on keyboard.

14.3 Appendix C. System Utilities


SecurOS software comes with several helper utilities. You can find them in the \Tools sub-folder of
SecurOS installation folder or in SecurOS installation folder itself:

ISS Hardware Report Utility (HardwareReportUtility.exe) reports all installed TVISSx video

www.isscctv.com
SecurOS 206 Administration Guide
Appendixes

capture cards and Guardant keys (see ISS Hardware Report Utility).


ISS System Report Utility (ISSInfo.exe) collects system information required by Intelligent
Security Systems Technical Support (see ISS System Report Utility).
ISS Media Export Utility (Backup.exe) plays archived video/audio and exports selected parts of
archive to AVI, ASF and BMP files (see ISS Media Export Utility).
gtUSB Configuration Utility (gtusbconfig.exe) configures video capture USB devices
(see gtUSB Configuration Utility).
ISS Startup Configuration Utility (RegService.exe) configures SecurOS to run as a Windows
Service or as a normal application (see ISS Startup Configuration Utility).
DSAdmin Utility (dsadmin.exe) defines connection strings to databases used by SecurOS (data,
protocol, video; see DSAdmin Utility).
ISS Database Update Utility (idb.exe) defines access to system database: for updating and
configuring purposes (see ISS Database Update Utility).
ISS Object Types Database Editor (DDI.exe) edits the SecurOS object types database (not actual
Securos database) (see ISS Object Types Database Editor).

14.3.1 ISS Hardware Report Utility

Location:
SecurOS folder>/Tools/HardwareReportUtility.exe

Start menu:
Start Programs SecurOS Hardware Report Utility

This utility is used to detect all installed TVISSx video capture cards and Guardant keys (see
figure 162). The report is used to generate the system license key file key.iss by the Intelligent
Security Systems Technical Support Team.

www.isscctv.com
SecurOS 207 Administration Guide
Appendixes

Figure 162. ISS Hardware Report Utility window

To save the utility report into a file:


1. Click Copy Report to Clipboard button in the utility window.
2. Create empty text file in any word processing program (Notepad, Microsoft Word etc.).
3. Paste clipboard content and save the report file.

This utility can also be used to check the correct installation of the above hardware devices and
associated drivers: if the hardware identifier is missing, this means that device drivers were not
installed properly.

14.3.2 ISS System Report Utility

Location:
SecurOS folder>\Tools\ISSInfo.exe

This utility is intended for collecting technical information about the SecurOS installation and your
computer (see figure 163). This information is necessary to resolve problems and will always be
requested by the Technical Support Team.

www.isscctv.com
SecurOS 208 Administration Guide
Appendixes

Figure 163. ISS System Report Utility window

The ISS System Report Utility collects the following data:


the Modules file which contains the list of all dll and exe-files in the system and information about
their version from the SecurOS folder.
the CurrentDriver file contains information on the version of the installed drivers of TVISSx
boards.
the DallasCodes file contains information on codes of the installed devices: TVISSx or Guardant.
the ISS_Config file contains information from the following registry folder:
HKEY_LOCAL_MACHINE\SOFTWARE\ISS.
the data, videoi, and protocol files contain information from the securos, fsindex and
protocol databases accordingly.
the SystemInfo file contains information about the computer on which the SecurOS was installed
and on which the given utility has been started.

The \ISSInfo\cur folder contains log and dump files, program and script files, and also the
key.iss file.

The \ISSInfo\devices folder contains xml library files of integrated cameras and video servers.

The \ISSInfo\system32 folder contains files from the system libraries.

Note. ISS System Report Utility does not collect any private information.

To start the process, click the Go button. The \Tools\ISSInfo subfolder with the collected data will
be created. The contents of this directory will be zipped/compressed into single archive file and will be
placed into the specified directory. You can change the output directory before starting the process of
data collection by pressing the Select button and choosing the target directory and the file name.

If the Include full crash dumps option is selected, then all the logs and both minimal and full dumps
generated after system crash will be included in the ISSInfo report (increasing the report size).
Otherwise only logs and minimals dumps will be included.

If the Collect additional databases option is selected, then all SecurOS related databases will be
included into ISSInfo report. Otherwise only the configuration database (securos) will be included.

www.isscctv.com
SecurOS 209 Administration Guide
Appendixes

14.3.3 ISS Media Export Utility

Location:
SecurOS folder>$\backslash$Backup.exe

Start menu:
Start Programs SecurOS ISS Media Export Utility

Figure 164. ISS Media Export Utility window

This utility (see figure 164) is used to playback and also export video and audio archives from native to
AVI/ASF format.

Warning! The utility can be used to export video archives on video servers only.

To export video:
1. Specify ID of Camera object.
2. Define the Start time and Stop time for the archive search.
3. Optionally, define password for video archive in Export Settings dialog (see figure 164) (click the
Settings button to open dialog). You will be asked for a password if current password is not suitable
for selected camera.
4. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
5. Click the Rescan archive button to scan for media that fits the specified time range. If the archive is
password-protected and the password from Export Settings dialog is not set or invalid, you will be
asked for the password.
6. Use the slider or the Rewind/Forward buttons to navigate through the selected time range. Use the
Play/Stop buttons to start and stop playback.

www.isscctv.com
SecurOS 210 Administration Guide
Appendixes

7. If needed, change your selection by repeating steps 1— 6.


8. Define export settings (video/audio codecs, output directory, etc.) in the Export Settings dialog,
make sure you specify a valid password for the video archive if video is password-protected.
9. Click Export button to start the procedure. The process may take several minutes depending on the
length of the video and export settings.
10.While exporting is in progress, you can click the Stop button to stop export at this point. The part
that has already been exported will be saved as a AVI or ASF file.

Note. While playing or navigating through the archive click the Save frame to BMP button to export a single
video frame in BMP format. Files will be saved to the directory specified in the Export Settings dialog.

Warning! To play quick converted video It is recommended to use the VLC media player.

14.3.3.1 Export Settings dialog

Figure 165. Export settings dialog window

Table 59. Export settings

Parameter Description

Common

www.isscctv.com
SecurOS 211 Administration Guide
Appendixes

Parameter Description

Path to a directory where output files will be saved. Type it


Target folder manually or use the button on the right to open Choose folder
dialog.

Use this option to split large output files to several smaller ones
with the specified size in megabytes. Default value is 650 MB.
Max. file size, MB
Warning! Due to architectural limitations of the AVI container format, file
size cannot exceed 2000 MB if the File type parameter is set to AVI.

File type Select option corresponding to output file format (AVI or ASF).

If your video archive is password-protected, set the valid password


Password
here before exporting video.

Export

Video only Select the checkbox to export only video (without audio).

Video codec Select video codec.

Select the checkbox to perform a quick video export. Quick video


export can be performed only for archives created with H.263,
H.264, MPEG-4 or MJPEG. codecs.

Notes:
Quick video export
1. Video codec, Video quality, FPS Divider, File and Position
parameters will be ignored in Quick video export mode.
2. If Quick video export is selected, but the conversion is not
possible for some reason, then the parameters specified above
will be used.

Video quality Select required quality of the output video file.

Audio codec Select audio codec.

Select the checkbox to export video synchronized with audio. Quick


audio export can be performed only for archives created with GSM,
PCM or ADPCM codecs.

Notes:
Quick audio export
1. Audio codec and Audio quality parameters will be ignored in
Quick audio export mode.
2. If Quick audio export is selected, but the conversion is not
possible for some reason, then the parameters specified above
will be used.

Audio quality Select required quality of the output audio.

www.isscctv.com
SecurOS 212 Administration Guide
Appendixes

Parameter Description

Set FPS divider parameter.


Warning! Option works correctly only for video produced with no delta-
FPS divider frame algorithm. For example, MJPEG— for IP-cameras or High
quality, High Resolution and Standard— for analog cameras
(all for min compression level). In other cases, using this option can cause
frame twitching and block skipping.

Logo

File Select logo file name (PNG file format).

Position Select logo position on the frame.

14.3.3.2 Command-line parameters


You can use the Media Export Utility (see ISS Media Export Utility) from the command-line and from
batch files to automate the exporting process. When executed from command line, currently defined
export settings will be used. To change these settings, open the Media Export Utility in normal
(window) mode, setup export parameters, then close utility. Required parameters can also be set when
launching utility from command line.

Media Export Utility command-line syntax (example contains only frequently used parameters):

backup --out <out_file> --cam <camera_number> --from "<start_date_time>"


--to "<end_date_time>" --span <span_size> --silent

Table 60. Command-line parameters

Parameter Type Description

Search parameters

--cam <number> ID of camera from which video will be converted.

<date> Start date/time of the archive to export. Example: 19-


--from
02-05 00:00:00.

<date> End date/time of the archive to export. Example: 20-


--to
02-05 11:59:59 PM.

Used to export frame defined with --cam and --from


--frame
parameters to .BMP image.

Search directory
Warning! If --archive-folder or --archive-path parameters are not set then only the operative
archive will be searched.

--archive-folder Long-term archive will be searched.

--archive-path <absolute path> Archive will be searched only in the specified directory.

Export parameters

www.isscctv.com
SecurOS 213 Administration Guide
Appendixes

Parameter Type Description

<full filename> Output filename include absolute path. For example,


--out
C:\export\out.avi.

--video-only Export video without audio.

--container <file type> File type. Possible values: AVI or ASF.

<number>/ Span to fragments up to. Specify a number (value in MB)


--span <string> or reserved variables: DVD (4.7 GB for using DVD disk),
or CD (650 MB for using CD disk).

<string> Codec used to export video. Possible values: MJPEG,


--video-codec
MPEG4.

<string> Codec used to export audio. Possible values: PCM, WMA,


--audio-codec
MP3.

--video-quality <number> Video quality. Number in range of [0; 100].

--audio-quality <number> Audio quality. Number in range of [0; 100].

--raw-video Quick video export.

--raw-audio Quick audio export.

--fps-divider <number> FPS divider. Number in range of [1; 100].

Set --silent parameter to start utility in silent mode.


Set --help parameter to display list of parameters.

Example 1:

backup --cam 1 --from "27-12-06 18:36:42 --to "28-12-06 22:43:12" --span 2

Description: export video archive of camera 1 for the defined period spanning to fragments up to 2 Mb.

Example 2:

backup --out "C:\custom path\pwnage.avi"


--from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span cd

Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).

Note. Camera number and other settings are taken from the utility configuration.

14.3.4 gtUSB Configuration Utility

Location:
<SecurOS root folder>\Tools\gtusbconfig.exe

www.isscctv.com
SecurOS 214 Administration Guide
Appendixes

This utility is used to configure parameters of USB video capture devices. These devices correspond to
selection of USB 2.0 value from the Type list of the Video Capture Device object settings (see Video
Capture Device).

Note. The utility supports Grand AV USB 2.0 Pro and X Guard USB devices manufactured by Grandtec.

Warning! Before utility starts, it is necessary to install drivers and plug-in the video capture device, then run
SecurOS system, create and configure corresponding object in SecurOS.

On starting utility, the video capture device properties window appears (see figure 166). When finish
configuration, click OK button to apply parameters or Cancel to cancel.

Figure 166. gtUSB Configuration Utility window

Table 61. gtUSB Configuration Utility parameters

Parameter Description

Video Sources

Enable these fields to process input image: frame vertical flipping or


Flip, Mirror
mirroring.

Select one of these options corresponding to output video signal —


PAL, NTSC
PAL or NTSC.

www.isscctv.com
SecurOS 215 Administration Guide
Appendixes

Parameter Description

Select one of these options corresponding to input video signal


Composite Video, S-Video
interface.

Debug Mode Enable this field to activate debug mode of the device.

Factory Default

Reset Click this button to restore factory default settings.

14.3.5 ISS Startup Configuration Utility

Location:
SecurOS folder>\Tools\RegService.exe

This utility configures SecurOS to run as a Windows service or as a normal Win32 application
(see figure 167). If you choose Run as service, SecurOS will start automatically at Operating System
startup.

Figure 167. ISS Startup Configuration


Utility window

To properly configure SecurOS as a Windows service it is recommended to use the SecurOS Control
Service utility that itself runs SecurOS as a service.

Warning! For security reasons in Windows 7 and Windows 2008 Server, Services only run in a session with
zero identifier. While in the 0 session, interactive applications cannot be loaded. For this reason, the
functionality of the SecurOS Administrator Workstation and SecurOS Operator Workstation when running in
daemon mode is limited. Interaction with the application interface in this case can only be done through the
Interactive Services Detection.

Warning! After SecurOS is updated it is necessary to configure SecurOS to run as a Windows service.

Location:
SecurOS folder>\securos_svc.exe

Help information on syntax and utility keys is displayed when running this utility from the command
line with the -h parameter.

SecurOS Control Service} Utility Syntax:


securos_svc -h -i n -r -s -k -t n -u s -p s -l s -d
-h — gives utility keys with description.
-i n — register SecurOS as a Windows service. Specify n service running type (1 — disable, 2 —

www.isscctv.com
SecurOS 216 Administration Guide
Appendixes

automatic, 3 — manual).


-r — delete service from Windows services list.
-s — run the service.
-k — stop the service.
-t — specify service running type of already registered service (1 — disable, 2 — automatic, 3 —
manual).
-u s — specify s user name to run service.
-p s — specify s user password to run service.
-l s — specify names of dependent services.
-d — enable verbose mode.

It is recommended to register automatic start of SecurOS service for correct work of SecurOS and to set
dependency on PostgreSQL service:
securos\_svc.exe -i 2 -l "PostgreSQL8.4"

It is necessary to check real name of PostgreSQL service on your computer (the above example uses
PostgreSQL8.4).

To find PostgreSQL service name:


1. Open Windows Control Panel (Start Settings Control Panel).
2. Choose Administrative Tools, then Services.
3. Locate PostgreSQL8 service in the services list and choose Properties. Service name is specified in
Service name field.

After such registration, upon starting of SecurOS service it will wait until the PostgreSQL service starts.

Note. It is recommended to use automatic Windows login in the case when SecurOS is configured as a
Windows service (see automatic login configuration description in Windows XP Automatic Login
Configuration.

14.3.6 DSAdmin Utility

Location:
SecurOS root folder>\dsadmin.exe

This utility stores the connection strings to the 3 default SecurOS databases. The SecurOS database is
intended for storing settings for all the system objects. The Protocol database stores records of the
events/reactions occurring in the system. The fsindex database stores data about recording/motion
alarms and about bookmarks.

Note. All connection strings are automatically defined during SecurOS installation.

www.isscctv.com
SecurOS 217 Administration Guide
Appendixes

Figure 168. DSAdmin Utility window

There are four fixed fields to set connection strings:

Basic Data — string to connect to general database which holds settings for all the system objects
(the Securos database).
Protocol — string to connect to database of the events occurring in the system (the Protocol
database).
Synchro Source — string to connect to database of synchronization (optional).
Videoi — data recording about alarms and about video archive bookmarks (the fsindex
database).

Note. There is an additional field New feature to set and configure a new database.

To change a connection string, click its Build button. To test a connection — Test button.

On Build button click Data Link Properties and a window will appear that will help build the
connection string:

Provider tab: select PostgreSQL OLE DB Provider from the list.


Connection tab:
Type in server's name or address in Data Source field (e. g., 127.0.0.1, localhost).
Type in database name in Location field (e. g., securos_db).
Type in database account in User Name and Password fields.

To apply changes in connection strings, click OK button. The changes will be applied and the utility
window will be closed.

14.3.7 ISS Database Update Utility

Location:
<SecurOS root folder>\idb.exe

This utility allows to configure and update SecurOS database.

www.isscctv.com
SecurOS 218 Administration Guide
Appendixes

Figure 169. ISS Database Update Utility window

Table 62. ISS Database Update Utility parameters

Parameter Description

String to connect to database. Type in manually according to mask


Database Connection String
or click Select DB button to build it automatically (see below).

Path to database description file. Type in manually or click Select


Database Descriptor Path button to choose the corresponding file from the standard Open
window.

Update Database button Start SecurOS database update process.

Clicking Select DB button will cause Data Link Properties window displaying. For the detailed
description see DSAdmin Utility.

14.3.8 ISS Object Types Database Editor

Location:
SecurOS root folder>\Tools\DDI.exe

This utility allows the viewing and editing of the SecurOS object types database. This utility can also be
used to preview files or alter file names for sound notifications (see figure 170).

www.isscctv.com
SecurOS 219 Administration Guide
Appendixes

Figure 170. ISS Object Types Database Editor

The left pane of the utility window contains the list of all possible system objects, which can be used by
the loaded SecurOS configuration. The right pane contains the following tabs, which allow to view and
edit properties of the different types of the SecurOS objects:
Names — displays the selected object name and its group name. Also may be used to search for
object by its name or type (see Names Tab).
Events — contains the selected object events and its parameters: event description, window type,
sound support, net blocking and log (see Events Tab).
Reacts — contains the selected object commands and its parameters: command description and
flags (see Reacts Tab).
Markers — contains a list of the selected object markers (see Markers Tab).
States — contains a list of the selected object's possible states and its parameters: image file name,
description, enabling blinking, etc. (see States Tab).
State rules — displays rules for changing states of the selected object's type (see State Rules Tab).

To see certain object information, select it in the objects tree. Data on the chosen object will be displayed
on tabs.

www.isscctv.com
SecurOS 220 Administration Guide
Appendixes

14.3.8.1 Names Tab


This tab contains the name of the chosen object and its group (see figure 171). Object search on its type
or identifier can be started from this tab.

Figure 171. Names tab of Object types database editor

To find an object by its type:


1. Specify part or complete object type name/identifier in the "Search by name" field. The list of objects
containing the specified value in their names will appear in the table below.
2. Select the required object in the table. Data on the chosen object will be displayed on all tabs.

14.3.8.2 Events Tab


This tab contains the table of system events which can be generated by the selected object type
(see figure 170).

Table 63. Events Tab Table - Column settings and Edit window actions

Parameter Description

Name Event identifier which is generated from selected object.

Description Event description.

www.isscctv.com
SecurOS 221 Administration Guide
Appendixes

Parameter Description

Additional system reaction on the event (alarm/informational


window color settings). The row will be colored with the chosen
color. Possible values:
Message handling
Alarm window (red) — red colored highlight on the
incoming event.

Information window (blue) — blue colored highlight.

Sound accompanying event. Enable this field to specify sound file


Sound support name like this: OBJECT NAME_EVENT NAME_N, where N is the
actual object name in the SecurOS object tree.

Event notification will not transfer into security network in case of


Net blocking
local event. Enable this field to turn off sending of notifications.

Event will not be logged in the system log. Enable this field to turn
Don't log
off event logging.

To edit system event table cells, select a field for editing and right-click. Context menu with available
actions will appear.

Context menu contains the following items:

Add — add event into the table (all parameters will be specified). Edit window will appear where
all fields of the event can be specified (see above).

Note. Only events that always exist for a chosen object can be created (on developing system stage).

Edit — edit chosen event parameters. Events parameter editing window will appear.
Delete — delete chosen events. Deleted events will no longer have an effect on the system.
Copy events — copy event parameters into clipboard.
Paste events — add event from clipboard into the table.
Add event for all objects — equal to Add item, but event is added for all system objects.

www.isscctv.com
SecurOS 222 Administration Guide
Appendixes

14.3.8.3 Reacts Tab


This tab contains the reactions table for the chosen object type.

Figure 172. Reacts tab of Object types database editor and Add window

Table 64. Reacts tab Table - Column settings and Edit window actions

Parameter Description

Reaction Reaction identifier of the selected object.

Description Reaction description.

Additional reaction flags. The row will be colored with chosen


Flags color. Possible value:

Arm region — certain reaction relates to arm or disarm.

To edit system reacts table cells, select a field for editing and right-click. Context menu with available
actions will appear.

Context menu contains the following items:

Add — add react into the table (all parameters will be specified). Edit window will appear where
all fields of the reaction can be specified (see above).

Note. Only reacts that always exist for a chosen object can be created (on developing system stage).

www.isscctv.com
SecurOS 223 Administration Guide
Appendixes

Edit — edit chosen react parameters. Reacts parameter editing window will appear.
Delete — delete chosen reacts. Deleted reacts will no longer have an affect on the system.
Copy reacts — copy react parameters into clipboard.
Paste reacts — add react parameters from clipboard into the table.

14.3.8.4 Markers Tab


This tab contains icons table which will be depicted on a map (see Maps Working Principles) for
chosen object type.

Figure 173. Markers tab of Object types database editor and Markers window

Table 65. Markers tab Table - Column settings and Markers window actions

Parameter Description

Icon file name (with bmp extension).

Filename Note. Corresponding file has to be in the \Bmp sub-folder of system


root directory!

Name Icon description.

To edit markers table cells, select a field for editing and right-click. Context menu with available actions
will appear.

Context menu contains the following items:

Add — add icon into the table (all parameters will be specified). Edit window will appear where all
fields of the new icon can be specified (see above).

www.isscctv.com
SecurOS 224 Administration Guide
Appendixes

Note. Corresponding file has to be in the \Bmp sub-folder of system root directory.

Edit — edit chosen icon parameters. Icons parameter editing window will appear.
Delete — delete chosen icons. Deleted icons will no longer have an affect on the system.
Copy markers — copy icon parameters into clipboard.
Paste markers — add icon parameters from clipboard into the table.

14.3.8.5 States Tab


This tab contains table of all possible states for chosen object type.

Figure 174. States tab of Object types database editor and State window

Table 66. States tab Table columns settings and States window actions

Parameter Description

Name State name.

Name of icon file (with bmp extension) displaying the object state on
map.
Image
Note. Corresponding file has to be in \Bmp subfolder of system root
folder!

Description State description.

www.isscctv.com
SecurOS 225 Administration Guide
Appendixes

Parameter Description

Additional state parameters. Object icon on a map will be blinking


on this state' coming. Possible value:
Blinking
Blinking on alarm — this state corresponds to the alarmed
one.

To edit states table cells, select a field for editing and right-click it. Context menu with available actions
will appear.

Context menu contains the following items:

Add — add state into the table (all parameters will be specified). Edit window will appear where all
fields of the new state can be specified (see above).
Edit — edit chosen state parameters. States parameter editing window will appear.
Delete — delete chosen states. Deleted state will not be used in system working.
Copy states — copy state parameters into clipboard.
Paste states — add state from clipboard into the table.

14.3.8.6 State Rules Tab


This tab contains transmission rules from one state of the object to another. Transmission rules control
initial and final states that the chosen object has upon receiving certain events. Initial event, initial state
and final state are specified in the table.

Note. If correspondence is not established, then the object transforms to default state.

www.isscctv.com
SecurOS 226 Administration Guide
Appendixes

Figure 175. State rules tab of Object types database editor and State rules window

Table 67. State rules tab Table - Column settings and State rules window actions

Parameter Description

Initial event for transmission. Select from the list of available events
Event
for chosen object.

Identifier of initial state for transmission upon event specified in the


From state previous field. If left blank then transmission will be done from any
state. Select from the list of available states for chosen object.

Identifier of final state for transmission upon event specified in the


To state
first field. Select from the list of available states for chosen object.

To edit state rules table cells, select a field for editing and right-click. Context menu with available
actions will appear.

Context menu contains the following items:

Add — add state rule into the table (all parameters will be specified). Edit window will appear
where all fields of the new state rule can be specified (see above).
Edit — edit chosen rule parameters. State rules parameter editing window will appear.
Delete — delete chosen rule. Deleted rules will no longer have an affect on the system.
Copy state rules — copy state rule parameters into clipboard.
Paste state rules — add state rule from clipboard into the table.

www.isscctv.com
SecurOS 227 Administration Guide
Appendixes

14.4 Appendix D. TCP/IP Ports Used by SecurOS


SecurOS and its modules use a list of TCP/IP ports for interaction.

Warning! The third-party applications should not use the ports that are used in the SecurOS software.

You should check your firewall settings and open the following ports in both directions for SecurOS
executable files *.exe located in SecurOS program directory.
Table 68. TCP/IP Ports

Service Port numbers

Core

21111 (this port must be opened prior to installing


Core interconnection
SecurOS)

Core services

Graphical map 21051

System event log 21055

Programmable keyboard 21005

IIDK interface 21030

Video subsystem

Video monitor, video capture, video 21050


cameras

PTZ device 21010

Live video stream 20900

Archive Converter 22131

Archive Converter Dialog 22138

Audio subsystem

Microphone 21004

Audio stream 20910

Audio player 21060

Alarm, Fire alarm subsystem

Alarm subsystem

Sensor, Relay 21003

Notification subsystem

Short Message Service 22092

E-mail Message Service 22093

www.isscctv.com
SecurOS 228 Administration Guide
Appendixes

Service Port numbers

Audible Notification Service 22094

Access Control subsystem

Access Control Service 21057

LPR Module

Detector camera 21033

Detector engine 21081

Operator UI 21062 (21091)

External database interconnection 22100

Transit Module

Server (Pro) 22120

Server (Light) 21121

Detector camera 21122

Face recognition Module

Engine 21080

Face data stream 20920

Operator UI 21061

Activity analyzer Module

Engine 22110

Engine (Pro) 22111

POS Module

POS Terminal 22110

Fraud detection engine 22111

Third-party integration subsystem

"Vista" 21015

"Rubezh" 21002

"Flex" 21043

"Apollo" 21014

"Bolid" 21025

www.isscctv.com
SecurOS 229 Administration Guide
Appendixes

14.5 Appendix E. Additional Windows Settings


Additional Windows settings provide correct SecurOS operation and are needed in order to use some
of the system functionalities, as well as to allow optimized system operation.

14.5.1 Installing Multimedia Components and Services under MS Windows


Server 2008 R2

Windows Server 2008 is completely a server operating system. There are no multimedia components
and services installed when you perform initial OS install. However, these system components are
necessary for proper SecurOS operation including audio subsystem, video capture boards and archive
converter and must be installed manually. To install required components and services do the
following:

1. Download Windows Media Services 2008 for Windows Server 2008 R2 Update Package from
Microsoft Download Center:
http:/ / www.microsoft.com/ en-us/ download/ details.aspx?id=20424
2. Install downloaded package files.
3. Enter Server Manager menu and do the following:
Select Roles tab;
Click Add Roles button;
Install Streaming Media Services with the Wizard and restart server if required.
4. Enter Server Manager menu and do the following:
Select Features tab;
Click Add Features button;
Install Desktop Experience with the Wizard and restart server.
5. Reboot Windows Server 2008.

14.5.2 SMTP Mail Server Installation and Configuration

Note. All actions must be performed under local or domain administrator account.

On the computer with Mail service installed open Control Panel and choose Add or Remove Programs,
then Add/ Remove Windows Components.

Choose Internet Information Services (IIS) from the list and click the Details button (see figure 176).

www.isscctv.com
SecurOS 230 Administration Guide
Appendixes

Figure 176. Windows Components Wizard

Enable SMTP Service in the list (see figure 177). Click OK and Next buttons.

Note. Windows installation CD might be necessary at this step.

Figure 177. Internet Information Services Components

To configure SMTP server for message delivery, after SMTP service installation:
1. Open Control Panel Administrative Tools Internet Information Services.
2. On the left side of the new window (see figure 178) right-click Default SMTP Virtual server (or

www.isscctv.com
SecurOS 231 Administration Guide
Appendixes

another name, given by default) and choose Properties.

Figure 178. IIS Services tree

3. Choose Access tab and click the Relay button.


4. Choose All in new Relay Restrictions window to allow delivery from all computers sending mail
through this server, and click OK (see figure 179).

Figure 179. SMTP server relay restrictions settings

5. Choose Delivery tab and click the Advanced button.


6. In new Advanced Delivery window (see figure 180) specify remote server to route all sending mail
in Smart Host field and click OK.

www.isscctv.com
SecurOS 232 Administration Guide
Appendixes

Figure 180. Mail routing remote server settings

7. Click OK to close SMTP server properties window and save all changes.
8. Choose Action Run to run SMTP server service.

14.5.3 Windows XP/Vista/Win7 Automatic Login Configuration

Note. All actions must be performed under local or domain administrator account.

Warning! Be careful when editing registry. Wrong use of the registry editor may result in serious problems
requiring Operating System re-installation.

To activate automatic Windows login:


1. Open registry editor (Start Run regedit).
2. Choose \HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon registry
branch and specify the following value for DefaultUserName parameter: user name used for
auto-login.
3. In the same branch create DefaultPassword string parameter and specify user password as its
value. user password.

Note. If DefaultPassword parameter value is not specified, then auto-login will be deactivated.

4. In the same registry branch specify 1 value for AutoAdminLogon parameter.


5. Close registry editor and reboot the computer. Windows login will be performed automatically after
the reboot.
 

www.isscctv.com
SecurOS 233 Administration Guide
Appendixes

To disable auto-login procedure or login to system under another user account, click-hold Shift button
after logoff or Windows XP/Vista/Win 7 restart. To apply this procedure permanently, specify 1 value
for ForceAutoLogon parameter in
\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon registry branch.

Warning! After auto-login configuration, each person that can physically access the computer, will get access
to its resources including all networks connected to this computer. In this case, password is publicly saved in
registry. Registry branch is accessible in remote mode by members of the Authorized Users group. Therefore,
auto-login procedure is justified when system physical security is guaranteed and registry access is forbidden
for users without special permission.

14.5.4 Disabling Disk Cleanup Master

It is recommended to disable system warnings on full disk for operator workstations / video servers.

To disable the disk cleanup master:


1. Open registry editor (Start Run regedit).
2. Choose
\HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer section and
create DWORD parameter with name NoLowDiskSpaceChecks.
3. Assign 0 value to created parameter to disable full disks check (1 — to enable this check again).
4. Close registry editor and reboot the computer.

14.6 Appendix F. Technical Support Information

Current section contains service information that is necessary on addressing to Intelligent Security
Systems Technical Support.

Note. Collected data have to be send by e-mail on Intelligent Security Systems Technical Support e-mail
address (see Getting Technical Support).

To ensure quick technical support, prepare the following technical information:

Warning! Data in items marked by "*'' are necessary to report.

1. (*) User (customer) name to address to.


2. (*) Organization name.
3. (*) User (or organization) contacts: phone, e-mail.
4. Name of a personal Intelligent Security Systems manager (on Intelligent Security Systems authorized
partner case). Otherwise, give the following data:
Company where the hardware and software components were purchased.
Actions proposed to solve the problems announced by a partner from whom the product was
purchased.
5. (*) Problem description.
6. (*) Actions results in the problem.
7. List of changes which result to the problem in case of applying after some changes in system
settings/configuration.

www.isscctv.com
SecurOS 234 Administration Guide
Appendixes

8. System and diagnostic information on computer and SecurOS system configuration obtained from
the ISS System Report Utility (see ISS System Report Utility for detailed information about utility).
If it is impossible to run the utility provide the following information:
(*) video capture cards serial number and Dallas code.

Note. Equipment Dallas code can be found by the ISS Hardware Report utility (see  ISS Hardware Report
Utility for detailed information about utility).

(*) name and version of the installed Intelligent Security Systems company software.
video capture cards driver version.
total number of video servers, remote administrator and monitoring (operator) workstations in the
system.
operating system (name and service pack version).
9. Another useful information, if possible. For example:
computer equipment configuration.
central processors load.
main and virtual memory used volumes.
network load.
network and network neighborhood configuration.

www.isscctv.com
SecurOS 235 Administration Guide
Index

Audible Notification Service object description, 186


Audio Capture Device object description, 167
Audio Player object description, 171
Audio property, 86

Index Authentication required, parameter, 193


Auto switching property, 103
Automation subsystem,
A Macros, 187
access level, Scripting, 187
Configure, 82
Control, 82 B
Full access, 82 Blinding detection property,
Inherited rights, 82 Camera, 129
No access, 82 Block system shutdown in NT service mode property,
View, 82 85
account,
postgres, 53 C
Acquisition Rate/Compressed property, 124 Camera,
Acquisition Rate/Row property, 124 Image settings, 117
Action, parameter, 191 Camera object description, 125
Activate desktop on startup property, 84 Camera property,
Activate watchdog property, 125 Monitor, 148
Active Directory Storage object description, 79 Camera, setting up, 155
Add all property, Cameras property,
Monitor, 148 Archive Converter, 140
Add all, parameter, Capture settings property, 125
Audio Player, 173 CC, parameter, 185
Additional information property, 79 CCTV keyboard or joystick object description, 177
Administration Mode, 54 Center on screen proprerty, 115
Alarm condition, parameter, 176 Change superuser password property, 74
Alarming property, 134 Channel property,
All property, Camera, 126
Archiver, 145 Channel to play, parameter, 172
Archiver Dialog, 153 Channel, parameter,
Allow configure system property, 82 Microphone, 170
Analyze decimated stream, parameter, 135 Relay, 176
Archive Converter Dialog object description, 151 Sensor, 175
Archive Converter object description, 139 Channel, parameter,
archive converting, temporary files, 120 Audible Notification Service, 186
Archive Engine property, 151 Clear all property (Zone), 135
archive recording, 118 Clear all, parameter,
frames number, 119 Audio Player, 173
frames queue, 119 Codec prorerty,
free disk space, 118 Archive Converter (Audio), 141
long-term archive, 120 Archive Converter (Video), 141
threshold, 119 Comments property, 92
Archiver Dialog object description, 152 Compressed resolution property, 124
Archiver object description, 144 Compression property,
Area zone object description, 91 Monitor, 148
Armed always property, 134 Compression, parameter,
Attachment, parameter, Microphone, 170
E-mail Message, 185 Compression, parameter,

www.isscctv.com
SecurOS 236 Administration Guide
Index

Compression, parameter, Camera, 128


Audio Player, 173 Dwell time property, 149
Computer object description, 83
configuration, E
quick steps, 204 E-mail Message object description, 184
configuration examples, 153
E-mail Message Service object description, 183
domain for LDAP provider, 98 E-mail property, 79
domain for Windows NT provider, 97 Enable property, 113
standalone configuration, 153 Event redirection property, 76
Video Server and Operator Workstation, 154 Event Viewer object description, 112
Configuration property, 74
Event, parameter,
Contrast property,
Macro, 190
Camera, 130 events,
Zone, Motion detection, 134
event redirection, 76
Events property, 115
D Export Engine, 209
Date, Period, parameter, 189 Export engine property, 150
Days of week, parameter, 189 Archive Converter Dialog, 152
Days property, 146 Export to property, 142
Decimate on the server property, 141 External Window object description, 113
Decimation property, 141
Defocusing detection property, F
Camera, 130 Facility code property, 76
Delay, parameter, 171
Fetch property, 145
Department object description, 78
File type property, 141
Desktop object description, 102
Fill all property, 135
Device, parameter, 185
For IP-device, parameter, 168
Disable alarm mode control property, 151
For Sound Card or Sound Circuits of the TVISS Video
Disable frame export and print property, 151 Capture Cards, parameter, 169
Disable if Event Viewer exists, parameter, 186 For SoundMixer module, parameter, 169
Disable image adjustment property, 151 Forbid to hide interface property, 81
Disable Local Protocol property, 85 Format property,
Disable PTZ control via mouse property, 151 Video Capture Device, 124
Disable recording control property, 151 FPS divider property, 141
Disable shared PTZ control property, fps property,
Camera, 131 Monitor, 148
Disable system shutdown for user property, 81 Frames per second property, 146
Disable visualization property, 151 Free GB property, 86
Disable wiper control property, 151 From, parameter, 184
Display property, Full FPS on alarm property,
Archive Converter Dialog, 152 Camera, 128
Archiver Dialog, 152
Map v2, 107
Display prorperty,
G
Gain, parameter, 170
Event Viewer, 113
gtUSB Configuration Utility, 213
Display titles property, 151
Guardant key, 206
Drive property, 86
DSAdmin Utility, 216 installation, 22
DTR, RTS property, 138
Duration of post-recording property, H
Camera, 128 Hardware Acceleration property, 150
Duration of pre-recording property, Hardware, parameter, 176

www.isscctv.com
SecurOS 237 Administration Guide
Index

HDD property, 145


Hidden, parameter, 190 K
Hide, parameter,
keyboard shortcuts, 200
Audio Player, 172
Holidays property,
Security Zone, 76
L
Holidays, parameter, Layouts type property, 148
Security Zone, 189 Level, parameter, 171
Host property, Microphone, 170
Bolid integration, 197 License key, 23
FortNet integration, 198 expiration date remainder, 61
Yantar integration, 199 expiration date remainder setup, 62
HTML Dialog object description, 114 request, 23
HTML Form object description, 114 updating, 61
Light Detector object description, 136
I Live Resolution property, 124
Local, parameter, 190
ID, 56
Log on using Secure Password Authentication (SPA)
Id property, property, 80
Archiver, 146 Login property,
Archiver Dialog, 153 Bolid integration, 197
Department, 78 Yantar integration, 199
Monitor (Cameras), 148 Login, Password, parameter, 184
Monitor (Display), 148
User Account, 79
Id property (PTZ Device), 139
M
Macro object description, 189
Id, parameter,
map,
Macro (Actions), 191
creation, 99
Macro (Event), 190
layers image, 100
ID, parameter,
moving objects to operator workstations, 101
Audio Player, 172
working with layers, 103
Identifier (Presets) property,
Map object description, 103
Camera, 131
map v2,
IIDK Interface object description, 192
layers, 109
Image Processor object description, 146
password, 112
Import/Export, parameter, 192
Map v2 object description, 106
Inner zone property, 137
Maximum protocol database size, MB property, 86
Integration with 3rd Party Systems, 188
Memory frames property, 135
IP address property, 124
Message field, parameter,
IP-Device Manager object description, 63
ISS Database Update Utility, 217 E-mail Message, 185
Message, parameter,
ISS Hardware Report Utility, 206
Short Message, 186
ISS Media Export Utility, 209
Microphone object description, 170
ISS Object Types Database Editor, 218
Microphone property,
ISS Startup Configuration Utility, 215
Camera, 126
ISS System Report Utility, 207
Min, Max property, 150

J Mode property, 149


Model property,
joystick, Video Capture Device, 123
configuring, 165 Model, parameter,
Audio Capture Device, 168
Monitor object description, 147

www.isscctv.com
SecurOS 238 Administration Guide
Index

Monitoring center agent object description, 89 Simple Text API, 193


Program object description, 191
N Program property,
Name, 56 External Window, 113
Protect with password property,
Name of the system property, 74
Name pattern property, 143 Camera, 129
Protocol database length property, 76
Name property,
Protocol property,
Archiver Dialog, 153
Relay, 176
Department, 78
Protocol, parameter,
Region, 92
E-mail Massage Service, 184
User Account, 79
Provider property, 80
Name property (PTZ Device), 139
Providers property, 82
Name proprerty,
PTZ channel property,
Computer, 85
Network address property, 85 Camera, 131
PTZ Controller object description, 137

O PTZ Device object description, 138


PTZ protocol property, 138
Object tree, 54 Camera, 131
Child object, 54
Parent object, 54
OK/Cancel property (buttons), 135
Q
Quality property,
Operator property, 82
Outer zone (secondary) property, 137 Archive Converter (Audio), 141
Outer zone property, 137 Zone, 135
Quality prorerty,

P Archive Converter (Video), 141


Quick audio export property, 141
Pack, parameter, 185 Quick video export property, 141
Pan/Tilt/Zoom property,
Camera, 127
Parameters, parameter, 191
R
record buffer settings, 118
Parity property, 138
Recording mode property,
Password property,
Camera, 127
Bolid integration, 197
Reduce max FPS to property,
Monitor, 149
Camera, 128
User Rights, 82
regedit system registry editor, 119
Video Capture Device, 125
Region object descrption, 91
Yantar integration, 199
Relay number, parameter, 176
PCI channel property, 123
Relay, object, description, 176
setting up, 122
Remote system object description, 90
pgAdmin utility, 102
Remove after property,
Phone property,
Camera, 129
User Account, 79
Resource file property, 107
Phone, parameter,
Rights property, 81
Short Message, 186
Role property, 84
Port property,
Run macro at start property, 76
Active Directory Storage, 80
Run on, parameter, 191
Bolid integration, 197
FortNet integration, 198
PTZ Controller, 138 S
Port, parameter, Samplerate, parameter, 168
E-mail Message Service, 184 Save configuration property, 75

www.isscctv.com
SecurOS 239 Administration Guide
Index

Script text area, parameter, 192 Time Zone object description, 188
Security Zone object description, 75 Time Zone, parameter, 191
SecurOS Control Service utility, 215 Title (Presets) property,
Sensitivity property, Camera, 132
Camera, 130 Title property,
Light Detector, 137 Archiver, 146
Sensor, object, description, 175 Title, parameter,
Server property, 80 Macro (Actions), 191
Servers to connect property, 86 Macro (Event), 190
Session timeout, ms, parameter, 193 To, parameter, 184
Short Message object description, 185 Token property,
Short Message Service object description, 185 Monitor, 148
Show alarm cameras only property, 149 Type property,
Show alarmed levels property, 107 Microphone, 170
Show all cameras from table above property, 149 Video Capture Device, 123
Show all zones property, 135 Type, parameter,
Show camera IDs property, 151 Audio Capture Device, 168
Show camera list property, 149 Macro (Actions), 190
Show control toolbar property, 149 Macro (Event), 190
Show level list property, 107
Show PTZ control property, 151 U
Show single active camera only property, 150
Use credentials provided at system log on property, 80
Simple Text API object description, 192
Use default directory property, 115
Size property,
Use event filter property, 113
Camera, 130 Use event filter, property, 86
Zone, 135 Use primary domain controller property, 80
Smart Search property, 134
Use remote device property, 138
SMTP Server requires authentication, parameter, 184
Use secure connection, parameter, 184
SMTP Server, parameter, 183
Use SSL property, 80
SNMP agent object description, 95
Use standard script file property, 114
Sound card, parameter,
User account object, 96
Audible Notification Service, 186 User Account object description, 78
Audio Player, 172 User name, Password property, 80
SoundMixer object, 167
User property,
Source, parameter, 172
Video Capture Device, 124
Speed property, 138
User Rights object,
Split into files up to property, 141
settings for LDAP provider, 98
Store at least property,
settings for Windows NT provider, 98
Camera, 128 User Rights object description, 80
Store bookmarks and alarms NNN days property, 86
Subject, parameter, 185
superuser, 60
V
System object description, 74 Video Capture Device object description, 122
Video Capture Devices object description, 122
T Video property,
Computer, 86
technical support,
Zone, 135
gathering system information utility, 206 videomonitor,
how to get, 9
additional settings, 118
how to prepare service information, 233 Viewing property,
Time intervals, parameter, 189
Camera, 127
Time of acknowledgement of alarm event by the
operator property, 113

www.isscctv.com
SecurOS 240 Administration Guide
Index

W
Wiper property,
Camera, 131
Write secondary event parameters into protocol DB
property, 85

X
X, Y property, 115
X, Y, W, H property,
Archive Converter Dialog, 152
Archiver Dialog, 152
Event Viewer, 113
External Window, 113
HTML Form, 114
Map, 103
Map v2, 107
X, Y, W, H, parameter,
Audio Player, 172
X, Y, W, H, property,
Monitor, 148

Z
Zone,
working principles, 116
Zone object description, 132
Zone types property, 134

www.isscctv.com

You might also like