Operators Guide
Operators Guide
Release 610
Operator's Guide
July 2021
DISCLAIMER
This document contains Honeywell proprietary information. Information
contained herein is to be used solely for the purpose submitted, and no part of
this document or its contents shall be reproduced, published, or disclosed to a
third party without the express permission of Honeywell International Sàrl.
While this information is presented in good faith and believed to be accurate,
Honeywell disclaims the implied warranties of merchantability and fitness for
a purpose and makes no express warranties except as may be stated in its
written agreement with and for its customer.
In no event is Honeywell liable to anyone for any direct, special, or
consequential damages. The information and specifications in this document
are subject to change without notice.
Copyright 2021 - Honeywell International Sàrl
2
Contents
CONTENTS
Contents 3
Chapter 1 - About this guide 13
Chapter 2 - Understanding the basics 15
Introducing EBI 15
Introducing Station 16
Starting Station 18
Logging on to Station 19
What do you do if you are forced to log on? 19
Changing your password 20
Logging off 20
Changing the security level in Station 20
Understanding security levels 21
Changing Station's setup file 21
Entering commands in the Command Zone 22
Zooming in and out in a Station display 23
About alarms and other messages 23
Using a trackball 24
Using your keyboard 24
Searching for system items using Station 24
Searching locations for map elements 26
Accessing online Help 26
Chapter 3 - About your operator interface 29
About the Station layout 29
About Command Station 30
About Command Console 31
About Command Wall 32
3
Contents
4
Contents
5
Contents
Changing what is shown in the Alarm Summary and the System Status
display 99
Using the Location pane on the Alarm Summary and the System Status
display 100
Using column filtering and sorting on the Alarm Summary 101
Example scenario: Filtering 103
Example scenario: Sorting 103
Using views within the Alarm Summary 103
Using the details pane on the Alarm Summary 104
Navigating the Alarm Summary 105
Pausing the Alarm Summary 105
Resetting the Alarm Summary 106
Viewing extended alarm messages 106
Acknowledging alarms 106
Shelving an alarm 108
Considerations for configuring an alarm unshelving delay 109
Adding comments to an alarm 111
Viewing an alarm video clip 112
Alarm Management Options 112
Using Three-stage Alarm Handling 112
Using Structured Response Management 113
Acknowledging alarms from the Alarm Banner 114
Alarm list overflow 114
What happens when you click the Recover Alarms button? 115
6
Contents
7
Contents
8
Contents
9
Contents
10
Contents
11
Contents
12
CHAPTER
This guide describes how to monitor and control your Enterprise Buildings
Integrator (EBI) system.
To learn about Go to
Using Station and custom displays "Using Station and custom displays"
on page 59
13
Chapter 1 - About this guide
To learn about Go to
14
CHAPTER
Introducing EBI
Enterprise Buildings Integrator (EBI) is a sophisticated management and
control system that:
15
Chapter 2 - Understanding the basics
The point servers and controllers are the 'hands and eyes' of your system,
controlling and collecting data from field devices, such as card readers, air
conditioning units and so on.
Controllers collect information from the field and continually send this
information to the server where it is stored. In most cases, the controllers are
located near the devices they control, and are connected to the server via a
LAN (Local Area Network) or other communication link.
A point server collects information from the field and sends this information to
the server upon request. In general, the server does not store point values
from a point server unless you are collecting history.
Introducing Station
A Station is, in effect, a set of 'control panels' through which you and your
colleagues monitor and control your system. (Station is a separate EBI
program that runs on standard computers, as well as on the server.)
16
Chapter 2 - Understanding the basics
17
Chapter 2 - Understanding the basics
Starting Station
You connect to EBI by using the client shortcut.
To start Station
1. On the Windows desktop, double-click the Station shortcut.
TIP: The shortcut name depends on the EBI client type configured
on the client computer. For example, if you connect to EBI using
the Command Console client type, double-click the Command
Console shortcut.
Station establishes contact with the EBI server and displays the startup
display specified in the default setup file.
If you have Honeywell DVM as a licensed option, it launches automatically
if the Command Console shortcut is used.
2. Your system may be set up so that you can select a particular setup file,
which controls the way Station operates.
3. Log on to Station in accordance with the security option used on your
system.
TIP: If your site uses single signon, you do not need to enter your
user name and password.
18
Chapter 2 - Understanding the basics
Logging on to Station
In general, if you have been given a user name and password, you need to log
on to Station. (Your site may be set up so that your Windows and Station user
name and password are the same and logging on to Station is automatic.)
2. Click OK.
To change operators
1. In the bottom-right corner of the Station display, click the Operator ID and
Security Level.
The Logon dialog box appears.
2. Type the User Name and Password that has the security level you require.
3. Click OK.
19
Chapter 2 - Understanding the basics
Logging off
To log off
1. In the Command Zone, type bye and press ENTER.
20
Chapter 2 - Understanding the basics
3. Click OK.
Your security level appears at the right of the Status Bar. The levels are, from
lowest to highest: View Only, Ack Only, OPER, SUPV, ENGR and mngr.
21
Chapter 2 - Understanding the basics
Example
To call up a display called 'boilerslevel1:'
22
Chapter 2 - Understanding the basics
To resize a display
1. Use the Zoom control on the toolbar to change the magnification of the
display.
23
Chapter 2 - Understanding the basics
Using a trackball
You use a trackball in a similar manner to a mouse—for example, rolling the
ball forwards is equivalent to moving the mouse forwards. The functions of the
two buttons are identical to those on a mouse.
If you enter only the first part of the name in your search, all matching points
are returned in the search results. For example, 'Floor1' will find
'Floor1MainDoor', 'Floor1SideDoor' and so on.
24
Chapter 2 - Understanding the basics
TIP: If your operator interface uses a map, you can search for map
elements; for more information, see "Searching locations for map
elements" on the next page.
You can use wildcard characters (* and ?) in your search. An asterisk (*)
represents one or more unknown characters, whereas a question mark (?)
represents one unknown character. For example:
n '*Door' will find all points that end with 'Door', such as 'Floor1MainDoor',
'Level2SideDoor' and so on.
n 'Floor?MainDoor' will find points 'Floor1MainDoor', 'Floor2MainDoor' and
so on.
25
Chapter 2 - Understanding the basics
TIP:
The Locations pane progressively discloses the search results as you type
the characters in the name.
3. Click the map element you want.
The location map pans and zooms to center the element. If the map
element is a Smart Object, the Smart Object opens.
26
Chapter 2 - Understanding the basics
Option Description
27
Chapter 2 - Understanding the basics
28
CHAPTER
Item Description
29
Chapter 3 - About your operator interface
Item Description
You can click the menu icon on the left-hand side of the toolbar to
access the Station menus.
Location The location pane is used for locating and filtering information. For
pane example, if you are viewing the Alarm Summary, it shows a
hierarchical list of all the locations to which you have access and the
aggregate alarms for each location. If you are viewing the System
Status display, the location pane can also serve as a navigation menu
providing quick access to tasks related to system status tasks or
cardholder management.
Display Each display is a separate 'control panel' that you use to monitor and
control a particular part of your system.
Alarm Line Generally, this line displays the most recent unacknowledged alarm.
Note that the Alarm Line may be hidden on your system, or it may be
configured differently. For example, it might display the oldest
unacknowledged alarm rather than the most recent.
Status bar The status bar provides an overview of your system's status. For
example, a flashing indicator on the Alarm box indicates that there is at
least one unacknowledged alarm.
30
Chapter 3 - About your operator interface
For more information about the map workspace, see "About the map
workspace" on page 33.
31
Chapter 3 - About your operator interface
For more information about the features shown above, see the links in the
table below.
For information on Go to
32
Chapter 3 - About your operator interface
The Command Wall layout contains the map workspace. For more
information, see "About the map workspace" below.
33
Chapter 3 - About your operator interface
Item Description
1 Map workspace. The map workspace allows operators to interact with the
system.
2 Location map. Shows the location currently being monitored. The map can be
panned and zoomed in or out. The map contains the various map elements
(described below).
3 Map elements. Map elements include zoom regions, portal regions, link
regions, Smart Objects, alarm aggregation Smart Objects, and point
parameters:
34
Chapter 3 - About your operator interface
Item Description
4 Map toolbar. Depending on the type of operator interface you are using, the
toolbar contains controls to display system content, navigate your system,
filter map content, exit the map workspace, and enable/disable Edit mode.
For more information, see the topic "Map toolbar" below.
The system date and time are displayed at the bottom of the workspace
toolbar.
TIP: The map workspace does not display system alarms, so the alarm
count shown in the alarm summary and the alarm count on the Alarm
icon may differ.
5
Home button and Zoom buttons. The Home button ( ) returns the map to
its home position (centered, at the lowest zoom level). Use the Add (+) and
Minus (–) buttons to increase or decrease the map zoom level by one level.
Map toolbar
Use the map toolbar to display different types of content, navigate your facility,
control the map filters, enable/disable Edit mode, and exit from the client.
Click an icon to toggle the feature on or off.
The table below describes the map workspace toolbar.
TIP: Your map toolbar may have fewer icons than described below,
depending on your operator interface.
35
Chapter 3 - About your operator interface
Item Description
The incident count on the icon shows the number of open incidents in the
system. If there is at least one unowned incident, the incident count is
animated.
For more information, see the section "Working with incidents" on page 123.
For more information, see the topic "Navigating your facility using the map
workspace" on page 43.
Map Filters. Displays the Map Filters pane used to control the visibility of
content during runtime, which allows operators to display only the relevant
content. For example, you can select the Camera option in the Security
domain category to control the visibility of camera Smart Objects.
TIP: The map filters that are available are based on the Smart Objects
in the system—for example, if the system has no fire-related Smart
Objects, this domain filter is not available.
For more information, see the topic "Filtering map content" on page 45.
Links. Displays the Links pane that has links to system displays and other
content. You can also use the Links pane to gain access to, for example,
descriptions of standard operating procedures, equipment schematics, and
so on.
For more information, see the topics "Navigating your facility using the map
workspace" on page 43 and "Adding links to maps and Smart Objects" on
page 50.
Help. Provides access to a visual guide to Smart Objects, as well as states and
priorities for alarms and incidents.
For more information, see the topic "Accessing online Help" on page 26.
36
Chapter 3 - About your operator interface
Item Description
System menu. Displays links to Station displays, such as the Events summary,
groups, trends, reports, cardholder management, and so on. Click the link for
the content you want.
The Edit icon only appears for operators logged on with an ENGR or MNGR
security level.
The system date and time on the server is displayed at the bottom of the map
toolbar.
Station toolbar
The buttons in the Station toolbar provide easy access to frequently required
displays and commands. For example, to call up the System Menu, click the
toolbar button.
Button Description
Menu
Provides access to the Station menus. If this button is not visible, access
the Station menus by using the menu bar at the top of the screen.
Back/Forward
In the Station client type, which has a single window, this control moves
backward/forward between displays you have viewed. You can click the
arrow to the right of the Back/Forward buttons to view a history of
displays you have viewed.
37
Chapter 3 - About your operator interface
Button Description
Reload Page
Home
Calls up the home page, if one has been configured for your system.
System Menu
Alarms
Events
Incidents
Maps
TIP: The use of maps is a licensed option for the Station client
and Command Console client types.
Trends
38
Chapter 3 - About your operator interface
Button Description
Global Schedules
Reports
Acknowledge/Silence
Cardholder Detail
Detail
Calls up the display associated with the object that is in alarm, or the
selected object.
Quick View
Create Incident
Calls up the Select Incident Type dialog box used to create a new
incident.
Zoom
39
Chapter 3 - About your operator interface
Button Description
Command You type commands in the text box. The Command Zone also retains a
history of previously selected displays. You can return to a display by
choosing from the list.
The table below describes each box in the Status Bar, starting from the left.
Box Description
ALARM Indicates whether there are any alarms, as well as their status:
SYSTEM Indicates whether there are any system alarms, as well as their
status:
INCIDENTS Indicates whether there are any incidents as well as their status.
40
Chapter 3 - About your operator interface
Box Description
l Blank. No incidents.
l Flashing. At least one open, unowned incident exists and is
awaiting a response.
l Not flashing. All open incidents have owners.
MESSAGE Indicates whether there are any messages, as well as their status:
l Blank. No messages.
l Flashing green. There is at least one unacknowledged message.
l Green (not flashing). There is at least one message, but they have
all been acknowledged.
Click the box to call up the Message Summary, which lists each
message.
Server ID The computer name of the server to which you are connected.
Station number The number of the Station you are logged on to. (Most systems
have more than one Station.)
Date and time The current date and time, as set on the server.
41
Chapter 3 - About your operator interface
42
CHAPTER
A different Map Click the Locations icon ( ). In the Locations panel, click a
location toolbar link. The map for that location is displayed.
A different Current On the map, click the zoom region for the area you want
location map to see in detail. The map updates to show the area.
Navigating maps
43
Chapter 4 - Monitoring and controlling plant and equipment from maps
Help (Legend, Map Click the Help icon ( ) and then the item you want:
Alarms and toolbar
Incidents) l The Legend tab visually describes Smart Objects.
l The Alarms and Incidents tab visually describes icons
and priorities for alarms and incidents.
Links An open Click the Links icon ( ) to view links created for that
Smart Smart Object.
Object
Links can be created to third-party content, as well as
to standard operating procedures and other
documentation that support your operational tasks.
Map Open the Incidents pane and click the incident you
toolbar want to see details for.
Station displays Map Click the System menu icon ( ), and then click the
toolbar icon for the display you want.
44
Chapter 4 - Monitoring and controlling plant and equipment from maps
TIP: Maps use industry-standard touch behavior. You can also use a
mouse to interact with maps.
Zoom to Home
position Tap or click the Home icon ( ).
TIP: When panning, open camera Smart Objects move with the map;
you can prevent this behavior by detaching the open camera Smart
Object from the underlying map. For more information see the
"Viewing camera video" on page 54.
TIP: When viewing Google third-party maps, the Map Filters pane
displays a section called Landmarks. You can use these additional
filters to control the visibility of features such as schools, places of
worship, and so on.
45
Chapter 4 - Monitoring and controlling plant and equipment from maps
An alarm indicator or incident indicator on a Smart Object shows that item has
unacknowledged and/or active alarms and/or incidents. If the indicator pulses,
the equipment has alarms and/or incidents that are currently
unacknowledged.
46
Chapter 4 - Monitoring and controlling plant and equipment from maps
Equipment status
Clicking a Smart Object displays the property panel, which shows control
icons (for doors), or the properties and associated values for other types of
equipment. The values displayed on the property panel are updated if they
change in the system.
47
Chapter 4 - Monitoring and controlling plant and equipment from maps
TIP: For more information on points and point parameters, refer to the
EBI Operator's Guide.
Item Description
2 Incident/alarm indicator. Indicates that the equipment item has active alarms
and/or incidents; the indicator pulses if the alarm/incident is
unacknowledged. Clicking the indicator shows (or hides) the list of active
incidents or alarms.
3 Shows the current status of the point parameters for the equipment. Data
quality for the properties can be any one of the following:
l Bad . A red "X" is shown for the property value. The property cannot be edited
until the data quality is Good.
l Offscan . Scanning and/or control of the equipment item is disabled. The
property can be modified, but changes will not be committed until the
equipment is back online.
Properties that can be edited have a gray border.
48
Chapter 4 - Monitoring and controlling plant and equipment from maps
Item Description
Supervisory control
An operator with the appropriate scope of responsibility can perform
supervisory control; an operator who has View only privileges can only view
properties. Control actions must be confirmed by the operator. On
confirmation, the new value is submitted to the system for verification, and
then committed.
For more information on controlling plant and equipment, see "Controlling
plant and equipment" on page 57.
Figure 4-5: Fixed (left) and PTZ (right) camera Smart Objects
The orientation of the camera image represents the direction the physical
camera is pointing in the “real world,” which provides a visual clue as to which
camera you might want to view video from in the event of an incident, for
example.
Clicking a camera Smart Object displays its camera video. Multiple camera
Smart Objects can be open at the same time.
49
Chapter 4 - Monitoring and controlling plant and equipment from maps
3 4
Item Description
1 The toolbar (left to right) contains icons for controlling video, and displaying
links, incidents, and alarms.
3 Name of the camera point as defined in the Facility Model. If the camera has
active alarms and/or incidents, an indicator is displayed.
TIP: To edit a link, you must delete the link and then re-add it.
50
Chapter 4 - Monitoring and controlling plant and equipment from maps
Prerequisites
n You must have read and write access to the Facility Model.
n You must have a security level of MNGR or ENGR to perform these tasks.
Option Description
To link to Tap or click the System Display tab, and then tap or
an click Create New Incident.
incident
without a Go to Step 4.
source or
location
To link to Tap or click the Web tab and then type a link name at
a the top of the dialog box. In the larger text box, type
Dashboar the following URL:
d
https:\\<server name>
/enterprisedashboard/dashboard/index.htm
l?pageId=<Dashboard
ID>&integration=contentOnly
Go to Step 4.
To link to Tap or click the Web tab and then type a link name
a at the top of the dialog box.
periodic
report in In the larger text box, type one of the following:
html or
PDF l https:\\<server name>/report/<report
format name>.asp (for HTML format)
l https:\\<server name>/report/<report
name>.htm (for PDF format)
51
Chapter 4 - Monitoring and controlling plant and equipment from maps
Option Description
Go to Step 4.
To link to Tap or click the Other display tab and then type a link
a name at the top of the dialog box.
summary
of all In the larger text box, type sysrptsummary.dsp
available and then go to Step 4.
reports
52
Chapter 4 - Monitoring and controlling plant and equipment from maps
procedure.
For example, to create a link that calls up the Alarm summary, type
Alarm summary as the name of the link, and sysAlarmSummary
in the text box.
d. To add the link to all Smart Objects of the same type displayed on the
map, select the Add to all<Smart Object type> option.
e. Configure the Single Action Callup option:
l When this option is selected, content links are called up
automatically when an operator clicks the Smart Object. Smart
Objects configured to use single action callup have an extra circle
on the Smart Object icon to distinguish them from other Smart
Objects.
l When this option is not selected, content links must be called up
manually by clicking a link in a Smart Object’s Links pane.
6. To test the link, click Test Link.
7. Click Add .
The link is added to the Smart Object.
To delete links
53
Chapter 4 - Monitoring and controlling plant and equipment from maps
To... Action
View active
alarms and a. Click the Incidents icon ( ) or the Alarms icon
incidents ( ) on the Smart Object toolbar.
b. Click an incident to view the incident
workflow, or click an alarm to view the point
detail display.
View related
content a. Click the Links icon ( ) on the Smart Object
toolbar.
b. Click the content link you want.
Links configured with single action callup have a
blue indicator (Command Console only).
You can view system displays, other displays
(such as EBI schematics), and web sites and
pages.
54
Chapter 4 - Monitoring and controlling plant and equipment from maps
NOTE: For more information about camera Smart Objects, see "About
Smart Objects" on page 46.
To view video from the camera, click the camera Smart Object.
A camera Smart Object will open only if it can do so without overlapping a
camera Smart Object that is already open; otherwise, the camera video
replaces the video in the existing open camera Smart Object.
By default, panning a map moves any camera Smart Object that is open. To
anchor the camera Smart Object, you can detach it from the underlying map.
If your site has licensed Honeywell DVM, you can send (that is, “throw”) the
video to Honeywell DVM Console.
55
Chapter 4 - Monitoring and controlling plant and equipment from maps
To... Action
56
Chapter 4 - Monitoring and controlling plant and equipment from maps
TIP:
l Operators who have view or read-only SOR can only monitor
To control doors
1. Click the Smart Object for the door you want to control.
The Smart Object opens and shows the control action(s) available—for
example, Lock, Unlock, Auto , and so on.
2. Click the control action you want to perform.
The Smart Object icon is updated to show the door’s status.
3. Close the Smart Object.
57
Chapter 4 - Monitoring and controlling plant and equipment from maps
TIP: If you navigate away from the Smart Object before confirming
the control action, the change is not committed.
58
CHAPTER
To call up a display
1. Click the View menu.
A list of displays appears. (The list also includes commands).
2. Click the item you want to view; for example Alarms.
TIP: If you know the name or number of a display, you can call it up
from the Command Zone. For example, to call up the numbered
display 145, type pag 145 and press ENTER. To call up a named
display primary, type primary and press ENTER.
System displays
Station includes many system displays, which are categorized as follows:
59
Chapter 5 - Using Station and custom displays
Summary Displays information, such as alarms and events, in list form. You
can display more details about an item in the list by clicking it.
Configuration These displays are only used to set up your system. As an operator,
you may need to look at them, but you will probably not be able to
change them.
ATTENTION: Station may have been configured so that you can only
call up authorized Web pages and files.
To call up a file
1. Click the Command Zone.
2. Type file://drive:\pathname\filename and press ENTER, where
drive:\pathname\filename is the name and location of the file.
For example, file://c:\procedures\proc7.htm.
60
Chapter 5 - Using Station and custom displays
n The Status and Alarm lines are printed, but not the Message Zone.
n If you print an HMIWeb display, only the visible portion of the page is
printed.
61
Chapter 5 - Using Station and custom displays
62
Chapter 5 - Using Station and custom displays
Abnormal
Color Condition
value
(truncated Any Display field too small for the value to display.
with ellipsis
…)
63
Chapter 5 - Using Station and custom displays
Abnormal
Color Condition
value
TIP:
To display a visual guide for alarm state icons and priorities, click Help
on the map toolbar, and then click the Alarms and incidents tab.
The following table describes how alarm state icons change to reflect the
alarm state of the associated point.
If the icon looks like The alarm Its priority Its acknowledge
And it
this is is status is
64
Chapter 5 - Using Station and custom displays
If the icon looks like The alarm Its priority Its acknowledge
And it
this is is status is
TIP:
l This topic describes the default behavior of content windows in
For information about using content windows, see the topic "Controlling the
Command Console layout and content windows" on page 67.
65
Chapter 5 - Using Station and custom displays
Round robin
By default, Command Console displays content in a “round robin” manner.
Round robin means that new content is displayed in the window that contains
the oldest content.
Target windows
By default, Command Console displays any content from a Station menu
option or link on the map in the target window.
To make a window the target, click the window title bar or inside the window
itself. A blue inner border appears around the content area to indicate the
window is now the target for new content.
TIP: Clicking the window toolbar does not make the window the target.
Pinned windows
Pinning a window preserves content you want to persist by preventing its
contents from being replaced. For example, you can pin a window containing
the Alarm summary so that it is always visible.
To pin a window, click the pin icon ( ) in the left-hand corner of the window
title bar. The pin changes orientation to indicate the window is pinned ( ).
A pinned window cannot be the target window. Pinning the target window
automatically makes another window the new target window. Pinning a
window prevents the window from displaying content called up from external
links. Instead, clicking an external link will display the content in the target
window.
Navigating a display from within a pinned window (for example, by clicking a
link or button on a display) causes all navigation to occur within that content
window. However, if the content window contains a summary page (Alarm
summary or Event summary, for example), double-clicking an item displays its
associated display in the target window.
66
Chapter 5 - Using Station and custom displays
The system does not allow all windows to be pinned, as this would prevent the
callup of new content.
TIP:
l Your Command Console system may be configured to behave
When you call up displays, you can specify which content window will host the
display. For example, you can prevent new content from replacing a summary
display you want visible at all times, and direct new content to a specific
window.
TIP:
l Command Console content windows are identified with numbers in
The table below describes how to control the window layout and content
windows.
Task Action
67
Chapter 5 - Using Station and custom displays
Task Action
minimize/maximize
l Click the Minimize button to minimize Command Console to
the Command
the task bar.
Console application
l Click Maximize button in the task bar to restore Command
Console.
To protect window Click the pin icon ( ) in the left-hand corner of the window
content title bar.
The window is taken out of round robin, and new content will
be displayed in a target window (unless you navigate within
the pinned window, or call up new content by using a
window parameter).
To display new Click the window title bar or inside the window. New content
content in the will be displayed in the target.
window you want
TIP: A pinned window cannot be a target—you must
first unpin the window.
For example:
68
Chapter 5 - Using Station and custom displays
Task Action
windows configured.
l “sysAlarmSummary” calls up the display in the current
target window because no window parameter is specified.
More than one parameter may already be appended to the
display name/URL.; if so, the order of the parameters does
not affect the navigation result. For example,
displayname?param1=99¶m2=100&window=3.
69
Chapter 5 - Using Station and custom displays
70
CHAPTER
6 USING POINTS
This section describes points and various methods you can use to control
points.
About points
A point is a collection of information about a particular part of your system. For
example, a point representing a motor would include:
n An ID, also known as a tag name , which uniquely identifies the motor.
n A description , such as 'Fan cool unit 1'.
n A full name . The full name indicates a point's location within the Facility
Model, for example, /Facility/Honeywell/Grnd
Floor/TempGuage1 indicates that the point named TempGuage1 is
assigned to the location named Grnd Floor which is itself assigned to
the location name Honeywell.
n The current state (off or on).
n The desired state . This is applicable if you are allowed to control the point.
For example, if current state of the motor is 'On' you can change the real
state of the motor to 'Off' using the display.
71
Chapter 6 - Using points
About locations
Locations can represent entities such as fixed plant equipment, materials, and
buildings. The Facility Model provides a hierarchical structure that resembles
your organization.
The points in your system belong to locations. For example, you might have a
location that represents a furnace in your plant. All the points associated with
the physical furnace (analog points measuring the temperature, status points
controlling valves or pumps associated with the furnace) might belong to the
location that represents the furnace.
The part of the system for which you are responsible can be controlled by
assigned locations to you or the Station you are using. In addition, where
locations have been assigned to you, the tasks that you can perform can also
be restricted. For example, you may have View access to a location in your
system. In this case, you can only view items associated with the location, you
cannot make any changes, such as acknowledging alarms or changing a
point parameter.
Controlling points
You control your system by controlling points. For example, to turn off a
motor, you would set the appropriate parameter of the associated point to
“Off”.
TIP: If your system uses maps as a licensed option, you can control
your plant and equipment by using the Smart Objects. For information
on controlling plant and equipment using Smart Objects, see
"Monitoring and controlling plant and equipment from maps" on
page 43.
72
Chapter 6 - Using points
To control
a point Do this
from
73
Chapter 6 - Using points
Solution
1. Navigate to the Point Detail display for fan_unit2.
2. If control mode (MD) of the point is set to AUTO , change it to MAN.
3. Change OP to Off.
TIP: If the fan has failed, you can disable the related point by
clearing the Scanning and Control Enabled check box to prevent
misleading error messages being generated.
Solution
1. In Station, select the alphanumeric that shows the SP. (The object is
editable if the value appears in 'inverse video' when you select it.)
Information about the point, including its ID, appears in the Message
Zone.
2. Change the value by either:
l Typing the new value and pressing ENTER.
l Clicking toolbar buttons. Clicking (Raise ) or (Lower ). Each time
you click the button the value increases/decreases by a small amount.
74
Chapter 6 - Using points
n Value, which shows the current status of the point, that is whether the
lights are on or off.
n Mode, which shows the control mode of the point.
A faceplate has been created for this point.
Solution
1. In Station, click an associated display object to call up the faceplate for
Level1SWLights.
2. Change Mode to Manual.
3. Change Value to On.
ATTENTION: You can only disable SCADA points. Not all point types
can be disabled in this manner.
To disable a point
1. In Station, select an editable display object associated with the point—for
example, an alphanumeric that shows the PV. (The object is editable if the
value appears in 'inverse video' when you select it.)
Information about the point, including its ID, appears in the Message
Zone.
2. Click (Enable/Disable ).
The point's parameters turn gray to indicate that the point is disabled.
75
Chapter 6 - Using points
The secondary signature must be different from the primary signature and
must be made by an individual with the appropriate security level.
76
Chapter 6 - Using points
If a single signature is needed, you must have the appropriate control level to
perform the task. A control level can be any number from 0 to 255. Only an
operator who has a control level that is equal to or higher than the point's
control level can control that point. When you attempt to make a change to a
point, the minimum control or security level required is shown in the Electronic
Signature dialog box. If a secondary signer is also required, the dialog box will
contain two tabs, one for each of the signers. The required security level of the
second signer is shown in the Secondary signature tab.
77
Chapter 6 - Using points
78
CHAPTER
79
Chapter 7 - Displaying detailed point information
If your system uses DSA or point servers, information on some points you
may need to access is stored on remote computers. As a result, the first time
you call up the point's details you may need to type the full point ID. After this,
using part of the point ID produces a matching point.
80
Chapter 7 - Displaying detailed point information
TIP: If no recent events are listed, you should check that the browser
on the Station client is configured correctly. For details refer to the topic
“Cannot call up recent events” in the Diagnostics Guide.
About faceplates
Some points can be controlled from a faceplate. A faceplate is a specialized
type of popup window that shows critical information about the point to which
the object is linked. In most cases, a faceplate is similar to the left-hand portion
of the matching point detail display.
Each Station can have a total of four faceplates, or popup windows, or a
combination of both, visible at the same time. For example, if there are
already three faceplates and one popup window visible, when you call up
another faceplate the oldest faceplate (or popup) is replaced.
When you first call up faceplates, they are positioned in the bottom right-hand
corner of your monitor. You can move the faceplates by clicking and dragging
the faceplate to another position. Next time you call up the faceplate, the last
position is remembered.
81
Chapter 7 - Displaying detailed point information
If you want faceplates to remain visible while you navigate to other displays,
click the pushpin . Faceplates that have been 'pushpinned' are not replaced
if you call up more faceplates.
You can tell if a display object on a custom display has a faceplate associated
with it because the mouse pointer changes to a hand when you move the
mouse over the object. If you click the display object the faceplate for that
point opens. You can then change parameter values from the faceplate.
82
Chapter 7 - Displaying detailed point information
1. Click (Group ).
2. If required, you can display the group's trend by choosing the option from
the View As list.
83
Chapter 7 - Displaying detailed point information
n '*Door' will find all points that end with 'Door', such as 'Floor1MainDoor',
'Level2SideDoor' and so on.
n 'Floor?MainDoor' will find points 'Floor1MainDoor', 'Floor2MainDoor' and
so on.
84
Chapter 7 - Displaying detailed point information
Button Description
Individual scales in EU
Individual scales in %
The range displayed on the Y-axis is the same for all plots.
Plot selector
85
Chapter 7 - Displaying detailed point information
Button Description
Indicates the current view is the trend with the event pane.
Show legend
Configure trend
Save trend
Saves any changes you have made to the trend. After you
save, the changes are made available to any other
operators viewing the trend.
86
Chapter 7 - Displaying detailed point information
Button Description
Zoom in
Zoom out
Some trends operate in a different manner to the default trend; these are the
X-Y trends. You can modify these trends by changing the:
n Period
n History offset
n Scale to use engineering units or percentage
n Points
87
Chapter 7 - Displaying detailed point information
88
Chapter 7 - Displaying detailed point information
Scale options
The following table describes all the scale options available for a standard
trend.
Scale
Description
option
Individual You specify the maximum and minimum value that will be shown on
scales in the trend for each plot individually. Values that fall outside this scale
EU are not visible in the trend.
Individual You specify the maximum and minimum value that will be shown on
scales in % the trend for each plot individually. Values that fall outside this scale
are not visible in the trend.
Single scale One scale is used for all points in the trend. You specify the maximum
for all plots and minimum value that will be shown on the trend. Values that fall
outside this scale are not visible in the trend.
Auto scale Adjusts the selected plot so that it is centered vertically in the chart and
current plot scaled such that the plot uses most of the vertical chart space.
Auto scale Adjusts all plots that are currently visible so that they are centered
all plots vertically in the chart and scaled such that each plot uses most of the
vertical chart space.
Scale to The scale is set so that it correlates with the maximum and minimum
point point parameter range of all points in the trend and is shown in
ranges in engineering units.
EU
Scale to The scale is set so that it correlates with the maximum and minimum
point point parameter range of all points in the trend and is shown in
ranges in percentage terms. The minimum point parameter value is always 0%
% and the maximum point parameter value is always 100%.
89
Chapter 7 - Displaying detailed point information
Scale
Description
option
Revert to The scale options is restored to what was last saved for the trend. Any
saved changes to the scale that were not saved are removed.
ranges
n Starts at a specific date and time by showing the time selector on the left.
n Ends at a specific date and time, by showing the time selector on the right.
90
Chapter 7 - Displaying detailed point information
n Starts and ends at a specific date and time by showing the time selector
on the left and right.
n Is centered around a specific date and time by showing the time selector
at the center.
To zoom in on a trend
1. Move the pointer to, for example, the top-left of the area of interest, and
then drag the pointer diagonally down to the bottom-right.
As you drag, a rectangle shows the area you are selecting.
2. Release the mouse button when the rectangle encloses the area of
interest—the trend now zooms in on this area.
3. To zoom back out to the trend's normal scale, click the button at the
bottom-right of the trend.
TIP: You can also use the Zoom in button to zoom in on a trend.
The zoom button centers the trend around the reference line. If
there is no reference line, the trend is zoomed around the center of
the chart.
91
Chapter 7 - Displaying detailed point information
92
CHAPTER
8 RESPONDING TO ALARMS
TIP:
l The Alarm box in the Status Bar flashes red if there are any
unacknowledged alarms.
l The System box in the Status Bar flashes cyan if there are any
unacknowledged system alarms.
Viewing alarms
You can use the Alarms summary to view a list of the alarms in your system. If
your system uses maps, any new alarms raised by the system are displayed
as an alarm indicator on the relevant Smart Object. The alarm indicator
continues to pulse until the alarm is acknowledged.
The alarm icon on the map toolbar shows the total number of active,
unacknowledged alarms in the system. The indicator animates up and down if
there is at least one alarm in the system that has not been acknowledged.
93
Chapter 8 - Responding to alarms
For a visual description of alarm indicator colors and priorities, click Help >
Alarms and incidents on the map toolbar.
To view alarms
1. Do one of the following:
Client Action
94
Chapter 8 - Responding to alarms
To display the Details pane, click (Show details pane) on the Alarm
Summary toolbar.
95
Chapter 8 - Responding to alarms
TIP:
l The alarm colors described below are the default alarm colors.
96
Chapter 8 - Responding to alarms
97
Chapter 8 - Responding to alarms
Ghost alarm.
Date & Time The time and date at which the alarm was
received.
l Urgent
l High
l Low
If a number follows the letter, it represents
the relative priority within the general
priority. For example, Urgent alarms can
vary from U15 (most urgent) to U00 (least
urgent).
98
Chapter 8 - Responding to alarms
By default, the Alarm Summary and the System Status display show all
alarms with the newest alarm at the top. You can change this by applying
filters and sorting the summary.
Filtering allows you to show alarms that match the filter criteria and hide
alarms that do not match the filter criteria. For example, you can filter to show
alarms:
99
Chapter 8 - Responding to alarms
You can apply more than one filter at a time and you can also filter and sort at
the same time. When the Alarm Summary is filtered or sorted, the column by
which you are filtering or sorting is highlighted.
n A particular location
n An Alarm Group
n A particular piece of equipment
Using the Location pane, you can easily see the highest priority alarm(s) as
well as the number of alarms for each item in the hierarchical trees.
l Click the Location list and click the push pin to dock the
Location pane .
100
Chapter 8 - Responding to alarms
TIP: When you change the current view by applying a column filter or
clearing all filters, an asterisk is displayed beside the name of the view
currently selected for the Alarm Summary to indicate that the current
view has been modified.
Prerequisites
n You have called up the Alarm Summary.
101
Chapter 8 - Responding to alarms
l A check mark is shown beside the filter option you have chosen.
l The alarms included in the Alarm Summary change to show only those
alarms that match the filter criteria.
TIP: You can filter on multiple columns at the same time. For
example, you can filter the Alarm Summary to show only urgent
alarms that occurred today by choosing Urgent as the filter for the
Priority column, and then choosing Today as the filter for the Date &
Time column.
Note that you can apply multiple filters in some columns. For
example, when filtering by priority, you can click the Urgent filter
and then subsequently click the High filter to have both filters
applied.
TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating that the view has been modified.
102
Chapter 8 - Responding to alarms
TIP: Note that the Priority column shows the priority in the format
H, U, or L, and shows the sub-priority in the form of a number from
00 to 15 where 00 is the lowest and 15 the highest sub-priority.
Solution
1. Call up the Alarm Summary display.
2. Click the Priority column and select both Urgent and High .
3. Click the “alarm state icon” column and select Unacknowledged .
The Alarm Summary changes to show only unacknowledged alarms of
urgent or high priority.
Solution
1. Call up the Alarm Summary display.
2. Click the Value column to display the “filter and sort” list.
3. Select Sort Ascending .
The Alarm Summary changes to list alarms in ascending order according
to the value.
103
Chapter 8 - Responding to alarms
To apply a view
1. Click the View list.
A list of view options is displayed in a drop-down list.
2. Click the view that you want to use for the Alarm Summary.
The alarms listed in the Alarm Summary display change to show only
those alarms that meet the criteria for the view you chose. For example, if
you chose the (unacknowledged alarms) view, the Alarm Summary now
only shows unacknowledged alarms.
104
Chapter 8 - Responding to alarms
105
Chapter 8 - Responding to alarms
the Column Organizer and then click the Comments Added check box
and click OK.
2. Click the Comments Added column and choose With Comments Added .
The Alarm Summary is filtered to show only alarms with comments
added.
3. Click the alarm that has the extended message you want to view.
Acknowledging alarms
In most systems, Station produces an alarm tone when a new alarm occurs.
(Your system may be configured not to do this.)
There are several ways of silencing or acknowledging alarms:
106
Chapter 8 - Responding to alarms
To Do this
Acknowledge a Either:
particular
alarm on the
Alarm l Select the alarm and click the (Alarm Acknowledge) toolbar
Summary button.
l Right-click the alarm then select Acknowledge.
Acknowledge
all alarms on a Call up the faceplate for the point and click the (Alarm
particular Acknowledge) button on the faceplate.
point
Shelve an To shelve an alarm, right-click the alarm and choose either Shelve
alarm on the Alarm or Quick Shelve. Alternatively, you can use the Shelve Alarm and
Alarm Quick Shelve buttons at the bottom of the Alarm Summary.
Summary Depending on how your system has been configured, quick
shelving may not be enabled.
Unshelve an Select the (shelved alarms) view, select the alarm you want to
alarm on the unshelve and click the Unshelve Alarm button. The alarm disappears
Alarm from the (shelved alarms) view and, if it is still active, returns to the
Summary normal alarm views.
107
Chapter 8 - Responding to alarms
Shelving an alarm
Shelving an alarm allows you to temporarily hide a distracting/nuisance alarm.
When you shelve an alarm it is silenced, acknowledged, and removed from
normal view.
However, alarm messages, if configured, are still shown on the Message
Summary. Also, further instances of the same alarm are combined with the
existing shelved alarm, which continues to remain shelved.
108
Chapter 8 - Responding to alarms
To unshelve an alarm
1. Call up the Alarm Summary.
2. Select the (shelved alarms) view.
3. Select the alarm you want to unshelve.
4. Click the Unshelve Alarm button.
Overview
There may be times when distracting or nuisance alarms are cluttering your
display and you choose to shelve an alarm for a specified period. If that alarm
returns to normal at any time during the shelving period, the alarm is
unshelved. New alarms for the same point would appear on the Alarm
Summary. This is usual behavior for alarm shelving.
However, sometimes a point will trip an alarm and return to normal multiple
times in a short period. In the above scenario, you would have to repeat the
steps to shelve the alarm each time it appears, causing extra and
unnecessary workload. In these circumstances, you can choose to require
that the alarm must return to normal for a minimum amount of time before it is
unshelved. This is known as configuring an alarm unshelving delay.
109
Chapter 8 - Responding to alarms
110
Chapter 8 - Responding to alarms
Again the alarm returns to normal for 5 seconds, and again it remains
unshelved.
Only after the alarm returns to normal for the third time does it meet the 10
second delay and is unshelved.
111
Chapter 8 - Responding to alarms
112
Chapter 8 - Responding to alarms
To acknowledge an alarm
1. Acknowledge the alarm—see "Acknowledging alarms" on page 106.
The Alarm Instruction display appears, which contains instructions for
dealing with that alarm.
The Alarm Response display appears, which lists a number of standard
responses.
2. Click the Acknowledge button to complete the acknowledgment task.
3. Follow the procedures listed on the Alarm Instruction display.
4. After you have carried out the instructions, click the Respond button.
The Alarm Response display appears, which lists a number of standard
responses.
5. Click the Accept Response button that best describes what you actually
did. Alternatively, if you responded in a non-standard manner, enter an
appropriate note in the Operator Definable Response field, and then click
its Accept Response button. (It is good practice to keep the note short
because only the first 30 characters appear in the Event Summary.)
113
Chapter 8 - Responding to alarms
TIP: If you want the Alarm Banner to always be visible, click the
(Push Pin), otherwise it will close when you call up another display.
114
Chapter 8 - Responding to alarms
115
Chapter 8 - Responding to alarms
116
CHAPTER
9 RESPONDING TO SYSTEM
ALARMS
The System Status display is similar to the Alarm Summary; however, the
System Status displays show system alarms for system components only.
You can use the System Status display to:
117
Chapter 9 - Responding to system alarms
You can show or hide all of the panes, except for the Results pane. The
Results pane is always visible.
Location pane
The Location pane on the System Status displays has a hierarchical tree
which shows all of the EBI related components such as servers, Stations,
channels, and controllers.
You can expand and collapse the trees as required to navigate to the
component to check its status or to view alarms associated with the
component. If you double-click a component, the status detail display for that
component is opened.
The Location pane can give you the following status information:
118
Chapter 9 - Responding to system alarms
Status pane
The Status pane is similar to a faceplate and provides graphical information
about the status of the item you have selected in the Location pane so that you
do not have to navigate away from the System Status display and lose view of
other system alarms. The status pane shows a subset of the information that
is contained in the detail display for the item you have selected in the Location
pane. The exact information shown in the Status pane is different for each
type of component; the type of information available in the status pane can be:
n Alarm state of any alarms raised on the component (as well as an alarm
acknowledge button)
n The current state of the component
n Connection status
The Status pane is empty if you do not have an item selected in the Location
pane.
119
Chapter 9 - Responding to system alarms
Results pane
The Results pane shows any alarms for the component that you have
selected in the Location pane. It is similar to the Alarm Summary. You can
acknowledge alarms from the Results pane in the same way you
acknowledge alarms in the Alarm Summary.
Details pane
The Details pane shows more details of the alarm you have selected in the
summary. If no alarm is selected the Details pane is empty.
120
Chapter 9 - Responding to system alarms
Icon Description
Failed
Something has gone wrong with the component and it has stopped
working. Further investigation is required to find out why the component
has failed.
Marginal
OK
Disabled
The component is either not configured, not yet enabled, or has been
switched off.
Unknown
None
121
Chapter 9 - Responding to system alarms
122
CHAPTER
An incident is any event that could result in the loss of—or disruption to—facility
operations, services, or functions. An incident can range from a visitor slipping
on a wet floor to a major crisis involving multiple response teams.
Incident Workflow enables security operators and facility management
operators to respond to incidents using predefined workflow steps that are
tailored to the efficient handling of different types of incidents. Incidents can be
created manually by an operator or automatically by the system.
When all mandatory steps in the incident workflow have been performed, the
incident is complete and is closed by the operator.
1. Incident creation
2. Incident ownership
3. Incident response
4. Incident analysis
Incident creation
Incidents can be created in the system either manually by an operator, or
automatically by the system in response to an alarm or event:
123
Chapter 10 - Working with incidents
Incident ownership
An operator must take ownership of an incident before they can perform any
of the steps in the incident workflow. Taking ownership of an incident prevents
other operators from performing steps in that incident’s workflow; however,
non-owners can add comments to steps in the workflow if required. An
operator can take over ownership from a different operator if they have
identical or higher permissions. An operator can relinquish ownership of an
incident at any time so that a different operator can work on it.
TIP: If you are not the owner of an incident, you can view incident
details such as incident steps, authorized step actions, and the Close
incident button, but these features are disabled.
Incident response
Responding to an incident involves performing the steps in the incident
workflow; the steps can be performed in any order. Some steps in the
workflow might be mandatory, and some might be optional. An incident
cannot be completed and closed until all mandatory steps have been
completed; the Close incident button is disabled until all mandatory steps are
performed.
You may need to perform some workflow steps manually, while other
workflow steps may be performed by the system when you authorize the step.
For example, locking or unlocking a door—or directing a camera towards a
specific location—are both actions the system can perform to reduce the time it
takes to complete and close an incident. These steps are known as
authorized steps because they require the operator to authorize their
execution; automated steps are performed by the system automatically
without any operator authorization.
TIP: To perform an authorized step, you must have write access to the
location to which the incident is assigned.
124
Chapter 10 - Working with incidents
Incident analysis
Personnel with the appropriate privileges can generate incident reports to
assist with incident analysis. Incident Workflow can generate the following
types of reports:
Viewing incidents
If your operator interface includes maps, you have an at-a-glance visibility of
the open incidents in your system and their location; open incidents are
incidents that have workflow steps that have not been performed. If you do
not have maps, use the Incidents summary for an overview of the open
incidents in your system.
The incident count on the incident icon on the map toolbar shows the total
number of open incidents in the system.
Because new incidents do not have an owner, the incident indicator animates
up and down for better visibility. The priority shown by the animated incident
count indicates the priority of the highest incident that is unowned.
125
Chapter 10 - Working with incidents
Incidents are removed from view when they are closed and completed. You
can access closed incidents by running a report.
To view incidents
1. To display the Incidents summary, click the Incidents icon ( ) on the
menu bar or map toolbar. Open an incident item to view the incident
details.
Item Description
126
Chapter 10 - Working with incidents
Item Description
l — Urgent
l — High
l — Low
The icon pulses if there is at least one incident in the system that
does not have an owner.
If the incident has been generated on a Smart Object, you can click
the navigation arrow ( ) to pan and zoom the map to the incident
location.
127
Chapter 10 - Working with incidents
Creating incidents
When an incident is reported, you manually enter information about the
incident into the system.
To create incidents
1. On the map workspace toolbar, tap or click the Incidents icon ( ).
The Incidents pane is displayed.
2. Click the add (+) icon at the top of the pane.
The Select Incident Type dialog box appears.
3. Click the type of incident you want to create; for example, Asset
Damage.
TIP: To search for a specific type of incident, type the first letter of
the incident type in the Search Incident Types box, then select the
incident type you want.
The Create New Incident dialog box appears and the default priority
selection (Low) is highlighted.
4. Select a Priority (if you want to use a different priority than the default).
5. Type a Description and select a Location from the list.
TIP:
l Providing a description is mandatory. The system displays a
6. Click Create .
The incident item is displayed in the list. (In Station, the incident also
appears on the Incidents summary page.)
128
Chapter 10 - Working with incidents
Task Description
129
Chapter 10 - Working with incidents
Task Description
Responding to incidents
Responding to an incident involves completing steps within an incident
workflow. The steps in a workflow are either mandatory or optional. Workflow
steps can be completed in any order. All mandatory steps in a workflow must
be completed before the incident can be completed and closed. Closed
incidents are removed from the Incidents summary and the Incidents pane.
You can only respond to incidents that you own. Operators who are non-
owners of an incident can add comments to steps in the incident workflow, but
cannot execute steps or mark them as complete. Only the owner can
complete and close an incident.
Prerequisites
You have claimed ownership of the incident.
To respond to incidents
1. In Station, click the Incident icon ( ) in the toolbar, or the Incidents
indicator on the status bar.
TIP: You can also click the Incidents icon in the map workspace
toolbar or (for system-generated incidents) click the incident in an
open Smart Object.
130
Chapter 10 - Working with incidents
4. Perform the actions specified in the steps. You can complete the steps in
any order. The workflow step icons are described in the table below.
Option Description
131
Chapter 10 - Working with incidents
Option Description
As you complete steps, the system logs user name, action, and time.
5. Click the Comment icon and add any comments or outcomes you want to
record for the step. Any spelling mistakes are highlighted
6. Click the circle for the step to indicate the step is complete.
132
Chapter 10 - Working with incidents
TIP: If you have failed to perform any steps that are mandatory, the
Close button is disabled. If you want to cancel the actions you have
performed on the incident, click Cancel.
TIP: Although only the incident’s owner can complete workflow steps
for that incident, other operators can add comments to workflow steps
and review incident activity performed by other operators. The ability to
capture comments and review incident activity helps to improve
awareness of incident response techniques on site.
133
Chapter 10 - Working with incidents
Canceling incidents
In certain situations—for example, if different operators have created incidents
for the same event, or if the system raises multiple alarms that result in
multiple incidents—you can cancel unwanted incidents.
To cancel incidents
1. On the Incidents summary or Incidents pane, tap or click the incident you
want to remove.
2. If required, assume ownership from the current owner, and then click
Respond Now.
3. Select Remove incident.
4. In the Comments text box, type the reason the incident is being removed.
5. Click Complete incident.
The incident is removed from the system.
134
CHAPTER
11 RESPONDING TO EVENTS
An event is any significant change in the system, and includes alarms and
operator actions.
TIP: You can also call up the Event Summary by clicking Events on
the System Menu.
Events are listed in chronological order, starting with the most recent
event. The display is automatically updated, which means that each new
event appears at the top of the list.
2. If you want stop new events from being added to the display—this makes it
easier to read the events if events are occurring in rapid succession—
change the Date & Time filters from All Recent Events - Live to Today
(snapshot) .
If the point ID or Description has been truncated, move your mouse
pointer over the point ID or description to display the full point ID or
description.
135
Chapter 11 - Responding to events
TIP: To add columns other than these to the current display, click the
Show column organizer icon to display the full list of available columns,
and then select those you would like included.
Column Description
Date & Time The time and date at which the event was received.
Location The tag name of the location to which the point or device belongs.
l Urgent
l High
l Low
l Journal
136
Chapter 11 - Responding to events
Column Description
Units The unit that the value represents, for example ml/s.
n A particular location.
n Report requests.
n Operator activity on or within a specific location.
Using the Location pane, you can navigate the hierarchical trees to see the
associated event(s) for each location.
137
Chapter 11 - Responding to events
138
Chapter 11 - Responding to events
TIP: When viewing the live events from the temporary event file (all
recent events with live updates) you can only filter on the Location,
Priority, and Category columns. All other filter menus are disabled.
If you want to filter on the other columns you need to change the
Date & Time filter to something other than (all recent events - live).
TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating it that the view has been modified.
Example
You want to filter the Event Summary so that you see
events that occurred yesterday.
139
Chapter 11 - Responding to events
n (all recent events with live updates) —(default view) shows events as they
are occurring.
For performance reasons there is limited filtering capabilities in the default
view, and you cannot sort the default view.
n (all today's events snapshot) —shows all events that occurred today up
until the view was applied.
n (all recent access events with live updates) —shows all access-related
events as they are occurring.
Other views may have been configured for your system. Ask your supervisor
or an experienced colleague about other views and what information they
display in the Events Summary.
TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating it that the view has been modified.
140
Chapter 11 - Responding to events
Solution
1. Call up the Event Summary display.
2. Click the Source column.
3. Select Sort Ascending .
The Event Summary changes to list events in ascending order according to
the point ID.
141
Chapter 11 - Responding to events
142
Chapter 11 - Responding to events
l Click the Generate Event button on the Event Summary display, then
type your comment into the message zone.
143
Chapter 11 - Responding to events
Status Description
Event Shows the current status of events collection and archiving. For a
Archiving description of each status see the table below.
status
Last archived The last date and time that an archive ran.
Next archive The date and time of the next schedule archive. Calculated using the
scheduled for last archive date and time and the configured schedule.
Overload Events are occurring so frequently that Event Archiving is not able
to capture them in a timely way. If you see this status, refer the
problem to your supervisor.
Full Disk There is not enough disk space to continue events collection.
Events collection is stopped until there is sufficient disk space
available.
144
Chapter 11 - Responding to events
Copy Mode This is only applicable to a redundant system after recovery from
failure. Event Archiving is disabled while the primary extended
events database is being copied off-line to the backup server.
Archiving events
Use the following procedure if:
145
Chapter 11 - Responding to events
3. Click Open .
146
CHAPTER
About cardholders
Four types of cardholders can be added to the cardholder database:
n Employee
n Visitor
n Vehicle
n External Personnel
An External Personnel cardholder is similar to an Employee but is associated
with an external company; for example, external consultants or contractors,
cleaning staff, or security personnel from external companies. Typically, they
need to access the facility on a regular basis. They are treated independently
by the system to a Visitor who only needs access once, or occasionally. Both
types of cardholders might be issued with a card, however a visitor's card is
generally returned at the end of the visit whereas an External Personnel
cardholder's card is retained for the duration of their contract.
Visitor access is handled by Reception Manager. For more information about
using Reception Manager, see the Reception Management Module Guide or
the Reception Web Module Guide.
The Vehicle cardholder type can be used if you want to be able to assign
cards and access to particular vehicles. For example, if you have a fleet of
vehicles used by multiple employees, and you wanted to restrict access to a
parking area, you could assign access cards to the vehicles. (If however you
only want to record the vehicle details of your employees and external
personnel without specific vehicle access control requirements, you could use
the standard properties for employees and external personnel.)
When you add a cardholder, you can enter many details, including:
147
Chapter 12 - Managing cardholders and cards
148
Chapter 12 - Managing cardholders and cards
Preferred The cardholder's preferred name, usually the name commonly used
Name by work colleagues and friends.
149
Chapter 12 - Managing cardholders and cards
Property Description
Employee The number allocated to the cardholder by the company for which
Number the cardholder works.
Vehicle 1 The license number of the vehicle normally used by the cardholder.
License #
Active Cards Shows active card(s) that have been issued to the cardholder.
Last Access Shows the most recent date and time when the cardholder
Date/Time presented a card to a card reader (regardless of whether the card
reader allowed/denied access).
Last Zone Shows the zone which the cardholder most recently gained access.
Entered
Last Door Shows the name of the door/card reader where the cardholder
Accessed most recently presented a card (regardless of whether the card
reader allowed/denied access).
150
Chapter 12 - Managing cardholders and cards
Property Description
Last Access Shows the result of the most recent attempt to gain access.
Message
If access was granted, the message is authorized or granted.
If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.
Property Description
Expiry Date The date/time the cardholder's access rights expire. The
cardholder's card(s) also expires at this time.
Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.
Associated The associated display for the cardholder. You can call up this
Page display by clicking the Associated Display button on Station's toolbar
when an alarm is generated for this cardholder.
The alarm priority used for a cardholder traced alarm. This priority
will only be used for the cardholder traced alarm if the combined
priority/subpriority is higher than that configured for the reader at
which the card is presented.
151
Chapter 12 - Managing cardholders and cards
Property Description
Default Layout The default card layout file for the front of a photo identification
(front) card for all cards belonging to this cardholder.
Default Layout The default card layout file for the back of a photo identification
(back) card for all cards belonging to this cardholder.
Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority
configured on the cardholder if they are higher than that
configured for the reader at which the card is presented.
Web Reception The EBI Operator profile used to determine permissions when this
Operator employee uses Web Reception.
Web Reception The name of the Web Reception Station to be assigned to the
Station employee when they use Web Reception.
If your system uses Reception Manager, you must select this check
box so that this employee can be found using Reception Manager.
License Plate The Licence Plate list contains the vehicles configured for the
current site. Select one to associate it to the employee cardholder.
The category of the recipient of the card. Select Normal or Shift from
the Category list.
152
Chapter 12 - Managing cardholders and cards
Property Description
Enroll using Specifies which hand reader you want to use to enroll the
cardholder.
Use Special If selected, indicates that the cardholder cannot use the hand
Enrollment reader. Instead, access is granted using a card or a PIN.
Authority Level The authority level you want to assign to the cardholder. This
determines the functions a cardholder can perform at the hand
reader. The levels are:
l 0 - No Authority
l 1 - Service Hand Reader
l 2 - Setup Hand Reader
l 3 - Manage Users
l 4 - Enroll and Remove Users
l 5 - Manage Security
Specify Reject Specifies how closely a cardholder hand reading must match the
Tolerance hand template when the cardholder presents their hand at the
reader.
153
Chapter 12 - Managing cardholders and cards
Button Description
Return card Click this button to return the selected card to an Unassigned state.
Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
Table 12-1: Card detail properties
Property Description
Card state The card's state: Active, Lost, Stolen, Inactive, or AutoCommence.
(The card must be Active to grant access.)
154
Chapter 12 - Managing cardholders and cards
Property Description
Card layout (front) The layout used on the front of the card when it is printed.
Card layout (back) The layout used on the back of the card when it is printed.
Lack of use expiry If selected, the card does not expire if it has not been used.
exempt
Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
PIN Code The PIN code used on key pad readers. It is displayed as ****.
Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.
Last printed Shows the date on which the card was last printed.
Number printed Shows the number of times the card has been printed.
Category The category of the recipient of the card. Select Normal or Shift from
the Category list.
155
Chapter 12 - Managing cardholders and cards
Property Description
Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).
Transit allowed In the Transit Allowed area, you can configure one of the following
options.
One Shot: The cardholder can effect a single transit per day at any
terminal on the system. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if
the TemaKey is configured to control the number of transits.
1 In/1 Out: The cardholder can effect a single entry transit and a
single exit transit per day. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if
the TemaKey is configured to control the number of transits.
Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.
Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
Length of stay Enables/disables the control on the length of a user's stay in a zone.
156
Chapter 12 - Managing cardholders and cards
Property Description
disabled
Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.
Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.
Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.
Long Access Keeps the door open for longer than usual without an alarm being
raised.
157
Chapter 12 - Managing cardholders and cards
Property Description
first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.
Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.
Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.
Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:
l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:
l The Keypad enabled and the Extended door time by keypad options on
the access point Door Definition tab for Star II controllers.
158
Chapter 12 - Managing cardholders and cards
Property Description
2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.
Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.
Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.
Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.
Card Class Defines this card as valid member of card class A within the MicroLPM
A
159
Chapter 12 - Managing cardholders and cards
Property Description
Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.
Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.
Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness This option applies only to fault tolerant controllers.
Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault tolerant controllers.
160
Chapter 12 - Managing cardholders and cards
Property Description
Long Access Keeps the door open for longer than usual and extends
the alarm 'shunt' period. This is often required for
cardholders who need a longer time to get through the
door, such as someone using a wheelchair.
Allow Access on Loss of Select this check box if you want cardholders to be
Comms granted access even if communication between the
server and the controller is lost.
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.
Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.
Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.
Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.
161
Chapter 12 - Managing cardholders and cards
Property Description
User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.
TIP: If no recent events are listed, you should check that the browser
on the Station client is configured correctly. For details refer to the topic
“Cannot call up recent events” in the Diagnostics Guide.
162
Chapter 12 - Managing cardholders and cards
5. You can either issue a new card by typing a card number in the Card
Number box, or you can select an unissued card from the list to issue it to
the employee.
6. If you have IdentIPoint card readers, complete the following steps:
a. Click the Issue and enroll a card option button.
b. From the Reader list, select the reader that you are using for
enrollment.
c. From the Enrollment Type list, select the type of credentials
cardholders need to use at the card reader.
7. Click Add .
This calls up the Cardholder display and selects the Main tab.
8. If you have IdentIPoint card readers, complete the following steps:
a. If the enrollment type includes a PIN, instruct the cardholder to enter
their PIN.
The cardholder is required to enter their PIN a second time.
b. If the enrollment type includes a fingerprint, instruct the cardholder to
place their finger on the fingerprint pad.
The cardholder is required to present their finger two more times.
c. Instruct the cardholder to present their card at the reader.
9. Fill in the remaining properties as appropriate.
Note that properties marked with an asterisk (*) are mandatory.
10. When you have completed the details on the Main tab, click the other tabs
and fill in the other cardholder details.
11. Click the Access Rights tab.
12. Select an access right in the Available Access Rights list and then click
Assign .
The access right moves to the Assigned Access Rights list.
Note the details of the selected rights are displayed in the Details section.
13. If you use timed access rights, click the access right in the Assigned
access rights list and set a Commencement time and an Expiry time .
If you specify a commencement and expiry time, the access right
assignment is valid only for that period of time. Outside of this time period,
the access right remains assigned to the cardholder, but the cardholder
does not have access to the zones defined in the access right.
163
Chapter 12 - Managing cardholders and cards
Vehicle with Select this check box if the vehicle has a trailer attached.
Trailer
Vehicle Type The type of vehicle, for example Internal, External (to the company)
or Private.
Active Cards Shows active card(s) that have been issued to the vehicle
cardholder.
Last Access Shows the most recent date and time when the cardholder
Date/Time presented a card to a card reader (regardless of whether the card
reader allowed/denied access).
Last Zone Shows the zone which the cardholder most recently gained access.
Entered
Last Door Shows the name of the door/card reader where the cardholder
Accessed most recently presented a card (regardless of whether the card
reader allowed/denied access).
164
Chapter 12 - Managing cardholders and cards
Property Description
Last Access Shows the result of the most recent attempt to gain access.
Message If access was granted, the message is authorized or granted.
If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.
Property Description
Commence The commencement date/time for the cardholder. The default is the
Date date the cardholder was added.
Expiry Date The date/time the cardholder's access rights expire. The the
cardholder's card(s) also expires at this time.
If you do not specify a date, the default expiry date is used.
Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.
Associated The associated display for the cardholder. You can call up this display
Page by clicking the Associated Display button on Station's toolbar when an
alarm is generated for this cardholder.
165
Chapter 12 - Managing cardholders and cards
Property Description
Default The default card layout file for the front of a photo identification card
Layout for all cards belonging to this cardholder.
(front)
Default The default card layout file for the back of a photo identification card
Layout (back) for all cards belonging to this cardholder.
Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority configured
on the cardholder if they are higher than that configured for the
reader at which the card is presented.
166
Chapter 12 - Managing cardholders and cards
Button Description
Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
Table 12-3: Card detail properties
Property Description
Card state The card's state: Active, Lost, Stolen, Inactive, or AutoCommence.
(The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
enabled for your system.)
Card layout (front) The layout used on the front of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.
Card layout (back) The layout used on the back of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.
167
Chapter 12 - Managing cardholders and cards
Property Description
Lack of use expiry If selected, the card does not expire if it has not been used.
exempt
Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.
PIN Code The PIN code used on key pad readers. It is displayed as ****.
Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.
Last printed Shows the date on which the card was last printed.
Number printed Shows the number of times the card has been printed.
Property Description
Category The category of the recipient of the card. Select Normal or Shift from
the Category list.
Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).
Transit allowed In the Transit Allowed area, you can configure one of the following
options.
168
Chapter 12 - Managing cardholders and cards
Property Description
exit transit per day. This condition will remain in force for the cardholder
until the Reset command is executed. Applicable only if the TemaKey is
configured to control the number of transits.
Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.
Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.
Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled
Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.
169
Chapter 12 - Managing cardholders and cards
Property Description
control disabled, the cardholder will not be counted as present in the zone.
disabled
Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.
Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.
Long Access Keeps the door open for longer than usual without an alarm being
raised.
By default, the system will create a short name made up of the first
thirteen characters of the last name, followed by a blank, then the
first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.
Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.
Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
170
Chapter 12 - Managing cardholders and cards
Property Description
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.
Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:
l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:
l The Keypad enabled and the Extended door time by keypad options
on the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.
2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.
Cost Enables the cardholder to gain valid access even if they have
171
Chapter 12 - Managing cardholders and cards
Property Description
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.
Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.
Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.
Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.
Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.
172
Chapter 12 - Managing cardholders and cards
Property Description
time has not elapsed (reuse time must be configured in the controller).
This option applies only to fault tolerant controllers.
Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault-tolerant controllers.
Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault-tolerant controllers.
Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault-tolerant controllers.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.
Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of
173
Chapter 12 - Managing cardholders and cards
Property Description
Comms
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.
Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.
Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.
Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.
User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.
Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.
174
Chapter 12 - Managing cardholders and cards
175
Chapter 12 - Managing cardholders and cards
10. When you have completed the details on the Main tab, click the other tabs
and fill in the other cardholder details.
11. Click the Access Rights tab.
12. Select an access right in the Available Access Rights list and then click
Assign .
The access right moves to the Assigned Access Rights list.
Note the details of the selected rights are displayed in the Details section.
13. If you use timed access rights, click the access right in the Assigned
access rights list and set a Commencement time and an Expiry time .
If you specify a commencement and expiry time, the access right
assignment is valid only for that period of time. Outside of this time period,
the access right remains assigned to the cardholder, but the cardholder
does not have access to the zones defined in the access right.
14. Repeat steps 12 and 13 to assign more access rights.
15. When you have finished, click Save .
Preferred The cardholder's preferred name, usually the name commonly used
Name by work colleagues and friends.
Entering a preferred name enables you to search for the cardholder
176
Chapter 12 - Managing cardholders and cards
Property Description
Vehicle 1 The license number of the vehicle normally used by the cardholder.
License #
Active Cards Shows active card(s) that have been issued to the cardholder.
Last Access Shows the most recent date and time when the cardholder presented
Date/Time a card to a card reader (regardless of whether the card reader
allowed/denied access).
Last Zone Shows the zone which the cardholder most recently gained access.
Entered
Last Door Shows the name of the door/card reader where the cardholder most
Accessed recently presented a card (regardless of whether the card reader
allowed/denied access).
Last Access Shows the result of the most recent attempt to gain access.
Message If access was granted, the message is authorized or granted.
177
Chapter 12 - Managing cardholders and cards
Property Description
If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.
Property Description
Commence The commencement date/time for the cardholder. The default is the
Date date the cardholder was added.
Expiry Date The date/time the cardholder's access rights expire. The the
cardholder's card(s) also expires at this time.
If you do not specify a date, the default expiry date is used.
Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.
Associated The associated display for the cardholder. You can call up this display
Page by clicking the Associated Display button on Station's toolbar when an
alarm is generated for this cardholder.
178
Chapter 12 - Managing cardholders and cards
Property Description
Default The default card layout file for the front of a photo identification card
Layout for all cards belonging to this cardholder.
(front)
Default The default card layout file for the back of a photo identification card
Layout (back) for all cards belonging to this cardholder.
Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority configured
on the cardholder if they are higher than that configured for the
reader at which the card is presented.
Web The EBI Operator profile used to determine permissions when this
Reception employee uses Web Reception.
Operator
Visitable Identifies the employee as a contact person based in the building and
defined as "visitable" by external visitors. The contact person
represents an integral part of the data associated with the visit.
License Plate The Licence Plate list contains the vehicles configured for the current
site. Select one to associate it to the employee cardholder.
Category The category of the recipient of the card. Select Normal or Shift from
the Category list.
Account The Web Reception Account is the employee's personal account that
accesses the computer. This account will be used to access Web
Reception.
179
Chapter 12 - Managing cardholders and cards
Button Description
Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
180
Chapter 12 - Managing cardholders and cards
Property Description
Card state The card's state, either: Active, Lost, Stolen, Inactive, or
AutoCommence. (The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
enabled for your system.)
Card layout (front) The layout used on the front of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.
Card layout (back) The layout used on the back of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.
Lack of use expiry If selected, the card does not expire if it has not been used.
exempt
Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.
PIN Code The PIN code used on key pad readers. It is displayed as ****.
Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.
181
Chapter 12 - Managing cardholders and cards
Property Description
Last printed Shows the date on which the card was last printed.
Number printed Shows the number of times the card has been printed.
Property Description
Category The category of the recipient of the card. Select Normal or Shift from
the Category list.
Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).
Transit allowed In the Transit Allowed area, you can configure one of the following
options.
Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.
182
Chapter 12 - Managing cardholders and cards
Property Description
Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled
Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.
Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.
Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.
183
Chapter 12 - Managing cardholders and cards
Property Description
Long Access Keeps the door open for longer than usual without an alarm being
raised.
Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.
Property Description
Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.
Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:
l 1 = 10 minutes
l 2 = 20 minutes
l ...
184
Chapter 12 - Managing cardholders and cards
Property Description
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:
l The Keypad enabled and the Extended door time by keypad options
on the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.
2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.
Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.
Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.
185
Chapter 12 - Managing cardholders and cards
Property Description
Entry/Exit when using doors defined as Parking doors within the controller.
Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.
Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.
Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.
Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.
Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault tolerant controllers.
186
Chapter 12 - Managing cardholders and cards
Property Description
Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault tolerant controllers.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.
Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of
Comms
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.
187
Chapter 12 - Managing cardholders and cards
Property Description
Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.
Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.
Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.
User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.
Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.
188
Chapter 12 - Managing cardholders and cards
189
Chapter 12 - Managing cardholders and cards
To do a Quick search
1. In the Quick Search for text box (located in the Navigation Pane on the
left-hand side of the Station screen), type the cardholder's name or card
number and click Go (or press ENTER).
The cardholders/cards that meet your search criteria are listed in the
Navigation Pane.
TIP: The Quick Search for text box can be accessed from all
Cardholder Management Add displays, such as, Add Employees.
To do a basic search
1. Choose Configure > Cardholder Management > Search to call up the
Basic search display.
2. From the Category list, select the category you want to search.
3. Type your search criteria and click Search .
To do an Advanced search
1. Choose Configure > Cardholder Management > Search to call up the
Basic search display.
2. Click Advanced Search so that the advanced search fields are visible.
3. In the Category list, click the category required, for example, Employee .
4. Enter your search criteria.
190
Chapter 12 - Managing cardholders and cards
5. Click Search .
The cardholders/cards that match your search criteria appear in the
Navigation Pane on the left.
6. Click the appropriate card/cardholder to see the details.
Search
Description
method
Simple Searches all types of cardholders and cards based on the search
criteria of name or card number.
search
or F11
Quick Searches all types of cardholders and cards based on the search
Search criteria of name or card number.
Basic You can select the category that is searched based on the search
search criteria of name or card number
Advanced You can select the type of cardholder and specify a wider range of
search search criteria, such as the cardholder's phone number and vehicle
license number
When entering names or numbers, you do not have to enter every character.
You can type the first part of the name. For example, if you type Smi, you will
find cardholders called 'Smith' and 'Smithers'. You can also use a wildcard
character (*). For example, if you type s*th you will find all employees starting
with 's' and ending with 'th'.
When you have performed your search, the cardholders/cards that match
your search criteria are listed in the Navigation Pane on the left. You then click
a cardholder/card in the list to the see that cardholder's (or card's) details.
Note that you can select more than one cardholder/card. This is useful if you
want to simultaneously modify their details, for example, assign the same
access rights to selected cardholders. To select several cardholders/cards,
hold down CTRL and click each card/cardholder. To select every
card/cardholder in the list, click [Select all] at the top of the list.
191
Chapter 12 - Managing cardholders and cards
Activating a cardholder
Activating (giving access to) a cardholder involves:
To activate a cardholder
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, in the Cardholder State list, click Active .
3. Click the Cards tab.
The card(s) that have been assigned to the cardholder are listed to the top
of the display.
4. Check that the Card State of each card is Active.
5. If a card is not active:
a. Select the card.
The card's details appear at the bottom of the display.
b. In the Card State list, click Active .
6. Click Save to save the change.
Prerequisites
n You have authorization to extend the cardholder's expiry date.
192
Chapter 12 - Managing cardholders and cards
193
Chapter 12 - Managing cardholders and cards
194
Chapter 12 - Managing cardholders and cards
Property Description
195
Chapter 12 - Managing cardholders and cards
l Basic encoding
l Enable antipassback
l Enable auditing (Encodes the card so that cardholder
events are downloaded to the card when the
cardholder swipes the card at a reader)
l Enable antipassback and auditing
Use this enrollment Sets the default enrollment reader to be used for all
reader and type as the enrollment activities for this Station.
default for this Station
Card state The card's state, either: Active, Lost, Stolen, Inactive, or
AutoCommence. (The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
196
Chapter 12 - Managing cardholders and cards
Property Description
Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.
PIN Code The PIN code used on key pad readers. It is displayed as ****.
Card layout (front) The layout used on the front of the card when it is printed.
Card layout (back) The layout used on the back of the card when it is printed.
Last printed Shows the date on which the card was last printed.
Number printed Shows the number of times the card has been printed.
Card Type If you want to use the added card in Reception Manager, choose one of
the Reception Manager card types:
Visitor Assigning a visitor template to a generic or visitor card will provide any
Template visitor assigned that card the access rights that are pre-defined in the
visitor template.
197
Chapter 12 - Managing cardholders and cards
Property Description
Category The category of the recipient of the card. Select Normal or Shift from
the Category list.
Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).
Transit allowed In the Transit Allowed area, you can configure one of the following
options:
Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.
198
Chapter 12 - Managing cardholders and cards
Property Description
Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled
Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.
Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.
Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.
Long Access Keeps the door open for longer than usual without an alarm being
raised.
199
Chapter 12 - Managing cardholders and cards
Property Description
Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.
Property Description
Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.
Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:
l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
200
Chapter 12 - Managing cardholders and cards
Property Description
l The Keypad enabled and the Extended door time by keypad options on
the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.
Property Description
2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.
Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.
Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.
Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.
201
Chapter 12 - Managing cardholders and cards
Property Description
Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.
Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.
Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.
Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault tolerant controllers.
Expiry is
If this option is selected, if the controller is configured to perform card
Activation
activation, the controller treats the secondary expiration date/time as
the activation date/time.
Keypad
If this option is selected, only a PIN access code, correctly entered, will
Entry Only
grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
202
Chapter 12 - Managing cardholders and cards
Property Description
Property Description
Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.
Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of
Comms
Property Description
Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card
Property Description
Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.
Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.
203
Chapter 12 - Managing cardholders and cards
Property Description
Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.
Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.
User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.
Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.
Property Description
Default Specifies the default floor point to be assigned to the card for this
floor cardholder. When the card is presented to a lift terminal, it determines
which floor to go to based on this floor point.
Property Description
Update Period The time in days after which the card expires if it has not been
updated.
Use extended Keeps the door open for longer than usual. This is often required
204
Chapter 12 - Managing cardholders and cards
Property Description
opening time for cardholders who require more time to transit the door due to a
disability.
Set lockdown If selected cardholders can set a door status to “lock down.”
Audit openings This is read-only. Indicates whether auditing is enabled for the card.
in the key
205
Chapter 12 - Managing cardholders and cards
3. Click an access right in the Available Temporary Access Rights list and
then click Assign .
The access right moves to the Assigned Temporary Access Rights list.
Note the details of the selected rights are displayed in the Details section.
4. Enter a Commence Date when the temporary access right will start.
Select Enable to enable this date.
5. Enter an Expiry Date when the temporary access right will end. Select
Enable to enable this date.
6. Click Save .
To deactivate a cardholder
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, in the Cardholder State list, click Inactive or Left
Company, whichever is appropriate.
To remove a cardholder
1. Search for and select the cardholder.
2. Click Delete .
206
Chapter 12 - Managing cardholders and cards
n Change the card's status, so that it cannot be used. You typically do this if
the card has been lost or the cardholder has gone on extended leave.
n Delete the card, which deletes the card's record from the database. You
typically do this if the cardholder has left the company and the card is a
photoID card. (Your organization's work practices may also require you to
physically destroy the card.)
n Return the card to the list of unassigned cards, so that it can be issued to
another cardholder. You typically do this if the cardholder has left the
company and the card is not a photoID card.
To delete a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card you want to delete.
4. Click Delete card .
207
Chapter 12 - Managing cardholders and cards
To activate a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. In the Card State list, click Active .
To reactivate a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card you want to reactivate.
4. Change the Expiry date and Expiry time to a suitable date/time.
5. In the Card State list, click Active .
208
Chapter 12 - Managing cardholders and cards
The following procedure describes the steps typically involved in checking the
cardholder's identity and access rights, and then unlocking the door. (Note
that the steps may be different for your site. Ask your supervisor or an
experienced colleague for precise instructions.)
To unlock a door
1. Before you unlock the door, check that the cardholder does have access
to the area. For example:
a. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
b. Check that Cardholder State (on the Main tab) is Active .
c. If you have CCTV and Integrated PhotoID, you can also compare the
cardholder's image with what you see in the video monitor.
d. Click the Access Rights tab and check that the cardholder has access
to the zone.
2. Call up the display that shows the door. (This display typically shows the
floor plan.)
3. Your display may have a control (such as a button) that you can use to
unlock the door. If there is no control, complete steps 4–5 to unlock the
door.
4. Double-click the door's lock point to call up the Point Detail display for the
point.
5. In the OP list (on the left of the display), click Unlock.
209
Chapter 12 - Managing cardholders and cards
Access reasons
Access Reason Meaning
Card not in The card does not exist in the controller of the reader swiped.
memory There may be several reasons, for example:
Deleted card The card has been deleted from the database.
Escort required The cardholder only has access if escorted by an escort (another
cardholder who can act as an escort).
Invalid reader The cardholder does not have access to the zone controlled by the
card reader.
Invalid time The cardholder attempted to access the zone outside the time
period specified by the access right.
No schedule A definition for the card exists in the controller however the
cardholder did not have access to the door at the time the card
was swiped.
210
Chapter 12 - Managing cardholders and cards
Not an escort The cardholder who attempted to act as a escort is not registered
as an escort.
Undefined card The card reader does not know anything about the card. There
may be several reasons, for example the card/cardholder has not
been downloaded to the card reader, or the card does not belong
to your facility.
Wrong time The cardholder does not have access the zone at the time.
(Typically, the cardholder tried to gain access outside the
associated timer period.)
211
Chapter 12 - Managing cardholders and cards
Capturing a portrait
ATTENTION: You must have the Image Capture task selected as part
of your operator profile in order to capture portraits.
To capture a portrait
1. Search for and select the cardholder whose portrait you are about to
capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Capture to call up the Image Capture display.
212
Chapter 12 - Managing cardholders and cards
To capture a signature
1. Select the cardholder whose signature you want to capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Signature to call up the Image Capture display.
3. Click Capture .
A static image of the signature appears (.bmp format).
4. Click Capture to capture the image.
5. Click Save .
To capture a signature
1. Search for and select the cardholder whose signature you are about to
capture.
The cardholder's details appear in the Cardholder display.
213
Chapter 12 - Managing cardholders and cards
2. On the Main tab, click Signature to call up the Image Capture display.
3. Instruct the cardholder to write their signature using the signature pad.
4. Click Capture .
The signature appears in the image box. (If there is an existing signature,
it is replaced by the new signature.)
5. If the signature is not satisfactory, click the 'X' at the top-right of the image
box and ask the cardholder to write their signature again.
6. When you have captured a satisfactory image, click Save .
To capture a signature
1. Search for and select the cardholder whose signature you are about to
capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Signature to call up the Image Capture display.
3. Click Capture .
4. Instruct the cardholder to write their signature using the mouse.
The signature appears in the image box. (If there is an existing signature,
it is replaced by the new signature.)
5. If the signature is not satisfactory, click the X at the top-right of the image
box and ask the cardholder to write their signature again.
6. When you have captured a satisfactory image, click Save .
214
Chapter 12 - Managing cardholders and cards
To import an image
1. Search for and select the cardholder whose portrait or signature you are
about to import.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Import.
3. Click Import.
4. Browse and select the required image file, and then click Open .
The dialog box closes and the selected image appears in the Image
Import display. (If there is an older image, the imported image replaces it.)
5. Click Save .
Printing cards
You can print either a single card or a range of cards.
Note that if you want to print a range of cards:
215
Chapter 12 - Managing cardholders and cards
Printing cardholders
By printing a cardholder, you can print the card layout assigned to the
cardholder without any card-related data such as card number or magstripe
encoding. (If the card layout assigned includes card-related fields, such as
card number, then the printed layout will include the text, card number.) This
can be useful if you only need a “card” for identification purposes and not
access control.
TIP: If you want to print the cards assigned to the cardholder, use the
Print Cards option.
To print a cardholder
1. Search for and select the cardholder you want to print.
2. Click the Access Details tab, and if there is no layout assigned to the
cardholder, assign the appropriate layout and click Save .
3. Click the Print Holder button.
A preview of the card layout appears.
4. Click the Print button.
216
Chapter 12 - Managing cardholders and cards
3. Click Copy To .
A dialog box opens.
4. Select a path and specify the filename for the copied image and click
Save .
Verifying a cardholder
If your site uses Integrated PhotoID and Honeywell Digital Video Manager,
you can use the cardholder comparison display to verify that the person who
has presented the card at the card reader is the person that has been issued
with the card before granting access to the cardholder.
CCTV cameras located near the reader capture video of the person at the
reader. This image is then presented on the Cardholder Comparison display
next to the portrait that was captured of the cardholder when the card was
issued.
To verify a cardholder
1. Compare the images presented on the Cardholder Video Comparison
display.
The Cardholder Video Comparison display automatically appears when a
card is presented at the readers that have been configured to use this
function.
2. Check the Access message.
If the cardholder has the authority to access the area, the Access
message should be Granted.
3. If you are certain the images match, click the Unlock Door button.
4. If it exists, click the Lock Door button after the cardholder has entered
through the doorway.
217
Chapter 12 - Managing cardholders and cards
Figure 12-20: A door and associated devices for monitoring and control
Card Reader An access point that monitors card usage, and reports
events such as 'access granted' and 'access denied'.
You use this point to obtain details about card usage.
For example, you would request a report on this point to
find out when a particular cardholder has passed
through the door.
Door status switch A status point that monitors the door's open/closed
status. For example, it raises an 'open too long' alarm if
218
Chapter 12 - Managing cardholders and cards
Exit switch. If fitted, A status point that monitors the status of the Exit switch.
people must press it Pressing the switch prevents an alarm being raised when
before opening the door opening the door.
(leaving the zone).
219
Chapter 12 - Managing cardholders and cards
220
CHAPTER
Prerequisites
n To view schedule details, the location that has been assigned to the
resource must be included in the scope of responsibility of the Station (for
Station-based security) or operator (for operator-based security) and a
security level of OPER or higher is required.
221
Chapter 13 - Using Global Schedules to manage your building
Item Description
1 The details of the specific resource, such as name, description, and location
222
Chapter 13 - Using Global Schedules to manage your building
Item Description
3 Changes whether the schedule area view shows a day, a week, or a month.
4 A schedule event from a base schedule that has already occurred. In this
example, the name of the base schedule is Standard hours, which is shown at
the top of the event. The color for an historic base schedule event is gray.
7 Schedule events from a base schedule that are yet to occur. In this example,
the name of the base schedule is Standard Hours, which is shown at the top
of the event. The color for a base schedule event that is yet to occur is blue.
8 An exception schedule event for this resource. The color for an exception
schedule event is orange.
9 The details of any schedule event that is selected in the schedule area. In this
example, the exception schedule is selected.
10 The download status of the resource, a link to the Download Summary where
you can see more detailed information about the download status, and the
Download button.
223
Chapter 13 - Using Global Schedules to manage your building
State Description
Disabled.
If the icon is black, the resource is currently disabled. Move the mouse over
the icon to see information about changes to the schedule for the resource.
Enabled.
If the icon is green, the resource is currently enabled. Move the mouse over
the icon to see information about changes to the schedule for the resource.
Standby.
If the icon is yellow, the resource is currently in standby mode. Move the
mouse over the icon to see information about changes to the schedule for
the resource.
Unknown.
If the icon is grayed out, the status of the resource is unknown. The status
may be unknown for the following reasons:
l The name of the resource has been deleted. If you move your mouse
over the icon, the tooltip says, No resource name provided.
l There is an error in the current schedule. If you move your mouse over
the icon, the tooltip says, Unabled to determine the download status of
the schedule.
l The resource does not exist. If you move your mouse over the icon, the
224
Chapter 13 - Using Global Schedules to manage your building
State Description
Schedule Description
Base A base schedule is the type of schedule you create when your
schedule scheduling requirements have a consistent pattern. For example, when
scheduling the lighting and air conditioning for an office building, you
might create a base schedule to cover the time period 7:00 to 18:00
and Monday to Friday for the entire year, every year.
Calendar A calendar schedule is the type of schedule you create when the
schedule scheduling requirements are variable, or need to occur on specific
days of the year, instead of set days of the week. For example, a
parliamentary sitting schedule might incorporate nonconsecutive
weeks across the year, with some months only having one week of
sitting, and some months with no sitting days
Exception An exception schedule is the type of schedule you create when you
schedule want to:
225
Chapter 13 - Using Global Schedules to manage your building
Prerequisites
You must be logged on to Station with ENGR security level (or higher).
TIP: If you are creating a base schedule for the first time, in the
navigation pane, click Base Schedules. Read the description of
what a base schedule is, then click Create Base Schedule .
3. On the Base Schedule tab, in the Name box, type a name for this base
schedule.
For example, if you have seasonal variations in your scheduling
requirements, create a base schedule called Summer weekly schedule
and a separate base schedule called Winter weekly schedule.
4. In the Description box, type a detailed description for the schedule.
5. From the First day of week list, choose the day that is considered to be the
first day of the week for your site.
The day you choose appears as the first day in the weekly view for the
schedule.
6. From the Usage list, set any start and end dates for this schedule as
required.
For example, if this is a seasonal schedule, in the Schedule Usage list,
click Between , and set the start and end dates for the season.
7. If you selected Between as the usage option and you want this schedule to
run every year, select the Use every year check box.
8. In the schedule area, on the day you want to add a schedule event, click
and drag to select the time period for the event, and then click Add
schedule event.
TIP: If you want to add the same schedule event to occur for every
week day, click Add to week days. If you want to add the same or
every day of the week, click Add to all days.
When setting the start and end times for schedule events, consider the
following:
226
Chapter 13 - Using Global Schedules to manage your building
Option Description
12. When you have finished creating the schedule, click Download .
Prerequisites
n You have created system calendars that include the required dates.
n You are logged on to Station with ENGR security level (or higher).
227
Chapter 13 - Using Global Schedules to manage your building
TIP: If you are creating a calendar schedule for the first time, in the
navigation click Calendar schedules. Read the description of the
what a calendar schedules is, then click Create calendar schedule .
Option Description
Proceed to step 6.
6. Under Schedule event Properties, from the Control to list, click the state
that this schedule event will set the control item to.
7. Ensure the Start time and End time are correct.
8. Under System Calendars, select the check box for each system calendar
to determine when this schedule occurs.
TIP: When you select a system calendar, the dates appear under
Dates.
228
Chapter 13 - Using Global Schedules to manage your building
Option Description
10. When you have finished creating the schedule click Download .
Prerequisites
n You need to be logged on with a security level of ENGR, and the location
that has been assigned to this resource must be included in the scope of
responsibility, with full access, to the Station you are using (for Station-
based security) or your operator account (for operator-based security).
229
Chapter 13 - Using Global Schedules to manage your building
Prerequisites
n To create an exception schedule, you need a security level of OPER or
higher, and the location that has been assigned to this resource must be
included in the scope of responsibility, with full access, to the Station you
are using (for Station-based security) or your operator account (for
operator-based security).
Option Description
230
Chapter 13 - Using Global Schedules to manage your building
Option Description
5. Below the schedule area, in the Name box, type a name for the new
exception schedule event.
6. From the Control to list click the state that this schedule event will set the
control item to.
7. If you want the exception schedule event to occur for a number of weeks,
from the Recurrence list, click Weekly and if required, to set an end date.
8. When you have finished creating the schedule, click Download .
231
Chapter 13 - Using Global Schedules to manage your building
TIP: If you only need to change the start or end time of a schedule
event, you can click and drag the top or bottom of the schedule
event to adjust the start or end time respectively.
Prerequisites
You must be logged on to Station with ENGR level security (or higher).
232
Chapter 13 - Using Global Schedules to manage your building
TIP: If you only need to change the start or end time of a schedule
event, in the schedule area you can click and drag the top or
bottom of the schedule event to adjust the start or end time
respectively.
5. If you want to add a new schedule event, in the schedule area on the day
you want to add a schedule event click and drag to select the time period
for the event, then right-click and choose Add schedule event and set the
schedule event properties as required.
6. If you want to delete a schedule event, in the schedule area, right-click the
schedule event and choose Delete .
In the Message Zone, click Yes to confirm to delete the schedule event.
7. If you want to change the resources that this schedule is assigned to, click
the Resource Assignment tab.
8. Select the check box for the resources you want to add, or clear the check
box for the resources you want to remove.
9. When you have finished making the required changes, click Download .
The changes are downloaded to all of the resources that this schedule
assigned to.
Prerequisites
You must be logged on to Station with ENGR security level (or higher).
233
Chapter 13 - Using Global Schedules to manage your building
234
Chapter 13 - Using Global Schedules to manage your building
TIP: If you have a security level lower than MNGR, you can only
view downloads for the resources that are within your scope of
responsibility.
Icon Description
The following table describes the information and the controls on the
Download Summary.
Option Description
235
Chapter 13 - Using Global Schedules to manage your building
Option Description
l Download failed
l Downloading
l Download required
l Download complete
l Download not required
Click this icon to delete the item. (This icon is only available if you
have performed a delete operation and the automatic download has
subsequently failed.)
Control If you are viewing downloads by resources, lists the control items
items associated with the selected resource, if the resource is currently
being downloaded. If you are viewing by controllers, lists the control
items associated with the selected controller. The information shown
for the control items is the:
236
Chapter 13 - Using Global Schedules to manage your building
Option Description
Schedule Lists the schedule events that are relevant to the selected control item
events that is currently being downloaded, such as the time of the download,
the modification that was made, and the status of the download. If the
download has failed, details of why it failed are provided.
237
Chapter 13 - Using Global Schedules to manage your building
238
CHAPTER
You only need to read this topic if the Fire Monitoring option appears on the
System Menu.
This guide only describes how to call up the status displays associated with
fire panels. It does not describe, for example, how to start a fire drill or how to
evacuate a building. For details of these procedures see the Building
Management Guide.
EBI monitors your fire panels, and raises an appropriate alarm whenever a
fire panel raises an alarm.
239
Chapter 14 - Monitoring Fire Panels
240
CHAPTER
15 RESPONDING TO MESSAGES
This section describes what messages are and how to respond to them.
About messages
Messages are generated for many reasons. For example, when a point goes
into alarm, you may receive an explanatory message in addition to the alarm.
Other types of messages may also give you a set of procedures you are to
perform, or list some actions you must take before the message can be
acknowledged.
Messages appear in the Message Summary with a flashing icon. When
you acknowledge a message, it is removed from the Message Summary.
241
Chapter 15 - Responding to messages
Column Description
Date & The time and date at which the message was received.
Time
Location The tag name of the location to which the point or device belongs.
Tag
242
Chapter 15 - Responding to messages
By default, the Message Summary shows all messages, with the newest
message at the top. You can change the Message Summary by applying
views, filters and sorting the summary.
243
Chapter 15 - Responding to messages
244
Chapter 15 - Responding to messages
Solution
1. Call up the Message Summary display.
2. Click the Message State column and select Informational.
The Message Summary changes to list messages that are of the type
informational.
Solution
1. Call up the Message Summary display.
2. Click the Location column.
3. Select Sort Ascending.
The Message Summary changes to list messages in ascending order
according to the location.
245
Chapter 15 - Responding to messages
Your system may be set up with site-specific views. Ask your supervisor or an
experienced colleague about other views and what information they display in
the Message Summary.
To apply a view
1. Click the view list.
2. Select the view from the list.
TIP: If you want to use your keyboard keys or the mouse wheel to
scroll the Message Summary, you need to click your mouse in the
summary grid to give it focus.
246
Chapter 15 - Responding to messages
Acknowledging messages
To acknowledge a single message
1. Do one of the following:
l Select the message and click the (Alarm Acknowledge) toolbar
button.
l Right-click the message and choose Acknowledge .
l Select the message and press the appropriate key; for more
information, see the topic “Shortcut keys for a 12–function keyboard”.
247
Chapter 15 - Responding to messages
248
CHAPTER
16 PRODUCING REPORTS
Reports help you analyze system activity in many useful ways. For example,
you may want a report on:
n Access-related alarms that were raised during the last 24 hours, grouped
by particular door/card reader.
n Who is currently in the building.
n The current values of a range of points.
All reports need to be requested, either manually or automatically.
Requesting a report generates a new version, using the latest data. For
example, if you have a report called 'Weekly Status Report', you would need
to request it each week so that it contains the current week's data.
Depending on how a report is configured, it is printed, or saved to computer
file so that it can be viewed on screen or used by another program. If the
report is designed to be viewed on screen, you need to call it up after
generating it.
For alarm, events and message summaries, you can use the Print As Report
feature to produce a printed report containing all, or a range of, the summary
information within the display.
If you simply want a printout as a 'snapshot' of what is currently shown in
Station, you do not need to print a report, you can print the display.
Requesting a report
When you request a report, a new version is created using the latest data. For
example, if you have a report called 'Weekly Status Report', you would need
to request it on a weekly basis to ensure that the data is always up-to-date.
TIP: You can run the Incident Detail report directly from the Incident
details pane by clicking the Print icon ( ) at the top of the pane.
249
Chapter 16 - Producing reports
To request a report
1. Navigate to the Reports summary by doing one of the following:
l Click the System menu icon ( ) on the menu bar or map toolbar, and
then click Reports or View all reports.
l Choose Menu > Action > Request Report.
2. Click the report you want to request.
3. If you want to change the report's existing settings, click Configure
reports to see the configuration details.
4. Change these as appropriate.
5. Click the Request button to request the report.
A Request in progress message appears in the Message Zone.
The document is sent to the specified output device, either a printer or
your screen.
Viewing a report
The latest generated version of any report can be viewed on your screen at
any time, just like any other display.
250
Chapter 16 - Producing reports
Access Data Exports (and imports) access control information to (from) ACS
an external file, so that it can be viewed and edited by other
applications such as Microsoft Excel.
Access Level Lists the zones and associated time periods associated ACS
with the specified access levels.
After Hours Lists the alarms and events that occurred during a
Alarms specified 'after hours' period over a specified time span.
Alarm and Lists the alarms or events that occurred within the
Event specified time period.
Card Usage Lists the number of times the specified cards have been ACS
used, and the cardholder to which each card is assigned.
Cardholder Produces a detailed list of all cardholders which match the ACS
Details specified criteria, one page per card.
Cardholder Lists all cards, or the cards that match the specified ACS
List criteria, and the cardholder to which each card is assigned.
Cardholder Lists the specified zones and the cardholders with access ACS
Zone to the specified zones. Can be sorted by zone name or
cardholder.
Door History Lists all cards presented to one or a number of access ACS
points within the specified time period.
Extended Lists alarms and events that have occurred within the
Alarm and specified time range and includes extended alarm
251
Chapter 16 - Producing reports
FS90+ Lists FS90+ points and their values based on the selection
criteria you specify. (The FS90+ is a fire panel.)
Group Card Lists the specified access events (entries, exits, or denials) ACS
Trail for a group of cards within the specified time period.
Point State Lists the number of times the specified points have
Changes changed state within a specified time period.
Time Period Lists the time period configurations that match the ACS
specified criteria.
252
Chapter 16 - Producing reports
ATTENTION: Print and Print Preview icons are enabled and disabled
based on security settings configured for Station under Server wide
settings. For more information about Station security, see the section
“Server wide settings” in the EBI Configuration and Administration
Guide.
TIP: You can also export the report to a standard file format that
can be read by other applications.
253
Chapter 16 - Producing reports
254
CHAPTER
17 MONITORING AUTOMATION
RULES
Automation enables routine, repetitive tasks to be performed automatically by
the system. Automation rules assist the operation of everyday tasks by:
n Offloading tasks that do not require operator intervention onto the server.
For example, changing the state of a point, starting a video recording, and
so on.
n Task sharing, which includes managing content automatically (for
example, performing cardholder comparisons and displaying video to an
alarm monitor) and supporting task distribution.
Operators can search automation rules and view a summary of the rules
defined on the server.
TIP: Because automation may affect how you interact with the system,
you should ask your supervisor or an experienced colleague for details
of how automation has been implemented at your site.
255
Chapter 17 - Monitoring automation rules
Item Description
Rule Name The name of the rule. Click the rule name to
display rule details.
256
Chapter 17 - Monitoring automation rules
Item Description
3. To sort rules, click Rule Name to sort by name or Last Run Time to sort by
execution time. Click the column name again to toggle between
ascending or descending sort order.
257
Chapter 17 - Monitoring automation rules
Item Description
Copy Select the rules you want to copy and then click Copy.
Click Yes at the prompt. Copied rules are appended
to the summary.
TIP: You can define how long to retain rule execution history from the
Automation Preferences tab.
258
Chapter 17 - Monitoring automation rules
Item Description
259
Chapter 17 - Monitoring automation rules
260
CHAPTER
261
Chapter 18 - Communicating with your colleagues using Message Pad
262
CHAPTER
n Check the status of components to verify that they have been configured
correctly and are operating correctly.
n Respond to system alarms such as:
l Communications failures
l Station failures
l Operator logon failures
l Printer failures.
n Monitor the status of the system to prevent problems occurring.
n Diagnose problems in the system.
263
Chapter 19 - Using the System Status display
You can show or hide all of the panes, except for the Results pane. The
Results pane is always visible.
Location pane
The Location pane on the System Status displays has a hierarchical tree
which shows all of the EBI related components such as servers, Stations,
channels, and controllers.
You can expand and collapse the trees as required to navigate to the
component to check its status or to view alarms associated with the
component. If you double-click a component, the status detail display for that
component is opened.
The Location pane can give you the following status information:
264
Chapter 19 - Using the System Status display
Status pane
The Status pane is similar to a faceplate and provides graphical information
about the status of the item you have selected in the Location pane so that you
do not have to navigate away from the System Status display and lose view of
other system alarms. The status pane shows a subset of the information that
is contained in the detail display for the item you have selected in the Location
pane. The exact information shown in the Status pane is different for each
type of component; the type of information available in the status pane can be:
n Alarm state of any alarms raised on the component (as well as an alarm
acknowledge button)
n The current state of the component
n Connection status
The Status pane is empty if you do not have an item selected in the Location
pane.
265
Chapter 19 - Using the System Status display
Results pane
The Results pane shows any alarms for the component that you have
selected in the Location pane. It is similar to the Alarm Summary. You can
acknowledge alarms from the Results pane in the same way you
acknowledge alarms in the Alarm Summary.
Details pane
The Details pane shows more details of the alarm you have selected in the
summary. If no alarm is selected the Details pane is empty.
266
Chapter 19 - Using the System Status display
Icon Description
Failed
Something has gone wrong with the component and it has stopped
working. Further investigation is required to find out why the component
has failed.
Marginal
OK
Disabled
The component is either not configured, not yet enabled, or has been
switched off.
Unknown
None
267
Chapter 19 - Using the System Status display
268
CHAPTER
The deadman timer ensures that you promptly acknowledge alarms, and that
you are at your Station. Because the deadman timer can be configured in
several ways, you need to ask your supervisor or an experienced colleague
for detailed instructions.
Whenever a deadman message appears in the Message Zone, you need to
acknowledge it by clicking the toolbar button.
If you do not acknowledge the message within a specified time, a deadman
point will go into alarm, and you may be logged off.
269
Chapter 20 - Specialized Access Control Procedures
Alarms are raised if the guard deviates from the tour—for example, if the guard
takes too long (or not long enough) to reach the next point, or fails to perform
a specified task.
You may need to manually start some tours; others may automatically start at
the programmed time.
n It has been suspended, and you want to restart it from the beginning. (The
command sets the tour to start at position 0.)
n It is an automatically activated tour, however, you want to start it before
the scheduled time. (After readying the tour, you can then manually start
it.)
270
Chapter 20 - Specialized Access Control Procedures
271
Chapter 20 - Specialized Access Control Procedures
Delayed The tour has been terminated because the guard has failed to arrive
at the next destination
272
CHAPTER
21 REFERENCE TOPICS
The topics listed below contain reference information that makes it easier to
perform your operational tasks.
Command reference
After you have become familiar with your system, you can quickly issue
frequently required commands by typing them in the Command Zone.
Then
Type the command Description
press
273
Chapter 21 - Reference topics
Then
Type the command Description
press
274
Chapter 21 - Reference topics
Alarm Summary F3
Event Summary F6
Reports Summary F7
System Menu F1
To call up Press
The next display in the current 'chain' of related displays or the next set of PAGE
records in a list of records which spans more than one page. UP
The previous display in the current 'chain' of related displays or the PAGE
previous set of records in a list of records which spans more than one DOWN
page.
Changing focus
The term ‘focus’ used here means selecting a display object so that it will
receive keyboard input. For example, if you wanted to move the focus to the
next box so that you could change its value, you would use the Tab key.
To Press
Move the focus to the next selectable object or editable box. TAB
275
Chapter 21 - Reference topics
To Press
Move the focus to the previous selectable object or editable box. SHIFT+TAB
Move the focus to any selectable object or editable box in the display, Arrow keys
or to move the cursor within an editable selection.
Note that the movement of focus around the screen depends on which
Station display or Windows application is being shown, and its settings.
To Press
Acknowledge/silence an alarm. F4
Lower the value of the selected object by 10% (default setting). ALT+F10
Paste the contents of the clipboard into the selected item. CTRL+V
Raise the value of the selected object by 10% (default setting). ALT+F9
276
Chapter 21 - Reference topics
n Must comply with the Windows password policy configured at your site.
n Is case-sensitive.
Prerequisites
n You must have MNGR security level and your Windows user account
must have the appropriate permissions to update other Windows user
account passwords on the system to be able to change someone's
password.
277
Notices
NOTICES
Honeywell Trademarks
IdentiPoint® is a U.S. registered trademark of Honeywell International, Inc.
Other trademarks
Microsoft and SQL Server are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
BACnet® is a registered trademark of the American Society of Heating,
Refrigerating and Air-Conditioning Engineers.
Other brands or trademarks are trademarks of their respective owners.
Trademarks that appear in this document are used only to the benefit of the
trademark owner, with no intention of trademark infringement.
Support
For technical assistance, contact your nearest Honeywell office.
Training classes
Honeywell holds technical training classes on Enterprise Buildings Integrator.
These classes are taught by experts in the field of building control systems.
For more information about these classes, contact your Honeywell
representative.
278