0% found this document useful (0 votes)
93 views278 pages

Operators Guide

This document provides an operator's guide for using Honeywell's Enterprise Buildings Integrator (EBI) Station software. It contains 3 chapters that introduce the basics of using Station, describe the operator interface, and explain how to monitor and control plant equipment from maps. The guide also covers displaying point information, responding to alarms, and other Station features. It is intended to help operators understand and utilize the full capabilities of Station.

Uploaded by

Clara Vieira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views278 pages

Operators Guide

This document provides an operator's guide for using Honeywell's Enterprise Buildings Integrator (EBI) Station software. It contains 3 chapters that introduce the basics of using Station, describe the operator interface, and explain how to monitor and control plant equipment from maps. The guide also covers displaying point information, responding to alarms, and other Station features. It is intended to help operators understand and utilize the full capabilities of Station.

Uploaded by

Clara Vieira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 278

Enterprise Buildings Integrator

Release 610

Operator's Guide
July 2021
DISCLAIMER
This document contains Honeywell proprietary information. Information
contained herein is to be used solely for the purpose submitted, and no part of
this document or its contents shall be reproduced, published, or disclosed to a
third party without the express permission of Honeywell International Sàrl.
While this information is presented in good faith and believed to be accurate,
Honeywell disclaims the implied warranties of merchantability and fitness for
a purpose and makes no express warranties except as may be stated in its
written agreement with and for its customer.
In no event is Honeywell liable to anyone for any direct, special, or
consequential damages. The information and specifications in this document
are subject to change without notice.
Copyright 2021 - Honeywell International Sàrl

2
Contents

CONTENTS
Contents 3
Chapter 1 - About this guide 13
Chapter 2 - Understanding the basics 15
Introducing EBI 15
Introducing Station 16
Starting Station 18
Logging on to Station 19
What do you do if you are forced to log on? 19
Changing your password 20
Logging off 20
Changing the security level in Station 20
Understanding security levels 21
Changing Station's setup file 21
Entering commands in the Command Zone 22
Zooming in and out in a Station display 23
About alarms and other messages 23
Using a trackball 24
Using your keyboard 24
Searching for system items using Station 24
Searching locations for map elements 26
Accessing online Help 26
Chapter 3 - About your operator interface 29
About the Station layout 29
About Command Station 30
About Command Console 31
About Command Wall 32

3
Contents

About the map workspace 33


Map toolbar 35
Station toolbar 37
Station Status Bar 40
Chapter 4 - Monitoring and controlling plant and equipment
from maps 43
Navigating your facility using the map workspace 43
Panning and zooming maps 44
Filtering map content 45
About Smart Objects 46
Adding links to maps and Smart Objects 50
Monitoring plant and equipment 53
Viewing camera video 54
Controlling plant and equipment 57
Chapter 5 - Using Station and custom displays 59
Calling up a Station display 59
System displays 59
Calling up a web page or file in Station 60
Printing Station information 61
Understanding Station display objects 61
Abnormal alphanumeric value indication 63
Alarm state icons 64
Using content windows in Command Console 65
Understanding window behavior 65
Controlling the Command Console layout and content windows 67

Chapter 6 - Using points 71


About points 71
About point parameters 71
About locations 72

4
Contents

About Alarm Groups 72


Controlling points 72
Example scenario: changing the value of a point from the detail display 73
Example scenario: changing the value of a point from a display 74
Example scenario: changing the value of a point from a faceplate 74
Disabling or enabling a point 75
About Electronic Signatures 76
Controlling points requiring Electronic Signatures 76
Chapter 7 - Displaying detailed point information 79
About Point Detail displays 79
Calling up a Point Detail display 79
Displaying point history 81
Displaying Recent Events 81
About faceplates 81
Using Group Detail displays 82
Using Quick Lists 83
Using the Quick View Display 84
Using trend displays 84
Trend buttons reference 85
Changing the scale on a trend 88
Scale options 89
Viewing events on a trend 90
Changing the period on a trend 90
Zooming in on a trend display 91
Highlighting a plot on a trend 91

Chapter 8 - Responding to alarms 93


Viewing alarms 93
Calling up the Alarm Summary 95
Alarm Summary columns 95

5
Contents

Changing what is shown in the Alarm Summary and the System Status
display 99
Using the Location pane on the Alarm Summary and the System Status
display 100
Using column filtering and sorting on the Alarm Summary 101
Example scenario: Filtering 103
Example scenario: Sorting 103
Using views within the Alarm Summary 103
Using the details pane on the Alarm Summary 104
Navigating the Alarm Summary 105
Pausing the Alarm Summary 105
Resetting the Alarm Summary 106
Viewing extended alarm messages 106
Acknowledging alarms 106
Shelving an alarm 108
Considerations for configuring an alarm unshelving delay 109
Adding comments to an alarm 111
Viewing an alarm video clip 112
Alarm Management Options 112
Using Three-stage Alarm Handling 112
Using Structured Response Management 113
Acknowledging alarms from the Alarm Banner 114
Alarm list overflow 114
What happens when you click the Recover Alarms button? 115

Chapter 9 - Responding to system alarms 117


Components of the System Status display 117
Location pane 118
Status pane 119
Results pane 120
Details pane 120

6
Contents

System Status icons reference 121

Chapter 10 - Working with incidents 123


Understanding the incident lifecycle 123
Viewing incidents 125
About viewing incidents 126
Creating incidents 128
Assuming or relinquishing ownership of incidents 129
Responding to incidents 130
Reviewing incident activity 133
Exporting incident details 133
Canceling incidents 134
Chapter 11 - Responding to events 135
Calling up the Event Summary 135
Event Summary columns 135
Changing what is shown in the Event Summary 137
Using the Location pane on the Event Summary 137
Using column filtering on the Event Summary 138
Using views within the Event Summary 139
Sorting the Event Summary 140
Example scenario - sorting the Events Summary 140
Resetting the Events Summary 141
Adding comments to an event 141
Viewing an event video clip 142
Adding an operator recorded event 142
Responding to Access Events 143
Using Event Archiving 143
Event collection and archive status 144
Archiving events 145

7
Contents

Restoring archived events 145


Restoring archived events from FileSystem 145

Chapter 12 - Managing cardholders and cards 147


About cardholders 147
Adding an Employee cardholder 148
Employee cardholder display Main tab properties 149
Employee cardholder display Details tab properties 151
Employee cardholder display Access Details tab properties 151
Employee cardholder display Access Rights tab properties 153
Employee cardholder display Temporary Access tab properties 154
Employee cardholder display Cards tab properties 154
Employee cardholder display Recent Events tab properties 162
Adding a Vehicle cardholder 162
Vehicle cardholder display Main tab properties 164
Vehicle cardholder display Details tab properties 165
Vehicle cardholder display Access Details tab properties 165
Vehicle cardholder display Access Rights tab properties 166
Vehicle cardholder display Temporary Access tab properties 166
Vehicle cardholder display Cards tab properties 166
Vehicle cardholder display Recent Events tab properties 175
Adding an External Personnel cardholder 175
External Personnel cardholder display Main tab properties 176
External Personnel cardholder display Details tab properties 178
External Personnel cardholder display Access Details tab properties 178
External Personnel cardholder display Access Rights tab properties 180
External Personnel cardholder display Temporary Access tab properties 180
External Personnel cardholder display Cards tab properties 180
External Personnel cardholder display Recent Events tab properties 188
Enrolling a cardholder to use a hand reader 188
Searching for a cardholder or card 190

8
Contents

Cardholder search methods 191


Activating a cardholder 192
Extending a cardholder's expiry date 192
Enabling long access for a cardholder 193
Issuing a card to a cardholder 194
Adding unissued cards to the database 195
Card Details tab 196
Changing a cardholder's access rights 205
Assigning temporary access 205
Deactivating or deleting a cardholder 206
Deactivating, canceling or deleting a card 207
Activating or reactivating a card 208
Giving a cardholder access by remotely unlocking a door 208
Finding out why a cardholder cannot gain access 209
Access reasons 210
Finding out what an access right represents (where and when it gives
access) 211
Viewing a cardholder's recent access events 212
Using Integrated PhotoID 212
Capturing a portrait 212
Capturing a signature using a camera 213
Capturing a signature using a signature pad 213
Capturing a signature using a mouse 214
Importing a portrait or signature image 214
Printing cards 215
Printing cardholders 216
Exporting a copy of a portrait or signature image file 216
Verifying a cardholder 217
What is an access right? 217

9
Contents

How EBI monitors and controls access through a door 218


Chapter 13 - Using Global Schedules to manage your building 221
Viewing schedule details 221
Global Schedules display reference 222
Viewing resource details 223
Resource status details 224
Understanding the types of schedules you can create 225
Creating a base schedule 225
Creating a calendar schedule 227
Assigning an existing schedule to resources 229
Creating an exception schedule event for a specific resource 230
Modifying a schedule for a specific resource 231
Modifying base schedules 232
Modifying a calendar schedule 233
Viewing download and modification details 234
Download status reference 235
Resolving failed downloads 237

Chapter 14 - Monitoring Fire Panels 239


Chapter 15 - Responding to messages 241
About messages 241
Calling up the Message Summary 241
Message Summary columns 242
Changing what is shown in the Message Summary 243
Using the Location pane on the Message Summary 243
Filtering and sorting the Message Summary 244
Example scenario filtering the Message Summary 245
Example scenario - sorting the Message Summary 245
Using views within the Message Summary 245
Using the details pane on the Message Summary 246

10
Contents

Navigating the Message Summary 246


Pausing the Message Summary 246
Resetting the Message Summary 247
Acknowledging messages 247
Chapter 16 - Producing reports 249
Requesting a report 249
Requesting a report from the Command Zone 250
Viewing a report 250
Standard report types 251
Printing a report of what is shown in a summary display 253
Chapter 17 - Monitoring automation rules 255
Searching automation rules 255
Viewing the Rules summary 256
Viewing automation rule execution history 258
Chapter 18 - Communicating with your colleagues using
Message Pad 261
Chapter 19 - Using the System Status display 263
Calling up the System Status display 263
Components of the System Status display 264
Location pane 264
Status pane 265
Results pane 266
Details pane 266
System Status icons reference 267

Chapter 20 - Specialized Access Control Procedures 269


Deadman Timer messages 269
Resetting the Deadman Timer points 269
Managing Guard Tours 269

11
Contents

Monitoring or controlling a guard tour 270


Readying a Guard Tour 270
Starting a Guard Tour 271
Suspending a Guard Tour 271
Aborting a Guard Tour 271
Guard Tour statuses 272

Chapter 21 - Reference topics 273


Command reference 273
Shortcut keys for a 12-function keyboard 274
Changing someone's operator-based security password 277
Notices 278

12
CHAPTER

1 ABOUT THIS GUIDE

This guide describes how to monitor and control your Enterprise Buildings
Integrator (EBI) system.

How to use this guide

To learn about Go to

The basics, such as logging on or off your "Understanding the basics" on


system and changing your password page 15

The operator interface and features "About your operator interface" on


page 29

Monitoring and controlling plant and "Monitoring and controlling plant


equipment from maps and equipment from maps" on
page 43

Using Station and custom displays "Using Station and custom displays"
on page 59

Using points "Using points" on page 71

"Displaying detailed point


information" on page 79

Responding to alarms "Responding to alarms" on page 93

"Responding to system alarms" on


page 117

Working with incidents "Working with incidents" on


page 123

Responding to events "Responding to events" on page 135

Managing cards and cardholders "Managing cardholders and cards"


on page 147

Using Global Schedules "Using Global Schedules to manage


your building" on page 221

13
Chapter 1 - About this guide

To learn about Go to

Monitoring fire panels "Monitoring Fire Panels" on


page 239

Responding to messages "Responding to messages" on


page 241

Generating and printing reports "Producing reports" on page 249

Monitoring automation rules "Monitoring automation rules" on


page 255

Using the Message Pad "Communicating with your


colleagues using Message Pad" on
page 261

Using specialized access control procedures "Specialized Access Control


Procedures" on page 269

Getting information about commands and "Reference topics" on page 273


shortcut keys and other reference-type
information

14
CHAPTER

2 UNDERSTANDING THE BASICS

Every EBI system is configured differently to meet a particular set of


requirements. This means that some of the information in this guide may not
be applicable to you, or may operate in a slightly different way. Consequently,
you should ask your supervisor or an experienced colleague before you
perform any procedure described in this guide.
The following topics describe how to start your client and the basic concepts
related to its use.

Introducing EBI
Enterprise Buildings Integrator (EBI) is a sophisticated management and
control system that:

n Displays system data in a manner that you can easily understand


n Allows you to control your system by sending appropriate commands
n Automatically performs scheduled tasks
n Notifies you of system activities, including alarms and system events
n Produces comprehensive reports
The following figure shows a typical EBI system. EBI runs on the server (the
main computer), which collects and processes data, administers system
activities, and performs automated tasks.

15
Chapter 2 - Understanding the basics

Figure 2-1: A typical EBI system

The point servers and controllers are the 'hands and eyes' of your system,
controlling and collecting data from field devices, such as card readers, air
conditioning units and so on.
Controllers collect information from the field and continually send this
information to the server where it is stored. In most cases, the controllers are
located near the devices they control, and are connected to the server via a
LAN (Local Area Network) or other communication link.
A point server collects information from the field and sends this information to
the server upon request. In general, the server does not store point values
from a point server unless you are collecting history.

Introducing Station
A Station is, in effect, a set of 'control panels' through which you and your
colleagues monitor and control your system. (Station is a separate EBI
program that runs on standard computers, as well as on the server.)

16
Chapter 2 - Understanding the basics

TIP: Throughout this guide, the term “Station” is used generically to


mean the operator interface you use to interact with the EBI system.
Depending on how your EBI system is configured, the operator
interface includes one (or more) content windows containing a system
display. Your operator interface may also include a graphical map that
visually describes the physical assets—fans, doors, cameras, and so
on—within your facility.

Station presents information as a series of displays—each display is a 'control


panel' that shows a particular set or type of information, and has an
appropriate set of controls, such as 'buttons' and 'scroll bars'.
EBI has two basic types of display:

n System. These are supplied with EBI and show information in a


standardized manner. System displays typically consist of lists and
'electronic forms' containing system configuration details.
n Custom. Created specifically for your system, custom displays make it
much easier to interpret and control system activity.
For example, a security-related display might show the layout of a
particular floor, whereas a building control-related display might include a
schematic diagram of an air handling unit of an air-conditioning system.
In addition to displays, Station can display Web pages and files, such as
Microsoft Word documents, which typically contain operating procedures.

Figure 2-2: Typical system display

17
Chapter 2 - Understanding the basics

Figure 2-3: Typical custom display

Starting Station
You connect to EBI by using the client shortcut.

To start Station
1. On the Windows desktop, double-click the Station shortcut.

TIP: The shortcut name depends on the EBI client type configured
on the client computer. For example, if you connect to EBI using
the Command Console client type, double-click the Command
Console shortcut.

Station establishes contact with the EBI server and displays the startup
display specified in the default setup file.
If you have Honeywell DVM as a licensed option, it launches automatically
if the Command Console shortcut is used.
2. Your system may be set up so that you can select a particular setup file,
which controls the way Station operates.
3. Log on to Station in accordance with the security option used on your
system.

TIP: If your site uses single signon, you do not need to enter your
user name and password.

18
Chapter 2 - Understanding the basics

Logging on to Station
In general, if you have been given a user name and password, you need to log
on to Station. (Your site may be set up so that your Windows and Station user
name and password are the same and logging on to Station is automatic.)

To log on when a prompt appears


1. In the Station Operator Logon dialog box type your user name and your
password.

ATTENTION: Your password, but not your user name, is case-


sensitive. Asterisks (*) appear as you type each character of your
password.

2. Click OK.

To change operators
1. In the bottom-right corner of the Station display, click the Operator ID and
Security Level.
The Logon dialog box appears.
2. Type the User Name and Password that has the security level you require.

TIP: For Station-based security, you can only type a password.

3. Click OK.

What do you do if you are forced to log on?


If configured on your system, you can perform a duress signon if someone
forces you to log on. Duress signon is identical to a normal logon, except that
you log on using a special duress operator ID and password that is given to
you by your manager or system administrator.
The duress operator ID and password logs you onto the system in what
appears to be a normal situation; however it raises an alarm that does not
appear on your Station. Other staff will see the alarm on their computers and
act accordingly.
Ask your supervisor or an experienced colleague whether your system is set
up for duress signon.

19
Chapter 2 - Understanding the basics

Changing your password


You can change your password if required.

TIP: This procedure is only applicable for Windows operator accounts.

To change your password


1. Type chgpsw in the Command Zone and press ENTER.
The Change Password dialog box opens.
2. Type your old password and press the TAB key.
3. Type your new password and press the TAB key.
Your password must comply with the Windows password policy
configured at your site.
Your password is case-sensitive.
4. Re-type your new password and click OK. (The new password is only
accepted if the new password entries are identical.)

Logging off

TIP: Station might be customized to log off automatically if you have


not used the keyboard for a specified time.

To log off
1. In the Command Zone, type bye and press ENTER.

Changing the security level in Station


If you were not provided with a user name and password to log on to Station,
you are automatically assigned OPER security level when you start Station.
You can change to a higher security level providing you know the password
for that level for that Station.

TIP: You can use this same procedure to change operators.

20
Chapter 2 - Understanding the basics

To change to a higher level


1. Type psw in the Command Zone and press ENTER.
The Station Logon dialog box opens.
2. Type the password and click OK.

To change to the default level from a higher level


n In the Command Zone type bye and press ENTER.

To change security level


1. In the bottom-right corner of the Station display, click the Operator ID and
Security Level.
The Logon dialog box appears.
2. Type the User Name and Password that has the security level you require.

TIP: If Station-based security is being used, you can only enter a


password.

3. Click OK.

Understanding security levels


Your security level determines which tasks you are permitted to perform.
Note, however, that even if you are allowed to perform a particular task you
may be prevented from performing it in certain circumstances.
If you attempt to perform a task that requires a higher security level, the
following message appears in the Message Zone:
Higher Security Level Required

Your security level appears at the right of the Status Bar. The levels are, from
lowest to highest: View Only, Ack Only, OPER, SUPV, ENGR and mngr.

Changing Station's setup file


Station automatically uses default.stn unless you select another setup
file. Use this procedure if you want to use a setup file other than
default.stn.

21
Chapter 2 - Understanding the basics

To select another Station setup file


1. Choose Station > Connect.
The Connect dialog box opens.
2. Select the appropriate configuration file from the Recent Connections tab
or the Other Connections tab.
The Recent Connections tab lists the setup files (.stn) most recently
used. The Other Connections tab lists all your setup files. If your setup file
is not listed, click Browse to navigate the required setup file.
3. Click Connect.

Entering commands in the Command Zone


When you become familiar with Station, you may find it quicker to enter some
commands in the Command Zone rather than choosing them from menus, or
navigating through several displays.

To enter a command in the Command Zone


1. Give focus to the Command Zone:
l Press ESC
l Press TAB until the focus moves to the Command Zone
l If no data-entry box has focus, press an alphanumeric key
l Press any of the function keys that require data entry
l Click in the Command Zone.
2. Type the command and press ENTER.

TIP: The Command Zone retains a history of the last 20 different


commands that you have executed since you logged on. You can
re-enter a command quickly by choosing it from the alphabetically
arranged list, and then pressing ENTER.

Example
To call up a display called 'boilerslevel1:'

22
Chapter 2 - Understanding the basics

1. Give focus to the Command Zone.


2. Type boilerslevel1 and press ENTER.

Zooming in and out in a Station display


You can zoom in or out of a Station display to make the display area of the
Station window larger or smaller.

To resize a display
1. Use the Zoom control on the toolbar to change the magnification of the
display.

About alarms and other messages


EBI has a control system that generates appropriate messages, depending
on how you are expected to respond at prescribed times or whenever there is
a significant change in your system. The way in which you respond to a
message depends on its type.

For this message type Go to

Alarm. An alarm is generated whenever an abnormal condition "Responding


occurs. to alarms" on
page 93

Event. An event is any significant change in the system, including "Responding


any commands you issue. to events" on
page 135

Messages. A message can be generated for many reasons. For "Responding


example, when a point goes into alarm, you may receive an to messages"
explanatory message in addition to the alarm message. In other on page 241
cases you may be required to perform a function before a message
can be acknowledged.

Incidents. An incident can be generated by a person or "Responding


automatically, by the system. An incident is any event that could to incidents"
result in the loss of—or disruption to—facility operations, services, or on page 130
functions.

23
Chapter 2 - Understanding the basics

For this message type Go to

Deadman. A Deadman message is generated at regular intervals, "Deadman


which you must acknowledge. An alarm is raised if you don't Timer
acknowledge the message within the specified time. messages " on
page 269

ATTENTION: Explanatory messages also appear in the Message


Zone when, for example, you are issuing a command. These
messages are informative only, and are not caused by changes to your
system.

Using a trackball
You use a trackball in a similar manner to a mouse—for example, rolling the
ball forwards is equivalent to moving the mouse forwards. The functions of the
two buttons are identical to those on a mouse.

Using your keyboard


You can perform all Station operations using your keyboard.
You can quickly access many commands by pressing the appropriate shortcut
key. For example, if you have a standard computer keyboard (with 12 function
keys), you can display the Alarm Summary by pressing F3.

Searching for system items using Station


You can search for system items—such as points, operators and Stations—
using the (Cardholder Detail) toolbar button or using the Command Zone
and function keys.

TIP: You use (Search Cardholder ) to search for cardholders or


cards.

If you enter only the first part of the name in your search, all matching points
are returned in the search results. For example, 'Floor1' will find
'Floor1MainDoor', 'Floor1SideDoor' and so on.

24
Chapter 2 - Understanding the basics

TIP: If your operator interface uses a map, you can search for map
elements; for more information, see "Searching locations for map
elements" on the next page.

You can use wildcard characters (* and ?) in your search. An asterisk (*)
represents one or more unknown characters, whereas a question mark (?)
represents one unknown character. For example:

n '*Door' will find all points that end with 'Door', such as 'Floor1MainDoor',
'Level2SideDoor' and so on.
n 'Floor?MainDoor' will find points 'Floor1MainDoor', 'Floor2MainDoor' and
so on.

TIP: The Description column in a point search will not be populated on


a DSA subscriber unless the point has been previously discovered and
displayed in a point detail display.

To use the detail search display


1. Click the toolbar button to call up the detail search display.
2. Type the name (or the first part of it) in the text box labelled Go to
Cardholder/s with and then click OK.
If your search finds only one item, its details are displayed.
If your search finds more than one item, they are listed in Search Results
display. Click an item to see its details.

To search from the Command Zone


1. Click the Command Zone.
2. Type the name (or the first part of it).
3. Press F12.
If your search finds only one item, its details are displayed.
If your search finds more than one item, they are listed in Search Results
display. Click an item to see its details.

25
Chapter 2 - Understanding the basics

Searching locations for map elements


You can easily search a location for map elements, such as Smart Objects for
doors, cameras, and other assets. You can also search for point parameters.
Searching allows you to navigate quickly to map elements regardless of their
zoom level.

TIP:

l You cannot search locations (maps) for zoom regions or individual


points in the system. To search for points, use the Command Zone;
for details see "Searching for system items using Station" on
page 24.
l Any filters that are currently applied affect the map elements
returned in the search results.

To search the map for Smart Objects


1. In the Locations pane, click the location you want.
2. In the Search box at the top of the pane, type the first characters of the
item you want to find.

TIP: Wildcard/special characters cannot be used in a search


string.

The Locations pane progressively discloses the search results as you type
the characters in the name.
3. Click the map element you want.
The location map pans and zooms to center the element. If the map
element is a Smart Object, the Smart Object opens.

TIP: If the Smart Object has an action associated with it—for


example, to automatically open a content window—the action is
executed.

Accessing online Help


You can access the system documentation from the Help menu. If your
system uses maps, you can access a visual guide for Smart Objects, alarms,
and incidents.

26
Chapter 2 - Understanding the basics

To access the system documentation


1. On the menu bar, choose Menu > Help .

To access visual Help for maps


1. Click the Help icon ( ) on the map toolbar.
2. Click one of the following:

Option Description

Legend Visually describes the Smart Objects for security,


fire and safety, and HVAC equipment, as well as
equipment states and data quality.

Alarms Visually describes the appearance of alarm and


and incident icons that represent states and priorities.
incidents

27
Chapter 2 - Understanding the basics

28
CHAPTER

3 ABOUT YOUR OPERATOR


INTERFACE
You interact with your EBI system using an operator interface, which allows
you to monitor and control equipment and plant within your facility.
The topics listed below describe the different operator interface layouts and
features.

About the Station layout


This section describes the single-window Station layout.
The current display occupies most of the Station window. The other parts,
above and below the display, provide you with the tools and controls you use
to monitor and control your system.

Figure 3-1: Station's layout

Item Description

Toolbar Clicking a button on the toolbar provides quick access to frequently


required commands.

29
Chapter 3 - About your operator interface

Item Description

You can click the menu icon on the left-hand side of the toolbar to
access the Station menus.

Command You type commands in the command zone.


zone

Message Station displays explanatory messages in the message zone. For


zone example, if you try to call up a non-existent display, something like
The display file xxxx was not found appears in the message
zone.

Location The location pane is used for locating and filtering information. For
pane example, if you are viewing the Alarm Summary, it shows a
hierarchical list of all the locations to which you have access and the
aggregate alarms for each location. If you are viewing the System
Status display, the location pane can also serve as a navigation menu
providing quick access to tasks related to system status tasks or
cardholder management.

Display Each display is a separate 'control panel' that you use to monitor and
control a particular part of your system.

Alarm Line Generally, this line displays the most recent unacknowledged alarm.
Note that the Alarm Line may be hidden on your system, or it may be
configured differently. For example, it might display the oldest
unacknowledged alarm rather than the most recent.

Status bar The status bar provides an overview of your system's status. For
example, a flashing indicator on the Alarm box indicates that there is at
least one unacknowledged alarm.

About Command Station


Command Station is a single-window, map-based client application (in
contrast, the Station client type uses menu-based navigation). Content
windows are displayed on top of the map.
Command Station is intended for casual use by operators or facility
technicians regardless of their location in the facility.
Command Station can be used in an environment where desktop monitors
are available, and/or installed on a tablet or tablet-type device, such as a
Microsoft Surface Pro.

30
Chapter 3 - About your operator interface

Figure 3-2: Command Station

For more information about the map workspace, see "About the map
workspace" on page 33.

About Command Console


Command Console is a multi-window, desktop-based solution intended for
control room environments. Command Console provides rapid response
capabilities for security and/or facility operators and allows various display
and monitor configurations.
Command Console allows a full-time single operator to respond quickly to
alarms and incidents that require broad situational awareness.
In the figure below, the top image shows Command Console on multiple
monitors, with several content windows and a touchscreen on the desktop for
the map workspace. The lower image shows a Command Console system on
a large, single, curved monitor; this example does not have maps as a
licensed option.

31
Chapter 3 - About your operator interface

Figure 3-3: Command Console

For more information about the features shown above, see the links in the
table below.

For information on Go to

Station layout "About the Station layout" on page 29

Station toolbar "Station toolbar" on page 37

Station Status Bar "Station Status Bar" on page 40

Map workspace "About the map workspace" on the facing page

About Command Wall


Command Wall is a large, “stand-up” touch-screen application, designed to
support broadened situational awareness and team collaboration in an
incident response center, conference room, or shared office environment.

32
Chapter 3 - About your operator interface

Command Wall provides a collaborative platform that allows supervisors,


managers, and teams to work on one task, such as troubleshooting incidents.

Figure 3-4: Command Wall

The Command Wall layout contains the map workspace. For more
information, see "About the map workspace" below.

About the map workspace


The map workspace shows the location being actively monitored. The
location can be a zone or area of a floor, an entire single floor, a single
building, or a collection of buildings—for example, a university campus or
hospital.
The map workspace contains icons, called Smart Objects, that represent
plant and equipment that needs to be monitored and/or controlled.

33
Chapter 3 - About your operator interface

Figure 3-5: Map workspace

The map workspace contains the following items:

Item Description

1 Map workspace. The map workspace allows operators to interact with the
system.

2 Location map. Shows the location currently being monitored. The map can be
panned and zoomed in or out. The map contains the various map elements
(described below).

3 Map elements. Map elements include zoom regions, portal regions, link
regions, Smart Objects, alarm aggregation Smart Objects, and point
parameters:

l Zoom regions appear as areas enclosed by a white outline. Zoom regions


may be areas of special interest that have many items of plant or
equipment. You can tap or click a zoom region to view the region in detail.
If the region is a portal region, clicking the region displays a different map,
such as a detail map of the current region.
l Link regions also appear as areas enclosed by an outline. Link regions
provide you with easy access to content such as thirs-party pages, Station
system displays, building schematics, PDF documents, and external URLs,
which can be displayed by tapping or clicking a link that appears when
you tap the link region.
l Smart Objects represent facility assets such as HVAC, security, and fire

34
Chapter 3 - About your operator interface

Item Description

plant and equipment. If the equipment is in alarm or has an incident, the


Smart Object shows an indicator. Clicking a Smart Object can display
status information for plant or equipment and show other content, if
configured.
l Alarm aggregation Smart Objects can show an overall count of alarms and
incidents present at the Smart Object's configured location; a count of
alarms by priority; and a count of incidents by priority.
l Point parameters show alarm counts, outside air temperature, flow rates,
and so on.

4 Map toolbar. Depending on the type of operator interface you are using, the
toolbar contains controls to display system content, navigate your system,
filter map content, exit the map workspace, and enable/disable Edit mode.
For more information, see the topic "Map toolbar" below.

The system date and time are displayed at the bottom of the workspace
toolbar.

TIP: The map workspace does not display system alarms, so the alarm
count shown in the alarm summary and the alarm count on the Alarm
icon may differ.

5
Home button and Zoom buttons. The Home button ( ) returns the map to
its home position (centered, at the lowest zoom level). Use the Add (+) and
Minus (–) buttons to increase or decrease the map zoom level by one level.

Map toolbar
Use the map toolbar to display different types of content, navigate your facility,
control the map filters, enable/disable Edit mode, and exit from the client.
Click an icon to toggle the feature on or off.
The table below describes the map workspace toolbar.

TIP: Your map toolbar may have fewer icons than described below,
depending on your operator interface.

35
Chapter 3 - About your operator interface

Item Description

Alarms. Displays the Alarm Summary.

An alarm count on the icon shows the number of active unacknowledged


alarms in the system.

For more information, see the section "Responding to alarms" on page 93

Incidents. Displays a list of open incidents in the system.

The incident count on the icon shows the number of open incidents in the
system. If there is at least one unowned incident, the incident count is
animated.

For more information, see the section "Working with incidents" on page 123.

Locations. Displays a hierarchically organized list of navigation links. Click a


link to navigate to that map location.

For more information, see the topic "Navigating your facility using the map
workspace" on page 43.

Map Filters. Displays the Map Filters pane used to control the visibility of
content during runtime, which allows operators to display only the relevant
content. For example, you can select the Camera option in the Security
domain category to control the visibility of camera Smart Objects.

TIP: The map filters that are available are based on the Smart Objects
in the system—for example, if the system has no fire-related Smart
Objects, this domain filter is not available.

For more information, see the topic "Filtering map content" on page 45.

Links. Displays the Links pane that has links to system displays and other
content. You can also use the Links pane to gain access to, for example,
descriptions of standard operating procedures, equipment schematics, and
so on.

For more information, see the topics "Navigating your facility using the map
workspace" on page 43 and "Adding links to maps and Smart Objects" on
page 50.

Help. Provides access to a visual guide to Smart Objects, as well as states and
priorities for alarms and incidents.

For more information, see the topic "Accessing online Help" on page 26.

36
Chapter 3 - About your operator interface

Item Description

System menu. Displays links to Station displays, such as the Events summary,
groups, trends, reports, cardholder management, and so on. Click the link for
the content you want.

Exit. Click to exit from the map browser client.

Edit mode. Enables/disables Edit mode.

In Edit mode, map elements such as Smart Objects (including alarm


aggregation Smart Objects), link regions, zoom regions, and portal regions
can be placed onto a map and configured during runtime.

The Edit icon only appears for operators logged on with an ENGR or MNGR
security level.

The system date and time on the server is displayed at the bottom of the map
toolbar.

Station toolbar
The buttons in the Station toolbar provide easy access to frequently required
displays and commands. For example, to call up the System Menu, click the
toolbar button.

ATTENTION: Some buttons appear on your toolbar only if you have


the associated option. For example, the Incidents button appears in
your system only if you have the Incident Workflow option.

Button Description

Menu

Provides access to the Station menus. If this button is not visible, access
the Station menus by using the menu bar at the top of the screen.

Back/Forward

In the Station client type, which has a single window, this control moves
backward/forward between displays you have viewed. You can click the
arrow to the right of the Back/Forward buttons to view a history of
displays you have viewed.

37
Chapter 3 - About your operator interface

Button Description

In Command Console this button is disabled, so you use the control on


the individual content windows to move backward/forward.

Reload Page

Reloads the current display

Home

Calls up the home page, if one has been configured for your system.

System Menu

Calls up the System Menu, a specialized display that provides quick


access to the other major displays.

Alarms

Calls up the Alarm Summary, which provides a one-line description of


every alarm.

Events

Calls up the Event Summary, which provides a one-line description of


every event. See "Calling up the Event Summary" on page 135.

Incidents

Calls up the Incident Summary, which provides a one-line description


of every open incident. When an incident is completed and closed it is
removed from view.

Maps

Displays the map workspace.

TIP: The use of maps is a licensed option for the Station client
and Command Console client types.

Trends

Calls up the specified trend display. To call up a trend:

1. Click the button.


2. Type the trend number and press ENTER.

38
Chapter 3 - About your operator interface

Button Description

Global Schedules

Calls up the Global Schedules display.

Reports

Calls up the Report Summary display.

Digital Video Manager

Displays DVM Console, if licensed.

Acknowledge/Silence

Acknowledges the most recent, or selected, alarm.

Cardholder Detail

Calls up the Cardholder Management Search display, which you use to


search for cardholders or cards.

Detail

Performs either of two tasks, depending on the context:

l If an alarm or object is selected on the current display, calls up the


associated Point Detail display.
l If nothing is selected on the current display, calls up the Search display,
which you use to search for system items such as points, operators and
so on.
Associated Display

Calls up the display associated with the object that is in alarm, or the
selected object.

Quick View

Calls up the Quick View display.

Create Incident

Calls up the Select Incident Type dialog box used to create a new
incident.

Zoom

39
Chapter 3 - About your operator interface

Button Description

Changes the magnification of displays.

Command You type commands in the text box. The Command Zone also retains a
history of previously selected displays. You can return to a display by
choosing from the list.

Station Status Bar


The Status Bar provides an overview of your system’s status.

Figure 3-6: Status Bar

The table below describes each box in the Status Bar, starting from the left.

Box Description

ALARM Indicates whether there are any alarms, as well as their status:

l Blank. There are no alarms.


l Flashing red. There is at least one unacknowledged alarm.
l Red (not flashing). There is at least one alarm, but they have all
been acknowledged.
Click the box to call up the Alarm Summary, which lists each
alarm.

SYSTEM Indicates whether there are any system alarms, as well as their
status:

l Blank. There are no system alarms.


l Flashing cyan. There is at least one unacknowledged system
alarm.
l Cyan (not flashing). There is at least one system alarm, but they
have all been acknowledged.
Click the box to call up the System Status display, which lists each
system alarm.

INCIDENTS Indicates whether there are any incidents as well as their status.

40
Chapter 3 - About your operator interface

Box Description

l Blank. No incidents.
l Flashing. At least one open, unowned incident exists and is
awaiting a response.
l Not flashing. All open incidents have owners.

TIP: Incident Workflow is a licensed option.

MESSAGE Indicates whether there are any messages, as well as their status:

l Blank. No messages.
l Flashing green. There is at least one unacknowledged message.
l Green (not flashing). There is at least one message, but they have
all been acknowledged.
Click the box to call up the Message Summary, which lists each
message.

DOWNLOAD Indicates download status and problems associated with card


details:

l Blank. Access control is operating normally.


l Flashing white. Card details are currently being downloaded.
l White (not flashing). There was a failure or timeout during the
download. Click the field to see the problems.
If the Station Status bar is not visible, when you hover over the
Station icon in the Windows Status bar, it will indicate an alarm.

Server ID The computer name of the server to which you are connected.

Station number The number of the Station you are logged on to. (Most systems
have more than one Station.)

Security level Your security level.

Date and time The current date and time, as set on the server.

41
Chapter 3 - About your operator interface

42
CHAPTER

4 MONITORING AND CONTROLLING


PLANT AND EQUIPMENT FROM
MAPS
The topics listed below describe how to monitor and control plant and
equipment from the map workspace.

Navigating your facility using the map workspace


This topic summarizes how to navigate your facility using the map workspace.

Navigating your facility


To navigate
From... Action
to...

Home Map Click the Home icon ( ) in the bottom-right corner of


(overview) the map.
display

A different Map Click the Locations icon ( ). In the Locations panel, click a
location toolbar link. The map for that location is displayed.

A different Current On the map, click the zoom region for the area you want
location map to see in detail. The map updates to show the area.

Zoom regions are represented by a bounded area with a


dotted white line.

Navigating maps

To navigate to... From... Action

Alarm Map Click the Alarms icon ( ).


summary toolbar

Incidents pane Map Click Incidents icon ( ).


toolbar

43
Chapter 4 - Monitoring and controlling plant and equipment from maps

To navigate to... From... Action

Help (Legend, Map Click the Help icon ( ) and then the item you want:
Alarms and toolbar
Incidents) l The Legend tab visually describes Smart Objects.
l The Alarms and Incidents tab visually describes icons
and priorities for alarms and incidents.
Links An open Click the Links icon ( ) to view links created for that
Smart Smart Object.
Object
Links can be created to third-party content, as well as
to standard operating procedures and other
documentation that support your operational tasks.

Incident details An open Click an incident in the Incidents list.


Smart
Object

Map Open the Incidents pane and click the incident you
toolbar want to see details for.

Point detail An open Click an alarm in the list.


display Smart
Object

Live video Map Click an incident associated with a camera.


window for toolbar
camera Smart
Objects Incident
summary

Station displays Map Click the System menu icon ( ), and then click the
toolbar icon for the display you want.

Panning and zooming maps


You can pan and zoom maps to focus on items of interest. Zooming in on a
map reveals more detail—this is known as progressive disclosure. Disclosing
content this way allows you to see details when appropriate, and to maintain
visual clarity by hiding unnecessary detail when you only want to see an
overview.

44
Chapter 4 - Monitoring and controlling plant and equipment from maps

TIP: Maps use industry-standard touch behavior. You can also use a
mouse to interact with maps.

Action Touch interaction Mouse operation

Pan the map Drag left or right.

Zoom to Home
position Tap or click the Home icon ( ).

Zoom in/out Stretch fingers to zoom in. Click a zoom region.

Squeeze fingers to zoom out. Click the zoom in (+) or zoom


out (–) icons.
Tap the zoom in (+) or zoom
out (–) icons.

Zoom in using a Tap or click the zoom region.


zoom region

TIP: When panning, open camera Smart Objects move with the map;
you can prevent this behavior by detaching the open camera Smart
Object from the underlying map. For more information see the
"Viewing camera video" on page 54.

Filtering map content


You can filter map content to focus on content that is relevant to you. For
example, security operators can hide HVAC domain-related plant and
equipment and focus on security-related equipment.

TIP: When viewing Google third-party maps, the Map Filters pane
displays a section called Landmarks. You can use these additional
filters to control the visibility of features such as schools, places of
worship, and so on.

To filter map content


1. On the map toolbar, click the Filter ( ) icon.
The Map Filters pane is displayed showing the filters grouped by type
(Fire, HVAC, and so on).

45
Chapter 4 - Monitoring and controlling plant and equipment from maps

2. Apply map filters as required:

Task Map filter icon

To toggle all filters, click the toggle control.

To filter for a domain—Security, for example—


click the map filter icon.

To filter specific items, expand the domain


and select the filters you want.

A gray icon by a domain indicates one or


more filters for that domain are active.
Expand the domain to see the active filters.

About Smart Objects


On maps, plant and equipment such as doors, boilers, chillers, cameras,
smoke detectors, and so on are represented by Smart Objects, which are
displayed as icons on the map. The location of a Smart Object indicates the
location of the corresponding plant or equipment in your facility.

Figure 4-1: Smart Object icon

An alarm indicator or incident indicator on a Smart Object shows that item has
unacknowledged and/or active alarms and/or incidents. If the indicator pulses,
the equipment has alarms and/or incidents that are currently
unacknowledged.

46
Chapter 4 - Monitoring and controlling plant and equipment from maps

Figure 4-2: Smart Object icon with indicators

In Command Console, a Smart Object with a double circle shows related


content—for example, associated system displays, web sites, documents—
when clicked by an operator. The ability to automatically display related
content is known as single action callup.

Figure 4-3: Smart Object with single action callup

TIP: Single action callup is not available in Command Wall and


Command Station. In these clients, Smart Objects that have single
action callup are visually identical to regular Smart Objects.

Equipment status
Clicking a Smart Object displays the property panel, which shows control
icons (for doors), or the properties and associated values for other types of
equipment. The values displayed on the property panel are updated if they
change in the system.

47
Chapter 4 - Monitoring and controlling plant and equipment from maps

Figure 4-4: Smart Object property panel

TIP: For more information on points and point parameters, refer to the
EBI Operator's Guide.

The table below describes the property panel.

Item Description

1 Identifier. Name of the equipment item as defined in the Facility Model.

2 Incident/alarm indicator. Indicates that the equipment item has active alarms
and/or incidents; the indicator pulses if the alarm/incident is
unacknowledged. Clicking the indicator shows (or hides) the list of active
incidents or alarms.

3 Shows the current status of the point parameters for the equipment. Data
quality for the properties can be any one of the following:

l Good . The property can be modified.

l Bad . A red "X" is shown for the property value. The property cannot be edited
until the data quality is Good.
l Offscan . Scanning and/or control of the equipment item is disabled. The
property can be modified, but changes will not be committed until the
equipment is back online.
Properties that can be edited have a gray border.

4 Displays alarms/incidents raised on the equipment item. By default, the


alarm list is shown when the Smart Object is opened.

48
Chapter 4 - Monitoring and controlling plant and equipment from maps

Item Description

5 From left to right the toolbar contains the following icons:

l Links icon ( ). Displays links for associated content.

TIP: For more information on configuring links, see "Adding links to


maps and Smart Objects" on the next page.

l Incidents icon ( ). Displays active incidents for the equipment item.

l Alarms icon ( ). Displays active alarms for the equipment item.

Supervisory control
An operator with the appropriate scope of responsibility can perform
supervisory control; an operator who has View only privileges can only view
properties. Control actions must be confirmed by the operator. On
confirmation, the new value is submitted to the system for verification, and
then committed.
For more information on controlling plant and equipment, see "Controlling
plant and equipment" on page 57.

Camera Smart Objects


Camera Smart Objects on a map represent the cameras in the facility. Two
different camera icons may be used: one icon to represent static cameras, the
other to represent PTZ (pan-tilt-zoom) cameras:

Figure 4-5: Fixed (left) and PTZ (right) camera Smart Objects

The orientation of the camera image represents the direction the physical
camera is pointing in the “real world,” which provides a visual clue as to which
camera you might want to view video from in the event of an incident, for
example.
Clicking a camera Smart Object displays its camera video. Multiple camera
Smart Objects can be open at the same time.

49
Chapter 4 - Monitoring and controlling plant and equipment from maps

Figure 4-6: Open camera Smart Object

3 4

The table below describes camera Smart Objects.

Item Description

1 The toolbar (left to right) contains icons for controlling video, and displaying
links, incidents, and alarms.

2 Window showing the video (live or recorded) from the camera.

3 Name of the camera point as defined in the Facility Model. If the camera has
active alarms and/or incidents, an indicator is displayed.

4 From left to right, click to:

l Send the video to a DVM Console client.


l Detach the Smart Object from the map.
l Close the camera Smart Object.

For more information, see "Viewing camera video" on page 54.

Adding links to maps and Smart Objects


Links can be added to maps and Smart Objects at runtime to integrate content
from other sources, such as incidents, reports, dashboards, and so on.
If the content to be linked is relevant for the entire facility, add it to the Links
pane in the map workspace. If relevant only for a specific item of equipment—
to a camera or boiler, for example—add the link to the Smart Object.
Links can be removed when no longer required.

TIP: To edit a link, you must delete the link and then re-add it.

50
Chapter 4 - Monitoring and controlling plant and equipment from maps

Prerequisites
n You must have read and write access to the Facility Model.
n You must have a security level of MNGR or ENGR to perform these tasks.

To add links to the workspace

1. On the map workspace toolbar, click the Edit icon ( ).


The dialog box changes to Edit mode.
2. Click the plus (+) sign.
The Add Link dialog box is displayed.
3. Configure your link as required:

Option Description

To link to Tap or click the System Display tab, and then tap or
an click Create New Incident.
incident
without a Go to Step 4.
source or
location

To link to Tap or click the Web tab and then type a link name at
a the top of the dialog box. In the larger text box, type
Dashboar the following URL:
d
https:\\<server name>
/enterprisedashboard/dashboard/index.htm
l?pageId=<Dashboard
ID>&integration=contentOnly
Go to Step 4.

To link to Tap or click the Web tab and then type a link name
a at the top of the dialog box.
periodic
report in In the larger text box, type one of the following:
html or
PDF l https:\\<server name>/report/<report
format name>.asp (for HTML format)
l https:\\<server name>/report/<report
name>.htm (for PDF format)

51
Chapter 4 - Monitoring and controlling plant and equipment from maps

Option Description

Go to Step 4.

To link to Tap or click the Other display tab and then type a link
a name at the top of the dialog box.
summary
of all In the larger text box, type sysrptsummary.dsp
available and then go to Step 4.
reports

The URL options are:


l <server name> – name of the server
l <source name> – name of the source domain entity. The source is
the name of the domain entity on which the incident is raised—for
example, the name of the camera, door, break glass, and so on.
l <source location name> – name of the location that will
prepopulate the Incident Creation dialog box.
l <Dashboard ID> – unique identifier of the Enterprise Dashboard
page you want to link to. This identifier is displayed in the address bar
of the browser when you view the Enterprise Dashboard page.
l <report name> – name of the periodic report you want to link to.
4. Click Add .
5. Exit from Edit mode.

To add links to Smart Objects

1. On the map workspace toolbar, click the Edit icon ( ).


2. Click the Smart Object that needs the new link.
The Smart Object opens.

3. On the Smart Object window, click the Links icon ( ).


4. Click the plus (+) sign.
The Add Link dialog box is displayed.
5. Create the new link:
a. At the top of the dialog box, type a name for the link.
b. Click System Display, Other Display, or Web .
c. In the text box, type the URL, display name, and so on to link to the
content to be called up. Refer to the examples in the previous

52
Chapter 4 - Monitoring and controlling plant and equipment from maps

procedure.
For example, to create a link that calls up the Alarm summary, type
Alarm summary as the name of the link, and sysAlarmSummary
in the text box.
d. To add the link to all Smart Objects of the same type displayed on the
map, select the Add to all<Smart Object type> option.
e. Configure the Single Action Callup option:
l When this option is selected, content links are called up
automatically when an operator clicks the Smart Object. Smart
Objects configured to use single action callup have an extra circle
on the Smart Object icon to distinguish them from other Smart
Objects.
l When this option is not selected, content links must be called up
manually by clicking a link in a Smart Object’s Links pane.
6. To test the link, click Test Link.
7. Click Add .
The link is added to the Smart Object.

To delete links

1. On the map workspace toolbar, tap or click the Edit icon ( ).


The dialog changes to Edit mode.
2. Tap or click the minus (–) sign.
The system asks you to confirm the deletion.
3. Tap or click OK.
The link is deleted.

Monitoring plant and equipment


You monitor the operational status of plant and equipment by using Smart
Objects. For more information about Smart Objects, see "About Smart
Objects" on page 46.
For a visual description of Smart Objects, see the Legend section of the Help.
To view camera video, click a camera Smart Object; for more information, see
"Viewing camera video" on the next page

53
Chapter 4 - Monitoring and controlling plant and equipment from maps

To monitor plant and equipment


1. The following table describes how to monitor equipment.

To... Action

View Click the Smart Object to open the property


equipment panel.
properties
and status

View active
alarms and a. Click the Incidents icon ( ) or the Alarms icon
incidents ( ) on the Smart Object toolbar.
b. Click an incident to view the incident
workflow, or click an alarm to view the point
detail display.

View related
content a. Click the Links icon ( ) on the Smart Object
toolbar.
b. Click the content link you want.
Links configured with single action callup have a
blue indicator (Command Console only).
You can view system displays, other displays
(such as EBI schematics), and web sites and
pages.

TIP: On Command Console, clicking a


Smart Object that has single action callup
automatically displays related content. On
Command Wall and Command Station,
open the Smart Object’s Links pane and
then click the link you want.

Viewing camera video


Cameras in your facility are represented on maps as camera Smart Objects.
The direction of the camera image on the camera Smart Object icon indicates
the direction of the physical camera in the “real world” to improve your
situational awareness of camera coverage.

54
Chapter 4 - Monitoring and controlling plant and equipment from maps

NOTE: For more information about camera Smart Objects, see "About
Smart Objects" on page 46.

To view video from the camera, click the camera Smart Object.
A camera Smart Object will open only if it can do so without overlapping a
camera Smart Object that is already open; otherwise, the camera video
replaces the video in the existing open camera Smart Object.
By default, panning a map moves any camera Smart Object that is open. To
anchor the camera Smart Object, you can detach it from the underlying map.
If your site has licensed Honeywell DVM, you can send (that is, “throw”) the
video to Honeywell DVM Console.

55
Chapter 4 - Monitoring and controlling plant and equipment from maps

To view camera video


1. The following table describes how to view and control camera video.

To... Action

View video a. Click a camera Smart Object.


b. Use the Honeywell DVM video controls
as required.

Detach a camera a. Click a camera Smart Object.


Smart Object
b. Click the Detach video icon ( ).
c. Reposition the camera Smart Object as
required.

Send video a. Click a camera Smart Object.


content to
Honeywell DVM b. Click the Send video to DVM Console icon
Console ( ).
The video is displayed on the Honeywell
DVM Console display monitor.

From Honeywell a. In Honeywell DVM Console, click the


DVM Console,
locate a camera Locate camera on map icon ( ) on the
on the map video tile toolbar.
b. The map pans and centers the camera
Smart Object in the workspace, and the
camera Smart Object opens.

From Honeywell a. Open the incident in the Incident panel


DVM Console, and click the View video link.
view video for an
incident from Honeywell DVM Console shows video
nearby cameras (live or recorded) from the two cameras
located closest to the current incident.
(Applies only to incidents raised on
camera Smart Objects.)

56
Chapter 4 - Monitoring and controlling plant and equipment from maps

Controlling plant and equipment


You can control plant and equipment directly from Smart Objects. For
example, you can lock or unlock doors, adjust the set point of boilers, and so
on by modifying the equipment’s property values. The ability to control plant
and equipment from Smart Objects enables a faster response to rapidly
evolving situations.

TIP:
l Operators who have view or read-only SOR can only monitor

equipment status. For more information on how to monitor


equipment, see "Monitoring plant and equipment" on page 53.
l For more information on how to control cameras, see "Viewing
camera video" on page 54.

To control doors
1. Click the Smart Object for the door you want to control.
The Smart Object opens and shows the control action(s) available—for
example, Lock, Unlock, Auto , and so on.
2. Click the control action you want to perform.
The Smart Object icon is updated to show the door’s status.
3. Close the Smart Object.

To control other types of plant and equipment


1. Click the Smart Object for the equipment item you want to control.
The Smart Object Property panel shows the equipment properties.
Properties that can be modified have a gray box.
2. Click the property you want to modify.
The property box turns blue indicating the property is selected.

57
Chapter 4 - Monitoring and controlling plant and equipment from maps

3. Modify the property as required.


A property may have one of the following states:
l Grayed out - indicates the property is offscan. Offscan properties can
be edited, but changes are not committed until the plant or equipment
comes back online.
l X - indicates the property has bad data quality and cannot be edited.
l ? - indicates Unknown, where value data is never received by the
client.
4. Click the check mark to confirm the control action. (To cancel, click X.)

TIP: If you navigate away from the Smart Object before confirming
the control action, the change is not committed.

5. The system commits the change and raises an event.


If a change cannot be accepted, the property box displays a red outline,
indicating an error.
6. Close the Smart Object.

58
CHAPTER

5 USING STATION AND CUSTOM


DISPLAYS
Station displays are, in effect, a set of control panels through which you
monitor and control your system. The following topics describe how you call
up Station and custom displays and use them.

Calling up a Station display


Typically operator displays are listed on the View menu; however, any custom
displays for your site may be listed under a custom menu.

To call up a display
1. Click the View menu.
A list of displays appears. (The list also includes commands).
2. Click the item you want to view; for example Alarms.

TIP: If you know the name or number of a display, you can call it up
from the Command Zone. For example, to call up the numbered
display 145, type pag 145 and press ENTER. To call up a named
display primary, type primary and press ENTER.

System displays
Station includes many system displays, which are categorized as follows:

Display type Description

Detail Provides detailed information about a particular point. This


information includes current values, scanning, history and so on.

Trend Graphically displays changes in values, over time, of one or more


variables. Trends can be displayed in several ways, including lines
and barcharts.

Group Displays various types of information about related points on a


single display.

59
Chapter 5 - Using Station and custom displays

Display type Description

Summary Displays information, such as alarms and events, in list form. You
can display more details about an item in the list by clicking it.

Status Displays detailed status information about system equipment, such


as controllers and printers.

Configuration These displays are only used to set up your system. As an operator,
you may need to look at them, but you will probably not be able to
change them.

Calling up a web page or file in Station


In addition to calling up displays in Station, you may need to call up Web
pages and other files, such as Microsoft Word documents. Such pages and
files typically contain operating procedures.

ATTENTION: Station may have been configured so that you can only
call up authorized Web pages and files.

To call up a file
1. Click the Command Zone.
2. Type file://drive:\pathname\filename and press ENTER, where
drive:\pathname\filename is the name and location of the file.
For example, file://c:\procedures\proc7.htm.

To call up a web page


1. Click the Command Zone.
2. Type http://www.url.com and press ENTER where www.url.com is the
address of the web site.
For example, http://www.honeywell.com.

To call up an FTP site


1. Click the Command Zone.
2. Type ftp://ftp.xyz.com and press ENTER where ftp.xyz.com is
the address of the FTP site.

60
Chapter 5 - Using Station and custom displays

Printing Station information


At times you may want to print a 'snapshot' of a display, or whatever else is
shown in Station. In the case of a display, the snapshot shows the display's
values and status at the moment you issue the print command.

ATTENTION: Snapshots of summary displays can be printed at any


security level.

When you print a display:

n The Status and Alarm lines are printed, but not the Message Zone.
n If you print an HMIWeb display, only the visible portion of the page is
printed.

To print Station details


1. Do one of the following:
l Choose Action > Print.
The print occurs immediately on the Windows default printer on the
Station computer.
l Or choose Action > Print… .
The print dialogue box is displayed for the Windows printers on the
Station computer.
Select the printer appropriate for printing displays—not the system
alarm/event printer.
Check that the paper layout is set to 'landscape', so that the full display
screen width is printed without any cropping.
l Alternatively, you can choose Action > Print Preview to view the
snapshot before printing.

Understanding Station display objects


As you move around the displays, you will notice that they contain discrete
items such as buttons, check boxes and indicators—these are called display
objects. The following tables describe the main types of display object.

61
Chapter 5 - Using Station and custom displays

Display object Description

Alphanumeric. There are two types of alphanumeric:

l Read-only, which displays a numeric value (such


as boiler temperature) or text (a message or
status).
l Data-entry, which you can edit. For example, if the
alphanumeric represents a point's SP (set point)—
such as boiler temperature—changing its value will
change the boiler's temperature.
Note that abnormal values are displayed differently.
See "Abnormal alphanumeric value indication" on
the facing page.

Button. When you click a button, the system


performs a specified task, such as turning off a
motor or calling up another display.

Chart. Charts display real-time or historical


information in a graphical manner. Charts can
simultaneously display several types of information,
such as the temperature and pressure of a boiler.
Charts can also display information in the most
appropriate form, such as lines or bars.

If a chart is larger than its 'window', you can use the


scroll bars to move around the chart. For example,
if the chart is very long, moving the horizontal scroll
bar to the left or right moves the chart to the left or
right.

Check box. When you click a check box, you select or


clear an option. An 'x' in the check box indicates
that the option is selected.

62
Chapter 5 - Using Station and custom displays

Display object Description

Indicator. An indicator gives a visual indication of a


value, relative to its minimum and maximum values.

List. Contains a list of options. You display the list by


clicking the down arrow, and then select the
appropriate option by clicking it.

Abnormal alphanumeric value indication


Depending upon the configuration of your system, you may at times see an
alphanumeric display object change the display color of the point value, or
show other than a point value, such as dots or an ellipsis ('...'), question marks
('???????'), asterisks ('*******'), dashes ('-------'), or inverse video (for
example, white-on-black instead of black-on-white). These indicate an
abnormal condition, as explained in the following table:

ATTENTION: Should you happen to observe an abnormal condition,


and you do not know why it is occurring, report it to your supervisor or
an experienced colleague.

Abnormal
Color Condition
value

(truncated Any Display field too small for the value to display.
with ellipsis
…)

******* Red Display field configured incorrectly (for example, wrong


display type).

------- Red Display field configured incorrectly, source of data


unavailable (for example, control module not loaded), or

63
Chapter 5 - Using Station and custom displays

Abnormal
Color Condition
value

the parameter does not exist.

??????? Red Display field configured incorrectly (for example, not


enough characters for data value).

??????? or Gray Scanning of point currently disabled.


(last known
value)

??????? or Inverse Controller or channel currently disabled.


(last known
value)

Alarm state icons

TIP:
To display a visual guide for alarm state icons and priorities, click Help
on the map toolbar, and then click the Alarms and incidents tab.

The following table describes how alarm state icons change to reflect the
alarm state of the associated point.

If the icon looks like The alarm Its priority Its acknowledge
And it
this is is status is

Flashes Active Urgent Not acknowledged

Flashes Active High Not acknowledged

Flashes Active Low Not acknowledged

Flashes Inactive Urgent Not acknowledged

Flashes Inactive High Not acknowledged

Flashes Inactive Low Not acknowledged

Does not Active Urgent Acknowledged


flash

Does not Active High Acknowledged


flash

64
Chapter 5 - Using Station and custom displays

If the icon looks like The alarm Its priority Its acknowledge
And it
this is is status is

Does not Active Low Acknowledged


flash

Flashes - Disabled Not acknowledged

Alarming on the point is disabled.

Invisible The point is not in alarm.

Using content windows in Command Console


The following topics describe the behavior of content windows in Command
Console.

Understanding window behavior


Understanding the behavior of content windows in Command Console will
help you use the system more effectively.

TIP:
l This topic describes the default behavior of content windows in

Command Console—your system may behave differently. If this is


the case, ask a colleague or supervisor for details.
l Content windows in Command Wall use round robin and can be
pinned, if required.

For information about using content windows, see the topic "Controlling the
Command Console layout and content windows" on page 67.

About window layouts


The number of content windows that can be displayed at the same time is
configured by your system administrator. When a shift is started, any number
of content windows (up to the maximum number configured) may be visible.
If not all content windows are visible, clicking a link (from Station menus or
links on the map) displays the content in a new window. Once the maximum
number of windows is reached, the system displays new content using the
rules described in the sections below.

65
Chapter 5 - Using Station and custom displays

Round robin
By default, Command Console displays content in a “round robin” manner.
Round robin means that new content is displayed in the window that contains
the oldest content.

Target windows
By default, Command Console displays any content from a Station menu
option or link on the map in the target window.
To make a window the target, click the window title bar or inside the window
itself. A blue inner border appears around the content area to indicate the
window is now the target for new content.

TIP: Clicking the window toolbar does not make the window the target.

Only one window at a time can be the target.

Pinned windows
Pinning a window preserves content you want to persist by preventing its
contents from being replaced. For example, you can pin a window containing
the Alarm summary so that it is always visible.
To pin a window, click the pin icon ( ) in the left-hand corner of the window
title bar. The pin changes orientation to indicate the window is pinned ( ).
A pinned window cannot be the target window. Pinning the target window
automatically makes another window the new target window. Pinning a
window prevents the window from displaying content called up from external
links. Instead, clicking an external link will display the content in the target
window.
Navigating a display from within a pinned window (for example, by clicking a
link or button on a display) causes all navigation to occur within that content
window. However, if the content window contains a summary page (Alarm
summary or Event summary, for example), double-clicking an item displays its
associated display in the target window.

TIP: If a summary window is not pinned, double-clicking an item in the


summary will cause the window to become the target window and as a
result the summary will be replaced by the new content. To avoid this,
first pin the summary window, and then double-click the item you want.

66
Chapter 5 - Using Station and custom displays

The system does not allow all windows to be pinned, as this would prevent the
callup of new content.

Directing content to specific windows by using


parameters
You can direct content to a specific window by using parameters. For more
information, see the topic "Controlling the Command Console layout and
content windows" below.

Controlling the Command Console layout and content


windows

TIP:
l Your Command Console system may be configured to behave

differently than described in this topic. Consult your supervisor for


current information.
l If you rearrange the layout of content windows, you can restore the
original layout by right-clicking the Station icon in the Windows
notification area and choosing Restore to Windows Layout Preset.

When you call up displays, you can specify which content window will host the
display. For example, you can prevent new content from replacing a summary
display you want visible at all times, and direct new content to a specific
window.

TIP:
l Command Console content windows are identified with numbers in

the top-left of the title bar.


l This procedure applies to any type of page callup (such as
hyperlinks, HMIWeb buttons, automation rules, associated
displays, and so on) that takes a URL or a display name to perform
navigation by using a window parameter.

The table below describes how to control the window layout and content
windows.

Task Action

To Do either of the following:

67
Chapter 5 - Using Station and custom displays

Task Action

minimize/maximize
l Click the Minimize button to minimize Command Console to
the Command
the task bar.
Console application
l Click Maximize button in the task bar to restore Command
Console.

TIP: If you are using Honeywell DVM Console, it is not


affected by this operation.

To protect window Click the pin icon ( ) in the left-hand corner of the window
content title bar.

The window is taken out of round robin, and new content will
be displayed in a target window (unless you navigate within
the pinned window, or call up new content by using a
window parameter).

TIP: It is not possible to pin all the content windows as


this would prevent the system from displaying new
content.

To display new Click the window title bar or inside the window. New content
content in the will be displayed in the target.
window you want
TIP: A pinned window cannot be a target—you must
first unpin the window.

To specify a window In the Station command zone, type:


using parameters
displayname?window=number

where displayname is the name of the display and number


is the number of the content window.

For example:

l “sysAlarmSummary?window=0” calls up the display using


round robin; that is, new content is called up in the content
window that has the oldest content.
l “sysAlarmSummary?window=n” calls up the display in the
specified window; n can be any value from 1 to the number of

68
Chapter 5 - Using Station and custom displays

Task Action

windows configured.
l “sysAlarmSummary” calls up the display in the current
target window because no window parameter is specified.
More than one parameter may already be appended to the
display name/URL.; if so, the order of the parameters does
not affect the navigation result. For example,
displayname?param1=99&param2=100&window=3.

TIP: When using parameters, the window will display


the content regardless of whether the window is
pinned or not.

69
Chapter 5 - Using Station and custom displays

70
CHAPTER

6 USING POINTS

This section describes points and various methods you can use to control
points.

About points
A point is a collection of information about a particular part of your system. For
example, a point representing a motor would include:

n An ID, also known as a tag name , which uniquely identifies the motor.
n A description , such as 'Fan cool unit 1'.
n A full name . The full name indicates a point's location within the Facility
Model, for example, /Facility/Honeywell/Grnd
Floor/TempGuage1 indicates that the point named TempGuage1 is
assigned to the location named Grnd Floor which is itself assigned to
the location name Honeywell.
n The current state (off or on).
n The desired state . This is applicable if you are allowed to control the point.
For example, if current state of the motor is 'On' you can change the real
state of the motor to 'Off' using the display.

About point parameters


Each item of information about a point is called a parameter. The main
parameters store:

n The current value or state of the point (sometimes referred to as Point


Value or PV, or PointState).
n The desired value or state of the point (sometimes referred to as Set Point
or SP, or SetPointValue).
n The control state of the point, that is, whether the point is being
automatically controlled or manually controlled (sometimes referred to as
Mode or MD, or ModeState).
Not all points will have all of these parameters.

71
Chapter 6 - Using points

About locations
Locations can represent entities such as fixed plant equipment, materials, and
buildings. The Facility Model provides a hierarchical structure that resembles
your organization.
The points in your system belong to locations. For example, you might have a
location that represents a furnace in your plant. All the points associated with
the physical furnace (analog points measuring the temperature, status points
controlling valves or pumps associated with the furnace) might belong to the
location that represents the furnace.
The part of the system for which you are responsible can be controlled by
assigned locations to you or the Station you are using. In addition, where
locations have been assigned to you, the tasks that you can perform can also
be restricted. For example, you may have View access to a location in your
system. In this case, you can only view items associated with the location, you
cannot make any changes, such as acknowledging alarms or changing a
point parameter.

About Alarm Groups


The points in your system can be grouped together in an Alarm Group. The
points do not necessarily have to relate to one another as they do with
locations. For example, you may have an Alarm Group that groups together
all points controlling the pumps in your plant.
Alarm Groups provide an alternative view of the points and their alarms in the
Alarm Summary.
Alarm Groups have a Detail display, which provides alarm accounts for the
points within the Alarm Group.

Controlling points
You control your system by controlling points. For example, to turn off a
motor, you would set the appropriate parameter of the associated point to
“Off”.

TIP: If your system uses maps as a licensed option, you can control
your plant and equipment by using the Smart Objects. For information
on controlling plant and equipment using Smart Objects, see
"Monitoring and controlling plant and equipment from maps" on
page 43.

72
Chapter 6 - Using points

ATTENTION: The amount of control you have depends on several


factors, including your security level, and the way in which a point has
been configured. There are also several ways of controlling a point.
Consequently, you should ask your supervisor or an experienced
colleague before you attempt to control any point.

In some cases you may be required to provide either a single or double


electronic signature before making changes to control points.
You can control a point from:

n A point detail display


n A faceplate, if one has been configured for the point
n A custom display

To control
a point Do this
from

A Point In Station, double-click an associated display object—this calls up the


Detail Point Detail display for that point. You can then change parameter
display values.

A faceplate In Station, click an associated display object, such as an alphanumeric.


The faceplate pops up. You can then change parameter values.

A custom In Station, select an editable associated display object, such as an


display alphanumeric.

Example scenario: changing the value of a point from


the detail display
You want to switch off a fan for maintenance purposes. The point that controls
the fan you want to switch off is called fan_unit2 and it has the following
parameters:

n PV, which shows the current value of the point.


n OP, which is the parameter you use to control the point.
n MD, which shows the control mode of the point.

73
Chapter 6 - Using points

Solution
1. Navigate to the Point Detail display for fan_unit2.
2. If control mode (MD) of the point is set to AUTO , change it to MAN.
3. Change OP to Off.

TIP: If the fan has failed, you can disable the related point by
clearing the Scanning and Control Enabled check box to prevent
misleading error messages being generated.

Example scenario: changing the value of a point from a


display
You want to change the temperature of a room. The point that controls the
room temperature is called room1_temp. The point has the following
parameters:

n PV, which shows the current temperature


n SP, which you use to change the desired temperature
You are currently viewing a display which graphically shows the room as well
as labeled alphanumeric display objects for the parameters.

Solution
1. In Station, select the alphanumeric that shows the SP. (The object is
editable if the value appears in 'inverse video' when you select it.)
Information about the point, including its ID, appears in the Message
Zone.
2. Change the value by either:
l Typing the new value and pressing ENTER.
l Clicking toolbar buttons. Clicking (Raise ) or (Lower ). Each time
you click the button the value increases/decreases by a small amount.

Example scenario: changing the value of a point from a


faceplate
You want to turn on the lights in the south west corner of level one in your
building. The point that controls these lights is called Level1SWLights. The
point has the following parameters:

74
Chapter 6 - Using points

n Value, which shows the current status of the point, that is whether the
lights are on or off.
n Mode, which shows the control mode of the point.
A faceplate has been created for this point.

Solution
1. In Station, click an associated display object to call up the faceplate for
Level1SWLights.
2. Change Mode to Manual.
3. Change Value to On.

Disabling or enabling a point


You typically need to disable a point if the associated device is being serviced
or repaired—this prevents misleading alarms being generated. (When you
disable a point, the system stops gathering information about that point.)

ATTENTION: You can only disable SCADA points. Not all point types
can be disabled in this manner.

To disable a point
1. In Station, select an editable display object associated with the point—for
example, an alphanumeric that shows the PV. (The object is editable if the
value appears in 'inverse video' when you select it.)
Information about the point, including its ID, appears in the Message
Zone.
2. Click (Enable/Disable ).
The point's parameters turn gray to indicate that the point is disabled.

To enable a disabled point


1. In Station, select an editable display object associated with the point—for
example, an alphanumeric that shows the PV. (The object is editable if the
value appears in 'inverse video' when you select it.)
Information about the point, including its ID, appears in the Message
Zone.
2. Click (Enable/Disable ).

75
Chapter 6 - Using points

About Electronic Signatures


As a security measure, certain types of messages and control point changes
may require confirmation with either one or two electronic signatures.
When an electronic signature is required, an Electronic Signature dialog box
appears. You may, in some cases, need to select a reason for the response or
action from a predefined list. Optionally, you may also add a comment in the
dialog box. Note however, that once you click the Sign button, the reason and
comment cannot be modified or deleted.
For some highly critical actions, two electronic signatures may be needed. In
the case of a double signature requirement, the Electronic Signature dialog
box displays two tabs — one for the Primary signature, and the other for the
Secondary signature. The minimum control (or security level) and the location
assignment required by either signer is displayed on their respective tabs.

Figure 6-1: Electronic Signatures - dual signature requirement

The secondary signature must be different from the primary signature and
must be made by an individual with the appropriate security level.

Controlling points requiring Electronic Signatures


Certain point control operations may require either single or double
signatures before they can be made. In addition, general control confirmation
should also be captured.

76
Chapter 6 - Using points

If a single signature is needed, you must have the appropriate control level to
perform the task. A control level can be any number from 0 to 255. Only an
operator who has a control level that is equal to or higher than the point's
control level can control that point. When you attempt to make a change to a
point, the minimum control or security level required is shown in the Electronic
Signature dialog box. If a secondary signer is also required, the dialog box will
contain two tabs, one for each of the signers. The required security level of the
second signer is shown in the Secondary signature tab.

To sign with a single electronic signature


1. When the Electronic Signature dialog box appears, select a predefined
reason from the Reasons list (if applicable).
2. Type your user name if required.
3. Type your password.
4. Select your domain, if required.
5. Type any additional information under Comments.
6. Click OK.
A confirmation is sent to the controller and the change takes place. An
event is generated recording your name and other information about the
action, such as date and time.

To sign with a double electronic signature


1. When the Electronic Signature dialog box appears, select a predefined
reason from the Reasons list (if applicable) in the Primary signature tab.
2. Type your user name, if required.
3. Type your password.
4. Select your domain, if required.
5. Type any additional information under Comments.
6. Click Sign .
Your signature is locked in and cannot be changed.
7. Click the Secondary signature tab.
The secondary signer must have a different user name from the primary
signer and must have the a security level equal to or higher than level
displayed in the Secondary signature tab.
8. The secondary signer types their user name, domain, and password.
9. Any additional information, if required, is added in Comments.

77
Chapter 6 - Using points

10. Click OK.


A confirmation is sent to the controller the change is made. Events are
generated recording the names of the signers together with other details.

78
CHAPTER

7 DISPLAYING DETAILED POINT


INFORMATION
This section describes how you can display detailed point information.

About Point Detail displays


A Point Detail display shows the current value of each parameter for a
particular point.
You can also use a Point Detail display to disable the point or change
parameter values, providing you have the required security level.
Point Detail Displays have a standardized layout, as shown in the following
figure.
The Face Plate is designed to look like a traditional panel instrument, and
shows the main parameters for the point.
The other parameters are shown to the right of the Face Plate, and are
grouped according to tab. For example, to see the alarm-related parameters,
click the Alarms tab.

Calling up a Point Detail display


There are several ways of calling up a Point Detail display.

79
Chapter 7 - Displaying detailed point information

If your system uses DSA or point servers, information on some points you
may need to access is stored on remote computers. As a result, the first time
you call up the point's details you may need to type the full point ID. After this,
using part of the point ID produces a matching point.

To call up a detail display for a point associated with a


display object
1. Click the display object to select it.
2. Click the (Detail) toolbar button to call up the associated Point Detail
display.
Alternatively, you can double-click the display object.

To call up a detail display for the point in the Alarm


Line
1. Select the alarm associated with the point.
2. Click the (Detail) toolbar button.

To call up a detail display for a point whose ID (or the


first part of it) you know
1. Type all or part of the point ID in the Command Zone, and then click the
(Detail) toolbar button.
2. If you typed only part of the ID, a list of matching points (and other items)
appears. Double-click the required point name.

To call up a detail display for a point whose full name


(or the first part of it) you know
1. Type all or part of the full name in the Command Zone, and then click the
(Detail) toolbar button.
2. If you typed only part of the full name, a list of matching points (and other
items) appears. Double-click the required point name.

80
Chapter 7 - Displaying detailed point information

Displaying point history

To see changes to a point's PV (present value) over


time
1. Display the point's Detail display.
2. Click the History tab.
This tab contains a set of History buttons.
3. Select the appropriate graphing options. For example, to see changes at
minute intervals, select 1 minute from the Interval list.

Displaying Recent Events


You can see recent events for a point.

TIP: If no recent events are listed, you should check that the browser
on the Station client is configured correctly. For details refer to the topic
“Cannot call up recent events” in the Diagnostics Guide.

To see a list of recent events of a point


1. Display the point's Detail display.
2. Click the Recent Events tab.
This tab displays a list of recent events for the point.

About faceplates
Some points can be controlled from a faceplate. A faceplate is a specialized
type of popup window that shows critical information about the point to which
the object is linked. In most cases, a faceplate is similar to the left-hand portion
of the matching point detail display.
Each Station can have a total of four faceplates, or popup windows, or a
combination of both, visible at the same time. For example, if there are
already three faceplates and one popup window visible, when you call up
another faceplate the oldest faceplate (or popup) is replaced.
When you first call up faceplates, they are positioned in the bottom right-hand
corner of your monitor. You can move the faceplates by clicking and dragging
the faceplate to another position. Next time you call up the faceplate, the last
position is remembered.

81
Chapter 7 - Displaying detailed point information

If you want faceplates to remain visible while you navigate to other displays,
click the pushpin . Faceplates that have been 'pushpinned' are not replaced
if you call up more faceplates.
You can tell if a display object on a custom display has a faceplate associated
with it because the mouse pointer changes to a hand when you move the
mouse over the object. If you click the display object the faceplate for that
point opens. You can then change parameter values from the faceplate.

Using Group Detail displays


A Group Detail display shows the main parameters for a set of up to eight
related points. The information is presented using faceplates. A faceplate is a
specialized type of popup window that shows critical information about the
point to which the object is linked. In most cases, a faceplate is similar to the
left-hand portion of the matching point detail display.
Each group is identified by a number, and generally has a descriptive title.

To call up a group detail display by choosing it from list


of groups
1. Choose View > Groups to see the list of groups.
2. Select a group.

82
Chapter 7 - Displaying detailed point information

To call up a group detail display whose number you


know

Figure 7-1: Typical Group Detail display

1. Click (Group ).
2. If required, you can display the group's trend by choosing the option from
the View As list.

Using Quick Lists


A quick list lists the main parameters of a group of related points. For
example, a quick list could show the current value of every temperature
sensor in a building.
If a suitable quick list does not exist, use the Quick View display.

To call up a quick list


1. Choose Configure > Operating Displays > Quick Lists to call up the Quick
Lists display.
2. Click the Quick List you want to see.
3. If you want to see more information about a particular point, click it to call
up the point detail display.

83
Chapter 7 - Displaying detailed point information

Using the Quick View Display


You can use the Quick View display to quickly see the main properties of a
range of related points.
If you enter only the first part of the name in your search, all matching points
are found. For example, 'Floor1' will find 'Floor1MainDoor', 'Floor1SideDoor'
and so on.
You can use wildcard characters (* and ?) in your search. An asterisk (*)
represents one or more unknown characters, whereas a question mark (?)
represents one unknown character. For example:

n '*Door' will find all points that end with 'Door', such as 'Floor1MainDoor',
'Level2SideDoor' and so on.
n 'Floor?MainDoor' will find points 'Floor1MainDoor', 'Floor2MainDoor' and
so on.

To use the Quick View display


1. Choose View > Quick Views to call up the Quick View display.
2. Type your search criteria in Search for and then click Go .
3. If you want to see more information about a particular point, click it to call
up the point detail display.

Using trend displays


A trend display shows changes in point parameter values over time. Typical
uses of trend displays are to show changes in room temperature or power
consumption over the day.
Trends can display data in several ways, including:

n Line graphs (the default)


n Bar graphs
n Numerical list of historical data
n X-Y plot of the value of one point against another (that is, one point on the
x-axis and the other on the y-axis)
Each trend is identified by a number, and generally has a descriptive title.

84
Chapter 7 - Displaying detailed point information

To call up a trend by choosing it from a list of trends


1. In Station, choose View > Trend Summary to see the list of trends.
2. Select a trend.

To call up a trend whose number you know

1. In Station, click (Trend) in the toolbar.


2. In the Command Zone, type the trend's number and press ENTER.

Trend buttons reference


Having called up a trend, you use the various buttons on the trend display to
modify it. The following table describes each button.

Button Description

Individual scales in EU

Scaling used in the trend is separate for each point and is


in engineering units.

Click the arrow to change the scale.

Individual scales in %

Scaling used in the trend is separate for each point and is


shown as a percent.

Click the arrow to change the scale.

Single scale for all plots

The range displayed on the Y-axis is the same for all plots.

Plot selector

Indicates the plot that is currently selected, or if no plot is


currently selected, indicates the last plot you selected. If
you are not using a single scale for all plots, the Y-axis
displays the scale for the plot that is shown in the box.

Display as bar graph

The selected point is displayed as a bar graph. Data for the


remaining points is obscured by the bar graph.

85
Chapter 7 - Displaying detailed point information

Button Description

Click the arrow to change from a bar graph to a line graph.

Display as line graph

The plots are displays as line graphs.

Click the arrow to change from a line graph to a bar graph.

View trend only

Indicates the current view is a trend without the event pane


or the tabular history pane.

Click the arrow to change the view to Trend with Events or


Trend with Tabular History

View trend with tabular history

Indicates the current view is the trend with the tabular


history pane.

Click the arrow to change the view to Trend Only or Trend


with Events.

View trend with events

Indicates the current view is the trend with the event pane.

Click the arrow to change the view to Trend Only or Trend


with Tabular History.

Show legend

Shows or hides the legend for this trend.

Configure trend

Calls up the Trend Configuration display.

Save trend

Saves any changes you have made to the trend. After you
save, the changes are made available to any other
operators viewing the trend.

Pause live updates

Pauses the trend so that data is not updated. A trend is

86
Chapter 7 - Displaying detailed point information

Button Description

automatically paused when you zoom in and out.

Resume live updates

Restores the trend so that it is updated with live data.

Remove reference line

Removes the reference line.

Reset zoom level

Resets the zoom level.

Zoom in

Zooms in by 25% of the visible range. If a reference line is


visible, the zooming is centered around the reference line.

Zoom out

Zooms out by 25% of the visible range. If a reference line is


visible, the zooming is centered around the reference line.

Show time selector

Shows the time selector and provides options for the


position of the time selector which is used to set a history
offset.

Some trends operate in a different manner to the default trend; these are the
X-Y trends. You can modify these trends by changing the:

n Period
n History offset
n Scale to use engineering units or percentage
n Points

87
Chapter 7 - Displaying detailed point information

Changing the scale on a trend


When viewing a standard trend, you can change the scale that is used for the
trend. For example, you can switch from having a single scale for all plots to
individual scales, in engineering units, for each plot. The figure below shows
the scale options available in a list which you can access from the trend
toolbar.

Figure 7-2: Scale options for a standard trend

To specify an individual scale


1. Call up the trend.
2. Click the arrow on the scale toolbar button at the top of the trend.
The button shown depends on the type of scale currently in use for the
trend.
3. Select the required individual scale.
4. In the Low Scale box on the legend, type the low scale value for each plot.
5. In the High Scale box on the legend, type the high scale value for each
plot.

To specify a single scale


1. Call up the trend.
2. Click the arrow on the scale toolbar button at the top of the trend and
select Single scale for all plots.
The button shown depends on the type of scale currently in use for the
trend.

88
Chapter 7 - Displaying detailed point information

3. On the y-axis, type the low and high scale value.

Scale options
The following table describes all the scale options available for a standard
trend.

Scale
Description
option

Individual You specify the maximum and minimum value that will be shown on
scales in the trend for each plot individually. Values that fall outside this scale
EU are not visible in the trend.

The scale is represented in engineering units.

Individual You specify the maximum and minimum value that will be shown on
scales in % the trend for each plot individually. Values that fall outside this scale
are not visible in the trend.

The scale represents the point parameter range in percentage terms. A


scale of 0% to 100% shows the full range of the point parameter and
correlates to the minimum and maximum value for the point
parameter. You may want to increase or decrease the scale, depending
on the range of your point and the actual historical values of the point.

Single scale One scale is used for all points in the trend. You specify the maximum
for all plots and minimum value that will be shown on the trend. Values that fall
outside this scale are not visible in the trend.

Auto scale Adjusts the selected plot so that it is centered vertically in the chart and
current plot scaled such that the plot uses most of the vertical chart space.

Auto scale Adjusts all plots that are currently visible so that they are centered
all plots vertically in the chart and scaled such that each plot uses most of the
vertical chart space.

Scale to The scale is set so that it correlates with the maximum and minimum
point point parameter range of all points in the trend and is shown in
ranges in engineering units.
EU

Scale to The scale is set so that it correlates with the maximum and minimum
point point parameter range of all points in the trend and is shown in
ranges in percentage terms. The minimum point parameter value is always 0%
% and the maximum point parameter value is always 100%.

89
Chapter 7 - Displaying detailed point information

Scale
Description
option

Revert to The scale options is restored to what was last saved for the trend. Any
saved changes to the scale that were not saved are removed.
ranges

Viewing events on a trend


You can view events with your trend to help you analyze the relationship
between alarms and events and changes in point values in your trend.
When viewing events, an Event Summary is added beneath the chart area of
the trend and markers appear on the chart area of the trend to identify when
events occurred.
The Event Summary on the trend display can be filtered in the same manner
as the standard Event Summary.
It is important to note that the Event Summary shows events from the local
server only. Distributing all events would need significant bandwidth as most
events are recorded only on the server where the point is defined. The
exceptions to this are the Acknowledgement events and Point Change
events, which are recorded on both the server where they occurred and on
the data owner.

To view events with your trend


1. Call up your trend display.
2. Click the View trend with events button.
3. Filter the Event Summary as required.

TIP: If you find a correlation between an event and changes in


values in the trend, you can add comments to the event.

Changing the period on a trend


To change the period, you specify the length of time, for example, 2 hours,
and then specify which 2 hours you want to see.
You specify a period that either:

n Starts at a specific date and time by showing the time selector on the left.
n Ends at a specific date and time, by showing the time selector on the right.

90
Chapter 7 - Displaying detailed point information

n Starts and ends at a specific date and time by showing the time selector
on the left and right.
n Is centered around a specific date and time by showing the time selector
at the center.

To change the period on the trend you are viewing


1. In the Period box, select the period you want to see on your trend.
2. Click the Time selector and choose the required position of the selector.
3. In the Date box, type or select the required date.
4. In the Time box, type the required time and press ENTER.

Zooming in on a trend display

To zoom in on a trend
1. Move the pointer to, for example, the top-left of the area of interest, and
then drag the pointer diagonally down to the bottom-right.
As you drag, a rectangle shows the area you are selecting.
2. Release the mouse button when the rectangle encloses the area of
interest—the trend now zooms in on this area.
3. To zoom back out to the trend's normal scale, click the button at the
bottom-right of the trend.

TIP: You can also use the Zoom in button to zoom in on a trend.
The zoom button centers the trend around the reference line. If
there is no reference line, the trend is zoomed around the center of
the chart.

Highlighting a plot on a trend


You can highlight a plot to make it easier to see against other plots on a trend.
Highlighting a plot makes the plot line bold.
Some functions work on a single plot, in which case you must highlight the
particular plot to apply these functions; for example, to show a plot as a bar
graph.

91
Chapter 7 - Displaying detailed point information

To control the highlight of a plot on a trend


1. Do one of the following:
l In the plot list above the chart area, select the box to the left of the trend
name. (To remove the highlight, select the check box again.)
l In the legend, select the Pen check box for the trend plot. (To remove
the highlight, clear the check box.)

92
CHAPTER

8 RESPONDING TO ALARMS

An alarm is generated whenever an abnormal condition or security breach


occurs. Alarms are typically associated with points—for example, the value of
an analog point representing a temperature sensor, may be above or below
the acceptable range. These types of alarms are known as 'process' alarms
because they are associated with the process you are monitoring and are
displayed only on the Alarm Summary.
Alarms may also be generated when any important event occurs, such as a
communications failure. These types of alarms are known as 'system' alarms
because they are associated with components that form your system. These
alarms are displayed on the System Status display.

TIP:
l The Alarm box in the Status Bar flashes red if there are any

unacknowledged alarms.
l The System box in the Status Bar flashes cyan if there are any
unacknowledged system alarms.

Viewing alarms
You can use the Alarms summary to view a list of the alarms in your system. If
your system uses maps, any new alarms raised by the system are displayed
as an alarm indicator on the relevant Smart Object. The alarm indicator
continues to pulse until the alarm is acknowledged.

Figure 8-1: Alarm indicator on Smart Object

The alarm icon on the map toolbar shows the total number of active,
unacknowledged alarms in the system. The indicator animates up and down if
there is at least one alarm in the system that has not been acknowledged.

93
Chapter 8 - Responding to alarms

Figure 8-2: Alarm icon showing alarm count

For a visual description of alarm indicator colors and priorities, click Help >
Alarms and incidents on the map toolbar.

To view alarms
1. Do one of the following:

Client Action

Command On the map toolbar, tap or click the Alarms icon (


Wall ).

Command In the Alarms summary, double-click an alarm to


Console call up the associated display (typically a point
detail display).
Command
Station

Station On the Station menu bar, tap or click the Alarms


icon ( ) on the Station menu bar.

In the Alarms summary, double-click an alarm to


view details.

The Alarm indicator in the Status Bar flashes red


to show the system has unacknowledged alarms.

The System indicator in the Status Bar flashes


blue to show the system has unacknowledged
system alarms.

To view alarms on map Smart Objects


1. Tap or click the Smart Object that has an alarm indicator.
2. Tap or click the Alarms icon ( ) on the Smart Object toolbar.
3. Tap or click an alarm in the list to call up the associated display for the
point in alarm.

94
Chapter 8 - Responding to alarms

Calling up the Alarm Summary


Alarms are listed on the Alarm Summary, which provides a one-line
description of each alarm.
An alarm is considered to be a repeat alarm if the source, condition, and
parameter are the same. If a repeat alarm occurs, the repeat is not added as
another entry in the summary. Instead, the alarm details of the original alarm
are updated to show the details of the latest occurrence of the alarm. The
number of occurrences of the alarm and the time of the original alarm are
shown in the Details pane of the alarm.

To call up the Alarm Summary


1. Click the (Alarm Summary) toolbar button. (Alternatively, choose View >
Alarms from the menu.)

Figure 8-3: Alarm Summary

To display the Details pane, click (Show details pane) on the Alarm
Summary toolbar.

Alarm Summary columns


The table below describes the default alarm line items, starting from the left.

95
Chapter 8 - Responding to alarms

TIP:
l The alarm colors described below are the default alarm colors.

Your system may use custom alarm colors.


l When a function is disabled, the original icon shape is retained, but
the symbol changes to a minus sign and its color changes to gray.

Alarm line item Description Disabled

Red and flashing: the alarm is urgent


priority, unacknowledged and the cause of
the alarm still exists.

Red and not flashing: the alarm is urgent


priority, acknowledged and the cause of the
alarm still exists.

Inverse color and flashing: the alarm is


urgent priority, unacknowledged and the
cause that generated the alarm no longer
exists.

Yellow and flashing: the alarm is high


priority, unacknowledged and the cause of
the alarm still exists.

Yellow and not flashing: the alarm is high


priority, acknowledged and the cause of the
alarm still exists.

Inverse color and flashing: the alarm is high


priority, unacknowledged and the cause that
generated the alarm no longer exists.

Cyan and flashing: the alarm is low priority,


unacknowledged and the cause of the alarm
still exists.

Cyan and not flashing: the alarm is low


priority, acknowledged and the cause of the
alarm still exists.

Inverse color and flashing: the alarm is low


priority, unacknowledged and the cause that
generated the alarm no longer exists.

96
Chapter 8 - Responding to alarms

Alarm line item Description Disabled

Questionable alarm. The state of an existing


alarm is unknown because communications
with the source of the alarm have been lost.

The alarm is urgent priority, has been


responded to and the cause of the alarm still
exists.

The alarm is urgent priority, has been


responded to, the cause of the alarm no
longer exists and is waiting to be reset.

The alarm is high priority, has been


responded to and the cause of the alarm still
exists.

The alarm is high priority, has been


responded to, the cause of the alarm no
longer exists and is waiting to be reset.

The alarm is low priority, has been


responded to and the cause of the alarm still
exists.

The alarm is low priority, has been


responded to, the cause of the alarm no
longer exists and is waiting to be reset.

The alarm is urgent priority, has been


shelved and the cause of the alarm still
exists.

Inverse color indicates the alarm has


returned to normal.

The alarm is high priority, has been shelved


and the cause of the alarm still exists.

Inverse color indicates the alarm has


returned to normal.

97
Chapter 8 - Responding to alarms

Alarm line item Description Disabled

The alarm is low priority, has been shelved


and the cause of the alarm still exists.

Inverse color indicates the alarm has


returned to normal.

Ghost alarm.

The system uses this icon when there is no


active alarm to indicate that the point is in a
state where alarms are disabled.

Date & Time The time and date at which the alarm was
received.

Location The tag name of the location to which the


point or device belongs.

Source The point or device that caused the alarm.

If the point ID is too long to be fully


displayed in the alarm summary, it is
truncated. To see the full name place the
mouse pointer over the partial point ID to
display the full point ID.

Condition The alarm condition.

Priority The priority of the alarm. The prefix letter


indicates the general priority:

l Urgent
l High
l Low
If a number follows the letter, it represents
the relative priority within the general
priority. For example, Urgent alarms can
vary from U15 (most urgent) to U00 (least
urgent).

Description A description of the alarm.

If the description is too long to be fully

98
Chapter 8 - Responding to alarms

Alarm line item Description Disabled

displayed in the alarm summary, it is


truncated. To see the full description place
the mouse pointer over the partial
description to display the full description.

Trip Value The value that triggered the alarm.

Live Value The current value. This value is continually


updated.

Units The unit that the value represents, for


example ml/s.

Changing what is shown in the Alarm Summary


and the System Status display
ATTENTION: Depending on your security privileges, you may not be
able to filter and sort the Alarm Summary or the System Status display.
The options that are not available to you are disabled and are dimmed.

By default, the Alarm Summary and the System Status display show all
alarms with the newest alarm at the top. You can change this by applying
filters and sorting the summary.
Filtering allows you to show alarms that match the filter criteria and hide
alarms that do not match the filter criteria. For example, you can filter to show
alarms:

n Of a particular priority only.


n For a particular location only on the Alarm Summary.
n For a particular piece of equipment on the System Status display.
You can also filter by most columns in the summary.
Sorting allows you to set the order in which alarms appear. The sort order can
be ascending or descending. For example, you can sort alarms by date and
time, in ascending order. This means that alarms are listed in order of
ascending date and time, that is, the oldest alarm is listed at the top of the
summary.

99
Chapter 8 - Responding to alarms

You can apply more than one filter at a time and you can also filter and sort at
the same time. When the Alarm Summary is filtered or sorted, the column by
which you are filtering or sorting is highlighted.

Using the Location pane on the Alarm Summary and


the System Status display
The Location pane on the Alarm Summary provides a tree view of locations to
which you, or the Station you are using, have been assigned. The Location
pane on the System Status display provides tree views of your system
components.
You can use the Location pane to filter the Alarm Summary and the System
Status display to show alarms for:

n A particular location
n An Alarm Group
n A particular piece of equipment
Using the Location pane, you can easily see the highest priority alarm(s) as
well as the number of alarms for each item in the hierarchical trees.

To show the Location pane


1. Choose one of the following:

l Click the Show Location Pane icon .

l Click the Location list and click the push pin to dock the
Location pane .

To hide the Location pane


1. Choose one of the following:

l Click the Hide Location Pane icon .

l Click the Close icon in the Location pane .

To filter using the Location pane


1. Show the location pane if it is hidden.
2. Expand the location tree to locate the item by which you want to filter.

100
Chapter 8 - Responding to alarms

3. Click the required item(s).


Alarms are filtered to show any alarms for the selected item(s).

TIP: Use SHIFT+click to select multiple items in a successive list.


Use CTRL+click to select multiple items not in succession.

Using column filtering and sorting on the Alarm


Summary
On the Alarm Summary display, you can use the filters available for each
column to change which alarms are included in the current view.
Each column also has sorting options that you can use to arrange the values
displayed in that column in either ascending or descending order.

TIP: When you change the current view by applying a column filter or
clearing all filters, an asterisk is displayed beside the name of the view
currently selected for the Alarm Summary to indicate that the current
view has been modified.

Prerequisites
n You have called up the Alarm Summary.

To filter the display of alarms on the Alarm Summary


1. Click the column heading that you want to filter by. For example, to filter
the Alarm Summary according to:
l When the alarm occurred, click the Date & Time column
l Whether the alarm has been acknowledged or not, click the alarm icon
column (at the very left of the Alarm Summary)
l Alarm priority, click the Priority column
A drop-down list of filter options is displayed.
2. Click the filter that you want to apply.
When you click a filter:
l The column heading that you are filtering on changes color.
l The words (Filter applied) appear at the top of the Alarm
Summary to the left of Clear All Filters.

101
Chapter 8 - Responding to alarms

l A check mark is shown beside the filter option you have chosen.
l The alarms included in the Alarm Summary change to show only those
alarms that match the filter criteria.

TIP: You can filter on multiple columns at the same time. For
example, you can filter the Alarm Summary to show only urgent
alarms that occurred today by choosing Urgent as the filter for the
Priority column, and then choosing Today as the filter for the Date &
Time column.
Note that you can apply multiple filters in some columns. For
example, when filtering by priority, you can click the Urgent filter
and then subsequently click the High filter to have both filters
applied.

To remove column filtering


1. To remove individual filters, click the appropriate column heading to show
which filter is (or which filters are) currently applied in that column, and
then click the filter you want to remove.
Clicking a selected filter, removes the check mark beside that filter option
to show that the filter is no longer applied, and changes the Alarm
Summary display accordingly.
2. To remove all current column filters, click Clear all Filters.
Clearing all filters, removes any column filters applied to the Alarm
Summary and removes the (Filter applied) indication at the top of
the Alarm Summary beside Clear All Filters.

TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating that the view has been modified.

To sort the display of alarms


1. Click the column heading you want to sort by.
2. Select the sort order (Sort Ascending or Sort Descending ).
The display changes to arrange the values in that column in the selected
order, and the arrow icon in the column heading indicates the sort order
for that column.

102
Chapter 8 - Responding to alarms

TIP: Note that the Priority column shows the priority in the format
H, U, or L, and shows the sub-priority in the form of a number from
00 to 15 where 00 is the lowest and 15 the highest sub-priority.

Example scenario: Filtering


You want to filter the Alarm Summary so that you see unacknowledged
alarms of urgent and high priority only.

Solution
1. Call up the Alarm Summary display.
2. Click the Priority column and select both Urgent and High .
3. Click the “alarm state icon” column and select Unacknowledged .
The Alarm Summary changes to show only unacknowledged alarms of
urgent or high priority.

Example scenario: Sorting


You want to sort the Alarm Summary so that alarms are sorted in ascending
order by value.

Solution
1. Call up the Alarm Summary display.
2. Click the Value column to display the “filter and sort” list.
3. Select Sort Ascending .
The Alarm Summary changes to list alarms in ascending order according
to the value.

Using views within the Alarm Summary


You can change how information is displayed in the Alarm Summary by
applying a different view. A view contains the information about filtering and
sorting, which alarm line items are shown, the order they are shown in, and
the space provided for each item.
There are several predefined views:

103
Chapter 8 - Responding to alarms

n (all alarms) shows all alarms


n (unacknowledged alarms) shows only unacknowledged alarms
n (urgent and high priority alarms) shows only alarms of urgent and high
priority
n (urgent priority alarms) shows only alarms of urgent priority
There may be other views that have been configured for your system. Ask
your supervisor or an experienced colleague about other views and the
information they display in the Alarm Summary.

To apply a view
1. Click the View list.
A list of view options is displayed in a drop-down list.
2. Click the view that you want to use for the Alarm Summary.
The alarms listed in the Alarm Summary display change to show only
those alarms that meet the criteria for the view you chose. For example, if
you chose the (unacknowledged alarms) view, the Alarm Summary now
only shows unacknowledged alarms.

TIP: If you choose a view and subsequently apply a column filter


(or clear all filters), an asterisk is displayed beside the name of the
view to indicate that the currently selected view has been modified.
An asterisk is also displayed beside the name of the view if you
change the column configuration of the Alarm Summary (for
example, when you add or remove columns).
If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating that the view has been modified.

Using the details pane on the Alarm Summary


The Details pane shows the details of the currently selected alarm. If no alarm
is selected, the details pane is empty.
If the selected alarm is for a point, the details pane also provides links to the
point detail display and associated display.

104
Chapter 8 - Responding to alarms

To show or hide the Details pane

1. Click the Details pane icon .


The Alarm Details pane appears at the bottom of the Alarm Summary.

Navigating the Alarm Summary


There are several ways to scroll the list of alarms on the Alarm Summary. You
can:

n Use your mouse and click on the scroll bar


n Use your mouse wheel (if your mouse has one)
n Use the Up and Down arrow keys on your keyboard
n Press the PAGE UP and PAGE DOWN keys to scroll a page at a time
n Press the HOME key to go to the first alarm in the summary
n Press the END key to go to the last alarm in the summary
If you want to use your keyboard keys or mouse wheel to scroll the Alarm
Summary, you may need to click your mouse in the summary grid to give it
focus.

Pausing the Alarm Summary


You can pause the Alarm Summary to make it easier to read if alarms are
occurring in rapid succession. When the Alarm Summary is paused, no new
alarms are added to the summary. However you can still acknowledge
alarms, and you can filter and sort the summary. Alarms that are
acknowledged and have returned to normal while the summary is paused are
shown with a strikethrough.
If an alarm has been replaced in the alarm list by a more recent instance, the
alarm time will be shown with a strikethrough only. The old time will be
retained to keep the alarm's position in the alarm list from changing. The
alarm icon and priority fields will update to reflect the new alarm. The live
value column operates as normal.

To pause the Alarm Summary


1. On the Alarm Summary display click Pause .

105
Chapter 8 - Responding to alarms

Resetting the Alarm Summary

A Reset View button ( ) is available on the toolbar of the Alarm Summary


display. When you click the Reset View button, the default summary view is
loaded. For example, it will load the All alarms view. It will also reset all filters
and column positions back to default settings.

To reset the Alarm Summary


1. On the Alarm Summary toolbar, click Reset View.
2. Acknowledge the Yes/No warning message displayed at the top of the
summary display.

Viewing extended alarm messages


Extended alarm messages can provide procedures that must be performed,
or actions that you must take, when a point goes into alarm.

To view extended alarm messages


1. In the Alarm Summary, if the Comments Added column is not visible, click

the Column Organizer and then click the Comments Added check box
and click OK.
2. Click the Comments Added column and choose With Comments Added .
The Alarm Summary is filtered to show only alarms with comments
added.
3. Click the alarm that has the extended message you want to view.

4. If the Details pane is not visible, click the Details button .


5. In the Details pane, click the Comments tab.
The extended alarm message is shown in the Existing comments box.

Acknowledging alarms
In most systems, Station produces an alarm tone when a new alarm occurs.
(Your system may be configured not to do this.)
There are several ways of silencing or acknowledging alarms:

106
Chapter 8 - Responding to alarms

To Do this

Silence the Either:


tone

l Click the (Alarm Acknowledge) toolbar button.


l Press the appropriate key—see "Shortcut keys for a 12-function
keyboard" on page 274.

Acknowledge a Either:
particular
alarm on the
Alarm l Select the alarm and click the (Alarm Acknowledge) toolbar
Summary button.
l Right-click the alarm then select Acknowledge.

Acknowledge Click the Acknowledge Page button on the display.


all alarms
currently Note that if there are any more unacknowledged alarms in the list
visible on the not currently visible, you first have to display them by scrolling the
Alarm Alarm Summary before clicking the Acknowledge Page button again.
Summary

Acknowledge
all alarms on a Call up the faceplate for the point and click the (Alarm
particular Acknowledge) button on the faceplate.
point

Shelve an To shelve an alarm, right-click the alarm and choose either Shelve
alarm on the Alarm or Quick Shelve. Alternatively, you can use the Shelve Alarm and
Alarm Quick Shelve buttons at the bottom of the Alarm Summary.
Summary Depending on how your system has been configured, quick
shelving may not be enabled.

When you shelve an alarm it is silenced, acknowledged, and


removed from the normal view of the Alarm Summary. However,
alarm messages will still be shown on the Message Summary.

Unshelve an Select the (shelved alarms) view, select the alarm you want to
alarm on the unshelve and click the Unshelve Alarm button. The alarm disappears
Alarm from the (shelved alarms) view and, if it is still active, returns to the
Summary normal alarm views.

107
Chapter 8 - Responding to alarms

Shelving an alarm
Shelving an alarm allows you to temporarily hide a distracting/nuisance alarm.
When you shelve an alarm it is silenced, acknowledged, and removed from
normal view.
However, alarm messages, if configured, are still shown on the Message
Summary. Also, further instances of the same alarm are combined with the
existing shelved alarm, which continues to remain shelved.

ATTENTION: Shelving relies on items having valid timestamps, so


shelving alarms with an 'Unknown ' timestamp is not supported.

A shelved alarm is automatically unshelved at the end of the shelving period,


which depends on a number of factors, such as the reason it was shelved.
Alternatively, you can manually unshelve it before the shelving period has
expired.

To shelve an alarm for the default time and reason


1. Call up the Alarm Summary.
2. Select the alarm you want to shelve.
3. If the Shelve Alarm button is available, you can click this button to perform
a quick shelve.
The selected alarm is shelved for the default time and reason that is
configured on the shelving configuration page.
If the Shelve Alarm button is not available, there may be several reasons,
which can include quick shelving has been disabled, the default shelve
time is greater than the remaining shift duration, or you don't have
adequate permissions. If the Shelve Alarm button is not available, try using
the procedure below.

To shelve an alarm for a specified time and/or reason


1. Call up the Alarm Summary.
2. Right-click on the alarm you want to shelve, and choose the Shelve Alarm
command.
The Shelve Alarm dialog box appears.
3. In the Reason for shelving list, select the reason for shelving the alarm.
4. If you do not want to use the default shelving period, in the Shelving period
list, select a shelving period.

108
Chapter 8 - Responding to alarms

5. If you want to automatically unshelve the alarm if it returns to normal,


select the Unshelve if the alarm returns to normal check box.
a. Enter the number of seconds (maximum 65,535 seconds, or 18:12:15
hrs) in the Unshelve delay on return to normal box to specify the
amount of time after which the alarm will be unshelved, once it returns
to normal.
This helps to prevent nuisance alarms cluttering the display. See the
topic titled "Considerations for configuring an alarm unshelving delay"
for more information.
6. If appropriate for the alarm, in the Comments box, type your detailed
reason for shelving the alarm.
7. Click OK.

To unshelve an alarm
1. Call up the Alarm Summary.
2. Select the (shelved alarms) view.
3. Select the alarm you want to unshelve.
4. Click the Unshelve Alarm button.

Considerations for configuring an alarm unshelving


delay

Overview
There may be times when distracting or nuisance alarms are cluttering your
display and you choose to shelve an alarm for a specified period. If that alarm
returns to normal at any time during the shelving period, the alarm is
unshelved. New alarms for the same point would appear on the Alarm
Summary. This is usual behavior for alarm shelving.
However, sometimes a point will trip an alarm and return to normal multiple
times in a short period. In the above scenario, you would have to repeat the
steps to shelve the alarm each time it appears, causing extra and
unnecessary workload. In these circumstances, you can choose to require
that the alarm must return to normal for a minimum amount of time before it is
unshelved. This is known as configuring an alarm unshelving delay.

109
Chapter 8 - Responding to alarms

Example 1: Alarm unshelving delay is disabled


In this example, the Unshelve if the alarm returns to normal check box is
selected, but the delay time is set to 0.
The figure shows the profile of a point in alarm. The operator shelves the
alarm on the first instance, but almost immediately it returns to normal and is
unshelved. Five seconds later, the point returns to alarm and reappears on
the Alarm Summary. The operator would need to shelve the alarm again.

Figure 8-4: Alarm unshelving delay is disabled

Example 2: Alarm unshelving delay is set for 10


seconds
In this example, the Unshelve if the alarm returns to normal check box has a
value of 10 seconds. This means that the alarm must return to normal for 10
seconds before it will be unshelved.
The figure shows the same profile of a point in alarm as in Example 1. The
operator shelves the alarm on the first instance of the alarm and defines an
unshelving delay of 10 seconds. The alarm returns to normal for five seconds,
but is not unshelved because it did not meet the minimum delay of 10
seconds. When the alarm trips again, it does not appear in the Alarm
Summary because it is still shelved.

110
Chapter 8 - Responding to alarms

Again the alarm returns to normal for 5 seconds, and again it remains
unshelved.
Only after the alarm returns to normal for the third time does it meet the 10
second delay and is unshelved.

Figure 8-5: Alarm unshelving delay is 10 seconds

Adding comments to an alarm


If required, you can add comments to alarms in the Alarm Summary. For
example, you might need to keep a record of your actions in response to an
alarm.

To add a comment to an alarm


1. Select the alarm to which you want to add a comment.
2. If the Details Pane is not visible, click (Show Details Pane ).
3. Click the Comments tab.
Any existing comments that are added to the alarm are displayed.
4. Type in your comment and click Save Comments.

111
Chapter 8 - Responding to alarms

Viewing an alarm video clip


If your EBI has the Honeywell Digital Video Manager installed as part of the
system, you will be able to view any video clip that may be linked with an alarm
or event.
A video icon in the first column of the Alarm Summary indicates that a video
clip is linked to the alarm.

To view an alarm video clip


1. Double-click the video clip icon ( ) associated with the alarm listed in the
summary.
The video clip associated with the alarm will be displayed in a popup
window.

Alarm Management Options


You may have one of two types of alarm management options—your
supervisor or an experienced colleague will know which type you use. The
alarm management options are:

n Three-stage Alarm Handling.


n Structured Response Management.

Using Three-stage Alarm Handling


With Three-stage Alarm Handling, you cannot respond to an alarm until the
point that caused the alarm has returned to the non-alarm state.

Responding to an alarm involves the following stages


1. Acknowledging the alarm
2. Following the appropriate set of instructions
3. Responding to the alarm

To acknowledge and respond to an alarm


1. Acknowledge the alarm—see "Acknowledging alarms" on page 106.
The Alarm Instructions display appears, which contains instructions for
dealing with that alarm.

112
Chapter 8 - Responding to alarms

The Alarm Response display appears, which lists a number of standard


responses.
2. Click the Acknowledge button to complete the acknowledgment task.
3. Follow the procedures listed on the Alarm Instruction display.
4. After you have carried out the instructions, click the Respond button.
The Alarm Response display appears, which lists a number of standard
responses.
5. Click the Accept Response button that best describes what you actually
did. Alternatively, if you responded in a non-standard manner, type an
appropriate note in the Operator Definable Response field, and then click
its Accept Response button. (It is good practice to keep the note short
because only the first 30 characters appear in the Event Summary.)

Using Structured Response Management


With Structured Response Management, responding to an alarm involves:

1. Following the alarm instructions for the alarm.


2. Acknowledging the alarm.
3. Entering your response to the alarm.
4. Resetting the alarm to remove it from the Alarm Summary.

To acknowledge an alarm
1. Acknowledge the alarm—see "Acknowledging alarms" on page 106.
The Alarm Instruction display appears, which contains instructions for
dealing with that alarm.
The Alarm Response display appears, which lists a number of standard
responses.
2. Click the Acknowledge button to complete the acknowledgment task.
3. Follow the procedures listed on the Alarm Instruction display.
4. After you have carried out the instructions, click the Respond button.
The Alarm Response display appears, which lists a number of standard
responses.
5. Click the Accept Response button that best describes what you actually
did. Alternatively, if you responded in a non-standard manner, enter an
appropriate note in the Operator Definable Response field, and then click
its Accept Response button. (It is good practice to keep the note short
because only the first 30 characters appear in the Event Summary.)

113
Chapter 8 - Responding to alarms

In the Alarm Summary, the alarm icon changes to an asterisk (*) as


described in the section "Calling up the Alarm Summary" on page 95.
6. Click the Reset button on the Alarm Instruction display when the point that
raised the alarm has returned to its normal state.

Acknowledging alarms from the Alarm Banner


This topic is only applicable if your system has been configured to use an
Alarm Banner.
The Alarm Banner can display up to five alarms, and you can move it to
wherever you want on the screen. You can perform the same alarm
acknowledgement tasks using the Alarm Banner as you can using the Alarm
Summary.

To acknowledge an alarm from the Alarm Banner


1. If the Alarm Banner is not visible, click the Alarm Banner button on the
toolbar.

TIP: If you want the Alarm Banner to always be visible, click the
(Push Pin), otherwise it will close when you call up another display.

2. Select the alarm and click the Alarm Acknowledge button.


3. If you want to acknowledge all alarms currently visible in the Alarm
Banner, click the Acknowledge Pane button.

Alarm list overflow


The alarm list (which contains alarms that are shown in the Alarm and
System) has a limit of 4000 alarms. When this limit is reached, an event is
logged in the Event Summary.
When this limit of 4000 alarms has been reached, this is known as an Alarm
list overflow state. This is considered an abnormal situation that may occur
after a network failure when the system is flooded with alarms, or during the
commissioning of the system.
While in this state, older alarms are selectively removed to make way for new
alarms/events as they are generated; these removed alarms are known as
discarded events. Also, 'Overflow' appears in the appropriate Status Bar box
to indicate that an alarm has been removed to make way for the new alarm
and a DISCARDED event appears in the Event Summary.

114
Chapter 8 - Responding to alarms

In addition to the alarm overflow indicator, a Recover Alarms button will


appear on the corresponding summary display. If an alarm overflow occurs on
a server, all connected Console Stations will also display the OVERFLOW
indication and the Recover Alarms button.

What happens when you click the Recover Alarms


button?
Clicking the Recover Alarms button will cause a confirmation message to
appear in the message zone of the Station screen. If the operation is
confirmed, the server attempts to recover any alarms it discarded during
overflow.
Some notifications are not recoverable, such as ones that have returned to
normal or most local system alarms.

ATTENTION: Notifications coming in as a result of the alarm recovery


operation may cause the Alarm Summary to overflow again. Steps
should be taken to reduce the number of active alarms prior to
attempting recovery.

115
Chapter 8 - Responding to alarms

116
CHAPTER

9 RESPONDING TO SYSTEM
ALARMS
The System Status display is similar to the Alarm Summary; however, the
System Status displays show system alarms for system components only.
You can use the System Status display to:

n Check the status of components to verify they have been configured


correctly and are operating correctly.
n Respond to system alarms such as:
l Communications failures
l Station failures
l Operator logon failures
l Printer failures

To acknowledge system alarms from the System


Status display
1. Navigate to the System Status display by doing one of the following:
l Click the System icon ( ) on the menu bar or map toolbar, and then
click System Status.
l Click the System box in the Status bar.
l Choose Menu > View > System Status.
2. Click a component in the Location Pane where alarms are occurring to
filter the list of alarms.
3. Click the alarm in the list of alarms, and then click the (Alarm
Acknowledge ) button.

Components of the System Status display


There are several parts that make up the System Status display. The
following figure shows the parts of the System Status display.

Figure 9-1: System status display components

117
Chapter 9 - Responding to system alarms

You can show or hide all of the panes, except for the Results pane. The
Results pane is always visible.

Location pane
The Location pane on the System Status displays has a hierarchical tree
which shows all of the EBI related components such as servers, Stations,
channels, and controllers.
You can expand and collapse the trees as required to navigate to the
component to check its status or to view alarms associated with the
component. If you double-click a component, the status detail display for that
component is opened.
The Location pane can give you the following status information:

n The number of alarms for each type of component


n The alarm state of the most important alarm for each type of component
n The status of each component

118
Chapter 9 - Responding to system alarms

Figure 9-2: Location pane

Status pane
The Status pane is similar to a faceplate and provides graphical information
about the status of the item you have selected in the Location pane so that you
do not have to navigate away from the System Status display and lose view of
other system alarms. The status pane shows a subset of the information that
is contained in the detail display for the item you have selected in the Location
pane. The exact information shown in the Status pane is different for each
type of component; the type of information available in the status pane can be:

n Alarm state of any alarms raised on the component (as well as an alarm
acknowledge button)
n The current state of the component
n Connection status
The Status pane is empty if you do not have an item selected in the Location
pane.

119
Chapter 9 - Responding to system alarms

Figure 9-3: Status pane, showing typical status information

Results pane
The Results pane shows any alarms for the component that you have
selected in the Location pane. It is similar to the Alarm Summary. You can
acknowledge alarms from the Results pane in the same way you
acknowledge alarms in the Alarm Summary.

Figure 9-4: The Results pane

Details pane
The Details pane shows more details of the alarm you have selected in the
summary. If no alarm is selected the Details pane is empty.

120
Chapter 9 - Responding to system alarms

Figure 9-5: Details pane

System Status icons reference


The table below describes the icons on the System Status display.

Icon Description

Failed

Something has gone wrong with the component and it has stopped
working. Further investigation is required to find out why the component
has failed.

Marginal

The component is partially functional. Further investigation is required to


find out what is going wrong with the component to prevent a complete
failure.

OK

The component is functioning correctly.

Disabled

The component is either not configured, not yet enabled, or has been
switched off.

Unknown

The status of the component cannot be determined.

None

The component does not support reporting its status.

121
Chapter 9 - Responding to system alarms

122
CHAPTER

10 WORKING WITH INCIDENTS

An incident is any event that could result in the loss of—or disruption to—facility
operations, services, or functions. An incident can range from a visitor slipping
on a wet floor to a major crisis involving multiple response teams.
Incident Workflow enables security operators and facility management
operators to respond to incidents using predefined workflow steps that are
tailored to the efficient handling of different types of incidents. Incidents can be
created manually by an operator or automatically by the system.
When all mandatory steps in the incident workflow have been performed, the
incident is complete and is closed by the operator.

TIP: Incident Workflow is a licensed option. If this option does not


appear in your system—or if the option is disabled—consult your
supervisor.

Understanding the incident lifecycle


An incident has several stages in its lifecycle:

1. Incident creation
2. Incident ownership
3. Incident response
4. Incident analysis

Incident creation
Incidents can be created in the system either manually by an operator, or
automatically by the system in response to an alarm or event:

n Manual creation. When an incident occurs, the operator is notified by


telephone, email, or some other means. Based on the type of incident, an
operator creates an incident in the system. Based on the incident type, the
system assigns the appropriate workflow.

123
Chapter 10 - Working with incidents

n Automatic creation. The system is configured to detect any abnormal


condition in the facility and generate an alarm. The alarm is configured to
create an incident automatically and make the appropriate incident
workflow available to an operator.

Incident ownership
An operator must take ownership of an incident before they can perform any
of the steps in the incident workflow. Taking ownership of an incident prevents
other operators from performing steps in that incident’s workflow; however,
non-owners can add comments to steps in the workflow if required. An
operator can take over ownership from a different operator if they have
identical or higher permissions. An operator can relinquish ownership of an
incident at any time so that a different operator can work on it.

TIP: If you are not the owner of an incident, you can view incident
details such as incident steps, authorized step actions, and the Close
incident button, but these features are disabled.

Incident response
Responding to an incident involves performing the steps in the incident
workflow; the steps can be performed in any order. Some steps in the
workflow might be mandatory, and some might be optional. An incident
cannot be completed and closed until all mandatory steps have been
completed; the Close incident button is disabled until all mandatory steps are
performed.
You may need to perform some workflow steps manually, while other
workflow steps may be performed by the system when you authorize the step.
For example, locking or unlocking a door—or directing a camera towards a
specific location—are both actions the system can perform to reduce the time it
takes to complete and close an incident. These steps are known as
authorized steps because they require the operator to authorize their
execution; automated steps are performed by the system automatically
without any operator authorization.

TIP: To perform an authorized step, you must have write access to the
location to which the incident is assigned.

Performing workflow steps creates an event in the system to enable auditing


during incident analysis.

124
Chapter 10 - Working with incidents

Incident analysis
Personnel with the appropriate privileges can generate incident reports to
assist with incident analysis. Incident Workflow can generate the following
types of reports:

n Incident Detail report


n Incident Summary report
n Incident Summary report by time

Viewing incidents
If your operator interface includes maps, you have an at-a-glance visibility of
the open incidents in your system and their location; open incidents are
incidents that have workflow steps that have not been performed. If you do
not have maps, use the Incidents summary for an overview of the open
incidents in your system.
The incident count on the incident icon on the map toolbar shows the total
number of open incidents in the system.

Figure 10-1: Incident indicator

Operators are notified of new incidents when an incident indicator appears on


a map (if the incident is raised manually by another operator) or on a Smart
Object (if the system automatically generates an incident when an item of
plant or equipment goes into alarm).

Figure 10-2: New incident on Smart Object

Because new incidents do not have an owner, the incident indicator animates
up and down for better visibility. The priority shown by the animated incident
count indicates the priority of the highest incident that is unowned.

125
Chapter 10 - Working with incidents

TIP: For a visual description of incident icon colors and associated


priorities, choose Help > Alarms and incidents on the map toolbar.

Incidents are removed from view when they are closed and completed. You
can access closed incidents by running a report.

To view incidents
1. To display the Incidents summary, click the Incidents icon ( ) on the
menu bar or map toolbar. Open an incident item to view the incident
details.

To view incidents on map Smart Objects


1. Tap or click a Smart Object that has an incident indicator.
The Smart Object opens.
2. Tap or click the Incidents icon ( ).
A list of incidents is displayed.
3. Tap or click an incident in the list to display the incident workflow.

To navigate from an incident to its location on a map


1. Tap or click the Incidents icon ( ) on the map toolbar to open the Incidents
pane.
2. Tap or click the incident you want.
3. Tap or click the arrow icon ( ) to navigate to the location of the incident on
the map.
The map pans and zooms to the incident location.

About viewing incidents


You can view open incidents in the system on the Incidents summary, the
Incidents pane, and from open Smart Objects.
The table below describes the incident information recorded in the system.

Item Description

ID Identification number (system-generated). The ID can be used in


reporting to retrieve details of a closed incident.

126
Chapter 10 - Working with incidents

Item Description

Shows incident priority and incident description:

l — Urgent

l — High

l — Low
The icon pulses if there is at least one incident in the system that
does not have an owner.

It is mandatory to specify a description.

Date and time ( Time at which the incident was created.


)

Location Location where the incident occurred as defined in the facility


model.

If the incident has been generated on a Smart Object, you can click
the navigation arrow ( ) to pan and zoom the map to the incident
location.

TIP: If DVM Console is licensed, you can click View video to


display video on DVM Console from the two cameras that are
closest to the incident.

ATTENTION: If you create an incident manually, you must


specify a location. Incidents generated by the system are
assigned a location automatically.

Source If the incident is created automatically by the system from an alarm,


the point name is shown. If created manually, the name of the
location where the incident occurred is shown.

Owner ( ) Name of operator who owns the incident.

Incident ownership is controlled from the incident details pane.

Progress Number of steps completed out of total number of workflow steps—


for example 2/11.

127
Chapter 10 - Working with incidents

Creating incidents
When an incident is reported, you manually enter information about the
incident into the system.

TIP: Incidents arising from alarms are created automatically.

To create incidents
1. On the map workspace toolbar, tap or click the Incidents icon ( ).
The Incidents pane is displayed.
2. Click the add (+) icon at the top of the pane.
The Select Incident Type dialog box appears.
3. Click the type of incident you want to create; for example, Asset
Damage.

TIP: To search for a specific type of incident, type the first letter of
the incident type in the Search Incident Types box, then select the
incident type you want.

The Create New Incident dialog box appears and the default priority
selection (Low) is highlighted.
4. Select a Priority (if you want to use a different priority than the default).
5. Type a Description and select a Location from the list.

TIP:
l Providing a description is mandatory. The system displays a

notification if you try to save an incident that does not have a


description.
l You must have write access to the location where you want to
create the incident.

6. Click Create .
The incident item is displayed in the list. (In Station, the incident also
appears on the Incidents summary page.)

TIP: You must take ownership of an incident in order to work on it.


However, non-owners can add comments to incidents.

128
Chapter 10 - Working with incidents

Assuming or relinquishing ownership of incidents


The system supports the following ownership actions for incidents:

n Taking ownership . If an open incident is associated with a location that lies


within your SOR, you can take ownership of the incident. Only the owner
of an incident can respond to, complete, and close the incident. An
incident can have only one owner at a time.
Other operators can add comments to workflow steps in incidents they do
not own, but they cannot execute workflow steps.
n Relinquishing ownership . Giving up ownership of an incident allows a
different operator to assume ownership to work on the incident.
n Override an existing ownership . If your security level is equal to or greater
than an incident’s current owner, you can override their ownership to
allow you to work on the incident. Overriding an existing ownership allows
you to complete incidents that were previously owned by a different
operator.
Incident ownership actions are recorded as comments on the incident Activity
tab and as events in the system log.

TIP: You can use the Incidents summary to view ownership of


incidents that are assigned to a location within your SOR.

To assume or relinquish ownership of incidents


1. Navigate to the details of the incident you want to action, and do one of the
following:

Task Description

Take ownership Tap or click Respond Now.


of an
unassigned Your user name is displayed in the text box
incident and your ownership is recorded on the
Activity tab.

Override an Tap or click X by the current owner’s user


existing name, and then click Continue in the message
ownership box.

TIP: The original owner of the incident

129
Chapter 10 - Working with incidents

Task Description

is notified their ownership has been


overridden.

To relinquish Tap or click X by your user name.


ownership
The Respond Now button is displayed,
indicating the incident now has no owner.

TIP: The incidents indicator on the


Station status bar flashes if the system
has at least one unowned incident.

Responding to incidents
Responding to an incident involves completing steps within an incident
workflow. The steps in a workflow are either mandatory or optional. Workflow
steps can be completed in any order. All mandatory steps in a workflow must
be completed before the incident can be completed and closed. Closed
incidents are removed from the Incidents summary and the Incidents pane.
You can only respond to incidents that you own. Operators who are non-
owners of an incident can add comments to steps in the incident workflow, but
cannot execute steps or mark them as complete. Only the owner can
complete and close an incident.

Prerequisites
You have claimed ownership of the incident.

To respond to incidents
1. In Station, click the Incident icon ( ) in the toolbar, or the Incidents
indicator on the status bar.

TIP: You can also click the Incidents icon in the map workspace
toolbar or (for system-generated incidents) click the incident in an
open Smart Object.

130
Chapter 10 - Working with incidents

2. Click the incident you want.


The Incident details pane is displayed, showing the incident name in the
title banner and the workflow. If you do not own the incident, the workflow
is disabled.
3. Review any activity for the incident by clicking the Activity tab.

TIP: If comments have been added to the incident, an indicator (a


blue dot) is shown on the Activity tab. The Activity tab lists activity
for this incident on a timeline; the most recent activity is at the top of
the list.

4. Perform the actions specified in the steps. You can complete the steps in
any order. The workflow step icons are described in the table below.

Option Description

Execute. Executes the authorized step (write access is


required to the incident location).

Mandatory step. An asterisk (*) by the step number


indicates that the step must be completed in order to
close the workflow.

Comment. Displays a text box to allow comments for


the step.

A comment can contain a maximum of 135


characters. A user can post multiple comments for
the same step.

A blue dot indicates that an operator who is not the


owner of the current incident has added a comment
to the step.

Information. Displays additional information for


completing the step (if configured).

Print. Generates the Incident Details report.

The Print icon is located at the top of the incident


details pane.

TIP: For more information about exporting

131
Chapter 10 - Working with incidents

Option Description

incident details, see the "Exporting incident


details" on the facing page.

As you complete steps, the system logs user name, action, and time.

ATTENTION: Steps marked with an asterisk (*) are mandatory;


performing other steps is optional. All mandatory steps must be
executed to complete and close the incident.

ATTENTION: Steps with an Execute icon are authorized steps,


which can only be performed by an operator who has write access
to the incident location. Clicking Execute causes the icon to
animate to show the authorized step is being processed. The
system displays a message to indicate the status of the step
execution.

ATTENTION: Executing any authorized step, regardless of its


success or failure, generates an event in the Event Summary.
Because the system does not notify you if an authorized step fails
to execute, after performing an authorized step you should check
the Event Summary to see the event log of authorized steps and
execution results.

5. Click the Comment icon and add any comments or outcomes you want to
record for the step. Any spelling mistakes are highlighted
6. Click the circle for the step to indicate the step is complete.

TIP: You can re-execute a step by clicking the circle again.

7. Repeat steps 4–6 to execute all steps.


As you perform the steps, the incident’s progress indicator is updated.
Any operators viewing the same incident can see your actions in real-time
as you respond to the incident.

132
Chapter 10 - Working with incidents

8. After completing all the incident workflow steps, click Close .

TIP: If you have failed to perform any steps that are mandatory, the
Close button is disabled. If you want to cancel the actions you have
performed on the incident, click Cancel.

The incident is removed from the list.

Reviewing incident activity


All actions that operators perform on workflow steps are recorded by the
system for auditing and analysis purposes. The activity stream for an incident
is available (only for review) on the incident Activity tab.

TIP: Although only the incident’s owner can complete workflow steps
for that incident, other operators can add comments to workflow steps
and review incident activity performed by other operators. The ability to
capture comments and review incident activity helps to improve
awareness of incident response techniques on site.

To review activity for an incident


1. Navigate to the incident for which you want to review activity.
The incident details pane is displayed.
2. Click the Activity tab.

TIP: A blue dot on the Activity tab indicates that a non-owner


operator has added a comment to a step in the current incident.
The commented step is identified by a blue dot in the activity
stream.

The activity stream for the incident is displayed, showing actions


performed for this incident, identified by user name and time, with the
most recent action at the top.

Exporting incident details


You can export details of an incident by using the Incident Details report. You
can email the report by attaching the generated PDF file.

133
Chapter 10 - Working with incidents

TIP: You must have administrator-level privileges to print Incident


Workflow reports.

To export details of an incident


1. Click the Incidents icon ( ) on the map workspace toolbar, and then click
the incident you want.
The incident details pane is displayed.
2. Click the Print icon ( ) at the top of the incident details pane.
The report is generated and printed.

Canceling incidents
In certain situations—for example, if different operators have created incidents
for the same event, or if the system raises multiple alarms that result in
multiple incidents—you can cancel unwanted incidents.

TIP: You must own the incident you want to cancel.

To cancel incidents
1. On the Incidents summary or Incidents pane, tap or click the incident you
want to remove.
2. If required, assume ownership from the current owner, and then click
Respond Now.
3. Select Remove incident.
4. In the Comments text box, type the reason the incident is being removed.
5. Click Complete incident.
The incident is removed from the system.

134
CHAPTER

11 RESPONDING TO EVENTS

An event is any significant change in the system, and includes alarms and
operator actions.

Calling up the Event Summary


An event is any significant change in the system, and includes alarms and
operator actions.

To call up the Event Summary


1. Choose View > Events > Event Summary.
If events are shared over DSA, the Event Summary shows events from all
servers. If events are not shared only events on the local server are
shown.

TIP: You can also call up the Event Summary by clicking Events on
the System Menu.

Events are listed in chronological order, starting with the most recent
event. The display is automatically updated, which means that each new
event appears at the top of the list.
2. If you want stop new events from being added to the display—this makes it
easier to read the events if events are occurring in rapid succession—
change the Date & Time filters from All Recent Events - Live to Today
(snapshot) .
If the point ID or Description has been truncated, move your mouse
pointer over the point ID or description to display the full point ID or
description.

Event Summary columns


The following table describes the default event line items, starting from the
left.

135
Chapter 11 - Responding to events

TIP: To add columns other than these to the current display, click the
Show column organizer icon to display the full list of available columns,
and then select those you would like included.

Column Description

Date & Time The time and date at which the event was received.

Location The tag name of the location to which the point or device belongs.

Source The point or device that caused the event.

If the point ID is too long to be fully displayed in the alarm summary,


it is truncated. To see the full name place the mouse pointer over the
partial point ID to display the full point ID.

Condition The event condition.

Action The action, either operator or system generated.

l ACK. Alarm acknowledged.


l ACK PNT. All alarms on a point acknowledged at the same time. That
is, the user has selected an object on a schematic and pressed the Ack
key. Each alarm that was acknowledged is journaled, as is the
summary ACK.PNT event. For example, for a point with PVHI and
PVHIHI alarms active, three events are journaled: ACK for PVHI,
ACK for PVHIHI, and the ACK PNT summary.
l DISCARD. Alarm discarded due to alarm list overflow.
l OK. Alarm returned to normal.
l SHELVE. Alarm shelved.
l UNSHELVE. Alarm unshelved.
l Blank. No action has occurred.
Priority The priority of the event. The prefix letter indicates the general
priority:

l Urgent
l High
l Low
l Journal

136
Chapter 11 - Responding to events

Column Description

If a number follows the letter, it represents the relative priority within


the general priority. For example, Urgent alarms can vary from U15
(most urgent) to U00 (least urgent).

Description A description of the event.

If the description is too long to be fully displayed in the event


summary, it is truncated. To see the full description, place the mouse
pointer over the partial description to display the full description.

Value The value of the event.

Units The unit that the value represents, for example ml/s.

Changing what is shown in the Event Summary


ATTENTION: Depending on your security privileges, you may not be
able to filter and sort the Event Summary. The options that are not
available to you are disabled and are dimmed.

Using the Location pane on the Event Summary


The Location pane on the Event Summary provides a tree view of locations to
which you, or the Station you are using, have been assigned. For example,
you can use the Location pane to filter the Event Summary display to show
events for:

n A particular location.
n Report requests.
n Operator activity on or within a specific location.
Using the Location pane, you can navigate the hierarchical trees to see the
associated event(s) for each location.

137
Chapter 11 - Responding to events

To show the Location pane use either method


1. Choose one of the following:
l Click the Show Location Pane icon .
l Click the Location list and click the Push Pin ( ) to dock
the Location pane .

To hide the Location pane use either method


1. Choose one of the following:
l Click the Hide Location Pane icon .
l Click the Close icon in the Location Pane .

To filter using the Location pane


1. Show the location pane if it is hidden.
2. Expand the location tree to locate the item by which you want to filter.
3. Click the required item(s).
Events are filtered to show any events for the selected item(s).

TIP: Use SHIFT+click to select multiple items in a successive list.


Use CTRL+click to select multiple items not in succession.

Using column filtering on the Event Summary


Filtering the Event Summary allows you to show events that match the filter
criteria and hide events that do not match the filter criteria. For example, you
can filter the Event Summary to show events that occurred on a particular
day, or you can filter the Event Summary to show events related to a
particular location only.
You can apply more than one filter at a time and you can also filter and sort at
the same time. When the Event Summary is filtered or sorted, the column by
which you are filtering or sorting is highlighted.
You can change the Event Summary to show all events for the current day
and for each of the last seven days using the Date & Time filter. You can also
do a custom time-based filter.

138
Chapter 11 - Responding to events

To filter the Event Summary


1. Call up the Event Summary display.
2. Click the column heading you want to filter by.
3. Select the filter you want to apply.

TIP: When viewing the live events from the temporary event file (all
recent events with live updates) you can only filter on the Location,
Priority, and Category columns. All other filter menus are disabled.
If you want to filter on the other columns you need to change the
Date & Time filter to something other than (all recent events - live).

To remove column filtering


1. Click Clear all Filters.
Any column filters applied to the summary display are removed.

TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating it that the view has been modified.

Example
You want to filter the Event Summary so that you see
events that occurred yesterday.

l Call up the Event Summary display.


l Click the Date column and select Yesterday. The summary changes to
show all events that occurred yesterday.
The Event Summary changes to show events that occurred yesterday
only.

Using views within the Event Summary


You can change how information is displayed in the Event Summary by
applying a different 'view'. A view contains the information about filtering and
sorting, which event line items are shown, the order they are shown in and the
space provided for each item.
Predefined views include:

139
Chapter 11 - Responding to events

n (all recent events with live updates) —(default view) shows events as they
are occurring.
For performance reasons there is limited filtering capabilities in the default
view, and you cannot sort the default view.
n (all today's events snapshot) —shows all events that occurred today up
until the view was applied.
n (all recent access events with live updates) —shows all access-related
events as they are occurring.
Other views may have been configured for your system. Ask your supervisor
or an experienced colleague about other views and what information they
display in the Events Summary.

Sorting the Event Summary


Sorting allows you to set the order in which events appear in the summary.
The sort order can be ascending or descending. For example, you can sort
events by date and time, in ascending order. This means that events are listed
in order of ascending date and time; that is, the oldest event is listed at the top
of the summary.

To sort the Event Summary


1. Call up the Event Summary display.
2. Click the column heading you want to sort by.
Note that you can only sort by Date & Time and Source .
3. Select the sort order.

To remove sorting settings


1. Click Clear All Filters.

TIP: If a custom filter has previously been applied, clicking Clear All
Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating it that the view has been modified.

Example scenario - sorting the Events Summary


You want to sort the Events Summary so that events are listed in ascending
order according to point ID (0-9, A-Z).

140
Chapter 11 - Responding to events

Solution
1. Call up the Event Summary display.
2. Click the Source column.
3. Select Sort Ascending .
The Event Summary changes to list events in ascending order according to
the point ID.

Resetting the Events Summary


A Reset View button ( ) is available on the toolbar of the Events Summary
display. When you click the Reset View button, the default summary display is
loaded. For example, it will load the All recent events with live updates view. It
will also reset all filters and column positions back to default settings.

To reset the Events Summary


1. On the Events Summary toolbar click Reset View.
2. Acknowledge the Yes/No warning message displayed at the top of the
summary display.

Adding comments to an event


If required, you can add comments to events in the Event Summary. For
example, you may need to keep a record of your actions in response to an
event.
By adding a comment to an existing event, an additional event is added to the
summary. The description of the additional event displays the comment in the
description column. Comments can also be included in an Alarm and Event
report.

To add a comment to an event


1. Select the event to which you want to add a comment.
2. If the Details Pane is not visible, click the Show Details Pane button.
3. Click the Comments tab.
Any existing comments that are added to the event are displayed.

141
Chapter 11 - Responding to events

TIP: Once an event has been archived, no further comments can


be added.

4. Type in your comment and click Save Comments.

Viewing an event video clip


If your EBI has the Honeywell Digital Video Manager installed as part of the
system, you can view any video clip that may be linked with an alarm or event.
A video icon in the first column of the Event Summary indicates that a video
clip is linked to the event.

To view the video clip


1. Do one of the following:
l Double-click the video clip icon ( ) associated with the event in the
summary list.
l Select the event in the Event Summary that contains the video clip,
then click the Associated Video link on the Event Summary display.
l Right-click the event and select Associated Video from the menu.
The video clip associated with the event will be displayed in a popup
window.

Adding an operator recorded event


If you notice an event (such as a safety issue) that is not recorded by the
system, but that you want included in the Event Summary, you can manually
record that event in the system. Information, such as your user identification,
date and time, and event category are automatically stored with the newly
created event.
For ease in filtering, your comments are generated as a special type of
operator-added event that can be selected as a sort criteria when events are
displayed.

To manually add an event to the Event Summary


1. Do one of the following:
l Click the Generate Event button on the toolbar, then type the
comment into the message zone.

142
Chapter 11 - Responding to events

l Click the Generate Event button on the Event Summary display, then
type your comment into the message zone.

Responding to Access Events


If you are responsible for security, you can call up a list of access-related
events, such as card accesses and denials at various readers throughout the
system.

To call up a list of access events


1. Choose View > Event Summary.
2. On the Event Summary select the predefined view (all recent access
events with live updates).
Initially, each event occupies a single line and shows, card number, door
point ID, names, and so forth.
3. If you want to see more details about each event, click the Show Details
Pane button.
4. If you want to freeze the display—this makes it easier to read if events are
occurring in rapid succession—click the Pause button. (Click the Resume
button to unfreeze the display, and return it to its automatic update mode.)
5. If you want to see all events, select the predefined view (all recent events
with live update).

Using Event Archiving


Event Archiving periodically captures events from the event journal and
places them into an event database, where they can be used for reporting and
diagnostic purposes.
Depending on how your system is set up, events are automatically archived at
specified intervals, or an alarm is generated to alert you of the need to archive.
EBI provides a playback facility, so that you can run reports on events that
have been restored from archives.

143
Chapter 11 - Responding to events

To call up the Event Archiving Operations display


1. Choose View > Events > Event Archiving .
2. You can now perform the following tasks:
a. Archive the events by clicking the Archive Now button.
b. Restore archived events by clicking the Restore button.
c. Remove restored archives by clicking the Remove button. The
Remove button appears when you have restored archives.
d. View the status of events collection and archiving.

Event collection and archive status


The Event Archiving Operations display shows the current event collection
and archiving status, as described in the following table.

Status Description

Event Shows the current status of events collection and archiving. For a
Archiving description of each status see the table below.
status

Current event Hourly average calculated on the previous 24 hours. Is updated


rate every hour.

Last archived The last date and time that an archive ran.

Next archive The date and time of the next schedule archive. Calculated using the
scheduled for last archive date and time and the configured schedule.

The following table describes each possible archive status.

Archive status Description

OK Event Archiving is working normally.

Overload Events are occurring so frequently that Event Archiving is not able
to capture them in a timely way. If you see this status, refer the
problem to your supervisor.

Failed Events collection has failed.

Full Disk There is not enough disk space to continue events collection.
Events collection is stopped until there is sufficient disk space
available.

144
Chapter 11 - Responding to events

Archive status Description

Copy Mode This is only applicable to a redundant system after recovery from
failure. Event Archiving is disabled while the primary extended
events database is being copied off-line to the backup server.

Archiving events
Use the following procedure if:

n Your system is not configured to automatically archive events


n You want to archive events before the next scheduled archive
You can archive events to FileSystem, which may be a folder on the server
disk itself or on an available network file server.
When archiving events to a FileSystem use a UNC path rather than mapping
a drive to your local computer. For example, use \\myserver\archive
instead of f:\.

To archive events to FileSystem


1. Click the Archive Now button.
2. Type Y (for 'yes') at the confirmation prompt.

Restoring archived events


Occasionally, you may need to restore archived events so that you can access
them.

Restoring archived events from FileSystem


You can restore archived events from FileSystem from a Station running on
either the server computer or a client computer.
When restoring archives from FileSystem, use a UNC path rather than
mapping a drive to your local computer. For example, use
\\myserver\archive instead of f:\.

To restore archived events from FileSystem


1. Click the Restore button.
2. Select the required .dat file.

145
Chapter 11 - Responding to events

3. Click Open .

146
CHAPTER

12 MANAGING CARDHOLDERS AND


CARDS
This section describes how to manage cardholders and cards.

About cardholders
Four types of cardholders can be added to the cardholder database:

n Employee
n Visitor
n Vehicle
n External Personnel
An External Personnel cardholder is similar to an Employee but is associated
with an external company; for example, external consultants or contractors,
cleaning staff, or security personnel from external companies. Typically, they
need to access the facility on a regular basis. They are treated independently
by the system to a Visitor who only needs access once, or occasionally. Both
types of cardholders might be issued with a card, however a visitor's card is
generally returned at the end of the visit whereas an External Personnel
cardholder's card is retained for the duration of their contract.
Visitor access is handled by Reception Manager. For more information about
using Reception Manager, see the Reception Management Module Guide or
the Reception Web Module Guide.
The Vehicle cardholder type can be used if you want to be able to assign
cards and access to particular vehicles. For example, if you have a fleet of
vehicles used by multiple employees, and you wanted to restrict access to a
parking area, you could assign access cards to the vehicles. (If however you
only want to record the vehicle details of your employees and external
personnel without specific vehicle access control requirements, you could use
the standard properties for employees and external personnel.)
When you add a cardholder, you can enter many details, including:

n Personal and employment-related information, such as name, employer


and telephone number.
n The cardholder's access rights.
n The cards that are assigned to the cardholder.

147
Chapter 12 - Managing cardholders and cards

ATTENTION: The fields in some cardholder displays can be


configured to be visible or hidden, so not all fields described in this
section may appear in your displays. License options will also affect
which fields are displayed.

Adding an Employee cardholder


To add an Employee cardholder
1. Choose Configure > Cardholder Management > Add Employees to call up
the Add Employee display.
2. If your site uses templates, select the appropriate template for this
cardholder.
The values specified in the template, such as the employer's name and
contact number, are automatically loaded into the cardholder's details.
3. To add the employee to an organization, click the ellipsis button to
display the Organization Browser. Select the employee's company and
click Apply
4. In the New Employee Details section, type the employee's first name, last
name, and if applicable, preferred name.
These details are the default required fields. Your system might be
configured to include other required fields which are marked with an
asterisk (*).
5. You can either issue a new card by typing a card number in the Card
Number box, or select an unissued card from the list to issue it to the
employee.
6. If you have IdentIPoint card readers, complete the following steps:
a. Click the Issue and enroll a card option button.
b. From the Reader list, select the reader that you are using for
enrollment.
c. From the Enrollment Type list, select the type of credentials
cardholders need to use at the card reader.
7. Click Add .
This calls up the Cardholder display and selects the Main tab.
8. If you have IdentIPoint card readers, complete the following steps:
a. If the enrollment type includes a PIN, instruct the cardholder to enter
their PIN.
The cardholder is required to enter their PIN a second time.

148
Chapter 12 - Managing cardholders and cards

b. If the enrollment type includes a fingerprint, instruct the cardholder to


place their finger on the fingerprint pad.
The cardholder is required to present their finger two more times.
c. Instruct the cardholder to present their card at the reader.
9. Fill in the remaining properties as appropriate.
10. If you have the Integrated PhotoID option, you can add a portrait (and
signature) now or later.
For details, see the topics "Capturing a portrait" on page 212 and
"Capturing a signature using a camera" on page 213.
11. When you have completed the details on the Main tab, click the other tabs
and fill in the other cardholder details.
12. Click the Access Rights tab.
13. Select an access right in the Available Access Rights list and then click
Assign .
The access right moves to the Assigned Access Rights list.
Note the details of the selected rights are displayed in the Details section.
14. If you use timed access rights, click the access right in the Assigned
access rights list and set a Commencement time and an Expiry time .
If you specify a commencement and expiry time, the access right
assignment is valid only for that period of time. Outside of this time period,
the access right remains assigned to the cardholder, but the cardholder
does not have access to the zones defined in the access right.
15. Repeat steps 13 and 14 to assign more access rights.
16. When you have finished, click Save .

Employee cardholder display Main tab properties


Property Description

First Name The cardholder's first (given) name.

Last Name The cardholder's last (family) name.

Preferred The cardholder's preferred name, usually the name commonly used
Name by work colleagues and friends.

Entering a preferred name enables you to search for the cardholder


using that name.

Organization Click the ellipsis button to display the Organization Browser.

149
Chapter 12 - Managing cardholders and cards

Property Description

Select the employee's company and click Apply.

Cardholder The cardholder's state, either: Active, Inactive or Left Company.


State
A cardholder can only gain access if you set the state to Active. (Note
that the cardholder's cards must also be Active to gain access.)

If you set the state to Inactive or Left Company, it will automatically


disable the cardholder's cards.

Employee The number allocated to the cardholder by the company for which
Number the cardholder works.

Job Title The cardholder's job title.

Supervisor The name of the cardholder's supervisor.

Building The building that the cardholder will access.

Date of Birth The birth date of the employee.

Vehicle 1 The license number of the vehicle normally used by the cardholder.
License #

Phone The cardholder's phone number.


Number

Mobile The cardholder's mobile phone number.


Number

Email The cardholder's email address.

Comments Type in any relevant comments.

Active Cards Shows active card(s) that have been issued to the cardholder.

Last Access Shows the most recent date and time when the cardholder
Date/Time presented a card to a card reader (regardless of whether the card
reader allowed/denied access).

Last Zone Shows the zone which the cardholder most recently gained access.
Entered

Last Door Shows the name of the door/card reader where the cardholder
Accessed most recently presented a card (regardless of whether the card
reader allowed/denied access).

150
Chapter 12 - Managing cardholders and cards

Property Description

Last Access Shows the result of the most recent attempt to gain access.
Message
If access was granted, the message is authorized or granted.

If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.

Employee cardholder display Details tab properties


This tab contains employment and personal details about the cardholder. Fill
in the details as required by your organization.

Employee cardholder display Access Details tab


properties
This tab contains EBI-related details about the cardholder.

Property Description

Commence The commencement date/time for the cardholder. The default is


Date the date the cardholder was added.

Expiry Date The date/time the cardholder's access rights expire. The
cardholder's card(s) also expires at this time.

If you do not specify a date, the default expiry date is used.

Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.

Associated The associated display for the cardholder. You can call up this
Page display by clicking the Associated Display button on Station's toolbar
when an alarm is generated for this cardholder.

Alarm Priority Only applicable when Card Trace is set.

The alarm priority used for a cardholder traced alarm. This priority
will only be used for the cardholder traced alarm if the combined
priority/subpriority is higher than that configured for the reader at
which the card is presented.

151
Chapter 12 - Managing cardholders and cards

Property Description

Alarm Only applicable when Card Trace is set.


Subpriority
The cardholder alarm subpriority (0-15) used for a cardholder
traced alarm. This subpriority will only be used for the cardholder
traced alarm if the combined priority/subpriority is higher than that
configured for the reader at which the card is presented.

Default Layout The default card layout file for the front of a photo identification
(front) card for all cards belonging to this cardholder.

Default Layout The default card layout file for the back of a photo identification
(back) card for all cards belonging to this cardholder.

Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority
configured on the cardholder if they are higher than that
configured for the reader at which the card is presented.

Reception Manager Details

Reception Manager is used to manage visitors. If your system uses Reception


Manager you should enter the appropriate information for your system.

Web Reception The EBI Operator profile used to determine permissions when this
Operator employee uses Web Reception.

Web Reception The name of the Web Reception Station to be assigned to the
Station employee when they use Web Reception.

Visitable Identifies the employee as a contact person based in the building


and defined as "visitable" by external visitors. The contact person
represents an integral part of the data associated with the visit.

If your system uses Reception Manager, you must select this check
box so that this employee can be found using Reception Manager.

License Plate The Licence Plate list contains the vehicles configured for the
current site. Select one to associate it to the employee cardholder.

Category (This option is not available on all systems.)

The category of the recipient of the card. Select Normal or Shift from
the Category list.

152
Chapter 12 - Managing cardholders and cards

Property Description

Account The Web Reception Account is the employee's personal account


that accesses the computer. This account will be used to access
Web Reception.

Hand Enrollment Details

Enroll using Specifies which hand reader you want to use to enroll the
cardholder.

Use Special If selected, indicates that the cardholder cannot use the hand
Enrollment reader. Instead, access is granted using a card or a PIN.

Authority Level The authority level you want to assign to the cardholder. This
determines the functions a cardholder can perform at the hand
reader. The levels are:

l 0 - No Authority
l 1 - Service Hand Reader
l 2 - Setup Hand Reader
l 3 - Manage Users
l 4 - Enroll and Remove Users
l 5 - Manage Security
Specify Reject Specifies how closely a cardholder hand reading must match the
Tolerance hand template when the cardholder presents their hand at the
reader.

A low reject tolerance provides greater security but generates more


rejections. A high reject tolerance provides less security but
generates less rejections.

Employee cardholder display Access Rights tab


properties
Use this tab to define the cardholder's access rights. Note that if Temaline is
licensed, there is a limit of four Temaline access rights per cardholder per
Temaline site. For other controller types, EBI does not impose any restrictions
on the number of access rights you can assign to a cardholder. However,
each controller type has its own limits of the number of time periods (a
component of an access right) that can be assigned to each card. Your
system should be configured in such a way that these limits are not exceeded.

153
Chapter 12 - Managing cardholders and cards

Employee cardholder display Temporary Access tab


properties
You use this tab to define the cardholder's temporary access rights (Temaline
only). Depending on how your system is configured, the temporary access
right will either replace existing access rights during the specified time period,
or will be used in addition to existing access rights. There is a limit of one
temporary Temaline access right per cardholder per Temaline site.

Employee cardholder display Cards tab properties


The top part of this tab lists the cards that have been assigned to the
Employee cardholder. The properties of the currently selected card are
shown in the Card Details section.
Table 12-1: Employee cardholder display Cards tab buttons

Button Description

Issue card Click this button to issue a card to the employee.

Return card Click this button to return the selected card to an Unassigned state.

Delete card Click this button to delete the selected card.

Download card Click this button to download the selected card.

Print card Click this button to print the selected card.

Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
Table 12-1: Card detail properties
Property Description

Card state The card's state: Active, Lost, Stolen, Inactive, or AutoCommence.
(The card must be Active to grant access.)

You cannot select Active if the cardholder's state is Inactive.

If you select AutoCommence, the card automatically becomes


active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
enabled for your system.)

154
Chapter 12 - Managing cardholders and cards

Property Description

Card layout (front) The layout used on the front of the card when it is printed.

If a card layout has been specified for the cardholder, it is set as


the default layout when you assign a card to the cardholder.

Commencement The date/time on which the card becomes active.


time

Card layout (back) The layout used on the back of the card when it is printed.

If a card layout has been specified for the cardholder, it is set as


the default layout when you assign a card to the cardholder.

Expiry time The date/time on which the card expires.

The expiry date/time cannot exceed the date/time of the


cardholder.

Lack of use expiry If selected, the card does not expire if it has not been used.
exempt

Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.

When such a card expires, the card state changes to 'Expired


Counter'.

PIN Code The PIN code used on key pad readers. It is displayed as ****.

Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.

Last printed Shows the date on which the card was last printed.

Number printed Shows the number of times the card has been printed.

Table 12-2: Temaline Details


Property Description

Category The category of the recipient of the card. Select Normal or Shift from
the Category list.

155
Chapter 12 - Managing cardholders and cards

Property Description

Anti-passback Enables/disables anti-passback control for the card.


disabled

Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).

Transit allowed In the Transit Allowed area, you can configure one of the following
options.

All: There is no restriction on the number of transits that the


cardholder can have. This is the default entry.

One Shot: The cardholder can effect a single transit per day at any
terminal on the system. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if
the TemaKey is configured to control the number of transits.

1 In/1 Out: The cardholder can effect a single entry transit and a
single exit transit per day. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if
the TemaKey is configured to control the number of transits.

Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.

Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.

If selected, the TemaKey requests a second transit operation before


granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.

Authorized The Authorized Function list contains the authorization groups


Function defined for the system using the Authorized Functions display.
Interactive functions (like reasons, enquiries, transit categories and
additional data list) configured for the system can be associated to
each group. By selecting a group from the list, you enable the
employee to perform operations just on the group in question,
thereby limiting the use of interactive functions to selected users.

Length of stay Enables/disables the control on the length of a user's stay in a zone.

156
Chapter 12 - Managing cardholders and cards

Property Description

disabled

Disable Enables/disables the transmission of data to the peripheral devices.


download If this option is selected, data will not be sent to the peripheral
devices, but will instead be saved in the historic transit archive
following each card reading operation. It is a useful function for
cards that belong to a range, where the transits affected would
normally only be stored with the card number, that is, without the
name of the cardholder. This option therefore reduces the strain on
the limited memory of the peripheral devices, and at the same time
ensures that the data available at the supervision center level is as
complete as possible.

Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.

Number Enable/disable the number of people control. If the control is


control disabled, the cardholder will not be counted as present in the zone.
disabled

Visitation The card cannot be used by the cardholder to escort visitors.


disabled

Spontaneous A message that is displayed automatically on the terminal following


Message a clock-in or clock-out operation.

Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.

No PIN Code Applicable to Voyager controllers only. The cardholder is not


prompted to enter a PIN, access is provided by the card only.

Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.

Long Access Keeps the door open for longer than usual without an alarm being
raised.

Short Name The abbreviated version of the employee's name, consisting of a


maximum of 16 characters, which will be displayed on the terminal
at the time of the transit operation.
By default, the system will create a short name made up of the first
thirteen characters of the last name, followed by a blank, then the

157
Chapter 12 - Managing cardholders and cards

Property Description

first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.

Country The country in which the subject is resident.


Grouping

Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.

Table 12-3: SE (Security Electronics) Details


Property Description

Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.

Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:

l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:

l The Keypad enabled and the Extended door time by keypad options on
the access point Door Definition tab for Star II controllers.

158
Chapter 12 - Managing cardholders and cards

Property Description

l The Terminate keypad entries by # option on the access point Keypad


tab for Star II controllers.

Table 12-4: PCSC Details


Property Description

2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.

Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.

Building Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using normal doors.

Affiliation The MicroLPM card affiliation code. This is a method of grouping


Code categories of holders within the MicroLPM.

Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.

Parking Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using doors defined as Parking doors within the controller.

Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.

Escort Enables the cardholder to act as an escort.


Capable

Card Class Defines this card as valid member of card class A within the MicroLPM
A

159
Chapter 12 - Managing cardholders and cards

Property Description

controller. A valid access by this card will execute any actions


programmed for Class A within the controller.

Escort If selected, the cardholder can only gain access if escorted by a


Required cardholder whose card is marked as Escort Capable.

Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.

Exempt Reuse time is "timed anti-passback." If this option is selected, a card


Reuse Time that previously has been granted access will grant access even if reuse
time has not elapsed (reuse time must be configured in the controller).
This option applies only to fault tolerant controllers.

Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.

Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness This option applies only to fault tolerant controllers.

Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault tolerant controllers.

Table 12-5: FS90 Details


Property Description

FS90 Card Category The type of card:

l Employee. Normal card type with access as


configured in EBI.
l Supervisor. Same as an employee card, as well as

160
Chapter 12 - Managing cardholders and cards

Property Description

being a supervisor card for controlled locations


configured with the supervisor rule.
l Visitor. Access on the card is ignored. Access is only
granted when accompanied by an employee or
supervisor cardholder.

Long Access Keeps the door open for longer than usual and extends
the alarm 'shunt' period. This is often required for
cardholders who need a longer time to get through the
door, such as someone using a wheelchair.

Allow Access on Loss of Select this check box if you want cardholders to be
Comms granted access even if communication between the
server and the controller is lost.

Table 12-6: AXSS-II Details


Property Description

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Table 12-7: IdentIPoint Details


Property Description

Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.

Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.

Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.

Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.

Anti-Passback If selected, the anti-passback rules do not apply to the cardholder

161
Chapter 12 - Managing cardholders and cards

Property Description

Exempt that has been issued with this card.

User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.

The system can use a validation to check to see if the card


presented has one or more of these flags set before proceeding
with the assigned action.

Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.

Employee cardholder display Recent Events tab


properties
This tab shows details about the cardholder's recent access events, including
when each event occurred, which card reader was used and whether access
was granted or denied (shown in Condition column).
Note that the tab also shows details about operational events, such as when
the cardholder's access rights were changed.

TIP: If no recent events are listed, you should check that the browser
on the Station client is configured correctly. For details refer to the topic
“Cannot call up recent events” in the Diagnostics Guide.

Adding a Vehicle cardholder


To add a Vehicle cardholder
1. Choose Configure > Cardholder Management > Add Vehicles to call up
the Add Vehicle display.
2. If your site uses templates, select the appropriate template for this
cardholder.
The values specified in the template, such as the employer's name and
contact number, are automatically loaded into the cardholder's details.
3. To add the vehicle to an organization, click the ellipsis button to display
the Organization Browser. Select the vehicle's company and click Apply
4. In the New Vehicle details section enter the number plate (registration
number), make and model of the cardholder's vehicle.

162
Chapter 12 - Managing cardholders and cards

5. You can either issue a new card by typing a card number in the Card
Number box, or you can select an unissued card from the list to issue it to
the employee.
6. If you have IdentIPoint card readers, complete the following steps:
a. Click the Issue and enroll a card option button.
b. From the Reader list, select the reader that you are using for
enrollment.
c. From the Enrollment Type list, select the type of credentials
cardholders need to use at the card reader.
7. Click Add .
This calls up the Cardholder display and selects the Main tab.
8. If you have IdentIPoint card readers, complete the following steps:
a. If the enrollment type includes a PIN, instruct the cardholder to enter
their PIN.
The cardholder is required to enter their PIN a second time.
b. If the enrollment type includes a fingerprint, instruct the cardholder to
place their finger on the fingerprint pad.
The cardholder is required to present their finger two more times.
c. Instruct the cardholder to present their card at the reader.
9. Fill in the remaining properties as appropriate.
Note that properties marked with an asterisk (*) are mandatory.
10. When you have completed the details on the Main tab, click the other tabs
and fill in the other cardholder details.
11. Click the Access Rights tab.
12. Select an access right in the Available Access Rights list and then click
Assign .
The access right moves to the Assigned Access Rights list.
Note the details of the selected rights are displayed in the Details section.
13. If you use timed access rights, click the access right in the Assigned
access rights list and set a Commencement time and an Expiry time .
If you specify a commencement and expiry time, the access right
assignment is valid only for that period of time. Outside of this time period,
the access right remains assigned to the cardholder, but the cardholder
does not have access to the zones defined in the access right.

14. Repeat steps 12 to 13 to assign more access rights.


15. When you have finished, click Save .

163
Chapter 12 - Managing cardholders and cards

Vehicle cardholder display Main tab properties


Property Description

Number Plate The vehicle's number plate (registration number).

Use The purpose for which the vehicle is used.

Organization Click the ellipsis button to display the Organization Browser.


Select the vehicle's company and click Apply.

Vehicle Make The make of the cardholder's vehicle.

Vehicle Model The model of the cardholder's vehicle.

Vehicle with Select this check box if the vehicle has a trailer attached.
Trailer

Work Site The work site of the vehicle.

Country The country in which the vehicle is registered.

Vehicle Type The type of vehicle, for example Internal, External (to the company)
or Private.

Insurance The date the vehicle's insurance expires.


Expiry

Inspection The date the vehicle's inspection expires.


Expiry

Third-party The date the vehicle's third-party expires.


Expiry

Active Cards Shows active card(s) that have been issued to the vehicle
cardholder.

Last Access Shows the most recent date and time when the cardholder
Date/Time presented a card to a card reader (regardless of whether the card
reader allowed/denied access).

Last Zone Shows the zone which the cardholder most recently gained access.
Entered

Last Door Shows the name of the door/card reader where the cardholder
Accessed most recently presented a card (regardless of whether the card
reader allowed/denied access).

164
Chapter 12 - Managing cardholders and cards

Property Description

Last Access Shows the result of the most recent attempt to gain access.
Message If access was granted, the message is authorized or granted.
If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.

Vehicle cardholder display Details tab properties


This tab contains details about the vehicle, such as the color and the vehicle
status. Fill in the details as required by your organization.

Vehicle cardholder display Access Details tab


properties
This tab contains EBI-related access details about the cardholder.

Property Description

Commence The commencement date/time for the cardholder. The default is the
Date date the cardholder was added.

Expiry Date The date/time the cardholder's access rights expire. The the
cardholder's card(s) also expires at this time.
If you do not specify a date, the default expiry date is used.

Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.

Associated The associated display for the cardholder. You can call up this display
Page by clicking the Associated Display button on Station's toolbar when an
alarm is generated for this cardholder.

Alarm Only applicable when Card Trace is set.


Priority The alarm priority used for a cardholder traced alarm. This priority
will only be used for the cardholder traced alarm if the combined
priority/subpriority is higher than that configured for the reader at
which the card is presented.

Alarm Only applicable when Card Trace is set.


Subpriority

165
Chapter 12 - Managing cardholders and cards

Property Description

The cardholder alarm subpriority (0-15) used for a cardholder traced


alarm. This subpriority will only be used for the cardholder traced
alarm if the combined priority/subpriority is higher than that
configured for the reader at which the card is presented.

Default The default card layout file for the front of a photo identification card
Layout for all cards belonging to this cardholder.
(front)

Default The default card layout file for the back of a photo identification card
Layout (back) for all cards belonging to this cardholder.

Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority configured
on the cardholder if they are higher than that configured for the
reader at which the card is presented.

Vehicle cardholder display Access Rights tab


properties
Use this tab to define the vehicle cardholder's access rights. Note that if
Temaline is licensed, there is a limit of four Temaline access rights per
cardholder per Temaline site. For other controller types, the number of access
rights you can assign is not limited. However, you should determine how
many access rights your controller hardware will support.

Vehicle cardholder display Temporary Access tab


properties
You use this tab to define the vehicle's temporary access rights (Temaline
only). This temporary access right will replace existing access rights during
the specified time period. There is a limit of one temporary Temaline access
right per cardholder per Temaline site.

Vehicle cardholder display Cards tab properties


The top part of this tab lists the cards that have been assigned to the vehicle
cardholder. The properties of the currently selected card are shown in the
Card Details section.

166
Chapter 12 - Managing cardholders and cards

Table 12-2: Vehicle cardholder display Cards tab buttons

Button Description

Issue card Issues a card to the cardholder.

Return card Returns the selected card to an Unassigned state.

Delete card Deletes the selected card.

Download card Downloads the selected card.

Print card Prints the selected card.

Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
Table 12-3: Card detail properties

Property Description

Card state The card's state: Active, Lost, Stolen, Inactive, or AutoCommence.
(The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
enabled for your system.)

Card layout (front) The layout used on the front of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.

Commencement The date/time on which the card becomes active.


time

Card layout (back) The layout used on the back of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.

Expiry time The date/time on which the card expires.


The expiry date/time cannot exceed the date/time of the
cardholder.

167
Chapter 12 - Managing cardholders and cards

Property Description

Lack of use expiry If selected, the card does not expire if it has not been used.
exempt

Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.

PIN Code The PIN code used on key pad readers. It is displayed as ****.

Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.

Last printed Shows the date on which the card was last printed.

Number printed Shows the number of times the card has been printed.

Table 12-4: Temaline details

Property Description

Category The category of the recipient of the card. Select Normal or Shift from
the Category list.

Anti-passback Enables/disables anti-passback control for the card.


disabled

Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).

Transit allowed In the Transit Allowed area, you can configure one of the following
options.

l All: There is no restriction on the number of transits that the cardholder


can have. This is the default entry.
l One Shot: The cardholder can effect a single transit per day at any
terminal on the system. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if the
TemaKey is configured to control the number of transits.
l 1 In/1 Out: The cardholder can effect a single entry transit and a single

168
Chapter 12 - Managing cardholders and cards

Property Description

exit transit per day. This condition will remain in force for the cardholder
until the Reset command is executed. Applicable only if the TemaKey is
configured to control the number of transits.
Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.

Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.

Authorized The Authorized Function list contains the authorization groups


Function defined for the system using the Authorized Functions display.
Interactive functions (like reasons, enquiries, transit categories and
additional data list) configured for the system can be associated to
each group. By selecting a group from the list, you enable the
employee to perform operations just on the group in question,
thereby limiting the use of interactive functions to selected users.

Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled

Disable Enables/disables the transmission of data to the peripheral devices.


download If this option is selected, data will not be sent to the peripheral
devices, but will instead be saved in the historic transit archive
following each card reading operation. It is a useful function for
cards that belong to a range, where the transits affected would
normally only be stored with the card number, that is, without the
name of the cardholder. This option therefore reduces the strain on
the limited memory of the peripheral devices, and at the same time
ensures that the data available at the supervision center level is as
complete as possible.

Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.

Number Enable/disable the number of people control. If the control is

169
Chapter 12 - Managing cardholders and cards

Property Description

control disabled, the cardholder will not be counted as present in the zone.
disabled

Visitation The card cannot be used by the cardholder to escort visitors.


disabled

Spontaneous A message that is displayed automatically on the terminal following


Message a clock-in or clock-out operation.

Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.

No PIN Code Applicable to Voyager controllers only. The cardholder is not


prompted to enter a PIN, access is provided by the card only.

Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.

Long Access Keeps the door open for longer than usual without an alarm being
raised.

Short Name The abbreviated version of the employee's name, consisting of a


maximum of 16 characters, which will be displayed on the terminal
at the time of the transit operation.

By default, the system will create a short name made up of the first
thirteen characters of the last name, followed by a blank, then the
first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.

Country The country in which the subject is resident.


Grouping

Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.

Table 12-8: SE (Security Electronics) Details


Property Description

Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be

170
Chapter 12 - Managing cardholders and cards

Property Description

granted access. To replace a lost card, for example, a card can be


created with the same card number but a different issue code.

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.

Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:

l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:

l The Keypad enabled and the Extended door time by keypad options
on the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.

Table 12-9: PCSC Details


Property Description

2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.

Cost Enables the cardholder to gain valid access even if they have

171
Chapter 12 - Managing cardholders and cards

Property Description

Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.

Building Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using normal doors.

Affiliation The MicroLPM card affiliation code. This is a method of grouping


Code categories of holders within the MicroLPM.

Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.

Parking Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using doors defined as Parking doors within the controller.

Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.

Escort Enables the cardholder to act as an escort.


Capable

Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.

Escort If selected, the cardholder can only gain access if escorted by a


Required cardholder whose card is marked as Escort Capable.

Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.

Exempt Reuse time is "timed anti-passback." If this option is selected, a card


Reuse Time that previously has been granted access will grant access even if reuse

172
Chapter 12 - Managing cardholders and cards

Property Description

time has not elapsed (reuse time must be configured in the controller).
This option applies only to fault tolerant controllers.

Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault-tolerant controllers.

Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault-tolerant controllers.

Expiry is If this option is selected, if the controller is configured to perform card


Activation activation, the controller treats the secondary expiration date/time as
the activation date/time.
This option applies only to fault-tolerant controllers.

Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault-tolerant controllers.

Table 12-10: FS90 Details


Property Description

FS90 Card The type of card:


Category
l Employee. Normal card type with access as configured in EBI.

l Supervisor. Same as an employee card, as well as being a supervisor


card for controlled locations configured with the supervisor rule.
l Visitor. Access on the card is ignored. Access is only granted when
accompanied by an employee or supervisor cardholder.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.

Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of

173
Chapter 12 - Managing cardholders and cards

Property Description

Comms

Table 12-11: AXSS-II Details


Property Description

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Table 12-12: IdentIPoint Details


Property Description

Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.

Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.

Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.

Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.

Anti-Passback If selected, the anti-passback rules do not apply to the cardholder


Exempt that has been issued with this card.

User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.

Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.

174
Chapter 12 - Managing cardholders and cards

Vehicle cardholder display Recent Events tab


properties
This tab shows details about the vehicle's recent access events, including
when each event occurred, which card reader was used and whether access
was granted or denied (shown in Condition column).
Note that the tab also shows details about operational events, such as when
the vehicle cardholder's access rights were changed.

Adding an External Personnel cardholder


To add a External Personnel cardholder
1. Choose Configure > Cardholder Management > Add External Personnel
to call up the Add External Personnel display.
2. If your site uses templates, select the appropriate template for this
cardholder.
The values specified in the template, such as the employer's name and
contact number, are automatically loaded into the cardholder's details.
3. In the New External Personnel details section enter the cardholder's first
name, last name, and if applicable, preferred name.
4. In the External Company list, select the cardholder's company.
5. You can either issue a new card by typing a card number in the Card
Number box, or you can select an unissued card from the list to issue it to
the employee.
As you issue each card, it appears in the box below.
6. If you have IdentIPoint card readers, complete the following steps:
a. Click the Issue and enroll a card option button.
b. From the Reader list, select the reader that you are using for
enrollment.
c. From the Enrollment Type list, select the type of credentials
cardholders need to use at the card reader.
7. Click Add .
This calls up the External Personnel cardholder display and selects the
Main tab.

8. If you have IdentIPoint card readers, complete the following steps:


a. If the enrollment type includes a PIN, instruct the cardholder to enter
their PIN.
The cardholder is required to enter their PIN a second time.

175
Chapter 12 - Managing cardholders and cards

b. If the enrollment type includes a fingerprint, instruct the cardholder to


place their finger on the fingerprint pad.
The cardholder is required to present their finger two more times.
c. Instruct the cardholder to present their card at the reader.
9. Fill in the remaining properties as appropriate.
Note that properties marked with an asterisk (*) are mandatory.

ATTENTION: The fields in the External Personnel cardholder


display are identical to the tabs in the Employee cardholder display
with the exception of the mandatory External Company selection
box.

10. When you have completed the details on the Main tab, click the other tabs
and fill in the other cardholder details.
11. Click the Access Rights tab.
12. Select an access right in the Available Access Rights list and then click
Assign .
The access right moves to the Assigned Access Rights list.
Note the details of the selected rights are displayed in the Details section.
13. If you use timed access rights, click the access right in the Assigned
access rights list and set a Commencement time and an Expiry time .
If you specify a commencement and expiry time, the access right
assignment is valid only for that period of time. Outside of this time period,
the access right remains assigned to the cardholder, but the cardholder
does not have access to the zones defined in the access right.
14. Repeat steps 12 and 13 to assign more access rights.
15. When you have finished, click Save .

External Personnel cardholder display Main tab


properties
Property Description

First Name The cardholder's first (given) name.

Last Name The cardholder's last (family) name.

Preferred The cardholder's preferred name, usually the name commonly used
Name by work colleagues and friends.
Entering a preferred name enables you to search for the cardholder

176
Chapter 12 - Managing cardholders and cards

Property Description

using that name.

External The external cardholder's company name.


Company

Cardholder The cardholder's state, either: Active, Inactive or Left Company.


State A cardholder can only gain access if you set the state to Active. (Note
that the cardholder's cards must also be Active to gain access.)
If you set the state to Inactive or Left Company, it will automatically
disable the cardholder's cards.

Date of Birth Birth date of the external personnel.

Nationality The cardholder's nationality.

Vehicle 1 The license number of the vehicle normally used by the cardholder.
License #

Phone The cardholder's phone number.


Number

Mobile The cardholder's mobile phone number.


Number

Email The cardholder's email address.

Comments Type any relevant comments.

Active Cards Shows active card(s) that have been issued to the cardholder.

Last Access Shows the most recent date and time when the cardholder presented
Date/Time a card to a card reader (regardless of whether the card reader
allowed/denied access).

Last Zone Shows the zone which the cardholder most recently gained access.
Entered

Last Door Shows the name of the door/card reader where the cardholder most
Accessed recently presented a card (regardless of whether the card reader
allowed/denied access).

Last Access Shows the result of the most recent attempt to gain access.
Message If access was granted, the message is authorized or granted.

177
Chapter 12 - Managing cardholders and cards

Property Description

If access was denied, the message indicates why access was denied.
For example, Invalid Time means that the cardholder did not have
access to the zone at the time.

External Personnel cardholder display Details tab


properties
This tab contains employment and personal details about the cardholder. Fill
in the details as required by your organization.

External Personnel cardholder display Access Details


tab properties
This tab contains EBI-related details about the cardholder.

Property Description

Commence The commencement date/time for the cardholder. The default is the
Date date the cardholder was added.

Expiry Date The date/time the cardholder's access rights expire. The the
cardholder's card(s) also expires at this time.
If you do not specify a date, the default expiry date is used.

Alarm The alarm instruction display for the cardholder. This display
Instruction contains a list of instructions on what to do in the event of an alarm
Page on this cardholder. It is used only if you use the Advanced Alarm
Management option.

Associated The associated display for the cardholder. You can call up this display
Page by clicking the Associated Display button on Station's toolbar when an
alarm is generated for this cardholder.

Alarm Only applicable when Card Trace is set.


Priority The alarm priority used for a cardholder traced alarm. This priority
will only be used for the cardholder traced alarm if the combined
priority/subpriority is higher than that configured for the reader at
which the card is presented.

Alarm Only applicable when Card Trace is set.


Subpriority The cardholder alarm subpriority (0-15) used for a cardholder traced
alarm. This subpriority will only be used for the cardholder traced

178
Chapter 12 - Managing cardholders and cards

Property Description

alarm if the combined priority/subpriority is higher than that


configured for the reader at which the card is presented.

Default The default card layout file for the front of a photo identification card
Layout for all cards belonging to this cardholder.
(front)

Default The default card layout file for the back of a photo identification card
Layout (back) for all cards belonging to this cardholder.

Card Trace If selected, an alarm is generated with the condition TRACED (rather
then GRANTED) every time the cardholder is granted access at a
reader. The alarm is generated at the priority/subpriority configured
on the cardholder if they are higher than that configured for the
reader at which the card is presented.

Web The EBI Operator profile used to determine permissions when this
Reception employee uses Web Reception.
Operator

Web The name of the Web Reception Station to be assigned to the


Reception employee when they use Web Reception.
Station

Visitable Identifies the employee as a contact person based in the building and
defined as "visitable" by external visitors. The contact person
represents an integral part of the data associated with the visit.

License Plate The Licence Plate list contains the vehicles configured for the current
site. Select one to associate it to the employee cardholder.

Category The category of the recipient of the card. Select Normal or Shift from
the Category list.

Account The Web Reception Account is the employee's personal account that
accesses the computer. This account will be used to access Web
Reception.

179
Chapter 12 - Managing cardholders and cards

External Personnel cardholder display Access Rights


tab properties
Use this tab to define the cardholder's access rights. Note that if Temaline is
licensed, there is a limit of four Temaline access rights per cardholder per
Temaline site. For other controller types, the number of access rights you can
assign is not limited. However, you should determine how many access rights
your controller hardware will support.

External Personnel cardholder display Temporary


Access tab properties
You use this tab to define the cardholder's temporary access rights (Temaline
only). This temporary access right will replace existing access rights during
the specified time period. There is a limit of one temporary Temaline access
right per cardholder per Temaline site.

External Personnel cardholder display Cards tab


properties
The top part of this tab lists the cards that have been assigned to the External
Personnel cardholder. The properties of the currently selected card are
shown in the Card Details section.
Table 12-5: External personnel cardholder display Cards tab buttons

Button Description

Issue card Issues a card to the external personnel.

Return card Returns the selected card to an Unassigned state.

Delete card Deletes the selected card.

Download card Downloads the selected card.

Print card Prints the selected card.

Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.

180
Chapter 12 - Managing cardholders and cards

Table 12-6: Card detail properties

Property Description

Card state The card's state, either: Active, Lost, Stolen, Inactive, or
AutoCommence. (The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been
enabled for your system.)

Card layout (front) The layout used on the front of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.

Commencement The date/time on which the card becomes active.


time

Card layout (back) The layout used on the back of the card when it is printed.
If a card layout has been specified for the cardholder, it is set as
the default layout when you assign a card to the cardholder.

Expiry time The date/time on which the card expires.


The expiry date/time cannot exceed the date/time of the
cardholder.

Lack of use expiry If selected, the card does not expire if it has not been used.
exempt

Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.

PIN Code The PIN code used on key pad readers. It is displayed as ****.

Facility Code The clearly visible code on the card. The alphanumeric code
printed on the physical card which may be different to the card
number used by the system.

181
Chapter 12 - Managing cardholders and cards

Property Description

Last printed Shows the date on which the card was last printed.

Number printed Shows the number of times the card has been printed.

Table 12-7: Temaline Details

Property Description

Category The category of the recipient of the card. Select Normal or Shift from
the Category list.

Anti-passback Enables/disables anti-passback control for the card.


disabled

Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).

Transit allowed In the Transit Allowed area, you can configure one of the following
options.

l All: There is no restriction on the number of transits that the cardholder


can have. This is the default entry.
l One Shot: The cardholder can effect a single transit per day at any
terminal on the system. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if the
TemaKey is configured to control the number of transits.
l 1 In/1 Out: The cardholder can effect a single entry transit and a single
exit transit per day. This condition will remain in force for the cardholder
until the Reset command is executed. Applicable only if the TemaKey is
configured to control the number of transits.
Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.

Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.

182
Chapter 12 - Managing cardholders and cards

Property Description

Authorized The Authorized Function list contains the authorization groups


Function defined for the system using the Authorized Functions display.
Interactive functions (like reasons, enquiries, transit categories and
additional data list) configured for the system can be associated to
each group. By selecting a group from the list, you enable the
employee to perform operations just on the group in question,
thereby limiting the use of interactive functions to selected users.

Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled

Disable Enables/disables the transmission of data to the peripheral devices.


download If this option is selected, data will not be sent to the peripheral
devices, but will instead be saved in the historic transit archive
following each card reading operation. It is a useful function for
cards that belong to a range, where the transits affected would
normally only be stored with the card number, that is, without the
name of the cardholder. This option therefore reduces the strain on
the limited memory of the peripheral devices, and at the same time
ensures that the data available at the supervision center level is as
complete as possible.

Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.

Number Enable/disable the number of people control. If the control is


control disabled, the cardholder will not be counted as present in the zone.
disabled

Visitation The card cannot be used by the cardholder to escort visitors.


disabled

Spontaneous A message that is displayed automatically on the terminal following


Message a clock-in or clock-out operation.

Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.

No PIN Code Applicable to Voyager controllers only. The cardholder is not


prompted to enter a PIN, access is provided by the card only.

Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.

183
Chapter 12 - Managing cardholders and cards

Property Description

Long Access Keeps the door open for longer than usual without an alarm being
raised.

Short Name The abbreviated version of the employee's name, consisting of a


maximum of 16 characters, which will be displayed on the terminal
at the time of the transit operation.
By default, the system will create a short name made up of the first
thirteen characters of the last name, followed by a blank, then the
first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.

Country The country in which the subject is resident.


Grouping

Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.

Table 12-8: SE (Security Electronics) Details

Property Description

Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.

Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:

l 1 = 10 minutes
l 2 = 20 minutes
l ...

184
Chapter 12 - Managing cardholders and cards

Property Description

l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to
indicate the 40 minute open time.
This option must be used in conjunction with:

l The Keypad enabled and the Extended door time by keypad options
on the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.

Table 12-13: PCSC Details


Property Description

2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.

Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.

Building Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using normal doors.

Affiliation The MicroLPM card affiliation code. This is a method of grouping


Code categories of holders within the MicroLPM.

Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.

Parking Disables the controller anti-passback mechanism for cardholders

185
Chapter 12 - Managing cardholders and cards

Property Description

Entry/Exit when using doors defined as Parking doors within the controller.

Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.

Escort Enables the cardholder to act as an escort.


Capable

Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.

Escort If selected, the cardholder can only gain access if escorted by a


Required cardholder whose card is marked as Escort Capable.

Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.

Exempt Reuse time is "timed anti-passback." If this option is selected, a card


Reuse Time that previously has been granted access will grant access even if reuse
time has not elapsed (reuse time must be configured in the controller).
This option applies only to fault tolerant controllers.

Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.

Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault tolerant controllers.

Expiry is If this option is selected, if the controller is configured to perform card


Activation activation, the controller treats the secondary expiration date/time as
the activation date/time.
This option applies only to fault tolerant controllers.

186
Chapter 12 - Managing cardholders and cards

Property Description

Keypad If this option is selected, only a PIN access code, correctly entered, will
Entry Only grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.
This option applies only to fault tolerant controllers.

Table 12-14: FS90 Details


Property Description

FS90 Card The type of card:


Category
l Employee. Normal card type with access as configured in EBI.

l Supervisor. Same as an employee card, as well as being a supervisor


card for controlled locations configured with the supervisor rule.
l Visitor. Access on the card is ignored. Access is only granted when
accompanied by an employee or supervisor cardholder.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.

Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of
Comms

Table 12-15: AXSS-II Details


Property Description

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Table 12-16: IdentIPoint Details


Property Description

Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.

187
Chapter 12 - Managing cardholders and cards

Property Description

Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.

Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.

Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.

Anti-Passback If selected, the anti-passback rules do not apply to the cardholder


Exempt that has been issued with this card.

User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.

Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.

External Personnel cardholder display Recent Events


tab properties
This tab shows details about the cardholder's recent access events, including
when each event occurred, which card reader was used and whether access
was granted or denied (shown in Condition column).
Note that the tab also shows details about operational events, such as when
the cardholder's access rights were changed.

Enrolling a cardholder to use a hand reader


You can enroll a cardholder to use a hand reader from Station, providing that
a physical hand reader is located nearby. Alternatively, if you have an
authority level of at least 4, you can enroll a cardholder directly at a hand
reader.

188
Chapter 12 - Managing cardholders and cards

To enroll a cardholder from Station


1. Call up the cardholder's details.
2. Click the Access Details tab.
3. From the Enroll using list, select the hand reader you use for enrollment.
4. If the cardholder cannot use the hand reader, click the Use Special
Enrollment check box.
This allows the cardholder to be verified using a card or a PIN.
5. Set the authority level for the cardholder.
6. Click the Specify Reject Tolerance check box and set the reject tolerance
level.
A low tolerance level provides greater security but generates more
rejections. A high tolerance level is less secure but generates less
rejections.
7. Click Enroll.
8. Instruct the cardholder to present their hand as instructed by the hand
reader.
A message is displayed when enrollment is complete.
9. Click Download to download the hand template to the hand reader.

To enroll a cardholder at a HK-2 model hand reader


1. On the hand reader keypad press CLEAR + ENTER to enter command
mode.
2. Enter your card number and press #.
3. Place your hand on the hand reader platen for identification.
4. At the Enter Password prompt, enter the correct password for
authority level 4 and press #.
5. Press # to add a user.
6. Enter the card number of the cardholder you are enrolling and press #.
7. Instruct the cardholder to present their hand as instructed by the hand
reader.
The message User Enrolled appears when the cardholder is
successfully enrolled.

189
Chapter 12 - Managing cardholders and cards

Searching for a cardholder or card


To do a simple search

1. Click the (Search Cardholder ) button on the toolbar. (Alternatively,


press F11.)
A prompt appears in the Message Zone.
2. Type the cardholder's name or card number and press ENTER.
The cardholders/cards that meet your search criteria appear in the
Navigation Pane on the left.
3. Click the appropriate card/cardholder to see the details.

To do a Quick search
1. In the Quick Search for text box (located in the Navigation Pane on the
left-hand side of the Station screen), type the cardholder's name or card
number and click Go (or press ENTER).
The cardholders/cards that meet your search criteria are listed in the
Navigation Pane.

TIP: The Quick Search for text box can be accessed from all
Cardholder Management Add displays, such as, Add Employees.

2. Click the appropriate card/cardholder to see the details.

To do a basic search
1. Choose Configure > Cardholder Management > Search to call up the
Basic search display.
2. From the Category list, select the category you want to search.
3. Type your search criteria and click Search .

To do an Advanced search
1. Choose Configure > Cardholder Management > Search to call up the
Basic search display.
2. Click Advanced Search so that the advanced search fields are visible.
3. In the Category list, click the category required, for example, Employee .
4. Enter your search criteria.

190
Chapter 12 - Managing cardholders and cards

5. Click Search .
The cardholders/cards that match your search criteria appear in the
Navigation Pane on the left.
6. Click the appropriate card/cardholder to see the details.

Cardholder search methods


There are several search methods you can use to search for a cardholder.
The following table briefly describes these methods:

Search
Description
method

Simple Searches all types of cardholders and cards based on the search
criteria of name or card number.
search
or F11

Quick Searches all types of cardholders and cards based on the search
Search criteria of name or card number.

Basic You can select the category that is searched based on the search
search criteria of name or card number

Advanced You can select the type of cardholder and specify a wider range of
search search criteria, such as the cardholder's phone number and vehicle
license number

When entering names or numbers, you do not have to enter every character.
You can type the first part of the name. For example, if you type Smi, you will
find cardholders called 'Smith' and 'Smithers'. You can also use a wildcard
character (*). For example, if you type s*th you will find all employees starting
with 's' and ending with 'th'.
When you have performed your search, the cardholders/cards that match
your search criteria are listed in the Navigation Pane on the left. You then click
a cardholder/card in the list to the see that cardholder's (or card's) details.
Note that you can select more than one cardholder/card. This is useful if you
want to simultaneously modify their details, for example, assign the same
access rights to selected cardholders. To select several cardholders/cards,
hold down CTRL and click each card/cardholder. To select every
card/cardholder in the list, click [Select all] at the top of the list.

191
Chapter 12 - Managing cardholders and cards

CAUTION: Do no select more than 1000 items at a time. Selecting more


than 1000 cardholders/cards can degrade system performance.

Activating a cardholder
Activating (giving access to) a cardholder involves:

n Activating the cardholder.


n Activating the cardholder's card(s).

To activate a cardholder
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, in the Cardholder State list, click Active .
3. Click the Cards tab.
The card(s) that have been assigned to the cardholder are listed to the top
of the display.
4. Check that the Card State of each card is Active.
5. If a card is not active:
a. Select the card.
The card's details appear at the bottom of the display.
b. In the Card State list, click Active .
6. Click Save to save the change.

Extending a cardholder's expiry date


You typically need to extend the expiry date of cardholders (and their cards)
when their contracts have been extended.
If the original expiry date/time has already passed, EBI automatically disables
the cardholder/card.

Prerequisites
n You have authorization to extend the cardholder's expiry date.

192
Chapter 12 - Managing cardholders and cards

To extend the expiry date


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Access Details tab.
3. Change the Expiry Date to the new date/time.
4. In the Message zone , click Yes to change the expiry date of the cards
assigned to the cardholder.
5. If the cardholder's access has been disabled:
a. Click the Main tab.
b. In the Cardholder State list, click Active .
6. Click the Cards tab.
The card(s) that have been assigned to the cardholder are listed to the top
of the display.
7. Check that the State of each card is Active .
8. If a card is not active:
a. Select the card.
The card's details appear at the bottom of the display.
b. If the card has expired, change Expiry Date /Expiry Time to the new
date/time.
c. In the Card State list, click Active .
9. Click Save to save the changes.

Enabling long access for a cardholder


Some cardholders may require extra time to pass through a door after access
has been granted. If a door is held open for longer than the standard open
time, an alarm is raised. To prevent alarms being raised for cardholders who
require extra time, you can enable a long access time for that cardholder.

To enable long access


1. Search for and select the cardholder.
2. Click the Cards tab.
3. Under the details section specific to the card readers for your site, select
the Long Access check box.
4. Click Save to save the changes.

193
Chapter 12 - Managing cardholders and cards

Issuing a card to a cardholder


To issue a card to a cardholder
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
If any other cards have already been issued to the cardholder, they
appear in the list.
3. Click Issue card to call up the Issue Card to Cardholder display.
4. If you want to issue:
l An unassigned card, click it in the Select a pre-selected card to issue
list.
l A card that has not yet been added to the database, type the card's
number in the Card Number box.
l A card for an IdentIPoint reader, click the Issue and enroll a card option
button, then from the Reader list, select the reader you are using for
enrollment, then from the Enrollment Type list, select the type of
credentials cardholders need to use at the card reader.
5. Click OK to return to the Cardholder display.
The card you have just issued appears in the Cards Issued to Cardholder
list.
6. If you have IdentIPoint card readers, complete the following step:
a. If the enrollment type includes a PIN, instruct the cardholder to enter
their PIN.
The cardholder is required to enter their PIN a second time.
b. If the enrollment type includes a fingerprint, instruct the cardholder to
place their finger on the finger pad.
The cardholder is required to present their finger two more times.
7. Select the card you have just issued so that its details appear below.
8. Change the card's details as appropriate.
For example, if you want to give the cardholder immediate access, make
sure the Card State is set to Active.
9. Click Save to save the change.

194
Chapter 12 - Managing cardholders and cards

Adding unissued cards to the database


Adding unissued cards to the database makes it quicker and easier to issue
them to cardholders. For example, if the building you manage has a new
tenant, you could add an appropriate number of cards and simultaneously
configure their tenant-related properties.

To add unissued cards to the database


1. Choose Configure > Cardholder Management > Add Cards to call up the
Add Cards display.
2. Enter the appropriate new card details, as described in the following table.

Property Description

Card number The range of card numbers you are adding.


You can enter a consecutive range such as 10-
20, or individual card numbers separated by
commas, for example: 1,4,6,10.
You can also combine a range and individual
card numbers, for example: 1,4,6,10-20.

Credential This property is only visible if you use more


Type than one credential type.
If you do, select the appropriate credential
type. (Cards of a specific credential type, for
example, cards with magnetic stripes, can only
be used with readers with the same credential
type.)

Organization Click the ellipsis button to display the


Organization Browser. Select the Organization
that an EBI operator must be assigned to be
able to issue the card or make changes to the
card. Click Apply.

3. Click Add to add the cards to the database.


4. If appropriate, click on Select All in the Navigation pane on the left to
configure the Card Details properties. For more information about the
card details, see "Card Details tab" on the next page.
You should configure those properties that are identical for all cards, while
the cards are still unassigned. Typical examples include the card layout
and expiry date/time.

195
Chapter 12 - Managing cardholders and cards

5. Click Save to add the card details to the database.

Card Details tab


Many of the properties are specific to the type of controller. The first of the
following tables describes card detail properties that are common to all types
of controllers. The other tables describe properties that are specific to a
particular controller type, for example, Temaline or Security Electronics (SE),
and will display according to which controllers are licensed for use.
Table 12-17: Card Encoding properties
Property Description

Reader The reader that is used to encode the card.

Encoding type The type of encoding required.


The options available for Salto encoding are:

l Basic encoding
l Enable antipassback
l Enable auditing (Encodes the card so that cardholder
events are downloaded to the card when the
cardholder swipes the card at a reader)
l Enable antipassback and auditing

Use this enrollment Sets the default enrollment reader to be used for all
reader and type as the enrollment activities for this Station.
default for this Station

Table 12-18: Card detail properties


Property Description

Organization The Organization that an EBI operator must be assigned to be


able to issue the card or make changes to the card. This is
overridden if the cardholder to which the card is assigned has a
different organization.

Card state The card's state, either: Active, Lost, Stolen, Inactive, or
AutoCommence. (The card must be Active to grant access.)
You cannot select Active if the cardholder's state is Inactive.
If you select AutoCommence, the card automatically becomes
active at the specified commencement date/time. (Note that
you can only select AutoCommence if this feature has been

196
Chapter 12 - Managing cardholders and cards

Property Description

enabled for your system.)


If a Salto card is set to Lost or Stolen, the card is disabled in the
Salto system. To re-activate the card, it must be re-enrolled.

Commencement The date/time on which the card becomes active.


time

Expiry time The date/time on which the card expires.

Uses before expiry The number of times the card can be used before it expires. This
is typically used for a temporary card, which is only used a few
times before being automatically disabled. This is a DSA wide
setting and provides the total number of uses across all sites
rather than for an individual site.
When such a card expires, the card state changes to 'Expired
Counter'.

PIN Code The PIN code used on key pad readers. It is displayed as ****.

Card layout (front) The layout used on the front of the card when it is printed.

Card layout (back) The layout used on the back of the card when it is printed.

Last printed Shows the date on which the card was last printed.

Number printed Shows the number of times the card has been printed.

Table 12-19: Reception Manager properties


Property Description

Card Type If you want to use the added card in Reception Manager, choose one of
the Reception Manager card types:

l Generic, can be used as a visitor or temporary card.


l Visitor, is assigned to visitors only.
l Temporary, can be used as a temporary replacement card for
employees or external personnel only.

Visitor Assigning a visitor template to a generic or visitor card will provide any
Template visitor assigned that card the access rights that are pre-defined in the
visitor template.

197
Chapter 12 - Managing cardholders and cards

Table 12-9: Temaline Details

Property Description

Category The category of the recipient of the card. Select Normal or Shift from
the Category list.

Anti-passback Enables/disables anti-passback control for the card.


disabled

Double transit If selected, this cardholder can authorize the passage for a double
transit (escort capable).

Transit allowed In the Transit Allowed area, you can configure one of the following
options:

l All: There is no restriction on the number of transits that the cardholder


can have. This is the default entry.
l One Shot: The cardholder can effect a single transit per day at any
terminal on the system. This condition will remain in force for the
cardholder until the Reset command is executed. Applicable only if the
TemaKey is configured to control the number of transits.
l 1 In/1 Out: The cardholder can effect a single entry transit and a single
exit transit per day. This condition will remain in force for the cardholder
until the Reset command is executed. Applicable only if the TemaKey is
configured to control the number of transits.
Path control Enables/disables the path control. Path control grants or denies
disabled access depending on the historical situation of the card requesting
the access, such as the TemaKeys utilized for the preceding transits
or the time elapsed since those transits.

Second transit A numeric value that indicates whether the card is enabled (1) or
disabled (0) as a 'second transit' card.
If selected, the TemaKey requests a second transit operation before
granting access, (escort is required). For example, in order for a
vehicle to transit, both the vehicle and its driver must request transit
permission. Alternatively, access to high security areas might
depend on a transit request from two cardholders.

Authorized The Authorized Function list contains the authorization groups


Function defined for the system using the Authorized Functions display.
Interactive functions (like reasons, enquiries, transit categories and
additional data list) configured for the system can be associated to
each group. By selecting a group from the list, you enable the

198
Chapter 12 - Managing cardholders and cards

Property Description

employee to perform operations just on the group in question,


thereby limiting the use of interactive functions to selected users.

Length of stay Enables/disables the control on the length of a user's stay in a zone.
disabled

Disable Enables/disables the transmission of data to the peripheral devices.


download If this option is selected, data will not be sent to the peripheral
devices, but will instead be saved in the historic transit archive
following each card reading operation. It is a useful function for
cards that belong to a range, where the transits affected would
normally only be stored with the card number, that is, without the
name of the cardholder. This option therefore reduces the strain on
the limited memory of the peripheral devices, and at the same time
ensures that the data available at the supervision center level is as
complete as possible.

Data Displayed Determines whether the employee can view automatic information
and spontaneous messages on the terminal display.

Number Enable/disable the number of people control. If the control is


control disabled, the cardholder will not be counted as present in the zone.
disabled

Visitation The card cannot be used by the cardholder to escort visitors.


disabled

Spontaneous A message that is displayed automatically on the terminal following


Message a clock-in or clock-out operation.

Threat Level If selected, the card can be used to gain access to an area that
Override would otherwise be inaccessible because of the current threat level.

No PIN Code Applicable to Voyager controllers only. The cardholder is not


prompted to enter a PIN, access is provided by the card only.

Clear Code The clearly visible code on the card. The alphanumeric code printed
on the physical card which may be different to the card number
used by the system.

Long Access Keeps the door open for longer than usual without an alarm being
raised.

Short Name The abbreviated version of the employee's name, consisting of a

199
Chapter 12 - Managing cardholders and cards

Property Description

maximum of 16 characters, which will be displayed on the terminal


at the time of the transit operation.
By default, the system will create a short name made up of the first
thirteen characters of the last name, followed by a blank, then the
first letter of the first name, followed by a period. For example, the
employee Eric Nightingale would automatically be assigned the
short name 'Nightingale E.'.

Country The country in which the subject is resident.


Grouping

Edition This value indicates the card edition. The card edition check (if
enabled) verifies whether the card edition number corresponds to
the number stored in the employee personal data archive.

Table 12-10: SE (Security Electronics) Details

Property Description

Issue Code Defines which issue of the card is currently being used by the system. A
card with the same number but a different issue code will not be
granted access. To replace a lost card, for example, a card can be
created with the same card number but a different issue code.

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Long Specifies that the extended Door unlock time and Door open time are
Access used when opening a door. If the check box is cleared, the standard
times are used.

Extended Specifies that the cardholder can use this card in conjunction with
Door Time their PIN and a time code to keep a door open for a specified amount
by Keypad of time. The time codes are:

l 1 = 10 minutes
l 2 = 20 minutes
l ...
l 9 = 90 minutes
For example, a cardholder needs to keep a door open for 40 minutes,
they swipe their card, enter their PIN at the keypad, followed by 4#, to

200
Chapter 12 - Managing cardholders and cards

Property Description

indicate the 40 minute open time.


This option must be used in conjunction with:

l The Keypad enabled and the Extended door time by keypad options on
the access point Door Definition tab for Star II controllers.
l The Terminate keypad entries by # option on the access point Keypad
tab for Star II controllers.

Table 12-11: PCSC Details

Property Description

2nd Expiry This additional expiry date can be used to prevent access to a unique
Date group of readers, such as readers in a parking area or recreational
facilities. Once the date is reached, the card is disabled for this group
of readers only.
For fault tolerant controllers, this date is used to activate a card when
the Expiry is Activation check box is selected.

Cost Enables the cardholder to gain valid access even if they have
Override insufficient 'access credits'. For example, if an entry debits two credits
per usage and only one credit exists, cards marked with Cost Override
are granted access.

Building Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using normal doors.

Affiliation The MicroLPM card affiliation code. This is a method of grouping


Code categories of holders within the MicroLPM.

Event Event lockout MicroLPM feature for preventing card access based on
Lockout an event (for example, if a fire alarm occurs, card readers will deny
Override access to people trying to enter a building that is being evacuated via
other exits such as rear stairs and so on). If you set Event lockout
override for a card, the cardholder can bypass this lockout function. For
example, in the previous scenario, a fireman or fire warden card might
have the override set so they can enter the building.

Parking Disables the controller anti-passback mechanism for cardholders


Entry/Exit when using doors defined as Parking doors within the controller.

Class H The MicroLPM counter number for the H counter group. An H counter
Counter may operate additional functions in the controller on card use.

201
Chapter 12 - Managing cardholders and cards

Property Description

Escort Enables the cardholder to act as an escort.


Capable

Card Class Defines this card as valid member of card class A within the MicroLPM
A controller. A valid access by this card will execute any actions
programmed for Class A within the controller.

Escort If selected, the cardholder can only gain access if escorted by a


Required cardholder whose card is marked as Escort Capable.

Card Class Defines this card as valid member of card class B within the MicroLPM
B controller. A valid access by this card will execute any actions
programmed for Class B within the controller.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a
longer time to get through the door, such as someone using a
wheelchair.

Exempt Reuse time is "timed anti-passback." If this option is selected, a card


Reuse Time that previously has been granted access will grant access even if reuse
time has not elapsed (reuse time must be configured in the controller).
This option applies only to fault tolerant controllers.

Exempt Stale time is the duration since last access or use. If this option is
Short Term selected, a card that has not been used longer than the short-term
Staleness stale time will grant access.
This option applies only to fault tolerant controllers.

Exempt If this option is selected, a card that has not been used longer than the
Long Term long-term stale time will grant access.
Staleness
This option applies only to fault tolerant controllers.

Expiry is
If this option is selected, if the controller is configured to perform card
Activation
activation, the controller treats the secondary expiration date/time as
the activation date/time.

This option applies only to fault-tolerant controllers.

Keypad
If this option is selected, only a PIN access code, correctly entered, will
Entry Only
grant access. This option can only be used with a PINPAD terminal. A
physical card with that number will be denied.

202
Chapter 12 - Managing cardholders and cards

Property Description

This option applies only to fault-tolerant controllers.

Table 12-12: FS90 Details

Property Description

FS90 Card The type of card:


Category
l Employee. Normal card type with access as configured in EBI.
l Supervisor. Same as an employee card, as well as being a supervisor
card for controlled locations configured with the supervisor rule.
l Visitor. Access on the card is ignored. Access is only granted when
accompanied by an employee or supervisor cardholder.

Long Keeps the door open for longer than usual and extends the alarm
Access 'shunt' period. This is often required for cardholders who need a longer
time to get through the door, such as someone using a wheelchair.

Allow Select this check box if you want cardholders to be granted access even
Access on if communication between the server and the controller is lost.
Loss of
Comms

Table 12-13: AXSS-II Details

Property Description

Privileged Specifies that the card is a privileged card. Privileged cardholders can
Access gain access during building closed mode, and can open the panel.
Card

Table 12-14: IdentIPoint Details

Property Description

Escort If selected, the cardholder that has been issued this card requires
Required another cardholder who is escort capable to accompany them
through the building. Without an escort, this cardholder is not
granted access at a reader.

Escort If selected, the cardholder that has been issued with this card can
Capable be an escort to another cardholder who requires an escort.

203
Chapter 12 - Managing cardholders and cards

Property Description

Long Access If selected, this cardholder can hold a door open for the amount of
time configured as the long access time without any “door open too
long” alarms being generated.

Privileged If selected, the cardholder that has been issued this card can hold a
Access Card door open indefinitely without any “door open too long” alarms
being generated. When the door is closed, the door is relocked.

Anti-Passback If selected, the anti-passback rules do not apply to the cardholder


Exempt that has been issued with this card.

User defined One or more of these user-defined flags can be used in conjunction
A–G with triggers, validations, and actions.
The system can use a validation to check to see if the card
presented has one or more of these flags set before proceeding
with the assigned action.

Maintenance If selected, this card is used for maintenance purposes, not for
Card general access.

Table 12-15: Lift Access Details

Property Description

Default Specifies the default floor point to be assigned to the card for this
floor cardholder. When the card is presented to a lift terminal, it determines
which floor to go to based on this floor point.

User There may be other site-specific options related to Lift Access.


Defined

Table 12-16: Salto Details

Property Description

Update Period The time in days after which the card expires if it has not been
updated.

Office If selected, the cardholder can set a door to office mode.

Use This is read-only. Indicates whether anti-passback is enabled for the


Antipassback card.

Use extended Keeps the door open for longer than usual. This is often required

204
Chapter 12 - Managing cardholders and cards

Property Description

opening time for cardholders who require more time to transit the door due to a
disability.

Set lockdown If selected cardholders can set a door status to “lock down.”

Pin Specifies whether a customized PIN is written to the card.

Audit openings This is read-only. Indicates whether auditing is enabled for the card.
in the key

Encoded This is read-only Indicates if the card is encoded.

Changing a cardholder's access rights


You need to change a cardholder's access rights when their access
requirements change. Typical reasons for the change include promotions and
changes to work hours.

To change the access rights of a cardholder


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Access Rights tab.
3. If you want to:
a. Give an access right to the cardholder, click an access right in the
Available Access Rights list and then click Assign .
b. Remove access right from the cardholder, click an access right in the
Assigned Access Rights list and then click Unassign .
4. Click Save .

Assigning temporary access


To assign temporary access rights
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Temporary Access tab.

205
Chapter 12 - Managing cardholders and cards

3. Click an access right in the Available Temporary Access Rights list and
then click Assign .
The access right moves to the Assigned Temporary Access Rights list.
Note the details of the selected rights are displayed in the Details section.
4. Enter a Commence Date when the temporary access right will start.
Select Enable to enable this date.
5. Enter an Expiry Date when the temporary access right will end. Select
Enable to enable this date.
6. Click Save .

Deactivating or deleting a cardholder


You deactivate a cardholder (disable a cardholder's access) for various
reasons, for example, because the cardholder is on leave. When you
deactivate a cardholder, EBI automatically deactivates all the cardholder's
cards.
You typically delete cardholders when they leave the organization. When you
delete a cardholder, the way in which your system has been configured
determines whether the cardholder's record is deleted from the database, or
simply marked as 'deleted'. (In the latter case, you can still search for the
cardholder if you specifically search for cardholders whose state is 'Deleted'.)
If you delete a cardholder whose state is Deleted, it will be deleted from the
database.
When you delete a cardholder, the cardholder's cards are automatically
deactivated and returned to the list of unassigned cards. Deleting a
cardholder removes all data for that cardholder (image, signature, and so on)
from the system.

To deactivate a cardholder
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, in the Cardholder State list, click Inactive or Left
Company, whichever is appropriate.

To remove a cardholder
1. Search for and select the cardholder.
2. Click Delete .

206
Chapter 12 - Managing cardholders and cards

3. Click Yes (or press Y) in response to the confirmation message that


appears in the Message Zone.

Deactivating, canceling or deleting a card


You need to deactivate, cancel and delete cards for various reasons, for
example, when cards are lost, or cardholders go on extended leave or leave
the company.
You can:

n Change the card's status, so that it cannot be used. You typically do this if
the card has been lost or the cardholder has gone on extended leave.
n Delete the card, which deletes the card's record from the database. You
typically do this if the cardholder has left the company and the card is a
photoID card. (Your organization's work practices may also require you to
physically destroy the card.)
n Return the card to the list of unassigned cards, so that it can be issued to
another cardholder. You typically do this if the cardholder has left the
company and the card is not a photoID card.

To change a card's status


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card.
4. In the Card state list, click the appropriate state. For example, if the card
has been lost, click Lost.

To delete a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card you want to delete.
4. Click Delete card .

207
Chapter 12 - Managing cardholders and cards

To return a card to the unassigned list of cards


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card you want to return.
4. Click Return card .
The card's state changes to Unassigned .

Activating or reactivating a card


A card must be active before it can be used to grant access.
If a card expires but the cardholder still needs access, you must reactivate the
card. For example, the cardholder is a contractor whose contract has been
extended.

To activate a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. In the Card State list, click Active .

To reactivate a card
1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Select the card you want to reactivate.
4. Change the Expiry date and Expiry time to a suitable date/time.
5. In the Card State list, click Active .

Giving a cardholder access by remotely unlocking


a door
You typically need to remotely unlock a door for visitors who do not have
cards, or for cardholders who have forgotten their cards.

208
Chapter 12 - Managing cardholders and cards

The following procedure describes the steps typically involved in checking the
cardholder's identity and access rights, and then unlocking the door. (Note
that the steps may be different for your site. Ask your supervisor or an
experienced colleague for precise instructions.)

To unlock a door
1. Before you unlock the door, check that the cardholder does have access
to the area. For example:
a. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
b. Check that Cardholder State (on the Main tab) is Active .
c. If you have CCTV and Integrated PhotoID, you can also compare the
cardholder's image with what you see in the video monitor.
d. Click the Access Rights tab and check that the cardholder has access
to the zone.
2. Call up the display that shows the door. (This display typically shows the
floor plan.)
3. Your display may have a control (such as a button) that you can use to
unlock the door. If there is no control, complete steps 4–5 to unlock the
door.
4. Double-click the door's lock point to call up the Point Detail display for the
point.
5. In the OP list (on the left of the display), click Unlock.

Finding out why a cardholder cannot gain access


A cardholder may be denied access for a number of reasons, such as:

n The card has not been activated.


n The cardholder has not been given authorization for access.
n The cardholder has attempted to gain access to a zone earlier (or later)
than allowed.
The following procedure describes how to find out why a cardholder has been
denied access.

209
Chapter 12 - Managing cardholders and cards

To find out why access is being denied


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Recent Events tab.
This lists the cardholder's recent access events, including the
unsuccessful access attempt.
The Access Reason column lists why access was denied.

Access reasons
Access Reason Meaning

ABA Card The card or cardholder no longer has access. (Typically, a


Expired contractor, whose access has expired.)

Building not The building is in secure mode.


open

Card not in The card does not exist in the controller of the reader swiped.
memory There may be several reasons, for example:

l The card/cardholder has not been downloaded to the controller


l The card does not belong to your facility

Deleted card The card has been deleted from the database.

Escort required The cardholder only has access if escorted by an escort (another
cardholder who can act as an escort).

Expired card The card has expired.

Inactive card The card is not active.

Invalid reader The cardholder does not have access to the zone controlled by the
card reader.

Invalid time The cardholder attempted to access the zone outside the time
period specified by the access right.

Lost card The card is registered as having been lost.

No schedule A definition for the card exists in the controller however the
cardholder did not have access to the door at the time the card
was swiped.

210
Chapter 12 - Managing cardholders and cards

Access Reason Meaning

Not an escort The cardholder who attempted to act as a escort is not registered
as an escort.

Unassigned The card has not been assigned to a cardholder.


card

Undefined card The card reader does not know anything about the card. There
may be several reasons, for example the card/cardholder has not
been downloaded to the card reader, or the card does not belong
to your facility.

Wrong time The cardholder does not have access the zone at the time.
(Typically, the cardholder tried to gain access outside the
associated timer period.)

Finding out what an access right represents


(where and when it gives access)
Cardholders may sometimes ask you what their access rights represent.
Typical questions include: 'What parts of the building do I have access to?' or
'When can I access the store room?'
In practical terms, an access right gives access to particular place(s) at
particular times. Depending on the type of technology your system uses, an
access right might be called an access level or a behavior model.

To find out what an access right represents


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Access Rights tab.
The Assigned Access Rights list shows the cardholder's current access
rights.
3. Click an access right in the Assigned Access Rights list.
Check the access right details displayed in the Details of selected access
rights section.

211
Chapter 12 - Managing cardholders and cards

Viewing a cardholder's recent access events


The Recent Events tab on the various Cardholder displays shows details
about the cardholder's recent access events, including when each event
occurred, which card reader was used and whether access was granted or
denied.
Note that the tab also shows details about operational events, such as when
the cardholder's access rights were changed.

To check a cardholder's recent access events


1. Search for and select the cardholder.
The cardholder's details appear in the Cardholder display.
2. Click the Recent Events tab.

Using Integrated PhotoID


This section describes how to use Integrated PhotoID.
This section is only applicable if your system has licensed the Integrated
PhotoID option.

ATTENTION: If the Signature button is not displayed, configure the


field CHSignature to be visible in the Cardholder Database display
(Configure > Cardholder Management > Cardholder Database) . For
more information about configuring fields, see 'Configuring the
cardholder database' in the relevant controller's Access Control
Configuration Guide.

Capturing a portrait

ATTENTION: You must have the Image Capture task selected as part
of your operator profile in order to capture portraits.

To capture a portrait
1. Search for and select the cardholder whose portrait you are about to
capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Capture to call up the Image Capture display.

212
Chapter 12 - Managing cardholders and cards

3. When the cardholder's position and expression is appropriate, click


Capture to capture the image.
4. Click Save .

Capturing a signature using a camera


This describes how to capture a signature using a camera, that is, the
cardholder has signed their signature on a piece of paper and you want to
take a photograph of the signature with a video or still camera.

ATTENTION: By default, signatures are not visible for cardholders. To


enable this option, the Visible parameter must be selected for the
CHSignature field in the cardholder database. The CHSignature field
can be found on the Employee tab.

To capture a signature
1. Select the cardholder whose signature you want to capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Signature to call up the Image Capture display.
3. Click Capture .
A static image of the signature appears (.bmp format).
4. Click Capture to capture the image.
5. Click Save .

Capturing a signature using a signature pad


This describes how to capture a signature as the cardholder writes their
signature on a signature pad.

ATTENTION: By default, signatures are not visible for cardholders. To


enable this option, the Visible parameter must be selected for the
CHSignature field in the cardholder database. The CHSignature field
can be found on the Employee tab.

To capture a signature
1. Search for and select the cardholder whose signature you are about to
capture.
The cardholder's details appear in the Cardholder display.

213
Chapter 12 - Managing cardholders and cards

2. On the Main tab, click Signature to call up the Image Capture display.
3. Instruct the cardholder to write their signature using the signature pad.
4. Click Capture .
The signature appears in the image box. (If there is an existing signature,
it is replaced by the new signature.)
5. If the signature is not satisfactory, click the 'X' at the top-right of the image
box and ask the cardholder to write their signature again.
6. When you have captured a satisfactory image, click Save .

Capturing a signature using a mouse


This describes how to capture a signature as the cardholder writes their
signature using a mouse.

ATTENTION: By default, signatures are not visible for cardholders. To


enable this option, the Visible parameter must be selected for the
CHSignature field in the cardholder database. The CHSignature field
can be found on the Employee tab.

To capture a signature
1. Search for and select the cardholder whose signature you are about to
capture.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Signature to call up the Image Capture display.
3. Click Capture .
4. Instruct the cardholder to write their signature using the mouse.
The signature appears in the image box. (If there is an existing signature,
it is replaced by the new signature.)
5. If the signature is not satisfactory, click the X at the top-right of the image
box and ask the cardholder to write their signature again.
6. When you have captured a satisfactory image, click Save .

Importing a portrait or signature image


You can import a portrait or signature image that has been captured using a
device which is not linked to Integrated PhotoID. For example, you could use
a digital camera to take a photograph of the cardholder and then download it
to your computer. You then use the following procedure to import the image
into EBI.

214
Chapter 12 - Managing cardholders and cards

ATTENTION: By default, signatures are not visible for cardholders. To


enable this option, the Visible parameter must be selected for the
CHSignature field in the cardholder database. The CHSignature field
can be found on the Employee tab.

To import an image
1. Search for and select the cardholder whose portrait or signature you are
about to import.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Import.
3. Click Import.
4. Browse and select the required image file, and then click Open .
The dialog box closes and the selected image appears in the Image
Import display. (If there is an older image, the imported image replaces it.)
5. Click Save .

Printing cards
You can print either a single card or a range of cards.
Note that if you want to print a range of cards:

n Do not call up another display while printing is in progress because this


will terminate printing, and an unknown number of cards will be printed.
n If you cancel printing (by clicking Cancel), an unknown number of cards
will be printed. (The exact number of cards that are printed will depend on
when you clicked Cancel, as well as the size of the print buffer.)

To print a single card


1. Search for and select the cardholder whose card you want to print.
The cardholder's details appear in the Cardholder display.
2. Click the Cards tab.
3. Click the card you want to print and then click Print Card to call up the Print
Cards display.
4. Click Print.

215
Chapter 12 - Managing cardholders and cards

To print a range of cards


1. Search for and select the cardholders whose cards you want to print.
2. On the Main tab, click Print to call up the Print Cards display.
The display previews the first card.
3. Click Print.

Printing cardholders
By printing a cardholder, you can print the card layout assigned to the
cardholder without any card-related data such as card number or magstripe
encoding. (If the card layout assigned includes card-related fields, such as
card number, then the printed layout will include the text, card number.) This
can be useful if you only need a “card” for identification purposes and not
access control.

TIP: If you want to print the cards assigned to the cardholder, use the
Print Cards option.

To print a cardholder
1. Search for and select the cardholder you want to print.
2. Click the Access Details tab, and if there is no layout assigned to the
cardholder, assign the appropriate layout and click Save .
3. Click the Print Holder button.
A preview of the card layout appears.
4. Click the Print button.

Exporting a copy of a portrait or signature image file


If you want to use portrait or signature file in an application other than EBI, you
can export a copy of it.

To export a copy an image file


1. Search for and select the cardholder whose image you want to export.
The cardholder's details appear in the Cardholder display.
2. On the Main tab, click Portrait (or Signature ) to call up the Image Import
display.

216
Chapter 12 - Managing cardholders and cards

3. Click Copy To .
A dialog box opens.
4. Select a path and specify the filename for the copied image and click
Save .

Verifying a cardholder
If your site uses Integrated PhotoID and Honeywell Digital Video Manager,
you can use the cardholder comparison display to verify that the person who
has presented the card at the card reader is the person that has been issued
with the card before granting access to the cardholder.
CCTV cameras located near the reader capture video of the person at the
reader. This image is then presented on the Cardholder Comparison display
next to the portrait that was captured of the cardholder when the card was
issued.

To verify a cardholder
1. Compare the images presented on the Cardholder Video Comparison
display.
The Cardholder Video Comparison display automatically appears when a
card is presented at the readers that have been configured to use this
function.
2. Check the Access message.
If the cardholder has the authority to access the area, the Access
message should be Granted.
3. If you are certain the images match, click the Unlock Door button.
4. If it exists, click the Lock Door button after the cardholder has entered
through the doorway.

What is an access right?


An access right is a term that encompasses both behavior models (related to
Temaline) and access levels (related to other types of access controllers).
Access rights consist of a definition of a physical area in a building and a time
period. Access rights are assigned to cardholders to determine when they
have permission to enter a building or a particular area within a building.
When you assign access rights to a cardholder, you can see the details of
each access right and understand which physical areas of the building and the
time period the access right contains.

217
Chapter 12 - Managing cardholders and cards

How EBI monitors and controls access through a


door
In addition to the card reader, several other devices and associated points are
used to control and monitor access. The following figure and table describe
the devices and points used to control access through a typical door.

Figure 12-20: A door and associated devices for monitoring and control

Device Associated point

Card Reader An access point that monitors card usage, and reports
events such as 'access granted' and 'access denied'.
You use this point to obtain details about card usage.
For example, you would request a report on this point to
find out when a particular cardholder has passed
through the door.

Lock A status point that controls the lock. In normal


operation, the card reader controls the point when
cardholders present their cards.
However, you can manually control the point to give
access to visitors and cardholders who have forgotten
their cards.

Door status switch A status point that monitors the door's open/closed
status. For example, it raises an 'open too long' alarm if

218
Chapter 12 - Managing cardholders and cards

Device Associated point

someone holds the door open longer than allowed.

Exit switch. If fitted, A status point that monitors the status of the Exit switch.
people must press it Pressing the switch prevents an alarm being raised when
before opening the door opening the door.
(leaving the zone).

Point naming conventions for doors


Because a door's points work together, they are generally named in a manner
that helps you identify the door as well as the point's function. For example,
the points for the 'main door' might be named as follows:

n MAINDR-DS for the door status switch.


n MAINDR-RD for the card reader.
n MAINDR-LK for the door lock.
The naming convention makes it easier for you to perform tasks. For example,
if you need to unlock a door, you would unlock the door's 'LK' point.
You need to ask your supervisor or an experienced colleague for the point
naming conventions used on your system.

219
Chapter 12 - Managing cardholders and cards

220
CHAPTER

13 USING GLOBAL SCHEDULES TO


MANAGE YOUR BUILDING
Global Schedules manages your building-related systems—such as HVAC
(heating, ventilation and air-conditioning) and lighting—in an automated
manner, based on pre-defined schedules.
The information in the topics listed below is primarily intended for those who
need to use Global Schedules on a day-to-day basis.
The topics are intended to help building managers and others in a similar
position, who need to view, create or modify schedules as part of their
responsibilities in managing and overseeing the daily operations of a building
or site.

Viewing schedule details


It can be useful to understand how the equipment in a facility is scheduled, for
example, in situations when equipment is not operating as expected, or
changes are required to existing schedules.
There are two ways you can view schedules, you can view:

n Schedules for a particular resource


n All schedules, and see which resources the schedule is assigned to

Prerequisites
n To view schedule details, the location that has been assigned to the
resource must be included in the scope of responsibility of the Station (for
Station-based security) or operator (for operator-based security) and a
security level of OPER or higher is required.

To view schedule details for a specific resource


1. In Station choose Configure > Schedules > Global Schedules.
2. In the navigation pane, click Resources then expand the location tree and
then click the resource you want to see schedule details for.
The current week's schedule for the selected resource is displayed.
3. Use the controls at the top of the schedule area to navigate to the dates
you are interested in viewing:

221
Chapter 13 - Using Global Schedules to manage your building

l Use the forward and back buttons ( )


l Use the calendar control to navigate to a specific date ( )
l Use the Day/Week/Month control to change the view in the schedule
area ( )

To view which resources are controlled by a specific


schedule
1. In Station choose Configure > Schedules > Global Schedules.
2. In the navigation pane, click Base Schedules or Calendar Schedules,
depending on which type of schedule you want to see details for.
3. Click the specific schedule you want to view.
4. Click the Resource Assignment tab to see which resources are
controlled by the schedule.

Global Schedules display reference


The schedule area on the Resource Schedule tab shows the schedule events
that control the resource. Color is used to indicated different types of schedule
events. The following figure and table describe the schedule area.

Item Description

1 The details of the specific resource, such as name, description, and location

222
Chapter 13 - Using Global Schedules to manage your building

Item Description

2 Navigation controls to navigate forward and backwards through schedule


dates.

3 Changes whether the schedule area view shows a day, a week, or a month.

4 A schedule event from a base schedule that has already occurred. In this
example, the name of the base schedule is Standard hours, which is shown at
the top of the event. The color for an historic base schedule event is gray.

5 A schedule event from a base schedule that is currently active. In this


example, the name of the base schedule is Standard hours, which is shown at
the top of the event. The color for an active base schedule event is green.

6 A calendar schedule. In this example, the calendar schedule, Public Holidays


No Run, has no schedule event so that nothing happens on any dates that
are in the Public Holiday No Run calendar. The background color for a
calendar schedule is light blue.

7 Schedule events from a base schedule that are yet to occur. In this example,
the name of the base schedule is Standard Hours, which is shown at the top
of the event. The color for a base schedule event that is yet to occur is blue.

8 An exception schedule event for this resource. The color for an exception
schedule event is orange.

9 The details of any schedule event that is selected in the schedule area. In this
example, the exception schedule is selected.

10 The download status of the resource, a link to the Download Summary where
you can see more detailed information about the download status, and the
Download button.

Viewing resource details


When a resource is configured in Global Schedules, information is added
about the control items and control details associated with that resource.

To view resource details


1. In Station choose Configure > Schedules > Global Schedules.
2. In the navigation pane, click Resources and expand the location tree to
find the required resource.

223
Chapter 13 - Using Global Schedules to manage your building

3. Click the Control Items tab.


The Control Items list shows the name and type of control item associated
with the selected resource.
4. Clicking on an item in the Control Items list, displays the control details for
that item in the Control Details for Selected Control Item area at the bottom
of the display.
5. To return to the schedules view, click the Resource Schedule tab.

Resource status details


Your custom displays may have been configured to show a status icon for the
Global Schedules resources in your building. If you move your mouse over the
icon, you can see more information about the resource.

TIP: You can quickly navigate to the Global Schedules display by


clicking the resource status icon.

State Description

Disabled.
If the icon is black, the resource is currently disabled. Move the mouse over
the icon to see information about changes to the schedule for the resource.

Enabled.
If the icon is green, the resource is currently enabled. Move the mouse over
the icon to see information about changes to the schedule for the resource.

Standby.
If the icon is yellow, the resource is currently in standby mode. Move the
mouse over the icon to see information about changes to the schedule for
the resource.

Unknown.
If the icon is grayed out, the status of the resource is unknown. The status
may be unknown for the following reasons:

l The name of the resource has been deleted. If you move your mouse
over the icon, the tooltip says, No resource name provided.
l There is an error in the current schedule. If you move your mouse over
the icon, the tooltip says, Unabled to determine the download status of
the schedule.
l The resource does not exist. If you move your mouse over the icon, the

224
Chapter 13 - Using Global Schedules to manage your building

State Description

tooltip says, Resource name not found.

Understanding the types of schedules you can


create
The following schedule types are available in Global Schedules.

Schedule Description

Base A base schedule is the type of schedule you create when your
schedule scheduling requirements have a consistent pattern. For example, when
scheduling the lighting and air conditioning for an office building, you
might create a base schedule to cover the time period 7:00 to 18:00
and Monday to Friday for the entire year, every year.

Calendar A calendar schedule is the type of schedule you create when the
schedule scheduling requirements are variable, or need to occur on specific
days of the year, instead of set days of the week. For example, a
parliamentary sitting schedule might incorporate nonconsecutive
weeks across the year, with some months only having one week of
sitting, and some months with no sitting days

Exception An exception schedule is the type of schedule you create when you
schedule want to:

l Create a schedule event for a single resource as a one-off event.


l Create a schedule event for a single resource where the recurrence
is limited.
l Override or modify a base schedule or calendar schedule event for a
single resource.

Creating a base schedule


You create a base schedule for your standard scheduling requirements. For
example, scheduling the air conditioning in an office to be in operation
Monday to Friday, 7:00 AM to 6:00 PM.

225
Chapter 13 - Using Global Schedules to manage your building

Prerequisites
You must be logged on to Station with ENGR security level (or higher).

To create a base schedule


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane, next to Base Schedules, click Add .

TIP: If you are creating a base schedule for the first time, in the
navigation pane, click Base Schedules. Read the description of
what a base schedule is, then click Create Base Schedule .

3. On the Base Schedule tab, in the Name box, type a name for this base
schedule.
For example, if you have seasonal variations in your scheduling
requirements, create a base schedule called Summer weekly schedule
and a separate base schedule called Winter weekly schedule.
4. In the Description box, type a detailed description for the schedule.
5. From the First day of week list, choose the day that is considered to be the
first day of the week for your site.
The day you choose appears as the first day in the weekly view for the
schedule.
6. From the Usage list, set any start and end dates for this schedule as
required.
For example, if this is a seasonal schedule, in the Schedule Usage list,
click Between , and set the start and end dates for the season.
7. If you selected Between as the usage option and you want this schedule to
run every year, select the Use every year check box.
8. In the schedule area, on the day you want to add a schedule event, click
and drag to select the time period for the event, and then click Add
schedule event.

TIP: If you want to add the same schedule event to occur for every
week day, click Add to week days. If you want to add the same or
every day of the week, click Add to all days.

When setting the start and end times for schedule events, consider the
following:

226
Chapter 13 - Using Global Schedules to manage your building

l The maximum duration is 7 days


l Schedule events can run overnight
l A schedule event cannot overlap another schedule event
9. Below the schedule area, from the Control to list, click the state that this
schedule event will set the control item to.
10. Repeat steps 8 and 9 for each day of the week that requires a schedule
event.
11. Click the Resource Assignment tab and do one of the following:

Option Description

If this base schedule is to be Select the check box for


assigned to specific resources each resource you want
to assign the schedule
to.

If this base schedule is to be At the bottom of the


assigned to all existing resources display, click Select all.
(but not new resources created in
the future)

12. When you have finished creating the schedule, click Download .

Creating a calendar schedule


You create a calendar schedule when you want to control resources on
specific days, rather than set days of the week. For example, you need to
ensure that the HVAC equipment in a school is not operating during
designated school holidays when there are no students or staff in attendance.
In another example, you need to create a schedule for parliamentary sitting
days, where the sitting schedule occurs in nonconsecutive days or weeks of
the year.

Prerequisites
n You have created system calendars that include the required dates.
n You are logged on to Station with ENGR security level (or higher).

227
Chapter 13 - Using Global Schedules to manage your building

To create a system calendar schedule


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane, next to Calendar Schedules, click Add .

TIP: If you are creating a calendar schedule for the first time, in the
navigation click Calendar schedules. Read the description of the
what a calendar schedules is, then click Create calendar schedule .

3. In the Name box, type a name for the schedule.


For example, School holidays.
4. In the Description box, type a detailed description for the schedule.
For example, School holidays days for 2013.
5. Do one of the following:

Option Description

If you do not want Do not add a schedule event. Go to


resources to be step 8.
operational, that is, you do
not want any schedule
event to occur

If you do want resources to In the schedule area, click and


be operational drag to select the time period for
the event, and then right-click and
choose Add schedule event.

Proceed to step 6.

6. Under Schedule event Properties, from the Control to list, click the state
that this schedule event will set the control item to.
7. Ensure the Start time and End time are correct.
8. Under System Calendars, select the check box for each system calendar
to determine when this schedule occurs.

TIP: When you select a system calendar, the dates appear under
Dates.

228
Chapter 13 - Using Global Schedules to manage your building

9. Click the Resource Assignment tab and do one of the following:

Option Description

If this calendar schedule is to be Select the check box for


assigned to specific resources each resource you want
to assign the schedule
to.

If this calendar schedule is to be At the bottom of the


assigned to all existing resources display, click Select all.
(but not new resources created in the
future)

ATTENTION: If any of the resources also have a base schedule


assigned, the calendar schedule overrides the base schedule on
the days nominated in the system calender that was selected in
step 8.

10. When you have finished creating the schedule click Download .

Assigning an existing schedule to resources


Use this procedure if you have an existing base schedule or calendar
schedule that you want to apply to additional resources.
When working with a schedule that has been applied to more than one
resource, note that:

n Any modification to the schedule affects all of these resources. If you do


not want the modification to apply to one or more of the resources, you
need to “unassign” those resources from that schedule.
n Similarly, if you want to “delete” the schedule from one (or more) of the
assigned resources, do not delete the schedule, but simply unassign the
resource from the schedule.

Prerequisites
n You need to be logged on with a security level of ENGR, and the location
that has been assigned to this resource must be included in the scope of
responsibility, with full access, to the Station you are using (for Station-
based security) or your operator account (for operator-based security).

229
Chapter 13 - Using Global Schedules to manage your building

To apply an existing base schedule or calendar


schedule to resources
1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane, click the schedule you want to assign.
3. Click the Resource Assignment tab.
4. Click the check box for each resource you want to assign the schedule to.
5. Click Download .
The schedule details are downloaded to the new resources that you assigned
the schedule to.

Creating an exception schedule event for a


specific resource
Use this procedure to create an exception schedule event for a specific
resource, or if you need to modify a base schedule event or calendar schedule
event for a specific resource only. For example, a conference room is to be
used for meetings that are to be held every Tuesday from 7:00 PM to 10:00
PM for 3 weeks only.

Prerequisites
n To create an exception schedule, you need a security level of OPER or
higher, and the location that has been assigned to this resource must be
included in the scope of responsibility, with full access, to the Station you
are using (for Station-based security) or your operator account (for
operator-based security).

To create an exception schedule


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane, expand Resources and click the resource you
want to create an exception schedule for.
3. Navigate to the date you want to create the exception schedule for.
4. Do one of the following:

Option Description

If you want to create In the schedule area on the date you


an exception want to create the exception schedule

230
Chapter 13 - Using Global Schedules to manage your building

Option Description

schedule event: event, click and drag to select the time


period for the event, and then right-click
and choose Add schedule event.

If you want to In the schedule area, click the base


modify an existing schedule or calendar schedule event you
base schedule or want to modify, then proceed to step 5.
calendar schedule
event for this After you modify the schedule event, the
resource only color changes from blue to orange to
indicate that it is now an exception
schedule event.

If you want to delete In the schedule area, right-click the


an existing schedule schedule event and click Delete and in the
event for this Message Zone, click Yes to confirm to
resource only delete, and then proceed to step 8.

5. Below the schedule area, in the Name box, type a name for the new
exception schedule event.
6. From the Control to list click the state that this schedule event will set the
control item to.
7. If you want the exception schedule event to occur for a number of weeks,
from the Recurrence list, click Weekly and if required, to set an end date.
8. When you have finished creating the schedule, click Download .

Modifying a schedule for a specific resource


Use this procedure when you want to modify a schedule only for a specific
resource (or resources). For example, a tenant in an office building requires
the HVAC equipment to remain operational for several hours after the
standard close of business time. This change is applicable only for a single
tenant in the building, therefore you only want to modify the schedule for the
resources for that specific tenancy.

To modify a schedule for a specific resource


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane under Resources, click the resource you want to
modify.

231
Chapter 13 - Using Global Schedules to manage your building

3. If it is not already visible, click the Resource Schedule tab.


Any schedules assigned to the resource are shown. Base schedule and
calendar schedule events are shown in blue. Exception schedule events
are shown in orange.
4. Navigate to the day on which you need to modify the schedule.
5. Right-click the required schedule event and choose Modify. Make the
necessary changes to the schedule event properties.

TIP: If you only need to change the start or end time of a schedule
event, you can click and drag the top or bottom of the schedule
event to adjust the start or end time respectively.

The schedule event is shown in orange to indicate that this is a variance to


the schedule event that was previously assigned to the resource.
6. If you want to delete a schedule event, right-click the schedule event and
choose Delete .
7. When you have finished making the required changes, click Download .
8. Repeat steps 2-7 for each resource you want to modify.

Modifying base schedules


Use this procedure to make changes to a base schedule when you want the
changes to apply to all resources to which this schedule is assigned. If you
want to modify a schedule for a single resource only, you should modify the
specific resource as described in the topic “Creating an exception schedule
event for a specific resource”.
You can modify a base schedule by changing when the schedule is in
operation, that is, its usage, the start and end times of individual schedule
events, the “control to” states of individual schedule events, the name of the
schedule, and the resources assigned to the schedule.

Prerequisites
You must be logged on to Station with ENGR level security (or higher).

To modify a base schedule


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane under Base Schedules, click the schedule you want
to modify.

232
Chapter 13 - Using Global Schedules to manage your building

3. Make the necessary changes to the base schedule properties such as


Name , Description , Usage .
4. In the schedule area, click the schedule event you want to modify. Make
the necessary changes to the schedule event properties such as Start
Time , End Time , Control to state.

TIP: If you only need to change the start or end time of a schedule
event, in the schedule area you can click and drag the top or
bottom of the schedule event to adjust the start or end time
respectively.

5. If you want to add a new schedule event, in the schedule area on the day
you want to add a schedule event click and drag to select the time period
for the event, then right-click and choose Add schedule event and set the
schedule event properties as required.
6. If you want to delete a schedule event, in the schedule area, right-click the
schedule event and choose Delete .
In the Message Zone, click Yes to confirm to delete the schedule event.
7. If you want to change the resources that this schedule is assigned to, click
the Resource Assignment tab.
8. Select the check box for the resources you want to add, or clear the check
box for the resources you want to remove.
9. When you have finished making the required changes, click Download .
The changes are downloaded to all of the resources that this schedule
assigned to.

Modifying a calendar schedule


Use this procedure to make changes to a calendar schedule when you want
the changes to apply to all resources that this schedule is assigned to, on all
dates in the system calendar selected in the schedule.
You can modify a calendar schedule by changing the start and end time of the
schedule event, the control to state, the system calendars selected, in the
schedule, and the resources the schedule is assigned to.

Prerequisites
You must be logged on to Station with ENGR security level (or higher).

233
Chapter 13 - Using Global Schedules to manage your building

To modify a calendar schedule


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane under Calendar Schedules, click the schedule you
want to modify.
3. Make the necessary changes to the calendar schedule properties such as
Name and Description .
4. In the Schedule events area click the schedule event you want to modify.
Make the necessary changes such as the Control to state, Start Time , End
Time .
5. If you want to add a new schedule event, in the schedule area on the day
you want to add a schedule event click and drag to select the time period
for the event, then right-click and choose Add schedule event and set the
schedule event properties as required.
6. If you want to delete a schedule event, right-click the schedule event and
choose Delete .
In the Message Zone, click Yes to confirm to delete the schedule event.
7. Under System Calendars, select or clear the check boxes to change which
system calendars determine when the schedule occurs.
8. If you want to change the resources that this schedule is assigned to, click
the Resource Assignment tab.
9. Select the check box for the resources you want to add, or clear the check
box for the resources you want to remove.
10. When you have finished making the required changes, click Download .
The changes are downloaded to all the resources that this schedule is
assigned to.

Viewing download and modification details


The Download Summary provides information about recent downloads such
as the status of each download action (for example, whether the download
completed successfully). From this summary, you can retry any failed
downloads, or perform a “forced” download.

To view detailed information about downloads


1. In Station, choose Configure > Schedules > Global Schedules.
2. In the navigation pane of the Global Schedules display, click Download
Summary.
3. If you have a security level of MNGR, from the View downloads by list,
click the type of item you want to see download information for.

234
Chapter 13 - Using Global Schedules to manage your building

When you choose an item, the information on the summary is updated to


display the details for the item type selected.

TIP: If you have a security level lower than MNGR, you can only
view downloads for the resources that are within your scope of
responsibility.

Download status reference


The following table describes the icons that indicate the download status for a
particular item.

Icon Description

A download for the item is required.

A download is in progress for the item.

The download for the item completed successfully.

The download for the item failed.

There is no download required for the item.

The following table describes the information and the controls on the
Download Summary.

Option Description

View by Applicable if you have a security level of MNGR.


The item type you want to see download information for. You can
choose Resources or Controllers.
If you choose resources, a list of all resources appears showing the:

l Name of the resource.


l Download status of the resource.
l Date and time of the last download.
l Name of the operator who performed the last download.

235
Chapter 13 - Using Global Schedules to manage your building

Option Description

Filter by Applicable if you have a security level of MNGR.

You can filter the items by download status:

l Download failed
l Downloading
l Download required
l Download complete
l Download not required

Click this icon to view the resource.

Click this icon to force download individual resources or controllers.

Click this icon to delete the item. (This icon is only available if you
have performed a delete operation and the automatic download has
subsequently failed.)

Download Available only when viewing by Resources.


Modified
Downloads any schedules or resources details that have been
modified since the last download was performed.

Retry Failed Available only when viewing by Resources.


Downloads
Downloads any items that failed on a previous download. Before
retrying the download, you should ensure that the situation that
caused the failed download is resolved.

Force Downloads all schedules and resource details to all relevant


Download All controllers regardless of whether any modifications have been made.

Control If you are viewing downloads by resources, lists the control items
items associated with the selected resource, if the resource is currently
being downloaded. If you are viewing by controllers, lists the control
items associated with the selected controller. The information shown
for the control items is the:

l Name of the control item.


l Download status of the control item.
l Controller the control item belongs to.

236
Chapter 13 - Using Global Schedules to manage your building

Option Description

l Type of controller that the control item belongs to.

Schedule Lists the schedule events that are relevant to the selected control item
events that is currently being downloaded, such as the time of the download,
the modification that was made, and the status of the download. If the
download has failed, details of why it failed are provided.

Resolving failed downloads


The Download Summary aims to provide detailed information about the
download status of Global Schedules items, such as resources and schedule
events. If a download fails, the summary provides information about which
specific item and reasons for the failure. After you have resolved the cause of
the download failure, you can retry downloading the items from the Download
Summary.

To resolve failed downloads


1. In Station click Configure > Schedules > Global Schedules.
2. In the navigation pane, click Download Summary.
3. Locate any resources or controllers that show a failed status ( ).
4. Click the resource or controller to show the control items and schedule
events for that resource or controller.
5. Locate any control items or schedule events that show a failed status.
Additional information is available to indicate why the download failed, for
example, the controller to which the control item belongs is offline, and
therefore the information could not be downloaded. Use this information
to correct the issue that caused the download to fail.
6. When you have resolved the issue that cause the download to fail, click
Retry Failed Downloads.

237
Chapter 13 - Using Global Schedules to manage your building

238
CHAPTER

14 MONITORING FIRE PANELS

You only need to read this topic if the Fire Monitoring option appears on the
System Menu.
This guide only describes how to call up the status displays associated with
fire panels. It does not describe, for example, how to start a fire drill or how to
evacuate a building. For details of these procedures see the Building
Management Guide.
EBI monitors your fire panels, and raises an appropriate alarm whenever a
fire panel raises an alarm.

To monitor the status of the fire panels


1. Click the (System Menu ) toolbar button to call up the System Menu.
Click Fire Monitoring to call up the Fire Monitoring display.

Figure 14-1: Fire Monitoring Display

1. To check the status of the:


l Channels, click the XLS Channel Status button
l Panels, click the XLS Panel Status button

239
Chapter 14 - Monitoring Fire Panels

240
CHAPTER

15 RESPONDING TO MESSAGES

This section describes what messages are and how to respond to them.

About messages
Messages are generated for many reasons. For example, when a point goes
into alarm, you may receive an explanatory message in addition to the alarm.
Other types of messages may also give you a set of procedures you are to
perform, or list some actions you must take before the message can be
acknowledged.
Messages appear in the Message Summary with a flashing icon. When
you acknowledge a message, it is removed from the Message Summary.

Calling up the Message Summary


Messages that have not been acknowledged (and, if appropriate, confirmed)
are listed in the Message Summary.
The icon to the left of a message flashes if it has not been acknowledged.

ATTENTION: The Message box in the Status Bar flashes green if


there are any unacknowledged messages.

To call up the Message Summary


Choose ViewMessages.

241
Chapter 15 - Responding to messages

Figure 15-1: Message Summary Display

Message Summary columns


The following table describes the default message line items, starting from the
left.

Column Description

Message Informational message ( )


state

Date & The time and date at which the message was received.
Time

Location The tag name of the location to which the point or device belongs.
Tag

Source The point or device that caused the message.


If the point ID is too long to be fully displayed in the alarm summary, it
is truncated. To see the full name, place the mouse pointer over the
partial point ID to display the full point ID.

Message The text of the message.

242
Chapter 15 - Responding to messages

Changing what is shown in the Message


Summary
ATTENTION: Depending on your security privileges, you may not be
able to filter and sort the Message Summary. The options that are not
available to you are disabled and are dimmed.

By default, the Message Summary shows all messages, with the newest
message at the top. You can change the Message Summary by applying
views, filters and sorting the summary.

Using the Location pane on the Message Summary


The Location pane provides a list of locations to which you have access. You
can use the Location pane to filter the Message Summary to show messages
for a particular location only.

To show the Location pane use either method

1. Click the Show Location Pane icon .


2. Click the Location list and click the Push Pin ( ) to dock the
Location pane.

To hide the Location pane use either method

1. Click the Hide Location Pane icon .

2. Click the Close icon in the Location Pane .

To filter using the Location pane


1. Show the location pane if it is hidden.
2. Expand the location tree to locate the item by which you want to filter.
3. Click the required item(s).
Alarms are filtered to show any alarms for the selected item(s).

TIP: Use SHIFT+click to select multiple items in a successive list.


Use CTRL+click to select multiple items not in succession.

243
Chapter 15 - Responding to messages

Filtering and sorting the Message Summary


Filtering the Message Summary allows you to show messages that match the
filter criteria and hide messages that do not match the filter criteria. For
example, you can filter the Message Summary to show messages of the type
informational only.
Sorting allows you to set the order in which messages appear in the
summary. The sort order can be ascending or descending. For example, you
can sort messages by date and time, in ascending order. This means that
messages are listed in order of ascending date and time, that is, the oldest
message is listed at the top of the summary.
You can apply more than one filter at a time and you can also filter and sort at
the same time. When the Message Summary is filtered, the column by which
you are filtering is highlighted. When the Message Summary is sorted, the
column by which you are sorting has an up arrow to indicate Sort Ascending
and a down arrow to indicate Sort Descending.
An easy way to filter the summary is to perform a 'like currently selected' filter.
For example, if you want to see all messages for a particular point. You can
select the message for the particular point, click the Source column and select
(like currently selected). The Message Summary is filtered to show all
messages in the summary that match the source of the currently selected
message.

To filter the Message Summary


1. Call up the Message Summary display.
2. Click the column heading you want to filter by.
3. Select the filter you want to apply.

To sort the Message Summary


1. Call up the Message Summary display.
2. Click the column heading you want to sort by.
3. Select the sort order.

To remove sorting and column filters


1. Click Clear all Filters.
Any sorting and/or column filters applied to the summary display are
removed.

244
Chapter 15 - Responding to messages

TIP: If a custom filter has previously been applied, clicking Clear


All Filters does not reset the summary back to the default view.
Rather, all filters are cleared and the view name is shown with an
asterisk indicating it that the view has been modified.

Example scenario filtering the Message Summary


You want to filter the Message Summary so that you see informational
messages.

Solution
1. Call up the Message Summary display.
2. Click the Message State column and select Informational.
The Message Summary changes to list messages that are of the type
informational.

Example scenario - sorting the Message Summary


You want to sort the Message Summary so that messages are sorted in
ascending order by location.

Solution
1. Call up the Message Summary display.
2. Click the Location column.
3. Select Sort Ascending.
The Message Summary changes to list messages in ascending order
according to the location.

Using views within the Message Summary


A view contains the information about filtering and sorting, which message
line items are shown, the order they are shown in and the space provided for
each item.
The following views are predefined:

n (all messages)—shows all messages


n (informational messages)—shows informational messages only

245
Chapter 15 - Responding to messages

Your system may be set up with site-specific views. Ask your supervisor or an
experienced colleague about other views and what information they display in
the Message Summary.

To apply a view
1. Click the view list.
2. Select the view from the list.

Using the details pane on the Message Summary


The details pane shows the details of the currently selected message. If no
message is selected, the details pane is empty.

To show or hide the details pane


1. Click the Details pane icon.

Navigating the Message Summary


There are several ways to scroll the list of messages on the Message
Summary. You can:

n Use your mouse and click on the scroll bar


n Use the mouse wheel (if your mouse has one)
n Use the UP ARROW and DOWN ARROW keys on your keyboard
n Press the PAGE UP and PAGE DOWN keys to scroll a page at a time
n Press the HOME key to go to the first message in the summary
n Press the END key to go to the last message in the summary

TIP: If you want to use your keyboard keys or the mouse wheel to
scroll the Message Summary, you need to click your mouse in the
summary grid to give it focus.

Pausing the Message Summary


You can pause the Message Summary to make it easier to read if messages
are occurring in rapid succession. When the Message Summary is paused no
new messages are added to the summary, however you can still
acknowledge messages and filter and sort the summary. Messages that are
acknowledged while the summary is paused are shown with a strikethrough.

246
Chapter 15 - Responding to messages

If a message has been replaced in the message list by a more recent


instance, the message time will be shown with a strikethrough only. The old
time will be retained to keep the message's position in the message list from
changing. The message icon will update to reflect the new message.

To pause the Message Summary


1. On the Message Summary display click Pause .

Resetting the Message Summary


You can click the Reset View button ( ), on the toolbar of the Message
Summary display to load the default summary display. For example, it will
load the Show All Messages view. It will also reset all filters and column
positions back to default settings.

To reset the Message Summary


1. On the Message Summary toolbar, click Reset View.
2. Acknowledge the Yes/No warning message displayed at the top of the
summary display.

Acknowledging messages
To acknowledge a single message
1. Do one of the following:
l Select the message and click the (Alarm Acknowledge) toolbar
button.
l Right-click the message and choose Acknowledge .
l Select the message and press the appropriate key; for more
information, see the topic “Shortcut keys for a 12–function keyboard”.

To acknowledge all currently visible messages


1. Click the Acknowledge Page button on the display.

247
Chapter 15 - Responding to messages

248
CHAPTER

16 PRODUCING REPORTS

Reports help you analyze system activity in many useful ways. For example,
you may want a report on:

n Access-related alarms that were raised during the last 24 hours, grouped
by particular door/card reader.
n Who is currently in the building.
n The current values of a range of points.
All reports need to be requested, either manually or automatically.
Requesting a report generates a new version, using the latest data. For
example, if you have a report called 'Weekly Status Report', you would need
to request it each week so that it contains the current week's data.
Depending on how a report is configured, it is printed, or saved to computer
file so that it can be viewed on screen or used by another program. If the
report is designed to be viewed on screen, you need to call it up after
generating it.
For alarm, events and message summaries, you can use the Print As Report
feature to produce a printed report containing all, or a range of, the summary
information within the display.
If you simply want a printout as a 'snapshot' of what is currently shown in
Station, you do not need to print a report, you can print the display.

Requesting a report
When you request a report, a new version is created using the latest data. For
example, if you have a report called 'Weekly Status Report', you would need
to request it on a weekly basis to ensure that the data is always up-to-date.

TIP: You can run the Incident Detail report directly from the Incident
details pane by clicking the Print icon ( ) at the top of the pane.

249
Chapter 16 - Producing reports

To request a report
1. Navigate to the Reports summary by doing one of the following:
l Click the System menu icon ( ) on the menu bar or map toolbar, and
then click Reports or View all reports.
l Choose Menu > Action > Request Report.
2. Click the report you want to request.
3. If you want to change the report's existing settings, click Configure
reports to see the configuration details.
4. Change these as appropriate.
5. Click the Request button to request the report.
A Request in progress message appears in the Message Zone.
The document is sent to the specified output device, either a printer or
your screen.

Requesting a report from the Command Zone


If you know the number or name of a report, you can request it from the
Command Zone. (Note that when you request a report this way, the report
uses its default or last configured settings.)

For example, to request report '123'


1. Click the Command Zone.
2. Type rpt 123 and press ENTER.

Viewing a report
The latest generated version of any report can be viewed on your screen at
any time, just like any other display.

ATTENTION: If you want to update the report's contents, you must


request it again; see the topic “Requesting a report”.

For example, to call up report '123'


1. Click the Command Zone.
2. Type pr 123 and press ENTER.

250
Chapter 16 - Producing reports

Standard report types


The following table lists standard report types; however, your system will only
have report types that are applicable to your system's needs.
Reports marked ‘ACS’ in the Usage column are only applicable to Access
Control and Security.

Report type Description Usage

Access Data Exports (and imports) access control information to (from) ACS
an external file, so that it can be viewed and edited by other
applications such as Microsoft Excel.

Access Level Lists the zones and associated time periods associated ACS
with the specified access levels.

After Hours Lists the alarms and events that occurred during a
Alarms specified 'after hours' period over a specified time span.

Alarm and Lists the alarms or events that occurred within the
Event specified time period.

Alarm Lists how long the specified points were in an alarm


Duration condition.

All Points Lists all values of a set of specified points using a


configurable set of filtering and sorting criteria.

Card Usage Lists the number of times the specified cards have been ACS
used, and the cardholder to which each card is assigned.

Cardholder Produces a detailed list of all cardholders which match the ACS
Details specified criteria, one page per card.

Cardholder Lists all cards, or the cards that match the specified ACS
List criteria, and the cardholder to which each card is assigned.

Cardholder Lists the specified zones and the cardholders with access ACS
Zone to the specified zones. Can be sorted by zone name or
cardholder.

Door History Lists all cards presented to one or a number of access ACS
points within the specified time period.

Extended Lists alarms and events that have occurred within the
Alarm and specified time range and includes extended alarm

251
Chapter 16 - Producing reports

Report type Description Usage

Events messages and operator comments.

FS90+ Lists FS90+ points and their values based on the selection
criteria you specify. (The FS90+ is a fire panel.)

Group Card Lists the specified access events (entries, exits, or denials) ACS
Trail for a group of cards within the specified time period.

History Lists historical data, such as the maximum and minimum


values, for points that match the search criteria, and that
have been configured for history collection. Historical data
can also be shown in graphical form and you can also
include event information for each point.

Incident Lists detailed information about an incident, such as the


Detail incident type, priority, location, the operator responsible
for executing each workflow step, and so on.

Incident Lists summary information about an incident, such as


Summary time, incident type, and location.

Incident Lists summary information on incident types that occurred


Summary during a specified time period.
report by
time

Microsoft Enables you to request customized reports that have been


Excel designed using Microsoft Excel.

Occupancy Lists all cardholders currently in a specified zone or zones. ACS


The zones must have been configured for occupancy
counting using Zone Enforcement.

Point State Lists the number of times the specified points have
Changes changed state within a specified time period.

Time Period Lists the time period configurations that match the ACS
specified criteria.

Zone Lists the doors belonging to specified zones. ACS


Information

252
Chapter 16 - Producing reports

Printing a report of what is shown in a summary


display
You can print a report that contains the same information as currently shown
in the Alarm, Events, or Message Summary display.
In addition to the data shown in the summary display, the report includes:

n The date and time it was requested.


n The operator ID or Station that requested the report. (The operator ID if
you use operator-based security; or Station number if you use Station-
based security.)
n The filter and sort criteria.
n The name of the server where the data originates.
Note that the icons are replaced with codes, which are described at the
bottom of each page.

ATTENTION: Print and Print Preview icons are enabled and disabled
based on security settings configured for Station under Server wide
settings. For more information about Station security, see the section
“Server wide settings” in the EBI Configuration and Administration
Guide.

To print a report of what is shown in a summary display


1. Call up the summary display that you want to report on.
2. If appropriate, filter the display to show only the data you want to include in
the report.
3. If you want to check what the report will look like, click (Print Preview) to
see a screen version of the report.
A message warns you if the report is more than 10 pages long. You can
then, if necessary, redefine your filter criteria to reduce the size of the
report.
4. Click (Print) to print the summary display as a report.
5. When the Print dialog box appears, set your printing options such as page
orientation, printer selection, and so on.

TIP: You can also export the report to a standard file format that
can be read by other applications.

253
Chapter 16 - Producing reports

254
CHAPTER

17 MONITORING AUTOMATION
RULES
Automation enables routine, repetitive tasks to be performed automatically by
the system. Automation rules assist the operation of everyday tasks by:

n Offloading tasks that do not require operator intervention onto the server.
For example, changing the state of a point, starting a video recording, and
so on.
n Task sharing, which includes managing content automatically (for
example, performing cardholder comparisons and displaying video to an
alarm monitor) and supporting task distribution.
Operators can search automation rules and view a summary of the rules
defined on the server.

TIP: Because automation may affect how you interact with the system,
you should ask your supervisor or an experienced colleague for details
of how automation has been implemented at your site.

Searching automation rules


You can search the automation rules in your system. You can search for rule
title, text used in conditions and actions, and point names used in the rule.

TIP: Search results are not filtered by scope of responsibility; however,


you cannot perform actions on search results unless you have the
appropriate security level.

To search automation rules


1. Choose Configure > Automation Rules > Rules.
The Rules summary is displayed.
2. Type the text you are looking for in the search box in the tree pane.
You can use wildcard characters in your search query.

3. Click the Search icon ( ).


Automation rules that match your search query are displayed.

255
Chapter 17 - Monitoring automation rules

Viewing the Rules summary


Use the Rules summary to view automation rules currently defined in the
system. The Rules summary provides an at-a-glance overview of the current
state of your automation rules. Rules are listed on the summary in the order in
which they were created.
The Rules summary also displays the results of any searches you perform.
Use the buttons at the top of the summary to perform rule maintenance tasks.
If there are more automation rules than can be displayed on a single page,
you can navigate the summary pages by using the buttons at the bottom of the
page.

TIP: The Rules summary is not filtered according to scope of


responsibility. However, your ability to perform tasks on the rules listed
will depend on your security level.

To view automation rules


1. Choose Configure > Automation Rules > Rules.
The Rules summary is displayed.
2. To filter the summary, click a filter name in the tree pane.
By default, all rules are displayed. The number in parentheses by the filter
name indicates the number of rules on the server with that characteristic;
for example, Incomplete (11) indicates 11 rules on the server are
incomplete.

Item Description

Rule Name The name of the rule. Click the rule name to
display rule details.

Conditions The condition (and validation, if selected) defined


in the rule.

Actions The first two actions defined in the rule.

Last Run Time of last execution.


Time

Status Current rule status:

l Enabled. Rule is available for processing.

256
Chapter 17 - Monitoring automation rules

Item Description

l Enabled (Needs review). Rule contains an


item that has been modified or that does not
exist in the system. The rule should be
manually reviewed.
l Disabled. Rule is not available for
processing.
l Disabled (Needs review). Rule contains
an item that has been modified or that does
not exist in the system. The rule should be
manually reviewed.
l Incomplete. Configuration for this rule is
incomplete—a condition, action, or other
mandatory information is missing.

3. To sort rules, click Rule Name to sort by name or Last Run Time to sort by
execution time. Click the column name again to toggle between
ascending or descending sort order.

257
Chapter 17 - Monitoring automation rules

To use the action buttons


1. Click an action button to perform a task.

Item Description

Add New Displays the Settings tab.


Rule

Copy Select the rules you want to copy and then click Copy.
Click Yes at the prompt. Copied rules are appended
to the summary.

Delete Deletes selected automation rules. Select rules you


want to delete, and then click Delete. Click Yes at the
prompt. To delete all rules, click Select All, and then
click Delete. To clear all selections, click Select None.

Enable Enables the selected automation rules.

Disable Disables the selected automation rules.

Import Imports rules from a file.

Export Exports selected rules to a file.

Viewing automation rule execution history


Use the Execution Report tab to view execution history for an automation
rule. If you want to export and/or print the report, use the controls on the
report menu bar.

TIP: You can define how long to retain rule execution history from the
Automation Preferences tab.

To view rule execution history


1. Choose Configure > Automation Rules > Rules.
The Rules summary is displayed.
2. Click the rule for which you want to view execution history.
The Settings tab is displayed.
3. Click the Execution Report tab.
The report contains the following information:

258
Chapter 17 - Monitoring automation rules

Item Description

Last time rule Last time the rule executed successfully.


was run
successfully

Number of Number of times during the previous week the


times rule rule was triggered.
initiated in last
week

Number of Number of times during the previous week the


failures in the rule failed to execute. (A rule fails if at least one
last week of its actions does not execute.)

Activated at Time the rule was activated (triggered).

Executed at Time the rule began execution.

Completed at Time the rule completed execution.

Result Status of the rule at the end of execution.

259
Chapter 17 - Monitoring automation rules

260
CHAPTER

18 COMMUNICATING WITH YOUR


COLLEAGUES USING MESSAGE
PAD
Station provides Message Pad for communicating with your colleagues.
The Message Pad is like a bulletin board in that it can be read by anyone who
has access to Station. As the name implies, the primary purpose of the notes
are to tell colleagues on the next shift about any important events.

To read the Message Pad


1. Choose View > Message Pad . (Alternatively, click Message Pad on the
System Menu.)

To clear all existing notes and add your own notes


1. Choose View > Message Pad .
2. Click the Clear button.
3. Click in the note area. (Alternatively, press the TAB key until the note area
is highlighted.)
4. Start typing your note.
5. When you have finished, click the Save button.

261
Chapter 18 - Communicating with your colleagues using Message Pad

To add to the existing note


1. Choose View > Message Pad .
2. Click below the existing note.
You may need to press ENTER to start a new line.
3. Start typing your note.
4. When you have finished, click the Save button.

262
CHAPTER

19 USING THE SYSTEM STATUS


DISPLAY
The System Status display is similar to the Alarm Summary, but shows
system alarms for system components only.
You can use the System Status display to:

n Check the status of components to verify that they have been configured
correctly and are operating correctly.
n Respond to system alarms such as:
l Communications failures
l Station failures
l Operator logon failures
l Printer failures.
n Monitor the status of the system to prevent problems occurring.
n Diagnose problems in the system.

Calling up the System Status display


You can call up the System Status display in the following ways:

n Using the Station menu


n Using the Station Status Bar, usually in response to a system alarm

To call up the System Status display using the Station


menu
1. In Station choose Menu > View > System Status.

To call up the System Status display using the Status


Bar
1. In Station, click the System box in the Status Bar.
The System box flashes if there is a system alarm.

263
Chapter 19 - Using the System Status display

Components of the System Status display


There are several parts that make up the System Status display. The
following figure shows the parts of the System Status display.

Figure 19-1: System status display components

You can show or hide all of the panes, except for the Results pane. The
Results pane is always visible.

Location pane
The Location pane on the System Status displays has a hierarchical tree
which shows all of the EBI related components such as servers, Stations,
channels, and controllers.
You can expand and collapse the trees as required to navigate to the
component to check its status or to view alarms associated with the
component. If you double-click a component, the status detail display for that
component is opened.
The Location pane can give you the following status information:

n The number of alarms for each type of component


n The alarm state of the most important alarm for each type of component
n The status of each component

264
Chapter 19 - Using the System Status display

Figure 19-2: Location pane

Status pane
The Status pane is similar to a faceplate and provides graphical information
about the status of the item you have selected in the Location pane so that you
do not have to navigate away from the System Status display and lose view of
other system alarms. The status pane shows a subset of the information that
is contained in the detail display for the item you have selected in the Location
pane. The exact information shown in the Status pane is different for each
type of component; the type of information available in the status pane can be:

n Alarm state of any alarms raised on the component (as well as an alarm
acknowledge button)
n The current state of the component
n Connection status
The Status pane is empty if you do not have an item selected in the Location
pane.

265
Chapter 19 - Using the System Status display

Figure 19-3: Status pane, showing typical status information

Results pane
The Results pane shows any alarms for the component that you have
selected in the Location pane. It is similar to the Alarm Summary. You can
acknowledge alarms from the Results pane in the same way you
acknowledge alarms in the Alarm Summary.

Figure 19-4: The Results pane

Details pane
The Details pane shows more details of the alarm you have selected in the
summary. If no alarm is selected the Details pane is empty.

266
Chapter 19 - Using the System Status display

Figure 19-5: Details pane

System Status icons reference


The table below describes the icons on the System Status display.

Icon Description

Failed

Something has gone wrong with the component and it has stopped
working. Further investigation is required to find out why the component
has failed.

Marginal

The component is partially functional. Further investigation is required to


find out what is going wrong with the component to prevent a complete
failure.

OK

The component is functioning correctly.

Disabled

The component is either not configured, not yet enabled, or has been
switched off.

Unknown

The status of the component cannot be determined.

None

The component does not support reporting its status.

267
Chapter 19 - Using the System Status display

268
CHAPTER

20 SPECIALIZED ACCESS CONTROL


PROCEDURES
This section describes specialized access control procedures, such as
deadman timer messages and guard tours.

Deadman Timer messages


You only need to read this topic if you can see the (Acknowledge
Deadman Alarm) toolbar button.

The deadman timer ensures that you promptly acknowledge alarms, and that
you are at your Station. Because the deadman timer can be configured in
several ways, you need to ask your supervisor or an experienced colleague
for detailed instructions.
Whenever a deadman message appears in the Message Zone, you need to
acknowledge it by clicking the toolbar button.
If you do not acknowledge the message within a specified time, a deadman
point will go into alarm, and you may be logged off.

Resetting the Deadman Timer points


Your system may be set up so that you need to reset the deadman points to
their normal states if the deadman timer has logged you off Station, or if you
failed to respond to deadman message within the specified time.

To reset the deadman points


1. Choose View > Deadman Timer to call up the Deadman Timer Status
display.
As an operator, you cannot change the settings shown in this display.
2. Click the Reset Points button at the top of the display.

Managing Guard Tours


A guard tour defines the points guards must visit as well as:

n The time allowed to travel to each successive point


n The actions guards must perform at each point

269
Chapter 20 - Specialized Access Control Procedures

Alarms are raised if the guard deviates from the tour—for example, if the guard
takes too long (or not long enough) to reach the next point, or fails to perform
a specified task.
You may need to manually start some tours; others may automatically start at
the programmed time.

Monitoring or controlling a guard tour

To monitor or control a guard tour


1. Choose Configure > Operating Displays > Guard Tour to call up the Guard
Tour display, which summarizes the status of every guard tour.
2. To control a tour, click the tour you want to control to call up the control
display.
3. You can now control the displayed tour as required. See:
l "Readying a Guard Tour" below
l "Starting a Guard Tour" on the facing page
l "Suspending a Guard Tour" on the facing page
l "Aborting a Guard Tour" on the facing page

Readying a Guard Tour


You only need to ready a guard tour if:

n It has been suspended, and you want to restart it from the beginning. (The
command sets the tour to start at position 0.)
n It is an automatically activated tour, however, you want to start it before
the scheduled time. (After readying the tour, you can then manually start
it.)

To ready a guard tour


1. On the Status tab, click the Ready button.
A message appears in the Message Zone, asking you to confirm your
command.
2. Type y and then press Enter.

270
Chapter 20 - Specialized Access Control Procedures

Starting a Guard Tour

To start a guard tour


1. On the Status tab, click the Start button.
A message appears in the Message Zone, asking you to confirm your
command.
2. Type y and then press Enter.

Suspending a Guard Tour

To suspend a guard tour


1. On the Status tab, click the Suspend button.
A message appears in the Message Zone, asking you to confirm your
command.
2. Type y and then press Enter.
Another message appears, asking you for a reason for suspending the
tour.
3. Type the reason (30 characters or less), and then press Enter.

To restart the tour from


1. Choose one of the of the following:
l Where it left off, click the Start button.
l The beginning, click the Ready button and then the Start button.

Aborting a Guard Tour

To abort a guard tour


1. On the Status tab, click the Abort button.
A message appears in the Message Zone, asking you to confirm your
command.
2. Type y and then press Enter.
Another message appears, asking you for a reason for aborting the tour.
3. Type the reason (30 characters or less), and then press Enter.

271
Chapter 20 - Specialized Access Control Procedures

Guard Tour statuses


Status Description

Aborted The tour has been aborted by an operator.

Complete The tour is not running.

Delayed The tour has been terminated because the guard has failed to arrive
at the next destination

Position The guard's last known position.

Ready The tour is ready to start.

Running The tour is in progress.

Suspended The tour has been suspended by an operator.

272
CHAPTER

21 REFERENCE TOPICS

The topics listed below contain reference information that makes it easier to
perform your operational tasks.

Command reference
After you have become familiar with your system, you can quickly issue
frequently required commands by typing them in the Command Zone.

ATTENTION: Commands are case-insensitive. For example, you can


type bye, BYE, or Bye to log off.

Then
Type the command Description
press

displayname Enter Calls up the display whose name is displayname.

cardholdername F11 Displays the details of cardholdername.


If you only type part of the name, a list of matching
cardholders appears. You then click the appropriate
cardholder to display that person's details.

pointID F12 Calls up the point's details.


If you only type the first part of the ID, a list of
matching points appears. You then click the
appropriate point to display its details.
If your system uses DSA or point servers, information
on some points you may need to access is stored on
remote computers. As a result, the first time you call
up the point's details you may need to enter the full
point ID. After this, using part of the point ID
produces a matching point.

ATTENTION: EXCEL 5000 direct points are


case-sensitive for the initial point detail
request.

bye Enter If you use operator-based security, this command

273
Chapter 21 - Reference topics

Then
Type the command Description
press

logs you off Station.


If you use Station-based security, this command
returns Station to the oper security level.

callup n Enter Calls up display n, (which can be either a number or


a name) while retaining the current file, record and
field numbers.

chgpsw Enter Changes your password. (Only applicable if you use


operator-based security.)

display n Enter Displays the description for error number n.

fil n Enter Changes the current file number to n.

fld n Enter Changes the current field number to n.

grp n Enter Calls up group display n.

his n Enter Displays the historical values for group n.

pag n Enter Calls up display n (which can be either a number or a


name). For example, to call up display 310, you
would type: pag 310.

pr n Enter Views the numbered (n) or named (name) report,


pr name without updating the report's contents.
(Use the rpt command if you want to update the
contents.)

psw Enter Changes to another security level if you are using


Station-based security.

rec n Enter Changes the current record number to n. (Not


applicable to operators.)

rpt n Enter Generates a numbered (n) or named (name) report.


rpt name

tnd n Enter Calls up trend display n.

Shortcut keys for a 12-function keyboard


The shortcuts are described according to general function.

274
Chapter 21 - Reference topics

Calling up system displays

To call up the Press

Alarm Summary F3

Event Summary F6

Reports Summary F7

Search display for cards/cardholders F11

Search display for points and other system items F12

System Menu F1

Calling up other displays

To call up Press

A display based on its name or number. F5

The next display in the current 'chain' of related displays or the next set of PAGE
records in a list of records which spans more than one page. UP

The previous display in the current 'chain' of related displays or the PAGE
previous set of records in a list of records which spans more than one DOWN
page.

The previous display. F8

The display associated with the selected object. F2

Changing focus
The term ‘focus’ used here means selecting a display object so that it will
receive keyboard input. For example, if you wanted to move the focus to the
next box so that you could change its value, you would use the Tab key.

To Press

Move the focus to the next selectable object or editable box. TAB

275
Chapter 21 - Reference topics

To Press

Move the focus to the previous selectable object or editable box. SHIFT+TAB

Move the focus to any selectable object or editable box in the display, Arrow keys
or to move the cursor within an editable selection.

De-select the object and cancel any uncommitted change. ESC

Note that the movement of focus around the screen depends on which
Station display or Windows application is being shown, and its settings.

Controlling points, issuing commands and entering


data

To Press

Acknowledge/silence an alarm. F4

Copy the selected item to the clipboard. CTRL+C

Cut the selected item to the clipboard. CTRL+X

Lower the value of the selected object by 1% (default setting). F10

Lower the value of the selected object by 10% (default setting). ALT+F10

Paste the contents of the clipboard into the selected item. CTRL+V

Raise the value of the selected object by 1% (default setting). F9

Raise the value of the selected object by 10% (default setting). ALT+F9

Select the object that has focus. BACKSPACE

Select the OP of the selected object. ALT+F12(1)

Select the SP of the selected object. ALT+F11(1)

Set the MD of the selected point to automatic. ALT+F6(1)

Set the MD of the selected point to manual. ALT+F5(1)

Set the MD of the selected point to normal. ALT+F7(1)

NOTE: (1) - Applicable only to points with these types of parameters.

276
Chapter 21 - Reference topics

Changing someone's operator-based security


password
You might need to change a user's password if the user has forgotten the old
one. When changing the password, remember that it:

n Must comply with the Windows password policy configured at your site.
n Is case-sensitive.

Prerequisites
n You must have MNGR security level and your Windows user account
must have the appropriate permissions to update other Windows user
account passwords on the system to be able to change someone's
password.

To change the password


1. Choose Configure > Operators to see the list of users.
2. Click the user whose password you want to change. The user's details
appear. (You can also change these details if required.)
3. Click Change Password .
The Change Password dialog box appears.
4. Type the new password and press the TAB key.
5. Re-type the new password and click OK. (The new password is only
accepted if the two entries are identical.)

277
Notices

NOTICES
Honeywell Trademarks
IdentiPoint® is a U.S. registered trademark of Honeywell International, Inc.

Other trademarks
Microsoft and SQL Server are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
BACnet® is a registered trademark of the American Society of Heating,
Refrigerating and Air-Conditioning Engineers.
Other brands or trademarks are trademarks of their respective owners.
Trademarks that appear in this document are used only to the benefit of the
trademark owner, with no intention of trademark infringement.

How to report a security vulnerability


For the purpose of submission, a security vulnerability is defined as a software
defect or weakness that can be exploited to reduce the operational or security
capabilities of the software.
Honeywell investigates all reports of security vulnerabilities affecting
Honeywell products and services.
To report a potential security vulnerability against any Honeywell product,
please follow the instructions at:
https://www.honeywell.com/en-us/product-security.

Support
For technical assistance, contact your nearest Honeywell office.

Training classes
Honeywell holds technical training classes on Enterprise Buildings Integrator.
These classes are taught by experts in the field of building control systems.
For more information about these classes, contact your Honeywell
representative.

278

You might also like