0% found this document useful (0 votes)
257 views174 pages

Security Center Installation and Upgrade Guide 5.6 SR1: Click For The Most Recent Version of This Document

Uploaded by

Ali Hıdır
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
257 views174 pages

Security Center Installation and Upgrade Guide 5.6 SR1: Click For The Most Recent Version of This Document

Uploaded by

Ali Hıdır
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 174

Security Center Installation and Upgrade

Guide 5.6 SR1

Click here for the most recent version of this document.


Copyright notice
© Genetec Inc., 2017
Genetec Inc. distributes this document with software that includes an end-user license agreement and is
furnished under license and may be used only in accordance with the terms of the license agreement. The
contents of this document are protected under copyright law.
The contents of this guide are furnished for informational use only and are subject to change without
notice. Genetec Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in
the informational content contained in this guide.
This publication may not be copied, modified, or reproduced in any form or for any purpose, nor can any
derivative works be created therefrom without Genetec Inc.’s prior written consent.
Genetec Inc. reserves the right to revise and improve its products as it sees fit. This document describes the
state of a product at the time of document’s last revision, and may not reflect the product at all times in the
future.
In no event shall Genetec Inc. be liable to any person or entity with respect to any loss or damage that is
incidental to or consequential upon the instructions found in this document or the computer software and
hardware products described herein. The use of this document is subject to the disclaimer of liability found
in the end-user license agreement.
Genetec, Genetec Clearance, Omnicast, Synergis, AutoVu, Federation, Stratocast, Sipelia, Citywise, the
Genetec Logo, the Mobius Strip Logo, the Genetec Clearance Logo, the Omnicast Logo, the Synergis Logo,
the AutoVu Logo, and the Stratocast Logo are trademarks of Genetec Inc., and may be registered or pending
registration in several jurisdictions. Other trademarks used in this document may be trademarks of the
manufacturers or vendors of the respective products.
All specifications are subject to change without notice.

Document information
Document title: Security Center Installation and Upgrade Guide 5.6 SR1
Document number: EN.500.002-V5.6.C1(1)
Document update date: April 19, 2017
You can send your comments, corrections, and suggestions about this guide to
[email protected].
About this guide
This guide explains how to install and upgrade Security Center components.

Notes and notices


The following notes and notices might appear in this guide:
• Tip. Suggests how to apply the information in a topic or step.
• Note. Explains a special case, or expands on an important point.
• Important. Points out critical information concerning a topic or step.
• Caution. Indicates that an action or step can cause loss of data, security problems, or performance
issues.
• Warning. Indicates that an action or step can result in physical harm, or cause damage to hardware.
IMPORTANT: Topics appearing in this guide that reference information found on third-party websites
were accurate at the time of publication, however, this information is subject to change without prior
notice to Genetec Inc.
Contents
Preface: Preface
Copyright notice . . . . . . . . . . . . . . . . . . . . . ii
About this guide . . . . . . . . . . . . . . . . . . . . iii

Chapter 1: Installing Security Center


Preparing to install Security Center . . . . . . . . . . . . . . . . 2
Activating .NET Framework 3.5.1 . . . . . . . . . . . . . . . . 3
Activating the Media Foundation feature . . . . . . . . . . . . . . 3
Security Center 5.6 system requirements . . . . . . . . . . . . . . . 4
Installing SQL Server on a separate drive . . . . . . . . . . . . . . . 5
Granting SQL Server permissions . . . . . . . . . . . . . . . . . 9
Security Center installation packages . . . . . . . . . . . . . . . 10
Security Center 5.6 SR1 installation prerequisites . . . . . . . . . . . . . 11
Installing Security Center . . . . . . . . . . . . . . . . . . 13
Unblocking files manually . . . . . . . . . . . . . . . . . . 14
Installing Security Center on the main server . . . . . . . . . . . . . . 15
Activating Security Center license using the web . . . . . . . . . . . . . 25
Activating Security Center license without Internet access . . . . . . . . . . . 28
Installing Security Center on an expansion server . . . . . . . . . . . . 33
Connecting expansion servers to the main server . . . . . . . . . . . 41
Installing Security Center Client . . . . . . . . . . . . . . . . . 44
Default ports used by Security Center . . . . . . . . . . . . . . . 49
Common communication ports . . . . . . . . . . . . . . . . 49
AutoVu-specific ports . . . . . . . . . . . . . . . . . . 50
Omnicast-specific ports . . . . . . . . . . . . . . . . . . 51
Synergis-specific ports . . . . . . . . . . . . . . . . . . 53
Disabling backward compatibility . . . . . . . . . . . . . . . . 55
Uninstalling Security Center . . . . . . . . . . . . . . . . . . 56
Completing the installation process . . . . . . . . . . . . . . . . 58

Chapter 2: Upgrading to Security Center 5.6


Supported upgrades from earlier versions of Security Center . . . . . . . . . . 61
Preparing to upgrade from an earlier release of Security Center 5.6 . . . . . . . . 62
Preparing to upgrade to Security Center 5.6 . . . . . . . . . . . . . . 63
Differences between LPR Manager 5.x and 5.6 . . . . . . . . . . . . . 64
Differences between Web Client 4.x and 5.6 . . . . . . . . . . . . . . 66
Differences between Server Admin 5.x and 5.6 . . . . . . . . . . . . . 69
Differences between Security Center 5.x and 5.6 partitions . . . . . . . . . . 71
Upgrading the Public partition from 5.x to 5.6 . . . . . . . . . . . . . 73
Backward compatibility requirements for Security Center . . . . . . . . . . . 74
Supported Federation features for Security Center 5.6 SR1 . . . . . . . . . . 78
Upgrading from an earlier release of Security Center 5.6 . . . . . . . . . . . 79
Upgrading Security Center from 5.4 or 5.5 to 5.6 . . . . . . . . . . . . . 80
Upgrading Security Center from 5.3 to 5.6 . . . . . . . . . . . . . . 81
Upgrading Security Center from 5.2 to 5.6 . . . . . . . . . . . . . . 82

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  iv
Upgrading Security Center from 5.1 to 5.6 . . . . . . . . . . . . . . 83
Upgrading Failover Directory systems from a previous version or release . . . . . . . 84
What Security Center client features are available when the Directory service is offline? . . . 85
Reactivating the Security Center license for Failover Directory systems . . . . . . . . 86
Reactivating your Security Center license using a license file . . . . . . . . . 87
Upgrading the Security Center main server . . . . . . . . . . . . . . 91
Upgrading expansion servers in Security Center . . . . . . . . . . . . . 93
Enabling the LPR Manager after an upgrade . . . . . . . . . . . . . . 94
Setting up the Archiver role for LPR . . . . . . . . . . . . . . . 94
Storage requirement for LPR images . . . . . . . . . . . . . . 97
Upgrading Security Center Client . . . . . . . . . . . . . . . . 99
Backing up databases . . . . . . . . . . . . . . . . . . . 100
Upgrading the Security Center Directory database . . . . . . . . . . . . 101
Shrinking Security Center databases after an upgrade . . . . . . . . . . . 103
About the Genetec Update Service . . . . . . . . . . . . . . . . 104
Logging on to the Genetec Update Service . . . . . . . . . . . . . . 105

Chapter 3: Automating Security Center installation


Silent installation in Security Center . . . . . . . . . . . . . . . 107
Preparing to perform a silent installation . . . . . . . . . . . . . . 108
Silent install command for Security Center . . . . . . . . . . . . . . 109
Installer (MSI) options . . . . . . . . . . . . . . . . . . . 111
Sample Security Center Server installation commands . . . . . . . . . . . 115
Sample Security Center Client installation commands . . . . . . . . . . . 117
Uninstalling Security Center 5.6 in silent mode . . . . . . . . . . . . . 118

Chapter 4: Troubleshooting
Troubleshooting: Error installing Microsoft .NET Framework, Return Code: 0x800f081f . . . . 120
Troubleshooting: Video stability and performance issues . . . . . . . . . . . 121
Troubleshooting: Files remain blocked after unblocking them manually . . . . . . . 122

Glossary . . . . . . . . . . . . . . . . . . . . . . . 123

Where to find product information . . . . . . . . . . . . . . . 166


Technical support . . . . . . . . . . . . . . . . . . . . 167

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  v
1
Installing Security Center
This section includes the following topics:
• "Preparing to install Security Center" on page 2
• "Security Center 5.6 system requirements" on page 4
• "Installing SQL Server on a separate drive" on page 5
• "Granting SQL Server permissions" on page 9
• "Security Center installation packages" on page 10
• "Security Center 5.6 SR1 installation prerequisites" on page 11
• "Installing Security Center" on page 13
• "Unblocking files manually" on page 14
• "Installing Security Center on the main server" on page 15
• "Activating Security Center license using the web" on page 25
• "Activating Security Center license without Internet access" on page 28
• "Installing Security Center on an expansion server" on page 33
• "Installing Security Center Client" on page 44
• "Default ports used by Security Center " on page 49
• "Disabling backward compatibility" on page 55
• "Uninstalling Security Center" on page 56
• "Completing the installation process" on page 58

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  1
Installing Security Center

Preparing to install Security Center


To make sure that your Security Center installation goes smoothly, you must perform a series of pre-
configuration steps.

What you should know


No server name can be longer than 15 characters. Security Center truncates all server names longer than
the maximum limit to 15 characters, causing errors when the system tries to access those servers.
Before installing Security Center:
1 Read the Security Center Release Notes
2 Review your system requirements to ensure that the minimum hardware requirements (servers and
workstations) and software requirements (Windows, web browser, and so on) are met.
3 Install the latest video and network drivers for your servers and workstations.
4 Make sure that the servers are not domain controllers.
5 Disable the power saving feature on all servers.
6 Make sure that Windows Update is not configured to automatically reboot your servers after installation
of updates.
7 If you are running a version of Windows prior to Windows 10, you must install Microsoft hotfix
KB2919355, followed by Microsoft hotfix KB2999226.
8 On each server, in the Adapters and Bindings settings where connections are listed in the order in which
they are accessed by network services, make sure that the network interface cards (NICs) to be used by
Security Center are located at the top of the list.
9 Verify the network connections between your servers, workstations, and units.
10 Verify the unicast and multicast network connections and settings.
11 Read the Security Center 5.6 SR1 installation prerequisites.
Security Center Installer automatically verifies and installs the software prerequisites on your system
but it is good practice to know what they are beforehand.
12 If you are upgrading:
a) Check the Security Center backward compatibility requirements.
b) Make sure the upgrade or migration path is supported.
For more information, see the Security Center Release Notes.
c) Back up your Directory and role-specific databases.
For more information, see the Security Center Administrator Guide for the current version of your
system.
13 Have your system ID and password in hand to activate your license on the main server.
Your System ID and password are found in the Security Center License Information document. Genetec™
Technical Assistance sends you this document when you purchase the product.
14 Make sure you have administrative privileges. If not, then the installation setup.exe must be run as
administrator.
You may need to be a Microsoft Windows Domain administrator to access databases and storage on the
machines. Check with your IT administrator.

15 (For Directory failover or VSS operation) Install SQL Server on a separate drive.
16 Grant the service users all necessary SQL server permissions.
17 Close Internet Explorer.
18 (Windows 7 only) Activate .NET Framework 3.5.1.
For Windows 8 and Window 2012, the .NET Framework feature is automatically enabled by the
InstallShield Wizard if you have an active Internet connection.
19 (Windows 2012 only) Activate the Media Foundation feature.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  2
Installing Security Center

20 Download the Security Center installation package.


21 Unblock any blocked files.
After downloading a Security Center installation package, the ZIP files may need to be unblocked before
their contents are extracted.

After you finish


Install Security Center.

Activating .NET Framework 3.5.1


If you want to install Security Center on a computer running Windows 7, you have to manually
activate .NET Framework 3.5.1.

What you should know


For Windows 8 and Window 2012, the .NET Framework feature is automatically enabled by the
InstallShield Wizard if you have an active Internet connection.
To activate .NET Framework 3.5.1.
1 Click Start > Control Panel > Programs and Features.
2 In the Programs and Features dialog box, click Turn Windows features on or off.
3 In the Windows Features dialog box, select the Microsoft .NET Framework 3.5.1 option, and click OK.

Activating the Media Foundation feature


If you want to install Security Center on a computer running Windows 2012, you have to manually activate
the Media Foundation feature.
To activate the Media Foundation feature:
1 Open Server Manager and click Add roles and features.
2 If the Before you begin page is displayed, click Next.
3 Select Role-based or feature-based installation as the installation type and click Next.
4 Select the appropriate server, and click Next.
5 On the Select server roles page, click Next.
6 On the Select features page, select Media Foundation and click Next > Install.
7 Select the option Restart the destination server automatically if required for the server to
automatically restart and apply changes after completing the installation.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  3
Installing Security Center

Security Center 5.6 system requirements


System requirements are the recommended hardware and software components that are required for your
product and system to run optimally.
For the latest Security Center 5.6 system requirements, click here.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  4
Installing Security Center

Installing SQL Server on a separate drive


Depending on your deployment requirements, you might be required to install SQL Server on a drive that
is separate from the system drive (typically the C: drive). You must perform this procedure before installing
Security Center components.

Before you begin


If you are installing SQL Server Standard or Enterprise edition, you must purchase it from Microsoft, and
download the installation package.

What you should know


You must install SQL Server on a separate drive in the following situations:
• You plan to set up Directory failover and load balancing. In this case, install SQL Server on a server that
is different from all your Directory servers. For more information, see the Security Center Administrator
Guide.
• Microsoft Volume Shadow Copy Service (VSS) is enabled on your server. In this case, install SQL Server
on a drive that is separate from the system drive, and make sure that VSS only takes snapshots of the
system drive.
CAUTION: Do not disable VSS. Disabling VSS interferes with the operation of Windows System Restore.
To install SQL Server on a separate drive:
1 Do one of the following:
• If you are installing SQL Server Standard or Enterprise:
1 In Windows, navigate to the SQL installation package folder.
2 Double-click Setup.exe.
• If you are installing SQL Server Express:
1 In Windows, navigate to the Security Center installation package folder.
2 Click SC Packages > SQLExpress.
3 Double-click one of the following:
• If you are on a 64-bit computer: SQLEXRWT_x64_ENU.exe.
• If you are on a 32-bit computer: SQLEXRWT_x86_ENU.exe.
2 On the SQL Server Installation Center page, click New installation or add features to an existing
installation.
3 On the Installation Type page, select New installation or add shared features, and then click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  5
Installing Security Center

4 Read the software license terms, select I accept the license terms, and then click Next.
5 On the Feature Selection page, select the features you want to install.
6 In the Shared feature directory field, select where to install the SQL Server shared features.
7 Click Next.
8 On the Instance Configuration page, select a name for the SQL Server.
NOTE: The database server name is not case-sensitive, but it must meet all of the following criteria:
• It cannot match any of the SQL Server reserved keywords, such as DEFAULT, PRIMARY, and so
on. For a complete list of all reserved keywords, see https://msdn.microsoft.com/en-us/library/
ms189822.aspx.
• It cannot be longer than 16 characters.
• The first character of the instance name must be a letter or an underscore (_). Acceptable letters are
defined by the Unicode Standard 2.0, including Latin characters a-z and A-Z, and letter characters
from other languages.
• Subsequent characters can be letters defined by the Unicode Standard 2.0, decimal numbers from
Basic Latin or other national scripts, the dollar sign ($), or an underscore (_).
• Embedded spaces or other special characters are not allowed: backslash (\), comma (,), colon (:), semi-
colon (;), single quotation mark ('), ampersand (&), number sign (#), and at sign (@).

9 In the Instance root directory field, select where to install the SQL Server and all directory database
files, and click Next.
You can type a path, or browse for a folder.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  6
Installing Security Center

10 On the Server Configuration page, select the account name for each SQL Server service, and click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  7
Installing Security Center

11 On the Database Engine Configuration page, select the authentication mode for accessing the Database
engine, and click Next.
• Windows authentication mode: Windows username and password.
• Mixed mode: Windows administrators can access the database engine using either their Windows
credentials, or the password you specify here.

12 On the Error Reporting page, specify if you want to send errors to Microsoft, and click Next.
13 Wait for the installation to complete. This can take several minutes.
14 Click Close.
The SQL Server can now be used as your Security Center database server.

After you finish


Install Security Center on the main server, and use the new SQL Server as your database server.

Related Topics
Preparing to perform a silent installation on page 108

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  8
Installing Security Center

Granting SQL Server permissions


For the Directory role to run, service users who are not Windows administrators (login name SYSADMIN)
must be granted the View server state SQL permission.

What you should know


The minimum SQL server-level role supported by Security Center is dbcreator, and the mimimum SQL
database-level role is db_owner. Therefore, you must make sure that members of the dbcreator server role
and members of the db_owner database role have the View server state permission granted.
For more information about server roles and their capabilities, see your Microsoft documentation.
NOTE: The following procedure is for SQL Server 2014 Express. If you are using a different version of SQL
Server, see your Microsoft documentation for information about granting permissions.
To grant SQL Server permissions:
• In SQL Server Management Studio, do one of the following:
• Execute the following query: GRANT VIEW SERVER STATE TO [login name].
• Manually modify the user permissions as follows:
1 Right-click on the appropriate SQL server instance and select Properties.
2 Click the Permissions page.
3 Under Logins or roles, select the user or role you want to modify.
4 In the Permissions section, click the Explicit tab and select the Grant check box beside the View
server state permission.
5 Click OK.

After you finish


For users that are granted the permission locally on the Security Center server, you must add them as users
on the SQL Server.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  9
Installing Security Center

Security Center installation packages


The Security Center installation packages contain the setup program that helps you to install everything you
need to get the product working.

Downloadable packages
The Security Center installation packages are zip files that you can download from the GTAP Product
Download page, at https://gtap.genetec.com/SystemManagement/DownloadSection/. Note, you'll need a
username and password to log on to GTAP.
• SecurityCenterWebSetup.exe: This is the web installer. During the installation, the web installer
downloads the necessary components for your system from the Internet.
• Full installation package: Download the full installation package if your computers do not have access
to the Internet. This is a standalone package. You don't need anything else outside this package.
The full installation package contains the following:
• setup.exe: Found in the root folder, this is the AutoRun-enabled version of the standalone installer.
• Security Center Setup.exe: Found in the SC Packages folder, this is the standalone installer.
• SC Packages: This folder contains all the components (in separate subfolders) that you might need
for your Security Center installation. All the Security Center installation prerequisites are found here.
• Documentation: This folder contains the PDF versions of the Security Center Installation and
Upgrade Guide along with the Release Notes.

Installation modes
You can run the Security Center Installer in two modes:
• Wizard mode: The InstallShield Wizard for Security Center Installer is a user friendly interface that
guides you through the installation steps through a series of questions and runs the installer for you
with the options you selected. There are two versions of the installer:
• Web version: Run the web version of the installer if your computer is connected to the Internet. To
run the web installer, download the file SecurityCenterWebSetup.exe from GTAP and double-click
it. The web installer connects to Genetec™ website and only downloads the modules you choose to
install.
• Standalone version: Run the standalone version of the installer if your computer is not connected to
the Internet. To run the standalone installer, download the full installation package from GTAP, and
double-click setup.exe found in the root folder of the package.
• Silent mode: The silent mode is used to run the installer from the command line, without user
intervention.
IMPORTANT: The Security Center Installer does not support using mapped drives in your path
specifications.

Installer languages
The Security Center Installer is available in English and French, but the Security Center software can be
installed in more than twenty different languages. The installer language is selected from the Security
Center Installation startup screen.

Related Topics
Silent installation in Security Center on page 107

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  10
Installing Security Center

Security Center 5.6 SR1 installation prerequisites


The prerequisites for a successful Security Center installation are found in the Security Center installation
package, in the SC Packages folder, in separate subfolders.

32-bit 32-bit 64-bit 64-bit


Client Server Client Server

DirectX End-User Runtimes ✓ ✓ ✓ ✓

Erlang R16B ✓ ✓

Fsharp Redistributable Package 2.0 ✓ ✓ ✓ ✓

Microsoft .NET Framework 3.5 SP1 ✓ ✓ ✓ ✓

Microsoft .NET Framework 3.5 SP1 (Windows Feature) ✓ ✓ ✓ ✓

Microsoft .NET Framework 3.5 SP1 for Windows Server 2008 ✓ ✓


R2 (x64)

Microsoft .NET Framework 4.5.2 Full ✓ ✓ ✓ ✓

Microsoft CCR and DSS Runtime 2008 R2 Redistributable ✓ ✓ ✓ ✓

Microsoft CCR and DSS Runtime 2008 R3 Redistributable ✓ ✓ ✓ ✓

a
Microsoft Primary Interoperability Assemblies 2005 ✓ ✓ ✓ ✓

Microsoft Report Viewer 2012 ✓ ✓ ✓ ✓

Microsoft Silverlight 5 ✓ ✓ ✓ ✓

Microsoft SQL Server 2008 Native Client v10.50.1600.1 ✓ ✓

Microsoft SQL Server 2008 Native Client v10.50.1600.1 (x64) ✓ ✓

Microsoft SQL Server 2008 R2 SP3 Shared Management Objects ✓ ✓

Microsoft SQL Server 2008 R2 SP3 Shared Management Objects ✓ ✓


(x64)

Microsoft SQL Server 2008 System CLR Types v10.50.1600.1 ✓ ✓

Microsoft SQL Server 2008 System CLR Types v10.50.1600.1 ✓ ✓


(x64)

Microsoft SQL Server 2012 System CLR Types v11.1.3000.0 ✓ ✓

Microsoft SQL Server 2012 System CLR Types v11.1.3000.0 (x64) ✓ ✓

Microsoft SQL Server 2014 Shared Management Objects ✓ ✓

Microsoft SQL Server 2014 Shared Management Objects (x64) ✓ ✓

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  11
Installing Security Center

32-bit 32-bit 64-bit 64-bit


Client Server Client Server

Microsoft SQL Server Compact Edition 3.5 SP2 (x64) ✓ ✓

Microsoft SQL Server Compact Edition 3.5 SP2 (x86) ✓ ✓

Microsoft System CLR Types for SQL Server 2014 v12.0.2402.11 ✓ ✓

Microsoft System CLR Types for SQL Server 2014 v12.0.2402.11 ✓ ✓


(x64)

Microsoft Visual C++ 2010 SP1 Redistributable Package (x64) ✓ ✓

Microsoft Visual C++ 2012 Update 4 Redistributable Package ✓ ✓ ✓ ✓


(x86)

Microsoft Visual C++ 2013 Redistributable (x86) ✓ ✓ ✓ ✓

Microsoft Visual C++ 2015 Redistributable Package (x64) ✓ ✓

Microsoft Visual C++ 2015 Redistributable Package (x86) ✓ ✓ ✓ ✓

RabbitMQ 3.1.1 ✓ ✓ ✓ ✓

Visual C++ 2005 SP1 Redistributable ✓ ✓ ✓ ✓

Visual C++ 2008 SP1 Redistributable ✓ ✓ ✓ ✓

Visual C++ 2010 Redistributable ✓ ✓ ✓ ✓

Windows Installer 4.5 for Windows Server 2008 (x64) ✓ ✓

Windows Installer 4.5 for Windows Server 2008 (x86) ✓ ✓

b
WinPcap 4.1.3 ✓ ✓ ✓ ✓

a
Only required if you are installing Omnicast™ Compatibility Packs.
b
Not mandatory.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  12
Installing Security Center

Installing Security Center


When you are ready to install Security Center, you must perform the following steps.

Before you begin


• Read the Security Center Release Notes for any known issues, limitations, and other information about
the release. Click here for the most recent version of this document.
• Create a list of the computers that will be part of your new system, and decide what software
components need to be installed on each:
• Security Center Server (main or expansion server)
• Security Center Client (Config Tool, Security Desk, or both)
• SQL Server (dedicated database server)
View your system requirements to ensure that the minimum hardware requirements (servers and
workstations) and software requirements (Windows, web browser, and so on) are met.
• Go through the pre-installation checklist.

What you should know


IMPORTANT:
• If you need to install the Security Center Server on a computer after you have installed Security Center
Client, always use the downloaded Security Center package. Using the Change option from Programs and
Features will not install the SQL Express component you need.
• The Security Center Installer does not support the use of mapped drives in your path specifications.
To install Security Center:
1 (Optional) Install SQL Server on a separate drive from the OS drive.
SQL Server is typically installed automatically with Security Center. Installing SQL Server separately
depends on your deployment requirements.
2 Install Security Center components on the main server that will host the Directory role.
3 Activate your product license on the main server.
4 Make sure that all ports used by Security Center are open and redirected for firewall and network
address translation purposes.
For a list of default ports used by Security Center, see Default ports used by Security Center on page
49.
5 (Optional) Install Security Center components on any expansion servers that will connect to the main
server to add processing power to your Security Center system.
6 Install Security Center Client (Config Tool, Security Desk, or both).
7 Unblock any blocked files.

After you finish


Go through the post-installation list.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  13
Installing Security Center

Unblocking files manually


After downloading a Security Center installation package, you might have to unblock some of the files.

What you should know


• Not all versions of Windows Server require ZIP files to be unblocked before their contents can be
extracted. The Unblock button described in the following steps might not be present.
• The Security Center installation packages are zip files that you can download from the GTAP Product
Download page, at https://gtap.genetec.com/SystemManagement/DownloadSection/. Note, you'll need a
username and password to log on to GTAP.
To unblock files from the Security Center installation package:
1 Right-click the ZIP file in Windows Explorer and choose Properties.
2 In the General tab, click Unblock.
3 Click OK.

Related Topics
Troubleshooting: Files remain blocked after unblocking them manually on page 122

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  14
Installing Security Center

Installing Security Center on the main server


The main server is the only server in your Security Center system that hosts the Directory role. You must
install the main server first so that other servers can connect to it. You must also activate your Security
Center license on the main server.

Before you begin


Prepare to install Security Center.

What you should know


The main server installation procedure installs the following:
• The Genetec™ Server service with the Directory role.
When installing Genetec™ Server, Server Admin and Genetec™ Watchdog are also installed. The installer
creates and upgrades all the databases that your system requires. You must specify the name of your
database server. If you do not have one, Microsoft SQL Server 2014 Express Edition is installed by
default.
• (Optional) Client applications (Config Tool, Security Desk, or both).
• (Optional) Omnicast™ compatibility packs to view video from federated Omnicast™ systems.
To install Security Center on the main server:
1 Right-click either setup.exe (standalone version) or SecurityCenterWebSetup.exe (web version) and click
Run as administrator to launch the Security Center Installer.
NOTE: Only the standalone InstallShield Wizard is illustrated in this procedure.

2 On the Setup Language selection page, select either English or French, and click Next.
The Welcome to the InstallShield Wizard screen appears.

3 On the Welcome page, click Next.


Links are provided to view relevant Security Center documentation online, or in PDF format.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  15
Installing Security Center

4 On the License Agreement page, read the terms in the Genetec™ Software License Agreement, select I
accept the terms in the license agreement, and then click Next.
5 On the Custom Setup page, select the Security Center applications you want to install.

You can choose from the following:


• Server: Installs the Genetec™ Server service, the SQL Server databases, the Server Admin, and the
Genetec™ Watchdog service.
• (Optional) Client: Installs the Security Center Client applications. You can choose either Config Tool,
Security Desk, or both.
• (Optional) Omnicast™ Compatibility Packs: If Omnicast™ systems will be federated, select the
required Omnicast™ compatibility packs.

6 To change the installation folder, click Change, and click Next.


You can only change the root folder where the product subfolder (Genetec Security Center 5.6) will be
created. On a 64-bit machine, the default root folder is C:\Program Files (x86).
7 On the Genetec™ Security Center Language Selection page, select the user interface language for Security
Center applications, and click Next.
NOTE: Online help for Security Center applications is not available in all languages. For language
availability, see the Security Center Release Notes.
TIP: After the installation, you can change the user interface language any time using the Language Tool
found in the Tools subfolder of the Genetec™ Security Center program group.

8 On the Installation Type page, select Main server, and click Next.
IMPORTANT: You must not use the Main server installation type more than once per system. If your
Security Center license supports additional Directory servers, all Directory servers that are not your
main server must be installed as expansion servers. For more information, see the Security Center
Administrator Guide.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  16
Installing Security Center

9 On the Help Improve Genetec™ Products page, select one of the following options:

• Yes, I want to participate: (Default) You agree to share your system data and system ID with
Genetec Inc. to facilitate proactive support and improve communication. Your system must
be covered by Genetec™ Advantage, and an activation code is required. For information about
generating an activation code, see the System Availability Monitor User Guide.
If you do not enter a Genetec™ SAMA activation code, then this option is the same as the next one.
• Yes, I want to participate, but anonymously: You agree to share your system data with Genetec
Inc., but you want that information to remain anonymous. Genetec Inc. will not receive any data that
identifies your company. No activation code is required. Health data is sent to a dedicated Health

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  17
Installing Security Center

Monitoring Service where the entity names are disguised and cannot be traced. This data is used only
by Genetec Inc. for statistical purposes and cannot be accessed through GTAP.
• No, I do not want to participate: The System Availability Monitor Agent is installed but no data is
collected for product improvement.
The selection you make here applies to all future components you install on your system. After the
installation, you can change your data collection preference using Server Admin.

10 (Optional) Click View more details to view a short description of each option and a link to our Privacy
Policy.
11 Click Next.
12 On the Database Server page, select one of the following options:

• Use an existing database server: Select an existing Microsoft SQL Server instance to install the
database on.
As a best practice, replace (local) with your machine name. You must use your machine name if
you are configuring the Directory for load balancing.
• Install a new database server: Installs Microsoft SQL Server 2014 Express Edition. You must choose
a database server name. The default is SQLEXPRESS.
NOTE: The database server name is not case-sensitive, but it must meet all of the following criteria:
• It cannot match any of the SQL Server reserved keywords, such as DEFAULT, PRIMARY, and so
on. For a complete list of all reserved keywords, see https://msdn.microsoft.com/en-us/library/
ms189822.aspx.
• It cannot be longer than 16 characters.
• The first character of the instance name must be a letter or an underscore (_). Acceptable letters
are defined by the Unicode Standard 2.0, including Latin characters a-z and A-Z, and letter
characters from other languages.
• Subsequent characters can be letters defined by the Unicode Standard 2.0, decimal numbers from
Basic Latin or other national scripts, the dollar sign ($), or an underscore (_).
• Embedded spaces or other special characters are not allowed: backslash (\), comma (,), colon (:),
semi-colon (;), single quotation mark ('), ampersand (&), number sign (#), and at sign (@).

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  18
Installing Security Center

13 Click Next.
14 On the Service Logon Parameters page, select one of the following options:

• Use default name and password: Use the default username (LocalSystem) to run the Security Center
services. This option works in most cases.
• Specify the username and password for all services: Enter a valid domain username and a strong
password, and write them down in a safe place. You need to provide these credentials every time you
upgrade your Security Center software. Use industry best practices for creating strong passwords.
IMPORTANT: Make sure the service user is a local administrator and not a domain administrator.
The service user must have the rights to the local or remote database, and the Log on as service user
rights. If this server is to host the Active Directory role, the specified user must have Read and Write
access to the Active Directory you want the server to connect to.

15 Click Next.
16 On the Server Configuration page, enter the following fields:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  19
Installing Security Center

• Server port: The TCP port through which the servers in your system communicate.
• Web server port: The HTTP port that is used for the web-based Server Admin. If you change the
default port, then the Server Admin address must include the port number in the URL (for example,
http://computer:port/Genetec instead of http://computer/ Genetec). The link to Server Admin (accessible
through Start menu) automatically includes this port.
CAUTION: Be aware of conflicts with other software running on the server that may also use port 80
(for example, a web browser).
• Password/Confirm password: Enter and confirm the password (minimum 8 characters) to open the
web-based Server Admin.
BEST PRACTICE: If you are upgrading your Security Center installation, the existing server
password is kept by default. If you were using a blank password, we recommend that you enter a
new one. Use industry best practices for creating strong passwords.
IMPORTANT: If you lose the server password, call Genetec™ Technical Support to reset it.

17 Click Next.
18 On the Firewall Rules page, select Allow Genetec™ Security Center 5.6 to create necessary firewall
rules for its applications, and click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  20
Installing Security Center

This option ensures that the internal Windows Firewall security rules are configured correctly.
NOTE: You must also configure the Security Center ports on your corporate firewall after the
installation.

19 On the WinPcap Installation page, select the Install WinPcap option and click Next.

This dialog box does not appear if WinPcap 4.1.3 is already installed. With this option, you can capture
diagnostic data for units and other services in Security Center. This data is used by the Genetec™
Technical Support team if you require assistance. If the WinPcap installation does not start immediately
you will be prompted to install it at a later time.

20 On the Security Settings page, select one of the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  21
Installing Security Center

• Recommended: (Default) Select the default security settings.


• Whitelist the identity certificate of the first Directory this machine connects to, if the certificate is
self-signed.
• Turn off the basic authentication for cameras.
• Custom (Advanced): Select this option to to configure your own security settings on the next page.

21 Click Next.
22 If you selected the Custom (Advanced) option in the previous page, configure the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  22
Installing Security Center

• Always validate the Directory certificate: Select this option to force all client and server
applications on the current machine to validate the identity certificate of the Directory before
connecting to it.
BEST PRACTICE: If you choose to enable Directory authentication, it is best to use a certificate
issued by a trusted certificate authority (CA). Otherwise, the first time a connection is made from this
computer to the Directory, the user is prompted to confirm the identity of the Directory server.
For more information on Directory authentication, see the Security Center Administrator Guide.
• Turn off basic authentication: Basic camera authentication is turned off by default to prevent
camera credentials from being compromised when the Archiver connects to a video unit.
IMPORTANT: When this option is selected, cameras that only support basic authentication cannot
be used in Security Center.
NOTE: If necessary, you can configure this option individually for each camera manufacturer
extension in Config Tool from the Archiver's Extensions tab.

23 Select I acknowledge that I have read and understood the implications of selecting these security
settings, and click Install.
The Genetec™ Security Center Installer opens and starts the installation.
24 If you chose to install WinPcap 4.1.3, the WinPcap 4.1.3 Setup Wizard opens:
a) In the WinPcap 4.1.3 Setup Wizard, follow the installation instructions.
b) On the Installation options page, select the Automatically start the WinPcap driver at boot time
option, and click Install.
c) Click Finish, and continue with the Security Center installation.
25 (Optional) When the Installation Completed page opens, click View Installation logs to open the folder
that contains the Installation logs that can be viewed in Notepad.

26 Click Finish.
If you selected the Launch Server Admin option at the end of the installation, the Server Admin
browser window appears.
If you selected the Connect me to GTAP for the latest updates now option, your Internet browser
opens to the Genetec™ Product Download page on GTAP. You need a login and a password to connect to
GTAP.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  23
Installing Security Center

NOTE: Microsoft Edge is not supported. If you are using Windows 10, you must set Internet Explorer as
your default web browser.
If you get a message asking you to restart your computer, click Yes.
Security Center is now installed on the main server.

After you finish


Do the following:
• Activate your product license from the Server Admin.
• Install Security Center on the expansion servers.

Related Topics
Activating Security Center license using the web on page 25
Activating Security Center license without Internet access on page 28
Installing Security Center on an expansion server on page 33

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  24
Installing Security Center

Activating Security Center license using the web


The Security Center license is activated on the main server. You must activate your Security Center license
after you install Security Center on the main server, and when you promote an expansion server to a main
server. If you have Internet access, you can activate your Security Center license using a web connection
through Server Admin.

Before you begin


To activate your license using the web, you need the following:
• Internet connection: If your server does not have Internet access, then see Activating Security Center
license without Internet access on page 28.
• System ID and password: The System ID and password are found in the Security Center License
Information document. Genetec™ Customer Service sends you this document when you purchase the
product.
• Server password: The server password is used to log on to Server Admin. The server password is set
during the installation.
To activate your Security Center license using the web:
1 Open the Server Admin web page by doing one of the following:
• In the address bar of your web browser, type http://computer:port/Genetec, where computer is
the DNS name or the IP address of your server, and port is the web server port specified during the
Security Center Server installation.
You can omit the web server port if you are using the default value (80).
• If connecting to Server Admin from the local host, double-click Genetec Server Admin ( ) in the
Genetec Security Center folder in the Windows Start menu.
2 Enter the server password that you set during the server installation, and click Log on.

The Server Admin Overview page appears.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  25
Installing Security Center

3 Do one of the following:


• Click License at the top of the Server Admin browser window.
• Click Modify under the License section of the Server Admin Overview page.

4 In the License management dialog box, click Web activation, and enter your System ID and Password
as specified in the Security Center License Information document you received when you purchased your
license.

5 Click Activate.
Your license information appears in the License section of the Server Admin Overview page.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  26
Installing Security Center

6 Click Details to view your license options in a dialog box.

Your license options are divided into eight tabs. For for information, see the Security Center
Administrator Guide.

7 Click Close, and then close your browser window.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  27
Installing Security Center

Activating Security Center license without Internet access


The Security Center license is activated on the main server. You must activate your Security Center license
after you install Security Center on the main server, and when you promote an expansion server to a main
server. If you do not have Internet access, you can activate your Security Center license manually using a
combination of Server Admin and GTAP.

Before you begin


To activate your license, you need the following:
• System ID and password: The System ID and password are found in the Security Center License
Information document. Genetec™ Customer Service sends you this document when you purchase the
product.
• Server password: The server password is used to log on to Server Admin. The server password is set
during the installation.
To activate your Security Center license without Internet access:
1 Open the Server Admin web page by doing one of the following:
• In the address bar of your web browser, type http://computer:port/Genetec, where computer is
the DNS name or the IP address of your server, and port is the web server port specified during the
Security Center Server installation.
You can omit the web server port if you are using the default value (80).
• If connecting to Server Admin from the local host, double-click Genetec Server Admin ( ) in the
Genetec Security Center folder in the Windows Start menu.
2 Enter the server password that you set during the server installation, and click Log on.

The Server Admin Overview page appears.


3 Do one of the following:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  28
Installing Security Center

• Click License at the top of the Server Admin browser window.


• Click Modify under the License section of the Server Admin Overview page.

4 In the License management dialog box, click Manual activation, and then under Validation key, click
Save to file.

The validation key is a sequence of numbers (in hexadecimal text format) generated by Security Center
that uniquely identifies your server. The validation key is used to generate the license key that unlocks
your Security Center software. The license key that is generated can only be applied to the server
identified by the validation key.

A text file named validation.vk is saved to your default Downloads folder. Make sure you copy this file to
a location (this can be a USB key) that you can access from another computer that has Internet access.
5 From another computer with Internet access, log on to GTAP at: https://gtap.genetec.com

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  29
Installing Security Center

6 On the GTAP login page, do one of the following:


• Enter the System ID and the Password specified in the Security Center License Information document,
and click Login.
• Enter your GTAP user account (your email address) and Password, and click Login.
1 On the Genetec Portal - Home page, click Activate new system.
2 From the System ID drop-down list, select your system, and click Submit.
The browser opens to the System Information page.

7 Scroll down to the License information section and click Activate license.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  30
Installing Security Center

8 In the dialog box that opens, browse to your validation key (.vk file), and click Submit.
The message License activation successful appears.
9 Click Download License, and save the license key to a file.
The default name is your System ID followed by _Directory_License.lic.
10 Return to Server Admin which is connected to your Security Center main server.
11 In the License management dialog box, do one of the following:
• Paste your license information from the license key file (open with a text editor).
• Browse for the license key (.lic file), and click Open.

12 Click Activate.
Your license information appears in the License section of the Server Admin Overview page.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  31
Installing Security Center

13 Click Details to view your license options in a dialog box.

Your license options are divided into eight tabs. For for information, see the Security Center
Administrator Guide.

14 Click Close, and then close your browser window.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  32
Installing Security Center

Installing Security Center on an expansion server


To add processing power to your Security Center system, you can add expansion servers that connect to the
main server.

Before you begin


• Prepare to install Security Center.
• Install Security Center on the main server, and make sure the server is up and running.

What you should know


The expansion server installation procedure installs the following:
• The Genetec™ Server service without the Directory role.
When installing Genetec™ Server, Server Admin and Genetec™ Watchdog are also installed. The installer
creates and upgrades all the databases that your system requires. You must specify the name of your
database server. If you do not have one, Microsoft SQL Server 2014 Express Edition is installed by
default.
• (Optional) Client applications (Config Tool, Security Desk, or both).
• (Optional) Omnicast™ compatibility packs to view video from federated Omnicast™ systems.
To install Security Center on an expansion server:
1 Right-click either setup.exe (standalone version) or SecurityCenterWebSetup.exe (web version) and click
Run as administrator to launch the Security Center Installer.
NOTE: Only the standalone InstallShield Wizard is illustrated in this procedure.

2 On the Setup Language selection page, select either English or French, and click Next.
The Welcome to the InstallShield Wizard screen appears.

3 On the Welcome page, click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  33
Installing Security Center

Links are provided to view relevant Security Center documentation online, or in PDF format.
4 On the License Agreement page, read the terms in the Genetec™ Software License Agreement, select I
accept the terms in the license agreement, and then click Next.
5 On the Custom Setup page, select the Security Center applications you want to install.

You can choose from the following:


• Server: Installs the Genetec™ Server service, the SQL Server databases, the Server Admin, and the
Genetec™ Watchdog service.
• (Optional) Client: Installs the Security Center Client applications. You can choose either Config Tool,
Security Desk, or both.
• (Optional) Omnicast™ Compatibility Packs: If Omnicast™ systems will be federated, select the
required Omnicast™ compatibility packs.

6 To change the installation folder, click Change, and click Next.


You can only change the root folder where the product subfolder (Genetec Security Center 5.6) will be
created. On a 64-bit machine, the default root folder is C:\Program Files (x86).
7 On the Genetec™ Security Center Language Selection page, select the user interface language for Security
Center applications, and click Next.
NOTE: Online help for Security Center applications is not available in all languages. For language
availability, see the Security Center Release Notes.
TIP: After the installation, you can change the user interface language any time using the Language Tool
found in the Tools subfolder of the Genetec™ Security Center program group.

8 On the Installation Type page, select Expansion server, and click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  34
Installing Security Center

9 On the Database Server page, select one of the following options:

• Use an existing database server: Select an existing Microsoft SQL Server instance to install the
database on.
As a best practice, replace (local) with your machine name. You must use your machine name if
you are configuring the Directory for load balancing.
• Install a new database server: Installs Microsoft SQL Server 2014 Express Edition. You must choose
a database server name. The default is SQLEXPRESS.
NOTE: The database server name is not case-sensitive, but it must meet all of the following criteria:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  35
Installing Security Center

• It cannot match any of the SQL Server reserved keywords, such as DEFAULT, PRIMARY, and so
on. For a complete list of all reserved keywords, see https://msdn.microsoft.com/en-us/library/
ms189822.aspx.
• It cannot be longer than 16 characters.
• The first character of the instance name must be a letter or an underscore (_). Acceptable letters
are defined by the Unicode Standard 2.0, including Latin characters a-z and A-Z, and letter
characters from other languages.
• Subsequent characters can be letters defined by the Unicode Standard 2.0, decimal numbers from
Basic Latin or other national scripts, the dollar sign ($), or an underscore (_).
• Embedded spaces or other special characters are not allowed: backslash (\), comma (,), colon (:),
semi-colon (;), single quotation mark ('), ampersand (&), number sign (#), and at sign (@).

10 Click Next.
11 On the Service Logon Parameters page, select one of the following options:

• Use default name and password: Use the default username (LocalSystem) to run the Security Center
services. This option works in most cases.
• Specify the username and password for all services: Enter a valid domain username and a strong
password, and write them down in a safe place. You need to provide these credentials every time you
upgrade your Security Center software. Use industry best practices for creating strong passwords.
IMPORTANT: Make sure the service user is a local administrator and not a domain administrator.
The service user must have the rights to the local or remote database, and the Log on as service user
rights. If this server is to host the Active Directory role, the specified user must have Read and Write
access to the Active Directory you want the server to connect to.

12 Click Next.
13 On the Server Configuration page, enter the following fields:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  36
Installing Security Center

• Server port: The TCP port through which the servers in your system communicate.
• Web server port: The HTTP port that is used for the web-based Server Admin. If you change the
default port, then the Server Admin address must include the port number in the URL (for example,
http://computer:port/Genetec instead of http://computer/ Genetec). The link to Server Admin (accessible
through Start menu) automatically includes this port.
CAUTION: Be aware of conflicts with other software running on the server that may also use port 80
(for example, a web browser).
• Server address: The DNS name or IP address of the main server.
If you changed the port number (5500) on the main server, enter the correct port number in the field
that follows.
• Password/Confirm password: Enter the same password that was used to configure the main server.
Once connected, the main server password is pushed to all expansion servers.

14 On the Firewall Rules page, select Allow Genetec™ Security Center 5.6 to create necessary firewall
rules for its applications, and click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  37
Installing Security Center

This option ensures that the internal Windows Firewall security rules are configured correctly.
NOTE: You must also configure the Security Center ports on your corporate firewall after the
installation.

15 On the WinPcap Installation page, select the Install WinPcap option and click Next.

This dialog box does not appear if WinPcap 4.1.3 is already installed. With this option, you can capture
diagnostic data for units and other services in Security Center. This data is used by the Genetec™
Technical Support team if you require assistance. If the WinPcap installation does not start immediately
you will be prompted to install it at a later time.

16 On the Security Settings page, select one of the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  38
Installing Security Center

• Recommended: (Default) Select the default security settings.


• Whitelist the identity certificate of the first Directory this machine connects to, if the certificate is
self-signed.
• Turn off the basic authentication for cameras.
• Custom (Advanced): Select this option to to configure your own security settings on the next page.

17 Click Next.
18 If you selected the Custom (Advanced) option in the previous page, configure the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  39
Installing Security Center

• Always validate the Directory certificate: Select this option to force all client and server
applications on the current machine to validate the identity certificate of the Directory before
connecting to it.
BEST PRACTICE: If you choose to enable Directory authentication, it is best to use a certificate
issued by a trusted certificate authority (CA). Otherwise, the first time a connection is made from this
computer to the Directory, the user is prompted to confirm the identity of the Directory server.
For more information on Directory authentication, see the Security Center Administrator Guide.
• Turn off basic authentication: Basic camera authentication is turned off by default to prevent
camera credentials from being compromised when the Archiver connects to a video unit.
IMPORTANT: When this option is selected, cameras that only support basic authentication cannot
be used in Security Center.
NOTE: If necessary, you can configure this option individually for each camera manufacturer
extension in Config Tool from the Archiver's Extensions tab.

19 Select I acknowledge that I have read and understood the implications of selecting these security
settings, and click Install.
The Genetec™ Security Center Installer opens and starts the installation.
20 If you chose to install WinPcap 4.1.3, the WinPcap 4.1.3 Setup Wizard opens:
a) In the WinPcap 4.1.3 Setup Wizard, follow the installation instructions.
b) On the Installation options page, select the Automatically start the WinPcap driver at boot time
option, and click Install.
c) Click Finish, and continue with the Security Center installation.
21 (Optional) When the Installation Completed page opens, click View Installation logs to open the folder
that contains the Installation logs that can be viewed in Notepad.

22 Click Finish.
If you selected the Launch Server Admin option at the end of the installation, the Server Admin
browser window appears.
If you selected the Connect me to GTAP for the latest updates now option, your Internet browser
opens to the Genetec™ Product Download page on GTAP. You need a login and a password to connect to
GTAP.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  40
Installing Security Center

NOTE: Microsoft Edge is not supported. If you are using Windows 10, you must set Internet Explorer as
your default web browser.
If you get a message asking you to restart your computer, click Yes.
Security Center is now installed on the expansion server.

After you finish


Connect the expansion server to the main server.

Connecting expansion servers to the main server


Whenever you move your main server to a new computer, you must use Server Admin to reconnect all the
expansion servers on your system to the new computer.

Before you begin


After completing an expansion server installation, the expansion server automatically connects to the main
server. You must only go through the steps of connecting your expansion server to your main server if:
• You entered the wrong connection parameters to the main server during the expansion server
installation.
• You moved the main server to a different computer.
• You changed the password on the main server while the expansion server was down.
• You enabled Directory authentication on your expansion server, but your Directory certificate is not
signed by a trusted certificate authority.
To connect an expansion server to the main server:
1 Open the Server Admin web page by doing one of the following:
• In the address bar of your web browser, type http://computer:port/Genetec, where computer is
the DNS name or the IP address of your server, and port is the web server port specified during the
Security Center Server installation.
You can omit the web server port if you are using the default value (80).
• If connecting to Server Admin from the local host, double-click Genetec Server Admin ( ) in the
Genetec Security Center folder in the Windows Start menu.
2 Enter the server password that you set during the server installation, and click Log on.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  41
Installing Security Center

The Server Admin Overview page appears.


3 If you are not connected to the main server, click Main server connection at the top of the Server
Admin window.

4 Enter the Server address (main server's DNS name or IP address) and Password, and then click Save.
5 When prompted to restart the service, click Yes.
While the Genetec Server service restarts, you are temporarily logged off from Server Admin.
6 After logging back on to Server Admin, if you get the message that the identity of the Directory cannot be
verified, click Main server connection.

7 In the dialog box that appears, verify that the certificate of your main server is as expected, and click
Accept certificate.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  42
Installing Security Center

IMPORTANT: Once accepted, the certificate is stored in a local whitelist, and you should not be
prompted to accept it again. If you are, then you should immediately notify your IT department.
BEST PRACTICE: To avoid the burden of having to accept the certificate of your main server every
time someone tries to connect to it from a new machine, only use certificates signed by a certification
authority that is trusted by your company's IT.

8 Click Save.
9 When prompted to restart the service, click Yes.
While the Genetec Server service restarts, you are temporarily logged off from Server Admin.
The expansion server is now connected to the main server. The two servers will remain connected, even
when you change the certificate, on either one or both of the servers, as long as the two servers are
connected while the change is being made.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  43
Installing Security Center

Installing Security Center Client


The Security Center Client installation option installs Config Tool and Security Desk by default.
To install Security Center Client:
1 Right-click either setup.exe (standalone version) or SecurityCenterWebSetup.exe (web version) and click
Run as administrator to launch the Security Center Installer.
NOTE: Only the standalone InstallShield Wizard is illustrated in this procedure.

2 On the Setup Language selection page, select either English or French, and click Next.
The Welcome to the InstallShield Wizard screen appears.

3 On the Welcome page, click Next.


Links are provided to view relevant Security Center documentation online, or in PDF format.
4 On the License Agreement page, read the terms in the Genetec™ Software License Agreement, select I
accept the terms in the license agreement, and then click Next.
5 On the Custom Setup page, select Client, and the client applications you want to install. You can choose
from the following:
• Config Tool: Allows you to configure all Security Center components.
• Security Desk: Allows you to efficiently control and monitor multiple security and public safety
applications.
• Omnicast™ Compatibility Packs: If Omnicast™ systems will be federated, select the required
Omnicast™ compatibility packs.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  44
Installing Security Center

6 To change the installation folder, click Change, and click Next.


You can only change the root folder where the product subfolder (Genetec Security Center 5.6) will be
created. On a 64-bit machine, the default root folder is C:\Program Files (x86).
7 On the Genetec™ Security Center Language Selection page, select the user interface language for Security
Center applications, and click Next.
NOTE: Online help for Security Center applications is not available in all languages. For language
availability, see the Security Center Release Notes.
TIP: After the installation, you can change the user interface language any time using the Language Tool
found in the Tools subfolder of the Genetec™ Security Center program group.

8 On the Firewall Rules page, select Allow Genetec™ Security Center 5.6 to create necessary firewall
rules for its applications, and click Next.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  45
Installing Security Center

This option ensures that the internal Windows Firewall security rules are configured correctly.
NOTE: You must also configure the Security Center ports on your corporate firewall after the
installation.

9 On the WinPcap Installation page, select the Install WinPcap option and click Next.

This dialog box does not appear if WinPcap 4.1.3 is already installed. With this option, you can capture
diagnostic data for units and other services in Security Center. This data is used by the Genetec™
Technical Support team if you require assistance. If the WinPcap installation does not start immediately
you will be prompted to install it at a later time.

10 On the Security Settings page, select one of the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  46
Installing Security Center

• Recommended: (Default) Select the default security settings.


• Whitelist the identity certificate of the first Directory this machine connects to, if the certificate is
self-signed.
• Turn off the basic authentication for cameras.
• Custom (Advanced): Select this option to to configure your own security settings on the next page.

11 Click Next.
12 If you selected the Custom (Advanced) option in the previous page, configure the following options:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  47
Installing Security Center

• Always validate the Directory certificate: Select this option to force all client and server
applications on the current machine to validate the identity certificate of the Directory before
connecting to it.
BEST PRACTICE: If you choose to enable Directory authentication, it is best to use a certificate
issued by a trusted certificate authority (CA). Otherwise, the first time a connection is made from this
computer to the Directory, the user is prompted to confirm the identity of the Directory server.
For more information on Directory authentication, see the Security Center Administrator Guide.
• Turn off basic authentication: Basic camera authentication is turned off by default to prevent
camera credentials from being compromised when the Archiver connects to a video unit.
IMPORTANT: When this option is selected, cameras that only support basic authentication cannot
be used in Security Center.
NOTE: If necessary, you can configure this option individually for each camera manufacturer
extension in Config Tool from the Archiver's Extensions tab.

13 Select I acknowledge that I have read and understood the implications of selecting these security
settings, and click Install.
The Genetec™ Security Center Installer opens and starts the installation.
14 If you chose to install WinPcap 4.1.3, the WinPcap 4.1.3 Setup Wizard opens:
a) In the WinPcap 4.1.3 Setup Wizard, follow the installation instructions.
b) On the Installation options page, select the Automatically start the WinPcap driver at boot time
option, and click Install.
c) Click Finish, and continue with the Security Center installation.
15 (Optional) When the Installation Completed page opens, click View Installation logs to open the folder
that contains the Installation logs that can be viewed in Notepad.

16 Click Finish.

After you finish


Do the following:
• Configure the Security Center ports on your corporate firewall.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  48
Installing Security Center

Default ports used by Security Center


After installing Security Center, you must ensure that all the correct ports are open and redirected for
firewall and network address translation purposes, so all the Security Center components can communicate
properly.
During the Security Center installation, you are given the option of allowing Security Center to create
firewall rules for its applications. If you select this option, all Security Center applications are added as
exceptions to the internal Windows firewall. However, you still must make sure that all the ports used by
Security Center are open.
You can configure different port numbers than the ones that are used by default.

Common communication ports


For Security Center to work properly, you need to create firewall rules in order to allow proper
communication between the various services.
The following table lists the default network ports used by Security Center applications.

Application Inbound Outbound Port usage

Directory TCP 5500 Client connection

Client applications TCP 5500 Directory connection


(Security Desk,
Config Tool, SDK) TCP 8012 Map download requests to Map Manager
(HTTPS)

Client applications TCP 443 Communication with GTAP for Genetec™


(Config Tool) Advantage validation and feedback (HTTPS)

All roles (new TCP 5500 Directory connection


installation)
TCP 4502 TCP 4502 Genetec™ Server communication (backward
compatibility with Security Center 5.3 and
earlier)

TCP 80 TCP 80 REST/Server Admin communication (HTTP)

TCP 443 TCP 443 Secured REST/Server Admin communication


(HTTPS)

All roles TCP 4502 TCP 4502 If 4502 was the server port before the upgrade,
(upgraded from then 4502 remains the server port after the
5.3 and earlier) TCP 4503 TCP 4503 upgrade, and 4503 is used for backward
compatibility.
If another port was used as server port before
the upgrade, then that same port is kept as
server port after the upgrade. 4502 is then used
for backward compatibility, and 4503 is not
necessary.

Intrusion Manager TCP 3001 TCP 3001 Communication with Bosch intrusion panels

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  49
Installing Security Center

Application Inbound Outbound Port usage

Map Manager TCP 8012 Map download requests from client application
(HTTPS)

Genetec™ Update TCP 4595 TCP 4595 Communication with other GUS servers
Service (GUS)
TCP 443 TCP 443 Communication with Azure and Genetec Inc.
(HTTPS)

System TCP 4592 Connection from Security Center servers


Availability
Monitor Agent TCP 443 Connection to the Health Service in the Cloud
(SAMA) (HTTPS)

AutoVu™-specific ports
When AutoVu™ is enabled in your system, you need to create additional firewall rules to allow proper
communication between Security Center and external AutoVu™ components.
The following table lists the default network ports used by AutoVu™ applications.

Application Inbound Outbound Port usage

LPR Manager UDP 5000 Fixed Sharp unit discovery

TCP 8731 Fixed Sharp units and Patrollers

TCP 8787 Pay-by-Plate (plugin installed separately)

TCP 8832 Updater service

TCP 8001 Sharp control port

TCP 2323 Sharp unit configuration (HTTP)

Plate Reader TCP 80 Video port (Security Center extension HTTP)


Server (Sharp
unit) TCP 443 Video port (Security Center extension HTTPS)

TCP 2323 Extension configuration service (HTTP)

TCP 4502-4534 Silverlight ports and image feed service (for


Sharp models prior to SharpV)

TCP 4545 Control port (Mobile installation)

UDP 5000 Discovery port

TCP 8001 Control port (Fixed installation)

TCP 21 FTP file upload

TCP 8666 Communication with Updater Service

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  50
Installing Security Center

Application Inbound Outbound Port usage

Portal Server TCP 80 Communication port (HTTP)


(Sharp unit)
TCP 443 Secure communication port (HTTPS)

Updater service TCP 8666 Communication with Plate Reader Server


(Sharp unit and in- (greetings only)
vehicle computer)
TCP 8889 TCP 8899 Communication with Patroller Updater

TCP 8832 Communication with LPR Manager

Patroller (in- TCP 4546 Communication with Time server


vehicle computer)
TCP 8001 Communication with Simple Host

UDP 5000 Sharp camera discovery

TCP 8666 Communication with Updater Service (greetings


only)

TCP 8731 LPR Manager connection

Omnicast™-specific ports
When Omnicast™ is enabled in your system, you need to create additional firewall rules to allow proper
communication between Security Center and external IP video devices.
The following table lists the default network ports used by Omnicast™ applications.

Application Inbound Outbound Port usage

Archiver TCP 555 Live and playback stream requests

TCP 605 Edge playback stream requests

TCP 5602 Telnet console connection requests

UPD 6000-6500 Audio from client applications

1
UDP 15000–20000 Live unicast streaming from IP cameras

UDP 47806, 47807 UDP 47806, 47807 Live video and audio multicast streaming

TCP & UDP Vendor specific ports for events and IP


camera discovery

TCP 80 HTTP port

TCP 443 HTTPS port

TCP 554 RTSP port

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  51
Installing Security Center

Application Inbound Outbound Port usage

Redirector TCP 560, 5004 Live and playback stream requests

TCP 554 Communication with Media Router


(Security Center Federation™)

TCP 555 Communication with Archiver

TCP 558 Communication with Auxiliary Archiver

TCP 560, 5004 Stream requests to other redirectors

UPD 6000-6500 Media transmission to client applications

UDP 8000–12000 UDP 8000–12000 Media transmission to other redirectors

UDP 47806, 47807 UDP 47806, 47807 Live video and audio multicast streaming

Auxiliary TCP 558 Live and playback stream requests


Archiver
1
UDP 15000–20000 Live unicast streaming (IP cameras)

UDP 47806, 47807 UDP 47806, 47807 Live video and audio multicast streaming

TCP 554, 560 Live and playback stream requests

Media Router TCP 554 Live and playback stream requests

TCP 554 Federated Media Router stream requests

Media Gateway TCP 654 Live and playback stream requests

UDP 6000-6500 Live video unicast streams

UDP 47806 UDP 51914 Live video multicast streaming

Omnicast™ TCP 5001-5002 Connection to remote Omnicast™ systems.


Federation™

Client UDP 6000–6200 Unicast media streams


applications
(Security Desk UDP 47806, 47807 Live video and audio multicast streams
and Config Tool)
TCP 554, 560 Live and playback video and audio
requests

Client Vendor-specific TCP Unit discovery with the Unit enrollment


application and UDP ports tool
(Config Tool)

1
You can have multiple Archiver agents per server. Each Archiver agent assigns a unique UDP port to each
video unit it controls. In order to make sure that each UDP port on a server is unique, each new Archiver
agent on a server adds 5000 to its start UDP port number. For example, the first Archiver agent uses ports
15000-20000, the second one uses ports 20000-25000, the third one uses ports 25000-30000, and so on.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  52
Installing Security Center

Synergis™-specific ports
When Synergis™ is enabled in your system, you need to create additional firewall rules to allow proper
communication between Security Center and external IP access control devices.
The following table lists the default network ports used by Synergis™ applications.

Application Inbound Outbound Port usage

Access Manager UDP 2000 Synergis™ extension - discovery

TCP 443 Secure communication with Synergis™ units and


HID units (HTTPS)

1
TCP 20 TCP 21 HID extension - FTP data and command

1
TCP 22 HID extension - SSH

1
TCP 23 HID extension - Telnet

TCP 80 HID extension - HTTP communication

TCP 4050 HID extension - VertX OPIN protocol

2
TCP/UPD 4070 TCP/UDP 4070 HID extension - VertX discovery

TCP/UDP Vendor specific ports for events and discovery


from IP access control device

Synergis™ Softwire TCP 80 TCP 80 Communication port (HTTP)


(Synergis™ unit)
TCP 443 TCP 443 Secure communication port (HTTPS)

AutoVu™ SharpV integration (HTTPS)

UDP 2000 UDP 2000 Discovery and P2P communication

TCP 3389 RDP connection (disabled by default)

TCP 2571 TCP 2571 Assa Abloy IP lock (R3 protocol)

UDP 5353 Axis controller discovery (mDNS)

TCP 80 TCP 80 Axis controller communication (HTTP)

TCP 3001 TCP 3001 Mercury/Honeywell communication

TCP 1234 TCP 1234 Salto Sallis lock communication

1
HID VertX/Edge TCP 21 FTP command
Legacy and EVO
1
controllers TCP 22 SSH port (EVO only)

1
TCP 23 Telnet

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  53
Installing Security Center

Application Inbound Outbound Port usage

TCP 4050 VertX OPIN protocol

UDP 4070 UDP 4070 VertX discovery

1
Not required if HID units are configured with Secure mode.
2
The discovery port of an HID unit is fixed at 4070. Once it is discovered, the unit is assigned to an Access
Manager that uses the ports shown in the table above to control it.
For more information about initial HID hardware setup, download the documentation from http://
www.HIDglobal.com.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  54
Installing Security Center

Disabling backward compatibility


Older versions of Security Center (prior to 5.4) do not support the Transport Layer Security protocol.
Therefore, supporting them makes your system more vulnerable to network attacks. To increase the
security of your system, you can disable backward compatibility.

What you should know


Backward compatibility is enabled by default at system installation. This option applies to the entire system.
CAUTION: Mobile Server 4.0 does not support TLS. Disabling backward compatibility means that the
Mobile apps and the Web Clients 4.0 will no longer be able to connect to Security Center. All expansion
servers that have not yet been upgraded to version 5.4 or later will also stop to work. Both Web Client 4.1
and the role-based Web Client 5.6 and later support TLS.
To disable backward compatibility:
1 Connect to Server Admin of your main server with a web browser.
2 Click the main server ( ) in the server list.
3 Under Secure communication, clear the Allow unauthenticated connections (5.3 and earlier) option.

4 Click Save.
Backward compatibility is disabled. The next time someone tries to connect to your system with an older
Security Center application, they will get the Client-server versions are incompatible error.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  55
Installing Security Center

Uninstalling Security Center


If you need to completely remove Security Center from your system, including all data, configuration
settings, and video archives, prior to re-installing it, you must perform a series of steps.

What you should know


CAUTION: If you are uninstalling a previous version of Security Center Client and a Security Center
5.6 Server is installed on the same computer, the server component is also uninstalled. You will need to
reinstall the Security Center Server.
To uninstall Security Center from your system:
1 Take note of the following:
• The service logon username and password for all your servers.
• The name of the database server used to manage the Directory database.

2 In Server Admin, backup the Directory database by clicking Backup/Restore under the Database section
in the Directory tab.
3 Backup the database of each role configured in the system.
4 Close all Security Center applications (Security Desk, Config Tool, and Server Admin).
5 Click Start > Control Panel > Programs and Features.
6 In the Programs and Features window, right-click Genetec Security Center 5.6 Installer, and then click
Uninstall.
7 In the Remove the Program dialog box, click Remove.
8 When the message Uninstallation Completed appears, click Finish.
Genetec Security Center 5.6, the installer program, and all Omnicast™ Compatibility Packs, are removed.
9 (Optional) If you do not want to keep database information, including video archives, uninstall the SQL
Server.
10 In the Windows Start menu, type regedit, and then press ENTER.
11 In the Registry Editor, export the following keys to keep them for future reference, and then delete them
from the registry.
• On 32-bit systems: HKEY_LOCAL_MACHINE\SOFTWARE\Genetec
• On 64-bit systems: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Genetec

12 Make a copy of the following folders if you want to keep them for future reference, and then delete
them.
• On 32-bit systems: C:\Program Files\Genetec Security Center 5.6
• On 64-bit systems: C:\Program Files (x86)\Genetec Security Center 5.6
• On all systems:
• C:\ProgramData\Genetec Security Center
• C:\ProgramData\Genetec Security Center 5.6
• C:\ProgramData\Genetec Update Service
• C:\ProgramData\AppData\Local\Genetec Security Center 5.6
• C:\Users\<username>\AppData\Local\Genetec Inc
• C:\Users\<username>\AppData\Local\Genetec Security Center 5.6
• C:\Users\<username>\AppData\Local\IsolatedStorage
NOTE: You may not be able to delete this folder if other applications are using it.

13 (Optional) Delete the video archives (G64 files) created by the Archiver.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  56
Installing Security Center

IMPORTANT: Do not delete the video archives if you keep the Archiver database.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  57
Installing Security Center

Completing the installation process


After you install Security Center, there is a series of steps you can perform to check the status of your
system.

Before you begin


Install Security Center.
To complete the installation process:
1 Log on to Server Admin on the main server, and check the following in the Directory tab:
• Directory is started.
• Directory database is connected.
• License is activated with all features confirmed.
• SMA number is confirmed with expiration date.
• Automatic backup of the Directory database is enabled and configured.

2 Click the Genetec Server tab, and check the following:


• Authentication and Console passwords are set.
• Network interface card (NIC) is properly selected.
• Mail server is configured (if required).

3 Log on to Server Admin on each expansion server, and check the following:
• Expansion server is connected to the main server.
• NIC is properly selected.

4 Log on to Config Tool, open the Network view, and check the following:
• All servers are online with no health issues.
• Proper network protocol is in use based on network capabilities.
• Public addresses are configured properly where needed.

5 Open the System task, and then click Roles.


6 For every Security Center role, check the following:
• Role is online with no health issues, that is, not displayed in a yellow warning state.
• Role database is connected.
• Automatic backup of the role database is configured (if required).
• Proper NIC is selected for the role, and in the case of the Media Router, for each redirector.

7 Open the User management task, and check the following.


• User groups and partitions are configured according to deployment requirements.
• The Admin user has a password configured.
• Partitions in use are configured according to deployment requirements.

8 Check that you can log on to Security Center with Security Desk.
9 On the server, check for the following:
• The storage drive has sufficient free space left.
• Windows storage indexing is disabled on all drives to be used for video archiving.
• Order of the NICs displayed in the Adapters and Bindings settings is configured properly.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  58
Installing Security Center

• Unused NICs are disabled.


• Server is not a domain controller.
• Windows Update is not configured to automatically reboot the server after installation of updates.
• Windows clock is synchronized to a time source.
• No unwanted application is running.
• No crash or restart is shown in the Windows Event Viewer.
• System antivirus is configured properly (if required) and all exclusions are made.

After you finish


Depending on your deployment requirements, configure your system for:
• Video surveillance/management
• Access control
• License Plate Recognition
For more information about deploying your system, see the Security Center Administrator Guide.
For information about how to enhance the security of your Genetec™ Security Center system, see the
Security Center Hardening Guide.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  59
2
Upgrading to Security Center 5.6
This section includes the following topics:
• "Supported upgrades from earlier versions of Security Center" on page 61
• "Preparing to upgrade from an earlier release of Security Center 5.6" on page 62
• "Preparing to upgrade to Security Center 5.6" on page 63
• "Differences between LPR Manager 5.x and 5.6" on page 64
• "Differences between Web Client 4.x and 5.6" on page 66
• "Differences between Server Admin 5.x and 5.6" on page 69
• "Differences between Security Center 5.x and 5.6 partitions" on page 71
• "Upgrading the Public partition from 5.x to 5.6" on page 73
• "Backward compatibility requirements for Security Center" on page 74
• "Supported Federation features for Security Center 5.6 SR1" on page 78
• "Upgrading from an earlier release of Security Center 5.6" on page 79
• "Upgrading Security Center from 5.4 or 5.5 to 5.6" on page 80
• "Upgrading Security Center from 5.3 to 5.6" on page 81
• "Upgrading Security Center from 5.2 to 5.6" on page 82
• "Upgrading Security Center from 5.1 to 5.6" on page 83
• "Upgrading Failover Directory systems from a previous version or release" on page
84
• "Reactivating the Security Center license for Failover Directory systems" on page
86
• "Upgrading the Security Center main server" on page 91
• "Upgrading expansion servers in Security Center" on page 93
• "Enabling the LPR Manager after an upgrade" on page 94
• "Upgrading Security Center Client" on page 99
• "Backing up databases" on page 100
• "Upgrading the Security Center Directory database" on page 101
• "Shrinking Security Center databases after an upgrade" on page 103
• "About the Genetec Update Service " on page 104
• "Logging on to the Genetec Update Service" on page 105

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  60
Upgrading to Security Center 5.6

Supported upgrades from earlier versions of Security


Center
It is important to know which earlier versions of Security Center can be upgraded to Security Center 5.6
SR1.
A one-step upgrade is supported for the following Security Center releases:
• Security Center 5.3 GA/SR1/SR2/SR3/SR4
• Security Center 5.4 GA/SR2/SR3
• Security Center 5.5 GA/SR1/SR2/SR3/SR4/SR5
• Security Center 5.6 GA
For Security Center 5.2 and earlier, a two-step upgrade is required. For assistance, contact your Genetec Inc.
representative.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  61
Upgrading to Security Center 5.6

Preparing to upgrade from an earlier release of Security


Center 5.6
If you need to upgrade from an earlier release of Security Center 5.6 to the SR1 release, you must prepare
the following.

What you should know

To prepare to upgrade from an earlier release of Security Center 5.6 to release SR1:
• Make sure you have the following information:
• The service logon username and password for all your servers.
• The name of the database server used to manage the Directory database.
You'll have to re-enter the same values when you install Security Center Server 5.6 SR1.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  62
Upgrading to Security Center 5.6

Preparing to upgrade to Security Center 5.6


If you need to upgrade your Security Center system from an earlier version to 5.6, you must go through a
series of preparatory steps.

Before you begin


• Read the Security Center Release Notes
• Make sure you have the following:
• The service logon username and password for all your servers.
• The name of the database server used to manage the Directory database.

What you should know


• Different versions of Security Center Client can coexist on the same machine, but different versions
of Security Center Server cannot. Not all current settings are retained if you uninstall your current
software version before installing the new one.
• If the Active Directory role is not on the same domain as the Active Directory it is synchronizing
with, you must set up a domain trust relationship. For more information on setting up domain trust
relationships, see your Microsoft documentation.
To prepare to upgrade to 5.6:
1 If you are running Windows Server 2008, Windows 7, or Windows Server 2008 R2, you must install
Microsoft hotfix KB2588507.
NOTE: This hotfix is not required for SV appliances.

2 If you are running a version of Windows prior to Windows 10, you must install Microsoft hotfix
KB2919355, followed by Microsoft hotfix KB2999226.
3 If you are running Microsoft SQL Server 2005, install a more recent version of the database server.
Security Center 5.6 is not compatible with Microsoft SQL Server 2005. (see the system requirements for
a list of compatible versions). For more information on how to upgrade your SQL Server, refer to your
Microsoft documentation.
4 If you have an Active Directory role in your current system, make sure that the Windows user
configured to connect to the Windows Active Directory has Read access to the accountExpires attribute.
Starting from Security Center 5.2 SR6, a new standard Windows Active Directory attribute
(accountExpires) is used by the Active Directory role to import users and cardholders to Security Center.
The new attribute sets an expiration date for imported cardholders in Security Center, and changes the
status of imported users to inactive after the specified date.
CAUTION: If the Windows user does not have Read access to the accountExpires attribute, all
cardholders and credentials previously imported from the Windows Active Directory are deleted the
next time you synchronize Security Center with your Windows Active Directory after the upgrade.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  63
Upgrading to Security Center 5.6

Differences between LPR Manager 5.x and 5.6


Beginning in Security Center 5.6, the LPR Manager must work in tandem with an Archiver. After upgrading
an LPR Manager from 5.5 or earlier to 5.6, the role might be in the warning state (yellow). To make the LPR
Manager operational, you must assign an Archiver role to it.

Data management: Before and After


The following diagram shows how data are stored before and after Security Center 5.6.

Feature differences

Characteristics LPR Manager 5.5 and earlier LPR Manager 5.6 and later

Data management The LPR Manager stores both the The LPR Manager stores the LPR metadata
LPR images (captured by context (reads, hits, timestamps, Patroller positions,
cameras, LPR cameras, and wheel and so on) in a database. The Archiver
imaging cameras), and the LPR stores the LPR images (captured by context
metadata (reads, hits, timestamps, cameras, LPR cameras, and wheel imaging
Patroller positions, and so on) in a cameras) on disk in G64 files.
database.

Data retention Data retention periods configured Data retention periods configured in LPR
periods in LPR Manager properties. Manager properties. The Archiver follows
the LPR Manager's data retention settings.

Automatic cleanup Once per day. Every 15 minutes for LPR metadata.
Every 5 minutes for LPR images.

SQL Express capacity Limited to 10 GB per database Limited to 10 GB per database, but stores up
(roughly 160,000 reads with to 6 million reads because the image data are
images). no longer stored in the database.

Performance - Updated data structure to improve query


performance.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  64
Upgrading to Security Center 5.6

Characteristics LPR Manager 5.5 and earlier LPR Manager 5.6 and later

Configuration LPR Manager configuration tabs. LPR Manager configuration tabs.


Archiver Resources tab.
Media Router Properties tab.

Role failover In Config Tool, assign a secondary No changes to the LPR Manager failover
server to the LPR Manager role, configuration.
and make sure the LPR Manager
The Archiver failover is configured
database is accessible over the
separately and independently of the LPR
network from both servers.
Manager. Each server assigned to the
Archiver role must have its own archive
database. This means that when the Archiver
role fails over to the secondary server, the
data managed by the primary server is not
available.
BEST PRACTICE: To simplify the failover
configuration, we recommend assigning
the same primary and secondary servers
to both the LPR Manager and the Archiver
roles, provided that these servers meet the
combined load requirements.

Backup and restore The LPR Manager database is The LPR Manager database is backed up and
backed up and restored like any restored like any role database.
role database.
The Archiver database is only used to store
the catalog of the G64 files stored on disk.
To protect your LPR data, you must back up
both the Archiver database and the G64 files.
NOTE: The Archive transfer task does not yet
support G64 files containing LPR images. If
you restore the G64 files to a different disk,
you must re-index these files in the Archiver
database using the VideoFileAnalyzer.exe
tool.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  65
Upgrading to Security Center 5.6

Differences between Web Client 4.x and 5.6


Beginning in Security Center 5.6, Web Client connects to Security Center core instead of Mobile Server.
Additionally, Web Client 5.6 is easier to use and contains slightly different features than Web Client version
4.x.
This section lists the differences between Web Client version 5.6 and 4.x features.

Feature Mobile Server Security Center


Web Client 4.x Web Client 5.6

General

Platform/OS independent ✓ Part of Security


Center Core

Web server Connection to Security Center Mobile Server Web Client


Server role

Server configuration Web page Config Tool

Load balancing ✓

Service failover ✓ (Client must


reconnect)

Video Streaming Mobile Server Security Center


Media Gateway
role

Secure communication Main communication port ✓ ✓


(encryption and
authentication) Video port ✓

Log on with Active Directory credentials ✓ ✓

Supported languages 14 20

User time zone selection ✓

Online help Help in client Tooltips and help


in client

Reporting

Generate reports ✓ ✓

Print reports ✓ ✓

Export reports CSV ✓ ✓

PDF Use print as PDF Use print as PDF

Video

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  66
Upgrading to Security Center 5.6

Feature Mobile Server Security Center


Web Client 4.x Web Client 5.6

Save camera layouts ✓

View live video ✓ ✓

Video compression Basic MJPEG Native H264 and


dynamic MJPEG

Start/stop recording ✓ ✓

View playback video ✓ ✓

Video timeline (sequence and bookmarks) ✓

Control PTZ cameras ✓ ✓

Camera blocking support ✓ ✓

Export video ✓ ✓

Add bookmarks ✓ ✓

View bookmarked video ✓ ✓

Take snapshots ✓

Browse video archives ✓ ✓

Generate video reports ✓ ✓ (Bookmarks)

Keyboard shortcuts for common tasks ✓

Live updates of entity state ✓

Access Control

Monitor status of doors ✓ ✓

Unlock doors ✓ ✓

Configure credentials ✓ ✓
Delete

✓ ✓
Modify

Configure and manage ✓ ✓


Add/delete
cardholders
✓ ✓
Modify

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  67
Upgrading to Security Center 5.6

Feature Mobile Server Security Center


Web Client 4.x Web Client 5.6

Create and manage ✓ ✓


Create
cardholder groups
✓ ✓
Modify

Control and manage visitors ✓


Check in/out


Modify

Generate access control reports ✓ ✓ (Door activity)

Alarm management

View video associated to alarms ✓ ✓

Generate alarm reports ✓ ✓

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  68
Upgrading to Security Center 5.6

Differences between Server Admin 5.x and 5.6


Beginning in Security Center 5.5, Server Admin comes with a completely revamped user interface, works
with all web browsers (on desktop and mobile devices), supports multi-server connections, and offers a
secure connection (HTTPS).

Characteristics Server Admin 5.4 and earlier Server Admin 5.5 and later

Supported browsers
• Internet Explorer 8, 9, 10, and 11 • Internet Explorer 9, 10, and 11
• Must have Microsoft Silverlight • Chrome 46 (or later)
plugin installed.
• Firefox 42 (or later)
• Safari 9 (or later)
Microsoft Silverlight is no longer required.

Connection URL http://<server>/Genetec https://<server>/Genetec


where <server> is the DNS name where <server> is the DNS name or the IP
or the IP address of the server. address of the server.

Multi-server No. Connects to one server at a Yes. Shows all servers on the system, and
connection time. allows you to view and change the settings
of any of them.

System status overview Shown in the Directory tab. Shown on the Dashboard.
Only visible when Server Admin is Three colored LEDd show the status of the
connected to the main server. system at all times: Database, Directory,
and License. Clicking on an error brings
you to the section where the problem can
be resolved.

Global configuration No. Each server must be configured Yes. Global settings such as server
separately. password, Genetec™ Watchdog, and SMTP
settings, are applied to all servers.

Restart Genetec™ No. Yes.


Server service

User interface Set with the Language Tool. Command within Server Admin.
language
Must restart the Genetec™
Server No need to restart or reload anything.
service and reload the browser
page.

Set color theme No. Choose between Dark (default) and Light.

Check software version From the Config Tool home page, Click About.
click the button.

Deactivate Directory From the server list on the left, select the
1 Connect Server Admin to the
main server ( ), and then click Actions  >
main server.
Deactivate.
2 From the Directory tab, click
Deactivate Directory.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  69
Upgrading to Security Center 5.6

Characteristics Server Admin 5.4 and earlier Server Admin 5.5 and later

Activate Directory From the server list on the left, select an


1 Connect Server Admin to an
expansion server, and then click Actions  >
expansion server.
Activate.
2 From the Genetec™ Server tab,
click Activate Directory.

1
Debug console Not integrated into Server Admin. Integrated into Server Admin, with many
enhancements.

Access to the debug Can be disabled and password The debug console shares the same
console protected for each server. password as Server Admin, and cannot be
disabled separately.

1
The debug console is reserved for our technical support engineers.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  70
Upgrading to Security Center 5.6

Differences between Security Center 5.x and 5.6 partitions


Beginning with Security Center 5.3, there were many changes made that affect how partitions are used and
configured.
The following table summarizes the changes to partitions that apply to Security Center version 5.3 and later.
For more information on creating and configuring partitions in Security Center 5.6, see the Security Center
Administrator Guide.

Security Center 5.2 and earlier Security Center 5.3 and later

Terminology
• Accepted users • Authorized users
• Partition manager • Partition administrator

Security configuration Security task: Allows you to User management task: Allows you
configure users, user groups, and to configure users, user groups, and
partitions in three separate tabs. partitions within a single entity hierarchy.

Partition configuration
• Can only be created in the • Can be created from any
Partitions tab of the Security administration task where an entity
task in Config Tool. hierarchy is shown.
• Partitions are always shown in • Users can choose to show or hide
the Partitions tab of the Security partitions in any administration tasks
task in Config Tool. by clicking Show partitions ( ) in the
Search box. Partitions are completely
• The content of a partition
hidden if no user-created partitions
can only be modified in the
exist.
partition’s Properties tab.
• The content of partitions can be
modified directly in any entity tree by
dragging-and-dropping the entities into
the partitions you want them to be a
member of.

Partition access rights


• Users’ access rights for partitions • Users’ access rights for partitions are
configuration
are configured in the Accepted configured in the Access rights tab of
users tab of each partition each individual user and user group
entity. entity.
• Access rights are implicitly • Access rights are explicitly inherited
inherited from parent user from parent user groups and are
groups. User group members clearly indicated in the user’s Access
have access to the partition even rights tab.
though they are not shown in the
• Access rights granted for a parent
Accepted users tab.
partition are granted by default for the
• Access rights granted for a child partitions, but can be denied on a
parent partition are also granted case by case basis.
for the child partitions.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  71
Upgrading to Security Center 5.6

Security Center 5.2 and earlier Security Center 5.3 and later

Partition membership
• An entity cannot belong to more • There is no limit to the number of
configuration
than three partitions. partitions an entity can belong to.
• There are no rules governing • The system automatically applies a
the partition memberships of set of rules concerning the partition
related entities. Each entity’s memberships of related entities, based
membership to a partition must on the most common practices. For
be configured individually. For example, adding a cardholder group
example, adding a cardholder to a partition automatically adds the
group to a partition does not group members to that partition. The
automatically add the group partition administrator can always
members to that partition. change the automatically applied
memberships on a case by case basis.

Public partition
• All users can see the entities in • The Public partition no longer exists.
the Public partition in entity lists,
• When partitions are not required, the
even non accepted users.
root partition (named after your main
• Only accepted users with server) contains everything you create
administrative privileges can and is accessible to all users by default.
view the properties of the
• When you upgrade a system with
entities in the Public partition.
multiple partitions to 5.6, the Public
• The Public partition cannot be partition is migrated, but the features
renamed nor deleted. of the Public partition in 5.6 are
different.
• Users who were not accepted users
of the Public partition in 5.0, 5.1, or
5.2 will have no access to the Public
partition in 5.6.
• You can rename, modify and delete
the Public partition in 5.6.

System partition
• The System partition is a • The System partition is used to hold
hidden partition with the all entities that must be accessible to
unique characteristic that only all users at all times. For example, the
administrators can access its Always schedule, the Health Monitor
content. role, and the Media Router role, all
belong to the System partition.
• Entities that do not belong to a
user-created partition implicitly • The System partition is exclusively
belong to the System partition. managed by the system. Not even
administrators can change it.
• Entities that do not belong to a user-
created partition automatically belong
to the root partition.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  72
Upgrading to Security Center 5.6

Upgrading the Public partition from 5.x to 5.6


After upgrading a Security Center 5.0, 5.1, or 5.2 system that uses multiple partitions to 5.6, you might have
to grant access rights over the Public partition to certain users for them to have all the access rights they
need in 5.6. This does not apply if you are upgrading from 5.3 and later to 5.6.

Before you begin


• Upgrade Security Center Server to 5.6.
• Upgrade Security Center Client to 5.6.

What you should know


If the Public partition is the only partition in your previous system, then everything is migrated to the root
partition in 5.6, and the partitions are hidden. If other partitions exist in your previous system, the Public
partition is migrated with the following differences:
• Users who were not accepted users of the Public partition in 5.x will have no access to the Public
partition in 5.6.
• You can rename, modify and delete the Public partition in 5.6.
To ensure that all users have the access rights they need after an upgrade from 5.x to 5.6:
1 Identify the users and user groups that need to refer to entities found in the Public partition who are not
authorized users of that partition.
Example: You may have schedule entities in the Public partition that only administrators are allowed
to modify. Other users may only need to refer to these schedules to configure access rules or motion
detection on cameras. In a 5.0, 5.1, or 5.2 system, those users do not need to be accepted users of the
Public partition, but in 5.3 and later, they do.
If you have no such users in your system, no further action is required.
2 Open the User management task.
3 Create a user group and name it PublicPartitionUsers (or any other name easy to remember), and grant
this user group access rights over the Public partition.
Do not create this user group under any parent user group and do not grant it any privileges.
4 Click the Properties tab and add to the user group, the users and user groups that need to refer to the
entities found in the Public partition that you identified earlier.
5 Click Apply.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  73
Upgrading to Security Center 5.6

Backward compatibility requirements for Security Center


Because Security Center 5.6 SR1 is backward compatible with many Security Center 5.x components, you
can upgrade your Security Center system in stages.
BEST PRACTICE: Security Center is only backward compatibile with the two previous versions. If you plan
to upgrade your system in stages, you might experience issues with the applications (Client and Server)
running in backward compatibility mode. For this reason, we recommend that you follow a two-step
upgrade process when you upgrade from a system more than two versions old. Applications more than
three versions old cannot connect to the 5.6 Directory.
The requirements for Security Center backward compatibility are as follows:
• Upgrading to the latest version: When upgrading, you must always upgrade the main server hosting
the Directory role and Config Tool. Always upgrade each expansion server hosting a role type that is not
backward compatible.
• Using new features: To use the new features introduced in version 5.6 SR1, upgrade your Security
Center servers.
• Role assigned to multiple servers: If a role is assigned to multiple servers, such as in a failover
configuration, all of its servers must be running the same version of Security Center.
• Directory assigned to multiple servers: All Directory servers must use the exact same software
version and service release. For example, if you upgrade to Security Center 5.6 SR1, you must upgrade
all Directory servers to 5.6 SR1.
• SQL Server: Because Security Center 5.6 is not compatible with Microsoft SQL Server 2005, you
must install a more recent version of the database server (see the system requirements for a list of
compatible versions). For more information on how to upgrade your SQL Server, refer to your Microsoft
documentation.
IMPORTANT: Because adding backward compatible connections slows down the performance of the
Directory, it is recommended only as a temporary solution before you are able to upgrade all servers and
workstations.

Backward compatibility between Security Center roles


Each new version of Security Center includes new role features that might not be compatible with earlier
versions. The Security Center roles that are backward compatible are outlined in the following table.
IMPORTANT: All expansion servers hosting a role that is not backward compatible must be upgraded to
the same version as the main server hosting the Directory.

5.6 role Backward compatible with 5.4 and 5.5

Access Manager Yes

Active Directory No

Archiver Yes

Auxilliary Archiver Yes

Directory Manager No

Global Cardholder Synchronizer Yes

Health Monitor No

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  74
Upgrading to Security Center 5.6

5.6 role Backward compatible with 5.4 and 5.5

Intrusion Manager Yes

LPR Manager Yes

Map Manager Yes

Media Gateway (renamed from RTSP Media Router No


in 5.5 SR1)

Media Router No

Omnicast™ Federation™ Yes

Plugin (all instances) No

Point of Sale No

Report Manager Yes

Security Center Federation™ Yes

Web Client Server No (new in 5.6)

Zone Manager Yes

Backward compatibility with Security Center tasks


The Security Center 5.6 tasks that are backward compatible with Security Desk 5.4 and 5.5 are summarized
in the following table.

Task category Task type Backward compatible with


Security Desk 5.4 and 5.5

Operation Monitoring (live and playback video) Yes

Maps Yes

Remote No

Cardholder management Yes

Credential management Yes

Visitor management Yes

People counting Yes

Hotlist and permit editor Yes

Inventory management Yes

Alarm management Alarm monitoring Yes

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  75
Upgrading to Security Center 5.6

Task category Task type Backward compatible with


Security Desk 5.4 and 5.5

Alarm report Yes

Investigation Incidents Yes

Transactions No

Zone activities Yes

Investigation > Access control Area activities Yes

Door activities Yes

Cardholder activities Yes

Visitor activities Yes

Area presence Yes

Time and attendance Yes

Credential activities Yes

Credential request history Yes

Elevator activities Yes

Visit details Yes

Investigation > Asset Asset activities No


management
Asset inventory No

Investigation > Intrusion Intrusion detection area activities Yes


detection

Investigation > LPR Hits Yes

Hits (Mutli-region) Yes

Reads Yes

Reads (Mutli-region) Yes

Patroller tracking Yes

Inventory report Yes

Daily usage per Patroller Yes

Logons per Patroller Yes

Reads/hits per day Yes

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  76
Upgrading to Security Center 5.6

Task category Task type Backward compatible with


Security Desk 5.4 and 5.5

Reads/hits per zone Yes

Zone occupancy Yes

Investigation > Video Archives Yes

Bookmarks Yes

Motion search Yes

Camera events Yes

Forensic search Yes

Video file explorer Yes

Maintenance System status Yes

Audit trails Yes

Activity trails Yes

Health history Yes

Health statistics Yes

Hardware inventory Yes

Maintenance > Access control Access control health history Yes

Access control unit events Yes

Cardholder access rights Yes

Door troubleshooter Yes

Access rule configuration Yes

Cardholder configuration Yes

Credential configuration Yes

I/O configuration Yes

Maintenance > Intrusion Intrusion detection unit events Yes


detection

Maintenance > Video Camera configuration Yes

Archiver events Yes

Archive storage details Yes

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  77
Upgrading to Security Center 5.6

Supported Federation™ features for Security Center 5.6


SR1
Security Center 5.6 can federate and be federated by other Security Center systems running different
versions.
Security Center 5.6 SR1 can federate the following:
• Security Center 5.3 and later.
• Omnicast™ 4.6, 4.7 and 4.8 systems.
• Stratocast™ 1.7 systems.
Security Center 5.6 can be federated by the following:
• Security Center 5.5 and 5.6 systems.
IMPORTANT: A system running the most current release of Security Center can:
• Federate systems up to three versions back.
• Be federated by a system running the previous version of Security Center.
For example, Security Center 5.6 systems can federate Security Center 5.3, 5.4, 5.5, and 5.6 systems. A
Security Center 5.4 system can only federate 5.5 systems, not 5.6 systems.
For more information about the limitations of federated entities, see the About federated entities section of
the Security Center Administrator Guide. These limitations apply to both forward and backward federated
systems.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  78
Upgrading to Security Center 5.6

Upgrading from an earlier release of Security Center 5.6


To have the latest release of Security Center 5.6, you can upgrade from an earlier release of 5.6 to SR1 after
you have completed the preparation steps.

Before you begin


• Read the things you need to know and do before you upgrade.
• Back up your Directory database, and all role databases.

What you should know


You do not need to change your license when you upgrade from an earlier release of the same version of
Security Center.
Previous installation choices, such as language and installation types are preserved, and the InstallShield
Wizard will not ask for them again.
To upgrade from an earlier release of Security Center 5.6 to release SR1:
1 Install Security Center 5.6 SR1 on your main server.
2 Install Security Center 5.6 SR1 on your expansion servers, according to your priorities.
3 Install Security Center Client 5.6 SR1 on your client workstations, according to your priorities.

After you finish


If the file AllowedSynchronizationConfiguration.xml was used to set the synchronization times of your HID
VertX units, the settings must be re-applied manually from Config Tool after the upgrade.
TIP: Configure one unit with the required synchronization settings, then use the Copy configuration tool to
set the same settings on multiple units.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  79
Upgrading to Security Center 5.6

Upgrading Security Center from 5.4 or 5.5 to 5.6


To have the latest version of Security Center, you can upgrade from an earlier version (5.4 or 5.5) to 5.6 in a
single step.

Before you begin


• Read the things you need to know and do before you upgrade.
• Read the differences between LPR Manager 5.x and 5.6.
• Read the differences between Web Client 4.x and 5.6.
• If upgrading from 5.4, read the differences between Server Admin 5.4 and 5.6.

What you should know


This process also applies to upgrades from Security Center 5.3 and earlier if you plan to upgrade all your
servers and workstations at the same time.
Not all tasks and roles work in backward compatibility mode. If you plan to upgrade your system in stages,
make sure that the features that are essential to your operation are supported. See Backward compatibility
requirements for Security Center on page 74.
NOTE: A role is upgraded only if you upgrade the server hosting the role. If you only upgrade the main
server, the roles hosted on the expansion servers that are not yet upgraded work in backward compatibility
mode.
IMPORTANT: If you upgrade the LPR Manager, the Archiver it is linked to must also be upgraded. The
upgraded LPR Manager would not work of the Archiver is working in backward compatibility mode.
To upgrade from and earlier version of Security Center (5.4 or 5.5 ) to 5.6:
1 If Omnicast™ systems were federated to your previous Security Center system, uninstall the previously
installed compatibility packs.
2 Do one of the following:
• If you have multiple Directory system, upgrade all your Directory servers at the same time.
• If you have a single Directory system, upgrade your main server.
3 Upgrade the rest of your system according to your priorities and schedule.
• Upgrade your expansion servers.
• Upgrade your client workstations.
If both Security Center Client and Server are installed on the same machine, upgrade them together.
IMPORTANT: Make sure to note and apply the same settings as used for your previous installation:
passwords, databases, ports, general properties, and so on.

After you finish


If the file AllowedSynchronizationConfiguration.xml was used to set the synchronization times of your HID
VertX units, the settings must be re-applied manually from Config Tool after the upgrade.
TIP: Configure one unit with the required synchronization settings, then use the Copy configuration tool to
set the same settings on multiple units.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  80
Upgrading to Security Center 5.6

Upgrading Security Center from 5.3 to 5.6


To upgrade your Security Center system from 5.3 to 5.6, you have the choice to do it in one or two steps.

Before you begin


• Read the things you need to know and do before you upgrade.
• Read the differences between Server Admin 5.3 and 5.6.

What you should know


Security Center is only backward compatible with the two previous versions. If you plan to upgrade
your system in stages, you might experience issues with the applications (Client and Server) running in
backward compatibility mode. For this reason, we recommend that you follow a two-step upgrade process.
However, if you plan to upgrade all your servers and workstations at the same time, follow the Security
Center 5.4 upgrade procedure.
To upgrade from Security Center 5.3 to 5.6 in two steps:
1 Upgrade your system from 5.3 to 5.5.
You need a temporary 5.5 license and the latest Security Center 5.5 installation package. Ask your
representative of Genetec Inc.
a) Upgrade your main server from Security Center 5.3 to the latest 5.5 release.
Follow the upgrade instructions found in the Security Center Installation and Upgrade Guide 5.5.
b) Turn your system on.
All servers and workstations that are not yet upgraded run in backward compatibility mode. This is
the first stage.
c) Upgrade the rest of your system (servers and workstations) to the latest 5.5 release.
Your entire system runs in version 5.5. This is the second stage. You can split this step into as many
stages as necessary, depending on the number of machines you need to upgrade.
2 Upgrade your system from 5.5 to 5.6.
This is a one-step upgrade process.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  81
Upgrading to Security Center 5.6

Upgrading Security Center from 5.2 to 5.6


To upgrade your Security Center system from 5.2 to 5.6, you must follow a two-step upgrade process.

Before you begin


• Read the things you need to know and do before you upgrade.
• Read the differences between Security Center 5.2 and 5.6 partitions.

What you should know


If you plan to upgrade your system in stages, you must follow a two-step upgrade process. If you upgrade
your main server directly from your current version to 5.6, the applications that are not yet upgraded will
not be able to connect to your upgraded Directory. However, if you plan to upgrade all your servers and
workstations at the same time, follow the Security Center 5.4 upgrade procedure.
To upgrade from Security Center 5.2 to 5.6 in two steps:
1 Upgrade your system from 5.2 to 5.4.
You need a temporary 5.4 license and the latest Security Center 5.4 installation package. Ask your
representative of Genetec Inc.
a) Upgrade your main server from Security Center 5.2 to the latest 5.4 release.
Follow the upgrade instructions found in the Security Center Installation and Upgrade Guide 5.4.
b) Turn your system on.
All servers and workstations that are not yet upgraded run in backward compatibility mode. This is
the first stage.
c) Upgrade the rest of your system (servers and workstations) to the latest 5.4 release.
Your entire system now runs in version 5.4. This is the second stage. You can split this step into as
many stages as necessary, depending on the number of machines you need to upgrade.
2 Upgrade your system from 5.4 to 5.6.
This is a one-step upgrade process.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  82
Upgrading to Security Center 5.6

Upgrading Security Center from 5.1 to 5.6


To upgrade your Security Center system from 5.1 to 5.6, you have the choice to do it in two or three steps.

Before you begin


• Read the things you need to know and do before you upgrade.
• Read the differences between Security Center 5.1 and 5.6 partitions.

What you should know


If you plan to upgrade your system in stages, you must follow a two-step upgrade process. If you upgrade
your main server directly from your current version to 5.6, the applications that are not yet upgraded will
not be able to connect to your upgraded Directory. However, if you plan to upgrade all your servers and
workstations at the same time, follow the Security Center 5.4 upgrade procedure.
To upgrade from Security Center 5.1 to 5.6 in two steps:
1 Upgrade your system from 5.1 to 5.3.
You need a temporary 5.3 license and the latest Security Center 5.3 installation package. Ask your
representative of Genetec Inc.
a) Upgrade your main server from Security Center 5.1 to the latest 5.3 release.
Follow the upgrade instructions found in the Security Center Installation and Upgrade Guide 5.3.
b) Turn your system on.
All servers and workstations that are not yet upgraded run in backward compatibility mode. This is
the first stage.
c) Upgrade the rest of your system (servers and workstations) to the latest 5.3 release.
Your entire system now runs in version 5.3. This is the second stage. You can split this step into as
many stages as necessary, depending on the number of machines you need to upgrade.
2 Upgrade your system from 5.3 to 5.6.
Here, you have the choice to perform the upgrade in one or two steps.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  83
Upgrading to Security Center 5.6

Upgrading Failover Directory systems from a previous


version or release
Directory servers are not backward-compatible. Perform this procedure if you are upgrading Security
Center with multiple Directory servers to the latest version or release.

Before you begin


• Read the Security Center release notes for any known issues, limitations, supported firmware, and other
information about this release.
• You need a one-hour window to upgrade all the Directory servers. This period should be scheduled at a
time when it is acceptable to run the system with a minimum set of features.
• Back up the Directory database, all role databases, and configuration files.
• Make sure to note and apply the same settings in the InstallShield that you used for your previous
installation: passwords, database, ports, general properties, and so on.
• The Config Tool and the Directory must be of the same version.
• If Config Tool and the Directory are on different machines, upgrade the Config Tool before you upgrade
the Directory.
• Do not change the Directory failover configuration before upgrading; that is, do not remove the
secondary Directory servers from the list of Directory servers.

What you should know


• During the upgrade, the Directory role is stopped. Consequently, Config Tool and most Security Desk
features are not available. However, video that is displayed before the Directory service goes offline
continues to be streamed in the Security Desk Monitoring task and saved to the Archiver. For example,
video walls continue to display video streams. Access control continues to work as well, but operators
are not able to use Security Desk manually to open doors, etc.
• During the upgrade, each Directory server is upgraded separately. Consequently, the failover feature is
not available.
• License upgrades are only necessary for version upgrades (for example, from version 5.x to 5.6). It is not
necessary to upgrade the license for service release upgrades (for example, from SRx to SRy).
To upgrade a multiple Directory server system:
1 On each of the secondary Directory servers in the Directory server list, stop the Genetec™ Watchdog
service from the Microsoft Management Console (MMC) Service window.
The secondary Directory servers are indicated with the expansion server icon ( ). Do not stop the main
server ( ).
The Genetec™ Server service is stopped on the secondary Directory servers. All roles that only run on
secondary Directory servers are offline. Usually each Directory server is responsible for an equal share
of the role and client connections. After the secondary Directory servers are stopped, any roles or clients
previously connected to one of the secondary Directory servers are forced to reconnect to the primary
Directory server. The clients briefly show the "Connection is lost..." message during this process. The
roles and their entities appear as offline until they are reconnected.
2 Upgrade the primary Directory server as the main server.
The primary Directory server, also known as the main server ( ), is the only server that is still active
before you start the upgrade process. While the main server is being upgraded, no Directory service is
available on the system. Only some features remain functional.
Security Center installer automatically stops the Genetec™ Server service on the main server, and
restarts it after the upgrade.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  84
Upgrading to Security Center 5.6

3 (Only applies to version upgrades) Activate your Security Center 5.6 license by doing one of the
following:
• with the web
• without Internet access
The Directory service is online. All expansion servers (except the secondary Directory servers) and client
workstations that are not yet upgraded run in backward compatibility mode. Directory failover and load
balancing are not yet available.
4 From Config Tool, connect to the main server. Check that all roles, servers, and units are running as
expected.
The secondary Directory servers are still stopped (in red ). Any roles that only run on the secondary
Directory servers are still offline.
5 Upgrade the rest of the Directory servers as expansion servers.
Security Center installer restarts the Genetec™ Server service after each upgrade. Directory failover and
load balancing are still unavailable.
6 (Only applies to version upgrades) Reactivate the Security Center 5.6 license for all your Directory
servers.
Directory failover and load balancing are now available.

After you finish


Upgrade the rest of your system according to your priorities and schedule.
IMPORTANT: Because adding backward compatible connections slows down the performance of the
Directory, it is recommended only as a temporary solution before you are able to upgrade all servers and
workstations.

Related Topics
Backward compatibility requirements for Security Center on page 74

What Security Center client features are available when the Directory service is offline?
During a Security Center system upgrade, all Directory servers must be shut down for a period of time.
During this time, no Directory service is available on the system. Only some features continue to work.
The Security Center features that are available when there is no Directory service:
• Security Desk continues to stream live video from cameras.
• Video continues to be recorded according to schedules as long as Archivers are online.
• All access control functions continue to work as normal, except for commands that must be relayed
by the Directory service, such as event-to-actions, and all door open or unlock operations issued from
Security Desk.
• Doors can be opened through a switch (input) if all inputs and outputs are controlled by the same access
control unit.
The Security Center features that are not available when there is no Directory service:
• Config Tool and Security Desk features are unavailable.
• All manual actions (manual recording, lock/unlock doors, and so on) performed from the Security Desk
widgets are disabled, including camera call-ups.
• Alarms and live events cannot be displayed on Security Desk.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  85
Upgrading to Security Center 5.6

Reactivating the Security Center license for Failover


Directory systems
You must reactivate your Security Center license with a new validation key, every time you add or remove
servers from the list of Directory servers.

Before you begin


To update your license, you need the following:
• System ID and password: The System ID and password are found in the Security Center License
Information document. Genetec™ Customer Service sends you this document when you purchase the
product.

What you should know


IMPORTANT: Server Admin can only be used to activate a single-server license. If you have a multi-
Directory server configuration, both the generation of the validation key and the application of the license
key must be performed from Config Tool. All Directory servers must be running to update the license from
Config Tool.
To activate the Security Center license for a multiple Directory server system:
1 From the Config Tool home page, open the System task, and click the Roles view.
2 Select the Directory Manager ( ) role, and click the Directory servers tab.

3 Click Modify license for all servers.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  86
Upgrading to Security Center 5.6

4 In the License management dialog box, activate your license in one of the following ways:
• Web activation: (Recommended) Reactivate your license from the Internet.
In the dialog box that appears, enter your System ID and Password, and click Activate.
• Manual activation: If your Config Tool workstation has no Internet access, reactivate your Security
Center license manually using a license file.
IMPORTANT: Send the composite validation key (comprising all Directory servers); otherwise, the
license reactivation fails silently and the Directory failover does not work.

A dialog box showing your license information opens.

Click the colored tabs to view your license options.


5 Click Apply to close the dialog box, and click Apply at the bottom of the Config Tool window to save
your changes.

Reactivating your Security Center license using a license file


To reactivate your Security Center license for the changes you made to the list of Directory servers while
the Config Tool workstation has no Internet access, you must use a second workstation to download your
license file from GTAP, and then apply the license file using your first workstation.

What you should know


This procedure fits in the context of reactivating your Security Center license on a Failover Directory
system.
To update your license using a license file:
1 In the License management dialog box, click Save to file to save the composite validation key to a file.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  87
Upgrading to Security Center 5.6

The validation key is a sequence of numbers (in hexadecimal text format) generated by Security Center
that uniquely identifies your server. The validation key is used to generate the license key that unlocks
your Security Center software. The license key that is generated can only be applied to the server
identified by the validation key.

2 In the License management dialog box, click Manual activation, and then under Validation key, click
Save to file.

The validation key is a sequence of numbers (in hexadecimal text format) generated by Security Center
that uniquely identifies your server. The validation key is used to generate the license key that unlocks
your Security Center software. The license key that is generated can only be applied to the server
identified by the validation key.

A text file named validation.vk is saved to your default Downloads folder. Make sure you copy this file to
a location (this can be a USB key) that you can access from another computer that has Internet access.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  88
Upgrading to Security Center 5.6

3 From another computer with Internet access, log on to GTAP at: https://gtap.genetec.com

4 On the GTAP login page, do one of the following:


• Enter the System ID and the Password specified in the Security Center License Information document,
and click Login.
• Enter your GTAP user account (your email address) and Password, and click Login.
1 On the Genetec Portal - Home page, click Activate new system.
2 From the System ID drop-down list, select your system, and click Submit.
The browser opens to the System Information page.

5 Scroll down to the License information section and click Activate license.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  89
Upgrading to Security Center 5.6

6 In the dialog box that opens, browse to your validation key (.vk file), and click Submit.
The message License activation successful appears.
7 Click Download License, and save the license key to a file.
The default name is your System ID followed by _Directory_License.lic.
8 Return to the Config Tool workstation.
9 In the License management dialog box, click Manual activation.
10 In the Manual activation dialog box, browse for the license key (.lic file), and click Open.

11 Click Activate.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  90
Upgrading to Security Center 5.6

Upgrading the Security Center main server


The main server in your current Security Center system must be upgraded before everything else. You must
apply a new license and upgrade the Directory database.

Before you begin


• Read the things you need to know and do before you upgrade (see related topics).
• Back up your Directory database, and all role databases accessed from your main server.

What you should know


You need the Security Center 5.6 Config Tool to connect it to the 5.6 Directory. If Security Center Client was
installed on the main server, upgrade it at the same time.
If a reboot warning message appears during the upgrade, accept the message and continue with the
upgrade procedure. You must reboot after completing the upgrade.
To upgrade the main server:
1 Install Security Center 5.6 on your main server.
Use the Main server installation type.
The Installer program automatically detects an earlier version of Security Center and issues warnings
and recommendations. Read the messages carefully. If you continue, the Installer program upgrades
Security Center to 5.6.
2 When prompted to confirm that you have a current backup of your databases, click the confirmation
checkbox, click Next, and follow the rest of the InstallShield Wizard instructions.

The installer updates your Security Center software and the schema of your Directory database.
3 Activate your new Security Center 5.6 license.
4 If an LPR Manager is hosted on this server, enable it by assigning an Archiver to it.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  91
Upgrading to Security Center 5.6

Related Topics
Backing up databases on page 100
Preparing to upgrade to Security Center 5.6 on page 63
Upgrading the Security Center Directory database on page 101
Activating Security Center license using the web on page 25
Activating Security Center license without Internet access on page 28

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  92
Upgrading to Security Center 5.6

Upgrading expansion servers in Security Center


To benefit from the latest enhancements to Security Center, you must upgrade the expansion servers.
To upgrade, install Security Center Server onto the expansion servers, and follow the instructions in the
InstallShield Wizard.

Before you begin


• If you are migrating from Omnicast™ 4.x, see the Omnicast™ Migration Guide.
• Back up all role databases accessed from your expansion server you are upgrading.

What you should know


If a reboot warning message appears during the upgrade, accept the message and continue with the
upgrade procedure. You must reboot after completing the upgrade.
To upgrade an expansion server:
1 Install Security Center 5.6 on your expansion server.
Use the Expansion server installation type.
The installer automatically detects an earlier version of Security Center software and upgrades it to 5.6.
2 If an LPR Manager is hosted on this server, enable it by assigning an Archiver to it.
3 Repeat the steps for all expansion servers in your system.

After you finish


To verify that all servers in your system are active, log on to the main server with Config Tool. In the
Network view task, all the servers in your system should be shown in black, which means they are active. If
some of the roles are still not active, you might need to upgrade the Directory database.

Related Topics
Backing up databases on page 100
Preparing to upgrade to Security Center 5.6 on page 63

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  93
Upgrading to Security Center 5.6

Enabling the LPR Manager after an upgrade


To enable an LPR Manager that is in the warning state (yellow) after an upgrade, you must assign an
Archiver role to it.

Before you begin


Do the following:
• Read about the differences between LPR Manager 5.x and 5.6.
• Set up the Archiver for managing the images associated to the reads and hits.

What you should know


After upgrading the LPR Manager from 5.5 or earlier to 5.6, the LPR Manager continues to manage the
image data that were collected before the upgrade. Only the new image data are managed by the Archiver.
The old image data remain in the LPR Manager database for as long as their retention period specifies, and
then they are deleted. Deleting the old image data frees up space in the LPR Manager database for new LPR
metadata, but the database file will not shrink in size.
To enable the LPR Manager after an upgrade:
1 From the Config Tool home page, click System > Roles.
2 Click the LPR Manager that is in the warning state, and click Resources.
3 Click Images saved to, and select the Archiver role you created earlier.
4 Click OK > Apply.

Setting up the Archiver role for LPR


To complete the configuration of an LPR Manager, you must link an Archiver to the LPR Manager to
store the LPR images (captured by context cameras, LPR cameras, and wheel imaging cameras) that are
associated to the reads and hits.

What you should know


BEST PRACTICE: We do not recommend a single Archiver for managing both LPR and video data because
the settings optimized for storing LPR images are different from the ones for storing video. If you need
to perform both functions on your system, we recommend that you create separate Archiver roles, each
handling only one function.
If you already have an Archiver role that is available (not managing video), you can use it and skip the role
creation steps.
If you are unable to have separate Archiver roles, you can manage both LPR and video data with the same
Archiver. Note that by default, the Archiver deletes the oldest files when its disks become full. This means
that LPR images might be deleted before their retention period is over. This does not affect LPR metadata or
the protected events and images.
To create an Archiver role for LPR:
1 From the Config Tool home page, open the Video task.
2 Click the menu button beside Video unit ( ), and then click Archiver ( ).
The role creation wizard window opens.
3 On the Specific info page, set the following fields, and then click Next.
• Server: This parameter appears only if you have more than one server in your system. If the LPR
Manager is hosted on its own server, we suggest using the same server to host the linked Archiver

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  94
Upgrading to Security Center 5.6

role. If it is an upgrade from Security Center 5.5 or earlier, make sure you have enough free space
on disk to store the LPR images. We recommend using a server where it is possible to configure the
Archiver role with its dedicated local disk or disk partition.
• Database server: Name of the SQL Server service (default=(local)\SQLEXPRESS). If the Archiver is
hosted on the same server as the LPR Manager, we recommend using the same database server for
both.
• Database: Name of the database instance (default=Archiver). We suggest using LPR_Archiver to
differenciate it from video archive databases.

4 On the Basic information page, set the following fields, and then click Next.
• Entity name: Name of the Archiver role (default=Archiver).
We suggest using LPR_Achiver to differentiate it from the Archiver role for video.
• Entity description: Role description. If this Archiver role is shared by many LPR Manager roles, we
suggest that you list them here.
• Partition: This parameter appears only if you have partitions defined in your system. Make sure you
create this Archiver in the same partition as the LPR Manager it is linked to. Only users who have
access to the selected partition can view the LPR data managed by these roles.

5 Verify that the information displayed in the Creation summary page is correct, and then click Create.
6 Click Close.
7 From the Archiver role's Resources tab, configure the archive storage settings.
IMPORTANT: Make sure you are not using the same disk as another Archiver role in your system, and
that you have enough disk space for storing the LPR images.
NOTE: The Archiver follows the Hit and Read image retention period set for the LPR Manager. If
multiple LPR Manager roles are linked to the same Archiver, the LPR Manager with the longest image
retention period wins. This means that the image data might be kept longer than necessary for some
LPR Manager roles, but it does not affect the LPR metadata nor the LPR reports. No LPR data beyond the
specified retention periods appear in reports.

8 Click Advanced settings, and optimize the settings for storing LPR image data.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  95
Upgrading to Security Center 5.6

The recommended values are:


• Delete oldest file when disks are full: OFF (default setting for video is ON).
• Maximum length: 60 minutes (default value for video is 20 minutes).
• Maximum size: 100 MB (default value for video is 500 MB).

9 Click OK > Apply.


10 Click Apply.
11 In the entity browser (left pane) of the Video task, make sure that the Media Router role is running.

12 Click Media Router and configure the ports, redirectors, and network cards to make sure that the
Archiver can deliver the LPR images to all client workstations on your system.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  96
Upgrading to Security Center 5.6

If all your servers are on the same network, and all your servers have only one network card, the
default settings should work without any change.

Storage requirement for LPR images


The images associated with the reads and hits are stored on disk in G64 files by an Archiver. You can
estimate the disk space required to store these images if you know the average number of reads and hits
processed by the LPR Manager per day.
For every license plate read or hit processed by the LPR Manager, the Archiver stores a set of four images:
• One context camera image (in either high resolution or low resolution)
• One LPR camera image (cropped to show only the license plate)
• One context camera thumbnail image
• One LPR camera thumbnail image
The size of the image set depends on the model of the Sharp camera and whether the context camera is
configured to take images in high resolution or low resolution.
Use the following formula to estimate the disk space you need for the desired image retention periods.
Disk space = (ReadsPD x ImageSize x ReadIRP) + (HitsPD x ImageSize x HitIRP)
where:
• ReadsPD: Average number of reads per day.
• ImageSize: Estimated image size per read (depends on the Sharp model and configuration).
• ReadIRP: Read image retention period (see LPR Manager's Properties tab).
• HitsPD: Average number of hits per day.
• HitIRP: Hit image retention period (see LPR Manager's Properties tab).
If your Patroller vehicles are equipped with wheel imaging cameras, double the number of hits per day in
your formula (there are typically one wheel image per hit).
The following table gives you the rough estimates of the image size per read based on the Sharp model and
configuration.

Type of image Sharp VGA or XGA SharpV

Context camera image (high res. config.) ~50 KB ~120 KB

Context camera image (low res. config.) ~18 KB -

LPR camera image (cropped) ~3 KB ~3 KB

Context camera thumbnail image ~3 KB ~3 KB

LPR camera thumbnail image ~1 KB ~1 KB

Image size per read (high res. config.) ~57 KB ~127 KB

Image size per read (low res. config.) ~25 KB -

NOTE: If a read or hit is protected and must be kept beyond its specified retention period, it will
require more disk space for its associated images than what is calculated for a single event. Because the
Archiver stores multiple LPR images in a single G64 file, if one image in the file is protected, then all other

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  97
Upgrading to Security Center 5.6

images in the file are also protected. This uses up more disk space over time. However, an image whose
corresponding read or hit has been deleted can no longer be read because the G64 files are encrypted.
If the Archiver is assigned to more than one LPR Manager, add the numbers for all LPR Manager roles
together.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  98
Upgrading to Security Center 5.6

Upgrading Security Center Client


After you upgrade the Security Center main server and expansion servers, you can upgrade Security Center
Client.

What you should know


Client upgrade from Security Center 5.1 and earler to Security Center 5.6 is not supported. Security Center
5.6 Client is installed side-by-side with previous Security Center Client versions. After it has been installed,
you can delete the older version.
To upgrade from a previous version of Security Center Client (5.2 and later) to 5.6:
• Install Security Center Client.
NOTE: The user workspace configuration is not preserved. In previous versions of Security Center,
the user workspace was saved as a workstation configuration. Starting from 5.4, the user workspace is
saved as part of the user profile in the Directory. The upgrade does not convert these settings for you.

The installer automatically detects an earlier version of Security Center software and upgrades it to 5.6.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  99
Upgrading to Security Center 5.6

Backing up databases
You can protect the data in a role’s database by regularly backing up the database. Also, it is always best
practice to backup your databases before an upgrade.

What you should know


All role databases are backed up from Config Tool, except for the Directory database, which must be backed
up from the Server Admin Main server page. The procedures are very similar in both cases. Therefore, only
backing up from Config Tool is described here.
NOTE: The following cases are exceptions:
• To back up the Archiver and Auxiliary Archiver role databases with their associated video files, see
Transferring video archives manually.
• To back up the Directory database while the Backup and restore failover mode is enabled, see
Generating full Directory database backup.
• There are restrictions regarding the backup and restore of the Directory database when the Mirroring
failover mode is enabled. For more information, refer to the Microsoft SQL Server Database Mirroring
documentation.
To back up a role’s database:
1 From the Config Tool home page, open the System task, and click the Roles view.
2 Select a role, and click the Resources tab.
3 Click Backup/Restore ( ).
4 In the Backup/Restore dialog box, beside the Backup folder field, click Select folder ( ), and select the
folder where you want to save the backup file.
NOTE: The path is relative to the server hosting the role, not to the workstation where you are running
Config Tool. To select a network drive, enter the path manually, and make sure the service user has
write access to this folder.

5 (Optional) Switch the Compress backup file option to ON to create a ZIP file instead of a BAK file.
If you select this option, you’ll need to unzip the backup file before you can restore it.
6 Click Backup now.
A backup file is created in the backup folder with the file extension BAK. The name of the file is the
database name, followed by “_ManualBackup_”, and the current date (mm-dd-yyyy).

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  100
Upgrading to Security Center 5.6

Upgrading the Security Center Directory database


The Security Center 5.6 Installer upgrades the Directory database as part of the main server upgrade. You
only need to upgrade the Directory database manually if you restored an older version of the database.

What you should know


After restoring an older version of the Directory database, Server Admin notifies you that a database
update is required. For information on restoring databases, see the Security Center Administrator Guide.

To upgrade the Directory database:


1 Do one of the following:
• Click Database with the flashing red LED.
• Click Database update ( ) in the Directory section.
The Directory database update starts, and the database server status shows Upgrading.
2 While the database is being upgraded, click Show progress ( ) to view the progress of the upgrade.
When the upgrade is completed, the Status shows OK.
3 Click Database properties ( ) to confirm the version of the database and the number of entities in the
database.
4 Log off from Server Admin, and then log on to Config Tool.
5 Open the System task, and select Roles.
6 Select the Archiver role, and click Resources.
7 In the Actions section, click Database update ( ).

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  101
Upgrading to Security Center 5.6

After the upgrade is complete, the Database status indicates Connected.


8 Repeat the steps for every role that requires a database update. The roles on your system vary
depending on your license options.

After you finish


Shrink the Archiver database, and if necessary, other databases that you have upgraded.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  102
Upgrading to Security Center 5.6

Shrinking Security Center databases after an upgrade


After a database upgrade, its disk usage may significantly increase due to the temporary storage required
to execute the upgrade transactions. The disk space used during the upgrade is not automatically released
after the upgrade is complete. To reclaim the unused disk space, you must shrink the database.

Before you begin


Not all database upgrades cause the database to grow in size. However, in the case of the Archiver database
upgrade from 5.3 to 5.6, we do recommend shrinking the database after the upgrade. If you are not sure
whether or not you need to shrink your database after an upgrade, check its disk usage with SQL Server
Management Studio.

What you should know


Depending on the recovery model of your database, a transaction log backup may be required in order to
reclaim the unused disk space. For more information, see the following online articles: Recovery Models
(SQL Server) and Transaction Log Truncation.
To shrink a database:
1 Follow the procedure Shrink a Database published online by Microsoft.
2 Apply the same procedure to all databases that require shrinking.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  103
Upgrading to Security Center 5.6

About the Genetec™ Update Service


The Genetec™ Update Service is a web-based service that is automatically installed with Security Center.
Using the Genetec™ Update Service, you can do the following:
• Update your Security Center products when a new release becomes available.
• Check for updates at regular intervals.
• Automatically download updates when they become available.
NOTE: You can configure updates to be downloaded in the background, but some manual intervention
is still required.
• View when the last check for updates occurred.
• Configure peer-to-peer sharing with multiple peers connected to the internet, or a single peer connected
to the internet. Update files are downloaded once and shared with other peer machines.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  104
Upgrading to Security Center 5.6

Logging on to the Genetec™ Update Service


To log on to Genetec™ Update Service, you must open the application and enter your Genetec™ Update
Service password (if one has been defined).
To log on to the Genetec™ Update Service:
1 Do one of the following:
• Click Start > All Programs > Genetec™Security Center 5.x > Genetec™ Update Service.
NOTE: If you installed the service manually, it cannot be accessed from the start menu.
• Type https://localhost:4595 in your web browser.
2 Do one of the following:
• Click Sign in to log on with the default blank password.
• Enter your Genetec™ Update Service password and click Sign in.

After you finish


For information about using the Genetec™ Update Service, click Help in the application.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  105
3
Automating Security Center installation
This section includes the following topics:
• "Silent installation in Security Center" on page 107
• "Preparing to perform a silent installation" on page 108
• "Silent install command for Security Center" on page 109
• "Installer (MSI) options" on page 111
• "Sample Security Center Server installation commands" on page 115
• "Sample Security Center Client installation commands" on page 117
• "Uninstalling Security Center 5.6 in silent mode" on page 118

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  106
Automating Security Center installation

Silent installation in Security Center


A silent installation is an automated way of installing software without user intervention. The silent
installation is run from the command line using the Security Center setup.exe executable, and Windows
Installer commands.
You can customize the following options from the command line:
• Installation language
• Application language
• Client or Server installation path
• Client or Server features to install
• Server username and password for running the services
• Server and database name

Limitations
Take note of the following limitations before performing a silent installation:
• You cannot update your license in silent mode. You’ll need to run the Server Admin application after
installing Security Center to activate the license.
• A command line is limited to a maximum of 850 characters.
TIP: One way to shorten the command line length is to reduce the installation path length. This can be
achieved by copying the installation files onto a local drive.
• You cannot use mapped drives in your path specifications.
• You cannot install WinPcap (utility for capturing diagnostic data) in silent mode.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  107
Automating Security Center installation

Preparing to perform a silent installation


There are certain tasks you should perform prior to the installation to ensure it goes smoothly.
Before performing a silent installation:
1 Install the Security Center prerequisites.
Security Center installer automatically verifies and installs the software prerequisites on your system.
This may cause your system to restart. Therefore, it is best practice to manually install the software
prerequisites before launching the silent installer.
2 If you specify a different Windows user than the default (Local System) to run the services, then that
user must be created before you begin the installation process.
The user must be a member of the Administrators group and must have the Log on as service user
privilege.

Related Topics
Installing SQL Server on a separate drive on page 5

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  108
Automating Security Center installation

Silent install command for Security Center


When performing a silent installation, specific program options are required to run the Security Center
Installer.
The syntax for running the setup in silent mode is:
<setup_exe> <setup_options> <msi_options>
where:
• <setup_exe>: This is the setup program for the Security Center Installer. You can either use the
standalone version ("Security Center Setup.exe" found in the SC Packages folder) or the web
version (SecurityCenterWebSetup.exe).
Do not use setup.exe found in the root folder of the installation package. It is an AutoRun-enabled
version of the standalone installer, and as such, it does not accept command line arguments.
• <setup_options>: These are the setup options. They all start with a forward slash (/).
• <msi_options>: These are the Installer (MSI) options. They are all written in capital letters.
The following table lists the setup options.

Setup option Description

/ISInstallDir Specifies the root folder where the product subfolder (Genetec Security
Center 5.6) will be created.
EXAMPLES:
• /ISInstallDir=C:\MyFolder
• /ISInstallDir="D:\Program Files\MyFolder"
NOTE: In the second example, the (") are required because the value
contains spaces. If not specified, the default is <ProgramFiles>,
where <ProgramFiles> is either %PROGRAMFILES% or
%PROGRAMFILES(X86)%, depending on the version of your operating
system.

/ISFeatureInstall Specifies the features to be installed. The possible values are:


• Server (Genetec™ Server with or without Directory, depends on the
SERVER_TYPE installer option)
• Client (Security Desk and Config Tool)
• SecurityDesk (only Security Desk)
• ConfigTool (only Config Tool)
• CompPacks,CompPack4x[,CompPack4x] (Omnicast™ compatibility
packs, you must specify at least one pack)
EXAMPLES:
• /ISFeatureInstall=Server,Client (DEFAULT)
• /ISFeatureInstall=Client,CompPacks,CompPack48

/silent Sets the Security Center setup.exe program to run in silent mode with no
user interaction.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  109
Automating Security Center installation

Setup option Description

/debuglog<FilePath> Enables the creation of the debug log file and specifies the file path.
NOTE: The folder path specified in <FilePath> must exist. The setup
program will not create it.
EXAMPLE: /debuglog"C:\DebugLog.log"

/log<FolderPath> Enables the creation of log files and specifies the folder path.
NOTE: The <FolderPath> must exist. The setup program will not
create it.
EXAMPLE: /log"C:\AllMyLogFiles\"

/language: Sets the language used by the installation program. Immediately


precedes the four-digit language code. No space is allowed.
EXAMPLES
• /language:1033 for English (DEFAULT)
• /language:3084 for French

<msi_options> Sets the Security Center Installer (MSI) option list.


Each option in the list uses the following syntax:
<option>=<value_list> where <option> is an option name, and
<value_list> is a list of comma seperated values. No space is allowed
on either side of the equal sign (=). If the value list must contain spaces,
the entire value list must be included between a pair of double quotes
preceded by a backslash (\").

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  110
Automating Security Center installation

Installer (MSI) options


When performing a silent installation, you can specify additional options for the Security Center Installer
(MSI).
The following table lists the Security Center Installer (MSI) options. All installer options are written in
capital letters. Unlike the setup options, none of them are preceded with a forward slash (/). All options
names are case sensitive.
IMPORTANT: Beginning with Security Center 5.6, all servers on the system share the same
password. Therefore, for the installation of both main and expansion servers, only use the option
MAINSERVER_PASSWORD to specify the password.

Installer (MSI) option Description

ACTIVATIONCODE This is the activation code required to allow SAM to collect system
data.
EXAMPLE: DATACOLLPOLICY=On ACTIVATIONCODE=mycode

BACKUP_DATABASE Specify that the Directory database must be backed up prior to the
installation (and prior to the database upgrade). Configuration Files
are also backed up in the same destination folder as the database.
If the database does not exist, the database is not backed up but
the configuration files still are. Possible values are Y or N. When
this option is omitted, the default value is N. When set to Y, the
BACKUP_DATABASE_PATH property must be set to a valid folder.
EXAMPLE: BACKUP_DATABASE=Y

BACKUP_DATABASE_PATH Used in conjunction with the BACKUP_DATABASE option. Specify the


folder where the database backup must be saved. If the path does not
exist, it will be created.
EXAMPLE: BACKUP_DATABASE_PATH=C:\Backups

CREATE_FIREWALL_RULES Add the installed Security Center applications to the Windows


Firewall exceptions list. Possible values are 0 or 1.
• 0 = Do not create firewall rules
• 1 = Create firewall rules (DEFAULT)
EXAMPLE: CREATE_FIREWALL_RULES=1

DATABASE_INSTANCE Used in conjunction with the BACKUP_DATABASE option. Specify the


instance name of the Directory database, if different from the default.

DATABASE_SERVER Same as GLOBAL_SERVER option. This parameter maintains backward


compatibility with previous silent installation scripts.

DATACOLLPOLICY This option allows the configuration of the Service Availability


Monitor (SAM). The possible values are:
• Anonymous: SAM will collect anonymous data (DEFAULT)
• On: SAM will collect data with system information. Requires
ACTIVATIONCODE.
• Off: SAM will not collect data.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  111
Automating Security Center installation

Installer (MSI) option Description

DEACTIVBASIC This is a boolean value that specifies whether basic camera


authentication should be deactivated.
• 0 = Basic authentication enabled
• 1 = Basic authentication disabled (DEFAULT)
EXAMPLE: DEACTIVBASIC=0

GLOBAL_SERVER Specify the database server name for all roles installed by default.
When omitted, the default value is (local)\SQLEXPRESS.
EXAMPLE: GLOBAL_SERVER=BLADE32\SQLServerEnterprise

LANGUAGECHOSEN Language used by Security Center. The possible code values are:
• Arabic - 1025
• Chinese (Simplified) - 2052
• Chinese (Traditional) - 1028
• Czech - 1029
• Dutch - 1043
• English - 1033
• French - 3084
• German - 1031
• Hebrew - 1037
• Hungarian - 1038
• Italian - 1040
• Japanese - 1041
• Korean - 1042
• Norwegian - 1044
• Persian - 1065
• Polish - 1045
• Brasilian Portuguese - 2070
• Russian - 1049
• Spanish - 1034
• Swedish - 1053
• Thai - 1054
• Turkish - 1055
• Vietnamese - 1066
EXAMPLE: LANGUAGECHOSEN=3084
If the code is invalid, English will be used. If this option is omitted, the
installation language (specified with the /language: setup option)
will be used.

MAINSERVER_ENDPOINT Used for expansion server installation. Specify the name or IP address
of the main server.
EXAMPLE: MAINSERVER_ENDPOINT=MYMAINSERVER

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  112
Automating Security Center installation

Installer (MSI) option Description

MAINSERVER_PASSWORD Mandatory option for server installation commands. The password


must be at least 8 characters long.
EXAMPLE: MAINSERVER_PASSWORD=serverpassword

REBOOT Use this option to force or suppress a reboot after the Server
installation has ended. Possible values are:
• F - To force a reboot when your installation is complete.
• S - To suppress any reboot except the one caused by the
ForceReboot action.
• R - To suppress any reboot caused by Windows Installer actions.
(DEFAULT)

SECURE_COMMUNICATION This is a boolean value that specifies whether secure communication


(Directory authentication) should be enforced.
• 0 = Not enforced, Directory authentication turned off (DEFAULT)
• 1 = Enforced, Directory authentication turned on
EXAMPLE: SECURE_COMMUNICATION=1

SERVER_TYPE Specify whether to install a main or an expansion server. The possible


values are:
• Main: Install Genetec™ Server with Directory (DEFAULT)
• Expansion: Install Genetec™ Server without Directory

SERVERADMIN_PASSWORD OBSOLETE. DO NOT USE. Use MAINSERVER_PASSWORD instead.

SERVERADMIN_PORT Specify the HTTP port for the web-based Server Admin.
EXAMPLE: SERVERADMIN_PORT=8080
If not specified, the default is 5500.

SERVICEPASSWORD Specify the password to use in the services.


EXAMPLE: SERVICEPASSWORD=anypassword
User and password need to be created first with the right credentials
prior to using those properties. If not specified, the default is blank.

SERVICEUSERNAME Specify the username to use in the services.


EXAMPLE: SERVICEUSERNAME=.\admin

SKIPSERVICESTART Use this option to prevent the Security Center services from starting
immediately after the installation (default behavior). You can use
this option, if for example, you need to install hotfixes right after
the full installation. If you use this option, don’t forget to start the
Security Center services (NET START GenetecServer and NET START
GenetecWatchdog) after the hotfix installation.
EXAMPLE: SKIPSERVICESTART=Y

SQL_INSTANCE_NAME Specify the new SQL Server instance's name. This option needs to be
specified when SQLSERVER_GROUP has a value of NewServer.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  113
Automating Security Center installation

Installer (MSI) option Description

SQLSERVER_GROUP Specify if a new or an existing SQL server is silently installed. The


possible values are:
• NewServer (must be used with SQL_INSTANCE_NAME)
• ExistingServer (DEFAULT)

UPGRADE_DATABASE Specify that the Directory database should be automatically upgraded.


If no database exists, this option is ignored. Possible values are Y or N.
When this option is omitted, the default value is N.
EXAMPLE: UPGRADE_DATABASE=Y

WEBSERVER_PORT Specify the HTTP port for the web-based Server Admin.
If not specified, the default is 80.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  114
Automating Security Center installation

Sample Security Center Server installation commands


Using the different command options, you can customize your Security Center Server silent installation.

Example
Genetec™ Server with Directory is installed in English with a specific Username and Password for the
service to run under. The files are found in a new directory, the database server is specified, and there is no
reboot. Setup runs in silent mode without any questions.

"Security Center Setup.exe" /silent /language:1033 /ISFeatureInstall=Server /


ISInstallDir=C:\MyFolder SERVICEUSERNAME=.\toto SERVICEPASSWORD=password
DATABASE_SERVER=(local)\Genetec DATABASE_INSTANCE=DirectorySecurityCenter
MAINSERVER_PASSWORD=serverpassword REBOOT=S

Example
A standard installation of Genetec™ Server as the main server, with Directory, and without any questions.
Only the installation path is different.

"Security Center Setup.exe" /language:1033 /silent /ISInstallLDir=c:\GENETEC_PATH /


ISFeatureInstall=Server MAINSERVER_PASSWORD=serverpassword

Example
A standard installation of Genetec™ Server as an expansion server, without any questions. Only the
installation path is different.

"Security Center Setup.exe" /language:1033 /silent /ISInstallLDir=c:\GENETEC_PATH /


ISFeatureInstall=Server SERVER_TYPE=Expansion MAINSERVER_PASSWORD=serverpassword

Example
A standard installation in French, in silent mode without any questions.

"Security Center Setup.exe" /language:3084 /silent MAINSERVER_PASSWORD=serverpassword

Example
A complete installation in English, with Omnicast™ compatibility packs 4.7 and 4.8, in silent mode without
any questions. The default database server name, (local)\SQLExpress, is used for the Directory.

"Security Center Setup.exe" /


ISFeatureInstall=Client,Server,CompPacks,CompPack47,CompPack48 /language:1033 /silent
MAINSERVER_PASSWORD=serverpassword

Example
A complete installation in English, in silent mode without any questions. This setup will create a log file
located in C: drive.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  115
Automating Security Center installation

"Security Center Setup.exe" /language:1033 /silent /ISFeatureInstall=Client,Server /


log"C:\" /debuglog"C:\DebugLog.log" MAINSERVER_PASSWORD=serverpassword

Example
A complete installation in English, in silent mode without any questions. Security Center applications will
use Arabic.

"Security Center Setup.exe" /language:1033 /silent /ISFeatureInstall=Client,Server


LANGUAGECHOSEN=1025 MAINSERVER_PASSWORD=serverpassword

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  116
Automating Security Center installation

Sample Security Center Client installation commands


Using the different command options, you can customize your Security Center Client silent install.

Example
Security Desk is installed in English, in silent mode without any questions.

"Security Center Setup.exe" /language:1033 /silent /ISInstallDir=c:\GENETEC_PATH /


ISFeatureInstall=SecurityDesk

Example
Config Tool and Security Desk are installed in French, in silent mode without any questions.

"Security Center Setup.exe" /language:3084 /silent /ISInstallDir=c:\GENETEC_PATH /


ISFeatureInstall=ConfigTool,SecurityDesk

Example
Config Tool and Security Desk are installed in English, in silent mode without any questions.

"Security Center Setup.exe" /language:1033 /silent /ISInstallDir=c:\GENETEC_PATH /


ISFeatureInstall=ConfigTool,SecurityDesk

Example
A typical Installation in French, in silent mode without any questions.

"Security Center Setup.exe" /language:3084 /silent MAINSERVER_PASSWORD=serverpassword

Example
A complete installation in English, with Omnicast™ compatibility pack 4.8, in silent mode without any
questions.

"Security Center Setup.exe" /IsInstallFeature=Client,Server,CompPacks,CompPack48 /


language:1033 /silent MAINSERVER_PASSWORD=serverpassword

Example
A complete installation in English, in silent mode without any questions. Security Center applications will
use Arabic.

"Security Center Setup.exe" /language:1033 /silent /ISFeatureInstall=Client,Server


LANGUAGECHOSEN=1025 MAINSERVER_PASSWORD=serverpassword

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  117
Automating Security Center installation

Uninstalling Security Center 5.6 in silent mode


Security Center can be uninstalled in silent mode.
To uninstall Security Center (Client and Server components) in silent mode:
• Run the following command from the SC Packages folder of the Security Center installation package:
"Security Center Setup.exe" /silent /remove

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  118
4
Troubleshooting
This section includes the following topics:
• "Troubleshooting: Error installing Microsoft .NET Framework, Return Code:
0x800f081f" on page 120
• "Troubleshooting: Video stability and performance issues" on page 121
• "Troubleshooting: Files remain blocked after unblocking them manually" on page
122

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  119
Troubleshooting

Troubleshooting: Error installing Microsoft .NET


Framework, Return Code: 0x800f081f
If your Security Center installation on a Windows 10 machine is interrupted with the return code
0x800f081f, you must use your Windows 10 installation disk (or a virtual copy of it) to turn on .NET
Framework 3.5, and rerun the Security Center installation.

What you should know


Security Center requires the feature .NET Framework 3.5 to be turned on in order to work. Security Center
installer turns .NET Framework 3.5 on by default. However, this feature cannot be turned on if you are
missing the .NET 3.5.1 files, which causes the error 0x800f081f.
To fix the Microsoft .NET Framework installation error 0x800f081f:
1 Get a copy of the Windows 10 installation disk (or a virtual copy of it) from your IT department, and
make sure it is accessible from the computer where Security Center needs to be installed.
2 Open a command prompt with full administrator rights.
For more information, see Windows 10: Elevated Command Prompt.
3 Enter the following command:
DISM /online /enable-feature /featurename:NetFx3 /All /Source:F:\sources\sxs
where F: is the drive letter where the installation disk or virtual disk with the Windows 10 setup files
are located.
The command prompt will run through a repair and activation of the .NET framework feature.

4 Close the command prompt.


5 Right-click the Start button on the Windows taskbar, and click Control Panel > Programs and
Features > Turn Windows features on or off.
6 In the Windows Features dialog box, click .NET Framework 3.5, and then click OK.
7 Rerun the Security Center installation.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  120
Troubleshooting

Troubleshooting: Video stability and performance issues


After installing Security Center, you might have to install some Microsoft hotfixes for Security Center to run
smoothly.

What you should know


The following scenarios require that you install a Microsoft hotfix:
• You log on to Config Tool or Security Desk after installing Security Center you receive the message:
"A necessary dependency for this application has not been found on the system. Video stability and
performance are not guaranteed without the hotfix KB2494124/KB2468871".
• You install Security Center on a 64-bit machine. To enhance performance you must install hotfix
KB2588507.
To install the Microsoft hotfixes:
1 Close Config Tool and Security Desk.
2 Download the required hotfixes from the Internet:
• For a 64-bit system, download the following files:
• NDP40-KB2468871-v2-IA64.exe
• NDP40-KB2468871-v2-x64.exe
• NDP40-KB294124-x64.exe
• Windows6.1-KB2588507-v2-x64.msu
• For a 32-bit system, download the following files:
• NDP40-KB2468871-v2-x86.exe
• NDP40-KB294124-x86.exe
3 Run the hotfixes you've downloaded one after another, in the same sequence you downloaded them.
4 Restart your computer.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  121
Troubleshooting

Troubleshooting: Files remain blocked after unblocking


them manually
Use streams.exe to unblock Security Center installation package files that remain blocked after manual
intervention.

What you should know


You have to run streams.exe only on those files that remain blocked after attempting to manually unblock
them fails. The error message that appears during installation resembles: “Setup detected blocked file(s) in
the download package. Setup will stop. To restart the installation, unblock the downloaded package.”
To unblock files using streams.exe:
1 Download streams.exe from https://technet.microsoft.com/en-ca/sysinternals/bb897440.aspx.
2 Open a command prompt window.
3 Enter streams.exe -d <filename>, where <filename> is the name of the file that needs to be
unblocked.

After you finish


If you unblocked the entire ZIP installation package (not specific files contained in it), you must extract the
package again prior to installing Security Center.

Related Topics
Unblocking files manually on page 14

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  122
Glossary
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Access control The Access control task is a type of administration task that
allows you to configure access control roles, units, rules,
cardholders, credentials, and related entities and settings.

Access control health Access control health history is a type of maintenance task that
history reports on malfunction events for access control units.

access control unit An access control unit is a type of entity that represents an
intelligent access control device, such as a Synergis™ appliance
or an HID network controller, that communicates directly with
the Access Manager over an IP network. An access control
unit operates autonomously when it is disconnected from the
Access Manager.

Access control unit events Access control unit events is a type of maintenance task that
reports on events pertaining to selected access control units.

Access Manager Access Manager is the role that manages and monitors access
control units on the system.

access point An access point is any entry (or exit) point to a physical area
where access can be monitored and governed by access rules.
An access point is typically a door side.

access right An access right is the basic right users must have over any
part of the system before they can do anything with it. Other
rights, such as viewing and modifying entity configurations,
are granted through privileges. In the context of a Synergis™
system, an access right is the right granted to a cardholder to
pass through an access point at a given date and time.

access rule An access rule is a type of entity that defines a list of


cardholders to whom access is either granted or denied based
on a schedule. An access rule can be applied to a secured area
or to an access point.

Access rule configuration Access rule configuration is a type of maintenance task that
reports on entities and access points affected by a given access
rule.

Access troubleshooter Access troubleshooter is a tool that helps you detect and
diagnose access configuration problems. With this tool, you
can find out about the following:

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  123
Glossary

• Who is allowed to pass through an access point at a given


date and time
• Which access points a cardholder is allowed to use at a
given date and time
• Why a given cardholder can or cannot use an access point at
a given date and time

action An action is a user-programmable function that can be


triggered as an automatic response to an event, such as door
held open for too long or object left unattended, or that can be
executed according to a specific time table.

active alarm An active alarm is an alarm that has not yet been
acknowledged.

Active Directory Active Directory is a directory service created by Microsoft,


and a type of role that imports users and cardholders from an
Active Directory and keeps them synchronized.

Active Directory Federation Active Directory Federation Services (ADFS) is a component of


Services the Microsoft® Windows® operating system that issues and
transforms claims, and implements federated identity. It is also
a type of role that enables Security Center to receive claims
from an external ADFS server.

Activity trails Activity trails is a type of maintenance task that reports on


the user activity related to video, access control, and LPR
functionality. This task can provide information such as who
played back which video recordings, who used the Hotlist and
permit editor, who enabled hotlist filtering, and much more.

Advanced Systems Format The Advanced Systems Format (ASF) is a video streaming
format from Microsoft. The ASF format can only be played
in media players that support this format, such as Windows
Media Player.

agent An agent is a subprocess created by a Security Center role to


run simultaneously on multiple servers for the purpose of
sharing its load.

alarm An alarm is a type of entity that describes a particular trouble


situation that requires immediate attention and how it can be
handled in Security Center. For example, an alarm can indicate
which entities (usually cameras and doors) best describe it,
who must be notified, how it must be displayed to the user, and
so on.

alarm acknowledgement An alarm acknowledgement is a user response to an alarm.


In Security Center, the default acknowledgement and
alternate acknowledgement are the two variants of alarm
acknowledgements. Each variant is associated to a different

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  124
Glossary

event so that specific actions can be programmed based on the


alarm response selected by the user.

Alarms The Alarms task is a type of administration task that allows you
to configure alarms and monitor groups.

Alarm monitoring Alarm monitoring is a type of operation task that allows you
to monitor and respond to alarms (acknowledge, forward,
snooze, and so on) in real time, as well as review past alarms.

Alarm report Alarm report is a type of investigation task that allows you to
search and view current and past alarms.

analog monitor An analog monitor is a type of entity that represents a monitor


that displays video from an analog source, such as a video
decoder or an analog camera. This term is used in Security
Center to refer to monitors that are not controlled by a
computer.

antipassback Antipassback is an access restriction placed on a secured area


that prevents a cardholder from entering an area that they
have not yet exited from, and vice versa.

Archive transfer The Archive transfer task is a type of administration task that
allows you to configure settings for retrieving recordings
from a video unit, duplicating archives from one Archiver to
another, or backing up archives to a specific location.

archive transfer Archive transfer is the process of transferring your video data
from one location to another. The video is recorded and stored
on the video unit itself or on an Archiver storage disk, and then
the recordings are transferred to another location.

Archiver Archiver is the role that is responsible for the discovery, status
polling, and control of video units. The Archiver also manages
the video archive and performs motion detection if it is not
done on the unit itself.

Archiver events Archiver events is a type of maintenance task that reports on


events pertaining to selected Archiver roles.

Archives Archives is a type of investigation task that allows you to find


and view available video archives by camera and time range.

Archive storage details Archive storage details is a type of maintenance task that
reports on the video files (file name, start and end time, file
size, protection status, and so on) used to store video archive,
and which allows you to change the protection status of those
files, among other things.

area An area is a type of entity that represents a concept or a


physical location (room, floor, building, site, and so on) used
for grouping other entities in the system.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  125
Glossary

Area activities Area activities is a type of maintenance task that reports on


events pertaining to selected Archiver roles.

Area presence Area presence is a type of investigation task that provides a


snapshot of all cardholders and visitors currently present in a
selected area.

Area view The Area view task is a type of administration task that allows
you to configure areas, doors, cameras, tile plugins, intrusion
detection areas, zones, and other entities found in the area
view.

area view The area view is a view that organizes the commonly used
entities such as doors, cameras, tile plugins, intrusion detection
areas, zones, and so on, by areas. This view is primarily created
for the day to day work of the security operators.

asset An asset is a type of entity that represents any valuable object


with an RFID tag attached, thus allowing it to be tracked by an
asset management software.

asynchronous video An asynchronous video is a type of entity that represents any


valuable object with an RFID tag attached, thus allowing it to
be tracked by an asset management software.

audio decoder An audio decoder is a device or software that decodes


compressed audio streams for playback. Synonym of speaker.

audio encoder An audio encoder is a device or software that encodes


audio streams using a compression algorithm. Synonym of
microphone.

Audit trails Audit trails is a type of maintenance task that reports on the
configuration changes of the selected entities in the system and
also indicates the user who made the changes.

authentication The process of verifying that an entity is what it claims to be.


The entity could be a user, a server, or a client application.

authorization The process of establishing the rights an entity has over the
features and resources of a system.

authorized user An authorized user is a user who can see (has the right to
access) the entities contained in a partition. Users can only
exercise their privileges on entities they can see.

automatic enrollment Automatic enrollment is when new IP units on a network are


automatically discovered by and added to Security Center. The
role that is responsible for the units broadcasts a discovery
request on a specific port, and the units listening on that
port respond with a message that contains the connection
information about themselves. The role then uses the
information to configure the connection to the unit and enable
communication.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  126
Glossary

Automatic License Plate Automatic License Plate Recognition (ALPR) is the term used
Recognition for License Plate Recognition (LPR) in Europe.

AutoVu™ AutoVu™ is the IP license plate recognition (LPR) system of


Security Center that automates the reading and verification
of vehicle license plates. AutoVu™ Sharp cameras capture
license plate images, and send the data to Patroller or Security
Center to verify against lists of vehicles of interest (hotlists) and
vehicles with permits (permit lists). You can install AutoVu™
in a fixed configuration (e.g. on a pole in a parking lot), or
in a mobile configuration (e.g. on a police car). You can use
AutoVu™ for scofflaw and wanted vehicle identification, city-
wide surveillance, parking enforcement, parking permit
control, vehicle inventory, security, and access control.

AutoVu™ LPR Processing AutoVu™ LPR Processing Unit is the processing component
Unit of the SharpX system. The LPR Processing Unit is available
with two or four camera ports, with one dedicated processor
per camera (if using SharpX) or per two cameras (if using
SharpX VGA). This ensures maximum, per-camera, processing
performance. The LPR Processing Unit is sometimes referred
to as the trunk unit because it is typically installed in a vehicle's
trunk.

Auxiliary Archiver Auxiliary Archiver is the role that supplements the video
archive produced by the Archiver. Unlike the Archiver, the
Auxiliary Archiver is not bound to any particular discovery
port, therefore, it can archive any camera in the system,
including cameras federated from other Security Center
systems. The Auxiliary Archiver depends on the Archiver to
communicate with the video units. It cannot operate on its
own.

Badge designer Badge designer is a tool that allows you to design and modify
badge templates.

badge template A badge template is a type of entity used to configure a printing


template for badges.

block face (2 sides) A block face (2 sides) is a type of parking regulation


characterizing an overtime rule. A block face is the length of a
street between two intersections. A vehicle is in violation if it
is seen parked within the same block over a specified period
of time. Moving the vehicle from one side of the street to the
other does not make a difference.

bookmark A bookmark is a short text that is used to mark a specific


position in a recorded video sequence. Once created, you can
use bookmarks to search for the video sequences that they
pertain to.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  127
Glossary

Bookmarks Bookmarks is a type of investigation task that searches for


bookmarks related to selected cameras within a specified time
range.

Breakout box The breakout box is the proprietary connector box of Genetec
Inc. for AutoVu™ mobile solutions that use Sharp cameras. The
breakout box provides power and network connectivity to the
Sharp units and the in-vehicle computer.

broadcast Broadcast is the communication between a single sender and


all receivers on a network.

camera A camera is a type of entity that represents a single video


source in the system. The video source can either be an
IP camera, or an analog camera that is connected to the
video encoder of a video unit. Multiple video streams can be
generated from the same video source.

camera blocking Camera blocking is an Omnicast™ feature that lets you restrict
the viewing of video (live or playback) from certain cameras to
users with a minimum user level.

Camera Configuration Camera Configuration is a type of maintenance task that


reports on the properties and settings of local cameras in your
system (manufacturer, resolution, frame rate, stream usage,
and so on).

Camera events Camera events is a type of investigation task that reports on


events pertaining to selected cameras within a specified time
range.

camera sequence A camera sequence is a type of entity that defines a list of


cameras that are displayed one after another in a rotating
fashion within a single tile in Security Desk.

canvas Canvas is one of the panes found in the Security Desk's


task workspace. The canvas is used to display multimedia
information, such as videos, maps, and pictures. It is further
divided into three panels: the tiles, the dashboard, and the
properties.

card and PIN Card and PIN is an access point mode that requires a
cardholder to present their card, and then enter a personal
identification number (PIN).

cardholder A cardholder is a type of entity that represents a person who


can enter and exit secured areas by virtue of their credentials
(typically access cards) and whose activities can be tracked.

Cardholder access rights Cardholder access rights is a type of maintenance task


that reports on which cardholders and cardholder groups

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  128
Glossary

are granted or denied access to selected areas, doors, and


elevators.

Cardholder activities Cardholder activities is type of investigation task that reports


on cardholder activities, such as access denied, first person in,
last person out, antipassback violation, and so on.

Cardholder configuration Cardholder configuration is a type of maintenance task that


reports on cardholder properties, such as first name, last
name, picture, status, custom properties, and so on.

cardholder group A cardholder group is a type of entity that configures the


common access rights of a group of cardholders.

Cardholder management Cardholder management is a type of operation task that allows


you to create, modify, and delete cardholders. In this task,
you can also manage a cardholder's credentials, including
temporary replacement cards.

cash register A cash register is a type of entity that represents a single cash
register (or terminal) in a point of sale system.

certificate Designates one of the following: (1) digital certificate; (2) SDK
certificate.

cyphertext In cryptography, cyphertext is the encrypted data.

certificate authority A certificate authority or certification authority (CA) is an


entity or organization that signs identity certificates and attests
to the validity of their contents.

City Parking Enforcement City Parking Enforcement is a Patroller software installation


that is configured for the enforcement of parking permit and
overtime restrictions.

City Parking Enforcement City Parking Enforcement with Wheel Imaging is a City Parking
with Wheel Imaging Enforcement installation of a Patroller application that also
includes wheel imaging. The use of maps and of the Navigator
is mandatory.

claim A claim is a statement, such as a name, identity, key, or group,


made by one subject about itself or another subject. Claims are
issued by a provider, and they are given one or more values
and then packaged in security tokens that are issued by a
security token service (STS).

claims provider A software component or service that generates security


tokens upon request. Also known as the issuer of claims.

claims-based Claims-based authentication is the process of authenticating


authentication a user based on a set of claims about its identity contained
in a trusted token. Such a token is often issued and signed
by an entity that is able to authenticate the user by other

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  129
Glossary

means, and that is trusted by the entity doing the claims-based


authentication.

client-specific key stream The client-specific key stream is the encrypted form of the
master key stream. The master key stream is encrypted with
the public key contained in an encryption certificate, specifically
issued for one or more client machines. Only the client
machines that have the encryption certificate installed have
the required private key to decrypt the encrypted key stream.

Config Tool Config Tool is a Security Center administrative application


used to manage all Security Center users, and configure
all Security Center entities such as areas, cameras, doors,
schedules, cardholders, Patroller/LPR units, and hardware
devices.

Conflict resolution utility Conflict resolution utility is a tool that helps you resolve
conflicts caused by importing users and cardholders from an
Active Directory.

context camera A context camera is a camera connected to an LPR unit that


produces a wider angle color image of the vehicle whose
license plate was read by the LPR camera.

controlled exit A controlled exit is when credentials are necessary to leave a


secured area.

controller module Controller module is the processing component of Synergis™


Master Controller with IP capability. This module comes
pre-loaded with the controller firmware and the web-based
administration tool, Synergis™ Applicance Portal.

convenience time The convenience time is a configurable leeway time before a


vehicle starts to be charged after entering the parking zone.
For example, if you need to set up a 2-hour free parking period
before paid time or parking enforcement takes effect, you
would set the convenience time for 2 hours. For parking lots
where parking enforcement begins immediately, you would
still need to set a short convenience time to allow vehicle
owners time to find a parking spot and purchase parking time
before parking enforcement begins.

Copy configuration tool The Copy configuration tool helps you save configuration
time by copying the settings of one entity to many others that
partially share the same settings.

covert hit A covert hit is a read (captured license plate) that is matched to
a covert hotlist. Covert hits are not displayed on the Patroller
screen, but can be displayed in Security Desk by a user with
proper privileges.

covert hotlist A covert hotlist is a hotlist hidden from the AutoVu™ Patroller
users. Reads matching a covert hotlist generate covert hits.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  130
Glossary

credential A credential is a type of entity that represents a proximity


card, a biometrics template, or a PIN required to gain access
to a secured area. A credential can only be assigned to one
cardholder at a time.

Credential activities Credential activities is a type of investigation task that reports


on credential related activities, such as access denied due to
expired, inactive, lost, or stolen credential, and so on.

credential code A credential code is a textual representation of the credential,


typically indicating the Facility code and the Card number. For
credentials using custom card formats, the user can choose
what to include in the credential code.

Credential configuration Credential configuration is a type of maintenance task that


reports on credential properties, such as status, assigned
cardholder, card format, credential code, custom properties,
and so on.

Credential management Credential management is a type of operation task that allows


you to create, modify, and delete credentials. It also allows you
to print badges and enroll large numbers of card credentials
into the system, either by scanning them at a designated card
reader or by entering a range of values.

Credential request history Credential request history is a type of investigation task


that reports on which users requested, cancelled, or printed
cardholder credentials.

custom event A custom event is an event added after the initial system
installation. Events defined at system installation are
called system events. Custom events can be user-defined or
automatically added through plugin installations. Unlike
system events, custom events can be renamed and deleted.

custom field A custom field is a user defined property that is associated to


an entity type and is used to store additional information that
is useful to your particular organization.

cyphertext In cryptography, cyphertext is the encrypted data.

Daily usage per Patroller Daily usage per Patroller is a type of investigation task that
reports on the daily usage statistics of a selected Patroller
(operating time, longest stop, total number of stops, longest
shutdown, and so on) for a given date range.

dashboard A dashboard is one of the three panels that belong to the


canvas in Security Desk. It contains the graphical commands
(or widgets) pertaining to the entity displayed in the current
tile.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  131
Glossary

database server A database server is an application that manages databases


and handles data requests made by client applications.
Security Center uses Microsoft SQL Server as its database
server.

debounce A debounce is the amount of time an input can be in a changed


state (for example, from active to inactive) before the state
change is reported. Electrical switches often cause temporarily
unstable signals when changing states, possibly confusing
the logical circuitry. Debouncing is used to filter out unstable
signals by ignoring all state changes that are shorter than a
certain period of time (in milliseconds).

default expiration delay The default expiration delay is used for permits supplied by
Pay-by-Plate Sync that do not include an expiration. In this
case, AutoVu™ Free-Flow checks with the parking permit
provider to see if the permit is still valid. Increasing this value
reduces the frequency of the permit checks. For example, if the
parking lot charges for parking in increments of 15 minutes,
and you also set the default expiration delay to 15 minutes, the
system validates the permit with the parking provider every 15
minutes.

degraded mode Degraded mode is an offline operation mode of the interface


module when the connection to the Synergis™ unit is lost. The
interface module grants access to all credentials matching a
specified facility code. Only Mercury and HID VertX interface
modules can operate in degraded mode.

dependent mode Dependent mode is an online operation mode of the interface


module where the Synergis™ unit makes all access control
decisions. Not all interface modules can operate in dependent
mode.

dewarping Dewarping is the transformation used to straighten a digital


image taken with a fish-eye lens.

digital certificate A digital certificate, also known as an identity certificate or


encryption certificate, is an electronic "passport" that allows a
person, computer, or organization to exchange information
securely over the Internet using the public key infrastructure
(PKI).

Directory Directory is the main role that identifies your system. It


manages all entity configurations and system wide settings in
Security Center. Only a single instance of this role is permitted
on your system. The server hosting the Directory role is called
the main server, and must be set up first. All other servers you
add in Security Center are called expansion servers, and must
connect to the main server to be part of the same system.

Directory authentication Directory authentication is a Security Center option that


forces all client and server applications on a given machine

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  132
Glossary

to validate the identity certificate of the Directory before


connecting to it. This measure prevents man-in-the-middle
attacks.

Directory gateway Directory gateways allow Security Center applications located


on a non-secured network to connect to the main server that
is behind a firewall. A Directory gateway is a Security Center
server that acts as a proxy for the main server. A server cannot
be both a Directory server and a Directory gateway; the former
must connect to the Directory database, while the latter must
not, for security reasons.

Directory Manager Directory Manager is the role that manages the Directory
failover and load balancing in order to produce the high
availability characteristics in Security Center.

Directory server A Directory server is any one of the multiple servers


simultaneously running the Directory role in a high
availability configuration.

discovery port A discovery port is a port used by certain Security Center roles
(Access Manager, Archiver, LPR Manager) to find the units they
are responsible for on the LAN. No two discovery ports can be
the same on one system.

district A district is a type of parking regulation characterizing an


overtime rule. A district is a geographical area within a city. A
vehicle is in violation if it is seen within the boundaries of the
district over a specified period of time.

door A door is a type of entity that represents a physical barrier.


Often, this is an actual door but it could also be a gate, a
turnstile, or any other controllable barrier. Each door has two
sides, named In and Out by default. Each side is an access point
(entrance or exit) to a secured area.

Door activities Door activities is a type of investigation task that reports on


door related activities, such as access denied, door forced open,
door open too long, hardware tamper, and so on.

door contact A door contact monitors the state of a door, whether it is open
or closed. It can also be used to detect an improper state, such
as door open too long.

door side Every door has two sides, named In and Out by default. Each
side is an access point to an area. For example, passing through
one side leads into an area, and passing through the other side
leads out of that area. For the purposes of access management,
the credentials that are required to pass through a door in one
direction are not necessarily the same that are required to pass
through in the opposite direction.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  133
Glossary

Door troubleshooter Door troubleshooter is a type of maintenance task that lists all
the cardholders who have access to a particular door side or
elevator floor at a specific date and time.

Driver Development Kit Driver Development Kit is a SDK for creating device drivers.

duress A duress is a special code used to disarm an alarm system.


This code quietly alerts the monitoring station that the alarm
system was disarmed under threat.

edge recording Edge recording is the process of recording and storing video
recordings locally, thus removing the need for a centralized
recording server or unit. With edge recording, you can store
video directly on the camera’s internal storage device.

electric door strike An electric door strike is an electric device that releases the
door latch when current is applied.

elevator An elevator is a type of entity that provides access control


properties to elevators. For an elevator, each floor is
considered an access point.

Elevator activities Elevator activities is a type of investigation task that reports


on elevator related activities, such as access denied, floor
accessed, unit is offline, hardware tamper, and so on.

encryption certificate An encryption certificate, also known as a digital certificate or


public key certificate, is an electronic document that contains a
public and private key pair used in Security Center for fusion
stream encryption. Information encrypted with the public key
can only be decrypted with the matching private key.

enforce To enforce is to take action following a confirmed hit. For


example, a parking officer can enforce a scofflaw violation
(unpaid parking tickets) by placing a wheel boot on the vehicle.

entity Entities are the basic building blocks of Security Center.


Everything that requires configuration is represented by an
entity. An entity can represent a physical device, such as a
camera or a door, or an abstract concept, such as an alarm, a
schedule, a user, a role, a plugin, or an add-on.

entity tree An entity tree is the graphical representation of Security


Center entities in a tree structure, illustrating the hierarchical
nature of their relationships.

event An event indicates the occurrence of an activity or incident,


such as access denied to a cardholder or motion detected on
a camera. Events are automatically logged in Security Center,
and can be programmed to trigger actions. Every event mainly
focuses on one entity, called the event source.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  134
Glossary

event-to-action An event-to-action links an action to an event. For example,


you can configure Security Center to trigger an alarm when a
door is forced open.

expansion server An expansion server is any server machine in a Security


Center system that does not host the Directory role. The
purpose of the expansion server is to add to the processing
power of the system.

failover A failover is a backup operational mode in which a role


(system function) is automatically transferred from its primary
server to a secondary server that is on standby. This transfer
between servers occurs only when the primary server becomes
unavailable, either through failure or through scheduled
downtime.

federated entity A federated entity is any entity that is imported from an


independent system through one of the Federation roles.

federated identity A federated identity is a security token that is generated


outside of your own realm that you accept. Federated identity
enables single sign-on, allowing users to sign on to applications
in different realms without needing to enter realm-specific
credentials.

federated system A federated system is a independent system (Omnicast™ or


Security Center) that is unified under your local Security
Center via a Federation™ role, so that the local users can view
and control its entities, as if they belong to the local system.

Federation™ The Federation™ feature joins multiple, independent Genetec™


IP security systems into a single virtual system. With this
feature, Security Center users can view and control entities
that belong to remote systems, directly from their local
Security Center system.

Federation™ host The Federation™ host is the Security Center system that runs
Federation™ roles. Users on the Federation™ host can view and
control entities that belong to federated systems directly from
their local system.

first-person-in rule The first-person-in rule is the additional access restriction


placed on a secured area that prevents anyone from entering
the area until a supervisor is on site. The restriction can be
enforced when there is free access (on door unlock schedules)
and when there is controlled access (on access rules).

Forensic search Forensic search is a type of investigation task that searches for
video sequences based on video analytics events.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  135
Glossary

four-port RS-485 module A four-port RS-485 module is a RS-485 communication


component of Synergis™ Master Controller with four ports
(or channels) named A, B, C, and D. The number of interface
modules you can connect to each channel depends on the type
of hardware you have.

free access A free access is an access point state where no credentials are
necessary to enter a secured area. The door is unlocked. This is
typically used during normal business hours, as a temporary
measure during maintenance, or when the access control
system is first powered up and is yet to be configured.

free exit A free exit is an access point state where no credentials are
necessary to leave a secured area. The person releases the door
by turning the doorknob, or by pressing the REX button, and
walks out. An automatic door closer shuts the door so it can be
locked after being opened.

fusion stream Fusion stream is a proprietary data structure of Genetec Inc.


for streaming multimedia. Each fusion stream is a bundle of
data (video, audio, and metadata) streams and key streams
related to a single camera. Fusion streams are created in
response to specific client requests. The key streams are
included only if the data streams are encrypted.

fusion stream encryption Fusion stream encryption is a proprietary technology of


Genetec Inc. used to protect the privacy of your video archives.
The Archiver uses a two-level encryption strategy to ensure
that only authorized client machines can access your private
data.

G64 G64 is a Security Center format used by archiving roles


(Archiver and Auxiliary Archiver) to store video sequences
issued from a single camera. This data format supports audio,
bookmarks, metadata overlays, timestamps, motion and event
markers, and variable frame rate and resolution.

G64x G64x is a Security Center format used to store video sequences


from multiple cameras that are exported or backed up
simultaneously. This data format supports audio, bookmarks,
metadata overlays, timestamps, motion and event markers,
variable frame rate and resolution, and watermarking.

Genetec Server Genetec Server is the Windows service that is at the core of
Security Center architecture, and that must be installed on
every computer that is part of the Security Center's pool of
servers. Every such server is a generic computing resource
capable of taking on any role (set of functions) you assign to it.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  136
Glossary

Genetec Update Service The Genetec™ Update Service is a web-based service that
allows you to update your Security Center products when a
new release becomes available.

Genetec Video Player The Genetec Video Player is a media player that is used to view
exported G64 and G64x video files from Security Desk, or on a
computer that does not have Security Center installed.

geocoding Geocoding is the process of finding associated geographic


coordinates (latitude and longitude) from a street address.

Geographic information Geographic information system (GIS) is a system that captures


system spatial geographical data. Map Manager can connect to third-
party vendors that provide GIS services in order to bring maps
and all types of geographically referenced data to Security
Center.

ghost camera A ghost camera is an entity used as a substitute camera. This


entity is automatically created by the Archiver when video
archives are detected for a camera whose definition has been
deleted from the Directory, either accidentally or because the
physical device no longer exists. Ghost cameras cannot be
configured, and only exist so users can reference the video
archive that would otherwise not be associated to any camera.

ghost Patroller A ghost Patroller is an entity automatically created by the LPR


Manager when the AutoVu™ license includes the XML Import
module. In Security Center, all LPR data must be associated to a
Patroller entity or an LPR unit corresponding to a fixed Sharp
camera. When you import LPR data from an external source
via a specific LPR Manager using the XML Import module, the
system uses the ghost entity to represent the LPR data source.
You can formulate queries using the ghost entity as you would
with a normal entity.

global antipassback Global antipassback is a feature that extends the antipassback


restrictions to areas controlled by multiple Synergis™ units.

Global Cardholder Global Cardholder Synchronizer is a type of role that ensures


Synchronizer the two-way synchronization of shared cardholders and their
related entities between the local system (sharing participant)
and the central system (sharing host).

global entity A global entity is an entity that is shared across multiple


independent Security Center systems by virtue of its
membership to a global partition. Only cardholders,
cardholder groups, credentials, and badge templates are
eligible for sharing.

global partition Global partition is a partition that is shared across multiple


independent Security Center systems by the partition owner,
called the sharing host.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  137
Glossary

grace period A grace period can be added to a parking session for purposes
of lenient enforcement. Following the expiration of the
vehicle’s paid time or convenience time, extra time is given
before a parking session is flagged as a Violation.

hardware integration A hardware integration package, or HIP, is an update that


package can be applied to Security Center. It enables the management
of new functionalities (for example, new video unit types),
without requiring an upgrade to the next Security Center
release.

Hardware inventory Hardware inventory is a type of maintenance task that


reports on the characteristics (unit model, firmware version,
IP address, time zone, and so on) of access control, video,
intrusion detection, and LPR units in your system.

hardware zone A hardware zone is a zone entity in which the I/O linking
is executed by a single access control unit. A hardware
zone works independently of the Access Manager, and
consequently, cannot be armed or disarmed from Security
Desk.

Health history Health history is a type of maintenance task that reports on


health issues.

Health Monitor Health Monitor is the central role that monitors system entities
such as servers, roles, units, and client applications for health
issues.

Health statistics Health statistics is a type of maintenance task that gives you an
overall view of the health of your system.

High availability High availability is a design approach that enables a system to


perform at a higher than normal operational level. This often
involves failover and load balancing.

hit A hit is a license plate read that matches a hit rule, such as a
hotlist, overtime rule, permit, or permit restriction. A Patroller
user can choose to reject or accept a hit. An accepted hit can
subsequently be enforced.

hit rule Hit rule is a type of LPR rule used to identify vehicles of
interest (called "hits") using license plate reads. The hit rules
include the following types: hotlist, overtime rule, permit, and
permit restriction.

Hits Hits is a type of investigation task that reports on hits reported


within a selected time range and geographic area.

hot action A hot action is an action mapped to a PC keyboard function key


(Ctrl+F1 through Ctrl+F12) in Security Desk for quick access.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  138
Glossary

hotlist A hotlist is a type of entity that defines a list of wanted vehicles,


where each vehicle is identified by a license plate number, the
issuing state, and the reason why the vehicle is wanted (stolen,
wanted felon, Amber alert, VIP, and so on). Optional vehicle
information might include the model, the color, and the vehicle
identification number (VIN).

Hotlist and permit editor Hotlist and permit editor is a type of operation task used to
edit an existing hotlist or permit list. A new list cannot be
created with this task, but after an existing list has been added
to Security Center, users can edit, add, or delete items from the
list, and the original text file is updated with the changes.

I/O zone An I/O zone is a zone entity in which the I/O linking can be
spread across multiple Synergis™ units, while one unit acts as
the master unit. All Synergis™ units involved in an I/O zone
must be managed by the same Access Manager. The I/O zone
works independently of the Access Manager, but ceases to
function if the master unit is down. An I/O zone can be armed
and disarmed from Security Desk as long as the master unit is
online.

identity certificate An identity certificate, also known as a digital certificate


or public key certificate, is a digitally signed document that
allows a computer or an organization to exchange information
securely over a public network. The certificate includes
information about the owner's identity, the public key used
to encrypt future messages sent to the owner, and the digital
signature of the certificate authority (CA).

identity provider An internet site that administers user accounts and


is responsible for generating and maintaining user
authentication and identity information. For example, Google
administers Gmail accounts to its users, which allows single
sign-on access to other websites using one account.

illuminator An illuminator is a light in the Sharp unit that illuminates the


plate, thereby improving the accuracy of the images produced
by the LPR camera.

Import tool Import tool is a tool that allows you to import cardholders,
cardholder groups, and credentials from a CSV (Comma
Separated Values) file.

inactive entity An inactive entity is an entity that is shaded in red in the entity
browser. It signals that the real world entity it represents is
either not working, offline, or incorrectly configured.

incident An incident is an unexpected event reported by a Security


Desk user. Incident reports can use formatted text and include
events and entities as support material.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  139
Glossary

incident (Mission Control) A Mission Control incident is an unusual or undesirable


situation that requires actions to resolve.

incident category An incident category is a type of entity that represents a


grouping of incident types that have similar characteristics.

Incident configuration The Incident configuration task is the administration task


that you can use to configure the incident types, the incident
categories, and the support documents for Mission Control. You
can also use this task to generate reports on the changes made
to incident types.

Incident Manager The Incident Manager is the central role that recognizes
situational patterns, and triggers incidents in the Mission
Control system. This role manages the incident workflows and
keeps track of all user activities that are related to incidents.

Incident monitoring The Incident monitoring task is a type of operation task that
you can use to monitor and respond to incidents. From this
task, you can see the incidents displayed on a map, thus
improving your situational awareness.

incident owner The incident owner is the incident recipient who took
ownership of the incident. Only the incident owner can take
actions to resolve the incident. An incident can only have one
owner at a time.

incident recipient The incident recipient is the user that the incident has been
dispatched to. This user can see the incident in the Incident
monitoring task.

Incident report The Incident report task is a type of investigation task that
you can use to search, review, and analyze Mission Control
incidents.

incident trigger An incident trigger is a sequence of rules that are applied


by the Mission Control Rules Engine to automatically detect
and trigger incidents. The Rules Engine looks for specific
combinations of events (type, time, correlation, and frequency)
in the system in order to determine whether an incident must
be triggered.

incident type An incident type is an entity that represents a situation that


requires specific actions to resolve it. The incident type entity
can also be used to automate the incident detection in Mission
Control and to enforce the standard operating procedures that
your security team must follow.

incident workflow An incident workflow is a series of activities associated to an


incident type. These activities are performed by the system
during the life cycle of an incident. The activities can change
the incident state and properties, affect other entities in the
system, or simply wait for a condition to become true. The

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  140
Glossary

workflows help automate the simple tasks, such as exporting


the incident when it is resolved, so operators can focus on
more complex ones.

Incidents Incidents is a type of investigation task that allows you to


search, review, and modify incident reports.

interface module An interface module is a third-party security device that


communicates with an access control unit over IP or RS-485,
and provides additional input, output, and reader connections
to the unit.

interlock An interlock (also known as sally port or airlock) is an access


restriction placed on a secured area that permits only one door
to be open at any given time.

Intrusion detection The Intrusion detection task is a type of administration task


that allows you to configure intrusion detection roles and
units.

intrusion detection area An intrusion detection area is a type of entity that corresponds
to a zone or a partition (group of sensors) on an intrusion
panel.

Intrusion detection area Intrusion detection area activities is a type of investigation task
activities that reports on activities (master arm, perimeter arm, duress,
input trouble, and so on) in selected intrusion detection areas.

intrusion detection unit An intrusion detection unit is a type of entity that represents
an intrusion panel (or alarm panel) that is monitored and
controlled by Security Center.

Intrusion detection unit Intrusion detection unit events is a type of investigation task
events that reports on events (AC fail, battery fail, unit lost, input
trouble, and so on) related to selected intrusion detection units.

Intrusion Manager Intrusion Manager is a type of role that monitors and controls
intrusion panels (or alarm panels). It listens to the events
reported by the intrusion panels, provides live reports to
Security Center, and logs the events in a database for future
reporting.

intrusion panel An intrusion panel is a wall-mounted unit where the alarm


sensors (motion sensors, smoke detectors, door sensors, and
so on) and wiring of the intrusion alarms are connected and
managed.

Inventory management Inventory management is a type of operation task that allows


you to add and reconcile license plate reads to a parking
facility inventory.

Inventory report Inventory report is a type of investigation task that allows you
to view a specific inventory (vehicle location, vehicle length

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  141
Glossary

of stay, and so on) or compare two inventories of a selected


parking facility (vehicles added, vehicles removed, and so on).

I/O configuration I/O configuration is a type of maintenance task that reports


on the I/O configurations (controlled access points, doors, and
elevators) of access control units.

I/O linking I/O (input/output) linking is controlling an output relay based


on the combined state (normal, active, or trouble) of a group of
monitored inputs. A standard application is to sound a buzzer
(through an output relay) when any window on the ground
floor of a building is shattered (assuming that each window is
monitored by a "glass break" sensor connected to an input).

I/O zone An I/O zone is a zone entity in which the I/O linking can be
spread across multiple Synergis™ units, while one unit acts as
the master unit. All Synergis™ units involved in an I/O zone
must be managed by the same Access Manager. The I/O zone
works independently of the Access Manager, but ceases to
function if the master unit is down. An I/O zone can be armed
and disarmed from Security Desk as long as the master unit is
online.

IP camera An IP camera is a video unit incorporating a camera.

IPv4 IPv4 is the first generation IP protocol using a 32-bit address


space.

IPv6 IPv6 is a video unit incorporating a camera.

Keyhole Markup Language Keyhole Markup Language (KML) is a file format used to
display geographic data in an Earth browser such as Google
Earth and Google Maps.

Law Enforcement Law Enforcement is a Patroller software installation that is


configured for law enforcement: the matching of license plate
reads against lists of wanted license plates (hotlists). The use of
maps is optional.

license key A license key is the software key used to unlock the Security
Center software. The license key is specifically generated for
each computer where the Directory role is installed. To obtain
your license key, you need the System ID (which identifies
your system) and the Validation key (which identifies your
computer).

license plate inventory A license plate inventory is a list of license plate numbers of
vehicles found in a parking facility within a given time period,
showing where each vehicle is parked (sector and row).

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  142
Glossary

license plate read A license plate read is a license plate number captured from a
video image using LPR technology.

License Plate Recognition License Plate Recognition (LPR) is an image processing


technology used to read license plate numbers. License Plate
Recognition (LPR) converts license plate numbers cropped
from camera images into a database searchable format.

live hit A live hit is a hit matched by the Patroller and immediately
sent to the Security Center over a wireless network.

live read A live read is a license plate captured by the Patroller and
immediately sent to the Security Center over a wireless
network.

load balancing Load balancing is the distribution of workload across multiple


computers.

logical ID Logical ID is a unique ID assigned to each entity in the system


for ease of reference. Logical IDs are only unique within a
particular entity type.

Logons per Patroller Logons is a type of investigation task that reports on the logon
records of a selected Patroller.

long term Long term is a type of parking regulation characterizing


an overtime rule. The long term regulation uses the same
principle as the same position regulation, but the parking
period is over 24 hours. No more than one overtime rule may
use the long term regulation in the entire system.

LPR The LPR task is a type of administration task that allows you to
configure LPR roles, units, hotlists, permits, overtime rules, and
related entities and settings.

LPR camera A LPR camera is a camera connected to an LPR unit that


produces high resolution close-up images of license plates.

LPR Manager LPR Manager is a role that manages and controls Patrollers,
Sharp units, and parking zones. The LPR Manager stores the
LPR data (reads, hits, timestamps, GPS coordinates, and so
on) collected by the devices and generated by the system in
a database for reporting. Images, however, are stored and
managed by a separate Archiver role. The LPR Manager is also
responsible for updating fixed Sharps and Patrollers in the
field with hotfixes, hotlist updates, and so on.

LPR rule LPR rule is a method used by Security Center and AutoVu™ for
processing a license plate read. An LPR rule can be a hit rule or
a parking facility.

LPR unit A LPR unit is a type of entity that represents a hardware device
dedicated to the capture of license plate numbers. An LPR unit
is typically connected to an LPR camera and a context camera.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  143
Glossary

These cameras can be incorporated to the unit or external to


the unit.

macro A macro is a type of entity that encapsulates a C# program that


adds custom functionalities to Security Center.

main server Main server is the only server in a Security Center system
hosting the Directory role. All other servers on the system must
connect to the main server in order to be part of the same
system. In an high availability configuration where multiple
servers host the Directory role, it is the only server that can
write to the Directory database.

man-in-the-middle In computer security, man-in-the-middle (MITM) is a form of


attack where the attacker secretly relays and possibly alters
the communication between two parties who believe they are
directly communicating with each other.

manual capture Manual capture is when license plate information is entered


into the system by the user and not by the LPR.

manufacturer extension Manufacturer extension is the manufacturer specific settings


for access control units, video units, and intrusion detection
units.

map A map in Security Center is a two-dimensional diagram that


helps you visualize the physical locations of your security
equipment in a geographical area or a building space.

Map designer Map designer is a type of administration task that allows you
to create and edit maps that represent the physical locations of
your equipment to Security Desk users.

map link A map link is a map object that brings you to another map with
a single click.

Map Manager Map Manager is the central role that manages all mapping
resources in Security Center, including imported map files,
external map providers, and KML objects. It acts as the map
server to all client applications that require maps.

map mode Map mode is a Security Desk canvas operating mode where the
main area of the canvas is used to display a geographical map,
for the exclusive purpose of showing LPR events.

map object Map objects are graphical representations of Security Center


entities on your maps. They allow you to interact with your
system without leaving your map.

map view A map view is a defined display position and zoom level for a
given map.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  144
Glossary

Maps Maps is a type of operation task that heightens your situational


awareness by providing the context of a map to your security
monitoring and control activities.

master arm Master arm is arming an intrusion detection area in such a


way that all sensors attributed to the area would set the alarm
off if one of them is triggered.

master key stream In fusion stream encryption, the master key stream is the
sequence of symmetric keys generated by the Archiver to
encrypt one data stream. The symmetric keys are randomly
generated and change every minute. For security reasons, the
master key stream is never transmitted or stored anywhere as
plaintext.

maximum session time To ensure more accurate occupancy statistics, the maximum
session time is the period of time before a vehicle is considered
to have exceeded the limit of stay in the parking zone. After
this point, it is assumed that the vehicle's plate was not read
at the exit and the vehicle is no longer in the parking zone.
The parking session appears in reports generated from the
Parking sessions task with the State reason: Maximum session
time exceeded.

Media Gateway The Media Gateway is a role used by Security Center Web
Client and external applications to request live and playback
video using the Real Time Streaming Protocol (RTSP), and to
receive raw video streams from cameras managed by Security
Center systems.

Media Router Media Router is the central role that handles all stream
requests (audio and video) in Security Center. It establishes
streaming sessions between the stream source (camera or
Archiver) and its requesters (client applications). Routing
decisions are based on the location (IP address) and the
transmission capabilities of all parties involved (source,
destinations, networks, and servers).

Migration tool Migration tool is a tool used to migrate Omnicast™ 4.x systems
to Security Center 5. This tool must be executed on every
server computer where Omnicast™ 4.x components are
installed.

Mission Control Mission Control is a Decision Support System that provides


organizations with new levels of situational intelligence,
visualization, and complete incident management capabilities.
Using Mission Control, operators can monitor and resolve
incidents in a way that is responsive and compliant with their
established standard operating procedures.

Mobile Admin Mobile Admin is a web-based administration tool used to


configure the Mobile Server.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  145
Glossary

Mobile app Mobile app is the client component of Security Center Mobile
installed on mobile devices. Mobile app users connect to
Mobile Server to receive alarms, view live video streams, view
the status of doors, and more, from Security Center.

Mobile Data Computer Mobile Data Computer is a tablet computer or ruggedized


laptop used in patrol vehicles to run the AutoVu™ Patroller
application. The MDC is typically equipped with a touch-screen
with a minimum resolution of 800 x 600 pixels and wireless
networking capability.

Mobile License Plate Mobile License Plate Inventory is the Patroller software
Inventory installation that is configured for collecting license plates
and other vehicle information for creating and maintaining
a license plate inventory for a large parking area or parking
garage.

Mobile Server Mobile Server is the server component of Security Center


Mobile that connects Mobile apps and Web Clients to Security
Center. The Mobile Server connects to Security Center, and
synchronizes the data and video between Security Center and
supported Mobile client components.

monitor group A monitor group is a type of entity used to designate analog


monitors for alarm display. Besides the monitor groups, the
only other way to display alarms in real time is to use the
Alarm monitoring task in Security Desk.

monitor ID Monitor ID is an ID used to uniquely identify a workstation


screen controlled by Security Desk.

Monitoring The Monitoring task is a type of operation task that you can
use to monitor and respond to real-time events that relate
to selected entities. Using the Monitoring task, you can also
monitor and respond to alarms.

motion detection Motion detection is the feature that watches for changes in
a series of video images. The definition of what constitutes
motion in a video can be based on highly sophisticated criteria.

Motion search Motion search is a type of investigation task that searches for
motion detected in specific areas of a camera's field of view.

motion zone A motion zone is a user defined areas within a video image
where motion should be detected.

Move unit Move unit tool is used to move units from one manager role
to another. The move preserves all unit configurations and
data. After the move, the new manager immediately takes on
the command and control function of the unit, while the old
manager continues to manage the unit data collected before
the move.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  146
Glossary

multifactor authentication Multifactor authentication (MFA) is a security system that


requires more than one method of authentication from
independent categories of credentials to verify the user’s
identity for a login or other transaction.

Navigator box The Navigator box is a proprietary in-vehicle device of Genetec


Inc. that provides GPS coordinates and odometer readings to
Patroller. Because it taps into the vehicle’s odometry signal, it
is more accurate than a standard GPS device. The Navigator
box can be used with any type of AutoVu™ mobile deployment
that requires positioning information, but it is required for City
Parking Enforcement with Wheel Imaging.

network The network entity is used to capture the characteristics of the


networks used by your system so that proper stream routing
decisions can be made.

network address Network address translation is the process of modifying


translation network address information in datagram (IP) packet headers
while in transit across a traffic routing device, for the purpose
of remapping one IP address space into another.

network view The network view is a browser view that illustrates your
network environment by showing each server under the
network they belong to.

Network view The Network view task is a type of administration task that
allows you to configure your networks and servers.

new wanted A new wanted is a manually entered hotlist item in Patroller.


When you are looking for a plate that does not appear in the
hotlists loaded in the Patroller, you can enter the plate in order
to raise a hit if the plate is captured.

notification tray The notification tray contains icons that allow quick access to
certain system features, and also displays indicators for system
events and status information. The notification tray display
settings are saved as part of your user profile and apply to both
Security Desk and Config Tool.

OCR equivalence OCR equivalence is the interpretation of OCR (Optical


Character Recognition) equivalent characters performed
during license plate recognition. OCR equivalent characters are
visually similar, depending on the plate’s font. For example,
the letter “O” and the number “0”, or the number “5” and
the letter “S”. There are several pre-defined OCR equivalent
characters for different languages.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  147
Glossary

Omnicast™ Omnicast™ is the IP video surveillance system of Security


Center that provides seamless management of digital video.
Omnicast™ allows for multiple vendors and CODEC (coder/
decoder) to be used within the same installation, providing the
maximum flexibility when selecting the appropriate hardware
for each application.

Omnicast™ compatibility Omnicast™ compatibility pack is the software component that


pack you need to install to make Security Center compatible with an
Omnicast™ 4.x system.

Omnicast™ Federation™ The Omnicast™ Federation™ role connects an Omnicast™ 4.x


system to Security Center. That way, the Omnicast™ entities
and events can be used in your Security Center system.

output behavior An output behavior is a type of entity that defines a custom


output signal format, such as a pulse with a delay and
duration.

overtime rule An overtime rule is a type of entity that defines a parking time
limit and the maximum number of violations enforceable
within a single day. Overtime rules are used in city and
university parking enforcement. For university parking,
an overtime rule also defines the parking area where these
restrictions apply.

paid time The paid time stage of a parking session begins when the
convenience time expires. Vehicle owners can purchase parking
time through a pay station or mobile app, and the payment
system can be provided by integrated third-party parking
permit providers.

parking facility A parking facility is a type of entity that defines a large parking
area as a number of sectors and rows for the purpose of
inventory tracking.

parking lot A parking lot is a polygon that defines the location and shape
of a parking area on a map. By defining the number of parking
spaces inside the parking lot, Security Center can calculate its
percentage of occupancy during a given time period.

parking rule A parking rule defines the parameters that manage how and
when a parking session is either considered to be valid or in
violation.

paid time The AutoVu™ Free-Flow feature in Security Center uses


parking sessions to track each vehicle's stay in a parking zone.
A parking session is divided into four states: Valid (including
convenience time, paid time, and grace period), Violation,
Enforced, and Completed.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  148
Glossary

parking session states A vehicle's parking session is divided into four states: Valid
(including convenience time, paid time, and grace period),
Violation, Enforced, and Completed. When a vehicle parks in
a parking zone, its parking session progresses through the
parking session states based on the timing that is configured
for the parking rule that is associated with the parking zone,
the validity of the paid time, and whether the vehicle's parking
session incurs a violation.

parking zone The parking zones that you define in Security Center represent
off-street parking lots where the entrances and exits are
monitored by Sharp cameras.

parking zone capacity When configuring a parking zone, the parking zone capacity
is the maximum number of vehicles that can be parked in a
parking zone.

parking zone capacity The parking zone capacity threshold setting determines at
threshold what point a capacity threshold reached event is generated.
For example, if you lower the threshold to 90%, the system
generates an event when the parking zone reaches 90%
capacity.

partition A partition is a type of entity that defines a set of entities that


are only visible to a specific group of users. For example, a
partition could include all areas, doors, cameras, and zones in
one building.

partition administrator A partition administrator is an authorized user of a partition


who has administrative rights over that partition and its
members. Partition administrators can add, modify, and
delete most entities within their partitions. This includes
users, user groups, and child partitions, with the exception of
roles. Partition administrators can modify roles within their
partitions, but cannot add or delete roles.

Patroller 1 Patroller is the AutoVu™ software application installed


on an in-vehicle computer. Patroller connects to Security
Center and is controlled by the LPR Manager. Patroller
verifies license plates read from LPR cameras against lists
of vehicles of interest (hotlists) and vehicles with permits
(permit lists). It also collects data for time-limited parking
enforcement. Patroller alerts you of hotlist or permit hits so
that you can take immediate action.
2 Type of entity that represents a patrol vehicle equipped with
the Patroller software.

Patroller Config Tool Patroller Config Tool is the Patroller administrative application
used to configure Patroller-specific settings, such as adding
Sharp cameras to the in-vehicle LAN, enabling features such
as Manual Capture or New Wanted, and specifying that a
username and password are needed to log on to Patroller.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  149
Glossary

Patroller tracking Patroller tracking is a type of investigation task that allows you
to replay the route followed by a Patroller on a given date on
a map, or view the current location of Patroller vehicles on a
map.

People counting People counting is a type of operation task that keeps count in
real-time of the number of cardholders in all secured areas of
your system.

perimeter arm Perimeter arm is arming an intrusion detection area in such a


way that only sensors attributed to the area perimeter set the
alarm off if triggered. Other sensors, such as motion sensors
inside the area, are ignored.

permit A permit is a type of entity that defines a single parking permit


holder list. Each permit holder is characterized by a category
(permit zone), a license plate number, a license issuing state,
and optionally, a permit validity range (effective date and
expiry date). Permits are used in both city and university
parking enforcement.

permit hit A permit hit is a hit that is generated when a read (license
plate number) does not match any entry in a permit or when it
matches an invalid permit.

permit restriction A permit restriction is a type of entity that applies time


restrictions to a series of parking permits for a given parking
area. Permit restrictions are only used by AutoVu™ Patrollers
configured for University Parking Enforcement.

plaintext In cryptography, plaintext is the data that is not encrypted.

Plan Manager Plan Manager is a module of Security Center that provides


interactive mapping functionality to better visualize your
security environment.

Plate Reader Plate Reader is the software component of the Sharp unit that
processes the images captured by the LPR camera to produce
license plate reads, and associates each license plate read with
a context image captured by the context camera. The Plate
Reader also handles the communications with the Patroller
and the LPR Manager. If an external wheel imaging camera
is connected to the Sharp unit, the Plate Reader also captures
wheel images from this camera.

plugin A plugin is a software module that adds a specific feature or


service to a larger system.

Plugin Plugin is a type of role that hosts a specific plugin.

Plugins The Plugins task is a type of administration task that allows


you to configure plugin-specific roles and related entities.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  150
Glossary

Point of sale Point of sale (POS) is a system that typically refers to the
hardware and software used for checkouts - the equivalent of
an electronic cash register. These systems are used to capture
detailed transactions, authorize payments, track inventory,
audit sales, and manage employees. Point of sale systems are
used in supermarkets, restaurants, hotels, stadiums, casinos,
retail establishments.

primary server Primary server is the default server chosen to perform a


specific function (or role) in the system. To increase the
system's fault-tolerance, the primary server can be protected
by a secondary server on standby. When the primary server
becomes unavailable, the secondary server automatically takes
over.

private IP address A private IP address is an IP address chosen from a range of


addresses that are only valid for use on a LAN. The ranges for
a private IP address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0
to 172.16.255.255, and 192.168.0.0 to 192.168.255.255. Routers
on the Internet are normally configured to discard any traffic
using private IP addresses.

private key In cryptography, a private or secret key is an encryption/


decryption key known only to one of the parties that exchange
secret messages.

private task A private task is a saved task that is only visible to the user
who created it.

privilege Privileges define what users can do, such as arming zones,
blocking cameras, and unlocking doors, over the part of the
system they have access rights to.

public key In cryptography, a public key is a value provided by some


designated authority as an encryption key that, combined with
a private key that is generated at the same time, can be used to
effectively encrypt messages and verify digital signatures.

public key encryption Public key encryption, also known as asymmetric encryption,
is a type of encryption where two different keys are used to
encrypt and decrypt information. The private key is a key that
is known only to its owner, while the public key can be made
known and available to other entities on the network. What is
encrypted with one key can only be decrypted with the other
key.

public key infrastructure A public key infrastructure (PKI) is a set of hardware, software,
people, policies, and procedures needed to support the
distribution and identification of public encryption keys. This
enables users and computers to both securely exchange data
over networks such as the Internet and verify the identity of
the other party.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  151
Glossary

public task A public task is a saved task that can be shared and reused
among multiple Security Center users.

reader A reader is a sensor that reads the credential for an access


control system. For example, this can be a card reader, or a
biometrics scanner.

Reads Reads is a type of investigation task that reports on license


plate reads performed within a selected time range and
geographic area.

Reads/hits per day Reads/hits per day is a type of investigation task that reports on
license plate reads performed within a selected time range and
geographic area.

Reads/hits per zone Reads/hits per zone is a type of investigation task that reports
on the number of reads and hits per parking area for a selected
date range.

realm In identity terms, a realm is the set of applications, URLs,


domains, or sites for which a token is valid. Typically a realm
is defined using an Internet domain such as genetec.com, or a
path within that domain, such as genetec.com/support/GTAC.
A realm is sometimes described as a security domain because
it encompasses all applications within a specified security
boundary.

recording mode Recording mode is the criteria by which the Archiver schedules
the recording of video streams. There are four possible
recording modes:
• Off (no recording allowed)
• Manual (record only on user requests)
• Continuous (always record)
• On motion/manual (record according to motion detection
settings or on user request)

recording state Recording state is the current recording status of a given


camera. There are four possible recording states: Enabled,
Disabled, Currently recording (unlocked), and Currently
recording (locked).

redirector A redirector is a server assigned to host a redirector agent


created by the Media Router role.

redirector agent A redirector agent is an agent created by the Media Router role
to redirect data streams from one IP endpoint to another.

redundant archiving Redundant archiving is an option that allows a copy of


all the video streams of an Archiver role to be archived

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  152
Glossary

simultaneously on the standby server as a protection against


data loss.

Remote Remote is a type of operation task that allows you to remotely


monitor and control other Security Desks that are part of your
system, using the Monitoring task and the Alarm monitoring
task.

rendering rate Rendering rate is the comparison of how fast the workstation
renders a video with the speed the workstation receives that
video from the network.

Report Manager Report Manager is a type of role that automates report


emailing and printing based on schedules.

report pane Report pane is one of the panes found in the Security Desk task
workspace. It displays query results or real-time events in a
tabular form.

request to exit Request to exit (REX) is a door release button normally located
on the inside of a secured area that when pressed, allows a
person to exit the secured area without having to show any
credential. This can also be the signal from a motion detector.
It is also the signal received by the controller for a request to
exit.

reverse geocoding Reverse geocoding is an AutoVu™ feature that translates a pair


of latitude and longitude into a readable street address.

role A role is a software module that performs a specific job within


Security Center. Roles must be assigned to one or more servers
for their execution.

roles and units view The roles and units view is a browser view that lists the roles
on your system with the units they control as child entities.

route Route is a setting that configures the transmission capabilities


between two end points in a network for the purpose of
routing media streams.

Rules Engine The Rules Engine is the component of Mission Control that
analyzes and correlates the data (events) collected by Security
Center, based on predefined rules. The Rules Engine uses this
data to detect and trigger incidents in Mission Control.

same position Same position is a type of parking regulation characterizing an


overtime rule. A vehicle is in violation if it is seen parked at the
exact same spot over a specified period of time. Patroller must
be equipped with GPS capability in order to enforce this type of
regulation.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  153
Glossary

schedule A schedule is a type of entity that defines a set of time


constraints that can be applied to a multitude of situations in
the system. Each time constraint is defined by a date coverage
(daily, weekly, ordinal, or specific) and a time coverage (all
day, fixed range, daytime, and nighttime).

scheduled task A scheduled task is a type of entity that defines an action


that executes automatically on a specific date and time, or
according to a recurring schedule.

Software Development Kit The Software Development Kit (SDK) allows end-users to
develop custom applications or custom application extensions
for Security Center.

SDK certificate An SDK certificate allows an SDK application (or plugin) to


connect to Security Center. The certificate must be included in
the Security Center license key for the SDK application to work.

secondary server A secondary server is any alternate server on standby intended


to replace the primary server in the case the latter becomes
unavailable.

Secure Socket Layer The Secure Sockets Layer (SSL) is a computer networking
protocol that manages server authentication, client
authentication and encrypted communication between servers
and clients.

secured area A secured area is an area entity that represents a physical


location where access is controlled. A secured area consists of
perimeter doors (doors used to enter and exit the area) and
access restrictions (rules governing the access to the area).

Security Center Security Center is the unified security platform that seamlessly
blends Genetec™ security and safety systems within a single
innovative solution. The systems unified under Security Center
include Genetec™ Omnicast™ IP video surveillance system,
Synergis™ IP access control system, and AutoVu™ IP license
plate recognition (LPR) system.

Security Center The Security Center Federation™ role connects a remote,


Federation™ independent Security Center system to your local Security
Center. That way, the remote system's entities and events can
be used in your local system.

Security Center Mobile Security Center Mobile is a feature of Genetec’s unified


platform that lets you remotely connect to your Security Center
system over a wireless IP network. Supported Mobile client
components include a platform-independent, unified Web
Client, as well as various Mobile apps for smartphones and
tablets.

security clearance A security clearance is a numerical value used to further


restrict the access to an area when a threat level is in effect.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  154
Glossary

Cardholders can only enter an area if their security clearance


is equal or higher than the minimum security clearance set on
the area.

Security Desk Security Desk is the unified user interface of Security Center.
It provides consistent operator flow across all of the Security
Center’s main systems, Omnicast™, Synergis™, and AutoVu™.
Security Desk’s unique task-based design lets operators
efficiently control and monitor multiple security and public
safety applications.

security token An on-the-wire representation of claims that is


cryptographically signed by the issuer of the claims, providing
strong proof to any relying party as to the integrity of the
claims and the identity of the issuer.

security token service Secure token service (STS) is a claims provider implemented
as a web service that issues security tokens. Active Directory
Federation Services (ADFS) is an example of a security token
service. Also known as an issuer.

self-signed certificate A self-signed certificate is an identity certificate that is signed


by the same entity whose identity it certifies.

server A server is a type of entity that represents a server machine on


which Genetec Server is installed.

server mode The server mode is a special online operation mode restricted
to Synergis™ units, in which the unit allows the Access
Manager (the server) to make all access control decisions. The
unit must stay connected to the Access Manager at all times to
operate in this mode.

Server Admin Server Admin is the web application running on every server
machine in Security Center that allows you to configure the
settings of Genetec Server. Server Admin also allows you to
configure the Directory role on the main server.

sharing guest Sharing guest is when Security Center system gives the rights
to view and modify entities shared by another system.

sharing host Sharing host is when Security Center system owns partitions
that are shared with other Security Center systems.

Sharp EX Sharp EX is the Sharp unit that includes an integrated image


processor and supports two standard definition NTSC or PAL
inputs for external cameras (LPR and context cameras).

Sharp Portal Sharp Portal is a web-based administration tool used to


configure Sharp cameras for fixed or mobile AutoVu™ systems.
From a web browser, you log on to a specific IP address (or the
Sharp name in certain cases) that corresponds to the Sharp you
want to configure. When you log on, you can configure options
such as selecting the LPR context (e.g. Alabama, Oregon,

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  155
Glossary

Quebec, etc), selecting the read strategy (e.g. fast moving or


slow moving vehicles), viewing the Sharp’s live video feed, and
more.

Sharp unit The Sharp unit is a proprietary LPR unit of Genetec Inc.
that integrates license plate capturing and processing
components, as well as digital video processing functions,
inside a ruggedized casing.

Sharp VGA Sharp VGA is a Sharp unit that integrates the following
components: an infrared illuminator; a standard definition
(640 x 480) LPR camera for plate capture; an integrated image
processor; an NTSC or PAL color context camera with video
streaming capabilities.

Sharp XGA Sharp XGA is a Sharp unit that integrates the following
components: an infrared illuminator; a high-definition (1024
x 768) LPR camera for plate capture; an integrated image
processor; an NTSC or PAL color context camera with video
streaming capabilities and optional internal GPS.

SharpOS SharpOS is the software component of a Sharp or SharpX unit.


SharpOS is responsible for everything related to plate capture,
collection, processing, and analytics. For example, a SharpOS
update may include new LPR contexts, new firmware, Sharp
Portal updates, and updates to the Sharp's Windows services
(Plate Reader, HAL, updater service, and so on).

SharpV SharpV is a Sharp unit that is specialized for fixed installations


and is ideally suited for a range of applications, from managing
off-street parking lots and facilities to covering major city
access points to detect wanted vehicles. SharpV combines two
high-definition cameras (1.2MP) with onboard processing
and illumination in a ruggedized, environmentally sealed
unit. Both lenses are varifocal for ease of installation and the
camera is powered via PoE+.

SharpX SharpX is the camera component of the SharpX system. The


SharpX camera unit integrates a pulsed LED illuminator that
works in total darkness (0 lux), a monochrome LPR camera
(1024 x 946 @ 30 fps), and a color context camera (640 x 480
@ 30 fps). The LPR data captured by the SharpX camera unit
is processed by a separate hardware component called the
AutoVu™ LPR Processing Unit.

SharpX VGA SharpX VGA is the camera component of the SharpX system.
The SharpX VGA camera unit integrates a pulsed LED
illuminator that works in total darkness (0 lux), a monochrome
LPR camera (640 x 480 @ 30 fps), and a color context camera
(640 x 480 @ 30 fps). The LPR data captured by the SharpX VGA
camera unit is processed by a separate hardware component
called the AutoVu™ LPR Processing Unit.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  156
Glossary

single sign-on Single sign-on (SSO) is the use of a single user authentication
across multiple IT systems or even organizations.

standalone mode Standalone mode is an offline operation mode of the interface


module where it operates autonomously, making decisions
based on the access control settings previously downloaded
from the Synergis™ unit. Activity reporting occurs on schedule,
or when the connection to the unit is available. Not all
interface modules can operate in standalone mode.

standard schedule A standard schedule is a type of schedule entity that may be


used in all situations. Its only limitation is that it does not
support daytime or nighttime coverage.

strict antipassback A strict antipassback is an antipassback option. When enabled,


a passback event is generated when a cardholder attempts to
leave an area that they were never granted access to. When
disabled, Security Center only generates passback events for
cardholders entering an area that they never exited.

supervised mode Supervised mode is an online operation mode of the interface


module where the interface module makes decisions based on
the access control settings previously downloaded from the
Synergis™ unit. The interface module reports its activities in
real time to the unit, and allows the unit to override a decision
if it contradicts the current settings in the unit. Not all interface
modules can operate in supervised mode.

SV appliance An SV appliance is a turnkey network security appliance that


comes preinstalled with an embedded operating system and
Genetec’s Security Center. You can use SV appliances to quickly
deploy a unified or standalone video surveillance and access
control system.

SV-16 The SV-16 is a sub-compact network security appliance that


comes preinstalled with Microsoft® Windows 10 Enterprise
LTSB 2016 (64-bit) and Genetec security software. The SV-16
is for small-scale, single server installations, and can support
both cameras and access control readers.

SV-32 The SV-32 is a compact-sized network security appliance that


comes pre-installed with Windows Embedded Standard and
Genetec’s Security Center. It enables you to quickly deploy a
unified or standalone video surveillance and access control
system.

SV-PRO The SV-PRO is a rack-mount appliance that comes preloaded


with Windows and Genetec security software. The SV-PRO is
for small to mid-scale, single or multiple server installations,
and can support both cameras and access control readers.

symmetric encryption Symmetric encryption is a type of encryption where the same


key is used for both encryption and decryption.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  157
Glossary

synchronous video A synchronous video is a simultaneous live video or playback


video from more than one camera that are synchronized in
time.

Synergis™ Synergis™ is the IP access control system of the Security Center


designed to offer end-to-end IP connectivity, from access
control reader to client workstation. Synergis™ seamlessly
integrates a variety of access control capabilities including,
but not limited to, badge design, visitor management, elevator
control, zone monitoring and more.

Synergis™ appliance A Synergis™ appliance is an IP-ready security appliance


manufactured by Genetec Inc. that is dedicated to access
control functions. All Synergis™ appliances come preinstalled
with Synergis™ Softwire and can be enrolled as access control
units in Security Center.

Synergis™ Appliance Portal Synergis™ Appliance Portal is the web-based administration


tool used to configure and administer the Synergis™ appliance,
as well as upgrade its firmware.

Synergis™ Cloud Link Synergis™ Cloud Link is an intelligent and PoE-enabled access
control appliance of Genetec Inc. that supports a variety of
third-party interface modules over IP and RS-485. Synergis™
Cloud Link is seamlessly integrated with Security Center and
is capable of making access control decisions independently of
the Access Manager.

Synergis™ Master Synergis™ Master Controller (SMC) is an access control


Controller appliance of Genetec Inc. that supports a variety of third-
party interface modules over IP and RS-485. SMC is seamlessly
integrated with Security Center and is capable of making
access control decisions independently of the Access Manager.

Synergis™ Softwire Synergis™ Softwire is the access control software developed by


Genetec Inc. to run on a variety of IP-ready security appliances.
Synergis™ Softwire lets these appliances communicate with
third-party interface modules. A security appliance running
Synergis™ Softwire can be enrolled as an access control unit in
Security Center.

Synergis™ unit A Synergis™ unit is a Synergis™ appliance that is enrolled as an


access control unit in Security Center.

System The System task is an administration task that allows you to


configure roles, macros, schedules, and other system entities
and settings.

system event A system event is a predefined event that indicates the


occurrence of an activity or incident. System events are
defined by the system and cannot be renamed or deleted.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  158
Glossary

System status System status is a type of maintenance task that monitors the
status of all entities of a given type in real time, and allows you
to interact with them.

tailgating Tailgating is the act of entering a secured area without


presenting a credential, by following behind another person
who has presented their credential.

task A task is the central concept on which the entire Security


Center user interface is built. Each task corresponds to one
aspect of your work as a security professional. For example,
use a monitoring task to monitor system events in real-time,
use an investigation task to discover suspicious activity
patterns, or use an administration task to configure your
system. All tasks can be customized and multiple tasks can be
carried out simultaneously.

taskbar A taskbar is a user interface element of the Security Center


client application window, composed of the Home tab and the
active task list. The taskbar can be configured to appear on any
edge of the application window.

task cycling A task cycling is a Security Desk feature that automatically


cycles through all tasks in the active task list following a fixed
dwell time.

task workspace A task workspace is an area in the Security Center client


application window reserved for the current task. The
workspace is typically devided into the following panes:
canvas, report pane, dashboard, and Logical view.

threat level Threat level is an emergency handling procedure that a


Security Desk operator can enact on one area or the entire
system to deal promptly with a potentially dangerous situation,
such as a fire or a shooting.

tile A tile is an individual window within the canvas, used to


display a single entity. The entity displayed is typically the
video from a camera, a map, or anything of a graphical nature.
The look and feel of the tile depends on the displayed entity.

tile ID The tile ID is the number displayed at the upper left corner of
the tile. This number uniquely identifies each tile within the
canvas.

tile mode Tile mode is the Security Desk canvas operating mode where
the main area of the canvas is used to display the tiles and the
dashboard.

tile pattern The tile pattern is the arrangement of tiles within the canvas.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  159
Glossary

tile plugin A tile plugin is a type of entity that represents an application


that runs inside a Security Desk tile.

Time and attendance Time and attendance is a type of investigation task that reports
on who has been inside a selected area and the total duration
of their stay within a given time range.

timed antipassback Timed antipassback is an antipassback option. When Security


Center considers a cardholder to be already in an area, a
passback event is generated when the cardholder attempts
to access the same area again during the time delay defined
by Presence timeout. When the time delay has expired,
the cardholder can once again pass into the area without
generating a passback event.

timeline A timeline is a graphic illustration of a video sequence,


showing where in time, motion, and bookmarks are found.
Thumbnails can also be added to the timeline to help the user
select the segment of interest.

transfer group An archive transfer scenario that includes specific settings,


such as which cameras or Archivers are included in this
transfer, when the archives are transferred, what data is
transferred, and so on.

Transmission Control A connection-oriented set of rules (protocol) that, along


Protocol with the IP (Internet Protocol), is used to send data over an
IP network. The TCP/IP protocol defines how data can be
transmitted in a secure manner between networks. TCP/IP
is the most widely used communications standard and is the
basis for the Internet.

Transport Layer Security Transport Layer Security (TLS) is a protocol that provides
communications privacy and data integrity between two
applications communicating over a network. When a server
and client communicate, TLS ensures that no third party may
eavesdrop or tamper with any message. TLS is the successor to
the Secure Sockets Layer (SSL).

twilight schedule A twilight schedule is a type of schedule entity that supports


both daytime and nighttime coverages. A twilight schedule
cannot be used in all situations. Its primary function is to
control video related behaviors.

two-person rule The two-person rule is the access restriction placed on a door
that requires two cardholders (including visitors) to present
their credentials within a certain delay of each other in order
to gain access.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  160
Glossary

unit A unit is a hardware device that communicates over an IP


network that can be directly controlled by a Security Center
role. We distinguish four types of units in Security Center:
• Access control units, managed by the Access Manager role
• Video units, managed by the Archiver role
• LPR units, managed by the LPR Manager role
• Intrusion detection units, managed by the Intrusion
Manager role

Unit discovery tool Starting with Security Center 5.4 GA the Unit discovery tool has
been replaced by the Unit enrollment tool.

Unit enrollment tool The Unit enrollment tool allows you to discover IP units (video
and access control) connected to your network, based on their
manufacturer, and network properties (discovery port, IP
address range, password, and so on). Once discovered, the
units can be added to your system.

Unit replacement Unit replacement is a tool that is used to replace a failed


hardware device with a compatible one, while ensuring that
the data associated to the old unit gets transferred to the
new one. For an access control unit, the configuration of the
old unit is copied to the new unit. For a video unit, the video
archive associated to the old unit is now associated to the new
unit, but the unit configuration is not copied.

unit synchronization Unit synchronization is the process of downloading the latest


Security Center settings to an access control unit. These
settings, such as access rules, cardholders, credentials, unlock
schedules, and so on, are required so that the unit can make
accurate and autonomous decisions in the absence of the
Access Manager.

University Parking University Parking Enforcement is a Patroller software


Enforcement installation that is configured for university parking
enforcement: the enforcement of scheduled parking permits
or overtime restrictions. The use of maps is mandatory. Hotlist
functionality is also included.

unlock schedule An unlock schedule defines the periods of time when free
access is granted through an access point (door side or elevator
floor).

unreconciled read A unreconciled read is a MLPI license plate read that has not
been committed to an inventory.

user A user is a type of entity that identifies a person who uses


Security Center applications and defines the rights and
privileges that person has on the system. Users can be created
manually or imported from an Active Directory.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  161
Glossary

user group A user group is a type of entity that defines a group of users
who share common properties and privileges. By becoming
member of a group, a user automatically inherits all the
properties of the group. A user can be a member of multiple
user groups. User groups can also be nested.

user level A user level is a numeric value assigned to users to restrict


their ability to perform certain operations, such as controlling
a camera PTZ, viewing the video feed from a camera, or
staying logged on when a threat level is set. Level 1 is the
highest user level, with the most privileges.

User management The User management task is a type of administration task that
allows you to configure users, user groups, and partitions.

validation key A validation key is a serial number uniquely identifying a


computer that must be provided to obtain the license key.

Vault Vault is a tool that displays your saved snapshots and exported
G64, G64x, and GEK (encrypted) video files. From the Vault,
you can view the video files, encrypt and decrypt files, convert
files to ASF, or package files with the Genetec Video Player.

vehicle identification A vehicle identification number (VIN) is an identification


number number that a manufacturer assigns to vehicles. This is
usually visible from outside the vehicle as a small plate on the
dashboard. A VIN can be included as additional information
with license plate entries in a hotlist or permit list, to further
validate a hit and ensure that it is the correct vehicle.

video analytics Video analytics is the software technology that is used to


analyze video for specific information about its content.
Examples of video analytics include counting the number
of people going through a door, license plate recognition,
detection of unattended objects, or the direction of people
walking or running.

video archive Video archive includes both the recorded audio and video
footage and the database that documents those recordings
(source camera, timestamps, events, bookmarks, and so on).

video decoder A video decoder is a device that converts a digital video stream
into analog signals (NTSC or PAL) for display on an analog
monitor. The video decoder is one of the many devices found
on a video decoding unit.

video encoder A video encoder is a device that converts an analog video


source to a digital format, by using a standard compression
algorithm, such as H.264, MPEG-4, MPEG-2, or M-JPEG. The

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  162
Glossary

video encoder is one of the many devices found on a video


encoding unit.

video file A video file is a file created by an archiving role (Archiver or


Auxiliary Archiver) to store archived video. The file extension
is G64 or G64x. You need Security Desk or the Genetec Video
Player to view video files.

Video file explorer Video file explorer is a type of investigation task that browses
through your file system for video files (G64 and G64x) and
allows you to play, convert to ASF, and verify the authenticity
of these files.

video sequence A video sequence is any recorded video stream of a certain


duration.

video stream A video stream is an entity representing a specific video


quality configuration (data format, image resolution, bit rate,
frame rate, and so on) on a camera.

Video The Video task is a type of administration task that allows you
to configure video management roles, units, analog monitors,
and cameras.

video unit A video unit is a type of video encoding or decoding device


that is capable of communicating over an IP network and
can incorporate one or more video encoders. The high-end
encoding models also include their own recording and video
analytic capabilities. Cameras (IP or analog), video encoders,
and video decoders are all examples of video units. In Security
Center, a video unit refers to a type of entity that represents a
video encoding or decoding device.

video watermarking Video watermarking is the process by which a digital signature


(watermark) is added to each recorded video frame to ensure
its authenticity. If anyone later tries to make changes to the
video (add, delete or modify a frame), the signatures will no
longer match, which shows that the video has been tampered
with.

virtual zone A virtual zone is a zone entity where the I/O linking is done by
software. The input and output devices can belong to different
units of different types. A virtual zone is controlled by the Zone
Manager and only works when all the units are online. It can
be armed and disarmed from Security Desk.

Visit details Visit details is a type of investigation task that reports on the
stay (check-in and check-out time) of current and past visitors.

Visitor activities Visitor activities is a type of investigation task that reports on


visitor activities (access denied, first person in, last person out,
antipassback violation, and so on).

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  163
Glossary

visitor escort rule The visitor escort rule is the additional access restriction
placed on a secured area that requires visitors to be escorted
by a cardholder during their stay. Visitors who have an escort
are not granted access through access points until both they
and their assigned escort (cardholder) present their credentials
within a certain delay.

Visitor management Visitor management is a type of operation task that allows you
to check in, check out, and modify visitors, as well as manage
their credentials, including temporary replacement cards.

visual tracking Visual tracking is a Security Desk feature that allows you to
follow an individual across different areas of your company
without ever losing sight of that individual, as long as the
places this person goes through are monitored by cameras.This
feature displays transparent overlays on the video to show you
where you can click to switch to adjacent cameras.

VSIP port The VSIP port is the name given to the discovery port of Verint
units. A given Archiver can be configured to listen to multiple
VSIP ports.

watchdog Watchdog is a Security Center service installed alongside


the Genetec Server service on every server computer. The
watchdog monitors the Genetec Server service, and restarts it
if abnormal conditions are detected.

Web-based SDK The Web-based SDK role exposes the Security Center SDK
methods and objects as web services to support cross-platform
development.

Web Client You can log on to Security Center Web Client from your
internet browser to monitor video, investigate events related to
door activity, search for and investigate active and past alarms,
view and manage cardholders, visitors, cardholder groups,
and credentials. Your system administrator must create a Web
Client Server role in Security Center, which defines the Web
Client's address (URL).

Web Client Server Web Client Server is the role used to configure Security Center
Web Client, a web application that gives users remote access
to Security Center. Each role created defines a unique web
address (URL) that users enter in their Internet web browser
to log on to Web Client and access information from Security
Center.

Web Map Service Web Map Service (WMS) is a standard protocol for serving
georeferenced map images over the Internet that are
generated by a map server using data from a GIS database.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  164
Glossary

wheel imaging Wheel imaging is a virtual tire-chalking technology that takes


images of the wheels of vehicles to prove whether they have
moved between two license plate reads.

widget A widget is a component of the graphical user interface (GUI)


with which the user interacts.

Windows Communication Windows Communication Foundation (WCF) is a


Foundation communication architecture used to enable applications, in
one machine or across multiple machines connected by a
network, to communicate. AutoVu™ Patroller uses WCF to
communicate wirelessly with Security Center.

zone A zone is a type of entity that monitors a set of inputs and


triggers events based on their combined states. These events
can be used to control output relays.

Zone activities Zone activities is a type of investigation task that reports


on zone related activities (zone armed, zone disarmed, lock
released, lock secured, and so on).

Zone Manager Zone Manager is a type of role that manages virtual zones and
triggers events or output relays based on the inputs configured
for each zone. It also logs the zone events in a database for
zone activity reports.

Zone occupancy Zone occupancy is a type of investigation task that reports on


the number of vehicles parked in a selected parking area, and
the percentage of occupancy.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  165
Where to find product information
You can find our product documentation in the following locations:
• Genetec™ Technical Information Site: The latest documentation is available on the Technical
Information Site. To access the Technical Information Site, log on to Genetec™ Portal and click Technical
Information. Can't find what you're looking for? Contact [email protected].
• Installation package: The Installation Guide and Release Notes are available in the Documentation
folder of the installation package. These documents also have a direct download link to the latest version
of the document.
• Help: Security Center client and web-based applications include help, which explain how the product
works and provide instructions on how to use the product features. Patroller and the Sharp Portal
also include context-sensitive help for each screen. To access the help, click Help, press F1, or tap the ?
(question mark) in the different client applications.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  166
Technical support
Genetec™ Technical Assistance Center (GTAC) is committed to providing its worldwide clientele with the
best technical support services available. As a customer of Genetec Inc., you have access to the Genetec™
Technical Information Site, where you can find information and search for answers to your product
questions.
• Genetec™ Technical Information Site: Find articles, manuals, and videos that answer your questions
or help you solve technical issues.
Before contacting GTAC or opening a support case, it is recommended to search the Technical
Information Site for potential fixes, workarounds, or known issues.
To access the Technical Information Site, log on to Genetec™ Portal and click Technical Information.
Can't find what you're looking for? Contact [email protected].
• Genetec™ Technical Assistance Center (GTAC): Contacting GTAC is described in the Genetec™ Lifecycle
Management (GLM) documents: EN_GLM_ASSURANCE and EN_GLM_ADVANTAGE.

Additional resources
If you require additional resources other than the Genetec™ Technical Assistance Center, the following is
available to you:
• Forum: The Forum is an easy-to-use message board that allows clients and employees of Genetec Inc.
to communicate with each other and discuss a variety of topics, ranging from technical questions to
technology tips. You can log in or sign up at https://gtapforum.genetec.com.
• Technical training: In a professional classroom environment or from the convenience of your
own office, our qualified trainers can guide you through system design, installation, operation, and
troubleshooting. Technical training services are offered for all products and for customers with a varied
level of technical experience, and can be customized to meet your specific needs and objectives. For
more information, go to http://www.genetec.com/support/training/training-calendar.

Licensing
• For license activations or resets, please contact GTAC at https://gtap.genetec.com.
• For issues with license content or part numbers, or concerns about an order, please contact Genetec™
Customer Service at [email protected], or call 1-866-684-8006 (option #3).
• If you require a demo license or have questions regarding pricing, please contact Genetec™ Sales at
[email protected], or call 1-866-684-8006 (option #2).

Hardware product issues and defects


Please contact GTAC at https://gtap.genetec.com to address any issue regarding Genetec™ appliances or any
hardware purchased through Genetec Inc.

tip.genetec.com | Security Center Installation and Upgrade Guide 5.6 SR1


EN.500.002-V5.6.C1(1) | Last updated: April 19, 2017  167
Security Center | Index | 168

Index
A silent mode 10
wizard mode 10
AutoVu deployment 50 installation packages
contents 10
installing
B expansion server 33
backing up database main server 15
manually 100 Security Center Client 44
backward compatibility System Availability Monitor 15, 33
disabling 55 WinPcap 15, 33
blocked 14 installing hotfix KB2468871 121
blocked files 14 installing hotfix KB2494124 121
installing hotfix KB2588507 121
installing Security Center
C postrequisites 58
prerequisites 2
creating
Server Admin password 15, 33
server password 15, 33 L
license
D activating 25, 28
activating from Config Tool 87
demo license, acquiring 167
manual activation 28, 87
documentation
web activation 25
Installation and Upgrade Guide 10
license key 28, 87
Release Notes 10
licensing 167
document information ii

E M
modes
error messages
installation options 10
blocked 122
blocked files 122
Return Code: 0x800f081f 120 O
unblock 122
Omnicast
ports used (default) 51
F
files P
License.lic 28, 87
setup.exe 10 performance issue 121
Validation.vk 28, 87 ports
firewalls AutoVu-specific 50
configuring ports 49 prerequisites
upgrading from an earlier release of Security
Center 5.5 62
G upgrading from Security Center 5.5 63
Genetec Update Service
basic authentication 105 R
closing 105
connecting 105 return merchandise authorization RMA 167
log on 105 returns and repairs 167

I S
installation options Security Center
languages 10 common ports used 49
Security Center | Index | 169

Server Admin
opening 25, 28
silent mode
install command 109
installing 109, 111
installing Security Center Server 115, 117
limitations 107
option list 109
preinstallation tasks 107, 108
prerequisites 107
Security Center Client 117
uninstalling Security Center 118
Synergis
ports used (default) 53

T
technical support, contacting 167
TLS
backward compatibility 55
troubleshooting
KB2468871 121
KB2494124 121
KB2588507 121
performance issue 121
video stability 121

U
unblock 14
uninstalling Security Center components
from Windows 7 56
from Windows XP 56
upgrading Directory database 101
upgrading expansion server 93
upgrading main server 91
upgrading Security Center
from from an earlier release of version 5.4 79
from version 5.1 83
from version 5.2 82
from version 5.3 81
from version 5.4 80
from version 5.5 80
multiple Directory servers 84
overview 79, 80, 81, 82, 83
upgrading Security Center Client 99

V
validation key 28, 87
video stability issue 121

W
Web Client
differences between versions 66
feature list 66

You might also like