MilestoneXProtectVMSproducts AdministratorManual en-US
MilestoneXProtectVMSproducts AdministratorManual en-US
Administrator manual
XProtect Corporate
XProtect Expert
XProtect Professional+
XProtect Express+
Administrator manual | XProtect® VMS 2024 R1
Contents
Copyright, trademarks, and disclaimer 28
Overview 29
What's new? 29
Logging in (explained) 31
Product overview 34
System components 35
Failover 39
Clients 46
2 | Contents
Administrator manual | XProtect® VMS 2024 R1
XProtect extensions 48
XProtect Access 48
XProtect LPR 50
XProtect Transact 52
Devices 55
Hardware (explained) 55
Devices (explained) 56
Cameras 57
Microphones 57
Speakers 57
Metadata 58
Inputs 58
Outputs 58
Media storage 59
Authentication 66
3 | Contents
Administrator manual | XProtect® VMS 2024 R1
Users (explained) 66
Windows Users 66
Basic users 67
User authentication 68
Claims 68
Redirect URIs 69
Security 72
Permissions of a role 72
Rules (explained) 79
Rule complexity 80
4 | Contents
Administrator manual | XProtect® VMS 2024 R1
Webhooks (explained) 86
Alarms 87
Alarms (explained) 87
Alarm configuration 88
Smart map 89
Architecture 92
Licensing 118
5 | Contents
Administrator manual | XProtect® VMS 2024 R1
6 | Contents
Administrator manual | XProtect® VMS 2024 R1
How can XProtect VMS be configured to run in FIPS 140-2 compliant mode? 144
Installation 148
7 | Contents
Administrator manual | XProtect® VMS 2024 R1
Example: Arguments file based on the use of a dedicated service account 177
Configuration 188
8 | Contents
Administrator manual | XProtect® VMS 2024 R1
Hardware 210
9 | Contents
Administrator manual | XProtect® VMS 2024 R1
Preview 224
Performance 224
10 | Contents
Administrator manual | XProtect® VMS 2024 R1
Availability 229
Examples 231
11 | Contents
Administrator manual | XProtect® VMS 2024 R1
12 | Contents
Administrator manual | XProtect® VMS 2024 R1
Clients 256
Create and set up Smart Client profiles, roles and time profiles 257
Matrix 265
13 | Contents
Administrator manual | XProtect® VMS 2024 R1
Send the same video to several XProtect Smart Client views 266
Events 267
Authentication 278
14 | Contents
Administrator manual | XProtect® VMS 2024 R1
Security 280
View the current state of your hardware and troubleshoot if needed 287
View the historical state of your hardware and print a report 288
Add a new camera or server tile on the System monitor dashboard 289
15 | Contents
Administrator manual | XProtect® VMS 2024 R1
Metadata 292
Alarms 293
Configure your central site to respond to events from remote sites 310
16 | Contents
Administrator manual | XProtect® VMS 2024 R1
Install secure tunnel server environment for One-Click camera connection 312
Define device position and camera direction, field of view, depth (smart map) 319
Maintenance 322
17 | Contents
Administrator manual | XProtect® VMS 2024 R1
18 | Contents
Administrator manual | XProtect® VMS 2024 R1
In Milestone Customer Dashboard, the host name will appear unchanged 352
A host name change can trigger the change of the SQL Server address 352
The host of the site is the root node in the architecture 353
Troubleshooting 358
Issue: Change of SQL Server and database location prevents database access 358
Issue: Recording Server goes offline when switching Management Server cluster node 360
Issue: A parent node in a Milestone Federated Architecture setup cannot connect to a child node 360
The authentication option is not available in the login dialog box 362
Upgrade 363
19 | Contents
Administrator manual | XProtect® VMS 2024 R1
20 | Contents
Administrator manual | XProtect® VMS 2024 R1
21 | Contents
Administrator manual | XProtect® VMS 2024 R1
22 | Contents
Administrator manual | XProtect® VMS 2024 R1
23 | Contents
Administrator manual | XProtect® VMS 2024 R1
Navigation 461
Details 462
Hardware: 468
Other: 479
24 | Contents
Administrator manual | XProtect® VMS 2024 R1
25 | Contents
Administrator manual | XProtect® VMS 2024 R1
Tiles 549
26 | Contents
Administrator manual | XProtect® VMS 2024 R1
Maps: 570
Other: 570
States 572
27 | Contents
Administrator manual | XProtect® VMS 2024 R1
Trademarks
Microsoft and Windows are registered trademarks of Microsoft Corporation. App Store is a service mark of
Apple Inc. Android is a trademark of Google Inc.
All other trademarks mentioned in this document are trademarks of their respective owners.
Disclaimer
This text is intended for general information purposes only, and due care has been taken in its preparation.
Any risk arising from the use of this information rests with the recipient, and nothing herein should be construed
as constituting any kind of warranty.
Milestone Systems A/S reserves the right to make adjustments without prior notification.
All names of people and organizations used in the examples in this text are fictitious. Any resemblance to any
actual organization or person, living or dead, is purely coincidental and unintended.
This product may make use of third-party software for which specific terms and conditions may apply. When that
is the case, you can find more information in the file 3rd_party_software_terms_and_conditions.txt
located in your Milestone system installation folder.
Overview
What's new?
The help for the Management Client is now also available in Russian.
When you install a recording server or failover recording server, the files of each respective server are now
placed within separate folders in the Milestone folder: XProtect Failover Server and XProtect Recording Server.
If you are upgrading XProtect, these folders are also created during the upgrade process and the files for each
server type are located in the folders.
Previously, the files of the failover recording server and recording server were installed in the same folder,
which could cause issues when you were scaling products or running on different Microsoft .NET versions.
Azure Active Directory can now be used for authentication. During installation you can choose between
Windows Authentication and Azure Active Directory Integrated for integrated security.
For more information about how to install XProtect with Azure integrated security, see Install your system -
Custom option on page 158.
A (do not trust server certificate) option is now available for Windows Authentication and for Azure Active
Directory Integrated. For Azure Active Directory Integrated, this option is mandatory. The (do not trust server
certificate) option ensures that server certificates are validated and verified before installation.
A new Edit alarm settings user permission for alarms has been introduced that enables administrators to edit
alarm definitions, alarm states, alarm categories, alarm sounds, alarm retention, and event retention. The
29 | Overview
Administrator manual | XProtect® VMS 2024 R1
corresponding editing permissions for alarm definitions have been removed from the existing Manage user
permission, and administrators will require both user permissions (Edit alarm settings and Manage) to
manage alarm settings.
The new Edit alarm settings user permission is not applied to existing users and must be manually assigned to
users that require administrator-level access to configure alarms after installation or upgrade.
For information about the custom installation, see Roles (Security node) on page 495
Adaptive streaming can now be configured for use in playback mode. This method is referred to as adaptive
playback. For more information, see Adaptive playback (explained) on page 228.
When you install the XProtect components, you can now select to use a pre-created database as part of a
custom installation. For information about the custom installation, see Install your system - Custom option on
page 158
New user permissions for video restrictions have been introduced that enable administrators to configure and
assign create, view, edit and delete rights to users. For more information see Roles (Security node) on page 495
l To comply with GDPR or other applicable laws concerning personal data, administrators of XProtect
Management Client can now define a retention time for incident projects.
l The XProtect Incident Manager extension is now also compatible with XProtect Expert, XProtect
Professional+, and XProtect Express+ version 2022 R3 or later.
l XProtect Incident Manager can now show more than 10,000 incident projects.
l The XProtect Incident Manager extension is compatible with XProtect Corporate version 2022 R2 and
later and with XProtect Smart Client version 2022 R2 and later.
XProtect LPR:
30 | Overview
Administrator manual | XProtect® VMS 2024 R1
l License plate styles, which are part of country modules, are now listed in one place.
l To make license plate styles easier to manage, you can group them into aliases according to your license
plate recognition needs.
l You can encrypt the two-way connection between the event server and the components that
communicate with the event server, including the LPR Server.
For more information, see Enable event server encryption on page 297.
l You are now able to log on to the Milestone XProtect VMS using an external IDP. Logging on via an
external IDP is an alternative to logging on as an Active Directory user or as a basic user. With the
external IDP logon method you can bypass the setup requirements of a basic user and still be authorized
to access the components and devices in XProtect.
l You can now see the current firmware version for the hardware device that is detected by the system in
the Management Client.
For more information, see Update your hardware data on page 339.
l You can now achieve high availability of your system by configuring a failover management server
between two redundant computers. If the computer that runs the management server fails, the second
one takes over. The real-time data replication ensures that the databases of the management server, log
server, and event server are identical on both computers.
For more information, see XProtect Management Server Failover on page 53.
Logging in (explained)
When you launch the Management Client, you must first enter your login information to connect to a system.
With XProtect Corporate 2016 or XProtect Expert 2016 or newer installed, you can log into systems that run older
versions of the product after installing a patch. The supported versions are XProtect Corporate 2013 and
XProtect Expert 2013 or newer.
31 | Overview
Administrator manual | XProtect® VMS 2024 R1
A user associated with the built-in Administrators role has always permission to authorize and is not asked for a
second login, unless the user is associated with another role that requires a second login.
Users logging in via an external IDP cannot be set up with a requirement to be authorized by a second user.
32 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Set Login authorization required for the selected role on the Info tab (see Roles settings) under Roles,
so that the user is asked for additional authorization during login
l Set Authorize users for the selected role on the Overall Security tab (see Roles settings) under Roles, so
that the user can authorize other users' logins
You can choose both options for the same user. This means that the user is asked for additional authorization
during login, but can also authorize other users' logins, except for his/her own.
l Click Allow to log in disregarding the notification. To avoid getting this notification in the future, either
select Remember my choice. Do not show me this message again or click Tools > Options and then
select Allow non-secure connection to the server (restart of Management Client required).
For information about secure communication, see Secure communication (explained) on page 146.
Requirements
Steps:
33 | Overview
Administrator manual | XProtect® VMS 2024 R1
2. Specify your login information. In the Authentication list, select Basic authentication. A link with the text
Change password appears.
5. Now you can log into Management Client using your new password.
Product overview
The XProtect VMS products are video management software designed for installations of all shapes and sizes.
Whether you want to protect your store from vandalism or you want to manage a multi-site, high security
installation, XProtect makes it possible. The solutions offer centralized management of all devices, servers, and
34 | Overview
Administrator manual | XProtect® VMS 2024 R1
users, and provide an extremely flexible rule system driven by schedules and events.
l The management server - the center of your installation, consists of multiple servers
l One or more uses of XProtect Web Client and/or installations of XProtect Mobile client if needed
Your system also includes fully integrated Matrix functionality for distributed viewing of video from any camera
on your surveillance system to any computer with XProtect Smart Client installed.
You can install your system on virtualized servers or on multiple physical servers in a distributed setup. See also
A distributed system setup on page 92.
The system also offers the possibility of including the standalone XProtect® Smart Client – Player when you
export video evidence from the XProtect Smart Client. XProtect Smart Client – Player allows recipients of video
evidence (such as police officers, internal or external investigators and more) to browse and play back the
exported recordings without having to install any software on their computers.
With the most feature-rich products installed (see Product comparison on page 116), your system can handle an
unrestricted number of cameras, servers, and users and across multiple sites if required. Your system can
handle IPv4 as well as IPv6.
System components
To improve system performance, you can run several management servers as a Milestone Federated
Architecture™. The management server runs as a service and is typically installed on a dedicated server.
Users connect to the management server for initial authentication, then transparently to the recording servers
for access to for video recordings, etc.
35 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Surveillance_IDP: IDP
l LogserverV2: LogServer
The management server and the event server share the same SQL Server database while the log server,
XProtect Incident Manager, and the Identity Provider each have their own SQL Server database. The default
location of the databases is C:\Program Files\Microsoft SQL Serv-
er\MSSQL16.MSSQLSERVER\MSSQL\DATA where {nn} is the SQL Server version.
The system installer includes Microsoft SQL Server Express which is a free edition of SQL Server.
For very large systems or systems with many transactions to and from the SQL Server databases, Milestone
recommends that you use the Microsoft® SQL Server® Standard or Microsoft® SQL Server® Enterprise edition
of SQL Server on a dedicated computer on the network and on a dedicated hard disk drive that is not used for
other purposes. Installing SQL Server on its own drive improves the entire system performance.
For more information about the Identity Provider, see Identity Provider (explained) on page 67.
For more information about the XProtect Incident Manager database and logging, see the separate
administrator manual for XProtect Incident Manager.
Device drivers
l Network cameras and video encoders communicate through a device driver developed specifically for
individual devices or a series of similar devices from the same manufacturer
l From the 2018 R1 release, the device drivers are split into two device packs: the regular device pack with
newer drivers and a legacy device pack with older drivers
l The regular device pack is installed automatically when you install the recording server. Later, you can
update the drivers by downloading and installing a newer version of the device pack
l The legacy device pack can only be installed if the system has a regular device pack installed. The drivers
from the legacy device pack are automatically installed if a previous version is already installed on your
system. It is available for manual download and installation on the software download page
(https://www.milestonesys.com/downloads/)
Media database
36 | Overview
Administrator manual | XProtect® VMS 2024 R1
l The recording server stores the retrieved audio and video data in the tailor-made high-performance
media database optimized for recording and storing audio and video data
l The media database supports various unique features like; multistage archiving, video grooming,
encryption, and adding a digital signature to the recordings
The system uses recording servers for recording of video feeds, and for communicating with cameras and other
devices. A surveillance system typically consists of several recording servers.
Recording servers are computers where you have installed the Recording Server software, and configured it to
communicate with the management server. You can see your recording servers in the Overview pane when you
expand the Servers folder and then select Recording Servers.
Backward compatibility with recording server versions older than this version of the management server is
limited. You can still access recordings on recording servers with older versions, but if you want to change their
configuration, make sure they match this version of the management server. Milestone recommends that you
upgrade all recording servers in your system to the same version as your management server.
The recording server supports encryption of data streams to the clients and services:
The recording server also supports encryption of the connection with the management server:
37 | Overview
Administrator manual | XProtect® VMS 2024 R1
When the Recording Server service is running, it is very important that Windows Explorer
or other programs do not access Media Database files or folders associated with your
system setup. If they do, it is likely that the recording server cannot rename or move
relevant media files. This might bring the recording server to a halt. To restart a stopped
recording server, stop the Recording Server service, close the program accessing the
relevant media file(s) or folder(s), and restart the Recording Server service.
In addition to acting as a system gateway for the two clients, the mobile server can transcode video, since the
original camera video stream in many cases are too large to fit the bandwidth available for the client users.
If you are performing a Distributed or Custom installation, Milestone recommends that you install the mobile
server on a dedicated server.
Events
l All system events are consolidated in the event server so there are one place and interface for partners
to make integrations that utilize system events
l Furthermore, the event server offers third-party access to sending events to the system via the Generic
events or Analytics events interface
Alarms
l The event server hosts the alarm feature, alarm logic, alarm state as well as handling the alarm database.
The alarm database is stored in the same SQL Server database that the management server uses
Messages
l Message communication is handled by the event server, allowing plugins to send messages in real time
between environments, such as XProtect Smart Client, Management Client, event server and standalone
services.
Maps
l The event server also hosts the maps that are configured and used in XProtect Smart Client
MIP SDK
l Finally, third-party-developed plug-ins can be installed on the event server and utilize access to system
events
38 | Overview
Administrator manual | XProtect® VMS 2024 R1
The XProtect VMS API Gateway supports these integration options through the Milestone Integration Platform
VMS API (MIP VMS API).
The API Gateway is installed on-premise and is intended to serve as a front-end and common entry point for
RESTful API and WebSocket Messaging API services on all the current VMS server components (management
server, event server, recording servers, log server, etc). An API Gateway service can be installed on the same
host as the management server or separately, and more than one can be installed (each on their own host).
The RESTful API is implemented in part by each specific VMS server component, and the API Gateway can simply
pass-through these requests and responses, while for other requests, the API Gateway will convert requests and
responses as appropriate.
Currently, the configuration API, hosted by the management server, is available as a RESTful API. The RESTful
Events API, Websockets messaging API, and the RESTful Alarms API, hosted by the event server, are also
available.
For more information, see the API Gateway administrator manual and the Milestone Integration Platform VMS
API reference documentation.
Failover
To minimize system downtime, you can configure a failover management server by installing the management
server in a cluster. The cluster will then ensure that another computer take over the management server
function should the first computer fail.
XProtect Management Server Failover is an XProtect VMS extension that can help you when:
39 | Overview
Administrator manual | XProtect® VMS 2024 R1
l A server fails – you can run the system components from another computer while you resolve the
problems.
l You need to apply system updates and security patches – applying security patches on a standalone
management server can be time-consuming, resulting in extended periods of downtime. When you have
a failover cluster, you can apply system updates and security patches with minimal downtime.
l You need seamless connection – users get continuous access to live and playback video, and to the
system’s configuration at all times.
To configure XProtect Management Server Failover, you install he management server, log server, and event
server run on two computers. If the first computer stop working, the VMS components start running on the
second computer. Additionally, you can benefit from a secure real-time replication of the VMS databases when
SQL Server runs in the failover cluster.
For more information, see the XProtect Management Server Failover administrator manual.
WSFC is a group of independent servers that work together to increase the availability of applications and
services. If a cluster node or service fails, the services that are hosted on that node can be automatically or
manually transferred to another available node.
The management server can be installed on multiple servers within a cluster of servers. This ensures that the
system has very little downtime. If a server in the cluster fails, another server in the cluster automatically takes
over the failed server's job running the management server.
It is only possible to have one active management server per surveillance setup, but other management servers
may be set up to take over in case of failure.
By default, the Management Server service limits the number of times a failover occurs to
twice within a six-hour period. If this is exceeded, the Management Server services are
not automatically started by the clustering service. This limit can be changed to better fit
your needs.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
A failover recording server is an extra recording server which takes over from the standard recording server if
this becomes unavailable. You can configure a failover recording server in two modes, as a cold standby server
or as a hot standby server.
40 | Overview
Administrator manual | XProtect® VMS 2024 R1
You install failover recording servers like standard recording servers (see Install a failover recording server
through Download Manager on page 169). Once you have installed failover recording servers, they are visible in
the Management Client. Milestone recommends that you install all failover recording servers on separate
computers. Make sure that you configure failover recording servers with the correct IP address/host name of
the management server. The user permissions for the user account under which the Failover Server service
runs are provided during the installation process. They are:
l Read and Write access permissions to read or write the RecorderConfig.xml file
If a certificate is selected for encryption, then the administrator must grant read access permission to the
failover user on the selected certificate private key.
If the failover recording server takes over from a recording server that uses encryption,
Milestone recommends that you also prepare the failover recording server for using
encryption. For more information, see Secure communication (explained) on page 146
and Install a failover recording server through Download Manager on page 169.
You can specify what type of failover support you want on device-level. For each device on a recording server,
select full, live only or no failover support. This helps you prioritize your failover resources and, for example, only
set up failover for video and not for audio, or only have failover on essential cameras, not on less important
ones.
While your system is in failover mode, you cannot replace or move hardware, update the
recording server, or change device configurations such as storage settings or video
stream settings.
In a cold standby failover recording server setup, you group multiple failover recording servers in a failover
group. The entire failover group is dedicated to take over from any of several preselected recording servers, if
one of these becomes unavailable. You can create as many groups as you want (see Group failover recording
servers for cold standby on page 207).
Grouping has a clear benefit: when you later specify which failover recording servers should take over from a
recording server, you select a group of failover recording servers. If the selected group contains more than one
failover recording server, this offers you the security of having more than one failover recording server ready to
take over if a recording server becomes unavailable. You can specify a secondary failover server group that
takes over from the primary group if all the recording servers in the primary group are busy. A failover recording
server can only be a member of one group at a time.
41 | Overview
Administrator manual | XProtect® VMS 2024 R1
Failover recording servers in a failover group are ordered in a sequence. The sequence determines the order in
which the failover recording servers will take over from a recording server. By default, the sequence reflects the
order in which you have incorporated the failover recording servers in the failover group: first in is first in the
sequence. You can change this if you need to.
In a hot standby failover recording server setup, you dedicate a failover recording server to take over from one
recording server only. Because of this, the system can keep this failover recording server in a "standby" mode
which means that it is synchronized with the correct/current configuration of the recording server it is dedicated
to and can take over much faster than a cold standby failover recording server. As mentioned, you assign hot
standby servers to one recording server only and cannot group it. You cannot assign failover servers that are
already part of a failover group as hot standby recording servers.
To validate a merge of video data from the failover server to the recording server, you
must make the recording server unavailable by either stopping the recording server
service or shutting down the recording server computer.
Any manual interruption of the network that you can cause by pulling out the network
cable or blocking the network using a test tool is not a valid method.
l A failover recording server checks the state of relevant recording servers every 0.5 seconds. If a
recording server does not reply within 2 seconds, the recording server is considered unavailable and the
failover recording server takes over
l A cold standby failover recording server takes over for the recording server that has become unavailable
after five seconds plus the time it takes for the failover recording server's Recording Server service to
start and the time it takes to connect to the cameras. In contrast, a hot standby failover recording server
takes over faster because the Recording Server service is already running with the correct configuration
and only has to start its cameras to deliver feeds. During the startup period, you can neither store
recordings nor view live video from affected cameras
42 | Overview
Administrator manual | XProtect® VMS 2024 R1
l When a recording server becomes available again, it automatically takes over from the failover recording
server. Recordings stored by the failover recording server are automatically merged into the standard
recording server's databases. The time it takes to merge, depends on the amount of recordings, network
capacity and more. During the merging process, you cannot browse recordings from the period during
which the failover recording server took over
l If a failover recording server must take over from another recording server during the merging process
in a cold standby failover recording server setup, it postpones the merging process with recording server
A, and takes over from recording server B. When recording server B becomes available again, the
failover recording server takes up the merging process and allows both recording server A and recording
server B to merge back recordings simultaneously.
l In a hot standby setup, a hot standby server cannot take over for an additional recording server because
it can only be hot standby for a single recording server. But if that recording server fails again, the hot
standby takes over again and keeps the recordings from the previous period. The recording server keeps
recordings until they are merged back to the primary recorder or until the failover recording server runs
out of disk space
l A failover solution does not provide complete redundancy. It can only serve as a reliable way of
minimizing the downtime. If a recording server becomes available again, the Failover Server service
makes sure that the recording server is ready to store recordings again. Only then is the responsibility for
storing recordings handed back to the standard recording server. So, a loss of recordings at this stage of
the process is very unlikely
l Client users hardly notice that a failover recording server is taking over. A short break occurs, usually
only for a few seconds, when the failover recording server takes over. During this break, users cannot
access video from the affected recording server. Client users can resume viewing live video as soon as
the failover recording server has taken over. Because recent recordings are stored on the failover
recording server, they can play back recordings from after the failover recording server took over. Clients
cannot play back older recordings stored only on the affected recording server until that recording server
is functioning again and has taken over from the failover recording server. You cannot access archived
recordings. When the recording server is functioning again, a merging process takes place during which
failover recordings are merged back into the recording server's database. During this process, you
cannot play back recordings from the period during which the failover recording server took over
l In a cold standby setup, setting up a failover recording server as backup for another failover recording
server is not necessary. This is because you allocate failover groups and do not allocate particular
failover recording servers to take over from specific recording servers. A failover group must contain at
least one failover recording server, but you can add as many failover recording servers as needed. If a
failover group contains more than one failover recording server, more than one failover recording server
can take over.
l In a hot standby setup, you cannot set up failover recording servers or hot standby servers as failover for
a hot standby server
43 | Overview
Administrator manual | XProtect® VMS 2024 R1
Description
1. Recording Server
3. Management Server
1. To check whether it is running or not, a failover recording server has a non-stop TCP
connection to a recording server.
3. The failover recording server requests the current configuration of the recording server
from the management server. The management server sends the requested
configuration, the failover recording server receives the configuration, starts up, and
starts recording on behalf of the recording server.
4. The failover recording server and the relevant camera(s) exchange video data.
44 | Overview
Administrator manual | XProtect® VMS 2024 R1
Description
5. The failover recording server continually tries to re-establish connection to the recording
server.
6. When the connection to the recording server is re-established, the failover recording
server shuts down and the recording server fetches video data (if any) recorded during its
downtime and the video data is merged back in to the recording server database.
1. To check whether it is running or not, a hot standby server has a non-stop TCP connection
to its assigned recording server.
3. From the management server, the hot standby server already knows the current
configuration of its assigned recording server and starts recording on its behalf.
4. The hot standby server and the relevant camera(s) exchange video data.
5. The hot standby server continually tries to re-establish connection to the recording server.
6. When the connection to the recording server is re-established and the hot standby server
goes back to hot standby mode, the recording server fetches video data (if any) recorded
during its down-time and the video data is merged back in to the recording server
database.
l A Failover Server service, which handles the processes of taking over from the recording server. This
service is always running, and constantly checks the state of relevant recording servers
l A Failover Recording Server service, which enables the failover recording server to act as a recording
server.
In a cold standby setup, this service is only started when required, that is when the cold standby failover
recording server takes over from the recording server. Starting this service typically takes a couple of
seconds, but may take longer depending on local security settings and more.
In a hot standby setup, this service is always running, allowing the hot standby server to take over faster
than the cold standby failover recording server.
45 | Overview
Administrator manual | XProtect® VMS 2024 R1
Clients
Available in multiple local languages, XProtect Smart Client has an adaptable user interface that can be
optimized for individual operators’ tasks and adjusted according to specific skills and authority levels.
The interface allows you to tailor your viewing experience to specific working environments by selecting a light
or dark theme. It also features work-optimized tabs and a main timeline for easy surveillance operation.
46 | Overview
Administrator manual | XProtect® VMS 2024 R1
Using the MIP SDK, users can integrate various types of security and business systems, and video analytics
applications, which you manage through XProtect Smart Client.
XProtect Smart Client must be installed on operators' computers. Surveillance system administrators manage
access to the surveillance system through the Management Client. Recordings viewed by clients are provided by
your XProtect system's Image Server service. The service runs in the background on the surveillance system
server. Separate hardware is not required.
Use the XProtect Mobile client to view and play back live and recorded video from one or multiple cameras,
control pan-tilt-zoom (PTZ) cameras, trigger output and events and use the Video push functionality to send
video from your device to your XProtect system.
If you want to use the XProtect Mobile client with your system, you must have a XProtect Mobile server to
establish the connection between the XProtect Mobile client and your system. Once the XProtect Mobile server is
set up, download the XProtect Mobile client for free from Google Play or App Store to start using XProtect
Mobile.
You need one device license per device that should be able to push video to your XProtect system.
47 | Overview
Administrator manual | XProtect® VMS 2024 R1
Management Client.
To enable access to the XProtect Web Client, you must have a XProtect Mobile server to establish the connection
between the XProtect Web Client and your system. The XProtect Web Client itself does not require any
installation itself and works with most Internet browsers. Once you have set up the XProtect Mobile server, you
can monitor your XProtect system anywhere from any computer or tablet with Internet access (provided you
know the correct external/Internet address, user name and password).
XProtect extensions
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
XProtect Access
The use of XProtect Access requires that you have purchased a base license that allows
you to access this feature within your XProtect system. You also need an access control
door license for each door you want to control.
48 | Overview
Administrator manual | XProtect® VMS 2024 R1
You can use XProtect Access with access control systems from vendors where a vendor-
specific plug-in for XProtect Access exists.
The access control integration feature introduces new functionality that makes it simple to integrate customers’
access control systems with XProtect. You get:
l A common operator user interface for multiple access control systems in XProtect Smart Client
l Map integration
The Audit log logs the commands that each user performs in the access control system from XProtect Smart
Client.
Apart from a XProtect Access base license, you need a vendor-specific integration plug-in installed on the event
server before you can start an integration.
49 | Overview
Administrator manual | XProtect® VMS 2024 R1
Users of XProtect Incident Manager can save all the incident information in incident projects. From the incident
projects, they can track the status and activities of each incident. In this way, the users can manage incidents
effectively and easily share strong incident evidence, both internally with colleagues and externally with
authorities.
XProtect Incident Manager helps organizations gain an overview and understanding of the incidents happening
in the areas they survey. This knowledge enables the organizations to implement steps to minimize the chance
that similar incidents happen in the future.
In XProtect Management Client, the administrators of an organization’s XProtect VMS can define the available
incident properties in XProtect Incident Manager to the organizations’ needs. The operators of XProtect Smart
Client start, save, and manage incident projects and add various information to the incident projects. This
includes free text, incident properties that the administrators have defined, and sequences from the XProtect
VMS. For full traceability, the XProtect VMS logs when administrators define and edit incident properties and
when operators create and update the incident projects.
XProtect LPR
XProtect LPR offers video-based content analysis (VCA) and recognition of vehicle license plates that interacts
with your surveillance system and your XProtect Smart Client.
To read the characters on a plate, XProtect LPR uses optical character recognition on images aided by
specialized camera settings.
You can combine LPR (license plate recognition) with other surveillance features such as recording and event-
based activation of outputs.
50 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Activate alarms
l Open gates
l Switch on lights
51 | Overview
Administrator manual | XProtect® VMS 2024 R1
XProtect Smart Wall allows operators to view static video walls as defined by their system administrator with a
fixed set of cameras and monitor layout. However, the video wall is also operator-driven in the sense that
operators can control what is being displayed. This includes:
l Pushing cameras and other types of content to the video wall, for example images, text, alarms, and
smart map
Finally, display changes can be controlled by rules that automatically change the presets based on specific
events or time schedules.
XProtect Transact
XProtect Transact is an extension to Milestone's IP video surveillance solutions that lets you observe ongoing
transactions and investigating transactions in the past. The transactions are linked with the digital surveillance
video monitoring the transactions, for example to help you prove fraud or provide evidence against a
perpetrator. There is a 1-to-1 relationship between the transaction lines and video images.
The transaction data may originate from different types of transaction sources, typically point of sales (PoS)
systems or automated teller machines (ATM). When selecting a transaction line, a video still frame from each of
the associated cameras is displayed in a preview area that allows you to review the recordings. Below the
preview area, the transaction associated with the selected line is displayed as a receipt.
1A predefined layout for one or more Smart Wall monitors in XProtect Smart Client. Presets determine which
cameras are displayed, and how content is structured on each monitor on the video wall.
52 | Overview
Administrator manual | XProtect® VMS 2024 R1
XProtect Management Server Failover is an XProtect VMS extension that can help you when:
l A server fails – you can run the system components from another computer while you resolve the
problems.
l You need to apply system updates and security patches – applying security patches on a standalone
management server can be time-consuming, resulting in extended periods of downtime. When you have
a failover cluster, you can apply system updates and security patches with minimal downtime.
l You need seamless connection – users get continuous access to live and playback video, and to the
system’s configuration at all times.
To configure XProtect Management Server Failover, you install he management server, log server, and event
server run on two computers. If the first computer stop working, the VMS components start running on the
second computer. Additionally, you can benefit from a secure real-time replication of the VMS databases when
SQL Server runs in the failover cluster.
This XProtect VMS extension is a dedicated solution to remotely monitor patients which allows the hospital to:
l Listen to multiple rooms and speak with a patient remotely using Multiroom Audio.
System health data for Husky IVO units that have not been connected to the XProtect management server
specifically for sending system health data will not be displayed.
53 | Overview
Administrator manual | XProtect® VMS 2024 R1
The status of the connected Husky IVO units is displayed in the Husky IVO System Health node in XProtect
Management Client. The Husky IVO System Health only displays system health data from Husky IVO units.
The Husky IVO System Health node is only accessible after the Husky IVO System Health plug-in has been
installed on the XProtect management server.
Beta version
Husky IVO System Health is currently released as a beta version. The appearance and function of the final
version may differ from the beta version.
l Needs Attention: One or more issues have been detected that require your attention.
The system health data of specific Husky IVO units can also be displayed. Select a unit name in the system health
overview node to open a new page where key system health statistics for that unit are displayed.
The system health data for individual units will typically display these key status indicators:
l Data storage status: The status of the machine's storage as well as the selected storage management
option.
l RAM usage: The total RAM capacity in GB as well as the current free RAM capacity in GB.
l CPU load: The current load on the CPU, measured as a percentage of the maximum theoretical load.
l Network: The online/offline status of all registered NIC slots on the unit.
Some system health data will depend on the unit's hardware, for example power supply data will be displayed
for units that contain dual (redundant) power supply options and GPU load and GPU temperature data will be
displayed for units that contain discrete GPU cards.
The following Husky IVO revisions can connect to the Husky IVO System Health node:
54 | Overview
Administrator manual | XProtect® VMS 2024 R1
As the system health connection process is started on the System Health page in the Husky Assistant, you may
have to update the Husky Assistant on individual Husky IVO units to the newest version in order to access the
System Health page.
It is not possible to mass-connect or automatically connect multiple Husky IVO machines send system health
data to the XProtect management server.
To connect a Husky IVO unit, you must click the Connect button on the System Health page in the Husky
Assistant on the Husky IVO unit and provide the address to the machine of the management client as well as
administrator credentials.
You cannot troubleshoot or fix any reported Husky IVO unit issues from the XProtect management server. You
must instead directly access the units in question to conduct any mitigation or troubleshooting.
Devices
Hardware (explained)
Hardware represents either:
l The physical unit that connects directly to the recording server of the surveillance system via IP, for
example a camera, a video encoder, an I/O module
You have several options for adding hardware to each recording server in your system.
55 | Overview
Administrator manual | XProtect® VMS 2024 R1
If your hardware is located behind a NAT-enabled router or a firewall, you may need to
specify a different port number and configure the router/firewall so it maps the port and
IP addresses that the hardware uses.
The Add Hardware wizard helps you detect hardware like cameras and video encoders on your network and
add them to the recording servers on your system. The wizard also helps you add remote recording servers for
Milestone Interconnect setups. Only add hardware to one recording server at a time.
Certain manufacturers require that credentials be set on out-of-the-box hardware before adding the hardware
to a VMS system for the first time. This is referred to as hardware pre-configuration, and is done through the
Pre-configure hardware devices wizard that appears when such hardware is detected by the Add hardware on
page 210 wizard.
l Hardware that requires initial credentials before being added to a VMS system cannot be added using
the typical default credentials, and must be configured through the wizard or by connecting to the
hardware directly
l You can only apply credentials (user name or password) to fields that are marked as not set
l Once the hardware status is set to configured, you cannot change the credentials (user name or
password)
l Pre-configuration applies to out-of-the-box hardware and needs to be done only once. Once pre-
configured, hardware can be managed like any other hardware in Management Client
l After you close the Pre-configure hardware devices wizard, pre-configured hardware will appear in the
in the Add hardware on page 210 wizard, and can now be added to your system
It is highly recommended that you add the pre-configured hardware to your system by
completing the Add hardware on page 210 wizard after you close the Pre-configure
hardware devices wizard. Management Client will not retain the pre-configured
credentials if you do not add the hardware to your system.
Devices (explained)
Hardware has a number of devices that you can manage individually, for example:
56 | Overview
Administrator manual | XProtect® VMS 2024 R1
l A physical camera has devices that represent the camera part (lenses) as well as microphones,
speakers, metadata, input and output either attached or built-in
l A video encoder has multiple analog cameras connected that appear in one list of devices that represent
the camera part (lenses) as well as microphones, speakers, metadata, input and output either attached
or built-in
l An I/O module has devices that represent the input and output channels for, for example, lights
l A dedicated audio module has devices that represent microphones and speaker inputs and outputs
l In a Milestone Interconnect setup, the remote system appears as hardware with all devices from the
remote system listed in one list
The system automatically adds the hardware’s devices when you add hardware.
For information about supported hardware, see the supported hardware page on the
Milestone website (https://www.milestonesys.com/support/tools-and-
references/supported-devices/).
The following sections describe each of the device types that you can add.
Cameras
Camera devices deliver video streams to the system that the client users can use to view live video or that the
system can record for later playback by the client users. Roles determine the users' permission to view video.
Microphones
On many devices, you can attach external microphones. Some devices have built-in microphones.
Microphone devices deliver audio streams to the system that the client users can listen to live or the system can
record for later playback by the client users. You can set up the system to receive microphone-specific events
that trigger relevant actions.
Roles determine the users' permission to listen to microphones. You cannot listen to microphones from the
Management Client.
Speakers
On many devices you can attach external speakers. Some devices have built-in speakers.
The system sends an audio stream to the speakers when a user presses the talk button in XProtect Smart Client
You can also use this feature from XProtect Web Client and XProtect® Mobile. Speaker audio is only recorded
when talked to by a user. Roles determine users' permission to talk through speakers. You cannot talk through
speakers from the Management Client.
57 | Overview
Administrator manual | XProtect® VMS 2024 R1
If two users want to speak at the same time, the roles determine users' permission to talk through speakers. As
part of the roles definition, you can specify a speaker priority from very high to very low. If two users want to
speak at the same time, the user whose role has the highest priority wins the ability to speak. If two users with
the same role want to speak at the same time, the first-come first-served principle applies.
Metadata
Metadata devices deliver data streams to the system that the client users can use to view data about data, for
example, data that describes the video image, the content or objects in the image, or the location of where the
image was recorded. Metadata can be attached to cameras, microphones, or speakers.
l The device itself delivering the data, for example a camera that is delivering video
The device-generated metadata is automatically linked to one or more devices on the same hardware.
Inputs
On many devices, you can attach external units to input ports on the device. Input units are typically external
sensors. You can use such external sensors, for example, for detecting if doors, windows, or gates are opened.
Input from such external input units is treated as events by the system.
You can use such events in rules. For example, you could create a rule specifying that a camera should begin
recording when an input is activated, and stop recording 30 seconds after the input is deactivated.
Outputs
On many devices, you can attach external units to output ports on the device. This allows you to
activate/deactivate lights, sirens, etc. through the system.
You can use output when creating rules. You can create rules that automatically activate or deactivate outputs,
and rules that trigger actions when the state of an output is changed.
You can benefit from grouping different types of devices (cameras, microphones, speakers, metadata, inputs,
and outputs) on your system:
l Device groups help you maintain an intuitive overview of devices on your system
58 | Overview
Administrator manual | XProtect® VMS 2024 R1
l You can specify common properties for all devices within a device group in one go
l Device properties set via the group are not stored for the group but on the individual devices
l When dealing with roles, you can specify common security settings for all devices within a device group in
one go
l When dealing with rules, you can apply a rule for all devices within a device group in one go
You can add as many device groups as required, but you cannot mix different types of devices (for example
cameras and speakers) in a device group.
Create device groups with less than 400 devices so you can view and edit all properties.
If you delete a device group, you only delete the device group itself. If you want to delete a device, for example a
camera, from your system, do it on the recording server level.
The following examples are based on grouping cameras into device groups, but the principles apply for all
devices
Media storage
On the Storage tab, you can set up, manage and view storages for a selected recording server.
For recording storages and archives, the horizontal bar shows the current amount of free space. You can specify
the behavior of the recording server in case recording storages become unavailable. This is mostly relevant if
your system includes failover servers.
If you are using Evidence lock, there will be a vertical red line showing the space used for evidence locked
footage.
59 | Overview
Administrator manual | XProtect® VMS 2024 R1
When a camera records video or audio, all specified recordings are by default stored in the storage defined for
the device. Each storage consists of a recording storage that saves recordings in the recording database
Recording. A storage has no default archive(s), but you can create these.
To avoid that the recording database runs full, you can create additional storages (see Add a new storage on
page 194). You can also create archives (see Create an archive within a storage on page 195) within each
storage and start an archiving process to store data.
60 | Overview
Administrator manual | XProtect® VMS 2024 R1
Archiving is the automatic transfer of recordings from, for example, a camera's recording
database to another location. In this way, the amount of recordings that you can store is
not limited to the size of the recording database. With archiving you can also back up your
recordings to another media.
As long as you store archived recordings locally or on accessible network drives, you can use XProtect Smart
Client to view them.
If a disk drive breaks and the recording storage becomes unavailable, the horizontal bar turns red. It is still
possible to view live video in XProtect Smart Client, but recording and archiving stops until the disk drive is
restored. If your system is configured with failover recording servers, you can specify the recording server to
stop running, to let the failover servers take over (see Specify behavior when recording storage is unavailable on
page 193).
The following mostly mentions cameras and video, but speakers, microphones, audio and sound also apply.
Milestone recommends that you use a dedicated hard disk drive for recording storages
and archives to prevent low disk performance. When you format the hard disk, it is
important to change its Allocation unit size setting from 4 to 64 kilobytes. This is to
significantly improve recording performance of the hard disk. You can read more about
allocating unit sizes and find help on the Microsoft website
(https://support.microsoft.com/en-us/topic/default-cluster-size-for-ntfs-fat-and-exfat-
9772e6f1-e31a-00d7-e18f-73169155af95).
The oldest data in a database is always auto-archived (or deleted if no next archive is
defined) when less than 5GB of space is free. If less than 1GB space is free, data is deleted.
A database always requires 250MB of free space. If you reach this limit because data is not
deleted fast enough, attempts to write to the database might fail and in that case no more
data is written to the database until you free up enough space. The actual maximum size of
your database becomes the amount of gigabytes that you specify, minus 5GB.
For FIPS 140-2 compliant systems, with exports and archived media databases from
XProtect VMS versions prior to 2017 R1 that are encrypted with non FIPS-compliant
cyphers, it is required to archive the data in a location where it can still be accessed after
enabling FIPS. For detailed information on how to configure your XProtect VMS to run in
FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening
guide.
61 | Overview
Administrator manual | XProtect® VMS 2024 R1
Once you have configured the storage and archiving settings for a recording server, you can enable storage and
archiving for individual cameras or a group of cameras. You do this from the individual devices or from the
device group. See Attach a device or group of devices to a storage on page 195.
Effective archiving
When you enable archiving for a camera or a group of cameras, the content of the recording storage is
automatically moved to the first archive at intervals that you define.
Depending on your requirements, you can configure one or more archives for each of your storages. Archives
can be located either on the recording server computer itself, or at another location which can be reached by the
system, for example on a network drive.
By setting up your archiving in an effective way, you can optimize storage needs. Often, you want to make
archived recordings take up as little space as possible, especially on a long-term basis, where it is perhaps even
possible to slacken image quality a bit. You handle effective archiving from the Storage tab of a recording server
by adjusting several interdependent settings:
l Archive retention
l Archive size
l Archive schedule
l Encryption
The size fields define the size of the recording storage, exemplified by the cylinder, and its archive(s)
respectively:
By means of retention time and size setting for the recording storage, exemplified by the white area in the
cylinder, you define how old recordings must be before they are archived. In our illustrated example, you archive
the recordings when they are old enough to be archived.
62 | Overview
Administrator manual | XProtect® VMS 2024 R1
The retention time and size setting for archives define how long the recordings remain in the archive.
Recordings remain in the archive for the time specified, or until the archive has reached the specified size limit.
When these settings are met, the system begins to overwrite old recordings in the archive.
The archiving schedule defines how often and at what times archiving takes place.
To archive your recordings, you must set all these parameters up in accordance with each other. This means
that the retention period of the next archive must always be longer than the retention period of a current archive
or recording database. This is because the number of retention days stated for an archive includes all retention
stated earlier in the process. Archiving must also always take place more frequently than the retention period,
otherwise you risk losing data. If you have a retention time of 24 hours, any data older than 24 hours is deleted.
Therefore, to get your data safely moved to the next archive, it is important to run archiving more often than
every 24 hours.
Example: These storages (image to the left) have a retention time of 4 days and the following archive (image to
the right) a retention time of 10 days. Archiving is set to occur every day at 10:30, ensuring a much more
frequent archiving than retention time.
During all regular use of your system, the sub-directory structure is completely
transparent to the system's users, as they browse all recordings with the XProtect Smart
Client regardless of whether the recordings are archived or not. Knowing the sub-
directory structure is primarily interesting if you want to back up your archived recordings.
In each of the recording server's archive directories, the system automatically creates separate sub-directories.
These sub-directories are named after the name of the device and the archive database.
63 | Overview
Administrator manual | XProtect® VMS 2024 R1
Because you can store recordings from different cameras in the same archive, and since archiving for each
camera is likely to be performed at regular intervals, further sub-directories are also automatically added.
These sub-directories each represent approximately an hour's worth of recordings. The one-hour split makes it
possible to remove only relatively small parts of an archive's data if you reach the maximum allowed size of the
archive.
The sub-directories are named after the device, followed by an indication of where the recordings came from
(edge storage or via SMTP), plus the date and time of the most recent database record contained in the sub-
directory.
Naming structure
If from SMTP:
Sub-directories
Even further sub-directories are automatically added. The amount and nature of these sub-directories depend
on the nature of the actual recordings. For example, several different sub-directories are added if the recordings
are technically divided into sequences. This is often the case if you have used motion detection to trigger
recordings.
l Media: This folder contains the actual media that is either video or audio (not both)
l MotionLevel: This folder contains motion level grids generated from the video data using our motion
detection algorithm. This data allows the Smart Search feature in XProtect Smart Client to do very fast
searches
l Motion: In this folder, the system stores motion sequences. A motion sequence is a time slice for which
motion has been detected in the video data. This information is, for example, used in the time line in
XProtect Smart Client
64 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Recording: In this folder, the system stores recording sequences. A recording sequence is a time slice
for which there are coherent recordings of media data. This information is, for example, used to draw the
time line in XProtect Smart Client
l Signature: This folder holds the signatures generated for the media data (in the Media folder). With this
information, you can verify that the media data has not been tampered with since it was recorded
If you want to back up your archives, you can target your backups if you know the basics of the sub-directory
structure.
Examples of backup
To back up the content of an entire archive, back up the required archive directory and all of its content. For
example, everything under:
...F:\OurArchive\
To back up the recordings from a particular camera from a particular period of time, back up the contents of the
relevant sub-directories only. For example, everything under:
Pre-buffering is possible because the system continuously receives audio and video streams from the connected
devices and temporarily stores them for the defined pre-buffer period.
l If a recording rule is triggered, the temporary recordings are made permanent for the rule’s configured
pre-recording time
l If no recording rule is triggered, the temporary recordings in the pre-buffer are automatically deleted
after the defined pre-buffer time
You can choose the storage location of the temporary pre-buffer recordings:
l On the disk (in the media database); you can choose all values.
Storage to the memory instead of to disk improves system performance but is only possible for shorter pre-
buffer periods.
65 | Overview
Administrator manual | XProtect® VMS 2024 R1
When recordings are stored in the memory, and you make some of the temporary recordings permanent, the
remaining temporary recordings are deleted and cannot be restored. If you need to be able to keep the
remaining recordings, store the recordings on the disk.
Authentication
With the Active Directory installed, you can add Windows users from Active Directory, but you also have the
option of adding basic users without Active Directory. There are certain system limitations related to basic users.
Users (explained)
The term users primarily refers to users who connect to the surveillance system through the clients. You can
configure such users in two ways:
Windows Users
You add Windows Users through the use of Active Directory. Active Directory (AD) is a directory service
implemented by Microsoft for Windows domain networks. It is included in most Windows Server operating
systems. It identifies resources on a network in order for users or applications to access them. Active Directory
uses the concepts of users and groups.
Users are Active Directory objects representing individuals with a user account. Example:
Groups are Active Directory objects with several users. In this example, the Management Group has three
users:
66 | Overview
Administrator manual | XProtect® VMS 2024 R1
Groups can contain any number of users. By adding a group to the system, you add all of its members in one go.
Once you have added the group to the system, any changes made to the group in Active Directory, such as new
members you add or old members you remove at a later stage, are immediately reflected in the system. A user
can be a member of more than one group at a time.
You can use Active Directory to add existing user and group information to the system with some benefits:
l Users and groups are specified centrally in Active Directory so you do not have to create user accounts
from scratch
l You do not have to configure any authentication of users on the system as Active Directory handles
authentication
Before you can add users and groups through the Active Directory service, you must have a server with Active
Directory installed on your network.
Basic users
If your system does not have access to Active Directory, create a basic user. For information about how to set up
basic users, see Create basic users on page 283.
Identity Provider also provides authentication and registration services to relying applications or services, in this
case: Recording Server, Management Server, Data Collector, and Report Server.
When you log in to XProtect clients and services as a basic user, your request goes to the Identity Provider. When
authenticated the user can call the management server.
Identity Provider runs in the IIS as a part of the management server using the same SQL Server with a separate
database and is responsible for creating and handling OAuth communication tokens that services use when
communicating (Surveillance_IDP).
67 | Overview
Administrator manual | XProtect® VMS 2024 R1
XProtect supports external IDPs that are compatible with OpenID Connect (OIDC).
User authentication
With an external IDP configured, the XProtect clients support the use of external IDPs as an additional
authentication option.
When the computer address in the client login screen points to an XProtect VMS with an external IDP configured,
an API call will be triggered and the authentication option for the external IDP will be available on the login
screen. The API call is activated when the client is started and whenever the address is changed.
The particular API that the client queries is a public API that does not require any user authentication, so this
information can always be read by the client.
Claims
A claim is a statement that an entity such as a user or an application makes about itself.
The claim consists of a claim name and a claim value. For example, the claim name could be a standard name
that describes the content of the claim value, and the claim value could be the name of a group. See more
example of claims from an external IDP: Example of claims from an external IDP.
Claims are not mandatory. However, they are required in order to automatically link external IDP users to roles
in the XProtect VMS in order to determine the users' permissions. The claims are included in the users’ ID token
from the external IDP and through the association with roles they determine the user's permissions in XProtect.
If claims related to the XProtect VMS roles are not provided for the external IDP users, the external IDP users
can be created in the XProtect VMS when they log on for the first time. In this case the external IDP users are not
linked to any roles. The XProtect VMS administrator must then manually add the users to roles.
The following steps should be completed in the external IDP before it is configured in the VMS.
l The client ID and secret for use with the XProtect VMS must have been created in the external IDP. For
more information, see Unique user names for external IDP users on page 69.
l The authentication authority for the external IDP must be known. For more information, see the
information about authentication authority for the external IDP in the Options dialog box. must be
known.
l The redirect URIs to the XProtect VMS must have been configured in the IDP. For more information, see
Add redirect URIs for the web clients on page 383.
l Optionally, VMS related claims must have been configured for the users or groups in the IDP.
68 | Overview
Administrator manual | XProtect® VMS 2024 R1
l The XProtect VMS must be fully configured with certificates to ensure that all communication is done over
encrypted https. otherwise, most external IDPs will not accept requests from the XProtect VMS and its
clients, or a part of the communication flow and security token exchange will fail.
l It must be possible for the XProtect VMS and all client computers or smart phones that should use the
external IDP to contact the external IDPs login address
l From the external IDP, create the users and create claims to identify users as external IDP users in the
XProtect VMS. The creation of claims is not a mandatory step but this is how you enable automatically
linking users to roles. For more information, see Claims on page 68.
l From the XProtect VMS, create a configuration that enables the Identity Provider, that is built into the
VMS, to contact the external IDP. For more information about how to create a configuration for an
external IDP, see Add and configure an external IDP.
l From the XProtect VMS, establish authentication of users by mapping the user claims from the external
IDP to XProtect roles. For more information about how to map claims to roles, see Map claims from an
external IDP to roles in XProtect.
l Log into an XProtect client using an external IDP for user authentication, see Log in via an external IDP on
page 279.
Redirect URIs
The redirect URI specifies the page that the user is sent to after a successful authentication. In your external
IDP, you must add the address of the management server followed by the Callback path you defined in XProtect
Management Client. For example, https://management-server-computer.company.com/idp/signin-oidc
Depending on how the XProtect VMS is accessed, how the network, servers and Microsoft Active Directory is
configured, several redirect URIs may be needed, you can see some examples below:
Examples
l “https://[server_name]/idp/signin-oidc”
l “https://[server_name].[domain_name]/idp/signin-oidc”
l “https://[server_name]:[mobile_port]/idp/signin-oidc”
l “https://[server_name].[domain_name]:[mobile_port]/idp/signin-oidc”
If the mobile server is set up to be accessed over the internet, you must also add the public address and ports.
User names are created automatically for users that log in to Milestone XProtect via an external IDP.
69 | Overview
Administrator manual | XProtect® VMS 2024 R1
The external IDP provides a set of claims to automatically create a name for the user in XProtect, and in XProtect
an algorithm is used to pick a name from the external IDP that is unique in the VMS database.
The claims consist of a claim name and a claim value. For example:
email [email protected]
amr pwd
idp 00o2ghkgazGgi9BIE5d7
preferred_
[email protected]
username
vmsRole Operator
locale en-US
given_name Raz
family_
Lindberg
name
zoneinfo America/Los_Angeles
email_
True
verified
In XProtect, the search priority for when creating a user in the XProtect VMS is controlled by the sequence
number of the claims in the table below. The first available claim name will be used in the XProtect VMS:
70 | Overview
Administrator manual | XProtect® VMS 2024 R1
name 3
email 5
The XProtect administrators can define a specific claim from the external IDP that should be used to create a
user name in the XProtect VMS. When an administrator define a claim to use for the creation of the user name in
the XProtect VMS, the claim name must be written exactly as the claim name coming from the external IDP.
l The claim to use for the user name can be defined in the Claim to use to create user name field on the
External IDP tab under Tools > Options .
Users created in XProtect by an external IDP login are deleted the same way as a basic user and the user can be
deleted at any time after the user is created.
If a user is deleted in XProtect and the user logs in again from the external IDP, a new user will be created in
XProtect. However, the data associated with the user in XProtect such as private views and roles are lost and this
information has to be created again for the user in XProtect.
If an external IDP is deleted in the Management Client, any users connected to the VMS via the external IDP are
also deleted.
71 | Overview
Administrator manual | XProtect® VMS 2024 R1
Security
Roles define users' permissions, including the devices the users can access. Roles also define security and
access permissions within the video management system.
The system comes with a default Administrators role with full access to all system functionality, but in most
cases you need more than one role in your system, to differentiate between users and the access they should
have. You can add as many roles as you need. See Assign/remove users and groups to/from roles on page 282.
For example, you might need to set up different types of roles for users of XProtect Smart Client, depending on
the devices you want them to have access to, or similar types of restrictions that require differentiation between
users.
l Create and set up the roles that you need to suit your organization's business needs
l Add users and user groups that you assign to the roles they should belong to
l Create Smart Client profiles and Management Client profiles to define what users can see in the XProtect
Smart Client and Management Client user interface.
Roles only control your access permissions, and not what users can see in the user interface in XProtect
Smart Client or the Management Client. You do not need create a specific Management Client profile for
users that will never use the Management Client.
For the best possible user experience for XProtect Smart Client users or Management Client users with limited
access to Management Client functionality, you should ensure that there is consistency between the permissions
provided by the role and the user interface elements provided by the Smart Client or Management Client profile.
To have access to the Management Server, it is important that all roles have the Connect
security permission enabled. The permission is located in Role Settings > Management
Server > Overall Security tab (roles) on page 497.
Permissions of a role
Available functionality depends on the system you are using. See the complete feature list, which is available on
the product overview page on the Milestone website (https://www.milestonesys.com/products/software/product-
index/).
72 | Overview
Administrator manual | XProtect® VMS 2024 R1
When you create a role in your system, you can assign that role to a number of permissions to the system
components or features which the relevant role can access and use.
For example, you might want to create roles that only have permissions to access functionality in XProtect Smart
Client or other Milestone viewing clients, with the permissions to view only certain cameras. If you create such
roles, these roles should not have permissions to access and use the Management Client, but only have access
to some or all functionality found in XProtect Smart Client or other clients.
To address this need for differentiation, you then set up a role that has some or most typical administrator
permissions, for example, the permissions to add and remove cameras, servers and similar functionality. You
can create roles that have some or most permissions of a system administrator. This may, for example, be
relevant if your organization wants to separate between people who can administrate a subset of the system
and people who can administrate the entire system.
Roles give you the possibility to provide differentiated administrator permissions to access, edit, or change a
large variety of system functions. For example, the permission to edit the settings for servers or cameras in your
system. You specify these permissions on the Overall Security tab (see Overall Security tab (roles) on page
497). To enable that the differentiated system administrator can launch the Management Client, you must grant
read permissions on the management server for the role.
To have access to the Management Server, it is important that all roles have the Connect
security permission enabled. The permission is located in Role Settings > Management
Server > Overall Security tab (roles) on page 497.
You can also reflect the same limitations in the user interface of the Management Client for each role by
associating the role with a Management Client profile that has the removed the corresponding system functions
from the user interface. See Management Client profiles (explained) on page 76 for information.
To give a role such differentiated administrator permissions, the person with the default full administrator role
must set up the role under Security > Roles > Info tab > Add new. When you set up the new role, you can then
associate the role with your own profiles must similarly to when you set up any other role in the system or use
the system's default profiles. For more information, see Add and manage a role on page 280.
When you have specified the profiles to associate with the role, go to the Overall Security tab to specify the
permissions of the role.
The permissions you can set for a role are different between your products. You can only
give all available permissions to a role in XProtect Corporate.
73 | Overview
Administrator manual | XProtect® VMS 2024 R1
With privacy masking, you can define which areas of the video from a camera you want to cover with privacy
masks when shown in the clients. For example, if a surveillance camera covers a street, you can cover certain
areas of a building (could be windows and doors) with privacy masks, to protect the privacy of residents. In some
countries, this is a legal requirement.
You can specify privacy masks as either solid or blurred. The masks cover both live, recorded, and exported
video.
Privacy masks are applied and locked to an area of the camera image, so the covered area does not follow the
pan-til-zoom movements, but constantly covers the same area of the camera image. On some PTZ cameras, you
can enable position based privacy masking on the camera itself.
l Permanent privacy mask: Areas with this type of mask are always covered in the clients. Can be used to
cover areas of the video that never requires surveillance, like public areas, or areas where surveillance is
not allowed. Motion detection is excluded from areas with permanent privacy masks
l Liftable privacy mask: Areas with this type of mask can be temporarily uncovered in XProtect Smart
Client by users with permission to lift privacy masks. If the logged in XProtect Smart Client user does not
have the permission to lift privacy masks, the system asks for an authorized user to approve of the lift.
Privacy masks are lifted until timeout or the user reapply them. Be aware that privacy masks are lifted on
video from all cameras that the user has access to
If you upgrade from a 2017 R3 system or older with privacy masks applied, the masks will
be converted to liftable masks.
When a user exports or playbacks recorded video from a client, the video includes the privacy masks configured
at the time of recording, even if you have changed or removed the privacy masks later. If privacy protection is
lifted when exporting, the exported video does not include the liftable privacy masks.
If you change privacy masking settings very often, for example once a week, your system
can potentially be overloaded.
74 | Overview
Administrator manual | XProtect® VMS 2024 R1
75 | Overview
Administrator manual | XProtect® VMS 2024 R1
You can inform the client users about the settings of permanent and liftable privacy
masks.
Management Client profiles only handle the visual representation of system functionality, not the actual access
to it. The overall access to system functionality is granted via the role that individual users are associated with.
For information about how to manage overall access to system functionality for a role, see Manage the visibility
of functionality for a Management Client profile.
You can change settings for the visibility of all Management Client elements. By default, the Management Client
profile can see all functionality in the Management Client.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
All users in Milestone XProtect VMS belong to a role that has a Smart Client profile connected to it.
Roles define users' permissions and the Smart Client profiles define what users can see in the XProtect Smart
Client user interface.
All Milestone XProtect VMS installations include a default Smart Client profile that is set up with a default
configuration to display most of the configuration that is available in your organization's system. Some settings
are always disabled by default.
In cases where you have several different roles in an organization, you might want to disable functionality that a
particular role does not/should not have access to in XProtect Smart Client.
For example, you might have a role whose daily work does not require running any playback of video. For this
purpose, you can create a new Smart Client profile for that role where you disable Playback mode. When you
disable this setting in the Smart Client profile, XProtect Smart Client users with a role that uses this Smart Client
profile can no longer see Playback mode in their XProtect Smart Client user interface.
It is important to note that Smart Client profiles mostly control what users can see in the XProtect Smart Client
user interface and not the role's actual access permissions. Those access permissions, such as access to
reading, modifying, or deleting, are controlled by in the role settings. So XProtect Smart Client users can have
permissions to functionality through their role which they cannot see in the user interface because it is disabled
in the Smart Client profile.
76 | Overview
Administrator manual | XProtect® VMS 2024 R1
For the best possible user experience for the XProtect Smart Client users, you should ensure that there is
consistency between the permissions provided by the role and the user interface elements provided by the
Smart Client profile.
To create or edit Smart Client profiles, expand Client and select Smart Client Profiles.
You can also learn about the relationship between Smart Client profiles, roles and time profiles and how to use
these together (see Create and set up Smart Client profiles, roles and time profiles on page 257).
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
As of XProtect VMS version 2020 R2, when you upgrade the management server from an
earlier version, it will not be possible to create or modify evidence locks on recording
servers that are version 2020 R1 or earlier, until these recording servers have been
upgraded.
This also means that if the hardware has been moved from one recording server (from
2020 R1 or earlier) to another recording server, and it still has recordings on it, then
evidence locks cannot be created or modified.
With the evidence lock functionality, client operators can protect video sequences, including audio and other
data, from deletion if required, for example, while an investigation or trial is ongoing. For more information, see
the user manual for XProtect Smart Client.
When protected, the data cannot be deleted, neither automatically by the system after the system's default
retention time or in other situations nor manually by the client users. The system or a user cannot delete the
data until a user with sufficient user permissions unlocks the evidence.
77 | Overview
Administrator manual | XProtect® VMS 2024 R1
1. A XProtect Smart Client user creates an evidence lock. Information sent to Management Server.
2. Management Server stores information about the evidence lock in the SQL Server database.
3. Management Server informs Recording Server to store and protect the protected recordings in the
database.
When the operator creates an evidence lock, the protected data remains in the recording storage that it was
recorded to, and is moved to archiving disks together with non-protected data, but the protected data:
l Follows the retention time configured for the evidence lock. Potentially infinitely
l Keeps the original quality of the recordings, even if grooming has been configured for non-protected data
When an operator creates locks, the minimum size of a sequence is the period that the database divides
recorded files into, this is by default one-hour sequences. You can change this, but it requires that you customize
the RecorderConfig.xml file on the recording server. If a small sequence spans two one-hour periods, the system
locks the recordings in both periods.
In the audit log in the Management Client, you can see when a user creates, edits, or deletes evidence locks.
When a disk runs out of disk space, it does not impact the protected data. Instead, the oldest non-protected data
will be deleted. If there are no more non-protected data to delete, the system stops recording. You can create
rules and alarms triggered by disk full events, so you are automatically notified.
Except for more data being stored for a longer period and potentially affecting disk storage, the evidence lock
feature as such does not influence system performance.
If you move hardware (see Move hardware on page 333) to another recording server:
78 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Recordings protected by evidence locks remain on the old recording server with the retention time that
was defined when the evidence lock was created
l The XProtect Smart Client user can still protect data with evidence locks on the recordings that were
made on a camera before it was moved to another recording server. Even if you move the camera
multiple times and the recordings are stored on multiple recording servers
By default, all operators have the default evidence lock profile assigned to them, but no user access permissions
to the feature. To specify the evidence lock access permissions of a role, see Device tab (roles) for role settings.
To specify the evidence lock profile of a role, see Info tab (roles) for role settings.
In the Management Client, you can edit the properties of the default evidence lock profile and create additional
evidence lock profiles and assign these to the roles instead.
Rules (explained)
Rules specify actions to carry out under particular conditions. Example: When motion is detected (condition), a
camera should begin recording (action).
l Generate events
79 | Overview
Administrator manual | XProtect® VMS 2024 R1
Stopping a device means that video is no longer transferred from the device to the system, in which case you
cannot view live video nor record video. In contrast, a device on which you have stopped the feed can still
communicate with the recording server, and you can start the feed from the device automatically through a rule,
as opposed to when the device is manually disabled in the Management Client.
Some rule content may require that certain features are enabled for the relevant devices.
For example, a rule specifying that a camera should record does not work as intended if
recording is not enabled for the relevant camera. Before creating a rule, Milestone
recommends that you verify that the devices involved can perform as intended.
Rule complexity
Your exact number of options depends on the type of rule you want to create, and on the number of devices
available on your system. Rules provide a high degree of flexibility: you can combine event and time conditions,
specify several actions in a single rule, and very often create rules covering several or all the devices on your
system.
You can make your rules as simple or complex as required. For example, you can create very simple time-based
rules:
Example Explanation
On Mondays between 08.30 and 11.30 (time condition), Camera 1 and Camera 2
Very Simple Time-
should start recording (action) when the time period begins and stop recording
Based Rule
(stop action) when the time period ends.
When motion is detected (event condition) on Camera 1, and the day of the week
Rule Combining is Saturday or Sunday (time condition), Camera 1 and Camera 2 should start
Time, Events, and recording (action) immediately, and a notification should be sent to the security
Devices manager (action). Then, 5 seconds after motion is no longer detected on Camera
1 or Camera 2, the 2 cameras should stop recording (stop action).
80 | Overview
Administrator manual | XProtect® VMS 2024 R1
Depending on your organization's needs, it is often a good idea to create many simple rules rather than a few
complex rules. Even if it means you have more rules in your system, it provides an easy way to maintain an
overview of what your rules do. Keeping your rules simple also means that you have much more flexibility when
it comes to deactivating/activating individual rule elements. With simple rules, you can deactivate/activate entire
rules when required.
Example - a rule specifying that a particular camera should begin recording when it detects motion:
Events are central elements when using the Manage Rule wizard. In the wizard, events are primarily used for
triggering actions. For example, you can create a rule which specifies that in the event of detected motion, the
surveillance system should take the action of starting recording of video from a particular camera.
Name Description
When events occur on the surveillance system, for example when motion is detected or the
Events
system receives input from external sensors.
Failover time
Periods of time where failover is active or inactive.
interval
81 | Overview
Administrator manual | XProtect® VMS 2024 R1
Name Description
The time is based on the local time settings of the server on which
Management Client is installed.
You can work with the following under Rules and Events:
l Rules: Rules are a central element in the system. The behavior of your surveillance system is to a very
large extent determined by rules. When creating a rule, you can work with all types of events
l Time profiles: Time profiles are periods of time defined in the Management Client. You use them when
you create rules in the Management Client, for example to create a rule which specifies that a certain
action should take place within a certain time profile
l Notification profiles: You can use notification profiles to set up ready-made email notifications, which can
automatically be triggered by a rule, for example when a particular event occurs
l User-defined events: User-defined events are custom-made events that makes it possible for users to
manually trigger events in the system or react to inputs from the system
l Analytics events: Analytics events are data received from external third-party video content analysis
(VCA) providers. You can use analytics events as basis for alarms
l Generic events: Generic events allow you to trigger actions in the XProtect event server by sending
simple strings via the IP network to your system
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Time profiles are periods of time defined by the administrator. You can use time profiles when creating rules, for
example, a rule specifying that a certain action should take place within a certain time period.
82 | Overview
Administrator manual | XProtect® VMS 2024 R1
Time profiles are also assigned to roles, along with Smart Client profiles. By default, all roles are assigned the
default time profile Always. This means that members of roles with this default time profile attached has no
time-based limits to their user permissions in the system. You can also assign an alternative time profile to a
role.
Time profiles are highly flexible: you can base them on one or more single periods of time, on one or more
recurring periods of time, or a combination of single and recurring times. Many users may be familiar with the
concepts of single and recurring time periods from calendar applications, such as the one in Microsoft® Outlook.
Time profiles always apply in local time. This means that if your system has recording servers placed in different
time zones, any actions, for example recording on cameras, associated with time profiles are carried out in each
recording server's local time. Example: If you have a time profile covering the period from 08.30 to 09.30, any
associated actions on a recording server placed in New York is carried out when the local time is 08.30 to 09.30
in New York, while the same actions on a recording server placed in Los Angeles is carried out some hours later,
when the local time is 08.30 to 09.30 in Los Angeles.
You create and manage time profiles by expanding Rules and Events > Time Profiles. A Time Profiles list opens.
Example only:
For an alternative to time profiles, see Day length time profiles (explained).
In such situations, you can create day length time profiles instead to define the sunrise and sunset in a specified
geographical area. Via geographic coordinates, the system calculates the sunrise and sunset time, even
incorporating daylight saving time on a daily basis. As a result, the time profile automatically follows the yearly
changes in sunrise/sunset in the selected area, ensuring the profile to be active only when needed. All times and
dates are based on the management server's time and date settings. You can also set a positive or negative
offset (in minutes) for the start (sunrise) and end time (sunset). The offset for the start and the end time can be
identical or different.
You can use day length profiles both when you create rules and roles.
83 | Overview
Administrator manual | XProtect® VMS 2024 R1
When you create the notification profile, you specify the message text and decides if you want to include still
images and AVI video clips in the email notifications.
You may need to disable any email scanners that could prevent the application from
sending email notifications.
Before you can create notification profiles, you must specify mail server settings for email notifications.
You can secure the communication to the mail server, if you install the necessary security certificates on the
mail server.
If you want the email notifications to be able to include AVI movie clips, you must first specify the compression
settings:
2. Configure the mail server on the Mail Server tab (Mail Server tab (options) on page 378) and the
compression settings on the AVI Generation tab AVI Generation tab (options) on page 379.
With user-defined events, you can use data received from a third-party access control system as events in the
system. The events can later trigger actions. This way, you can, for example, begin recording video from relevant
cameras when somebody enters a building.
You can also use user-defined events for manually triggering events while viewing live video in XProtect Smart
Client or automatically if you use them in rules. For example, when user-defined event 37 occurs, PTZ camera
224 should stop patrolling and go to preset position 18.
Through roles, you define which of your users are able to trigger the user-defined events. You can use user-
defined events in two ways and at the same time if required:
Events Description
84 | Overview
Administrator manual | XProtect® VMS 2024 R1
Events Description
In this case, you can trigger user-defined events outside the surveillance system.
Using user-defined events this way requires that a separate API (Application
Program Interface. A set of building blocks for creating or customizing software
applications) is used when triggering the user-defined event. Authentication
through Active Directory is required for using user-defined events this way. This
ensures that even if the user-defined events can be triggered from outside the
surveillance system, only authorized users are to do it.
Also, user-defined events can via API be associated with meta-data, defining
certain devices or device groups. This is highly usable when using user-defined
For providing the
events to trigger rules: you avoid having a rule for each device, basically doing the
ability to trigger
same thing. Example: A company uses access control, having 35 entrances, each
events through API
with an access control device. When an access control device is activated, a user-
defined event is triggered in the system. This user-defined event is used in a rule to
start recording on a camera associated with the activated access control device. It
is defined in the meta-data which camera is associated with what rule. This way the
company does not need to have 35 user-defined events and 35 rules triggered by
the user-defined events. A single user-defined event and a single rule are enough.
When you use user-defined events this way, you may not always want them to be
available for manual triggering in XProtect Smart Client. You can use roles to
define which user-defined events should be visible in XProtect Smart Client.
Using analytics events as basis for alarms is basically a three step process:
l Part one, enabling the analytics events feature and setting up its security. Use a list of allowed addresses
to control who can send event data to the system and which port the server listens on
l Part two, creating the analytics event, possibly with a description of the event, and testing it
l Part three, using the analytics event as the source of an alarm definition
You set up analytics events on the Rules and Events list in the Site Navigation pane.
To use VCA-based events, a third-party VCA tool is required for supplying data to the system. Which VCA tool to
use is entirely up to you, as long as the data supplied by the tool adheres to the format. This format is explained
in the MIP SDK Documentation on analytics events.
85 | Overview
Administrator manual | XProtect® VMS 2024 R1
Contact your system provider for more details. Third-party VCA tools are developed by independent partners
delivering solutions based on a Milestone open platform. These solutions can impact performance on the
system.
You can use any hard- or software, which can send strings via TCP or UDP, to trigger generic events. Your
system can analyze received TCP or UDP data packages, and automatically trigger generic events when specific
criteria are met. This way, you may integrate your system with external sources, for example access control
systems and alarm systems. The aim is to allow as many external sources as possible to interact with the
system.
With the concept of data sources, you avoid having to adapt third-party tools to meet the standards of your
system. With data sources, you can communicate with a particular piece of hard- or software on a specific IP
port and fine-tune how bytes arriving on that port are interpreted. Each generic event type pairs up with a data
source and makes up a language used for communication with a specific piece of hard- or software.
Working with data sources requires general knowledge of IP networking and specific knowledge of the individual
hard- or software you want to interface from. There are many parameters you can use and no ready-made
solution on how to do this. Basically, your system provides the tools, but not the solution. Unlike user-defined
events, generic events have no authentication. This makes them easier to trigger but, to avoid jeopardizing
security, only events from local host are accepted. You can allow other client IP addresses from the Generic
Events tab of the Options menu.
Webhooks (explained)
Webhooks are HTTP requests that enable web applications to communicate with each other and facilitates the
sending of real-time data from one application to another when a predefined event occurs, for example sending
event data to a predefined webhook endpoint when a user logs on to the system or when a camera reports an
error.
A webhook endpoint (webhook URL) is the predefined address which the event data is to be sent to, much like a
one-way telephone number.
You can use webhooks to build integrations which subscribe to selected events in XProtect. When an event is
triggered, an HTTP POST is sent to the webhook endpoint you have defined for that event. The HTTP POST body
contains event data in JSON.
Webhooks do not poll the system for data or triggered events, instead, the system pushes event data to the
webhook endpoint when an event occurs which makes webhooks less resource-demanding and faster to set up
compared to polling-solutions.
86 | Overview
Administrator manual | XProtect® VMS 2024 R1
You should verify that the event data sent from XProtect complies with the existing data
and privacy protection legislation of your country.
The Webhooks functionality is by default installed and ready to use on XProtect 2023R1 or later and displays the
Webhooks action on the Rules tab in Management Client.
Alarms
Alarms (explained)
This feature only works if you have XProtect Event Server installed.
This article describes how to set up alarms to appear in the system, triggered by events.
Based on functionality handled in the event server, the alarms feature provides central overview, control and
scalability of alarms in any number of installations (including any other XProtect systems) throughout your
organization. You can configure it to generate alarms based on either:
For example, motion, server responding/not responding, archiving problems, lack of disk space and
more.
87 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Analytics events
Typically data received from an external third-party video content analysis (VCA) providers.
Through the MIP SDK a third-party vendor can develop custom plug-ins (for example, integration
to external access control systems or similar) to your system.
Legend:
1. Surveillance system
2. Management Client
4. Alarm configuration
You handle and assign alarms in the alarm list in XProtect Smart Client. You can also integrate alarms with the
XProtect Smart Client's smart map and map functionality.
Alarm configuration
88 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Central technical overview of all components: servers, cameras, and external units
l Handling of plug-ins, allowing customized integration of other systems, for example external access
control or VCA-based systems
In general, alarms are controlled by the visibility of the object causing the alarm. This means that four possible
aspects can play a role with regards to alarms and who can control/manage them and to what degree:
Name Description
Source/device If the device causing the alarm is not set to be visible to the user's role, the user
visibility cannot see the alarm in the alarm list in XProtect Smart Client.
The right to trigger This permission determines if the user's role can trigger selected user-defined
user-defined events events in XProtect Smart Client.
If any external plug-ins are set up in your system, these might control users'
External plug-ins
permissions to handle alarms.
Determine whether the user is allowed to only view or also to manage alarms.
General role rights What a user of Alarms can do with alarms depends on the user's role and on
settings configured for that particular role.
On the Alarms and Events tab in Options, you can specify settings for alarms, events and logs.
Smart map
The following configuration of the smart map feature is done in Management Client:
89 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Configure the geographic backgrounds that you can choose for your smart map. This includes integrating
your smart map with one of the following services:
l Bing Maps
l Google Maps
l OpenStreetMap
l Enable Bing Maps or Google Maps in XProtect Management Client or in XProtect Smart Client
Once you have the API key, you must enter it in XProtect Management Client. See also Enable Bing Maps or
Google Maps in Management Client on page 314.
If you are behind a restrictive firewall, allowing access to the used domains is important.
You may need to allow for outgoing traffic for Google Maps using maps.googleapis.com
on each machine on which the Smart Client is running.
If you expect the XProtect Smart Client operators to make more than 25,000 maps requests per day, you need a
digital signature for your Maps Static API key. The digital signature allows the Google servers to verify that any
site generating requests using your API key is authorized to do so. However, regardless of the usage
90 | Overview
Administrator manual | XProtect® VMS 2024 R1
requirements, Google recommends using a digital signature as an additional security layer. To get the digital
signature, you must retrieve a URL signing secret. For more information, see
https://developers.google.com/maps/documentation/maps-static/get-api-key#dig-sig-manual.
Once you have the API key, you must enter it in XProtect Management Client. See Enable Bing Maps or Google
Maps in Management Client on page 314.
If you are behind a restrictive firewall, allowing access to the used domains is important.
You may need to allow for outgoing traffic for Bing maps using *.virtualearth.net on each
machine on which the Smart Client is running.
If you are using Google Maps as your geographic background, files are not cached.
The files that you use for your geographic background are retrieved from a tile server. The time that the files are
stored in the cache folder depends on the value selected in the Removed cached smart map files list in the
Settings dialog in XProtect Smart Client. The files are stored either:
l Indefinitely (Never)
l For 30 days if the file is not used (When not used for 30 days)
When you change the tile server address, automatically a new cache folder is created. The previous map files
are retained in the associated cache folder on your local computer.
91 | Overview
Administrator manual | XProtect® VMS 2024 R1
Architecture
Example of a distributed system setup. The number of cameras, recording servers, and connected clients, can
be as high as you require.
Legend:
1. Management Client(s)
2. Event server
3. Microsoft cluster
4. Management server
8. Recording server(s)
92 | Overview
Administrator manual | XProtect® VMS 2024 R1
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Milestone Interconnect™ allows you to integrate a number of smaller, physically fragmented, and remote
XProtect installations with one XProtect Corporate central site. You can install these smaller sites, called remote
sites, on mobile units, for example, boats, busses or trains. This means that such sites do not need to be
permanently connected to a network.
The following illustration shows how you could set up Milestone Interconnect on your system:
2. Milestone Interconnect drivers (handles the connection between the central sites' recording servers and
the remote site, must be selected in the list of drivers when adding remote systems via the Add
Hardware wizard)
4. Milestone Interconnect remote site (the complete remote site with system installation, users, cameras
and so on)
5. Milestone Interconnect remote system (the actual technical installation at the remote site)
93 | Overview
Administrator manual | XProtect® VMS 2024 R1
You add remote sites to your central site with the Add Hardware wizard from the central site (see Add a remote
site to your central Milestone Interconnect site on page 307).
Each remote site runs independently and can perform any normal surveillance tasks. Depending on the network
connections and appropriate user permissions (see Assign user permissions on page 308), Milestone
Interconnect offers you direct live viewing of remote site cameras and play back of remote site recordings on
the central site.
The central site can only see and access devices that the specified user account (when adding the remote site)
has access to. This allows local system administrators to control which devices should be made available to the
central site and its users.
On the central site, you can view the system's own status for the interconnected cameras, but not directly the
state of the remote site. Instead, to monitor the remote site, you can use the remote site events to trigger
alarms or other notifications on the central site (see Configure your central site to respond to events from
remote sites on page 310).
It also offers you the possibility to transfer remote site recordings to the central site based on either events,
rules/schedules, or manual requests by XProtect Smart Client users.
Only XProtect Corporate systems can work as central sites. All other products can act as remote sites including
XProtect Corporate. It differs from setup to setup which versions, how many cameras, and how devices and
events originating from the remote site are handled - if at all - by the central site. For further details on how
specific XProtect products interact in a Milestone Interconnect setup, go to the Milestone Interconnect website
(https://www.milestonesys.com/products/expand-your-solution/milestone-extensions/interconnect/).
In a physically distributed system where users on the central site need to access the video on the remote site,
you can choose between Milestone Interconnect™ or Milestone Federated Architecture™.
l The network connection between the central and federated sites is stable
l The network connection between the central and remote sites is unstable
l You or your organization want to use another XProtect product on the remote sites
94 | Overview
Administrator manual | XProtect® VMS 2024 R1
To run Milestone Interconnect, you need Milestone Interconnect camera licenses on your central site to view
video from hardware devices on remote sites. The number of required Milestone Interconnect camera licenses
depends on the number of hardware devices on the remote sites that you want to receive data from. Only
XProtect Corporate can act as a central site.
The status of your Milestone Interconnect camera licenses are listed on the License Information page of the
central site.
There are three ways to run Milestone Interconnect. How to run your setup depends on your network
connection, how to play back recordings, and whether you retrieve remote recordings and to what degree.
The most straightforward setup. The central site is continuously online with its remote sites and the central site
users play back remote recordings directly from the remote sites. This requires use of the Play back recordings
from remote system option (see Enable playback directly from remote site camera on page 309).
Rule- or XProtect Smart Client-based retrieval of selected remote recording sequences from remote
sites (periodically limited network connections)
Used when selected recording sequences (originating from remote sites) should be stored centrally to ensure
independence from remote sites. Independence is crucial in case of network failure or network restrictions. You
configure remote recordings retrieval settings on the Remote Retrieval tab (see Remote Retrieval tab on page
419).
Remote recordings retrieval can be started from the XProtect Smart Client when needed or a rule can be set up.
In some scenarios, remote sites are online and in others, offline most of the time. This is often industry specific.
For some industries it is common for the central site to be permanently online with its remote sites (for example
a retail HQ (central site) and a number of shops (remote sites)). For other industries, like transportation, the
remote sites are mobile (for example, busses, trains, ships, and so on) and can only establish network
connection randomly. Should the network connection fail during a commenced remote recording retrieval, the
job continues at next given opportunity.
If the system detects an automatic retrieval, or request for retrieval from the XProtect Smart Client, outside the
time interval that you specified on the Remote Retrieval tab, it is accepted, but not started until the selected
time interval is reached. New remote recording retrieval jobs will queue and start when the allowed time interval
is reached. You can view pending remote recording retrieval jobs from System Dashboard -> Current Tasks.
95 | Overview
Administrator manual | XProtect® VMS 2024 R1
After connection failure, missing remote recordings are by default retrieved from remote sites
Uses remote sites like a recording server uses the edge storage on a camera. Typically, remote sites are online
with their central site, feeding it a live stream that the central site records. Should the network fail for some
reason, the central site misses out on recording sequences. However, once the network is reestablished, the
central site automatically retrieves remote recordings covering the down-period. This requires use of the
Automatically retrieve remote recordings when connection is restored option (see Retrieve remote
recordings from remote site camera on page 309) on the Record tab for the camera.
You can mix any of the above solutions to fit your organizations special needs.
Milestone Federated Architecture links multiple individual standard systems into a federated site hierarchy of
parent/child sites. Client users with sufficient permissions have seamless access to video, audio and other
resources across individual sites. Administrators can centrally manage all sites from version 2018 R1 and newer
within the federated hierarchy, based on administrator permissions for the individual sites.
Basic users are not supported in Milestone Federated Architecture systems, so you must add users as Windows
users through the Active Directory service.
Milestone Federated Architecture is set up with one central site (top site) and an unrestricted number of
federated sites (see Set up your system to run federated sites on page 302). When you are logged into a site,
you can access information about all of its child sites and the child sites' child sites. The link between two sites is
established, when you request the link from the parent site (see Add site to hierarchy on page 304). A child site
can only be linked to one parent site. If you are not the administrator of the child site when you add it to the
federated site hierarchy, the request must be accepted by the child site administrator.
96 | Overview
Administrator manual | XProtect® VMS 2024 R1
2. Management server
3. Management Client
5. Cameras
6. Recording server
97 | Overview
Administrator manual | XProtect® VMS 2024 R1
Hierarchy synchronization
A parent site contains an updated list of all its currently attached child sites, child sites' child sites and so on. The
federated site hierarchy has a scheduled synchronization between sites, as well as a synchronization every time
a site is added or removed by the system administrator. When the system synchronizes the hierarchy, it takes
place level by level, each level forwarding and returning communication, until it reaches the server that requests
the information. The system sends less than 1MB each time. Depending on the number of levels, changes to a
hierarchy can take some time to become visible in the Management Client. You cannot schedule your own
synchronizations.
Data traffic
The system sends communication or configuration data when a user or administrator views live or recorded
video or configures a site. The amount of data depends on what and how much is being viewed or configured.
l Opening the Management Client in a Milestone Federated Architecture is supported for three major
releases, including the current one being released. In a Milestone Federated Architecture setup beyond
that scope, you need a separate Management Client that matches the server version.
l If the central site uses XProtect Smart Wall, you can also use the XProtect Smart Wall features in the
federated site hierarchy.
l If the central site uses XProtect Access and XProtect Smart Client user logs into a site in a federated site
hierarchy, access request notifications from the federated sites also appear in XProtect Smart Client
l You can add XProtect Expert 2013 systems or newer to the federated site hierarchy as child sites, not as
parent sites
l For more information about use cases and benefits, see the white paper about Milestone Federated
Architecture.
Before you start building up the hierarchy in the Management Client, Milestone recommends that you map how
you want your sites to link together.
You install and configure each site in a federated hierarchy as a normal standalone system with standard
system components, settings, rules, schedules, administrators, users, and user permissions. If you already have
the sites installed and configured and only need to combine them in a federated site hierarchy, your systems are
ready to be set up.
Once the individual sites are installed, you must set them up to run as federated sites (see Set up your system to
run federated sites on page 302).
98 | Overview
Administrator manual | XProtect® VMS 2024 R1
To start the hierarchy, you can log into the site that you want to work as the central site and add (see Add site to
hierarchy on page 304) the first federated site. When the link is established, the two sites automatically create a
federated site hierarchy in the Federated Site Hierarchy pane in the Management Client to which you can add
more sites to grow the federated hierarchy.
When you have created a federated site hierarchy, users and administrators can log into a site to access that
site and any federated sites it may have. Access to federated sites depend on the user permissions.
There is no limit to the number of sites you can add to the federated hierarchy. Also, you can have a site on an
older product version linked to a newer version and vice versa. The version numbers appear automatically and
cannot be deleted. The site that you are logged into is always at the top of the Federated Site Hierarchy pane
and is called home site.
Below is an example of federated sited in the Management Client. To the left, the user has logged into the top
site. To the right, the user has logged into one of the child sites, the Paris Server, which is then the home site.
Description Icon
The top site in the entire hierarchy is still operational, but one or more issues need attention. Shown
on top of the top site icon.
99 | Overview
Administrator manual | XProtect® VMS 2024 R1
l Server components (services) offer their service on particular ports which is why they need to listen for
client requests on these ports. Therefore, these ports need to be opened in the Windows Firewall for
inbound and outbound connections
l Client components (clients) initiate connections to particular ports on server components. Therefore,
these ports need to be opened for outbound connections. Outbound connections are typically open by
default in the Windows Firewall
If nothing else is mentioned, ports for server components must be opened for inbound connections, and ports
for client components must be opened for outbound connections.
Do keep in mind that server components can act as clients to other server components. These are not explicitly
listed in this doc.
The port numbers are the default numbers, but this can be changed. Contact Milestone support, if you need to
change ports that are not configurable through the Management Client.
Each of the following sections list the ports that need to be opened for a particular service. To figure out which
ports need to be opened on a particular computer, you need to consider all services running on the computer.
100 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
Management
Server
Management Manager
6473 TCP Server tray icon, Showing status and managing the service.
service local
connection
only.
Local
Management Communication between internal processes on
8080 TCP connection
server the server.
only.
Recording
Management Web service for internal communication between
9000 HTTP Server
server servers.
services
101 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
Port
Protocol Process Connections from... Purpose
number
Port
Protocol Process Connections from... Purpose
number
102 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Process Connections from... Purpose
number
Event
XProtect Smart Client and Configuration, events, alarms, and
22331 TCP Server
the Management Client map data.
service
Event
MIP Plug-ins and
22333 TCP Server MIP messaging.
applications.
service
*A 403 error will be returned when accessing HTTP to access an HTTPS-only endpoint.
103 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
XProtect
Recording
Smart Client, Retrieving video and audio streams,
7563 TCP Server
Management PTZ commands.
Service
Client
Recording
Server
Recording Manager
Showing status and managing the
8966 TCP Server tray icon,
service.
Service local
connection
only.
104 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
Recording Failover
Polling the state of recording
11000 TCP Server recording
servers.
Service servers
Recording Local
Listening for event notifications from
65101 UDP Server connection
the drivers.
service only
In addition to the inbound connections to the Recording Server service listed above, the
Recording Server service establishes outbound connections to:
l Cameras
l NVRs
Port
Protocol Process Connections from... Purpose
number
25 SMTP Failover Cameras, encoders, and Listening for event messages from
105 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Process Connections from... Purpose
number
devices.
Failover
Recording Failover recording Merging of databases after a failover
5210 TCP
Server servers recording server had been running.
Service
Failover
Recording Retrieving video and audio streams,
7563 TCP XProtect Smart Client
Server PTZ commands.
Service
Failover
Communication between
Recording
8844 UDP failover recording server Communication between the servers.
Server
services.
Service
106 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Process Connections from... Purpose
number
Failover
Management Server Monitoring the status of the Failover
8990 HTTP Server
service Server service.
Service
Failover
Web service for internal
9001 HTTP Server Management server
communication between servers.
Service
In addition to the inbound connections to the Failover Server / Failover Recording Server
service listed above, the Failover Server / Failover Recording Server service establishes
outbound connections to the regular recorders, cameras, and for Video Push.
Port
Protocol Process Connections from... Purpose
number
Log Server All XProtect components except for Write to, read from, and
22337 HTTP
service the recording server. configure the log server.
This port uses HTTP, but the communication is encrypted with message security which uses the WS-Security
specification to secure messages. For more information, see Message Security in WCF.
107 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Process Connections from... Purpose
number
Mobile
Mobile Server Manager tray icon,
8000 TCP Server SysTray application.
local connection only.
service
Mobile
Mobile clients, Web clients, and Sending data streams;
8081 HTTP Server
Management Client. video and audio.
service
Mobile
Sending data streams;
8082 HTTPS Server Mobile clients and Web clients.
video and audio.
service
Port
Protocol Process Connections from... Purpose
number
LPR
LPR Server Manager tray
22334 TCP Server SysTray application
icon, local connection only.
Service
108 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
Port Connections
Protocol Process Purpose
number from...
DLNA
Device discovery and providing DLNA channels
9100 HTTP Server DLNA device
configuration. Requests for video streams.
Service
DLNA
9200 HTTP Server DLNA device Streaming of requested video to DLNA devices.
Service
Port Connections
Protocol Process Purpose
number from...
109 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port Connections
Protocol Process Purpose
number from...
Port
Protocol Connections to... Purpose
number
Port
Protocol Connections to... Purpose
number
110 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Connections to... Purpose
number
Cameras, NVRs,
554 RTSP Data streams, video, and audio.
encoders
Failover recording
11000 TCP Polling the state of recording servers.
servers
11000 TCP Failover recording servers Polling the state of recording servers.
Port
Protocol Connections to... Purpose
number
API Gateway and the Access the Configuration API from the API
80 HTTP
Management Server Gateway
111 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Connections to... Purpose
number
API Gateway and the Access the Configuration API from the API
443 HTTPS
Management Server Gateway
Milestone Customer Dashboard Send status, events and error messages from
443 HTTPS via the XProtect system to Milestone Customer
https://service.milestonesys.com/ Dashboard.
API Gateway
Port
Protocol Connections to... Purpose
number
Management
443 HTTPS RESTful API
Server
112 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Connections from... Purpose
number
Port
Protocol Connections to... Purpose
number
113 | Overview
Administrator manual | XProtect® VMS 2024 R1
Port
Protocol Connections to... Purpose
number
8081 HTTP XProtect Mobile server Retrieving video and audio streams.
8082 HTTPS XProtect Mobile server Retrieving video and audio streams.
API Gateway
114 | Overview
Administrator manual | XProtect® VMS 2024 R1
Application pools
The VMS contains standard application pools such as.NET v4.5, .NET v4.5 Classic and the DefaultAppPool. The
application pools that are available on your system appear in the Internet Information Services (IIS) Manager. In
addition to the standard application pools mentioned above, a set of VideoOS application pools are delivered
with the Milestone XProtect VMS.
115 | Overview
Administrator manual | XProtect® VMS 2024 R1
XProtect VMS.
1. From the Windows Start menu, open Internet Information Servces (IIS) Manager.
2. In the Connections pane, click the name of your environment, and then click Application Pools.
3. Under Actions, click Add Application Pool or Set Application Pool Defaults to perform any of these
tasks.
4. Select an application pool on the Application Pools page to display further options under Actions for
each application pool.
Product comparison
XProtect VMS includes the following products:
l XProtect Corporate
l XProtect Expert
l XProtect Professional+
116 | Overview
Administrator manual | XProtect® VMS 2024 R1
l XProtect Express+
l XProtect Essential+
See the complete feature list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
117 | Overview
Administrator manual | XProtect® VMS 2024 R1
Licensing
Licenses (explained)
Only when you upgrade to a more advanced XProtect product and need to change your SLC (Software License
Code) (see Change the Software License Code on page 127), the rest of this topic and the other licensing-related
topics in this documentation could be relevant for you.
l An order confirmation and a software license file named after your SLC (Software License Code) and with
the .lic extension received per email
Your SLC is also printed on your order confirmation and consists of several numbers and letters grouped by
hyphens like:
The software license file contains all information about your purchased VMS products, XProtect extensions, and
licenses. Milestone recommends that you store the information about your SLC and a copy of your software
license file in a safe place for later use. You can also see your SLC in the License Information window in
Management Client. You can open the License Information window in the Site Navigation pane -> Basics node
-> License Information. You may need the software license file or your SLC when you, for example, create a My
Milestone user account, contact your reseller for support, or if you need to make changes to your system.
To get started, you download the software from our website (https://www.milestonesys.com/downloads/). While
you are installing (see Install a new XProtect system on page 148) the software, you are asked to provide the
software license file. You cannot complete the installation without a software license file.
118 | Licensing
Administrator manual | XProtect® VMS 2024 R1
Once the installation is complete and you have added some cameras, you must activate your licenses (see
License activation (explained) on page 120. You activate your licenses from the License Information window in
Management Client. Here you can also see an overview of your licenses for all installations on the same SLC.
You can open the License Information window in the Site Navigation pane -> Basics node -> License
Information.
License types
There are several license types in the XProtect licensing system.
Base licenses
As a minimum, you have a base license for one of the XProtect VMS products. You may also have one or more
base licenses for XProtect extensions.
Device licenses
As a minimum, you have several device licenses. Generally, you need one device license per hardware device
with a camera that you want to add to your system. But this can differ from one hardware device to another and
depending on the hardware device being a Milestone supported hardware device or not. For more information,
see Supported hardware devices on page 119 and Unsupported hardware devices on page 119.
If you want to use the video push feature in XProtect Mobile, you also need one device license per mobile device
or tablet that should be able to push video to your system.
Device licenses are not required for speakers, microphones, or input and output devices attached to your
cameras.
Generally, you need one device license per hardware device with a camera that you want to add to your system.
But a few supported hardware devices require more than one device license. You can see how many device
licenses your hardware devices require, in the list of supported hardware on the Milestone website
(https://www.milestonesys.com/support/tools-and-references/supported-devices/).
For video encoders with up to 16 channels, you need only one device license per video encoder IP address. A
video encoder can have one or more IP addresses.
However, if the video encoder has more than 16 channels, one device license per activated camera on the video
encoder is required - also for the first 16 activated cameras.
An unsupported hardware device requires one device license per activated camera using a video channel.
Unsupported hardware devices do not appear in the list of supported hardware on the Milestone website
(https://www.milestonesys.com/support/tools-and-references/supported-devices/).
119 | Licensing
Administrator manual | XProtect® VMS 2024 R1
To run Milestone Interconnect, you need Milestone Interconnect camera licenses on your central site to view
video from hardware devices on remote sites. The number of required Milestone Interconnect camera licenses
depends on the number of hardware devices on the remote sites that you want to receive data from. Only
XProtect Corporate can act as a central site.
Most XProtect extensions require additional license types. The software license file also includes information
about your extension licenses. Some extensions have their own separate software license files.
There are several ways of activating licenses. All of them are available from the License Information window.
The best way of activating depends on your organization's policies and whether your management server has
access to the internet or not. To learn how to activate licenses, see Activate your licenses on page 124.
After the initial license activation of your XProtect VMS, you do not have to activate device licenses every time
you add a hardware device with a camera because of built-in flexibilities to the XProtect licensing system. For
more information about these flexibilities, see Grace period for license activation (explained) on page 121 and
Device changes without activation (explained) on page 121.
l The system activates your hardware devices a few minutes after you have added, removed, or replaced
hardware devices or made other changes that affect the use of your licenses. Therefore, you only seldom
must manually start a license activation. See the few exceptions in When manual license activation is still
required on page 121.
l If one of your base licenses expires within a period of 14 days, your XProtect system will also - as an extra
precaution - automatically try to activate your licenses every night.
120 | Licensing
Administrator manual | XProtect® VMS 2024 R1
If you make the following changes to your system, manual license activation is required.
l Upgrade to a newer version or more advanced VMS system (see Upgrade requirements on page 364)
l Receive allowance for more device changes without activation (see Device changes without activation
(explained) on page 121)
The number of device changes without activation differs from installation to installation and is calculated based
on several variables. For a detailed description, see Calculation of available number of device changes without
activation (explained) on page 121.
One year after your last license activation, your used number of device changes without activation is
automatically reset to zero. Once the reset happens, you can continue to add and replace hardware devices
without activating the licenses.
If your surveillance system is offline for longer periods of time, for example in cases with a surveillance system
on a ship on a long cruise or a surveillance system in a very remote place without any Internet access, you can
contact your Milestone reseller and request a higher number of device changes without activation.
You must explain why you think you qualify for a higher number of device changes without activation. Milestone
decides each request on an individual basis. Should you be granted a higher number of device changes without
activation, you must activate your licenses to register the higher number on your XProtect system.
121 | Licensing
Administrator manual | XProtect® VMS 2024 R1
l Cmin that is a fixed minimum value of the number of device changes without activation
l Cmax that is a fixed maximum value of the number of devices changes without activation
The number of device changes without activation can never be lower than the Cmin value or higher than the
Cmax value. The calculated value based on the C% variable changes according to how many activated devices
you have on each installation in your system. Devices added with device changes without activation are not
counted as activated by the C% variable.
Milestone defines the values of all three variables and the values are subject to change without notification. The
values of the variables differ depending on the product.
You buy 100 device licenses. You then add 100 cameras to the system. Unless you have enabled automatic
license activation, the number of device changes without activation is still zero. You activate your licenses and
have now 15 device changes without activation.
You buy 100 device licenses. You then add 100 cameras to the system and activate the licenses. Your number of
device changes without activation is now 15. You then decide to delete a hardware device from the system. You
now have 99 activated devices and the number of device changes without activation has dropped to 14.
You buy 1000 device licenses. You then add 1000 cameras and activates the licenses. Your device changes
without activation are now 100. According to the C% variable, you should now have had 150 device changes
without activation, but the Cmax variable only allows you to have 100 device changes without activation.
You buy 10 device licenses. You then add 10 cameras to the system and activates the licenses. Your number of
device changes without activation is now 10 because of the Cmin variable. If the number was only calculated
based on the C% variable, you would only have had 1 (15% of 10 = 1.5 rounded off to 1).
You buy 115 device licenses. You then add 100 cameras to the system and activate the licenses. Your device
changes without activation is now 15. You add another 15 cameras without activating them, using 15 out of 15 of
your device changes without activation. You now remove 50 of the cameras from the system and the number of
device changes without activation goes down to 7. This means that 8 of the cameras previously added within the
15 device changes without activation go into a grace period. You now add 50 new cameras. Because you
activated 100 cameras on the system last time you activated the licenses, the number of device changes without
activation goes back to 15 and the 8 cameras, that were moved into a grace period, move back as device
changes without activation. The 50 new cameras go into a grace period.
Milestone Care gives you access to different types of self-help material like knowledge base articles, guides, and
tutorials on our Support website (https://www.milestonesys.com/support/).
For additional benefits, you can purchase more advance Milestone Care subscriptions.
122 | Licensing
Administrator manual | XProtect® VMS 2024 R1
If you have a Milestone Care Plus subscription, you also have access to free updates to your current XProtect
VMS product and can upgrade to more advanced XProtect VMS products at an advantageous price. Milestone
Care Plus also offers additional functionality:
If you have a Milestone Care Premium subscription, you can also contact the Milestone support team directly.
Please remember to include information about your Milestone Care ID when contacting Milestone support.
The expiration date of the more advanced Milestone Care Plus and Milestone Care Premium subscription types
is visible in the License Information window in the Installed Products table. See Installed Products on page 129.
If you decide to buy or renew a Milestone Care subscription after you have installed your system, you must
manually activate your licenses before the correct Milestone Care information appears. See Activate licenses
online on page 126 or Activate licenses offline on page 126.
If you remove a camera from a recording server, you free a device license, but you also lose full access to all
databases (cameras, microphones, inputs, outputs) and the settings of the old camera. To keep access to the
databases of the old camera and reuse its settings when replacing it with a new camera, use the relevant option
below.
If you replace a camera with a similar camera (manufacturer, brand, and model), and if you give the new
camera the same IP address as the old one, you maintain full access to all databases of the old camera. The new
camera continues to use the same databases and settings as the old camera. In this case, you move the network
cable from the old camera to the new one without changing any settings in Management Client.
123 | Licensing
Administrator manual | XProtect® VMS 2024 R1
If you replace a camera with a different camera (manufacturer, brand, and model), you must use the Replace
Hardware wizard (see Replace hardware on page 336) to map all relevant databases of the old camera to the
new one and reuse the settings of the old camera.
If you have enabled automatic license activation (see Enable automatic license activation on page 125), the new
camera is automatically activated.
If automatic license activation is disabled, and if all of the available device changes without activation have been
used (see Device changes without activation (explained) on page 121), you must manually activate your licenses.
For more information about manually activating licenses, see Activate licenses online on page 126 or Activate
licenses offline on page 126.
l You want to add one or more new hardware devices, but do you have unused device licenses, or do you
have to purchase new ones?
l Is the grace period for some of your hardware devices ending soon? Then you must activate them before
they stop sending data to the VMS.
l You know from previous contacts to support that they need information about your SLC and your
Milestone Care ID to be able to help you. But which are they?
l You have many installations of XProtect and use the same SLC for all installations, but where are the
licenses used and what are their statuses?
You can find all the information above and more in the License Information window.
You can open the License Information window in the Site Navigation pane -> Basics node -> License
Information.
To learn more about the various information and features available from the License Information window, see
License Information window on page 128.
You can open the License Information window in the Site Navigation pane -> Basics node -> License
Information.
124 | Licensing
Administrator manual | XProtect® VMS 2024 R1
To learn more about the various information and features available from the License Information window, see
License Information window on page 128.
If you want to know all the benefits of enabling automatic license activation, see Automatic license activation
(explained) on page 120.
1. From the Site Navigation pane -> Basics node -> License Information, select Enable automatic license
activation.
2. Enter the user name and password that you want to use with automatic license activation:
l If you are an existing user, enter your user name and password to log into the software
registration system
l If you are a new user, click the Create new user link to set up a new user account and then follow
the registration procedure. If you have not yet registered your Software License Code (SLC), you
must do so
3. Click OK.
If you later want to change your user name and/or the password for automatic activation, click the Edit
activation credentials link.
How you disable depends on whether you later plan to use automatic license activation again or not.
1. From the Site Navigation pane -> Basics node -> License Information, clear Enable automatic license
activation. The user name and password are still saved on the management server.
1. From the Site Navigation pane -> Basics node -> License Information, click Edit activation credentials.
3. Confirm that you want to delete the user name and password from the management server.
125 | Licensing
Administrator manual | XProtect® VMS 2024 R1
1. From the Site Navigation pane -> Basics node -> License Information, select Activate License
Manually and then Online.
l If you are an existing user, enter your user name and password
l If you are a new user, click the Create new user link to set up a new user account. If you have not
yet registered your Software License Code (SLC), you must do so
3. Click OK.
If you receive an error message during online activation, follow the instructions on the screen to solve the issue
or contact Milestone support.
1. From the Site Navigation pane -> Basics node -> License Information, select Activate License
Manually > Offline > Export License for Activation to export a license request file (.lrq) with information
about your added hardware devices and other elements that require a license.
2. The license request file (.lrq) is automatically given the same name as your SLC. If you have several sites,
remember to rename the files so you can easily identify which file belongs to which site.
3. Copy the license request file to a computer with internet access and log into our website
(https://online.milestonesys.com/) to obtain the activated software license file (.lic).
4. Copy the .lic file you receive to your computer with Management Client. The file has been given the same
name as your license request file.
5. From the Site Navigation pane -> Basics node -> License Information, select Activate License Offline >
Import Activated License, and then select the activated software license file to import it and thereby
activate your licenses.
Even if a license’s grace period has expired, the device configuration and settings you have made are saved and
used when the license is activated.
126 | Licensing
Administrator manual | XProtect® VMS 2024 R1
To enable the unavailable devices again, you activate the licenses manually in your preferred way. For more
information, see Activate licenses offline on page 126 or Activate licenses online on page 126.
l To get additional licenses for your system, contact your XProtect product reseller
If you have bought new licenses to your existing surveillance system version:
l Simply activate your licenses manually to get access to the new licenses. For more information, see
Activate licenses online on page 126 or Activate licenses offline on page 126.
If you have bought new licenses and an upgraded surveillance system version:
l You receive an updated software license file (.lic) with the new licenses and the new version. You must
use the new software license file during the installation of the new version. For more information, see
Upgrade requirements on page 364
You can do this locally on the management server or remotely from Management Client.
4. Next, select the software license file saved for this purpose. When done, the selected software license file
location is added just below the Import License button.
5. Click OK and you are now ready to register SLC. See Register Software License Code on page 145.
127 | Licensing
Administrator manual | XProtect® VMS 2024 R1
2. From the Site Navigation pane -> Basics node -> License Information, select Activate License Offline >
Import Activated License, and then select the software license file to import.
3. When opened, accept that the software license file is different from the one currently in use.
4. You are now ready to register SLC. See Register Software License Code on page 145.
The software license file is only imported and changed but not activated. Remember to
activate your license. For more information, see Activate your licenses on page 124.
When running XProtect Essential+, you can only change the license from the management
server tray icon. It is not possible to change the license from Management Client.
You can open the License Information window in the Site Navigation pane -> Basics node -> License
Information.
If you want to have an overall understanding of how the XProtect licensing system works, see Licenses
(explained) on page 118.
Licensed to
This area of the License Information window, lists the contact details of the license owner that was entered
during the software registration.
If you cannot see the Licensed to area, click the Refresh button in the lower right corner of the window.
Click Edit details to edit the license owner information. Click End-user license agreement to see the end-user
license agreement that you accepted prior to the installation.
Milestone Care
Here you can see information about your current Milestone Care™ subscription. The expiry dates for your
subscriptions are shown in the Installed Products table below.
For more information about Milestone Care, use the links or see Milestone Care™ (explained) on page 122.
128 | Licensing
Administrator manual | XProtect® VMS 2024 R1
Installed Products
Lists the following information about all your installed base licenses for XProtect VMS and XProtect extensions
that share the same software license file:
Lists the number of activated device licenses and other licenses in your software license file and the total
number of available licenses on your system. Here you can easily see if you can still grow your system without
purchasing additional licenses.
For a detailed overview of the status of your licenses activated on other sites, click the License Details - All sites
link. See the License Details - Current site section below for the available information that is shown.
If you have licenses for XProtect extensions, you can see additional details about these under the XProtect
extension-specific nodes in the Site Navigation pane.
The Activated column lists the number of activated device licenses or other licenses on this site.
You can also see the number of used device changes without activation (see Device changes without activation
(explained) on page 121) and how many you have available per year in the Changes without activation column.
If you have licenses that you have not yet activated and that therefore run in a grace period, these are listed in
the In Grace Period column. The expiration date of the first license which expires, appears in red below the
table.
129 | Licensing
Administrator manual | XProtect® VMS 2024 R1
If you forget to activate licenses before the grace period expires, they will stop sending video to the system.
These licenses are shown in the Grace Period Expired column. For more information, see Activate licenses after
grace period on page 126.
If you have used more licenses than you have available, these are listed in the Without License column and
cannot be used in your system. For more information, see Get additional licenses on page 127.
If you have licenses in a grace period, with an expired grace period or without license, a message will remind
you every time you log into your Management Client.
If you have hardware devices that use more than one license, a Click here to open full device license report
link appears underneath the License Details - Current Site table. When you click the link, you can see how many
device licenses, each of these hardware devices require.
Hardware devices without licenses are identified by an exclamation mark in the Management Client. The
exclamation mark is also used for other purposes. Place your mouse over the exclamation mark to see the
purpose.
l A check box for enabling automatic license activation and a link to edit the user credentials for automatic
activation. For more information, see Automatic license activation (explained) on page 120 and Enable
automatic license activation on page 125.
If the automatic activation has failed, a failed message will appear in red. For more information, click the
Details link.
Some licenses, such as XProtect Essential+, are installed with the automatic license activation enabled,
and disabling it is not possible.
l A drop-down list for manually activating licenses online or offline. For more information, see Activate
licenses online on page 126 and Activate licenses offline on page 126.
l In the lower right corner of the window, you can see when your licenses were activated last
(automatically or manually) and when the information in the window were refreshed. The time stamps
are from the server and not from the local computer
130 | Licensing
Administrator manual | XProtect® VMS 2024 R1
When you work with a surveillance system, which is inherently time-sensitive, it is important that you know how
the system handles DST.
Do not change the DST setting when you are in the DST period or if you have recordings
from a DST period.
The change from standard time to DST is not much of an issue since you jump one hour forward.
Example:
The clock jumps forward from 02:00 standard time to 03:00 DST, and the day has 23 hours. In that case, there is
no data between 02:00 and 03:00 in the morning since that hour, for that day, did not exist.
When you switch from DST to standard time in the fall, you jump one hour back.
Example:
The clock jumps backward from 02:00 DST to 01:00 standard time, repeating that hour, and the day has 25
hours. You reach 01:59:59, then immediately revert to 01:00:00. If the system did not react, it would essentially
re-record that hour, so the first instance of 01:30 would be overwritten by the second instance of 01:30.
To solve such an issue from happening, your system archives the current video in the event the system time
changes by more than five minutes. You cannot view the first instance of the 01:00 hour directly in any clients,
but the data is recorded and safe. You can browse this video in XProtect Smart Client by opening the archived
database directly.
For information about how to configure a time server, search the Microsoft website (https://www.microsoft.com/)
for 'time server', 'time service', or similar terms.
2. ClickOptions>AlarmsandEventstab.
3. Make the required settings. For more information, see Alarms and Events tab (options) on page 388.
IPv6 is the latest version of the Internet Protocol (IP). The Internet protocol determines the format and use of IP
addresses. IPv6 coexists with the still much more widely used IP version IPv4. IPv6 was developed in order to
solve the address exhaustion of IPv4. IPv6 addresses are 128-bit long, whereas IPv4 addresses are only 32-bit
long.
It meant that the Internet's address book grew from 4.3 billion unique addresses to 340 undecillion (340 trillion
trillion trillion) addresses. A growth factor of 79 octillion (billion billion billion).
More and more organizations are implementing IPv6 on their networks. For example, all US federal agency
infrastructures are required to be IPv6 compliant. Examples and illustrations in this manual reflect use of IPv4
because this is still the most widely used IP version. IPv6 works equally well with the system.
The following conditions apply when using the system with IPv6:
Servers
Servers can often use IPv4 as well as IPv6. However, if just one server in your system (for example, a
management server or recording server) requires a particular IP version, all other servers in your system must
communicate using the same IP version.
Example: All of the servers in your system except one can use IPv4 as well as IPv6. The exception is a server
which is only capable of using IPv6. This means that all servers must communicate with each other using IPv6.
Devices
You can use devices (cameras, inputs, outputs, microphones, speakers) with a different IP version than that
being used for server communication provided your network equipment and the recording servers also support
the devices' IP version. See also the illustration below.
Clients
If your system uses IPv6, users should connect with the XProtect Smart Client. The XProtect Smart Client
supports IPv6 as well as IPv4.
If one or more servers in your system can only use IPv6, XProtect Smart Client users must use IPv6 for their
communication with those servers. In this context, it is important to remember that XProtect Smart Client
installations technically connect to a management server for initial authentication, and then to the required
recording servers for access to recordings.
However, the XProtect Smart Client users do not have to be on an IPv6 network themselves, provided your
network equipment supports communication between different IP versions, and they have installed the IPv6
protocol on their computers. See also illustration. To install IPv6 on a client computer, open a command prompt,
enter Ipv6 install, and press ENTER.
Example illustration
Example: Since one server in the system can only use IPv6, all communication with that server must use IPv6.
However, that server also determines the IP version for communication between all other servers in the system.
Example: 2001:0B80:0000:0000:0000:0F80:3FA8:18AB
You may shorten addresses by eliminating leading zeros in a block. Also, note that some of the four-digit blocks
may consist of zeros only. If any number of such 0000 blocks are consecutive, you may shorten addresses by
replacing the 0000 blocks with two colons as long as there is only one such double colon in the address.
Example:
2001:0B80:0000:0000:0000:0F80:3FA8:18AB can be shortened to
For more information about IPv6, see, for example, the IANA website (https://www.iana.org/numbers/). IANA, the
Internet Assigned Numbers Authority, is the organization responsible for the global coordination of IP
addressing.
Virtual servers
You can run all system components on virtualized Windows® servers, such as VMware® and Microsoft® Hyper-V®.
Virtualization is often preferred to better utilize hardware resources. Normally, virtual servers running on the
hardware host server do not load the virtual server to a great extent, and often not at the same time. However,
recording servers record all cameras and video streams. This puts high load on CPU, memory, network, and
storage system. So, when run on a virtual server, the normal gain of virtualization disappears to a large extent,
since - in many cases - it uses all available resources.
If run in a virtual environment, it is important that the hardware host has the same amount of physical memory
as allocated for the virtual servers and that the virtual server running the recording server is allocated enough
CPU and memory - which it is not by default. Typically, the recording server needs 2-4 GB depending on
configuration. Another bottleneck is network adapter allocation and hard disk performance. Consider allocating
a physical network adapter on the host server of the virtual server running the recording server. This makes it
easier to ensure that the network adapter is not overloaded with traffic to other virtual servers. If the network
adapter is used for several virtual servers, the network traffic might result in the recording server not retrieving
and recording the configured number of images.
l Vibration (make sure the surveillance system server and its surroundings are stable)
l Power outages (make sure you use an Uninterruptible Power Supply (UPS))
l Static electricity (make sure you ground yourself if you are going to handle a hard disk drive)
Windows Task Manager typically displays a warning if you attempt to end a process. Unless you are absolutely
sure that ending the process is not going to affect the surveillance system, click No when the warning message
asks you if you really want to terminate the process.
The best way of protecting your recording servers from being shut down abruptly is to equip each of your
recording servers with a UPS (Uninterruptible Power Supply).
The UPS works as a battery-driven secondary power source, providing the necessary power for saving open files
and safely powering down your system in the event of power irregularities. UPSs vary in sophistication, but many
UPSs include software for automatically saving open files, for alerting system administrators, etc.
Selecting the correct type of UPS for your organization's environment is an individual process. When you assess
your needs, however, bear in mind the amount of runtime you require the UPS to be able to provide if the power
fails. Saving open files and shutting down an operating system properly may take several minutes.
With the transaction log, you can roll back and undo changes to the SQL Server database through Microsoft®
SQL Server Management Studio. By default, the SQL Server database stores its transaction log indefinitely which
over time means that the transaction log has more and more entries. The transaction log is by default located on
the system drive, and if the transaction log keeps growing, it may prevent Windows from running properly.
To avoid such a scenario, flushing the transaction log regularly is a good idea. Flushing it does not make the
transaction log file smaller, but cleans its content and thereby prevents it from growing out of control. Your VMS
system does not flush transaction logs. In SQL Server, there are ways of flushing the transaction log. Visit the
Microsoft support page https://docs.microsoft.com/en-us/sql/relational-databases/logs/the-transaction-log-sql-
server?view=sql-server-2017 and search for Transaction log truncation.
Operating system
Make sure that all servers have a clean installation of a Microsoft Windows operating system, and that it is
updated with all the latest Windows updates.
For information about the system requirements for the various VMS applications and system components, go to
the Milestone website (https://www.milestonesys.com/systemrequirements/).
Check that all servers have Microsoft .NET Framework 4.8 or higher installed.
Network
Assign static IP addresses or make DHCP reservations to all system components and cameras. To make sure
that sufficient bandwidth is available on your network, you must understand how and when the system
consumes bandwidth. The main load on your network consists of three elements:
The recording server retrieves video streams from the cameras, which results in a constant load on the network.
Clients that display video consume network bandwidth. If there are no changes in the content of the client views,
the load is constant. Changes in view content, video search, or playback, make the load dynamic.
Archiving of recorded video is an optional feature that lets the system move recordings to a network storage if
there is not enough space in the internal storage system of the computer. This is a scheduled job that you have
to define. Typically, you archive to a network drive which makes it a scheduled dynamic load on the network.
Your network must have bandwidth headroom to cope with these peaks in the traffic. This enhances the system
responsiveness and general user experience.
For easy user and group management, Milestone recommends that you have Microsoft Active Directory®
installed and configured before you install your XProtect system. If you add the management server to the Active
Directory after installing your system, you must reinstall the management server, and replace users with new
Windows users defined in the Active Directory.
Basic users are not supported in Milestone Federated Architecture systems, so if you plan to use Milestone
Federated Architecture, you must add users as Windows users through the Active Directory service. If you do not
install Active Directory, follow the steps in Installation for workgroups on page 180 when you install.
Installation method
As part of the installation wizard, you must decide which installation method to use. You should base your
selection on your organization's needs, but it is very likely that you already decided on the method when you
purchased the system.
Options Description
Installs all server and client components, as well as SQL Server on the current computer.
When the installation completes, you get the possibility to configure your system through a
Single wizard. If you agree to continue, the recording server scans your network for hardware, and
Computer you can select which hardware devices to add to your system. The max number of hardware
devices that can be added in the configuration wizard depends on your base license. Also,
cameras are preconfigured in views, and a default Operator role is created. After installation,
XProtect Smart Client opens, and you are ready to use the system.
The management server is always selected in the system component list and is always
installed, but you can select freely what to install on the current computer among the other
Custom server and client components.
By default, the recording server is not selected in the component list, but you can change this.
You can install the not selected components on other computers afterwards.
1. Active Directory
2. Devices
4. Event server
5. Log server
7. Management Client
8. Management server
9. Recording server
The installation wizard installs Microsoft SQL Server Express 2022 unless SQL Server is already installed on the
computer. When you install XProtect VMS as an upgrade, the wizard keeps the previous SQL Server installation.
To check if your system meets the requirements for SQL Server editions, see
https://www.milestonesys.com/systemrequirements/.
For very large systems or systems with many transactions to and from the SQL Server databases, Milestone
recommends that you use the Microsoft® SQL Server® Standard or Microsoft® SQL Server® Enterprise edition
of SQL Server on a dedicated computer on the network and on a dedicated hard disk drive that is not used for
other purposes. Installing SQL Server on its own drive improves the entire system performance.
You can select either a predefined account, or a user account. Base your decision on the environment that you
want to install your system in:
Domain environment
In a domain environment:
l Milestone recommends that you use the built-in Network Service account
It is easier to use even if you need to expand the system to multiple computers.
l You can also use domain user accounts, but they are potentially more difficult to configure
Workgroup environment
In a workgroup environment, Milestone recommends that you use a local user account that has all necessary
permissions. This is often the administrator account.
If you have installed your system components on multiple computers, the selected user
account must be configured on all computers in your installations with identical user
name, password, and access permissions.
Use Kerberos authentication as an alternative to the older Microsoft NT LAN (NTLM) authentication protocol.
Kerberos authentication requires mutual authentication, where the client authenticates to the service and the
service authenticates to the client. This way you can authenticate more securely from XProtect clients to
XProtect servers without exposing your password.
To make mutual authentication possible in your XProtect VMS you must register Service Principal Names (SPN)
in the active directory. An SPN is an alias that uniquely identifies an entity such as a XProtect server service.
Every service that uses mutual authentication must have an SPN registered so that clients can identify the
service on the network. Without correctly registered SPNs, mutual authentication is not possible.
The table below lists the different Milestone services with corresponding port numbers you need to register:
The number of services you need to register in the active directory depends on your
current installation. Data Collector is installed automatically when installing the
Management Server, Recording Server, Event Server or Failover Server service.
You must register two SPNs for the user running the service: one with the host name and one with the fully
qualified domain name.
If you are running the service under a network user service account, you must register the two SPNs for each
computer running this service.
The following is an example of SPNs for the Recording Server service running on a computer with the following
details:
Hostname: Record-Server1
Domain: Surveillance.com
SPNs to register:
VideoOS/Record-Server1:7609
VideoOS/Record-Server1.Surveillance.com:7609
When you need to perform virus scanning, do not scan Recording Server folders that contain recording
databases (by default C:\mediadatabase\, as well as all subfolders). Also, avoid performing virus scanning on
archive storage directories.
l C:\ProgramData\Milestone\IDP\Logs
l C:\ProgramData\Milestone\KeyManagement\Logs
l C:\ProgramData\Milestone\MIPSDK
or
Product Processes
XProtect
VideoOS.MobileServer.Service.exe
Mobile
Your organization may have strict guidelines regarding virus scanning, but it is important that you exclude the
above folders and files from virus scanning.
How can XProtect VMS be configured to run in FIPS 140-2 compliant mode?
In order to run XProtect VMS in a FIPS 140-2 mode of operation you must:
l Run Windows operating system in FIPS 140-2 approved mode of operation. See the Microsoft site for
information on enabling FIPS.
l Ensure standalone third-party integrations can run on a FIPS enabled Windows operating system
l Connect to devices in a way that ensures a FIPS 140-2 compliant mode of operation
l Ensure that data in the media database is encrypted with FIPS 140-2 compliant ciphers
This is done by running the media database upgrade tool. For detailed information on how to configure
your XProtect VMS to run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the
hardening guide.
If you are upgrading, before you install, disable the Windows FIPS security policy on all of the computers that are
part of the VMS, including the computer that hosts SQL Server.
The XProtect VMS installer checks the FIPS security policy and will prevent the installation from starting if FIPS is
enabled.
But, if you are upgrading from XProtect VMS version 2020 R3 and after, you do not need to disable FIPS.
After you have installed the XProtect VMS components on all of the computers and prepared the system for FIPS,
you can enable the FIPS security policy on Windows on all of the computers in your VMS.
For detailed information on how to configure your XProtect VMS to run in FIPS 140-2 compliant mode, see the
FIPS 140-2 compliance section in the hardening guide.
You can install a free version of XProtect Essential+. This version provides you with limited capabilities of the
XProtect for a limited number of cameras. You must have internet connection to install XProtect Essential+.
The Software License Code (SLC) is printed on your order confirmation and the software license file is named
after your SLC.
Milestone recommends that you register your SLC on our website (https://online.milestonesys.com/) before
installation. Your reseller may have done that for you.
From the 2018 R1 release, the device drivers are split into two device packs: the regular device pack with newer
drivers and a legacy device pack with older drivers.
The regular device pack is installed automatically when you install the recording server. Later, you can update
the drivers by downloading and installing a newer version of the device pack. Milestone releases new versions of
device drivers regularly and makes them available on the download page
(https://www.milestonesys.com/downloads/) on our website as device packs. When you update a device pack,
you can install the latest version on top of any version you may have installed.
The legacy device pack can only be installed if the system has a regular device pack installed. The drivers from
the legacy device pack are automatically installed if a previous version is already installed on your system. It is
available for manual download and installation on the software download page
(https://www.milestonesys.com/downloads/).
Stop the Recording Server service before you install, otherwise you need to restart the computer.
To ensure best performance, always use the latest version of device drivers.
In XProtect VMS, secure communication is obtained by using TLS/SSL with asymmetric encryption (RSA).
TLS/SSL uses a pair of keys—one private, one public—to authenticate, secure, and manage secure connections.
A certificate authority (CA) is anyone who can issue root certificates. This can be an internet service that issues
root certificates, or anyone who manually generates and distributes a certificate. A CA can issue certificates to
web services, that is to any software using https communication. This certificate contains two keys, a private key
and a public key. The public key is installed on the clients of a web service (service clients) by installing a public
certificate. The private key is used for signing server certificates that must be installed on the server. Whenever
a service client calls the web service, the web service sends the server certificate, including the public key, to the
client. The service client can validate the server certificate using the already installed public CA certificate. The
client and the server can now use the public and private server certificates to exchange a secret key and thereby
establish a secure TLS/SSL connection.
For manually distributed certificates, certificates must be installed before the client can make such a verification.
Certificates have an expiry date. XProtect VMS will not warn you when a certificate is
about to expire. If a certificate expires:
• The clients will no longer trust the recording server with the expired certificate and thus
cannot communicate with it
• The recording servers will no longer trust the management server with the expired
certificate and thus cannot communicate with it
• The mobile devices will no longer trust the mobile server with the expired certificate and
thus cannot communicate with it
To renew the certificates, follow the steps in this guide as you did when you created
certificates.
For more information, see the certificates guide about how to secure your XProtect VMS installations.
Installation
This version is installed on a single computer, using the Single computer installation option. The Single
computer option installs all server and client components on the current computer.
Milestone recommends that you read the following section carefully before you install:
Before you start installation on page 137.
For FIPS installations, you cannot upgrade XProtect VMS when FIPS is enabled on the
Windows operating system. Before you install, disable the Windows FIPS security policy on
all of the computers that are part of the VMS, including the computer that hosts SQL
Server. But, if you are upgrading from XProtect VMS version 2020 R3 and after, you do not
need to disable FIPS. For detailed information on how to configure your XProtect VMS to
run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening
guide.
After initial installation, you can continue with the configuration wizard. Depending on your hardware and
configuration, the recording server scans your network for hardware. You can then select which hardware
devices to add to your system. Cameras are preconfigured in views, and you have the option to enable other
devices such as microphones and speakers. You also have the option of adding users to the system with either
an operator role or an administrator role. After installation, XProtect Smart Client opens, and you are ready to
use the system.
Otherwise, if you close the installation wizard, XProtect Management Client opens, where you can make manual
configurations such as add hardware devices and users to the system.
If you upgrade from a previous version of the product, the system does not scan for
hardware or create new views and user profiles.
148 | Installation
Administrator manual | XProtect® VMS 2024 R1
1. Download the software from the internet (https://www.milestonesys.com/downloads/) and run the
Milestone XProtect VMS Products 2024 R1 System Installer.exe file.
2. The installation files unpack. Depending on the security settings, one or more Windows® security
warnings appear. Accept these and the unpacking continues.
1. Select the Language to use during the installation (this is not the language that your system uses
once installed; this is selected later). Click Continue.
2. Read the Milestone End-user License Agreement. Select the I accept the terms in the license
agreement check box and click Continue.
3. On the Privacy settings page, select whether you want to share usage data, and click Continue.
You must not enable data collection if you want the system to have an EU
GDPR-compliant installation. For more information about data protection
and the usage data collection, see the GDPR privacy guide.
You can always change your privacy setting later. See also System settings
(Options dialog box).
The free license file is downloaded and appears in the Enter or browse to the location of the
license file field. Click Continue.
A list of components to install appears (you cannot edit this list). Click Continue.
5. On the Assign a system configuration password page, enter a password that protects your system
configuration. You will need this password in case of system recovery or when expanding your system,
for example when adding clusters.
It is important that you save this password and keep it safe. If you lose this
password, you may compromise your ability to recover your system configuration.
If you do not want your system configuration to be password protected, select I choose not to use a
system configuration password and understand that the system configuration will not be
encrypted.
Click Continue.
149 | Installation
Administrator manual | XProtect® VMS 2024 R1
6. On the Assign a mobile server data protection password page, enter a password to encrypt your
investigations. As a system administrator, you will need to enter this password to access the mobile
server data in case of system recovery or when expanding your system with additional mobile servers.
You must save this password and keep it safe. Failure to do so may compromise
your ability to recover mobile server data.
If you do not want your investigations to be password-protected, select I choose not to use a mobile
server data protection password, and I understand that investigations will not be encrypted.
Click Continue.
7. On the Specify recording server settings page, specify the different recording server settings:
1. In the Recording server name field, enter the name of the recording server. The default is the
name of the computer.
2. The Management server address field shows the address and port number of the management
server: localhost:80.
3. In the Select your media database location field, select the location where you want to save your
video recording. Milestone recommends that you save your video recordings in a separate
location from where you install the software and not on the system drive. The default location is
the drive with the most space available.
4. In Retention time for video recordings field, define for how long you want to save the recordings.
You can enter from between 1 and 365,000 days, where 7 days is the default retention time.
5. Click Continue.
150 | Installation
Administrator manual | XProtect® VMS 2024 R1
8. On the Select encryption page, you can secure the communication flows:
l Between the recording servers, data collectors, and the management server
To enable encryption for internal communication flows, in the Server certificate section, select a
certificate.
To enable encryption between recording servers and client components that retrieve data
streams from the recording server, in the Streaming media certificate section, select a
certificate.
To enable encryption between client components that retrieve data streams from the mobile
server, in the Mobile streaming media certificate section, select a certificate.
l Between the event server and components that communicate with the event server
To enable encryption between the event server and components that communicate with the event
server, including the LPR Server, in the Event server and extensions section, select a certificate.
You can use the same certificate file for all system components or use different certificate files
depending on the system components.
For more information about preparing your system for secure communication, see:
You can also enable encryption after installation from the Server Configurator in the Management Server
Manager tray icon in the notification area.
151 | Installation
Administrator manual | XProtect® VMS 2024 R1
9. On the Select file location and product language page, do the following:
1. In the File location field, select the location where you want to install the software.
2. In Product language, select the language in which to install your XProtect product.
3. Click Install.
The software now installs. If not already installed on the computer, Microsoft® SQL Server® Express and
Microsoft IIS are automatically installed during the installation.
10. You may be prompted to restart the computer. After restarting your computer, depending on the security
settings, one or more Windows security warnings may appear. Accept these and the installation
completes.
11. When the installation completes, a list shows the components that are installed on the computer.
If you click Close now, you bypass the configuration wizard and XProtect
Management Client opens. You can configure the system, for example add
hardware and users to the system, in Management Client.
12. On the Enter user names and passwords for hardware page, enter the user names and passwords for
hardware that you have changed from the manufacturer defaults.
The installer scans the network for this hardware as well as hardware with manufacturer default
credentials.
Click Continue and wait while the system scans for hardware.
13. On the Select the hardware to add to the system page, select the hardware that you want to add to the
system. Click Continue and wait while the system adds the hardware.
152 | Installation
Administrator manual | XProtect® VMS 2024 R1
14. On the Configure the devices page, you can give the hardware descriptive names by clicking the edit
icon next to the hardware name. This name is then prefixed to the hardware devices.
Expand the hardware node to enable or disable the hardware devices, such as cameras, speakers, and
microphones.
Cameras are enabled by default, and speakers and microphones are disabled by
default.
Click Continue and wait while the system configures the hardware.
15. On the Add users page, you can add users to the system as Windows users or basic users. The users can
have either the Administrators role or the Operators role.
16. When the installation and initial configuration are done, the Configuration is complete page appears,
where you see:
l Addresses to the XProtect Web Client and XProtect Mobile client, which you can share with your
users
When you click Close, XProtect Smart Client opens and is ready to use.
Milestone recommends that you read the following section carefully before you install:
Before you start installation on page 137.
For FIPS installations, you cannot upgrade XProtect VMS when FIPS is enabled on the
Windows operating system. Before you install, disable the Windows FIPS security policy on
all of the computers that are part of the VMS, including the computer that hosts SQL
Server. But, if you are upgrading from XProtect VMS version 2020 R3 and after, you do not
need to disable FIPS. For detailed information on how to configure your XProtect VMS to
run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening
guide.
153 | Installation
Administrator manual | XProtect® VMS 2024 R1
After initial installation, you can continue with the configuration wizard. Depending on your hardware and
configuration, the recording server scans your network for hardware. You can then select which hardware
devices to add to your system. Cameras are preconfigured in views, and you have the option to enable other
devices such as microphones and speakers. You also have the option of adding users to the system with either
an operator role or an administrator role. After installation, XProtect Smart Client opens, and you are ready to
use the system.
Otherwise, if you close the installation wizard, XProtect Management Client opens, where you can make manual
configurations such as add hardware devices and users to the system.
If you upgrade from a previous version of the product, the system does not scan for
hardware or create new views and user profiles.
1. Download the software from the internet (https://www.milestonesys.com/downloads/) and run the
Milestone XProtect VMS Products 2024 R1 System Installer.exe file.
2. The installation files unpack. Depending on the security settings, one or more Windows® security
warnings appear. Accept these and the unpacking continues.
1. Select the Language to use during the installation (this is not the language that your system uses
once installed; this is selected later). Click Continue.
2. Read the Milestone End-user License Agreement. Select the I accept the terms in the license
agreement check box and click Continue.
3. On the Privacy settings page, select whether you want to share usage data, and click Continue.
You must not enable data collection if you want the system to have an EU
GDPR-compliant installation. For more information about data protection
and the usage data collection, see the GDPR privacy guide.
You can always change your privacy setting later. See also System settings
(Options dialog box).
4. In the Enter or browse to the location of the license file, enter your license file from your
XProtect provider. Alternatively, browse to the file location or click the XProtect Essential+ link to
download a free license file. For limitations to the free XProtect Essential+ product, see the
Product comparison on page 116. The system verifies your license file before you can continue.
Click Continue.
154 | Installation
Administrator manual | XProtect® VMS 2024 R1
A list of components to install appears (you cannot edit this list). Click Continue.
5. On the Assign a system configuration password page, enter a password that protects your system
configuration. You will need this password in case of system recovery or when expanding your system,
for example when adding clusters.
It is important that you save this password and keep it safe. If you lose this
password, you may compromise your ability to recover your system configuration.
If you do not want your system configuration to be password protected, select I choose not to use a
system configuration password and understand that the system configuration will not be
encrypted.
Click Continue.
6. On the Assign a mobile server data protection password page, enter a password to encrypt your
investigations. As a system administrator, you will need to enter this password to access the mobile
server data in case of system recovery or when expanding your system with additional mobile servers.
You must save this password and keep it safe. Failure to do so may compromise
your ability to recover mobile server data.
If you do not want your investigations to be password-protected, select I choose not to use a mobile
server data protection password, and I understand that investigations will not be encrypted.
Click Continue.
7. On the Specify recording server settings page, specify the different recording server settings:
1. In the Recording server name field, enter the name of the recording server. The default is the
name of the computer.
2. The Management server address field shows the address and port number of the management
server: localhost:80.
3. In the Select your media database location field, select the location where you want to save your
video recording. Milestone recommends that you save your video recordings in a separate
location from where you install the software and not on the system drive. The default location is
the drive with the most space available.
4. In Retention time for video recordings field, define for how long you want to save the recordings.
You can enter from between 1 and 365,000 days, where 7 days is the default retention time.
5. Click Continue.
155 | Installation
Administrator manual | XProtect® VMS 2024 R1
8. On the Select encryption page, you can secure the communication flows:
l Between the recording servers, data collectors, and the management server
To enable encryption for internal communication flows, in the Server certificate section, select a
certificate.
To enable encryption between recording servers and client components that retrieve data
streams from the recording server, in the Streaming media certificate section, select a
certificate.
To enable encryption between client components that retrieve data streams from the mobile
server, in the Mobile streaming media certificate section, select a certificate.
l Between the event server and components that communicate with the event server
To enable encryption between the event server and components that communicate with the event
server, including the LPR Server, in the Event server and extensions section, select a certificate.
You can use the same certificate file for all system components or use different certificate files
depending on the system components.
For more information about preparing your system for secure communication, see:
You can also enable encryption after installation from the Server Configurator in the Management Server
Manager tray icon in the notification area.
156 | Installation
Administrator manual | XProtect® VMS 2024 R1
9. On the Select file location and product language page, do the following:
1. In the File location field, select the location where you want to install the software.
2. In Product language, select the language in which to install your XProtect product.
3. Click Install.
The software now installs. If not already installed on the computer, Microsoft® SQL Server® Express and
Microsoft IIS are automatically installed during the installation.
10. You may be prompted to restart the computer. After restarting your computer, depending on the security
settings, one or more Windows security warnings may appear. Accept these and the installation
completes.
11. When the installation completes, a list shows the components that are installed on the computer.
If you click Close now, you bypass the configuration wizard and XProtect
Management Client opens. You can configure the system, for example add
hardware and users to the system, in Management Client.
12. On the Enter user names and passwords for hardware page, enter the user names and passwords for
hardware that you have changed from the manufacturer defaults.
The installer scans the network for this hardware as well as hardware with manufacturer default
credentials.
Click Continue and wait while the system scans for hardware.
13. On the Select the hardware to add to the system page, select the hardware that you want to add to the
system. Click Continue and wait while the system adds the hardware.
157 | Installation
Administrator manual | XProtect® VMS 2024 R1
14. On the Configure the devices page, you can give the hardware descriptive names by clicking the edit
icon next to the hardware name. This name is then prefixed to the hardware devices.
Expand the hardware node to enable or disable the hardware devices, such as cameras, speakers, and
microphones.
Cameras are enabled by default, and speakers and microphones are disabled by
default.
Click Continue and wait while the system configures the hardware.
15. On the Add users page, you can add users to the system as Windows users or basic users. The users can
have either the Administrators role or the Operators role.
16. When the installation and initial configuration are done, the Configuration is complete page appears,
where you see:
l Addresses to the XProtect Web Client and XProtect Mobile client, which you can share with your
users
When you click Close, XProtect Smart Client opens and is ready to use.
Milestone recommends that you read the following section carefully before you install:
Before you start installation on page 137.
158 | Installation
Administrator manual | XProtect® VMS 2024 R1
For FIPS installations, you cannot upgrade XProtect VMS when FIPS is enabled on the
Windows operating system. Before you install, disable the Windows FIPS security policy on
all of the computers that are part of the VMS, including the computer that hosts SQL
Server. But, if you are upgrading from XProtect VMS version 2020 R3 and after, you do not
need to disable FIPS. For detailed information on how to configure your XProtect VMS to
run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening
guide.
1. Download the software from the internet (https://www.milestonesys.com/downloads/) and run the
Milestone XProtect VMS Products 2024 R1 System Installer.exe file.
2. The installation files unpack. Depending on the security settings, one or more Windows® security
warnings appear. Accept these and the unpacking continues.
1. Select the Language to use during the installation (this is not the language that your system uses
once installed; this is selected later). Click Continue.
2. Read the Milestone End-user License Agreement. Select the I accept the terms in the license
agreement check box and click Continue.
3. On the Privacy settings page, select whether you want to share usage data, and click Continue.
You must not enable data collection if you want the system to have an EU
GDPR-compliant installation. For more information about data protection
and the usage data collection, see the GDPR privacy guide.
You can always change your privacy setting later. See also System settings
(Options dialog box).
4. In the Enter or browse to the location of the license file, enter your license file from your
XProtect provider. Alternatively, browse to the file location or click the XProtect Essential+ link to
download a free license file. For limitations to the free XProtect Essential+ product, see the
Product comparison on page 116. The system verifies your license file before you can continue.
Click Continue.
159 | Installation
Administrator manual | XProtect® VMS 2024 R1
4. Select Custom. A list of components to be installed appears. Apart from the management server, all
components in the list are optional. The recording server and the mobile server are by default not
selected. Select the system components you want to install and click Continue.
For your system to function properly, you must install at least one instance of
XProtect API Gateway.
In the steps below, all system components are installed. For a more distributed
system, install fewer system components on this computer and the remaining
system components on other computers. If you cannot recognize an installation
step, it is likely because you have not selected to install the system component that
this page belongs to. In that case, continue to the next step. See also Installing
through Download Manager (explained) on page 164, Install a recording server
through Download Manager on page 166, and Installing silently through a
command line shell (explained) on page 171.
5. The Select a website on the IIS to use with your XProtect system page is shown only if you have more
than one IIS website available on the computer. You must select which website you will use with your
XProtect system. Select a website with HTTPS binding. Click Continue.
6. On the Select Microsoft SQL Server page, select the SQL Server that you want to use. See also SQL
Server options during custom installation on page 164. Click Continue.
If you do not have SQL Server on your local computer, you can install Microsoft
SQL Server Express, but in a larger distributed system you would typically use
dedicated SQL Server on your network.
7. On the Select database (only shown if you have selected existing SQL Server), select or create a SQL
Server database for storing your system configuration. If you choose an existing SQL Server database,
decide whether to Keep or Overwrite existing data. If you are upgrading, select to keep existing data so
you do not lose your system configuration. See also SQL Server options during custom installation on
page 164. Click Continue.
8. On the Database settings page, select either Let the installer create or recreate a database or Use a
pre-created database.
9. To have your databases created or recreated automatically, select Let the installer create or recreate a
database, and click Continue.
160 | Installation
Administrator manual | XProtect® VMS 2024 R1
10. To use databases that you set up for the purpose or databases that have already been created, select
Use a pre-created database. You will then see the Advanced database setup page.
11. On the Advanced database setup page, enter the server and the database name for the XProtect
components.
12. Select either Windows Authentication, do not trust server certificate (recommended) or Windows
Authentication, trust server certificate or select Azure Active Directory Integrated, do not trust
server certificate (recommended).
The (do not trust server certificate) option is recommended for Windows
Authentication and mandatory for Azure Active Directory Integrated. This is to
ensure that server certificates are validated and verified before installation. More
information about invalid server certificates is available in the installation log file.
With the Windows Authentication, trust server certificate option, you skip the
validation of server certificates.
13. Click the icon to verify the connection. By clicking the icon, you also validate server certificates.
15. On the Assign a system configuration password page, enter a password that protects your system
configuration. You will need this password in case of system recovery or when expanding your system,
for example when adding clusters.
It is important that you save this password and keep it safe. If you lose this
password, you may compromise your ability to recover your system configuration.
If you do not want your system configuration to be password protected, select I choose not to use a
system configuration password and understand that the system configuration will not be
encrypted.
Click Continue.
161 | Installation
Administrator manual | XProtect® VMS 2024 R1
16. On the Assign a mobile server data protection password page, enter a password to encrypt your
investigations. As a system administrator, you will need to enter this password to access the mobile
server data in case of system recovery or when expanding your system with additional mobile servers.
You must save this password and keep it safe. Failure to do so may compromise
your ability to recover mobile server data.
If you do not want your investigations to be password-protected, select I choose not to use a mobile
server data protection password, and I understand that investigations will not be encrypted.
Click Continue.
17. On the Select service account for recording server, select either This predefined account or This
account to select the service account for the recording server.
The user name for the account must be a single word. It must not have a space.
Click Continue.
18. On the Specify recording server settings page, specify the different recording server settings:
1. In the Recording server name field, enter the name of the recording server. The default is the
name of the computer.
2. The Management server address field shows the address and port number of the management
server: localhost:80.
3. In the Select your media database location field, select the location where you want to save your
video recording. Milestone recommends that you save your video recordings in a separate
location from where you install the software and not on the system drive. The default location is
the drive with the most space available.
4. In Retention time for video recordings field, define for how long you want to save the recordings.
You can enter from between 1 and 365,000 days, where 7 days is the default retention time.
5. Click Continue.
162 | Installation
Administrator manual | XProtect® VMS 2024 R1
19. On the Select encryption page, you can secure the communication flows:
l Between the recording servers, data collectors, and the management server
To enable encryption for internal communication flows, in the Server certificate section, select a
certificate.
To enable encryption between recording servers and client components that retrieve data
streams from the recording server, in the Streaming media certificate section, select a
certificate.
To enable encryption between client components that retrieve data streams from the mobile
server, in the Mobile streaming media certificate section, select a certificate.
l Between the event server and components that communicate with the event server
To enable encryption between the event server and components that communicate with the event
server, including the LPR Server, in the Event server and extensions section, select a certificate.
You can use the same certificate file for all system components or use different certificate files
depending on the system components.
For more information about preparing your system for secure communication, see:
You can also enable encryption after installation from the Server Configurator in the Management Server
Manager tray icon in the notification area.
20. On the Select file location and product language page, select the File location for the program files.
If any Milestone XProtect VMS product is already installed on the computer, this
field is disabled. The field displays the location where the component will be
installed.
163 | Installation
Administrator manual | XProtect® VMS 2024 R1
21. In the Product language field, select the language in which to install your XProtect product. Click Install.
The software now installs. When the installation completes, you see a list of successfully installed system
components. Click Close.
22. You may be prompted to restart the computer. After restarting your computer, depending on the security
settings, one or more Windows security warnings may appear. Accept these and the installation
completes.
23. Configure your system in Management Client. See Initial configuration tasks list on page 188.
24. Depending on your selections, install the remaining system components on other computers through the
Download Manager. See Installing through Download Manager (explained) on page 164.
Decide which SQL Server and database to use with the below options.
l Install Microsoft® SQL Server® Express on this computer: This option is shown only if you do not have
SQL Server installed on the computer
l Use the SQL Server on this computer: This option is shown only if SQL Server is already installed on the
computer
l Select a SQL Server on your network through search: Enables you to search for all SQL Server
installations that are discoverable on your network subnet
l Select a SQL Server on your network: Enables you to enter the address (host name or IP address) of
SQL Server that you might not be able to find through search
l Use existing database: Mainly for upgrades of existing installations. Milestone recommends that you
reuse the existing SQL Server database and keep the existing data in it, so you do not lose your system
configuration. You can also choose to overwrite the data in the SQL Server database
164 | Installation
Administrator manual | XProtect® VMS 2024 R1
1. From the computer where Management Server is installed, go to the Management Server's download
web page. In Windows' Start menu, select Milestone > Administrative Installation Page and write down
or copy the internet address for later use when installing the system components on the other
computers. The address is typically http://[management server address]/installation/Admin/default-en-
US.htm.
2. Log in to each of the other computers to install one or more of the other system components:
l Recording Server (For more information, see Install a recording server through Download
Manager on page 166 or Install a recording server silently on page 173)
l Management Client (For more information, see Install a Management Client through Download
Manager on page 165)
l Smart Client
l Event Server Remember to restart the API Gateway after installation. If you rename the computer
at a later date, you must also restart the API Gateway.
l Log Server (For more information, see Install a log server silently on page 175)
l Mobile Server (For more information see the manual for XProtect Mobile server)
3. Open an internet browser, enter the address of the Management Server's download web page into the
address field, and download the relevant installer.
See Install your system - Custom option on page 158 if in doubt about the selections and settings in the different
installation steps.
1. From the computer where Management Server is installed, go to the Management Server's download
web page. In Windows' Start menu, select Milestone > Administrative Installation Page and write down
or copy the internet address for later use when installing the system components on the other
computers. The address is typically http://[management server address]/installation/Admin/default-en-
US.htm.
165 | Installation
Administrator manual | XProtect® VMS 2024 R1
2. Log into the computer where you want to install the system component.
1. Open an internet browser and enter the address of the Management Server's download web page into
the address field and press Enter.
3. Click All Languages for the Management Client installer. Run the downloaded file.
8. The installation is complete. A list of successfully installed components is displayed. Click Close.
11. Specify the host name or the IP address of your management server in the Computer field.
12. Select authentication, enter your user name and password. Click Connect. The Management Client
launches.
To read in details about the features in the Management Client and what you can accomplish with your
system, click Help in the tools menu.
The recording server is already installed if you made a Single Computer installation, but
you can use the same instructions to add more recording servers if you need more
capacity.
If you need to install a failover recording server, see Install a failover recording server
through Download Manager on page 169.
1. From the computer where Management Server is installed, go to the Management Server's download
web page. In Windows' Start menu, select Milestone > Administrative Installation Page and write down
or copy the internet address for later use when installing the system components on the other
computers. The address is typically http://[management server address]/installation/Admin/default-en-
US.htm.
2. Log into the computer where you want to install the system component.
166 | Installation
Administrator manual | XProtect® VMS 2024 R1
3. Open an internet browser and enter the address of the Management Server's download web page into
the address field and press Enter.
4. Download the recording server installer by selecting All Languages below the Recording Server
Installer. Save the installer or run it directly from the web page.
5. Select the Language you want to use during the installation. Click Continue.
7. On the Specify recording server settings page, specify the different recording server settings:
1. In the Recording server name field, enter the name of the recording server. The default is the
name of the computer.
2. The Management server address field shows the address and port number of the management
server: localhost:80.
3. In the Select your media database location field, select the location where you want to save your
video recording. Milestone recommends that you save your video recordings in a separate
location from where you install the software and not on the system drive. The default location is
the drive with the most space available.
4. In Retention time for video recordings field, define for how long you want to save the recordings.
You can enter from between 1 and 365,000 days, where 7 days is the default retention time.
5. Click Continue.
8. The Recording servers IP addresses page is shown only if you selected Custom. Specify the number of
recording servers that you want to install on this computer. Click Continue.
9. On the Select service account for recording server, select either This predefined account or This
account to select the service account for the recording server.
The user name for the account must be a single word. It must not have a space.
Click Continue.
167 | Installation
Administrator manual | XProtect® VMS 2024 R1
10. On the Select encryption page, you can secure the communication flows:
l Between the recording servers, data collectors, and the management server
To enable encryption for internal communication flows, in the Server certificate section, select a
certificate.
To enable encryption between recording servers and client components that retrieve data
streams from the recording server, in the Streaming media certificate section, select a
certificate.
To enable encryption between client components that retrieve data streams from the mobile
server, in the Mobile streaming media certificate section, select a certificate.
l Between the event server and components that communicate with the event server
To enable encryption between the event server and components that communicate with the event
server, including the LPR Server, in the Event server and extensions section, select a certificate.
You can use the same certificate file for all system components or use different certificate files
depending on the system components.
For more information about preparing your system for secure communication, see:
You can also enable encryption after installation from the Server Configurator in the Management Server
Manager tray icon in the notification area.
11. On the Select file location and product language page, select the File location for the program files.
If any Milestone XProtect VMS product is already installed on the computer, this
field is disabled. The field displays the location where the component will be
installed.
168 | Installation
Administrator manual | XProtect® VMS 2024 R1
12. In the Product language field, select the language in which to install your XProtect product. Click Install.
The software now installs. When the installation completes, you see a list of successfully installed system
components. Click Close.
13. When you have installed the recording server, you can check its state from the Recording Server
Manager tray icon and configure it in Management Client. For more information, see Initial configuration
tasks list on page 188.
If you run workgroups, you must use the alternative installation method for failover
recording servers (see Installation for workgroups on page 180).
1. From the computer where Management Server is installed, go to the Management Server's download
web page. In Windows' Start menu, select Milestone > Administrative Installation Page and write down
or copy the internet address for later use when installing the system components on the other
computers. The address is typically http://[management server address]/installation/Admin/default-en-
US.htm.
Log into the computer where you want to install the system component.
2. Open an internet browser and enter the address of the Management Server's download web page into
the address field and press Enter.
3. Download the recording server installer by selecting All Languages below the Recording Server
Installer. Save the installer or run it directly from the web page.
4. Select the Language you want to use during the installation. Click Continue.
5. On the Select an installation type page, select Failover to install a recording server as a failover
recording server.
6. On the Specify recording server settings page, specify the different recording server settings. The
name of the failover recording server, the address of the management server, and the path to the media
database. Click Continue.
7. On the Select service account for recording server page and when installing a failover recording server,
you must use the particular user account named This account. This creates the failover user account. If
needed, enter a password and confirm this. Click Continue.
169 | Installation
Administrator manual | XProtect® VMS 2024 R1
8. On the Select encryption page, you can secure the communication flows:
l Between the recording servers, data collectors, and the management server
To enable encryption for internal communication flows, in the Server certificate section, select a
certificate.
To enable encryption between recording servers and client components that retrieve data
streams from the recording server, in the Streaming media certificate section, select a
certificate.
To enable encryption between client components that retrieve data streams from the mobile
server, in the Mobile streaming media certificate section, select a certificate.
l Between the event server and components that communicate with the event server
To enable encryption between the event server and components that communicate with the event
server, including the LPR Server, in the Event server and extensions section, select a certificate.
You can use the same certificate file for all system components or use different certificate files
depending on the system components.
For more information about preparing your system for secure communication, see:
You can also enable encryption after installation from the Server Configurator in the Management Server
Manager tray icon in the notification area.
9. On the Select file location and product language page, select the File location for the program files.
If any Milestone XProtect VMS product is already installed on the computer, this
field is disabled. The field displays the location where the component will be
installed.
170 | Installation
Administrator manual | XProtect® VMS 2024 R1
10. In the Product language field, select the language in which to install your XProtect product. Click Install.
The software now installs. When the installation completes, you see a list of successfully installed system
components. Click Close.
11. When you have installed the failover recording server, you can check its state from the Failover Server
service tray icon and configure it in Management Client. For more information, see Initial configuration
tasks list on page 188.
For an overview of all the ports that the VMS uses, see the XProtect VMS administrator manual
(https://doc.milestonesys.com/2024r1/en-US/portal/htm/chapter-page-mc-administrator-manual.htm).
If IIS is not yet installed on the system, the XProtect VMS installer installs IIS and uses the default website with
default ports.
To avoid using the XProtect VMS default, install the IIS first. Optionally, add a new website or proceed using the
default website.
Add a binding for HTTPS, if it does not already exist, and select a valid certificate on the computer (you will need
to select it during XProtect VMS installation). Edit the port numbers on both HTTP and HTTPS bindings to
available ports of your choosing.
During the installation, the Select a website on the IIS to use with your XProtect system page appears if there
is more than one website available. You must select which website you will use with your XProtect system. The
installer uses the changed port numbers.
The XProtect VMS and Smart Client installers (.exe files) have different command line arguments. They each
have their own set of command line parameters that can be invoked directly in a command line shell or through
an arguments file. In the command line shell, you can also use command line options with the installers.
You can combine the XProtect installers, their command line parameters and command line options with tools
for silent distribution and installation of software, like Microsoft System Center Configuration Manager (SCCM,
also known as ConfigMgr). For more information about such tools, visit the manufacturer's website. You can also
use Milestone Software Manager for remote installing and updating of XProtect VMS, device packs, and Smart
Client. For more information, see the administrator manual for Milestone Software Manager.
171 | Installation
Administrator manual | XProtect® VMS 2024 R1
During silent installation, you can specify settings that are closely linked to the different VMS system
components and their internal communication with command line parameters and arguments files. Command
line parameters and arguments files should only be used for new installations because you cannot change the
settings that the command line parameters represent during an upgrade.
To see the available command line parameters and to generate an arguments file for an installer, in the
command line shell, navigate to the directory where the installer is located and enter the following command:
[NameOfExeFile].exe --generateargsfile=[path]
Example:
MilestoneXProtectRecordingServerInstaller_x64.exe --generateargsfile=c:\temp
In the saved arguments file (Arguments.xml), each command line parameter has a description that explains its
purpose. You can modify and save the arguments file so that the command line parameter values suit your
installation needs.
When you want to use an arguments file with its installer, use the --arguments command line option by
entering the following command:
Example:
In the command line shell, you can also combine installers with command line options. The command line
options generally modify the behavior of a command.
To see the full list of command line options, in the command line shell, navigate to the directory where the
installer is located and enter [NameOfExeFile].exe --help. For the installation to be successful, you must
specify a value for command line options that require a value.
You can use both command line parameters and command line options in the same command. Use the
--parameters command line option and divide each command line parameter with a colon (:). In the example
below, --quiet, --showconsole, and --parameters are command line options, and ISFAILOVER and
RECORDERNAME are command line parameters:
172 | Installation
Administrator manual | XProtect® VMS 2024 R1
In the command examples below, the text inside square brackets ([ ]) and the square brackets themselves must
be replaced with real values. Example: instead of "[path]" you could enter d:\program files\, d:\record\, or
\\network-storage-02\surveillance. Use the --help command line option to read about the legal formats
of each command line option value.
1. Log in to the computer where you want to install the Recording Server component.
2. Open an internet browser and enter the address of the Management Server's download web page that is
targeted at the administrators into the address field and press Enter.
3. Download the recording server installer by selecting All Languages below Recording Server Installer.
4. Open your preferred command line shell. To open Windows Command Prompt, open the Windows Start
menu and enter cmd.
Scenario 1: Upgrade an existing installation, or install on server with the Management Server
component with default values
MilestoneXProtectRecordingServerInstaller_x64.exe --quiet
1. Enter the following command to generate an arguments file with command line parameters.
MilestoneXProtectRecordingServerInstaller_x64.exe --generateargsfile=
[path]
173 | Installation
Administrator manual | XProtect® VMS 2024 R1
2. Open the arguments file (Arguments.xml) from the specified path and modify the command line
parameter values if needed.
Make sure that you give the command line parameters SERVERHOSTNAME
and SERVERPORT valid values. If not, the installation cannot complete.
5. Return to the command line shell and enter the command below to install with the command line
parameter values specified in the arguments file.
In the command examples below, the text inside square brackets ([ ]) and the square brackets themselves must
be replaced with real values. Example: instead of "[path]" you could enter d:\program files\, d:\record\, or
\\network-storage-02\surveillance. Use the --help command line option to read about the legal formats
of each command line option value.
1. Open an internet browser and enter the address of the Management Server's download web page that is
targeted at the end users into the address field and press Enter.
2. Download the XProtect Smart Client installer by selecting All Languages below XProtect Smart Client
Installer.
3. Open your preferred command line shell. To open Windows Command Prompt, open the Windows Start
menu and enter cmd.
174 | Installation
Administrator manual | XProtect® VMS 2024 R1
Scenario 1: Upgrade an existing installation, or install with default command line parameter
values
Scenario 2: Install with customized command line parameter values using an xml arguments
file as input
1. Enter the following command to generate an arguments xml file with command line parameters.
2. Open the arguments file (Arguments.xml) from the specified path and modify the command line
parameter values if needed.
4. Return to the command line shell and enter the command below to install with the command line
parameter values specified in the arguments file.
In the command examples below, the text inside square brackets ([ ]) and the square brackets themselves must
be replaced with real values. Example: instead of "[path]" you could enter d:\program files\, d:\record\, or
\\network-storage-02\surveillance. Use the --help command line option to read about the legal formats
of each command line option value.
1. Log in to the computer where you want to install the Log Server component.
2. Open an internet browser and enter the address of the Management Server's download web page that is
targeted at the administrators into the address field and press Enter.
3. Download the log server installer by selecting All Languages below Log Server Installer.
4. Open your preferred command line shell. To open Windows Command Prompt, open the Windows Start
175 | Installation
Administrator manual | XProtect® VMS 2024 R1
Scenario 1: Upgrade an existing installation, or install with default command line parameter
values
Scenario 2: Install with customized command line parameter values using an XML arguments
file as input
1. Enter the following command to generate an arguments xml file with command line parameters.
2. Open the arguments file (Arguments.xml) from the specified path and modify the command line
parameter values if needed.
4. Return to the command line shell and enter the command below to install with the command line
parameter values specified in the arguments file.
Argument Description
176 | Installation
Administrator manual | XProtect® VMS 2024 R1
-- The path to the arguments XML file with full configuration. The path could be:
arguments C:\Arguments.xml.
This description is based on the use of a dedicated service account for integrated security. The services always
run on the dedicated account no matter which user is logged in, and you must make sure that the account has all
required permissions to, for example, perform tasks and to access network, files and shared folders.
The service account must be specified in an argument XML file for the following keys:
SERVICEACCOUNT
SERVICEACCOUNT_NONLOC
The password for the service account must be specified in plain text in the value for the following key:
ENCRYPTEDPASSWORD
177 | Installation
Administrator manual | XProtect® VMS 2024 R1
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>domain\sampleaccount</Value>
<Key>SERVICEACCOUNT</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>domain\sampleaccount</Value>
<Key>SERVICEACCOUNT_NONLOC</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>sampleaccountpasswordplaintext</Value>
<Key>ENCRYPTEDPASSWORD</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>%PROGRAMFILES%\Milestone</Value>
<Key>TARGETDIR</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>true</Value>
<Key>IsXPCO</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>true</Value>
<Key>IsDPInstaller</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>false</Value>
<Key>LEGACY</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>yes</Value>
<Key>SQL-KEEP-DATA</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>no</Value>
<Key>SQL-CREATE-DATABASE</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>True</Value>
<Key>IS_EXTERNALLY_MANAGED</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>Data Source=server.database.windows.net;Initial Catalog=Surveillance;Persist
Security Info=True;TrustServerCertificate=True;Authentication=ActiveDirectoryIntegrated</Value>
<Key>SQL_CONNECTION_STRING_MS</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>Data Source=server.database.windows.net;Initial Catalog=Surveillance_IDP;Persist
Security Info=True;TrustServerCertificate=True;Authentication=ActiveDirectoryIntegrated</Value>
<Key>SQL_CONNECTION_STRING_IDP</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>Data Source=server.database.windows.net;Initial Catalog=Surveillance_IM;Persist
Security Info=True;TrustServerCertificate=True;Authentication=ActiveDirectoryIntegrated</Value>
<Key>SQL_CONNECTION_STRING_IM</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>Data Source=server.database.windows.net;Initial Catalog=Surveillance;Persist
Security Info=True;TrustServerCertificate=True;Authentication=ActiveDirectoryIntegrated</Value>
<Key>SQL_CONNECTION_STRING_ES</Key>
</KeyValueParametersOfStringString>
<KeyValueParametersOfStringString>
<Value>Data Source=server.database.windows.net;Initial Catalog=Surveillance_
178 | Installation
Administrator manual | XProtect® VMS 2024 R1
LogServerV2;Persist Security
Info=True;TrustServerCertificate=True;Authentication=ActiveDirectoryIntegrated;Application
Name=Surveillance_LogServerV2</Value>
<Key>SQL_CONNECTION_STRING_LOG</Key>
</KeyValueParametersOfStringString>
</Parameters>
</InstallEnvironment>
</CommandLineArguments>
l The service account as well as the account used to perform the installation must be created.
l The service account must be allowed to log on as a service on the computer where the installation is
performed. See Log-on-as-a-service.
l The databases to be used by XProtect must be created, and the databases must be named in the
arguments XML file, for example:
Database name
Surveillance
Surveillance_IDP
Surveillance_IM
Surveillance_LogServerV2
Database configuration
179 | Installation
Administrator manual | XProtect® VMS 2024 R1
l An SQL server logon must be created for the service account and for the account used to perform the
installation in each of the databases. A database user must be created in each of the databases, and the
user must be a member of the db_owner role on each database.
1. Log in to Windows. The user account you use here will be added to the XProtect administrator role during
the installation.
Make sure to use the same account on all computers in the system.
2. Depending on your needs, start the management or recording server installation and click Custom.
3. Depending on what you selected in step 2, select to install the Management Server or Recording Server
service using a common administrator account.
5. Repeat steps 1-4 to install any other systems you want to connect. They must all be installed using the
same system account.
180 | Installation
Administrator manual | XProtect® VMS 2024 R1
The web page can display two sets of content, both in a language version that by default matches the language
of the system installation:
l One web page is targeted at administrators, enabling them to download and install key system
components. Most often the web page is automatically loaded at the end of the management server
installation and the default content is displayed. On the management server, you can access the web
page from Windows' Start menu, select Programs > Milestone > Administrative Installation Page.
Otherwise you can enter the URL:
[management server address] is the IP address or host name of the management server, and [port] is
the port number which you have configured IIS to use on the management server.
181 | Installation
Administrator manual | XProtect® VMS 2024 R1
l One web page is targeted at end users, providing them access to client applications with default
configuration. On the management server, you can access the web page from Windows' Start menu,
select Programs > Milestone > Public Installation Page. Otherwise you can enter the URL:
[management server address] is the IP address or host name of the management server, and [port] is
the port number which you have configured IIS to use on the management server.
The two web pages have some default content so you can use them straight away after installation. As
administrator, however, by using the Download Manager, you can customize what should be displayed on the
web pages. You can also move components between the two versions of the web page. To move a component,
right-click it, and select the web page version you want to move the component to.
Even though you can control which components users can download and install in Download Manager, you
cannot use it as a users' permissions management tool. Such permissions are determined by roles defined in
the Management Client.
On the management server, you can access the XProtect Download Manager from Windows' Start menu, select
Programs > Milestone > XProtect Download Manager.
The default configuration provides you a default setup with access to downloading extra or optional components.
Usually you access the web page from the management server computer, but you can also access the web page
from other computers.
182 | Installation
Administrator manual | XProtect® VMS 2024 R1
l The second level: Refers to the two targeted versions of the web page. Default refers to the web page
version viewed by end users. Administration refers to the web page version viewed by system
administrators
l The third level: Refers to the languages in which the web page is available
183 | Installation
Administrator manual | XProtect® VMS 2024 R1
l The fourth level: Refers to the components which are - or can be made - available to users
l The fifth level: Refers to particular versions of each component, which are - or can be made - available to
users
l The sixth level: Refers to the language versions of the components which are - or can be made - available
to users
The fact that only standard components are initially available - and only in the same language version as the
system itself - helps reduce installation time and save space on the server. There is no need to have a
component or language version available on the server if nobody uses it.
You can make more components or languages available as required and you can hide or remove unwanted
components or languages.
l Recording servers, including failover recording servers. Failover recording servers are initially
downloaded and installed as recording servers, during the installation process you specify that you want
a failover recording server.
l Management Client
l Log server, used for providing the necessary functionality for logging system information
For installation of device packs, see Device pack installer - must be downloaded on page 186.
First you add new and/or non-standard components to the Download Manager. Then you use it to fine-tune
which components should be available in the various language versions of the web page.
184 | Installation
Administrator manual | XProtect® VMS 2024 R1
1. On the computer where you downloaded the component(s), go to Windows' Start, enter a Command
Prompt
2. In the Command Prompt, execute the name of the file (.exe) with:[space]--ss_registration
The file is now added to the Download Manager, but not installed on the current computer.
When you have installed new components, they are by default selected in the Download Manager and are
immediately available to users via the web page. You can always show or hide features on the web page by
selecting or clearing check boxes in the Download Manager's tree structure.
You can change the sequence in which components are displayed on the web page. In the Download Manager's
tree structure, drag component items and drop them at the required position.
l Hide components from the web page by clearing check boxes in the Download Manager's tree
structure. The components are still installed on the management server, and by selecting check boxes in
the Download Manager's tree structure you can quickly make the components available again
185 | Installation
Administrator manual | XProtect® VMS 2024 R1
l Remove the installation of components on the management server. The components disappear from
the Download Manager, but installation files for the components are kept at C:\Program Files
(x86)\Milestone\XProtect Download Manager, so you can re-install them later if required
2. In the Remove Features window, select the feature(s) you want to remove.
l Remove installation files for non-required features from the management server. This can help save
disk space on the server if you know that your organization is not going to use certain features
1. Get the latest regular device pack from the download page on the Milestone website
(https://www.milestonesys.com/downloads/).
2. On the same page, you can download the legacy device pack with older drivers. To check if your cameras
use drivers from the legacy device pack, go to this website
(https://www.milestonesys.com/community/business-partner-tools/device-packs/).
186 | Installation
Administrator manual | XProtect® VMS 2024 R1
If you do not have a network connection, you can reinstall the entire recording server from the Download
Manager. The installation files for the recording server is placed locally on your computer and in this way, you
automatically get a reinstall of the device pack.
You can find all installation log files in the C:\ProgramData\Milestone\Installer\ folder. Log files that are
named *I.log or *I[integer].log are log files about new installations or upgrades while log files named *U.log or
*U[integer].log are about uninstallations. If you have bought a server with an already installed XProtect system
through a Milestone partner, there might not be any installation log files.
The log files contain information about the command-line parameters and command-line options and their
values used during an installation, upgrade or uninstallation. To find the used command-line parameters in the
log files, search for Command Line: or Parameter ' depending on the log file.
For troubleshooting, the main installation log file installer.log is the first place to look. If there were any
exceptions, errors, or warnings during the installation, these have been logged. Try to search for exception,
error, or warning. "Exit code: 0" means a successful installation and "Exit code: 1" the opposite. Your findings in
the log files may enable you to find a solution on Milestone Knowledge Base. If not, contact your Milestone
partner and share the relevant installation log files.
187 | Installation
Administrator manual | XProtect® VMS 2024 R1
Configuration
A completed checklist does not in itself guarantee that the system matches the exact requirements of your
organization. To make the system match the needs of your organization, Milestone recommends that you
monitor and adjust the system continuously.
For example, it is a good idea to test and adjust the motion detection sensitivity settings of individual cameras
under different physical conditions, including day/night and windy calm weather, once the system is running.
The setup of rules, which determine most of the actions your system performs, including when to record video, is
another example of configuration that you can change according to your organization's needs.
Step Description
Verify that each recording server's storage settings meet your needs.
Verify that each recording server's archiving settings meet your needs.
Detect the hardware, cameras or video encoders to add to each recording server.
188 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Step Description
Enable storage and archiving for individual cameras or for a group of cameras. This is done from
the individual cameras or from the device group.
Rules determine the system's behavior to a large extent. You create rules to define when cameras
should record, when pan-tilt-zoom (PTZ) cameras should patrol, and when notifications should be
sent, for example.
Create rules.
Activate licenses.
See Activate licenses online on page 126 or Activate licenses offline on page 126.
For more information about how to configure the system in the Site Navigation pane, see Site Navigation pane
on page 372.
Recording servers
189 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You do not need to re-install recording servers to specify the parameters of the management servers, but you
can change/verify its basic configuration:
1. On the computer that runs the recording server, right-click the Recording Server icon in the notification
area.
3. Right-click the Recording Server icon again and select Change Settings.
190 | Configuration
Administrator manual | XProtect® VMS 2024 R1
l Management server: Address: Specify the IP address or host name of the management server
to which the recording server should be connected.
l Management server: Port: Specify the port number to be used when communicating with the
management server. You can change this if required, but the port number must always match the
port number set up on the management server. See Ports used by the system on page 100.
l Recording server: Web server port: Specify the port number to be used when communicating
with the recording server's web server. See Ports used by the system on page 100.
l Recording server: Alert server port: Enable and specify the port number to be used when
communicating with the recording server's alert server, which listens for event messages from
devices. See Ports used by the system on page 100.
l SMTP server: Port: Enable and specify the port number to be used when communicating with the
recording server's Simple Mail Transfer Protocol (SMTP) service. See Ports used by the system on
page 100.
5. Click OK.
6. To start the Recording Server service again, right-click the Recording Server icon, and select Start
Recording Server service.
Stopping the Recording Server service means that you cannot record and view live video
while you verify/change the recording server's basic configuration.
l The recording server was installed offline and then added to the management server afterward
l Your management server does not use the default ports. The port numbers depend on the encryption
configuration. For more information, see Ports used by the system on page 100
l An automatic registration has failed, for example after changing the management server address,
changing the name of the computer with the recording server, or after enabling or disabling server
communication encryption settings. For more information about changes to the management server
address, see Changing the host name of the management server computer.
When you register a recording server, you configure it to connect to your management server. The part of the
management server that handles registration is the Authorization Server service.
191 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Open the Server Configurator from either the Windows startup menu or from the recording server tray
icon.
3. Verify the address of the management server and the scheme (http or https) that you want the servers on
the computer to connect to and click Register.
A confirmation appears, stating that registration on the management server has succeeded.
192 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. In the Site Navigation pane, select Servers > Recording Servers. This opens a list of recording servers.
3. In the Overview pane, select the relevant recording server and go to the Info tab.
If encryption is enabled to clients and servers that retrieve data streams from the recording server, a
padlock icon appears in front of the local web server address and the optional web server address.
193 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. Select the Stop the recording server if a recording storage is unavailable option.
194 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. To add an extra storage to a selected recording server, click the button located below the Storage
configuration list. This opens the Storage and Recording Settings dialog box.
2. Specify the relevant settings (see Storage and Recording Settings properties on page 405).
3. Click OK.
If needed, you are now ready to create archive(s) within your new storage.
1. Select the relevant storage in the Recording and archiving configuration list.
2. Click the button below the Recording and archiving configuration list.
3. In the Archive Settings dialog box, specify the required settings (see Archive Settings properties on page
407).
4. Click OK.
5. In the dialog box that appears, select the database that should store the recordings of the device and
then click OK.
When you click the device usage number for the storage area on the Storage tab of the recording server, the
device is visible in the message report that appears.
Disabled devices
To display all disabled devices, in the top of the Overview pane, click Filter to open the Filter tab and select Show
disabled devices.
195 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. Click the Edit Recording Storage button located below the Recording and archiving
configuration list.
If you change the maximum size of a database, the system auto-archives recordings that
exceed the new limit. It auto-archives the recordings to the next archive or deletes them
depending on archiving settings.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
You can enable digital signing for recorded video, so that client users can verify that the recorded video has not
been tampered with since it was recorded. Verifying the authenticity of the video is something that the user does
in XProtect Smart Client – Player after the video has been exported.
Signing must also be activated in XProtect Smart Client > Exports tab > Export settings >
XProtect format > Include digital signature. Otherwise, the Verify Signatures button in
XProtect Smart Client – Player is not displayed.
3. In the overview pane, click the recording server you want to enable signing for.
196 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. In the Recording and archiving configuration section, double-click the horizontal bar that represents
the recording database. The Storage and Recording Settings window appears.
7. Click OK.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
You can secure your recordings by enabling encryption on your recording servers' storage and archives. You can
choose between light and strong encryption. When you enable encryption, you must also specify a related
password.
197 | Configuration
Administrator manual | XProtect® VMS 2024 R1
198 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Click the Edit Recording Storage button below the Recording and archiving configuration list.
199 | Configuration
Administrator manual | XProtect® VMS 2024 R1
3. You are automatically directed to Set Password dialog box. Enter password and click OK.
Always create backups based on the content of archives, not based on individual camera databases. If you
create backups based on the content of individual camera databases, you may cause sharing violations or other
malfunctions.
When scheduling a backup, make sure the backup job does not overlap with your specified archiving times. To view
each recording server's archiving schedule in each of a recording server's storage areas, see the Storage tab.
To ensure archiving is not occurring during backup, you can unmount the archive, perform the backup and then
mount the archive again. Mounting and unmounting archives is performed through the API Gateway.
When you archive recordings, you store them in a certain sub-directory structure within the archive.
200 | Configuration
Administrator manual | XProtect® VMS 2024 R1
During all regular use of your system, the sub-directory structure is completely transparent to the system's
users when they browse recordings with XProtect Smart Client. This is true both with archived and non-archived
recordings. It is relevant to know the sub-directory structure (see Archive structure (explained) on page 63 if you
want to back up your archived recordings (see Backing up and restoring system configuration on page 322).
It is only possible to delete the last archive in the list. The archive does not have to
be empty.
2. Click the button located below the Recording and archiving configuration list.
3. Click Yes.
For unavailable archives, for example offline archives, it is not possible to verify if
the archive contains media with evidence locks but the archive can be deleted
after user confirmation.
Available archives (online archives) that contain media with evidence locks cannot
be deleted.
Delete a storage
You cannot delete the default storage or storages that devices use as the recording storage for live recordings.
This means that you may need to move devices (see Move hardware on page 333) and any not yet archived
recordings to another storage before you delete the storage.
1. To see the list of devices that use this storage, click the device usage number.
If the storage has data from devices that have been moved to another recording
server, a warning appears. Click the link to see the list of devices.
2. Follow the steps in Move non-archived recordings from one storage to another on page 202.
201 | Configuration
Administrator manual | XProtect® VMS 2024 R1
6. Click Yes.
1. Select the device type. In the Overview pane, select the device.
2. Click the Record tab. In the upper part of the Storage area, click Select.
4. Click OK.
5. In the Recordings Action dialog box, select if you want to remove already existing - but non-archived -
recordings to the new storage or if you want to delete them.
6. Click OK.
l No failover setup
If you select b and c, you must select the specific server/groups. With b, you can also select a secondary failover
group. If the recording server becomes unavailable, a failover recording server from the primary failover group
takes over. If you have also selected a secondary failover group, a failover recording server from the secondary
group takes over in case all failover recording servers in the primary failover group are busy. In this way, you
only risk not having a failover solution in the rare case when all failover recording servers in the primary, as well
as in the secondary, failover group are busy.
202 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select Servers > Recording Servers. This opens a list of recording servers.
2. In the Overview pane, select the wanted recording server, go to the Failover tab.
l None
You cannot select the same failover group as both primary and secondary failover group nor select
regular failover servers already part of a failover group as hot standby servers.
4. Next, click Advanced failover settings. This opens the Advanced Failover Settings window, listing all
devices attached to the selected recording server. If you selected None, the advanced failover settings
are also available. The system keeps any selections for later failover setups.
5. To specify the level of failover support, select Full Support, Live Only or Disabled for each device in the
list. Click OK.
6. In the Failover service communication port (TCP) field, edit the port number if needed.
If you enable failover support and the recording server is configured to keep running if a
recording storage is unavailable, the failover recording server will not take over. To make
the failover support work, you must select the Stop the recording server if a recording
storage is unavailable option on the Storage tab.
l When you use unicasting, the source must transmit one data stream for each recipient
l When you use multicasting, only a single data stream is required on each network segment
Multicasting as described here is not streaming of video from camera to servers, but from servers to clients.
With multicasting, you work with a defined group of recipients, based on options such as IP address ranges, the
ability to enable/disable multicast for individual cameras, the ability to define largest acceptable data packet size
(MTU), the maximum number of routers a data packet must be forwarded between (TTL), and so on.
Multicast streams are not encrypted, even if the recording server uses encryption.
Multicasting should not be confused with broadcasting, which sends data to everyone connected to the network,
even if the data is perhaps not relevant for everyone:
203 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
Multicasting Sends data from a single source to multiple recipients within a clearly defined group.
Sends data from a single source to everyone on a network. Broadcasting can therefore
Broadcasting
significantly slow down network communication.
To use multicasting, your network infrastructure must support the IP multicasting standard IGMP (Internet
Group Management Protocol).
If the entire IP address range for multicast is already in use on one or more recording servers, you first release
some multicast IP addresses before you can enable multicasting on additional recording servers.
Multicast streams are not encrypted, even if the recording server uses encryption.
1. Select the recording server and select the required camera in the Overview pane.
2. On the Client tab, select the Live multicast check box. Repeat for all relevant cameras.
Multicast streams are not encrypted, even if the recording server uses encryption.
If you need to access the VMS with XProtect Smart Client over a public or untrusted
network, Milestone recommends that you use a secure connection through VPN. This
helps ensure that communication between XProtect Smart Client and the VMS server is
protected.
204 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Clients may connect from the local network as well as from the Internet, and in both cases the surveillance
system must provide suitable addresses so the clients can get access to live and recorded video from the
recording servers:
l When clients connect locally, the surveillance system should reply with local addresses and port numbers
l When clients connect from the internet, the surveillance system should reply with the recording server's
public address. This is the address of the firewall or NAT (Network Address Translation) router, and often
also a different port number. The address and the port can then be forwarded to the server's local
address and port.
1. To enable public access, select the Enable public access check box.
2. Define the recording server's public address. Enter the address of the firewall or NAT router so clients
that access the surveillance system from the Internet can connect to the recording servers.
3. Specify a public port number. It is always a good idea that port numbers used on the firewall or NAT
router are different from the ones used locally.
If you use public access, configure the firewall or NAT router so requests sent to the
public address and port are forwarded to the local address and port of relevant recording
servers.
You define a list of local IP ranges which the surveillance system should recognize as coming from a local
network:
By providing filter terms that are unique to a few specific devices, you can effectively only display these specific
devices.
l In the top of the Overview pane, click Filter to open the Filter tab.
l In the Type here to filter devices field, enter one or more filter criteria and click Apply filter to filter the
device list.
205 | Configuration
Administrator manual | XProtect® VMS 2024 R1
The filter criteria are applied to the device name, device short name, hardware address (IP), device ID, and
hardware ID field values.
Partial filter matches are not displayed when filtering hardware ID and device ID field values. As a result, you
must define the complete and exact identification number when filtering by hardware ID or device ID.
Partial filter matches are displayed for device name, device short name, and hardware address field values, so
the filter term “camer” will display all devices that contain the word “camera” in the device name.
Filter criteria are not case sensitive, using "camera" or "Camera" as filter criteria will yield
the same results.
You can specify multiple filter criteria and thereby further narrow your filtering of the device tree. When the filter
is applied, all defined filter criteria are considered to be co-joined with an AND, meaning they are cumulative.
For example, if you have entered two filter criteria: “Camera” and “Warehouse”, the list will display all devices
that contain the words “Camera” and “Warehouse” in the device name but will not display devices that contain
the words “Camera” and “Parking Lot” in the device name nor will devices that only contain the word "Camera" in
the device name be displayed.
Remove each individual filter criteria from the filter field to broaden your filter if you have specified a filter that is
too restrictive. The filter is automatically applied to the device tree when removing filter criteria.
If you remove all filter criteria from the filter field, the Overview pane is reset and will display all devices once
again.
You can also press F5 to reset the filter and clear the Show disabled devices check box.
Disabled devices
To display all disabled devices, in the top of the Overview pane, click Filter to open the Filter tab and select Show
disabled devices.
206 | Configuration
Administrator manual | XProtect® VMS 2024 R1
If you have disabled the failover recording server, you must enable it before it can take
over from the standard recording servers.
Do the following to enable a failover recording server and edit its basic properties:
1. In the Site Navigation pane, select Servers > Failover Servers. This opens a list of installed failover
recording servers and failover groups.
3. Right-click and select Enabled. The failover recording server is now enabled.
5. When done, go to the Network tab. Here you can define the failover recording server's public IP address
and more. This is relevant if you use NAT (Network Address Translation) and port forwarding. See the
standard recording server's Network tab for more information.
6. In the Site Navigation pane, select Servers > Recording Servers. Select the recording server that you
want failover support for and assign failover recording servers (see Failover tab (recording server) on
page 408).
To see the status of a failover recording server, hold your mouse over the Failover Recording Server Manager
tray icon in the notification area. A tooltip appears containing the text entered in the Description field of the
failover recording server. This may help you determine which recording server the failover recording server is
configured to take over from.
The failover recording server pings the management server on a regular basis to verify
that it is online and able to request and receive the configuration of the standard
recording servers when needed. If you block the pinging, the failover recording server is
not able to take over from the standard recording servers.
2. In the Overview pane, right-click the top-node Failover Groups and select Add Group.
3. Specify a name (inthis example Failover Group 1) for anda description(optional) of your newgroup. ClickOK.
207 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. Right-click the group (Failover Group 1) you just created. Select Edit Group Members. This opens the
Select Group Members window.
5. Drag and drop or use the buttons to move the selected failover recording server(s) from the left side to
the right side. Click OK. The selected failover recording server(s) now belongs to the group (Failover
Group 1) you just created.
6. Go to the Sequence tab. Click Up and Down to set the internal sequence of the regular failover
recordings servers in the group.
1. In the Site Navigation pane, select Servers > Failover Servers. This opens a list of failover recording
servers.
2. In the Overview pane, select the relevant recording server and go to the Info tab.
If encryption is enabled to clients and servers that retrieve data streams from the recording server, a
208 | Configuration
Administrator manual | XProtect® VMS 2024 R1
padlock icon appears in front of the local web server address and the optional web server address.
2. Select Show Status Messages. The Failover Server Status Messages window appears, listing time-
stamped status messages.
209 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. On the failover recording server, right-click the Milestone Failover Recording Server service icon.
2. Select About.
3. A small dialog box opens that shows the exact version of your Failover Recording Server service.
Hardware
Add hardware
You have several options for adding hardware to each recording server in your system.
If your hardware is located behind a NAT-enabled router or a firewall, you may need to
specify a different port number and configure the router/firewall so it maps the port and
IP addresses that the hardware uses.
The Add Hardware wizard helps you detect hardware like cameras and video encoders on your network and
add them to the recording servers on your system. The wizard also helps you add remote recording servers for
Milestone Interconnect setups. Only add hardware to one recording server at a time.
1. To access Add Hardware, right-click the required recording server and select Add Hardware.
2. Select one of the wizard options (see below) and follow the instruction on the screen.
3. After installation, you can see the hardware and its devices in the Overview pane.
Certain hardware must be pre-configured when adding the hardware for the first time. An
additional Pre-configure hardware devices wizard will appear when adding such
hardware. See Hardware pre-configuration (explained) on page 56 for more information.
l The physical unit that connects directly to the recording server of the surveillance system via IP, for
example a camera, a video encoder, an I/O module
For more information about how to add hardware to your system, see Add hardware on page 210.
210 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
The system scans automatically for new hardware on the recording server's local
network.
Select the Show hardware running on other recording servers check box to see if
detected hardware is running on other recording servers.
You can select this option every time you add new hardware to your network and want
Express to use it in your system.
(Recommended)
You cannot use this option to add remote systems in Milestone Interconnect setups.
The system scans your network for relevant hardware and Milestone Interconnect
remote systems based on your specifications of:
l hardware user names and passwords. Not needed if your hardware uses the
factory default user names and passwords
Address range l drivers
scanning
l IP ranges (IPv4 only)
You can select this option when you only want to scan a part of your network, for
example, when you expand your system.
Specify details about each hardware and Milestone Interconnect remote systems
separately. This can be a good choice if you want to add only a few pieces of hardware,
Manual
and you know their IP addresses, relevant user names and passwords or if a camera
does not support the automatic discovery function.
The system scans for hardware connected via a remotely connected server.
Remote
You can use this option if you have installed servers for, for example, the Axis One-click
connect
Camera Connection.
hardware
You cannot use this option to add remote systems in Milestone Interconnect setups.
211 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Enabled
Disabled
To disable added hardware, for example, for licensing or performance purposes
1. Expand the recording server, right-click the hardware you want to disable.
Edit hardware
Right-click on added hardware and select Edit Hardware to modify the network configuration and user
authentication settings of hardware in Management Client.
For some hardware, the Edit Hardware dialog also lets you apply settings directly to the
hardware device.
If the Edit Management Client settings radio button is selected, the Edit Hardware dialog displays the settings
which Management Client uses to connect to the hardware. To ensure the hardware device is added to the
system properly, enter the same settings you use to connect to the manufacturer's hardware configuration
interface:
Name Description
Name Displays the name of the hardware alongside its detected IP address (in parenthesis).
Hardware The web address of the manufacturer's hardware configuration interface, typically containing
URL the IP address of the hardware. Specify a valid address in your network.
User
The user name used to connect to the hardware.
name
212 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
The user name that you enter here does not change the user name on
the actual hardware device. Select the Edit Management Client and
hardware settings radio button to modify settings on supported
hardware devices.
The password that you enter here does not change the password on the
actual hardware device. Select the Edit Management Client and
hardware settings radio button to modify settings on supported
hardware devices.
Password
As a system administrator, you need to give other users permission to view the password in
Management Client. For more information, see Role settings under Hardware.
If the Edit Management Client and hardware settings radio button is selected (for supported hardware), the
Edit Hardware dialog displays settings which are also applied directly to the hardware device:
Applying the settings with this radio button selected will overwrite the current settings on
the hardware device. The hardware will momentarily lose connection to the recording
server while the settings are applied.
Name Description
Name Displays the name of the hardware alongside its detected IP address (in parenthesis).
Network The network settings of the hardware. To adjust the network settings, select Configure on
213 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
Specify the Internet Protocol (for supported hardware devices) using the IP version
dropdown list.
l For IPv6, the values must be in the format of eight groups of hexadecimal digits
each separated by a colon. The subnet mask must be a number between 0-128.
Configure The Check button tests whether there is currently another hardware device in the system
that is using the entered IP address.
Check cannot detect conflicts with hardware devices that are turn
off, outside of the XProtect VMS system, or otherwise momentarily
not responding.
The user name and level used to connect to the hardware. Select another user from the
dropdown list and add a new password using the Password field described below.
Add or delete users using the underlined actions at the bottom of the Authentication
section (see Add a user on page 215 or Delete users on page 215).
User name
Selecting a user that does not have the highest user level specified
by the manufacturer could result in some features not being
available.
The password used to connect to the hardware. View the currently entered text using the
Reveal icon.
Password When changing the password, consult the manufacturer's documentation for the
password rules for the specific hardware device, or use the Generate Password
icon to automatically generate a password that matches the requirements.
214 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
As a system administrator, you need to give other users permission to view the password
in Management Client. For more information, see Role settings under Hardware.
Select the underlined Add link to open the Add a User dialog and add a user to the
hardware device.
When creating the password, consult the manufacturer's documentation for the password
Add a user
rules for the specific hardware device, or use the Generate Password icon to
automatically generate a password that matches the requirements.
The highest user level detected on the hardware device will automatically be preselected.
It is not recommended to modify the User level from its default value.
Select the underlined Delete link to open the Delete Users dialog and remove users from
the hardware device.
Delete users You cannot delete the currently active user. To set a new user, use
the Add a User dialog described above, then remove the old user
using this interface.
215 | Configuration
Administrator manual | XProtect® VMS 2024 R1
This means that microphones, speakers, metadata, inputs and outputs must be individually enabled before you
can use them in the system. The reason for this is that surveillance systems rely on cameras, whereas the use of
microphones and so on is highly individual depending on the needs of each organization.
You can see if devices are enabled or disabled (the examples show an output):
Disabled
Enabled
The same method for enabling/disabling is used for cameras, microphones, speakers, metadata, inputs, and
outputs.
1. Expand the recording server and the device. Right-click the device you want to enable.
Consult your camera vendor to get a certificate for your hardware and upload it to the hardware, before you
continue with the steps below:
1. In the Overview pane, right-click the recording server and select the hardware.
3. Enter the port on the recording server to which the HTTPS connection is connected. The port number
must correspond with the port set up on the device’s homepage.
216 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the list of devices connected to the video encoder, select the Enable PTZ box for the relevant cameras:
3. In the COM Port column, select which video encoder's COM (serial communications) ports to use for
control of the PTZ functionality:
4. In the PTZ Protocol column, select which positioning scheme you want to use:
l Absolute: When operators use PTZ controls for the camera, the camera is adjusted relative to a
fixed position, often referred to as the camera's home position
l Relative: When operators use PTZ controls for the camera, the camera is adjusted relative to its
current position
The content of the PTZ protocol column varies a lot depending on the hardware. Some have 5 to 8
different protocols. See also the camera documentation.
6. You are ready to configure preset positions and patrolling for each PTZ camera:
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
217 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Initially, the supported devices are models from Canon, Axis, Bosch, Hanwa, Panasonic, Sony, Hikvision, and
ONVIF compatible hardware devices, but the user interface shows you directly if a model is supported or not.
You can also go to our website to find out if a model is supported:
https://www.milestonesys.com/community/business-partner-tools/supported-devices/
For devices that do not support device password management, you must change the
password of a hardware device from its web page and then manually enter the new
password in Management Client. For more information, see Edit hardware on page 212.
l Let the system generate individual passwords for each hardware device. The system generates
passwords based on the requirements from the manufacturer of the hardware devices.
l Use a single user-defined password for all hardware devices. When you apply the new passwords, the
hardware devices lose connection to the recording server momentarily. After you have applied new
passwords, the result for each hardware device appears on the screen. For unsuccessful changes, the
reason for failure appears if the hardware device supports such information. From within the wizard, you
can create a report of successful and failed password changes, but the results are also logged under
Server logs.
For hardware devices with ONVIF drivers and multiple user accounts, only an
administrator of XProtect with administrative permissions of the hardware device
can change passwords from the VMS.
Requirements:
Steps:
4. Type the password using lower and upper letters, numbers, and the following characters: ! ( ) * - . _
The maximum password length for the Bosch FLEXIDOME IP outdoor 5000 MP
NDN-50051 camera is 19 characters.
218 | Configuration
Administrator manual | XProtect® VMS 2024 R1
The Password last changed field shows the time stamp of the latest password
change based on the local time settings of the computer that the password was
changed from.
6. The last page shows the result. If the system could not update a password, click Failed next to the
hardware device to see the reason.
7. You can also click the Print report button to see the full list of successful and unsuccessful updates.
8. In case you want to change the password on the hardware devices that failed, click Retry, and the wizard
starts over with the failed hardware devices.
If you select Retry, you can no longer access the report from the first time you
completed the wizard.
Due to security restrictions, some hardware devices might become unavailable for
a certain period if you fail to change password several times in a row. Security
restrictions vary for different manufacturers.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Management Client allows you to update the firmware of hardware that has been added to your VMS system.
You can update firmware for multiple hardware devices simultaneously if they are compatible with the same
firmware file.
The user interface shows you directly if a model supports firmware updates. You can also go to the Milestone
website to find out if a model is supported: https://www.milestonesys.com/community/business-partner-
tools/supported-devices/
For devices that do not support firmware updates, you must update the firmware of a
hardware device from its web page.
When you update firmware, the hardware devices lose connection to the recording server momentarily.
219 | Configuration
Administrator manual | XProtect® VMS 2024 R1
After you have updated the firmware, the result for each hardware device appears on the screen. For
unsuccessful changes, the reason for failure appears if the hardware device supports such information. The
results are also logged under Server logs.
For hardware devices with ONVIF drivers and multiple user accounts, only an
administrator of XProtect with administrative permissions of the hardware device can
update firmware from the VMS.
Requirements:
Steps:
You may only update multiple hardware devices that are compatible with the same
firmware file. Hardware that is added through the ONVIF driver is found under
other, rather than its manufacturer name.
6. The last page shows the result. If the system could not update the firmware, click Failed next to the
hardware device to see the reason.
Milestone does not take responsibility for hardware device malfunction if an incompatible
firmware file or hardware device is selected.
2. In the External IDP section, select Add. Note, that only one external IDP can be added.
3. Enter the information for the external IDP. For more information about the information that is required,
see External IDP.
For information about how to register which claims from the external IDP that you want to use in the VMS, see
Register claims from an external IDP.
220 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Devices - Groups
3. In the Add Device Group dialog box, specify a name and description of the new device group:
The description appears when you pause the mouse pointer over the device group in the device group
list.
4. Click OK. A folder representing the new device group appears in the list.
5. Continue to specify which devices to include in a device group (see Specify which devices to include in a
device group on page 221).
3. In the Select Group Members window, select one of the tabs to locate the device.
221 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. Select the devices you want to include, and click Add or double-click the device:
5. Click OK.
6. If you exceed the limit of 400 devices in one group, you can add device groups as subgroups under other
device groups:
Disabled Devices
To display all disabled devices, in the top of the Overview pane, click Filter to open the Filter tab and select Show
disabled devices.
In the Properties pane, all properties which are available on all of the device group's devices are listed
and grouped on tabs.
On the Settings tab, you can switch between settings for all devices and settings for individual devices.
3. In the toolbar, click Save. The settings are saved on the individual devices, not in the device group.
222 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Disabled devices
To display all disabled devices, in the top of the Overview pane, click Filter to open the Filter tab and select Show
disabled devices.
To display all disabled devices, in the top of the Overview pane, click Filter to open the Filter tab and select Show
disabled devices.
2. In the Overview pane expand the relevant group and find the device.
l Resolution
l Compression
l On-screen date/time/text display for a selected camera, or for all cameras within a device group
223 | Configuration
Administrator manual | XProtect® VMS 2024 R1
The drivers for the cameras determine the content of the Settings tab. The drivers vary depending on the type
of camera.
For cameras that support more than one type of stream, for example MJPEG and MPEG-4/H.264/H.265, you can
use multi-streaming, see Manage multi-streaming on page 230.
Preview
When you change a setting, you can quickly verify the effect of your change if you have the Preview pane
enabled.
l To enable Preview, click the View menu and then click Preview Window.
You cannot use the Preview pane to judge the effect of frame rate changes because the Preview pane's
thumbnail images use another frame rate defined in the Options dialog box.
Performance
If you change the settings for Max. frames between keyframes and Max. frames between keyframes mode,
it may lower the performance of some functionalities in XProtect Smart Client. For example, XProtect Smart
Client requires a keyframe to start up showing video, so a longer period between keyframes, prolongs the
XProtect Smart Client start up.
Adding hardware
For more information about how to add hardware to your system, see Add hardware on page 210.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Fisheye Lens tab, select or clear the Enable fisheye lens support check box.
2. Specify the physical position/orientation of the camera from the Camera position/orientation list.
3. Select a Registered Panomorph Lens (RPL) number from the ImmerVision Enables® panomorph RPL
number list.
This ensures the identification and correct configuration of the lens used with the camera. You usually
find the RPL number on the lens itself or on the box it came in. For details of ImmerVision, panomorph
lenses, and RPLs, see the Immervision website (https://www.immervisionenables.com/).
If you select the Generic dewarping lens profile, remember to configure the desired Field of view.
224 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Devices - Recording
Enable/disable recording
Recording is by default enabled. To enable/disable recording:
You must enable recording for the device before you can record data from the camera. A
rule that specifies the circumstances for a device to record does not work if you have
disabled recording for the device.
Recording on related devices are enabled by default for new camera devices, but you can disable and enable as
you want. For existing camera devices in the system, the check box is cleared by default.
3. On the Record tab, select or clear the Record on related devices check box.
4. On the Client tab, specify the devices that relate to this camera.
If you want to enable recording on related devices that are connected to another recording server, you must
create a rule.
3. On the Record tab, select or clear the Stop manual recording after check box.
225 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you enable it, specify a recording time. The number of minutes you specify must be sufficiently large to
accommodate the requirements of the various manual recordings without overloading the system.
Add to roles:
You must grant the permission to start and stop manual recording to the client users on each camera in Roles
on the Device tab.
Use in rules:
The events you can use when you create rules related to manual recording are:
3. On the Record tab, in the Recording frame rate: (JPEG) box, select or enter the recording frame rate (in
FPS, frames per second).
You can, for example, let the system record keyframes when there is no motion in the view and switch to all
frames only in case of motion detection to save storage.
3. On the Record tab, select the Record keyframes only check box.
4. Set up a rule that activates the function, see Actions and stop actions.
226 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Recording on related devices are enabled by default for new camera devices, but you can disable and enable as
you want. For existing camera devices in the system, the check box is cleared by default.
3. On the Record tab, select or clear the Record on related devices check box.
4. On the Client tab, specify the devices that relate to this camera.
If you want to enable recording on related devices that are connected to another recording server, you must
create a rule.
3. Under Remote recordings, select Automatically retrieve remote recordings when connection is
restored. This enables automatic retrieval of recordings once connection is re-established
The remote recording option is only available if the selected camera supports edge
storage or is a camera in a Milestone Interconnect setup.
The type of hardware selected determines where recordings are retrieved from:
l For a camera with local recording storage, recordings are retrieved from the camera's local recording
storage
l For a Milestone Interconnect remote system, recordings are retrieved from the remote systems'
recording servers
You can use the following functionality independently of the automatic retrieval:
l Manual recording
l The Retrieve and store remote recordings between <start and end time> from <devices> rule
227 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Delete recordings
1. In the Site Navigation pane, select Devices.
2. Select the relevant device in the Overview pane and select the Recording tab.
3. Click the Delete All Recordings button to delete all recordings for the device or device group.
This method can only be used if you have added all devices in the group to the same server. Protected data is
not deleted.
Devices - Streaming
You can set up the closest match of available video streams for the resolution requested by a view item when
you enable adaptive streaming in XProtect Smart Client. For more information, see Enable adaptive streaming.
In XProtect Smart Client, adaptive streaming can be applied in live and in playback mode. In the mobile clients, it
is only available in live mode.
When applied in playback mode, the streaming method is referred to as adaptive playback. For more
information, see Adaptive playback (explained) on page 228
Adaptive playback requires two recording streams, a primary and a secondary stream. If both streams are
enabled in the Management Client, both streams will be recording.
l If you play back video from a period before the secondary recording was configured, only the primary
recordings will be played back.
l If you play back video that was recorded after the secondary recording was configured, the video is
played back from the primary or the secondary recording depending on what matches the client view size
the best.
228 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Availability
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
You can enable adaptive playback together with adaptive streaming on the Advanced tab in Smart Client
profiles and it must also be enabled in XProtect Smart Client under Settings > Advanced > Adaptive
streaming. For more information about enabling adaptive streaming in XProtect Smart Client, see Enable
adaptive streaming.
Edge recordings
Optionally, you can use edge recordings for adaptive playback. Edge recordings allow you to view sequences of a
stream with a different, usually a higher, resolution than the remainder of the stream. For example, you can
record a primary stream with a low resolution and merge recordings from a high-resolution source. You can
enable the merged-in edge recordings when browsing the data.
Edge recordings are stored in the media database and the resolution of these recordings is set on individual
cameras.
When using adaptive playback, the resolution in the played back video is determined by the current resolution
settings for the primary and the secondary recordings. That is, in playback, the choice of either the primary or
the secondary stream is based on the resolution that is currently set up for the respective recording streams.
Add a stream
The streams that you add for recording can be viewed in live and in playback mode.
You can also view the recorded video in your view item with adaptive streaming enabled. Adaptive streaming in
playback mode is referred to as adaptive playback.
1. On the Streams tab, click Add. This adds a second stream to the list.
2. In the Name column, edit the name of the stream. The name appears in XProtect Smart Client.
l Always: the stream runs even if no XProtect Smart Client users request the stream
l Never: the stream is off. Only use this for recording streams, for example, if you want recordings
in high quality and need the bandwidth
l When needed: the stream starts when requested by any client or if the stream is set to record
229 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. In the Default live stream column, select which stream is default and should be used if the client does
not request a specific stream and adaptive streaming is disabled.
5. In the Recording column, select either Primary or Secondary. For adaptive playback, you need to create
a stream of each type. The video that is played back is sourced from the primary video stream and
secondary streaming is included when required. There must always be a primary recording. Also, the
stream that you configure as Primary is used in different contexts such as for motion detection and for
export from XProtect Smart Client.
6. Under Default playback, select which stream is default. The default stream will be delivered to the client
if adaptive playback is not configured.
7. In the Use edge recordings column, select the check box if you want to use edge recordings. For more
information about edge recordings, see Edge recordings on page 229.
8. Click Save.
If you do not want the streams to run at all unless someone is viewing live video, you can
modify the Default Start Feed Rule to start on request with the predefined Live Client
Feed Requested event.
Manage multi-streaming
Viewing live video and playing back recorded video do not necessarily require the same video quality and frame
rate.
Adaptive playback requires that two streams are set to recording, a primary and a secondary stream. For live
streaming, you can set up and use as many live streams as the camera supports.
3. On the Streams tab, select the stream that you want to use for recording.
4. Select the relevant option on the Live mode list. The options When needed, Always and Never indicate
when the stream should be applied in the client. If nothing is requested from the client, the recording will
use the stream where the Default live stream check box is selected.
5. To record on one stream, select either Primary or Secondary on the Recording list.
6. To use adaptive playback, set up two streams and set one of the streams to Primary and the other one to
Secondary.
7. To record on a stream, select either the Primary or the Secondary stream on the Recording list.
You can set up a set of conditions to ensure that video streams only run when viewed by a client.
230 | Configuration
Administrator manual | XProtect® VMS 2024 R1
To manage streaming and limit unnecessary data transmission, streaming does not start when the following
conditions are met:
3. On the Streams tab, on the Live Mode list, select When needed.
If these conditions are met, video streams will only run when viewed by a client.
Examples
l For viewing live video, your organization may prefer H.264 at a high frame rate
l For playing back recorded video, your organization may prefer MJPEG at a lower frame rate to preserve
disk space
l For viewing live video from a local connected operating point, your organization may prefer H.264 at a
high frame rate to have the highest quality of video available
l For viewing live video from a remotely connected operating point, your organization may prefer
MJPEG at a lower frame rate and quality to preserve network bandwidth
l For viewing live video and decreasing the load on the CPU and GPU of the XProtect Smart Client
computer, your organization may prefer multiple high frame rate H.264/H.265 but with different
resolutions to match the resolution requested by XProtect Smart Client when using adaptive streaming.
For more information, see Smart Client Profiles (Client node) on page 455.
If you enable Live multicast on the camera's Client tab (see Client tab (devices)), it only
works on the default video stream.
Even when cameras support multi-streaming, individual multi-streaming capabilities may vary between different
cameras. See the camera's documentation for more information.
To see if a camera offers different types of streams, see Settings tab (devices).
231 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Devices - Storage
Manage pre-buffering
Cameras, microphones and speakers support pre-buffering. For speakers, the streams are only sent when the
XProtect Smart Client user uses the Talk to speaker function. This means that depending on how your speaker
streams are triggered to be recorded there is little or no pre-buffering available.
In most cases, you set up speakers to record when the XProtect Smart Client user uses the Talk to speaker
function. In such cases, no speaker pre-buffer is available.
To use the pre-buffer function, the devices must be enabled and sending a stream to the
system.
Pre-buffering is enabled by default with a pre-buffer size of three seconds and storage to the memory.
4. On the Client tab, specify the devices that relate to this camera.
Temporary pre-buffer recordings are stored either in the memory or on the disk:
2. Select the relevant device in the Overview pane and select the Record tab.
3. On the Location list, select Memory or Disk, and specify the number of seconds.
The number of seconds you specify must be sufficiently large to accommodate your requirements in the various
recording rules you define.
If you change the location to Memory, the system reduced the period to 15 seconds automatically.
When you create rules that trigger recording, you can select that recordings should start some time before the
actual event (pre-buffer).
Example: The below rule specifies that recording should start on the camera 5 seconds before motion is
detected on the camera.
232 | Configuration
Administrator manual | XProtect® VMS 2024 R1
To use the pre-buffer recording function in the rule, you must enable pre-buffering on the
device being recorded and you must set the pre-buffer length to at least the same length
as specified in the rule.
2. Select the relevant device in the Overview pane and select the Recording tab.
Under Storage, you can monitor and manage the databases for a device or a group of devices added to the
same recording server.
Above the table, you can see the selected database and its status. In this example, the selected database is the
default Local Default and the status is Recordings also located on other recording servers. The other server is
the recording server in building A.
233 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Name Description
Recordings also located on other The database is active and running and has recordings located in
recording servers storages on other recording servers as well.
Data for some of the devices The database is active and running and the system is moving data
chosen is currently moving to for one or more selected devices in a group from one location to
another location another.
Data for the device is currently The database is active and running and the system is moving data
moving to another location for the selected device from one location to another.
Information unavailable in failover The system cannot collect status information about the database
mode when the database is in failover mode.
Further down in the window, you can see the status of each database (OK, Offline or Old Storage), the location
of each database and how much space each database uses.
If all servers are online, you can see the total spaced used for the entire storage in the Total used space field.
For information about configuration of storage, see Storage tab (recording server).
When you select a new location to store recordings, the existing recordings will not be
moved. They will remain in the current location, with the conditions defined by the
configuration of the storage they belong to.
2. Select the relevant device in the Overview pane and select the Recording tab.
3. Click Select under Storage to select a recording storage for your devices to record in.
The recordings will archive according to the configuration for the storage that you select.
234 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Time spent on finding the best possible motion detection configuration for each camera helps you later avoid,
for example, unnecessary recordings. Depending on the physical location of the camera, it may be a good idea
to test motion detection settings under different physical conditions such as day/night and windy/calm weather.
You can specify settings related to the amount of changes required in a camera's view in order for the change to
be regarded as motion. You can, for example, specify intervals between motion detection analysis and areas of a
view in which motion should be ignored. You can also adjust the accuracy of the motion detection and thereby
the load on system resources.
Image quality
Before you configure motion detection for a camera, Milestone recommends that you have configured the
camera's image quality settings, for example resolution, video codec and stream settings. You do this on the
Settings tab in the Properties window for the device. If you later change image quality settings, you should
always test any motion detection configuration afterwards.
Privacy masks
If you have defined areas with permanent privacy masks, there is no motion detection
within these areas.
2. On the General tab, under When adding new camera devices automatically enable, select the Motion
detection check box.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Motion tab tab, select or clear the Motion detection check box.
235 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you disable motion detection for a camera, motion detection-related rules for the
camera do not work.
3. On the Motion tab, under Hardware acceleration select Automatic to enable hardware acceleration or
select Off to disable the setting.
Hardware accelerated video decoding for motion detection uses GPU resources on:
The load balancing between the different resources is done automatically. In the System Monitor node you can
verify if the current motion analysis load on the NVIDIA GPU resources is within the specified limits from the
System Monitor Thresholds node. The NVIDIA GPU load indicators are:
l NVIDIA decoding
l NVIDIA memory
l NVIDIA rendering
If the load is too high, you can add GPU resources to your recording server by installing
multiple NVIDIA display adapters. Milestone does not recommend the use of Scalable Link
Interface (SLI) configuration of your NVIDIA display adapters.
236 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Hardware accelerated video decoding for motion detection using NVIDIA GPUs requires
compute capability version 6.x (Pascal) or newer.
l To find the compute capability version of your NVIDIA product, visit the NVIDIA website
(https://developer.nvidia.com/cuda-gpus/).
l To see if video motion detection is hardware accelerated for a specific camera, enable logging on the
recoding server log file. Set level to Debug and diagnostics is logged to the DeviceHandling.log. The log
follows the pattern:
[time] [274] DEBUG – [guid] [name] Configured decoding: Automatic: Actual decoding: Intel/NVIDIA
The OS version of the recording server and CPU generation may impact performance of hardware accelerated
video motion detection. GPU memory allocation is often the bottleneck with older versions (typical limit is
between 0.5 GB and 1.7 GB).
Systems based on Windows 10 / Server 2016 and 6th generation CPU (Skylake) or newer can allocate 50% of
system memory to GPU and thereby removing or reducing this bottleneck.
6th generation Intel CPUs does provide hardware accelerated decoding of H.265, so the performance is
comparable with H.264 for these versions of CPU.
1. In the Site Navigation pane, select Devices, and then select Cameras.
4. Drag the slider to the left for a higher sensitivity level, and to the right for a lower sensitivity level.
The higher the sensitivity level, the less change is allowed in each pixel before it is regarded as motion.
The lower the sensitivity level, the more change in each pixel is allowed before it is regarded as motion.
Pixels in which motion is detected are highlighted in green in the preview image.
5. Select a slider position in which only detections you consider motion are highlighted.
237 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You can compare and set the exact sensitivity setting between cameras by the number in the right side of the
slider.
1. Drag the slider to the left for a higher motion level, and to the right for a lower motion level.
2. Select a slider position in which only detections that you consider motion are detected.
The black vertical line in the motion indication bar shows the motion detection threshold: When detected motion
is above the selected detection threshold level, the bar changes color from green to red, indicating a positive
detection.
Motion indication bar: changes color from green to red when above the threshold, indicating a positive motion
detection.
Areas with permanent privacy masks, are also excluded from motion detection. Select the
Show privacy masks check box to display them.
Excluding motion detection from specific areas helps you avoid detection of irrelevant motion, for example if the
camera covers an area where a tree is swaying in the wind or where cars regularly pass by in the background.
238 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you use exclude regions with PTZ cameras and you pan-tilt-zoom the camera, the excluded area does not
move accordingly because the area is locked to the camera image, and not the object.
1. To use exclude regions, select the Use exclude regions check box.
2. To define exclude regions, drag the mouse pointer over the required areas in the preview image while
you press the left mouse button. Right mouse button clears a grid section.
You can define as many exclude regions as needed. Excluded regions appear in blue:
The blue exclude areas only appear in the preview image on the Motion tab, not in any other preview images in
the Management Client or access clients.
239 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Presets tab, click New. The Add Preset window appears:
240 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. The Add Preset window displays a live preview image from the camera. Use the navigation buttons
and/or sliders to move the camera to the required position.
7. Select Locked if you want to lock the preset position. Only users with sufficient permissions can unlock
the position afterwards.
8. Click Add to specify presets. Keep adding until you have the presets you want.
9. Click OK. The Add Preset window closes, and adds the position to the Presets tab's list of available preset
positions for the camera.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Presets tab, select Use presets from device to import the presets into the system.
Any presets you have previously defined for the camera are deleted and affect any defined rules and
patrolling schedules as well as remove the presets available for the XProtect Smart Client users.
5. Click Edit if you want to change the display name of the preset (see Rename a preset position (type 2
only)).
6. If you later want to edit such device-defined presets, edit on the camera and then re-import.
It can be useful to have a default preset position because it allows you to define rules that specify that the PTZ
camera should go to the default preset position under particular circumstances, for example after you have
operated the PTZ camera manually.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Presets tab, under Preset positions, select the preset in your list of defined preset positions.
You can only define one preset position as the default preset position.
241 | Configuration
Administrator manual | XProtect® VMS 2024 R1
If you have selected Use default preset as PTZ home position in Options > General, the default preset position
will be used instead of PTZ camera’s defined home position.
A default preset position must be defined for the camera. If a default preset position is not defined, nothing will
happen when activating the Home button in a client.
2. On the General tab, in the Recording Server group, select Use default preset as PTZ home position.
3. Assign a preset position as the default preset position for the camera.
To assign a default preset position, see Assign a camera's preset position as default on page 241
1. In the Site Navigation pane, select Devices, and then select Cameras.
3. On the Presets tab, under Preset positions, select the preset position in the list of available preset
positions for the camera.
242 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. The Edit Preset window displays live video from the preset position. Use the navigation buttons and/or
sliders to change the preset position as required.
7. Select Locked if you want to lock the preset position. Only users with sufficient permissions can unlock
the position afterwards.
243 | Configuration
Administrator manual | XProtect® VMS 2024 R1
8. Click OK.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. Select the preset position in the Presets tab's list of available presets for the camera.
5. Change the name and add a description of the preset position if needed.
6. Select Locked if you want to lock the preset name. You can lock a preset name if you want to prevent
users in XProtect Smart Client or users with limited security permissions from updating the preset name
or deleting the preset. Locked presets are indicated with this icon . Only users with sufficient
permissions can unlock the preset name afterwards.
7. Click OK.
3. Select the preset position in the Presets tab's list of available preset positions for the camera.
4. Click Activate.
244 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Devices - Patrolling
Manual patrolling
Before you apply a patrolling profile in a rule, for example, you can test the patrolling profile with manual
patrolling. You can also use manual patrolling to take over patrolling from another user or from a rule-activated
patrolling, provided that you have a higher PTZ priority.
If the camera is already patrolling or controlled by another user, you can only start manual patrolling if you have
a higher priority.
If you start a manual patrolling while the camera runs a rule-activated system patrolling, the system resumes
this patrolling when you stop your manual patrolling. If another user runs a manual patrolling, but you have a
higher priority and start your manual patrolling, the other user's manual patrolling is not resumed.
If you do not stop your manual patrolling yourself, it will continue until a rule-based patrolling or a user with a
higher priority takes over. When the rule-based system patrolling stops, the system resumes your manual
patrolling. If another user starts a manual patrolling, your manual patrolling stops, and will not be resumed.
When you stop your manual patrolling and you have defined an end position for your patrolling profile, the
camera returns to this position.
Before you can work with patrolling, you must specify at least two preset positions for the
camera in the Presets tab, see Add a preset position (type 1).
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Patrolling tab, click Add. The Add Profile dialog box appears.
4. In the Add Profile dialog box, specify a name for the patrolling profile.
245 | Configuration
Administrator manual | XProtect® VMS 2024 R1
The new patrolling profile is added to the Profile list. You can now specify the preset positions and other settings
for the patrolling profile.
3. On the Patrolling tab, select the patrolling profile in the Profile list:
4. Click Add.
5. In the Select PTZ Preset dialog box, select the preset positions for your patrolling profile:
6. Click OK. The selected preset positions are added to the list of preset positions for the patrolling profile:
7. The camera uses the preset position at the top of the list as the first stop when it patrols according to the
patrolling profile. The preset position in the second position from the top is the second stop, and so forth.
246 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Patrolling tab, select the patrolling profile in the Profile list.
4. Select the preset position for which you want to change the time:
You can only customize speed for transitions if your camera supports PTZ scanning and is of the type where
preset positions are configured and stored on your system's server (type 1 PTZ camera). Otherwise the Speed
slider is grayed out.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Patrolling tab, in the Profile list, select the patrolling profile .
247 | Configuration
Administrator manual | XProtect® VMS 2024 R1
6. Specify the estimated transition time (in number of seconds) in the Expected time (sec) field.
7. Use the Speed slider to specify the transition speed. When the slider is in its rightmost position, the
camera moves with its default speed. The more you move the slider to the left, the slower the camera
moves during the selected transition.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. On the Patrolling tab, in the Profile list, select the relevant patrolling profile.
4. Select the Go to specific position on finish check box. This opens the Select preset dialog box.
You can select any of the camera's preset positions as the end position, you are
not limited to the preset positions used in the patrolling profile.
When patrolling according to the selected patrolling profile ends, the camera moves to the specified end
position.
248 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Administrators with security permissions to run a reserved PTZ session can run the PTZ camera in this mode.
This prevents other users from taking control over the camera. In a reserved PTZ session, the standard PTZ
priority system is disregarded to avoid that users with a higher PTZ priority interrupt the session.
You can operate the camera in a reserved PTZ session both from XProtect Smart Client and the Management
Client.
To reserve a PTZ session can be useful, if you need to make urgent updates or maintenance to a PTZ camera or
its presets without being interrupted by other users.
1. In the Site Navigation pane, select Devices and then select Cameras.
3. Select the PTZ session in the Presets tab, and click Reserved.
You cannot start a reserved PTZ session if a user with a higher priority than yours controls
the camera or if another user has already reserved the camera.
The Release button allows you to release your current PTZ session so another user can control the camera.
When you click Release, the PTZ session ends immediately and will be available for the first user to operate the
camera.
Administrators assigned with the security permission Release PTZ session have the permissions to release
other users' reserved PTZ session at any time. This can, for example, be useful in occasions where you need to
maintain the PTZ camera or its presets, or if other users have accidentally blocked the camera in urgent
situations.
You can specify how much time should pass before regular patrolling is resumed for all PTZ cameras on your
system:
249 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. On the Options window's General tab, select the amount of time in the:
Add an event
2. Select the Events tab and click Add. This opens the Select Driver Event window.
4. If you want to see an entire list of all events, allowing you to add events that have already been added,
select Show already added events.
5. Click OK.
Delete an event
When you delete an event, it affects all rules that use the event.
250 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You can specify properties for each event you have added. The number of properties depends on the device and
the event. In order for the event to work as intended, you must specify some or all of the properties identically on
the device as well as on the [Events] tab.
To be able to specify different properties for different instances of an event, you can add an event more than
once.
Example: You have configured the camera with two motion windows, called A1, and A2. You have added two
instances of the Motion Started (HW) event. In the properties of one instance, you have specified the use of
motion window A1. In the properties of the other instance, you have specified the use of motion window A2.
When you use the event in a rule, you can specify that the event should be based on motion detected in a specific
motion window for the rule to be triggered:
3. On the Privacy masking tab, select or clear Privacy masking check box.
251 | Configuration
Administrator manual | XProtect® VMS 2024 R1
In a Milestone Interconnect setup, the central site disregards privacy masks defined in a
remote site. If you want to apply the same privacy masks, you must redefine it on the
central site.
3. On the Privacy masking tab, to cover an area with a privacy mask, first select Permanent mask or
Liftable mask to define if you want a permanent or liftable privacy mask.
4. Drag the mouse pointer over the preview. Left-click to select a grid cell. Right-click to clear a grid cell.
252 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. You can define as many privacy mask areas as needed. Areas with permanent privacy masks appear in
purple and areas with liftable privacy masks in green.
6. Define how the covering of the areas should appear in the video when shown in the clients. Use the
sliders to go from a light blurring to a full nontransparent mask.
7. In XProtect Smart Client, check that the privacy masks appear as you defined.
When you change the timeout, remember to do it for the Smart Client profile associated
with the role that has the permission to lift privacy masks.
253 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Under Smart Client Profiles, select the relevant Smart Client profile.
l 2 minutes
l 10 minutes
l 30 minutes
l 1 hour
l 2 hours
4. Click Save.
254 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select Security and then select Roles.
2. Select the role that you want to give permission to lift privacy masks.
4. Select the Allow check box for the Lift privacy masks permission.
Users that you assign to this role, can lift privacy masks configured as liftable masks for himself/herself as well
as authorize the lift for other XProtect Smart Client users.
To configure a report:
255 | Configuration
Administrator manual | XProtect® VMS 2024 R1
3. If you want to modify the report, you can change the front page and the formatting.
4. Click Export, and the system creates the report as a PDF file.
For more information about reports, see Print a report with your system configuration on page 291.
Clients
Example from XProtect Smart Client: Arrow indicates a view group, which contains a logical group (called
Amenities), which in turn contains 3 views.
By default, each role you define in the Management Client is also created as a view group. When you add a role
in the Management Client, the role by default appears as a view group for use in clients.
l You can assign a view group based on a role to users/groups assigned to the relevant role. You may
change these view group permissions by setting this up in the role afterwards
Example: If you create a role with the name Building A Security Staff, it appears in XProtect Smart Client
as a view group called Building A Security Staff.
In addition to the view groups, you get when adding roles, you may create as many other view groups as
you like. You can also delete view groups, including those automatically created when adding roles
l Even if a view group is created each time, you add a role, view groups do not have to correspond to roles.
You can add, rename or remove any of your view groups if required
If you rename a View group, client users already connected must log out and log in again
before the name change is visible.
2. Enter the name and an optional description of the new view group and click OK.
256 | Configuration
Administrator manual | XProtect® VMS 2024 R1
No roles can use the newly added view group until you have specified such permissions. If
you have specified which roles that can use the newly added view group, client users that
are already connected and who have the relevant roles must log out and log in again
before they can see the view group.
3. In the Add Smart Client Profile dialog box, enter a name and description of the new profile and click OK.
4. In the Overview pane, click the profile you created to configure it.
5. Adjust settings on one, more or all of the available tabs and click OK.
1. Click Smart Client Profiles, right-click the profile in the Overview pane, select Copy Smart Client Profile.
2. In the dialog box that appears, give the copied profile a new unique name and description. Click OK.
3. In the Overview pane, click the profile you just created to configure it. This is done by adjusting settings
on one, more, or all of the available tabs. Click OK.
Create and set up Smart Client profiles, roles and time profiles
When you work with Smart Client profiles, it is important to understand the interaction between Smart Client
profiles, roles and time profiles:
l Smart Client profiles deal with user permission settings in XProtect Smart Client
l Roles deal with security settings in clients, MIP SDK and more
Together these three features provide unique control and customizing possibilities with regards to XProtect
Smart Client user permissions.
257 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Example: You need a user in your XProtect Smart Client setup who should only be allowed to view live video (no
playback) from selected cameras, and only during normal working hours (8.00 to 16.00). One way of setting this
up could be as follows:
1. Create a Smart Client profile, and name it, for example, Live only.
3. Create a time profile, and name it, for example, Daytime only.
5. Create a new role and name it, for example, Guard (Selected cameras).
7. Assign the Live only Smart Client profile and the Daytime only time profile to the Guard (Selected
cameras) role to connect the three elements.
You now have a mix of the three features creating the wanted result and allowing you room for easy fine-tuning
and adjustments. You can do the setup in a different order, for example, creating the role first and then the
Smart Client profile and the time profile, or any other order you prefer.
258 | Configuration
Administrator manual | XProtect® VMS 2024 R1
259 | Configuration
Administrator manual | XProtect® VMS 2024 R1
260 | Configuration
Administrator manual | XProtect® VMS 2024 R1
261 | Configuration
Administrator manual | XProtect® VMS 2024 R1
l 50
l 100
l 500
l Unrestricted
Default settings
l Re-export is prevented
Steps:
262 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. To make a restricted format available in XProtect Smart Client, find the setting and select Available.
5. To enable operators to change a setting in XProtect Smart Client, clear the Locked check box next to the
relevant setting.
7. (optional) Log in to XProtect Smart Client to verify that your settings have been applied.
263 | Configuration
Administrator manual | XProtect® VMS 2024 R1
3. In the Add Management Client Profile dialog box, enter a name and description of the new profile and
click OK.
4. In the Overview pane, click the profile you created to configure it.
5. On the Profile tab, select or clear functionality from the Management Client profile.
1. Click Management Client Profile, right-click the profile in the Overview pane, select Copy Management
Client Profile.
2. In the dialog box that appears, give the copied profile a new unique name and description. Click OK.
3. In the Overview pane, click the profile and go to the Info tab or Profile tab to configure the profile.
2. On the Info tab in the Role Settings window, associate a profile with a role. For more information, see
Info tab (roles).
Management Client profiles only handle the visual representation of system functionality, not the actual access
to it.
2. Click the Overall Security tab and select the appropriate check boxes. For more information, see Overall
Security tab (roles) on page 497.
On the Overall Security tab, make sure to enable the Connect security permission in
order to grant all roles access to the Management Server.
264 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Apart from the built-in administrator role, only users associated with a role that has been
granted Manage security permissions for the management server on the Overall
Security tab, can add, edit, and delete Management Client profiles.
You can change settings for the visibility of all Management Client elements. By default,
the Management Client profile can see all functionality in the Management Client.
3. Clear the check boxes for the relevant functionality in order to remove the functionality visually from the
Management Client for any Management Client user with a role associated with this Management Client
profile.
Matrix
A Matrix recipient is a computer with XProtect Smart Client, that is defined as a Matrix recipient in Management
Client.
If you use Matrix, you can push video from any camera on your system's network to any running Matrix
recipient.
To see a list of Matrix recipients added in the Management Client, expand Client in the Site Navigation pane,
then select Matrix. A list of Matrix configurations is displayed in the Properties pane.
In Management Client, you must add each Matrix recipient that you would like to receive
Matrix-triggered video.
1. In the Site Navigation pane, expand Rules and Events > Rules. Right-click Rules to open the Manage
Rule wizard. In the first step, select a rule type and in the second step, a condition.
2. In Manage Rule's step 3 (Step 3: Actions) select the Set Matrix to view <devices> action.
265 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. In the Select Matrix Configuration dialog box, select the relevant Matrix-recipient, and click OK.
5. Click the devices link in the initial rule description and select from which cameras you would like to send
video to the Matrix-recipient, then click OK to confirm your selection.
6. Click Finish if the rule is complete or define if required additional actions and/or a stop action.
If you delete a Matrix-recipient, any rule that includes the Matrix-recipient stops working.
1. In the Address field enter the IP address or the host name of the required Matrix recipient.
2. In the Port field enter the port number used by the Matrix recipient installation.
4. Click OK.
Your system does not verify that the specified port number or password is correct or that
the specified port number, password, or type corresponds with the actual Matrix recipient.
Make sure that you enter the correct information.
1. In XProtect Smart Client, create the relevant views and Matrix positions that share the same port number
and password.
2. In the Management Client, add the relevant XProtect Smart Client as a Matrix-recipient.
266 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Add rules
When you add rules, you are guided by the wizard Manage Rule which only lists relevant options.
It ensures that required elements are not missing from a rule. Based on your rule's content, it automatically
suggests suitable stop actions, that is what should take place when the rule no longer applies, ensuring that you
do not unintentionally create a never-ending rule.
Events
When you add an event-based rule, you can select different types of events.
l See Events overview to get an overview and a description of the event types that you can select.
Some of the actions require a stop action. For example, if you select the action Start recording, recording starts
and potentially continues indefinitely. As a result, the action Start recording has a mandatory stop action called
Stop recording.
The Manage Rule wizard makes sure you specify stop actions when necessary:
Selecting stop actions. In the example, note the mandatory stop action (selected, dimmed), the non-relevant stop
actions (dimmed) and the optional stop actions (selectable).
l See Actions and stop actions for an overview of start and stop actions that you can select.
Create a rule
1. Right-click the Rules item > Add Rule. This opens the Manage Rule wizard. The wizard guides you
through specifying the content of your rule.
2. Specify a name and a description of the new rule in the Name and Description fields respectively.
3. Select the relevant type of condition for the rule: either a rule which performs one or more actions when
a particular event occurs, or a rule which performs one or more actions when you enter a specific period
of time.
267 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. Click Next to go to the wizard's second step. On the wizard's second step, define further conditions for
the rule.
Depending on your selections, edit the rule description in the lower part of the wizard window:
Click the underlined items in bold italics to specify their exact content. For example, clicking the days link
in our example lets you select one or more days of the week on which the rule should apply.
6. Having specified your exact conditions, click Next to move to the next step of the wizard and select which
actions the rule should cover. Depending on the content and complexity of your rule, you may need to
define more steps, such as stop events and stop actions. For example, if a rule specifies that a device
should perform a particular action during a time interval (for example, Thursday between 08.00 and
10.30), the wizard may ask you to specify what should happen when that time interval ends.
7. Your rule is by default active once you have created it if the rule's conditions are met. If you do not want
the rule to be active straight away, clear the Active check box.
8. Click Finish.
Validate rules
You can validate the content of an individual rule or all rules in one go. When you create a rule, the Manage Rule
wizard ensures that all of the rule's elements are valid.
When a rule has existed for some time, one or more of the rule's elements may have been affected by other
configuration, and the rule may no longer work. For example, if a rule is triggered by a particular time profile, the
rule does not work if you have deleted that time profile or if you no longer have permissions to it. Such
unintended effects of configuration may be hard to keep an overview of.
Rule validation helps you keep track of which rules have been affected. Validation takes place on a per-rule basis
and each rule is validated by themselves. You cannot validate rules against each other, for example in order to
see whether one rule conflicts with another rule, not even if you use the Validate All Rules feature.
268 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Validate a rule
3. Click OK.
1. Right-click the Rules item and then click Validate All Rules. .
2. Click OK.
A dialog box informs you whether the rule(s) validated successfully or not. If you chose to validate more than one
rule and one or more rules did not succeed, the dialog box lists the names of the affected rules.
You cannot validate whether configuration of requirements outside the rule itself may
prevent the rule from working. For example, a rule specifying that recording should take
place when motion is detected by a particular camera is validated if the elements in the
rule itself are correct, even if motion detection, which is enabled on a camera level, not
through rules, has not been enabled for the relevant camera.
2. Select either:
Edit Rule or Copy Rule or Rename Rule. The wizard Manage Rule opens.
3. If you select Copy Rule, the wizard opens displaying a copy of the selected rule. Click Finish to create a
copy.
4. If you select Edit Rule, the wizard opens and you can enter changes. Click Finish to accept the changes.
269 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. If you select Rename Rule, you can rename the rule name text directly.
4. An icon with a red x indicates that the rule is deactivated in the Rules list:
Activating a rule
When you want to activate the rule again, select the rule, select the Activate check box, and save the setting.
2. In the Time Profile window, enter a name for the new time profile in the Name field. Optionally, enter a
description of the new time profile in the Description field.
3. In the Time Profile window's calendar, select either Day View, Week View or Month View, then right-
click inside the calendar and select either Add Single Time or Add Recurring Time.
4. When you have specified the time periods for your time profile, click OK in the Time Profile window. Your
system adds your new time profile to the Time Profiles list. If at a later stage you wish to edit or delete
the time profile, you do that from the Time Profiles list as well.
When you select Add Single Time, the Select Time window appears:
270 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Select Time window, specify Start time and End time. If the time is to cover whole days, select the
All day event box.
2. Click OK.
When you select Add Recurring Time, the Select Recurring Time window appears:
1. In the Select Time window, specify time range, recurrence pattern and range of recurrence.
2. Click OK.
A time profile can contain several periods of time. If you want your time profile to contain
further periods of time, add more single times or recurring times.
271 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Recurring time
For example:
The time is based on the local time settings of the server on which Management Client is
installed.
2. Edit the time profile as needed. If you have made changes to the time profile, click OK in the Time Profile
window. You return to the Time Profiles list.
In the Time Profile Information window, you can edit the time profile as needed.
Remember that a time profile may contain more than one time period, and that time
periods may be recurring. The small month overview in the top right corner can help you
get a quick overview of the time periods covered by the time profile, as dates containing
specified times are highlighted in bold.
In this example, the bold dates indicate that you have specified time periods on several
days, and that you have specified a recurring time on Mondays.
272 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. In the Time Profiles list, right-click Time Profiles, and select Add Day Length Time Profile.
3. In the Day Length Time Profile window, refer to the properties table below to fill in the needed
information. To deal with transition periods between lightness and darkness, you can offset activation
and deactivation of the profile. The time and the name of months are shown in the language used your
computer's language/regional settings.
4. To see the location of the entered geographic coordinates in a map, click Show Position in Browser. This
opens a browser where you can see the location.
5. Click OK.
Name Description
Geo Geographic coordinates indicating the physical location of the camera(s) assigned to the
coordinates profile.
Sunrise offset Number of minutes (+/-) by which activation of the profile is offset by sunrise.
Sunset offset Number of minutes (+/-) by which deactivation of the profile is offset by sunset.
Time zone Time zone indicating the physical location of the camera(s).
Before you can create notification profiles, you must specify mail server settings for email
notifications. For more information, see Requirements for creating notification profiles.
1. Expand Rules and Events, right-click Notification Profiles > Add Notification Profile. This opens the Add
Notification Profile wizard.
273 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. To send a test email notification to the specified recipients, click Test E-mail.
5. To include pre-alarm still images, select Include images, and specify number of images, time between
images and whether to embed images in emails or not.
6. To include AVI video clips, select Include AVI, and specify the time before and after event and frame rate.
274 | Configuration
Administrator manual | XProtect® VMS 2024 R1
7. Click Finish.
2. In the Manage Rule wizard, click Next to go to the Select actions to perform list and select Send
notification to <profile>.
3. Select the relevant notification profile and select the cameras that recordings to include in the notification
profile's email notifications should come from.
You cannot include recordings in the notification profile's email notifications unless something is actually being
recorded. If you want still images or AVI video clips in the email notifications, verify that the rule specifies that
recording should take place. The following example is from a rule which includes both a Start recording action
and a Send notification to action:
No matter how you want to use user-defined events, you must add each user-defined
event through the Management Client.
3. Enter a name for the new user-defined event, and click OK. The newly added user-defined event now
appears in the list in the Overview pane.
The user can now trigger the user-defined event manually in XProtect Smart Client if the user has permissions to
do so.
275 | Configuration
Administrator manual | XProtect® VMS 2024 R1
If you delete a user-defined event, this affects any rules in which the user-defined event is
in use. Also, a deleted user-defined event only disappears from XProtect Smart Client
when the XProtect Smart Client users log out.
If you rename a user-defined event, already connected XProtect Smart Client users must
log out and log in again before the name change is visible.
1. Expand Rules and Events, right-click Analytics Events and select Add New.
2. In the Properties window, enter a name for the event in the Name field.
4. In the toolbar, click Save. You can test the validity of the event by clicking Test Event. You can continually
correct errors indicated in the test and run the test as many times as you want and from anywhere in the
process.
1. Click an existing analytics event to view the Properties window, where you can edit relevant fields.
2. You can test the validity of the event by clicking Test Event. You can continually correct errors indicated
in the test and run the test as many times as you want and from anywhere in the process.
In the toolbar, go to the Tools > Options > Analytics Events tab to edit relevant settings.
276 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. Intheproperties,clicktheTestEventbutton.Awindowappearsthatshowsallthepossiblesourcesofevents.
3. Select the source of your test event, for example a camera. The window is closed and a new window
appears that goes through four conditions that must be fulfilled for the analytics event to work.
As an additional test, in XProtect Smart Client you can verify that the analytics event was
sent to the event server. To do this, open XProtect Smart Client and view the event in the
Alarm Manager tab.
Requirements
You have enabled generic events and specified the source destinations allowed. For more information, see
Generic Events tab (options) on page 389.
3. Fill in the needed information and properties. For more information, see Generic Events and Data
sources (properties) on page 492.
277 | Configuration
Administrator manual | XProtect® VMS 2024 R1
4. (optional) To validate that the search expression is valid, enter a search string in the Check if expression
matches event string field that corresponds to the expected packages:
In XProtect Smart Client, you can verify whether your generic events have been received
by the event server. You do this in the Alarm List on the Alarm Manager tab by selecting
Events.
Authentication
4. Enter the information about the claim. For more information, see Register claims.
Claims that you want to use on roles must be added to the IDP configuration before they can be selected in the
roles. The claims can be added on the External IDP tab in the Options dialog box. External IDP tab (options) on
page 380. If a claim is not added to the IDP configuration, you will not be able select the claim in the roles.
When using claims to link external IDP users to VMS roles, the external IDP users are actually not added to the
roles like regular basic or AD users. Instead they are linked dynamically with each new session based on their
current claims.
1. From the Site Navigation pane in Management Client, expand the Security node and select Roles.
2. Select a role, select the External IDP tab, and select Add.
3. Select an external IDP and a claim name and enter a claim value.
The claim name must be written exactly as the claim name coming from the
external IDP.
4. Select OK.
278 | Configuration
Administrator manual | XProtect® VMS 2024 R1
If an external IDP is deleted, all users connected to the VMS via the external IDP are also
deleted. All registered claims that are connected to the external IDP are removed and any
mappings to roles are removed as well.
Under Effective Roles, you can get an overview of the dynamic role of external IDP users. That is the role
membership which is based on the external IDP user's last login session. For more information, see View
effective roles on page 281.
The following illustration provides an overview of the external IDP authentication flow. The flow uses Microsoft
Entra ID (Azure) to illustrate the authentication process.
279 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Computer field in XProtect Smart Client or XProtect Management Client, enter the address of the
XProtect VMS computer and select the external IDP under Authentication. The User name and
Password fields are disabled.
2. Click Connect to open the external IDP's authentication page from a browser.
3. On the authentication page, enter your email address and clicks Next.
5. When you get a confirmation that the user authentication is successful, you can close the browser . The VMS
client continues the regular login process and when finished, the client is shown and you are logged in.
For more information about logging into XProtect Web Client, see Logging in and about logging into XProtect
Mobile, see Log in to the XProtect Mobile app.
Under Tools > Options > External IDP, you can configure the name of the external IDP
that is shown on the Authentication list.
If the external IDP is disabled by, for example, a restore or a change of password, the
option to log in via an external IDP is not available on the Authentication list. Also, if the
external IDP is disabled, the client secret received from the external IDP disappears from
the Client secret field on the External IDP tab under Tools > Options.
Security
2. Select Add Role. This opens the Add Role dialog box.
3. Enter a name and description of the new role and click OK.
4. The new role is added to the Roles list. By default, a new role does not have any users/groups associated
with it, but it does have a number of default profiles associated.
5. To choose different Smart Client and Management Client profiles, evidence lock profiles or time profiles,
click the drop-down lists.
6. You can now assign users/groups to the role, and specify which of the system’s features they can access.
For more information, see Assign/remove users and groups to/from roles on page 282 and Roles (Security node)
on page 495.
280 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Copy a role
If you have a role with complicated settings and/or permissions and need a similar or almost similar role, it
might be easier to copy the already existing role and make minor adjustments to the copy than to creating a new
role from scratch.
1. Expand Security, click Roles, right-click the relevant role and select Copy Role.
2. In the dialog box that opens, give the copied role a new unique name and description.
3. Click OK.
Rename a role
If you rename a role, this does not change the name of the view group based upon the role.
3. In the dialog box that opens, change the name of the role.
4. Click OK.
Delete a role
3. Click Yes.
If you delete a role, this does not delete the view group based upon the role.
With the Effective Roles feature, you can view all roles of a selected user or group. This is practical if you are
using groups and it is the only way of viewing which roles a specific user is a member of.
1. Open the Effective Roles window by expanding Security, then right-clicking Roles and select Effective
Roles.
2. If you want information about a basic user, enter the name in the User name field. Click Refresh to
display the roles of the user.
3. If you use Windows users or groups in Active Directory, click the "..." browse button. Select object type,
enter the name, and click OK. The user's roles appear automatically.
281 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Expand Security and select Roles. Then select the required role in the Overview pane:
2. In the Properties pane, select the Users and Groups tab at the bottom.
1. Select Windows user. This opens the Select Users, Computers and Groups dialog box:
2. Verify that the required object type is specified. If, for example, you need to add a computer, click Object
Types and mark Computer. Also verify that the required domain is specified in the From this location
field. If not, click Locations to browse for the required domain.
3. In the Enter the object names to select box, enter the relevant user names, initials, or other types of
identifier which Active Directory can recognize. Use the Check Names feature to verify that Active
Directory recognizes the names or initials that you have entered. Alternatively, use the "Advanced..."
function to search for users or groups.
4. Click OK. The selected users/groups are now added to the Users and Groups tab's list of users who you
have assigned the selected role. You can add more users and groups by entering multiple names
separated by a semicolon (;).
1. Select Basic User. This opens the Select Basic Users to add to Role dialog box:
2. Select the basic user(s) that you want to assign to this role.
4. Click OK. The selected basic user(s) are now added to the Users and Groups tab's list of basic users who
you have assigned the selected role.
1. On the Users and Groups tab, select the user or group you want to remove and click Remove in the
lower part of the tab. You can select more than one user or group, or a combination of groups and
individual users, if you need to.
2. Confirm that you want to remove the selected user(s) or and group(s). Click Yes.
A user may also have roles through group memberships. When that is the case, you
cannot remove the individual user from the role. Group members may also hold roles as
individuals. To find out which roles users, groups, or individual group members have, use
the View Effective Roles function.
282 | Configuration
Administrator manual | XProtect® VMS 2024 R1
There are two user account types in Milestone XProtect VMS: Basic users and Windows users.
Basic users are user accounts that you create in Milestone XProtect VMS. It is a dedicated system user account
with a basic user name and password authentication for the individual user.
Windows users are user accounts that you add through Microsoft's Active Directory.
There are some differences between basic users and Windows users:
l Basic users are authenticated by a user name and password combination and are specific to one
system/site. Note that even if a basic user created at one federated site has the same name and
password as a basic user on another federate site, the basic user only has access to the site it has been
created on.
l Windows users are authenticated based on their Windows login and are specific to a machine.
You can define the login settings for basic users in a JSON file, which is located here: \\Program
Files\Milestone\Management Server\IIS\IDP\appsettings.json.
LoginSettings
Define the length of time (in minutes) a login session will expire if the user
"ExpireTimeInMinutes": 5
takes no action.
LockoutSettings
"LockoutTimeSpanInMinutes":
Define the length of time (in minutes) a user will be locked out.
5
"MaxFailedAccessAttempts": Define the number of attempts a user will have to log in before being
5 locked out.
PasswordSettings
"RequireDigit": true Define whether base digits (0 through 9) are required in the password.
"RequireLowercase": true Define whether lowercase characters are required in the password.
283 | Configuration
Administrator manual | XProtect® VMS 2024 R1
"RequireUppercase": true Define whether uppercase characters are required in the password.
Define the number of characters that are required in the password. There
"RequiredLength": 8 is a minimum password length of {0} characters and a maximum
password length of 255 characters.
2. In the Basic Users pane, right-click and select Create Basic User.
3. Specify a user name and a password. Repeat the password to be sure you have specified it correctly.
The password must meet the complexity as defined in the appsettings.json file (see Configure login
settings for basic users on page 283).
4. Specify if the basic user should change password on next login. Milestone recommends that you select
the check box so that basic users can specify their own passwords when they log in for the first time.
You should only clear the check box when you create basic users that cannot change their password.
Such basic users are, for example, system users, that are used for plug-ins and server services
authentication.
284 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. In the Site Navigation pane, select Servers > Recording Servers. This opens a list of recording servers.
3. In the Overview pane, select the relevant recording server and go to the Info tab.
If encryption is enabled to clients and servers that retrieve data streams from the recording server, a
padlock icon appears in front of the local web server address and the optional web server address.
System Dashboard
285 | Configuration
Administrator manual | XProtect® VMS 2024 R1
If the task is not progressing as expected, you can probably find the cause in your hardware or network. A few
examples are server not running, server error, too little bandwidth, or connection loss.
1. In the Site Navigation pane, select the System Dashboard > Current Tasks.
The information shown in the Current Tasks window is not dynamically updated but is a snapshot of the current
tasks from the moment you opened the window. If you have had the window open for some time, refresh the
information by selecting the Refresh button in the lower right corner of the window.
The system monitor functionality requires that the Data Collector service is running and
only works on computers that use a Gregorian (Western) calendar.
On the System monitor dashboard, you can easily get an overview of your VMS system's well-being. The state
of your hardware is visually represented by tiles and their colors: green (running), yellow (warning), and red
(critical). The tiles can also have error or warning icons when one or more hardware pieces in a faulty state.
By default, the system displays tiles that represent all Recording servers, All servers, and All cameras. You can
customize the monitoring parameters of these default tiles and create new tiles. For example, you can set up
tiles to represent a single server, a single camera, a group of cameras, or a server group.
Monitoring parameters are, for example, CPU usage or memory available for a server. A tile monitors only the
monitoring parameters you have added to the tile. See Add a new camera or server tile on the System monitor
dashboard on page 289, Edit a camera or server tile on the System monitor dashboard on page 289, and Delete
a camera or server tile on the System monitor dashboard on page 290 for more information.
286 | Configuration
Administrator manual | XProtect® VMS 2024 R1
System monitor thresholds allow you to define and adjust the thresholds when tiles on the System monitor
dashboard should visually indicate that your system hardware changes state. For example, when the CPU usage
of a server changes from a normal state (green) state to a warning state (yellow) or from a warning state
(yellow) to a critical state (red).
The system has default threshold values for all hardware of the same type so that you can start monitoring the
state of your system hardware from the moment your system is installed and you have added hardware. You
can also set up threshold values for individual servers, cameras, disks, and storage. To change threshold values,
see Edit thresholds for when hardware states should change on page 290.
To ensure that you do not see a Critical or Warning state in cases where the usage of or the load on your
system hardware reaches a high threshold value only for a second or similar, use Calculation interval. With the
correct calculation interval setting, you will not receive false-positive alerts about exceeded thresholds but only
alerts about sustained issues with, for example, CPU usage or memory consumption.
You can also set up rules (see Rules (explained)) to perform specific actions or activate alarms when a threshold
changes from one state to another.
287 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You can edit the thresholds for when your hardware is in one of the three states. For more information, see Edit
thresholds for when hardware states should change on page 290.
The System monitor dashboard answers questions like: Are all server services and cameras running? Are the
CPU usage and available memory on the different servers sufficient so everything is recorded and available for
viewing?
1. In the Site Navigation pane, select System Dashboard > System Monitor.
2. If all tiles are green and without warning or error icons, all monitoring parameters and all servers and
cameras represented by the tiles are fine and running.
If one or more tiles have a warning or error icon or are completely yellow or red, select one of these tiles
to troubleshoot.
3. In the hardware list with monitoring parameters (bottom of the window), find the hardware that is not
running. Place your mouse over the red cross sign next to the hardware to read what the problem is.
4. Optionally, select Details to the right side of the hardware to see how long the problem has been there.
Enable the collections of historical data to see the state of your hardware over time. For more
information, see Collect historical data of hardware states on page 289.
5. Find a way to fix the problem. For example, computer restart, server service restart, replacement of a
faulty hardware piece or other.
Are there periods where the CPU usage, bandwidth, or other hardware are challenged? Find the answer to this
with the System Monitor functionality and decide if you need to upgrade your hardware or buy new to avoid it in
the future.
Remember to enable the collection of historical data. See Collect historical data of hardware states on page 289.
1. In the Site Navigation pane, select System Dashboard > System Monitor.
2. In the System Monitor window, select a tile with the hardware you want to know the historical well-being
of, or from the lower part of the window, select a server or camera.
4. For servers, select History to the right of the hardware that you want to investigate. For cameras, select
the link.
288 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You can only create historical reports with data from the recording server where the
device is currently located.
If you access the system monitor's details from a server operating system, you may
experience a message regarding Internet Explorer Enhanced Security Configuration.
Follow the instructions to add the System Monitor page to the Trusted sites zone before
proceeding.
1. In the Site Navigation pane, select System Dashboard > System Monitor.
3. In the Customize dashboard window that opens, select Collect historical data.
4. Select a sampling interval. The shorter the interval, the more load on the SQL Server database,
bandwidth, or other hardware. The sampling interval of historical data also determines how detailed the
graphs are.
1. In the Site Navigation pane, select System Dashboard > System Monitor.
3. In the Customize dashboard window that opens, select New under Server tiles or Camera tiles.
4. In the New server tile/New camera tile window, select the cameras or servers to monitor.
5. Under Monitoring parameters, select or clear check boxes for any parameters to add or remove from
the tile.
6. Select OK. The new server or camera tile is now added to the tiles displayed on your dashboard.
289 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select System Dashboard > System Monitor.
3. In the Customize dashboard window that opens, select the tile you want to change under Server tiles or
Camera tiles and select Edit.
4. In the Edit dashboard server/camera tile window, select all cameras or servers, a camera or server
group, or individual cameras or servers to change their monitoring parameters.
5. Under Monitoring parameters, select the monitoring parameters you want to monitor.
6. Select OK.
1. In the Site Navigation pane, select System Dashboard > System Monitor.
3. In the Customize dashboard window that opens, select the tile you want to change under Server tiles or
Camera tiles.
4. Select Delete.
You can change thresholds for different types of hardware. For more information, see System Monitor
Thresholds (System Dashboard node) on page 551.
As a default, the system is set up to show threshold values for all units of the same hardware type, for example,
all cameras or servers. You can change these default threshold values.
You can also set up threshold values for individual servers or cameras or a subset of these to allow, for example,
that some cameras use a higher Live FPS or Recording FPS than other cameras.
290 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select System Dashboard > System Monitor Thresholds.
2. Select the Enabled check box for the relevant hardware if you have not already enabled it. The figure
below shows an example.
3. Drag the threshold control slider up or down to increase or decrease the threshold value. There are two
sliders available for each hardware piece shown in the threshold control, separating the Normal,
Warning, and Critical states.
4. Enter a value for the calculation interval or keep the default value.
6. If you want to specify rules for certain events or within specific time intervals, select Create rule.
7. Once you have set the thresholds levels and calculation intervals, select File > Save from the menu.
Find an evidence lock by filtering after, for example, who created it or when.
1. In the Site Navigation pane, select System Dashboard > Evidence Lock.
2. Get an overview and find the relevant evidence locks. You can filter after and sort the different metadata
related to the evidence locks.
All information shown in the Evidence Lock window is snapshots. Press F5 to refresh.
291 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you create a configuration report (PDF format), you can add any possible elements of your system to the
report. You can, for example, include licenses, device configuration, alarm configuration, and much more. You
can select the Exclude sensitive data option to create a GDPR compliant report (enabled by default). You can
also customize the font, the page setup, and the front page.
2. Select the elements that you want to include or exclude in your report.
3. Optional: If you have selected to include a frontpage, select Front Page to customize the information on
your front page. In the window that appears, fill in the needed info.
4. Select Formatting to customize your font, page size, and margins. In the window that appears, select the
wanted settings.
5. When you are ready to export, select Export and select a name and save location for your report.
Only users with administrator permissions in the VMS system can create configuration
reports.
Metadata
l Other, non-metadata Milestone search categories and search filters, for example
Motion, Bookmarks, Alarms, and Events
1. In XProtect Management Client, in the Site Navigation pane, select Metadata Use > Metadata Search.
2. In the Metadata Search pane, select the search category that you want to change visibility settings for.
3. To enable the visibility of a search category or search filter, select the corresponding check box. To
disable the visibility of a search category or search filter, clear the check box.
292 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Alarms
Add an alarm
To define an alarm, you need to create an alarm definition, where you specify, for example, what triggers the
alarm, instructions on what the operator needs to do, and what or when the alarm stops. For detailed
information about the settings, see Alarm Definitions (Alarms node).
1. In the Site Navigation pane, expand Alarms, and right-click Alarm Definitions.
l Name: Enter a name for the alarm definition. The name of the alarm definition appears whenever
the alarm definition is listed.
l Instructions: You can write instructions for the operator who receives the alarm.
l Triggering event: Use the drop-down menus to select an event type and an event message to be
used when the alarm is triggered.
A list of selectable triggering events. The one highlighted is created and customized using analytics
events.
l Sources: Select the cameras or other devices that the event should originate from to trigger the
alarm. Your options depend on the type of event you have selected.
l Time profile: If you want the alarm to be activated during a specific time interval, select the radio
button and then a time profile in the drop-down menu.
l Event based: If you want the alarm definition to be activated by an event, select the radio button
and specify the event that will activate the alarm definition. You must also specify an event that
will deactivate the alarm definition.
4. In the Time limit drop-down menu, specify a time limit for when action is required by the operator.
5. In the Events triggered drop-down menu, specify which event to trigger when the time limit has passed.
6. Specify additional settings, for example related cameras and initial alarm owner.
293 | Configuration
Administrator manual | XProtect® VMS 2024 R1
l The users receive only the alarms that are relevant to them.
Use roles to group users that should have the same permissions for all alarm definitions.
1. In the Site Navigation pane, expand Security, and select the role you want to modify the permissions for.
2. Go to the Alarms tab and expand Alarm Definitions to see the list of the alarms you have defined.
Enable encryption
l Recording Server
l Event Server
l Log Server
l LPR Server
l Mobile Server
If your system contains multiple recording servers or remote servers, you must enable encryption on all of them.
When you configure encryption for a server group, it must either be enabled with a
certificate belonging to the same CA certificate or, if the encryption is disabled, then it
must be disabled on all computers in the server group.
Prerequisites:
l A server authentication certificate is trusted on the computer that hosts the management server
Steps:
294 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. On a computer with a management server installed, open the Server Configurator from:
or
l The Management Server Manager by right-clicking the Management Server Manager icon on the
computer task bar
3. Click Select certificate to open a list with unique subject names of certificates that have a private key and
that are installed on the local computer in the Windows Certificate Store.
4. Select a certificate to encrypt communication between the recording server, management server,
failover server, and Data Collector server.
Select Details to view Windows Certificate Store information about the selected certificate.
295 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. Click Apply.
To complete the enabling of encryption, the next step is to update the encryption settings on each recording
server and each server that has a Data Collector (Event Server, Log Server, LPR Server, and Mobile Server).
For more information, see Enable server encryption for recording servers or remote servers on page 296.
If your system contains multiple recording servers or remote servers, you must enable encryption on all of them.
For more information, see the certificates guide about how to secure your XProtect VMS installations.
When you configure encryption for a server group, it must either be enabled with a
certificate belonging to the same CA certificate or, if the encryption is disabled, then it
must be disabled on all computers in the server group.
Prerequisites:
l You have enabled encryption on the management server, see Enable encryption to and from the
management server on page 294.
1. On a computer with a Management Server or Recording Server installed, open the Server Configurator
from:
or
l The server manager, by right-clicking the server manager icon on the computer task bar
3. Click Select certificate to open a list with unique subject names of certificates that have a private key and
that are installed on the local computer in the Windows Certificate Store.
4. Select a certificate to encrypt communication between the recording server, management server,
failover server, and data collector server.
Select Details to view Windows Certificate Store information about the selected certificate.
The Recording Server service user has been given access to the private key. It is required that this
certificate is trusted on all clients.
296 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. Click Apply.
When you apply certificates, the recording server will be stopped and restarted. Stopping
the Recording Server service means that you cannot record and view live video while you
are verifying or changing the recording server's basic configuration.
When you configure encryption for a server group, it must either be enabled with a
certificate belonging to the same CA certificate or, if the encryption is disabled, then it
must be disabled on all computers in the server group.
Prerequisites:
l A server authentication certificate is trusted on the computer that hosts the event server
Steps:
297 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. On a computer with an event server installed, open the Server Configurator from:
or
l The Event Server by right-clicking the Event Server icon on the computer task bar
2. In the Server Configurator, under Event server and add-ons, turn on Encryption.
3. Click Select certificate to open a list with unique subject names of certificates that have a private key and
that are installed on the local computer in the Windows Certificate Store.
4. Select a certificate to encrypt communication between the event server and related add-ons.
Select Details to view Windows Certificate Store information about the selected certificate.
5. Click Apply.
To complete the enabling of encryption, the next step is to update the encryption settings on each related
extension LPR Server.
298 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you configure encryption for a server group, it must either be enabled with a
certificate belonging to the same CA certificate or, if the encryption is disabled, then it
must be disabled on all computers in the server group.
Prerequisites:
l The server authentication certificate to be used is trusted on all computers running services that retrieve
data streams from the recording server
l XProtect Smart Client and all services that retrieve data streams from the recording server must be
version 2019 R1 or later
l Some third-party solutions created using MIP SDK versions earlier than 2019 R1 may need to be updated
Steps:
1. On a computer with a recording server installed, open the Server Configurator from:
or
l The Recording Server Manager by right-clicking the Recording Server Manager icon on the
computer task bar
3. Click Select certificate to open a list with unique subject names of certificates that have a private key and
that are installed on the local computer in the Windows Certificate Store.
4. Select a certificate to encrypt communication between the clients and servers that retrieve data streams
from the recording server.
Select Details to view Windows Certificate Store information about the selected certificate.
The Recording Server service user has been given access to the private key. It is required that this
299 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. Click Apply.
When you apply certificates, the recording server will be stopped and restarted. Stopping
the Recording Server service means that you cannot record and view live video while you
are verifying or changing the recording server's basic configuration.
To verify if the recording server uses encryption, see View encryption status to clients.
For more information, see the certificates guide about how to secure your XProtect VMS installations.
When you configure encryption for a server group, it must either be enabled with a
certificate belonging to the same CA certificate or, if the encryption is disabled, then it
must be disabled on all computers in the server group.
300 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Steps:
1. On a computer with a mobile server installed, open the Server Configurator from:
or
l The Mobile Server Manager by right-clicking the Mobile Server Manager icon on the computer
task bar
2. In the Server Configurator, under Mobile streaming media certificate, turn on Еncryption.
3. Click Select certificate to open a list with unique subject names of certificates that have a private key and
that are installed on the local computer in the Windows Certificate Store.
4. Select a certificate to encrypt the communication of XProtect Mobile client and XProtect Web Client with
the mobile server.
Select Details to view Windows Certificate Store information about the selected certificate.
The Mobile Server service user has been given access to the private key. It is required that this certificate
301 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. Click Apply.
Alternative 1: Connect sites from the same domain (with a common domain user)
Before you install the management server, you must create a common domain user and configure this user as
the administrator on all servers involved in the federated site hierarchy. How you connect the sites depends on
the created user account.
302 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Start the installation of the product on the server to be used as the management server and select
Custom.
2. Select to install the Management Server service using a user account. The selected user account must be
the administrator account used on all management servers. You must use the same user account when
you install the other management servers in the federated site hierarchy.
3. Finish the installation. Repeat steps 1-3 to install any other systems you want to add to the federated site
hierarchy.
1. Start the installation of the product on the first server to be used as the management server and select
Single Computer or Custom. This installs the management server using a network service account.
Repeat this step for all the sites in your federated site hierarchy.
2. Log into the site that you want as your central site in the federated site hierarchy.
4. On the Users and Groups tab, click Add and select Windows User.
5. In the dialog box, select Computers as object type, enter the server name of the federated site and click
OK to add the server to the Administrator role of the central site. Repeat this step until you have added
all the federated sites in this way and exit the application.
6. Log into each federated site, and add the following servers to the Administrator role, in the same way as
above:
l The child site servers that you want to connect directly to this federated site.
To connect to sites across domains, make sure that the domains trust each other. You set up domains to trust
each other in the Microsoft Windows Domain configuration. When you have established trust between the
different domains on each site in the federated site hierarchy are placed, follow the same description as
described in Alternative 1. For more information about how to set up trusted domains, see the Microsoft website
(https://docs.microsoft.com/previous-versions/windows/it-pro/windows-2000-server/cc961481(v=technet.10)/).
303 | Configuration
Administrator manual | XProtect® VMS 2024 R1
When you connect sites inside workgroups, the same administrator account must be present on all servers you
want connected in the federated site hierarchy. You must define the administrator account before you install the
system.
3. Select to install the Management Server service using the common administrator account.
4. Finish the installation. Repeat steps 1-4 to install any other systems you want to connect. You must install
all of these systems using the common administrator account.
You cannot mix domain(s) and workgroup(s). This means that you cannot connect sites
from a domain to sites from a workgroup and vice versa.
When adding a non-secure site to Milestone Federated Architecture, make sure that Allow non-secure
connections to the server is enabled under Tools > Options > General settings in Management Client.
2. Select the site to which you want to add a child site, right-click, and click Add Site to Hierarchy.
3. Enter the URL of the requested site in the Add Site to Hierarchy window and click OK.
4. The parent site sends a link request to the child site and after a while, a link between the two sites is
added to the Federated Site Hierarchy pane.
5. If you can establish the link to the child site without requesting acceptance from the child site
administrator, go to step 7.
If not, the child site has the awaiting acceptance icon until the administrator of the child site has
authorized the request.
6. Make sure that the administrator of the child site authorizes the link request from the parent site (see
304 | Configuration
Administrator manual | XProtect® VMS 2024 R1
7. The new parent/child link is established and the Federated Site Hierarchy pane is updated with the
icon for the new child site.
administrator permissions to the child site, it has the awaiting acceptance icon.
2. In the Federated Site Hierarchy pane, right-click the site and click Accept Inclusion in Hierarchy.
If the site runs the XProtect Expert version, you right-click the site in the Site Navigation pane.
3. Click Yes.
4. The new parent/child link is established and the Federated Site Hierarchy pane is updated with the
Changes that you make to child sites located far from the parent site can take some time
to be reflected in the Federated Site Hierarchy pane.
1. In the Management Client, in the Federated Site Hierarchy pane, select the relevant site, right-click, and
select Properties.
305 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Parent Site tab (see Parent Site tab on page 574) (available on child sites only)
Due to synchronization issues, any changes made to remote children might take
some time to be reflected in the Site Navigation pane.
You need to be logged into a site to perform a manual refresh. Only changes saved by this site since the last
synchronization are reflected by a refresh. This means that changes made further down in the hierarchy might
not be reflected by the manual update, if the changes have not reached the site yet.
2. Right-click the top site in the Federated Site Hierarchy pane and click Refresh Site Hierarchy.
1. In the Federated Site Hierarchy pane, right-click the site that you want to log into.
4. After login is complete, you are ready to do your administrative tasks for that site.
This section is only relevant if you use XProtect Corporate or XProtect Expert 2014 or
newer.
In a large Milestone Federated Architecture setup with a lot of child sites, it is easy to lose the overview and it
can be difficult to find the contact information to the administrators of each child site.
306 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Therefore, you can add additional information to each child site and this information is then available for the
administrators on the central site.
You can read the information about the site, when you pause your mouse over the site name in the Federated
Site Hierarchy pane. To update information about the site:
1. In the Federated Site Hierarchy pane, right-click the site, and click Detach Site from Hierarchy.
If the detached site has child sites, it becomes the new top site for this branch of the hierarchy, and the
3. Click OK.
The changes to the hierarchy are reflected after a manual refresh or an automatic synchronization.
Milestone Interconnect
l Enough Milestone Interconnect camera licenses (see Milestone Interconnect and licensing on page 95).
l Another configured and working XProtect system including a user account (basic users, local Windows
user or Windows Active Directory user) with permissions for the devices that the central XProtect
Corporate system should be able to access
l Network connection between the central XProtect Corporate site and the remote sites with access or port
forwarding to the ports used on the remote sites
2. In the Overview pane, expand the relevant recording server and right-click.
4. On the first page select Address range scanning or Manual and click Next.
307 | Configuration
Administrator manual | XProtect® VMS 2024 R1
5. Specify user names and passwords. The user account must be predefined on the remote system. You can
add user names and passwords as needed by clicking Add. When ready, click Next.
6. Select the drivers to use when you scan. In this case choose between the Milestone drivers. Click Next.
7. Specify the IP addresses and port numbers you want to scan. Default is port 80. Click Next.
Wait while your system detects the remote sites. A status indicator shows the detection process. In case
of a successful detection, a Success message appears in the Status column. If you fail to add, you can
click the Failed error message to see why.
9. Wait while your system detects hardware and collects device specific information. Click Next.
10. Choose to enable or disable successfully detected hardware and devices. Click Next.
12. After installation, you can see the system and its devices in the Overview pane.
Depending on the user permissions for the selected user on the remote site, the central site gets access
to all cameras and functions or a sub-set of them.
1. On the central site, in the Site Navigation pane, expand Security and select Roles.
2. In the Overview pane, right-click the built-in administrator role and select Add Role (see Add and manage
a role).
3. Name the role and configure the settings on the Device tab (see Device tab (roles)) and the Remote
Recordings tab (see Remote recordings tab (roles)).
2. In the Overview pane, expand the required recording server, select the relevant remote system. Right-
click it.
3. Select Update Hardware. This opens the Update hardware dialog box.
4. The dialog box lists all changes (devices removed, updated and added) in the remote system since your
Milestone Interconnect setup was established or refreshed last. Click Confirm to update your central site
with these changes.
308 | Configuration
Administrator manual | XProtect® VMS 2024 R1
2. In the Overview pane, expand the required recording server, select the relevant remote system. Select
the relevant interconnected camera.
3. In the Properties pane, select the Record tab, and select the Play back recordings from remote system
option.
In a Milestone Interconnect setup, the central site disregards privacy masks defined in a remote site. If you want
to apply the same privacy masks, you must redefine it on the central site.
To allow users to actually retrieve recordings, you must enable this permission for the relevant role (see Roles
(Security)).
2. In the Overview pane, expand the required recording server, select the relevant remote system. Select
the relevant remote server.
3. In the Properties pane, select the Remote Retrieval tab and update the settings (see Remote Retrieval
tab on page 419).
If the network fails for some reason, the central site misses out on recording sequences. You can configure your
system to let the central site automatically retrieve remote recordings to cover the down-period, once the
network is reestablished.
2. In the Overview pane, expand the required recording server, select the relevant remote system. Select
the relevant camera.
3. In the Properties pane, select the Record tab, and select the Automatically retrieve remote recordings
when connection is restored option (see Save and retrieve remote recording).
309 | Configuration
Administrator manual | XProtect® VMS 2024 R1
As an alternative, you can use rules or start remote recording retrievals from XProtect Smart Client when
needed.
In a Milestone Interconnect setup, the central site disregards privacy masks defined in a remote site. If you want
to apply the same privacy masks, you must redefine it on the central site.
You can use events defined on the remote sites to trigger rules and alarms on your central site and thereby
respond immediately to events from the remote sites. This requires that the remote sites are connected and
online. The number and type of events depend on the events configured and predefined in the remote sites.
Requirements:
l If you want to use user-defined/manual events from the remote sites as triggering events, you must first
create these on the remote sites
l Make sure that you have an updated list of events from the remote sites (see Update remote site
hardware on page 308).
2. In the Overview pane, select the relevant remote server and the Events tab.
3. The list contains the predefined events. Click Add to include user-defined or manual events from the
remote site in the list.
2. In the Overview pane, right-click Alarm Definitions and click Add New.
4. In the Triggering Event field, you can select between the supported predefined and user-defined events.
5. In the Sources field, select the remote server representing the remote site that you want alarms from.
310 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Use an event on a remote site to trigger a rule-based action on the central site:
1. On the central site, expand Rules and Events and select Rules.
4. In the Edit the rule description area, click event and select between the supported predefined and user-
defined events. Click OK.
5. Click devices/recording server/management server and select the remote server representing the
remote site that you want the central site to start an action for. Click OK.
7. Select the conditions that you want to apply for this rule. If you do not select any conditions, the rule
always applies. Click Next.
8. Select an action and specify the details in the Edit the rule description area. Click Next.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
The Remote Connect Services feature contains the Axis One-click Camera Connection technology developed by
Axis Communications. It enables the system to retrieve video (and audio) from external cameras where firewalls
and/or router network configuration normally prevents initiating connections to such cameras. The actual
communication takes place via secure tunnel servers (ST servers). ST servers use VPN. Only devices that hold a
valid key work within a VPN. This offers a secure tunnel where public networks can exchange data in a safe way.
Remote Connect Services allows you to
311 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Before you can use Axis One-click Camera Connection, you must first install a suitable ST server environment.
To work with secure tunnel server (ST server) environments and Axis One-click cameras, you must first contact
your system provider to obtain the needed user name and password for Axis Dispatch Services.
Requirements
l Contact your system provider to obtain the needed user name and password for Axis Dispatch Services
l Make sure your camera(s) support Axis Video Hosting System. Go to the Axis website to see supported
devices (https://www.axis.com/products/axis-guardian)
l If needed, update your Axis cameras with the newest firmware. Go to the Axis website to download
firmware (https://www.axis.com/support/firmware)
1. On each camera's homepage, go to Basic Setup, TCP/IP, and select Enable AVHS and Always.
Communication for Remote Connect Services takes place via secure tunnel servers (ST servers).
l To add an ST server, right-click the Axis Secure Tunnel Servers top node, select Add Axis Secure
Tunnel Server
l To edit an ST server, right-click it, select Edit Axis Secure Tunnel Server
3. If you chose to use credentials when you installed the Axis One-Click Connection Component, select the
Use credentials check box and fill in the same user name and password as used for the Axis One-Click
Connection Component.
4. Click OK.
1. To register a camera under an ST server, right-click it and select Register Axis One-Click Camera.
3. Click OK.
312 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Color Description
When you add a new camera, its status is always green. The connection status is reflected by Devices on
Recording Servers in the Overview pane. In the Overview pane, you may group your cameras for an easier
overview. If you choose not to register your camera at the Axis dispatch service at this point, you can do so later
from the right-click menu (select Edit Axis One-Click Camera).
Smart maps
l Basic world map - use the standard geographic background provided in XProtect Smart Client. It
requires no configuration. This map is intended for use as a general reference, and it does not contain
features such as country boundaries, cities, or other details. However, like the other geographic
backgrounds, it does contain geo-reference data
l Milestone Map Service - connect to a free map provider. After you enable Milestone Map Service, no
further setup is needed.
313 | Configuration
Administrator manual | XProtect® VMS 2024 R1
The Bing Maps and Google Maps options require access to the internet, and you must
purchase a key from Microsoft or Google.
Unless you are using your own, local tile server, OpenStreetMap requires internet access.
If you want the system to have a EU GDPR compliant installation, the following services
may not be used:
l Bing Maps
l Google Maps
By default, Bing Maps and Google Maps display satellite imagery (Satellite). You can change the imagery in
XProtect Smart Client, for example to aerial or terrain, to see different details.
Steps:
1. In Management Client, on the Site Navigation pane, click Smart Client Profiles.
2. In the Smart Client Profiles pane, select the relevant Smart Client profile.
l For Bing Maps, enter your Basic Key or Enterprise Key in the Bing Maps key field
l For Google Maps, enter your Maps Static API key in the Private key for Google Maps field
4. To prevent XProtect Smart Client operators from using a different key, select the Locked check box.
Steps:
314 | Configuration
Administrator manual | XProtect® VMS 2024 R1
3. Depending on the map service you want to use, do one of the following:
l For Bing Maps, enter your key in the Bing Maps key field. See also Smart map integration with
Bing Maps (explained) on page 91.
l For Google Maps, enter your key in the Private key for Google Maps field. See also Smart map
integration with Google Maps (explained) on page 90.
After you enable Milestone Map Service on your smart map, the smart map will use Milestone Map Service as its
geographic background.
Steps:
1. In the Site Navigation pane, expand the Client node and click Smart Client Profiles.
5. To enforce this setting in XProtect Smart Client, select the Locked check box. Then the XProtect Smart
315 | Configuration
Administrator manual | XProtect® VMS 2024 R1
You can also enable Milestone Map Service in the Settings window in XProtect Smart
Client.
If you are behind a restrictive firewall, allowing access to the used domains is important.
You may need to allow for outgoing traffic for Milestone Map Service using
maps.milestonesys.com on each machine on which the Smart Client is running.
You can also specify the tile server address in the Settings window in XProtect Smart
Client.
Steps:
316 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, expand the Client node and click Smart Client Profiles.
4. In the OpenStreetMap server field, enter the address of the tile server.
5. To enforce this setting in XProtect Smart Client, select the Locked check box. Then the XProtect Smart
Client operators cannot change the address.
Steps:
317 | Configuration
Administrator manual | XProtect® VMS 2024 R1
7. Save your changes. Next time users assigned to the Smart Client profile you selected log into XProtect
Smart Client, they will be able to edit smart maps.
Operators can be allowed to edit the following device types on smart maps:
l Cameras
l Input devices
l Microphones
318 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Requirements
Before you start, make sure that smart map editing has been enabled (see Enable smart map editing on page
317). You do this on the Smart Client profile that the role of the operator is associated with.
Steps:
2. In the Roles pane, select the role that your operator is associated with.
l Select the Overall Security tab, and in the Role Settings pane, select the device type (for
example, Cameras or Input)
l In the Allow column, select the Full control or Edit check box
To enable the editing of individual devices, go to the Device tab and select the relevant
device.
Define device position and camera direction, field of view, depth (smart map)
To ensure that a device is positioned correctly on the smart map, you can set the geographic coordinates of the
device. For cameras, you can also set the direction, the field of view, and the viewing depth. Setting any of the
above will automatically add the device to the smart map the next time an operator loads the smart map in
XProtect Smart Client.
Steps:
1. In Management Client, expand the Devices node and select the device type (for example, Cameras or
Input).
319 | Configuration
Administrator manual | XProtect® VMS 2024 R1
3. OntheInfotab,scrolldowntoPositioninginformation.
4. In the Geo coordinates field, specify the latitude and the longitude coordinates, in that order. Use a
period as a decimal separator, and use a comma to separate latitude and longitude.
l For cameras:
1. In the Direction field, enter a value in the range of 0 and 360 degrees.
2. In the Field of view field, enter a value in the range of 0 and 360 degrees.
3. In the Depth field, enter the viewing depth, either in meters or in feet.
320 | Configuration
Administrator manual | XProtect® VMS 2024 R1
1. Before connecting the top site with child sites, make sure that geographic coordinates have been
specified on all devices on all sites. Geographic coordinates are added automatically when a device is
positioned on the smart map in XProtect Smart Client, but you can also add them manually in
Management Client in the device properties. For more information, see Define device position and
camera direction, field of view, depth (smart map) on page 319.
2. You must add the Smart Client operators as Windows users on the parent site and all the federated sites.
At least on the top site, the Windows users must have smart map editing permissions. This allows the
users to edit the smart map for the top site and for all child sites. Next, you need to determine whether
the Windows users on the child sites need smart map editing permissions. In Management Client, first
you create the Windows users under Roles, and then you enable smart map editing. For more
information, see Enable smart map editing on page 317.
3. On the top site, add the child sites as Windows users to a role with administrator permissions. When you
specify the object type, select the Computers check box.
4. On each child site, add the top site as a Windows user to the same administrator role that is used on the
top site. When you specify the object type, select the Computers check box.
5. On the top site, make sure that you can view the Federated Site Hierarchy window. In Management
Client, go to View and select Federated Site Hierarchy. Add each of the child sites to the top site. For
more information, see Add site to hierarchy on page 304.
6. Now you can test that Milestone Federated Architecture works in XProtect Smart Client. Log in to the top
site as an administrator or as an operator, and open a view that contains the smart map. If the setup has
been done correctly, all devices from the top site and the child sites appear on the smart map. If you log
in to one of the child sites, you will see only the devices from that site and its child sites.
To edit devices on a smart map, for example the camera position and angle, users need
device editing permissions. For more information, see Enable editing devices on smart
map on page 318.
321 | Configuration
Administrator manual | XProtect® VMS 2024 R1
Maintenance
While it is rare to lose your configuration, it can happen under unfortunate circumstances. It is important that
you protect your backups, either through technical or organizational measures.
If your system is large, Milestone recommends that you define scheduled backups. This is done with the third-
party tool: Microsoft® SQL Server Management Studio. This backup includes the same data as a manual backup.
Backing up your system configuration can take some time. Backup duration depends on:
l Your hardware
l Whether you have installed SQL Server, the Event Server and Management Server components on a
single server or several servers
Each time you make a backup both manual and scheduled, the transaction log file of the SQL Server database is
flushed. For additional information about how to flush the transaction log file see SQL Server database
transaction log (explained) on page 136.
Make sure that you know your system configuration password settings when creating a
backup.
For FIPS 140-2 compliant systems, with exports and archived media databases from
XProtect VMS versions prior to 2017 R1 that are encrypted with non FIPS-compliant
cyphers, it is required to archive the data in a location where it can still be accessed after
enabling FIPS. For detailed information on how to configure your XProtect VMS to run in
FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening
guide.
322 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Right-click the notification area's Management Server service icon and select Select shared backup
folder.
3. Click OK twice.
4. If asked if you want to delete files in the current backup folder, click Yes or No depending on your needs.
All relevant system configuration files are combined into one single .cnf file that is saved
at a specified location. During the backup, all backup files are first exported to a
temporary system backup folder on the management server. You can select another
temporary folder by right-clicking the notification area's Management Server service icon
and by selecting Select shared backup folder.
l Both the user who installs and the user who restores must be local administrator of the system
configuration SQL Server database on the management server and on SQL Server
l Except for your recording servers, your system is completely shut down for the duration of the restore,
which can take some time
l A backup can only be restored on the system installation where it was created. Make sure that the setup
is as similar as possible to when the backup was made. Otherwise, the restore might fail
l If prompted for a system configuration password during a restore, you must provide the system
configuration password that was valid at the time when the backup was created. Without this password,
you cannot restore your configuration from the backup
323 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
l If you do a backup of the SQL Server database and restore it on clean SQL Server, then the raise errors
from the SQL Server database will not work and you will only receive one generic error message from
SQL Server. To avoid that, first reinstall your XProtect system using clean SQL Server and then restore the
backup on top of that
l If restoring fails during the validation phase, you can start the old configuration again because you have
made no changes
If restoring fails elsewhere in the process, you cannot roll back to the old configuration
As long as the backup file is not corrupted, you can do another restore
l Restoring replaces the current configuration. This means that any changes to the configuration since last
backup are lost
1. Right-click the notification area's Management Server service icon and select Restore Configuration.
3. In the file open dialog box, browse to the location of the system configuration backup file, select it, and
click Open.
4. The Restore Configuration window opens. Wait for the restore to finish and click Close.
l Restore the configuration from a configuration backup that was created with password settings different
than the current password settings
l Moving or installing the management server on another computer due to a hardware failure (recovery)
324 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
It is important that system administrators save this password and keep it safe. If you have
assigned a system configuration password and you are restoring a backup, you may be
asked to provide the system configuration password. Without this password, you cannot
restore your configuration from the backup.
l Choose to password protect the system configuration by assigning a system configuration password
l Choose not to password protect the system configuration by removing any assigned system
configuration passwords
When you change the password, it is important that system administrators save the
passwords that are associated with the different backups and keep the passwords safe. If
you are restoring a backup, you may be asked to provide the system configuration
password that was valid at the time the backup was created. Without this password, you
cannot restore your configuration from the backup.
After you change the password, and if your management server and event server are
installed on separate computers, you must enter the current system configuration
password on the event server, too. For more information, see Enter current system
configuration password (event server).
To apply the changes, you must restart the management server services.
325 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Locate the management server tray icon and make sure that the service is running.
2. Right-click the notification area's Management Server service icon and select Change system
configuration password settings.
Assign a password
2. Retype the new password in the Confirm new password field and select enter.
5. To apply the changes, you must restart the management server services.
6. After the restart, make sure that the management server is running.
If you do not need password protection, you can select to opt out:
1. Select the check box: I choose not to use a system configuration password and understand that the
system configuration will not be encrypted and click enter.
4. To apply the changes, you must restart the management server services.
5. After the restart, make sure that the management server is running.
But if the file that is holding the password settings is deleted or corrupted, and the computer that is running the
management server has no other problems, you have the option to enter the system configuration password
settings:
2. Right-click the notification area's Management Server service icon and select Enter the system
configuration password.
326 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Select the check box: This system does not use a system configuration password and select enter.
Here are a few things to consider before you start the backup:
l You cannot use a backup of the SQL Server database to copy system configurations to other systems
l It can take some time to back up the SQL Server database. It depends on your system configuration, your
hardware, and on whether your SQL Server, management server and Management Client are installed
on the same computer
l Logs, including audit logs, are stored in the log server's database and are therefore not part of a backup
of the management server's database. The default name of the log server's database is
SurveillanceLogServerV2. You back up both SQL Server databases the same way.
The first time you run the event server, all its configuration files are automatically moved to the SQL Server
database. You can apply the restored configuration to the event server without needing to restart the event
server, and the event server can start and stop all external communication while the restoration of the
configuration is being loaded.
327 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
If you have a smaller setup and do not need scheduled backups, you can back up your system configuration
manually. For instructions, see Manually backing up your system configuration (explained) on page 327.
When you back up/restore your management server, make sure that the SQL Server database with the system
configuration is included in the backup/restore.
Microsoft® SQL Server Management Studio, a tool download-able for free from their website
(https://www.microsoft.com/downloads/).
Apart from managing SQL Server and its databases, the tool includes some easy-to-use backup and restoration
features. Download and install the tool on your management server.
2. When connecting, specify the name of the required SQL Server. Use the account under which you created
the SQL Server database.
1. Find the SQL Server database that contains your entire system configuration, including event
server, recording servers, cameras, inputs, outputs, users, rules, patrolling profiles, and more.
The default name of this SQL database is Surveillance.
2. Make a backup of the SQL Server database and make sure to:
l Verify that the selected SQL Server database is the correct one
l Set the schedule for the recurrent backup. You can read more about scheduled and
automated backups on the Microsoft website (https://docs.microsoft.com/en-
us/sql/relational-databases/logs/the-transaction-log-sql-server?view=sql-server-2017
l Select to verify backup when finished and to perform checksum before writing to
media
Also consider backing up the log server's database with your logs by using the same method. The default name
for the SQL Server database of the log server is SurveillanceLogServerV2.
328 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
l Event Server service (can be done from Windows Services (search for services.msc on your machine.
Within Services, locate Milestone XProtect Event Server))
l World Wide Web Publishing Service, also known as the Internet Information Service (IIS). Learn how to
stop the IIS (https://technet.microsoft.com/library/cc732317(WS.10).aspx/)
Open Microsoft® SQL Server Management Studio from Windows' Start menu.
1. When connecting, specify the name of your SQL Server. Use the user account under which the SQL Server
database was created.
2. Find the SQL Server database (the default name is Surveillance) that contains your entire system
configuration, including event server, recording servers, cameras, inputs, outputs, users, rules, patrolling
profiles, etc.
3. Make a restore of the SQL Server database and make sure to:
Use the same method to restore the SQL Server database of the log server with your logs. The default name for
the SQL Server database of the log server is SurveillanceLogServerV2.
The system does not work while the Management Server service is stopped. It is
important to remember to start all the services again once you have finished restoring the
database.
The SQL Server database is located on the log server's SQL Server. Typically, the log server and the
management server have their SQL Server databases on the same SQL Server. Backing up the log server
database is not vital since it does not contain any system configuration, but you may appreciate having access to
system logs from before the management server backup/restore.
329 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
l If your restore of the system configuration fails because the event server is not located at the specified
destination (for example, if you have chosen the old registered service setup), do another restore.
l If you are restoring a configuration backup and entering a system configuration password that is
incorrect, you must provide the system configuration password that was valid at the time when the
backup was created.
l Network SQL Server: If you are storing your system configuration in a SQL Server database on SQL
Server on your network, you can point to the location of the database on that SQL Server when installing
the management server software on your new management server. In that case, only the following
paragraph about management server host name and IP address applies and you should ignore the rest
of this topic:
Management server host name and IP address: When you move the management server from one
physical server to another physical server, it is by far the easiest to give the new server the same host
name and IP address as the old one. This is because the recording server automatically connects to the
host name and IP address of the old management server. If you give the new management server a new
host name and/or IP address, the recording server cannot find the management server and you must
manually stop each Recording Server service in your system, change their management server URL,
register the recording server again and when done, start the Recording Server service.
l Local SQL Server: If you are storing your system configuration in a SQL Server database on SQL Server
on the management server itself, it is important that you back up the existing management server's
system configuration database before the move. By backing up the SQL Server database, and
subsequently restoring it on a SQL Server on the new management server, you avoid having to
reconfigure your cameras, rules, time profiles, etc. after the move
If you move the management server, you will need the current system configuration
password in order to restore the backup, see System configuration password (explained)
on page 324.
330 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Requirements
l Your software installation file for installation on the new management server
l Your software license file (.lic), that you received when you purchased your system and initially installed
it. You should not use the activated software license file which you have received after a manual offline
license activation. An activated software license file contains information about the specific server on
which the system is installed. Therefore, an activated software license file cannot be reused when moving
to a new server
If you are also upgrading your system software in connection with the move, you have received a new software
license file. Simply use this.
l Local SQL Server users only: Microsoft® SQL Server Management Studio
l What happens while the management server is unavailable? Unavailable management servers
(explained) on page 331)
l Copy log server database (see Back up log server's database on page 329)
l Recording servers temporarily store log data locally: They automatically send log data to the
management server when it becomes available again:
l Clients cannot log in: Client access is authorized through the management server. Without the
management server, clients cannot log in
l Clients that are already logged in can remain logged in for up to four hours: When clients log
in, they are authorized by the management server and can communicate with recording servers
for up to four hours. If you can get the new management server up and running within four hours,
many of your users are not affected
l No ability to configure the system: Without the management server, you cannot change the
system configuration
Milestone recommends that you inform your users about the risk of losing contact with the surveillance system
while the management server is down.
331 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Make a backup of your system configuration. This is identical to making a scheduled backup. See also
Back up system configuration with scheduled backup on page 328.
2. Install the new management server on the new server. See scheduled backup, step 2.
3. Restore your system configuration to the new system. See also Restore system configuration from a
scheduled backup on page 328.
1. Select Recording Servers, then in the Overview pane select the old recording server.
3. Press and hold down the CTRL key on your keyboard while selecting the Info tab.
4. Copy the recording server ID-number in the lower part of the Info tab. Do not copy the term ID,
only the number itself.
1. Stop the Recording Server service on the old recording server, then in Windows' Services set the
service's Startup type to Disabled.
It is very important that you do not start two recording servers with
identical IDs at the same time.
332 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
5. Paste the copied recording server ID in between the tags <id> and </id>. Save the
RecorderConfig.xml file.
7. Open RecorderIDOnMachine and change the old recording server ID with the new ID.
3. Register the new recording server on the management server. To do that, right- click the Recording
Server Manager tray icon and click Register. For more information, see Register a recording server on
page 191.
4. Restart the Recording Server service. When the new Recording Server service starts up, it has inherited
all settings from the old recording server.
Move hardware
You can move hardware between recording servers that belong to the same site. After a move, the hardware
and its devices run on the new recording server and new recordings are stored on this server. The move is
transparent to the client users.
l The system deletes them when the retention time expires. Recordings that someone has protected with
Evidence Lock (see Evidence locks (explained) on page 77) is not deleted until the evidence lock's
retention time expires. You define the retention time for evidence locks when you create them. Potentially
the retention time never expires
l You delete them from each device's new recording server on the Record tab
If you try to remove a recording server that still contains recordings, you receive a warning.
If you move hardware to a recording server that currently has no hardware added to it,
the client users must log out and log in to receive data from the devices.
l Load balance: If, for example, the disk on a recording server is overloaded, you can add a new recording
server and move some of your hardware
l Upgrade: If you, for example, have to replace the server that hosts the recording server with a newer
model, you can install a new recording server and move the hardware from the old server to the new
server
l Replace a defective recording server: If, for example, the server is offline and will never come online
again, you can move the hardware to other recording servers and thereby keep the system running. You
cannot access the old recordings. For more information, see Replace a recording server on page 332.
333 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Remote recordings
When you move hardware to another recording server, the system cancels ongoing or scheduled retrievals from
interconnected sites or edge storages on cameras. The recordings are not deleted, but the data is not retrieved
and saved in the databases as expected. You receive a warning if this is the case. For the XProtect Smart Client
user, who has started a retrieval when you initiate moving the hardware, the retrieval fails. The XProtect Smart
Client user is notified and can try again later.
If someone has moved hardware on a remote site, you must manually synchronize the central site with the
Update hardware option to reflect the new configuration of the remote site. If you do not synchronize, the
moved cameras remain disconnected on the central site.
Requirements
Before you start the wizard:
l Make sure that the new recording server can access the physical camera via the network
l Install a recording server that you want to move hardware to (see Installing through Download Manager
(explained) on page 164 or Install a recording server silently on page 173)
l Install the same device pack versions on the new recording server that you run on the existing server
(see Device drivers (explained) on page 145)
2. In the Overview pane, right-click the recording server you want to move hardware from or right-click a
specific hardware device.
If the recording server that you move hardware from is disconnected, an error
message appears. You should only choose to move hardware from a disconnected
recording server if you are sure that it will never come online again. If you move
hardware anyway and the server comes back online, you risk an unexpected
behavior from the system due to having the same hardware running on two
recording servers for a period. Possible issues are, for example, license errors or
events that are not sent to the correct recording server.
4. If you started the wizard from the recording server level, the Select the hardware you want to move
page appears. Select the hardware devices you want to move.
334 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
5. On the Select the recording server you want to move the hardware to page, select from the list of
recording servers installed on this site.
6. On the Select the storage you want to use for future recordings page, the storage usage bar indicates
the free space in the recording database for live recordings only, not the archives. The total retention
time is the retention period for both the recording database and the archives.
8. If the move was successful, click Close. If you select the new recording server in the Management Client,
you can see the moved hardware and now recordings are stored on this server.
In an interconnected system, you must manually synchronize the central site after
moving hardware on a remote site to reflect the changes you, or another system
administrator, made at the remote site.
If a move did not succeed, one of the following reasons can be the cause:
Make sure that the recording server is online. You may need to
The recording server is not connected register it.
or in failover mode.
If the server is in failover mode, wait and try again.
The recording server is not the latest Update the recording server so it runs the same version as the
version. management server.
Stopping the hardware on the current Maybe another process has locked the recording server, or the
recording server failed recording server is in error mode.
335 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Make sure that the recording server is running and try again.
Make sure that the hardware you try to move has not
The hardware does not exist. simultaneously been removed from the system by another user.
The scenario is quite unlikely.
Most likely, you have accepted that the old recording server will
The recording server that hardware never get online again when you started the Move Hardware
was moved from is back online, but you wizard, but during the move, the server came online.
chose to ignore it when it was offline. Start the wizard again and select No when you are asked to
confirm if the server comes online again.
Make sure that the recording storage is online and try again.
All recording storages on the target Make sure that all recording storages on the target recording
recording server must be available. server are online.
Replace hardware
When you replace a hardware device on your network with another hardware device, you must know the IP
address, port, user name and password of the new hardware device.
If you have not enabled automatic license activation (see Automatic license activation
(explained) on page 120 and have used all device changes without activation (see Device
changes without activation (explained) on page 121), you must manually activate your
licenses after replacing hardware devices. If the new number of hardware devices
exceeds your total number of device licenses, you have to purchase new device licenses.
336 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Expand the required recording server, right-click the hardware you want to replace.
4. In the wizard, in the Address field (marked by red arrow in the image), enter the IP address of the new
hardware. If known, select the relevant driver from the Hardware Driver dropdown list. Otherwise select
Auto Detect. If port, user name or password data is different for the new hardware, correct this before
starting the auto detect process (if needed).
The wizard is pre-filled with data from the existing hardware. If you replace it with a similar hardware
device, you can reuse some of this data - for example, port and driver information.
337 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
l If you selected the required hardware device driver directly from the list, click Next
l If you selected Auto Detect in the list, click Auto Detect, wait for this process to be successful
(marked by a to the far left), click Next
This step is designed to help you map devices and their databases, depending on the number of
individual cameras, microphones, inputs, outputs and so on attached to the old hardware device
and the new respectively.
It is important to consider how to map databases from the old hardware device to databases of
the new hardware device. You do the actual mapping of individual devices by selecting a
corresponding camera, microphone, input, output or None in the right-side column.
Make sure to map all cameras, microphones, inputs, outputs, etc. Contents
mapped to None, are lost.
338 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Example of the old hardware device having more individual devices than the new one:
Click Next.
6. You are presented with a list of hardware to be added, replaced or removed. Click Confirm.
7. Final step is a summary of added, replaced and inherited devices and their settings. Click Copy to
Clipboard to copy contents to the Windows clipboard or/and Close to end the wizard.
2. Expand the required recording server, then select the hardware that you want to get the latest
information for.
3. In the Properties pane on the Info tab, click the Update button in the Hardware data last updated field.
4. The wizard checks if the system is running the latest firmware for the hardware.
Select Confirm to update the information in the Management Client. When the update is complete, The
current firmware version for the hardware device that is detected by the system appears in the Firmware
version field on the Info tab.
339 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Database Used by
l Make sure that the user that runs the related services and app pools is the owner of the database.
l Complete the content migration from the old SQL Server database to the new one.
To update the connection strings with the new location and name of a SQL Server database:
1. Stop all XProtect VMS services and app pools that use the SQL Server database.
Depending on your system architecture, the services and app pools might run on
different computers. You must stop all app pools and services that connect to the
same SQL Server database.
340 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
3. Update the connection strings with the new location and name of the SQL Server database.
The default connection strings for all SQL Server databases are:
4. Start all XProtect services and app pools that you have stopped in step 1.
341 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Failover
Management Recording Event
Recording
Server Server Server
Server Description
Manager tray Manager Manager
Manager
icon tray icon tray icon
tray icon
Running
Stopped
Starting
Stopping
342 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Failover
Management Recording Event
Recording
Server Server Server
Server Description
Manager tray Manager Manager
Manager
icon tray icon tray icon
tray icon
In indeterminate state
Running offline
1. In the notification area, right-click the Management Server Manager tray icon. A context-menu appears.
2. If the service has stopped, click Start Management Server service to start it. The tray icon changes to
reflect the new state.
343 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
For more information about the tray icons, see Server manager tray icons (explained) on
page 341.
1. In the notification area, right-click the Recording Server Manager tray icon. A context-menu appears.
2. If the service has stopped, click Start Recording Server service to start it. The tray icon changes to
reflect the new state.
For more information about the tray icons, see Server manager tray icons (explained) on
page 341.
344 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
2. Select Show Status Messages. Depending on the server type, either the Management Server Status
Messages or Recording Server Status Messages window appears, listing time-stamped status
messages:
Open the Server Configurator from either the Windows startup menu, from the management server tray icon or
from the recording server tray icon. See Server Configurator (Utility) on page 393.
For more information, see the certificates guide about how to secure your XProtect VMS installations.
345 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. In the notification area, right-click the Event Server Manager tray icon. A context-menu appears.
2. If the service has stopped, click Start Event Server service to start it. The tray icon changes to reflect the
new state.
3. To restart or stop the service, click Restart Event Server service or Stop Event Server service.
For more information about the tray icons, see Server manager tray icons (explained) on
page 341.
l No events or alarms are stored in the Event Server. However, system and device events still trigger
actions, for example start recording
l XProtect extensions do not work in XProtect Smart Client and cannot be configured from the
Management Client.
l In XProtect Smart Client, map view items, alarm list view items, and the Alarm Manager workspace do
not work
l MIP plug-ins in Management Client and XProtect Smart Client do not work correctly
346 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. In the notification area, right-click the Event Server Manager tray icon. A context-menu appears.
2. To view the 100 most recent lines in the Event Server log, click Show Event Server Logs. A log viewer
appears.
3. To view the 100 most recent lines in the MIP log, go back to the context-menu and click Show MIP logs. A
log viewer is displayed.
347 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
If someone removes the log file from the log directory, the menu items are grayed out. To
open the log viewer, first you need to copy the log file back into its folder:
C:\ProgramData\Milestone\XProtect Event Server\logs or
C:\ProgramData\Milestone\XProtect Event Server\logs\MIP Logs.
If you don't enter the current password in the event server, then system components,
such as access control, will stop working.
1. In the notification area, right-click the Event Server Manager tray icon. A context-menu appears.
2. To enter the current system configuration password, click Enter current system configuration
password. A window appears.
3. Enter the same system configuration password that has been entered in the management server.
348 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
You can manually specify servers/services as registered services in the Management Client.
2. In the Add Registered Service or Edit Registered Service window (depending on your earlier selection),
specify or edit settings.
3. Click OK.
If all involved servers (both the management server and the trusted servers) are on your local network,
you can simply specify the LAN address. If one or more involved servers access the system through an
internet connection, you must also specify the WAN address.
3. Click OK.
Component Requirement
Name of the registered service. The name is only used for display purposes in the
Name
Management Client.
349 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Component Requirement
Click Add to add the IP address or hostname of the registered service. If specifying a
hostname as part of a URL, the host must exist and be available on the network. URLs must
begin with http:// or https:// and must not contain any of the following characters: < > & ' " * ?
URLs | [ ] ".
Select if the registered service should be trusted immediately (this is often the case, but the
option gives you the flexibility to add the registered service and then mark it as trusted by
Trusted editing the registered service later).
Changing the trusted state also changes the state of other registered services sharing one
or more of the URLs defined for the relevant registered service.
Description of the registered service. The description is only used for display purposes in
Description
the Management Client.
When a service is advanced, it has specific URI schemes (for example, HTTP, HTTPS, TCP, or
Advanced UDP) that need to be set up for each host address you define. A host address therefore has
multiple endpoints, each with its own scheme, host address and IP port for that scheme.
If you have multiple device packs installed and have problems deleting the files, you can use the script in the
device pack installation folder to delete them completely.
If you remove device drivers, the recording server and the camera devices cannot communicate any longer. Do
not remove device packs when you upgrade because you can install a new version on top of an old one. Only if
you uninstall the entire system may you remove the device pack.
If you remove a recording server, all configuration specified in the Management Client is
removed for the recording server, including all of the recording server's associated
hardware (cameras, input devices, and so on).
350 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. Right-click the recording server you want to remove in the Overview pane.
4. The recording server and all of its associated hardware are removed.
When you delete hardware, all recorded data related to the hardware is deleted
permanently.
1. Right-click the recording server on which you want to delete all hardware.
In general, a change of the host name of a management server should be planned for
carefully due to the amount of clean-up that might be required afterwards.
In the following sections you can get an overview of some of the implications of a change of a host name.
Depending on how certificates are created, they can be related to the computer they are installed on, and they
will only be valid as long as the computer name stays the same.
For more information about how to create certificates, see Introduction to certificates.
If a computer name is changed, the certificates that are used may become invalid, and the XProtect VMS cannot
be started. To get the system up and running again, complete these steps:
l Create new certificates and reinstall them on all of the computers in the environment.
l Apply the new certificates, using the Server Configurator, on each of the computers to enable encryption
with the new certificates.
This will trigger the registration of the new certificates and get the system up and running again.
351 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
The information that can be edited for registered services is located under Tools > Registered Services > Edit:
l Trusted
l Advanced
l External flag
A change of the name of the management server on a system that is connected to Milestone Customer
Dashboard will not automatically be reflected in Milestone Customer Dashboard.
The old host name will appear in Milestone Customer Dashboard until a new license activation is completed. The
name change, however, will not break anything in Milestone Customer Dashboard and once a new activation
takes place, the record is updated in the database with the new host name. For more information about
Milestone Customer Dashboard, see Milestone Customer Dashboard (explained).
A host name change can trigger the change of the SQL Server address
If SQL Server is located on the same computer as the management server, and the name of this computer is
changed, the address of SQL Server will change as well. This means that the SQL Server address will have to be
updated for components located on different computers as well as for components on the local computer that
use the computer name rather than localhost to connect to SQL Server. This specifically applies to the Event
Server which uses the same database as the Management Server. It might also apply to the Log Server which
uses a different database but very likely on the same SQL Server.
See Change the location and name of a SQL Server database on page 340.
352 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
If you change the name of the computer that the central site within the architecture is running on, all child nodes
will be re-attached automatically to the new address. So in this case, a rename will not require any actions.
To avoid connection issues when changing the name of a computer that one or more federated sites are running
on, you must add an alternate address to the affected site, before the computer is renamed. The affected site
being the node whose host computer will be renamed. For more information about connection issues due to
unprepared or unpredicted host name changes and how to resolve the problems, see Issue: A parent node in a
Milestone Federated Architecture setup cannot connect to a child node.
The alternate address must be added in the Properties pane in either the Site Navigation or the Federated Site
Hierarchy pane. The following prerequisites must be met:
l The alternate address must be added to be available before the host computer is renamed
l The alternate address must reflect the future name of the host computer (when renamed)
See Set site properties for information about how to access the Properties pane.
To ensure the smoothest update possible, stop the Management Client on the node that
serve as a parent node to the one whose host name will change. Otherwise, stop and
restart the client after the computer has been renamed. For more information, see Start
or stop the Management Server service.
Also, make sure the alternate address you provided is reflected in the Federated Site
Hierarchy pane at your central site and if not, stop and restart the Management Client.
Once the host has been renamed, and you have restarted the computer, the federated site will automatically
switch to the new address.
l System log
l Audit log
l Rule-triggered logs
These are used to log the usage of the system. These logs are available in the Management Client under Server
logs.
353 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
For information about logs used for troubleshooting and investigating software errors, see Debug logs
(explained) on page 358.
To see logs in the Management Client, go to the Site Navigation pane and select Server Logs.
To see logs in a different language, see General tab (options) on page 374 under Options.
To change log settings, see Server Logs tab (options) on page 377.
Filter Logs
In each log window, you can apply filters to see log entries from, for example, a specific time span, a device, or a
user.
Filters are generated from the log entries that are currently visible in the user interface.
354 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
1. In the Site Navigation pane, select Server Logs. By default, the System logs tab appears.
2. Under the tabs, select a filter group, for example, Category, Source type, or User.
3. Select a filter to apply it. Select the filter again to remove it.
Optional: In a list of filters, select Display applied filters only to see only the filters that you applied.
When you export logs, the contents of your export change depending on the filters that
you apply. For information about your export, see Export logs.
Export logs
Exporting logs helps you to, for example, save log entries beyond the log retention period. You can export logs as
comma-separated values (.csv) files.
To export a log:
355 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
2. In the Export window, in the Name field, specify a name for the log file.
3. By default, exported log files are saved in your Log export folder. To specify a different location, select
The contents of your export change depending on the filters that you apply. For
information about your export, see Filter logs.
Search logs
To search a log, use Search criteria in the top part of the log pane:
2. Click Refresh to make the log page reflect your search criteria. To clear your search criteria, and return
to viewing all of the log's content, click Clear.
You can double-click any row to have all details presented in a Log Details window. In this way you can also read
the log entries that contain more text than can be displayed in a single line.
2. The log is displayed in the selected language. Next time your open the log, it is reset to the default
language.
356 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Affected components:
l LPR Server
l Event Server
l Alarm Plug-in
If you're using the 2018 R2 or earlier version of any of the components listed above, you must decide whether or
not to allow the component to write logs to the new log server:
2. In the Options dialog box, at the bottom of the Server Logs tab, find the Allow 2018 R2 and earlier
components to write logs check box.
l Select the check box to allow 2018 R2 and earlier components to write logs
l Clear the check box to not allow 2018 R2 and earlier components to write logs
357 | Maintenance
Administrator manual | XProtect® VMS 2024 R1
Troubleshooting
For information about logs used for system usage, see Managing server logs on page 353.
The following are the location of the log files in the XProtect installation:
l C:\ProgramData\Milestone\IDP\Logs
This is accessible only to IIS user and administrators. If the IIS user is changed,
these permissions must be updated.
l C:\ProgramData\Milestone\MIPSDK
Solution: Change the connection strings to reflect the change of SQL Server and database. See Change the
location and name of a SQL Server database on page 340.
358 | Troubleshooting
Administrator manual | XProtect® VMS 2024 R1
3. In the left side of the Add or Remove Programs window, click Add/Remove Windows Components.
4. In the Windows Components wizard, select Internet Information Services (IIS), and click Details.
5. In the Internet Information Services (IIS) window, verify whether the SMTP Service check box is
selected. If so, SMTP Service is installed.
This solution lets you start the recording server without having to stop the SMTP Service every time:
5. In the SMTP Properties window, click Stop, then set Startup type to either Manual or Disabled.
When set to Manual, the SMTP Service can be started manually from the Services window, or from a
command prompt using the command net start SMTPSVC.
6. Click OK.
Removing the SMTP Service may affect other applications using the SMTP Service.
3. In the left side of the Add or Remove Programs window, click Add/Remove Windows Components.
4. In the Windows Components wizard, select the Internet Information Services (IIS) item, and click
Details.
5. In the Internet Information Services (IIS) window, clear the SMTP Service check box.
359 | Troubleshooting
Administrator manual | XProtect® VMS 2024 R1
When doing configuration changes, on the Microsoft Failover Cluster Manager, pause the
control and monitoring of the service so the Server Configurator can make the changes
and start and/or stop the Management Server service. If you change the failover cluster
service startup type to manual, it should not result in any conflicts with the Server
Configurator.
1. Start the Server Configurator on each of the computers that have a management server installed.
4. Change the management server address to the cluster role name hosting the Management Server, for
example http://MyCluster.
5. Click Register.
On computers that have components that use the Management Server (for example, Recording Server, Mobile
Server, Event Server, API Gateway):
3. Change the management server address to the cluster role name hosting the Management Server, for
example http://MyCluster.
4. Click Register.
360 | Troubleshooting
Administrator manual | XProtect® VMS 2024 R1
l Re-attach the site using the new name of its host. For more information, see Add site to hierarchy.
To make sure that the changes are in effect, you might want to stop and restart the
Management Client on the node that serve as a parent node to the one whose host name
has been changed. For more information, see Start or stop the Management Server
service.
For more information about the implications of a host name change in a Milestone Federated Architecture setup,
see Host name changes in a Milestone Federated Architecture.
Azure SQL Database is a service where most of the traditional database maintenance is taken care of by
Microsoft. The service can be unavailable for short periods of time and the is designed to recover up to a certain
extent with no user interaction required.
Database errors are written in the XProtect VMS log files with a related incident ID, which can be provided to
Microsoft support in the case of an extended Azure SQL Database unavailability.
For more information, see Troubleshoot common connection issues to Azure SQL Database.
Login fails
Redirect URIs
The login might fail if, for example, the redirect URI is wrong. For more information, see Add redirect URIs for the
web clients on page 383.
If external IDP users do not have claims defined for them that can be used by the XProtect VMS or if claims have
not been added to roles in the XProtect VMS, a log-in with one of the clients will fail even if the external IDP user
has been successfully authenticated by the external IDP.
It is still possible, though, for external IDP users to access the XProtect VMS even if the external IDP users do not
have claims defined for them. In this case, the XProtect VMS administrator must manually add the external IDP
users to one or more roles after the external IDP users' initial log in.
361 | Troubleshooting
Administrator manual | XProtect® VMS 2024 R1
If you enter an incorrect computer address in the log-in dialog box in a client, the client doesn’t get an answer to
the API call. The API call is made when the client is started and whenever the address is changed and it queries
which authentication options the XProtect VMS installation supports.
If the client doesn't get an answer to the API call when the client is started, the client defaults back to listing the
standard authentication options.
362 | Troubleshooting
Administrator manual | XProtect® VMS 2024 R1
Upgrade
Upgrade (explained)
When you upgrade, all components currently installed on the computer are upgraded. It is not possible to
remove installed components during an upgrade. If you want to remove installed components, use Windows’
Add and remove programs functionality before or after an upgrade. During the upgrade, all components,
except the management server database, are automatically removed and replaced. This includes the drivers of
your device pack.
The management server database contains the entire system configuration (recording server configurations,
camera configurations, rules, and so on). As long as you do not remove the management server database, no
reconfiguration of your system configuration is needed, even if you may want to configure some of the new
features in the new version.
Backward compatibility with recording servers from XProtect versions earlier than the
current version is limited. You can still access recordings on such older recording servers,
but to change their configuration, they must be of the same version as this current one.
Milestone recommends that you upgrade all recording servers in your system.
When you upgrade including your recording servers, you are asked if you want to update or keep your video
device drivers. If you choose to update, it might take a few minutes for your hardware devices to make connect
to the new video device drivers after restart of your system. This is due to several internal checks on the newly
installed drivers.
If you upgrade from version 2017 R3 or earlier to version 2018 R1 or later, and if your
system has older cameras, you must manually download the device pack with legacy
drivers from the download page on our website
(https://www.milestonesys.com/downloads/). To see if you have cameras that use drivers
in the legacy device pack, visit this page on our website
(https://www.milestonesys.com/community/business-partner-tools/device-packs/).
If you upgrade from version 2018 R1 or earlier to version 2018 R2 or later, it is important
that you update all recording servers in your system with a security patch before you
upgrade. Upgrading without the security patch, will cause the recording servers to fail.
363 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
The instructions for installing the security patch on your recording servers are available
on our website https://supportcommunity.milestonesys.com/s/article/XProtect-VMS-NET-
security-vulnerability-hotfixes-for-2016-R1-2018-R1/.
If you want to encrypt the connection between the management server and the recording
servers, all recording servers must be upgraded to 2019 R2 or newer.
For an overview of the recommend upgrade sequence, see Upgrade best practices on page 367
Upgrade requirements
l Have your software license file (see Licenses (explained) on page 118) (.lic) ready:
l Service pack upgrade: During the installation of the management server, the wizard may ask you
to specify the location of the software license file. You can use both the software license file you
got after your purchase of your system (or latest upgrade) and the activated software license file
you got after your last license activation
l Version upgrade: After you purchased the new version, you receive a new software license file.
During the installation of the management server, the wizard asks you to specify the location of
the new software license file
The system verifies the software license file before you can continue. Already added hardware devices
and other devices that require licenses will enter a grace period. If you have not enabled automatic
license activation (see Enable automatic license activation on page 125), remember to activate your
licenses manually before the grace period expires. If you do not have your software license file, contact
your XProtect reseller.
l Have your new product version software ready. You can download it from the download page on the
Milestone website.
364 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
l Make sure that you have backed up the system configuration (see Backing up and restoring your system
configuration (explained) on page 322)
The management server stores the system configuration in a SQL Server database. The SQL Server
database can be located in a SQL Server instance on the management server machine itself or in a SQL
Server instance on the network.
If you use a SQL Server database in a SQL Server instance on your network, the management server
must have administrator permissions on the SQL Server instance whenever you want to create, move or
upgrade the SQL Server database. For regular use and maintenance of the SQL Server database, the
management server only needs to be a database owner.
l If you plan to enable encryption during installation, you need to have the proper certificates installed and
trusted on relevant computers. For more information, see Secure communication (explained) on page 146.
When you are ready to start the upgrade, follow the procedures in Upgrade best practices on page 367.
For detailed information on how to configure your XProtect VMS to run in FIPS 140-2 compliant mode, see the
FIPS 140-2 compliance section in the hardening guide.
For FIPS 140-2 compliant systems, with exports and archived media databases from
XProtect VMS versions prior to 2017 R1 that are encrypted with non FIPS-compliant
cyphers, it is required to archive the data in a location where it can still be accessed after
enabling FIPS.
The following process describes what is necessary to configure XProtect VMS to run in FIPS 140-2 compliant
mode:
1. Disable the Windows FIPS security policy on all of the computers that are part of the VMS, including the
computer that hosts SQL Server.
When you upgrade, you cannot install XProtect VMS when FIPS is enabled on the Windows operating
system.
365 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
2. Ensure standalone third-party integrations can run on a FIPS enabled Windows operating system.
If a standalone integration is not FIPS 140-2 compliant, it cannot be run after you set Windows operating
system to operate in FIPS mode.
To prevent this:
l Contact the providers of these integrations and ask if the integrations are FIPS 140-2 compliant
3. Ensure that the drivers, and hence the communication to the devices, adhere to FIPS 140-2 compliance.
XProtect VMS is guaranteed and can enforce FIPS 140-2 compliant mode of operation if the following
criteria are met:
See the FIPS 140-2 compliance section in the hardening guide for more information about drivers
that can assure and enforce compliance.
Drivers from the legacy driver device packs cannot guarantee a FIPS 140-2 compliant connection.
l Devices are connected over HTTPS and on either Secure Real-Time Transport Protocol (SRTP) or
Real Time Streaming Protocol (RTSP) over HTTPS for the video stream
l The computer that is running the recording server runs Windows OS with FIPS mode enabled
4. Ensure that data in the media database is encrypted with FIPS 140-2 compliant ciphers.
This is done by running the media database upgrade tool. For detailed information on how to configure
your XProtect VMS to run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the
hardening guide.
5. Before you enable FIPS on the Windows operating system, and after you have configured your XProtect
VMS system and ensured that all components and devices can run on a FIPS enabled environment,
update your existing hardware passwords in the XProtect Management Client.
To do this, in the Management Client, from the selected recording server in the Recording Servers node,
right-click and select Add Hardware. Progress through the Add hardware wizard. This will update all the
current credentials and encrypt them to be FIPS-compliant.
You can enable FIPS only after you have upgraded the entire VMS, including all clients.
366 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
Device drivers are now split into two device packs: the regular device pack with newer
drivers and a legacy device pack with older drivers. The regular device pack is always
automatically installed with an update or upgrade. If you have older cameras that use
device drivers from the legacy device pack, and you do not have a legacy device pack
installed already, the system does not automatically install the legacy device pack.
If your system has older cameras, Milestone recommends that you check if the cameras
use drivers from the legacy device pack on this page
(https://www.milestonesys.com/community/business-partner-tools/device-packs/). To
check if you have the legacy pack installed already, look in the XProtect system folders. If
you need to download the legacy device pack, go to download page
(https://www.milestonesys.com/downloads/).
If your system is a Single Computer system, you can install the new software on top of the existing installation.
In a Milestone Interconnect or Milestone Federated Architecture system, you must start upgrading the central
site and afterward the remote sites.
1. Upgrade the management server with the Custom option in the installer (see Install your system -
Custom option on page 158).
1. On the wizard page where you choose components, all management server components are
preselected.
2. Specify SQL Server and database. Decide whether to keep the SQL Server database that you are
already using and to keep the existing data in the database.
When you start the installation, you lose the failover recording server
functionality (see Failover recording server (explained) on page 40).
367 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
2. Upgrade failover recording servers. From your management server's download web page (controlled by
the Download Manager), install Recording Server.
If you plan to enable encryption on the failover recording servers and you want to
retain the failover functionality, upgrade the failover recording server without
encryption and enable it after you have upgraded the recording servers.
3. If you plan to enable encryption from the recording servers or failover recording servers to the clients
and it is important that the clients can retrieve data during the upgrade, upgrade all clients and services
that retrieve data streams from the recording servers before you upgrade the recording servers. These
clients and services are:
l Management Client
l Management Server
l Sites that retrieve data streams from the recording server through Milestone Interconnect
4. Upgrade the recording servers. You can install recording servers using the installation wizard (see Install
a recording server through Download Manager on page 166) or silently (see Install a recording server
silently on page 173). The advantage of a silent install is that you can do it remotely.
If you enable encryption and the selected server authentication certificate is not
trusted on all relevant computers running, they lose connection. For more
information, see Secure communication (explained) on page 146.
368 | Upgrade
Administrator manual | XProtect® VMS 2024 R1
l System configuration
l Task
l Available functions
l When you work with rules, time and notification profiles, users, roles:
Panes layout
The illustration outlines a typical window layout. You can customize the layout so it may
look different on your computer.
2. Overview pane
3. Properties pane
4. Preview pane
This is your main navigation element in the Management Client. It reflects the name, settings and configurations
of the site that you have logged into. The site name is visible at the top of the pane. The features are grouped
into categories that reflect the functionality of the software.
In the Site Navigation pane, you can configure and manage your system so it matches your needs. If your
system is not a single-site system, but includes federated sites, note that you manage these sites on the
Federated Site Hierarchy pane.
Available functionality depends on the system you are using. See the complete feature list, which is available on
the product overview page on the Milestone website (https://www.milestonesys.com/products/software/product-
index/).
This is your navigation element that displays all Milestone Federated Architecture sites in a parent/child site
hierarchy.
You can select any site, log into it and the Management Client for that site launches. The site that you are logged
into, is always at the top of the hierarchy.
Overview pane
Provides an overview of the element you have selected in the Site Navigation pane, for example as a detailed
list. When you select an element in the Overview pane, it typically displays the properties in the Properties pane.
When you right-click elements in the Overview pane you get access to the management features.
Properties pane
Displays the properties of the element selected in the Overview pane. The properties appear on several
dedicated tabs:
Preview pane
The Preview pane appears when you work with recording servers and devices. It shows preview images from
the selected cameras or displays information about the state of the device. The example shows a camera
preview image with information about the resolution and data rate of the camera's live stream:
By default, the information shown with the camera preview images concerns live streams. This is displayed in
green text above the preview. If you want recording stream information instead (red text), select View > Show
Recording Streams in the menu.
Performance can be affected if the Preview pane displays preview images from many cameras at a high frame
rate. To control the number of preview images, and their frame rate, select Options > General in the menu.
Available functionality depends on the system you are using. See the complete feature list, which is available on
the product overview page on the Milestone website (https://www.milestonesys.com/products/software/product-
index/).
Management Client
Name Description
Name Description
Select Action > Refresh from the menu for the change to take
effect.
When adding new camera devices This setting does not affect multicast settings on existing
automatically enable: Multicast cameras.
Recording server
Name Description
Client users with the necessary user permissions can manually interrupt the
patrolling of PTZ cameras. Select how much time should pass before regular
Timeout for manual patrolling is resumed after a manual interruption. The setting applies for all PTZ
PTZ sessions cameras on your system. Default setting is 15 seconds.
If you want individual timeouts on the cameras, you specify this on the Presets tab
for the camera.
Client users with a sufficient PTZ priority can pause patrolling on PTZ cameras.
Select how much time should pass before regular patrolling is resumed after a
Timeout for pause pause. The setting applies for all PTZ cameras on your system. Default setting is 10
patrolling sessions minutes.
If you want individual timeouts on the cameras, you specify this on the Presets tab
for the camera.
Set the default timeout period for reserved PTZ sessions. When a user runs a
reserved PTZ session, the PTZ camera cannot be used by others before it is
Timeout for released either manually or when the period has timed out. Default setting is 1
reserved PTZ hour.
sessions
If you want individual timeouts on the cameras, you specify this on the Presets tab
for the camera.
Select this check box to use the default preset position instead of the home position
of PTZ cameras when activating the Home button in a client.
A default preset position must be defined for the camera. If a default preset
Use default preset position is not defined, nothing will happen when activating the Home button in a
as PTZ home client.
position
By default, this check box is cleared.
Ignore device The system logs all communication errors on hardware and devices, but here you
communication select for how long a communication error must exist before the rule engine
Name Description
errors if
communication
triggers the Communication Error event.
reestablished
before
For more information, see Identify user activity, events, actions and errors.
Name Description
l System logs
Logs
l Audit logs
l Rule-triggered logs
Allow 2018 R2 and earlier components to write logs. For more information, see Allow 2018 R2
and earlier components to write logs.
For System logs, specify the level of messages that you want to log:
For Audit logs, enable user access logging if you want the system to log all user actions in
XProtect Smart Client. These are, for example, exports, activating outputs, and viewing cameras
live or in playback.
Specify:
Name Description
This means that as long as the user plays back within this period, the system only
generates one log entry. When playing back outside the period, the system creates a
new log entry.
l The number of records (frames) a user has seen before the system creates a log entry
Name Description
Sender e-
Enter the email address that you want to appear as the sender of email notifications for all
mail
notification profiles. Example: [email protected].
address
Mail server Enter the address of the SMTP mail server that sends e-mail notifications. Example:
address mailserver.organization.org.
Mail server The TCP port used for connecting to the mail server. Default port is 25 for unencrypted
port connections, Encrypted connections typically use port 465 or 587.
Encrypt If you want to secure the communication between the management server and the SMTP
the mail server, select this check box.
connection The connection is secured using the STARTTLS email protocol command. In this mode, the
to the session begins on an unencrypted connectcion, then a STARTTLS command is issued by the
server SMTP mail server to the management server to switch to secure communication using SSL.
Server
If enabled, you must specify a user name and password for the users to log in to the mail
requires
server.
login
Name Description
(Not available for all codecs). Use the slider to select the degree of compression
(0-100) to be performed by the codec.
0 means no compression, generally resulting in high image quality and large file
Compression quality size. 100 means maximum compression, generally resulting in low image quality
and small file size.
If the slider is not available, the compression quality is determined entirely by the
selected codec.
(Not available for all codecs). If you want to use keyframes, select the check box
and specify the required number of frames between keyframes.
If the check box is not available, or not selected, every frame contains the entire
view of the camera.
(Not available for all codecs). If you want to use a particular data rate, select the
check box and specify the number of kilobytes per second.
Data rate The data rate specifies the size of the attached AVI file.
If the check box is not available, or not selected, the data rate is determined by the
selected codec.
You can also specify the IP version of the system: IPv4 or IPv6. Default value is IPv4.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
On the Bookmarks tab, you can specify settings for bookmarks, their IDs and function in XProtect Smart Client.
Name Description
Specify a prefix for all the bookmarks that is made by the users of XProtect Smart
Bookmark ID prefix
Client.
Specify the default start and end time of a bookmark is set in XProtect Smart
Client.
Default bookmark This setting needs to be aligned with:
time
l The default bookmark rule, see Rules (Rules and Events node).
To specify the bookmark permissions of a role, see Device tab (roles) on page 529.
Name Description
The name for the external IDP. The name appears in the Authentication field in the log-
Name
in window of your client.
Authentication
The URL of the external IDP.
authority
Add and configure an external IDP. When you select Add, the External IDP dialog box
Add opens and you can enter the information for the configuration, see Configure an
external IDP below the table.
l To add an external IDP, select Add in the External IDP section and enter the information in the table
below. You can only add one external IDP:
Name Description
The name for the external IDP that you enter here appears in the Authentication field in the
Name
log in window of your client.
Client ID
and Must be obtained from the external IDP. The client ID and the client secret are needed to
Client communicate securely with the external IDP.
secret
Name Description
The user sign-in flow is initiated in the XProtect VMS. A browser is launched with a sign-in page
that is hosted by the external IDP. When the authentication process is completed, the callback
path (XProtect login address + /idp/ + callback path), is invoked and the user is redirected to the
XProtect VMS.
The callback path is constructed by the login address entered in the client + /idp/ + the callback
path configured on the external IDP. The URI is client specific so URIs for, for example, Smart
Client and XProtect Web Client will be different.
The management server address is the address that you enter in the login dialog box in Smart
Client or XProtect Management Client. For the XProtect Web Client and the XProtect Mobile, the
redirect address is the entered address + port + /idp/ + callback path.
Specify to the external IDP if the user should stay logged in or if a verification of the user is
Prompt
required. Depending on the external IDP, the verification can include a password verification or
for login
a full log-in.
Claim to
use to Optionally, specify which claim from the external IDP that should be used to generate a unique
create user name for the auto-provisioned user in the VMS. For more information about unique user
user names crated by claims, see Unique user names for external IDP users.
name
Optionally, use scopes to limit the number of claims that you get from an external IDP. If you
Scopes know that the claims that are relevant for your VMS are in a specific scope, you can use the
scope to limit the number of claims that you get from the external IDP.
Register claims
When you have registered claims from the external IDP, you can map the claims to roles in the VMS to
determine the user privileges in the VMS. For more information, see Map claims from an external IDP.
l To register claims from an external IDP, select Add in the Registered claims section and enter the
information in the table below:
Name Description
External
The name of the external IDP.
IDP
Name of the claim as it was defined in the external IDP. In this field, the claim name must be
Claim
entered exactly as it is set in the external IDP. The claim name does not appear anywhere else
name
in the Management Client.
Display The display name of a claim. This is the name that you will see in the roles setup in
name Management Client.
- E-mail addresses
- Role names
- Group names
Add, If you modify a claim at the external IDP web site, a new log in to the
Edit, XProtect client is required by the users. Say, that a user, Bob, needs to
Remove be, for example, Operator. The claim is then added to Bob at the external
IDP web site, but if Bob is already logged in to XProtect, he must
complete a new login for the change to take effect.
The redirect URI is the location where the user is redirected after a successful log in. The redirect URIs must be
an exact match of the addresses of the web clients. For example, you will not be able to log in via an external IDP
if you open XProtect Web Client from https://localhost:8082/index.html and the redirect URI for the web
clients you added is https://127.0.0.1:8082/index.html.
Name Description
Enter a redirect URI for each of the addresses that can be used to access the XProtect
Mobile server / XProtect Web Client.
For example, the redirect URIs might be used both with and without the domain details.
l https://[device name]:8082/index.html
URI l https://[full device name including domain]:8082/index.html
l https://localhost:8082/index.html
l https://127.0.0.1:8082/index.html
l https://[server_IP]:8082/index.html
Add, Edit,
Remove When you remove URIs, you must keep at least one redirect URI for
the system to work.
Customer Dashboard is an online monitoring service that provides a graphical overview of the current status of
your system, including possible technical issues such as camera failures, to system administrators or other
people that have been given access to information about your system installation.
You can select or clear the check box to change your Customer Dashboard settings at any time.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
On the Evidence Lock tab, you define and edit evidence lock profiles and the duration your client users can
select to keep the data protected.
Name Description
To specify the evidence lock access permissions of a role, see the Device tab (roles) on page 529 for role
settings.
The maximum number of uploaded files is 50 and the maximum size allowed for each file is 1 MB.
Name Description
Provides the name of a message. You enter the name when you add a message. To upload a
Name
message to the system, click Add.
Name Description
You enter the description when you add a message. You can use the description field to
describe the purpose or the actual message.
Add l .wav
l .wma
l .flac
Edit Lets you modify the name and description, or you can replace the actual file.
Click this button to listen to the audio message from the computer that runs the
Play
Management Client.
To create a rule that triggers playback of audio messages, see Add a rule.
To learn more about actions in general that you can use in rules, see Actions and stop actions.
By enabling usage data collection, you consent to Milestone Systems's use of technology
by Google as a third-party provider, with which data processing in the USA cannot be
excluded. For more information about data protection and the usage data collection, see
the GDPR privacy guide.
The use of XProtect Access requires that you have purchased a base license that allows
you to access this feature.
Name Description
Name Description
Enable Specify if you want to use analytics events. As default, the feature is disabled.
Specify the port used by this feature. The default port is 9090.
Port
Make sure that relevant VCA tool providers also use this port number. If you change
the port number, remember to change the port number of the providers.
All network
addresses or Specify if events from all IP addresses/hostnames are allowed, or only events from IP
Specified network addresses/hostnames that are specified in the Address list (see below).
addresses
Specify a list of trusted IP addresses/hostnames. The list filters incoming data so that
only events from certain IP addresses/hostnames are allowed. You can use both
Domain Name System (DNS), IPv4 and IPv6 address formats.
You can add addresses to your list by manually entering each IP address or host
name, or by importing an external list of addresses.
Address list
l Manual entering: Enter the IP address/hostname in the address list. Repeat
for each required address
l Import: Click Import to browse for the external list of addresses. The external
list must be a .txt file and each IP address or host name must be on a
separate line
Name Description
Specify the number of days for storing alarms with the state Closed in the database. If
you set the value to 0, the alarm is deleted after it has been closed.
Specify the number of days for storing alarms with the state New, In progress, or On
hold. If you set the value to 0, the alarm appears in the system, but will not be stored.
Enable verbose To keep a more detailed log for event server communication, select the check box. It will
logging be stored for the number of days specified in the Keep logs for field.
Specify the number of days for storing events in the database. There are two ways of
Event types
doing this:
Name Description
l You can specify the retention time for an entire event group. Event types with the
value Follow group will inherit the value of the event group
l Even if you set a value for an event group, you can specify the retention time for
individual event types.
For more information about how to configure actual generic events, see Generic events (explained).
Name Description
You can choose between two default data sources and define a custom data source. What
to choose depends on your third party program and/or the hard- or software you want to
interface from:
Compatible: Factory default settings are enabled, echoes all bytes, TCP and UDP, IPv4
only, port 1234, no separator, local host only, current code page encoding (ANSI).
Data source
International: Factory default settings are enabled, echoes statistics only, TCP only,
IPv4+6, port 1235, <CR><LF> as separator, local host only, UTF-8 encoding. (<CR><LF> =
13,10).
[Data source A]
[Data source B]
Name Description
and so on.
Enabled Data sources are by default disabled. Select the check box to enable the data source.
Click to reset all settings for the selected data source. The entered name in the Name field
Reset
remains.
Protocols which the system should listen for, and analyze, in order to detect generic events:
TCP and UDP packages used for generic events may contain special characters, such as @,
#, +, ~, and more.
IP type
Selectable IP address types: IPv4, IPv6 or both.
selector
Separator Select the separator bytes used to separate individual generic event records. Default for
bytes data source type International (see Data sources earlier) is 13,10. (13,10 = <CR><IF>).
Name Description
Encoding
By default, the list only shows the most relevant options. Select the Show all check box to
type
display all available encodings.
selector
Allowed
Specify the IP addresses, that the management server must be able to communicate with
external
in order to manage external events. You can also use this to exclude IP addresses that you
IPv4
do not want data from.
addresses
Allowed
Specify the IP addresses, that the management server must be able to communicate with
external
in order to manage external events. You can also use this to exclude IP addresses that you
IPv6
do not want data from.
addresses
Component menus
File menu
You can save changes to the configuration and exit the application. You can also back up your configuration, see
Backing up and restoring your system configuration (explained) on page 322.
Edit menu
View menu
Name Description
Reset Application Reset the layout of the different panes in the Management Client to their default
Layout settings.
Name Description
Toggle the Preview pane on and off when working with recording servers and
Preview Window
devices.
By default, the information shown with preview images in the Preview pane
Show Recording
concerns live streams of the cameras. If you want information about recording
Streams
streams instead, select Show Recording Streams.
Federated Site
By default, the Federated Site Hierarchy pane is enabled.
Hierarchy
Action menu
The content of the Action menu differs depending on the element you have selected in the Site Navigation
pane. The actions you can choose from are the same as when you right-click the element.
Name Description
Refresh Is always available and reloads the requested information from the management server.
Tools menu
Name Description
Opens the Options dialog box, which lets you define and edit global system settings.
Options
For more information see System settings (Options dialog box) on page 373.
Help menu
You can access the help system and information about the version of the Management Client.
In a cluster environment, you must set up your cluster and ensure that it is running before
you create certificates for all the computers in the cluster environment. After that you can
install the certificates and do the registration using the Server Configurator for all the
nodes in the cluster. For more information, see the certificates guide about how to secure
your XProtect VMS installations.
Select the certificate to be used to encrypt Enable encryption to and from the
Server the two-way connection between the management server
certificate management server, data collectors, log Enable server encryption for recording
server, and recording servers. servers or remote servers
Registering servers
Language selection
Use this tab to select the language for the Server Configurator. The set of languages for the Server Configurator
corresponds to the set of languages for the Management Client.
Name Description
Choose
Choose the language of the user interface.
language
If you work in a failover cluster environment, it is recommended that you pause the
cluster before you start tasks in the Server Configurator. This is because the Server
Configurator may need to stop services while applying changes and the failover cluster
environment may interfere with this operation.
Failover
Management Recording Event
Recording
Server Server Server
Server Description
Manager tray Manager Manager
Manager
icon tray icon tray icon
tray icon
Running
Failover
Management Recording Event
Recording
Server Server Server
Server Description
Manager tray Manager Manager
Manager
icon tray icon tray icon
tray icon
Stopped
Starting
Stopping
In indeterminate state
Running offline
Name Description
Click the appropriate menu item to start or to stop the Management Server
Start Management service. If you stop the Management Server service, you cannot use the
Server and Stop Management Client.
Management Server The state of the service is reflected by the tray icon. For more information about
the states of the tray icons, see Server manager tray icons (explained).
Show status
View a list of time-stamped status messages.
messages
Assign or change a system configuration password. You can also choose not to
Change system password protect the system configuration by removing any assigned system
configuration configuration passwords.
password settings
Change the system configuration password settings
Enter the system Enter a password. This applies if, for example, the file that is holding the
configuration password settings is deleted or corrupted. For more information, see Enter the
password system configuration password settings.
Launch the configuration wizard for the failover management server or open the
Configure failover Manage your configuration page to manage your existing configuration. For
management server more information about the failover cluster, see XProtect Management Server
Failover on page 53.
Open the Server Configurator to register servers and manage encryption. For
Server Configurator more information about managing encryption, see Manage encryption with the
Server Configurator.
Name Description
On the management server computer, change the software license code. You
Change license would need to enter a new license code to, for example, upgrade your XProtect
system. For more information, see Change the Software License Code.
Open a dialog box from where you can restore the system configuration. Make
Restore configuration sure, you read the information in the dialog box, before you click Restore. For
more information, see Restore system configuration from a manual backup.
Select shared backup Set a backup folder to store your backup in, before you back up any system
folder configuration. For more information, see Select shared backup folder.
Open a wizard to change the SQL Server address. In the rare event of a host
name change, the SQL Server address might need to be aligned with the
Update SQL address
changes. For more information, see A host name change can trigger the change
of the SQL server address.
Basics node
To learn more about the various information and features available from the License Information window, see
License Information window on page 128.
Therefore, you can add additional information to each child site and this information is then available for the
administrators on the central site.
l Site name
l Address/location
l Administrator(s)
l Additional information
Name Description
Enter/edit. Provided with your camera at purchase. For further details, see
Camera password
your camera's manual or go to the Axis website (https://www.axis.com/).
External address Enter/edit the web address of the ST server to which the camera(s) connect.
Enter/edit the web address of the ST server to which the recording server
Internal address
connects.
Owner authentication
See Camera password.
key
Passwords (for Dispatch Enter password. Must be identical to the one received from your system
Server) provider.
Enter password. Must be identical to the one entered when the Axis One-Click
Passwords (for ST server)
Connection Component was installed.
Register/Unregister at
Indicate whether you wish to register your Axis camera with the Axis dispatch
the Axis Dispatch
service. Can be done at time of setup or later.
Service
Name Description
Select the check box if you decided to use credentials during the installation of
Use credentials
the ST server.
User name (for Dispatch Enter a user name. The user name must be identical to the one received from
Server) your system provider.
User name (for ST Enter user name. Must be identical to the one entered when the Axis One-
server) Click Connection Component was installed.
Servers node
Servers (node)
This section describes how to install and configure recording servers and failover recording servers. You also
learn how to add new hardware to the system and interconnect other sites.
Recording servers are computers where you have installed the Recording Server software, and configured it to
communicate with the management server. You can see your recording servers in the Overview pane when you
expand the Servers folder and then select Recording Servers.
Backward compatibility with recording server versions older than this version of the management server is
limited. You can still access recordings on recording servers with older versions, but if you want to change their
configuration, make sure they match this version of the management server. Milestone recommends that you
upgrade all recording servers in your system to the same version as your management server.
When you right-click the Recording Server Manager tray icon and select Change settings, you can specify the
following:
Name Description
Port number to be used when communicating with the management server. Default is
Port
port 9000. You can change this if you need to.
Port number to be used for handling web server requests, for example for handling PTZ
Web server
camera control commands and for browse and live requests from XProtect Smart Client.
port
Default is port 7563. You can change this if you need to.
Port number to be used when the recording server listens for TCP information (some
Alert server
devices use TCP for sending event messages). Default is port 5432 (disabled by default).
port
You can change this if you need to.
Port number to be used when the recording server listens for Simple Mail Transfer
Protocol (SMTP) information. SMTP is a standard for sending email messages between
SMTP server
servers. Some devices use SMTP for sending event messages or images to the
port
surveillance system server via email. Default is port 25, which you can enable and disable.
You can change the port number if you need to.
Encrypt
connections Before you enable encryption and select a server authentication certificate from the list,
from the make sure that you enable encryption on the management server first and that the
management management server certificate is trusted on the recording server.
server to the
recording For more information, see Secure communication (explained) on page 146.
server
Encrypt
Before you enable encryption and select a server authentication certificate from the list,
connections
make sure that the certificate is trusted on all computers running services that retrieve
to clients and
data streams from the recording server.
services that
Name Description
XProtect Smart Client and all services that retrieve data streams from the recording
server must be upgraded to version 2019 R1 or later. Some third-party solutions created
using MIP SDK versions older than 2019 R1 may need to be updated.
stream data For more information, see Secure communication (explained) on page 146.
To verify that your recording server uses encryption, see View encryption status to clients
on page 284.
Details View Windows Certificate Store information about the selected certificate.
On the Info tab, you can verify or edit the name and description of the recording server.
You can view the host name and addresses. The padlock icon in front of the web server address indicates
encrypted communication with the clients and services that retrieve data streams from this recording server.
Name Description
You can choose to enter a name for the recording server. The name is used in the system
and clients when the recording server is listed. The name does not have to be unique.
Name
When you rename a recording server, the name is changed globally in the Management
Client.
You can choose to enter a description that appears in a number of listings within the system.
Description
A description is not mandatory.
Name Description
Displays the local address of the recording server's web server. You use the local address,
for example, for handling PTZ camera control commands, and for handling browsing and live
requests from XProtect Smart Client.
Local web
server The address includes the port number that is used for web server communication (typically
address port 7563).
If you enable encryption to clients and servers that retrieve data streams from the recording
server, a padlock icon appears, and the address includes https instead of http.
Displays the public address of the recording server's web server over the internet.
If your installation uses a firewall or NAT router, enter the address of the firewall or NAT
router so that clients that access the surveillance system on the internet can connect to the
Web server recording server.
address
You specify the public address and port number on the Network tab.
If you enable encryption to clients and servers that retrieve data streams from the recording
server, a padlock icon appears, and the address includes https instead of http.
Time zone Displays the time zone that the recording server is located in.
On the Storage tab, you can set up, manage and view storages for a selected recording server.
For recording storages and archives, the horizontal bar shows the current amount of free space. You can specify
the behavior of the recording server in case recording storages become unavailable. This is mostly relevant if
your system includes failover servers.
If you are using Evidence lock, there will be a vertical red line showing the space used for evidence locked
footage.
Available functionality depends on the system you are using. See the complete feature list, which is available on
the product overview page on the Milestone website (https://www.milestonesys.com/products/software/product-
index/).
In the Storage and Recording Settings dialog box, specify the following:
Name Description
Specify the path to the directory to which you save recordings in this storage. The storage
does not necessarily have to be located on the recording server computer.
Path
If the directory does not exist, you can create it. Network drives must be specified by using
UNC (Universal Naming Convention) format, example: \\server\volume\directory\.
Specify for how long recordings should stay in the archive before they are deleted or moved
to the next archive (depending on archive settings).
Retention
time The retention time must always be longer than the retention time of the previous archive or
the default recording database. This is because the number of retention days specified for an
archive includes all the retention periods stated earlier in the process.
Select the maximum number of gigabytes of recording data to save in the recording
database.
Recording data in excess of the specified number of gigabytes is auto-moved to the first
archive in the list - if any is specified - or deleted.
Maximum When less than 5GB of space is free, the system always auto-archives
size (or deletes if no next archive is defined) the oldest data in a database.
If less than 1GB space is free, data is deleted. A database always
requires 250MB of free space. If you reach this limit (if data is not
deleted fast enough), no more data is written to the database until you
have freed enough space. The actual maximum size of your database
is the amount of gigabytes you specify, minus 5GB.
Enables a digital signature to the recordings. This means, for example, that the system
Signing confirms that exported video has not been modified or tampered with when played back.
l None
Encryption
l Light (less CPU usage)
Name Description
If you select Light, a part of the recording is encrypted. If you select Strong, the whole
recording is encrypted.
If you choose to enable encryption, you must also specify a password below.
Password Milestone recommends that you use strong passwords. Strong passwords do not contain
words that can be found in a dictionary or are part of the user's name. They include eight or
more alpha-numeric characters, upper and lower cases, and special characters.
Name Description
Specify the path to the directory to which you save recordings in this storage. The storage
does not necessarily have to be located on the recording server computer.
Path
If the directory does not exist, you can create it. Network drives must be specified by using
UNC (Universal Naming Convention) format, example: \\server\volume\directory\.
Specify for how long recordings should stay in the archive before they are deleted or moved
to the next archive (depending on archive settings).
Retention
time The retention time must always be longer than the retention time of the previous archive or
the default recording database. This is because the number of retention days specified for an
archive includes all the retention periods stated earlier in the process.
Maximum Select the maximum number of gigabytes of recording data to save in the recording
size database.
Name Description
Recording data in excess of the specified number of gigabytes is auto-moved to the first
archive in the list - if any is specified - or deleted.
When less than 5GB of space is free, the system always auto-archives
(or deletes if no next archive is defined) the oldest data in a database. If
less than 1GB space is free, data is deleted. A database always
requires 250MB of free space. If you reach this limit (if data is not
deleted fast enough), no more data is written to the database until you
have freed enough space. The actual maximum size of your database
is the amount of gigabytes you specify, minus 5GB.
Specify an archiving schedule that outlines the intervals with which the archiving process
Schedule should start. You can archive very frequently (in principle every hour all year round), or very
infrequently (for example, every first Monday of every 36 months).
To reduce FPS when archiving, select the Reduce frame rate check box and set a frame per
second (FPS).
Reduce
Reduction of frame rates by a selected number of FPS makes your recordings take up less
frame
space in the archive, but it also reduces the quality of your archive.
rate
MPEG-4/H.264/H.265 reduces automatically to key-frames as a minimum.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
If your organization uses failover recording servers, use the Failover tab to assign failover servers to recording
servers, see Failover tab properties.
For details on failover recording servers, installation and settings, failover groups and their settings, see Failover
recording server (explained) on page 40.
Name Description
Primary failover Select a regular failover setup with one primary and possibly one secondary failover
Name Description
server group /
Secondary failover server group.
server group
Select a hot standby setup with one dedicated recording server as hot standby
Hot standby server
server.
Advanced failover l Full Support: Enables full failover support for the device
settings l Live Only: Enables only failover support for live streams on the device
By default, the port number is 11000. You use this port for communication between
Failover service
recording servers and failover recording servers. If you change the port, the
communication
recording server must be running and must be connected to the management
port (TCP)
server.
Your system supports multicasting of live streams from recording servers. If multiple XProtect Smart Client
users want to view live video from the same camera, multicasting helps saving considerable system resources.
Multicasting is particularly useful if you use the Matrix functionality, where multiple clients require live video
from the same camera.
Multicasting is only possible for live streams, not for recorded video/audio.
If a recording server has more than one network interface card, it is only possible to use
multicast on one of them. Through the Management Client you can specify which one to use.
If you are using failover servers, remember to also specify the IP address of the network
interface card on the failover servers (see Multicast tab (failover server) on page 416).
The successful implementation of multicasting also requires that you have set up your
network equipment to relay multicast data packets to the required group of recipients
only. If not, multicasting may not be different from broadcasting, which can significantly
slow down network communication.
Specify the range you want to assign as addresses for multicast streams from the selected recording server.
The clients connect to these addresses when the users view multicast video from the recording server.
For each multicast camera feed, the IP address and port combination must be unique (IPv4 example:
232.0.1.0:6000). You can either use one IP address and many ports, or many IP addresses and fewer ports. By
default, the system suggests a single IP address and a range of 1000 ports, but you can change this as required.
IP addresses for multicasting must be within the range defined for dynamic host allocation by IANA. IANA is the
authority overseeing global IP address allocation.
Name Description
In the Start field, specify the first IP address in the required range. Then specify the last IP
IP address
address in the range in the End field.
In the Start field, specify the first port number in the required range. Then specify the last
Port
port number in the range in the End field.
You can only multicast on one network interface card, so this field is relevant if your
recording server has more than one network interface card or if it has a network interface
card with more than one IP address.
Source IP
address for To use the recording server's default interface, leave the value 0.0.0.0 (IPv4) or :: (IPv6) in
all multicast the field. If you want to use another network interface card, or a different IP address on the
streams same network interface card, specify the IP address of the required interface.
Specify the settings for data packets (datagrams) transmitted through multicasting.
Name Description
Maximum Transmission Unit, the largest allowed physical data packet size (measured in bytes).
Messages larger than the specified MTU are split into smaller packets before they are sent. The
MTU
default value is 1500, which is also the default on most Windows computers and Ethernet
networks.
Time To Live, the largest allowed number of hops a data packet should be able to travel before it is
TTL discarded or returned. A hop is a point between two network devices, typically a router. Default
value is 128.
If you need to access the VMS with XProtect Smart Client over a public or untrusted
network, Milestone recommends that you use a secure connection through VPN. This
helps ensure that communication between XProtect Smart Client and the VMS server is
protected.
Clients may connect from the local network as well as from the Internet, and in both cases the surveillance
system must provide suitable addresses so the clients can get access to live and recorded video from the
recording servers:
l When clients connect locally, the surveillance system should reply with local addresses and port numbers
l When clients connect from the internet, the surveillance system should reply with the recording server's
public address. This is the address of the firewall or NAT (Network Address Translation) router, and often
also a different port number. The address and the port can then be forwarded to the server's local
address and port.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
A failover recording server is an extra recording server which takes over from the standard recording server if
this becomes unavailable. You can configure a failover recording server in two modes, as a cold standby server
or as a hot standby server.
You install failover recording servers like standard recording servers (see Install a failover recording server
through Download Manager on page 169). Once you have installed failover recording servers, they are visible in
the Management Client. Milestone recommends that you install all failover recording servers on separate
computers. Make sure that you configure failover recording servers with the correct IP address/host name of
the management server. The user permissions for the user account under which the Failover Server service
runs are provided during the installation process. They are:
l Read and Write access permissions to read or write the RecorderConfig.xml file
If a certificate is selected for encryption, then the administrator must grant read access permission to the
failover user on the selected certificate private key.
If the failover recording server takes over from a recording server that uses encryption,
Milestone recommends that you also prepare the failover recording server for using
encryption. For more information, see Secure communication (explained) on page 146
and Install a failover recording server through Download Manager on page 169.
You can specify what type of failover support you want on device-level. For each device on a recording server,
select full, live only or no failover support. This helps you prioritize your failover resources and, for example, only
set up failover for video and not for audio, or only have failover on essential cameras, not on less important
ones.
While your system is in failover mode, you cannot replace or move hardware, update the
recording server, or change device configurations such as storage settings or video
stream settings.
In a cold standby failover recording server setup, you group multiple failover recording servers in a failover
group. The entire failover group is dedicated to take over from any of several preselected recording servers, if
one of these becomes unavailable. You can create as many groups as you want (see Group failover recording
servers for cold standby on page 207).
Grouping has a clear benefit: when you later specify which failover recording servers should take over from a
recording server, you select a group of failover recording servers. If the selected group contains more than one
failover recording server, this offers you the security of having more than one failover recording server ready to
take over if a recording server becomes unavailable. You can specify a secondary failover server group that
takes over from the primary group if all the recording servers in the primary group are busy. A failover recording
server can only be a member of one group at a time.
Failover recording servers in a failover group are ordered in a sequence. The sequence determines the order in
which the failover recording servers will take over from a recording server. By default, the sequence reflects the
order in which you have incorporated the failover recording servers in the failover group: first in is first in the
sequence. You can change this if you need to.
In a hot standby failover recording server setup, you dedicate a failover recording server to take over from one
recording server only. Because of this, the system can keep this failover recording server in a "standby" mode
which means that it is synchronized with the correct/current configuration of the recording server it is dedicated
to and can take over much faster than a cold standby failover recording server. As mentioned, you assign hot
standby servers to one recording server only and cannot group it. You cannot assign failover servers that are
already part of a failover group as hot standby recording servers.
To validate a merge of video data from the failover server to the recording server, you
must make the recording server unavailable by either stopping the recording server
service or shutting down the recording server computer.
Any manual interruption of the network that you can cause by pulling out the network
cable or blocking the network using a test tool is not a valid method.
Name Description
The name of the failover recording server as it appears in the Management Client, logs and
Name
more.
An optional field that you can use to describe the failover recording server, for example
Description
which recording server it takes over from.
Host name Displays the failover recording server's host name. You cannot change this.
Displays the local address of the failover recording server's web server. You use the local
address, for example, for handling PTZ camera control commands, and for handling
browsing and live requests from XProtect Smart Client.
Local web The address includes the port number that is used for web server communication (typically
server port 7563).
address If the failover recording server takes over from a recording server that uses encryption, you
also need to prepare the failover recording server to use encryption.
If you enable encryption to clients and servers that retrieve data streams from the recording
server, a padlock icon appears, and the address includes https instead of http.
Web server Displays the public address of the failover recording server's web server on the internet.
Name Description
If your installation uses a firewall or NAT router, enter the address of the firewall or NAT
router so that clients that access the surveillance system on the internet can connect to the
failover recording server.
address
You specify the public address and port number on the Network tab.
If you enable encryption to clients and servers that retrieve data streams from the recording
server, a padlock icon appears, and the address includes https instead of http.
The port number used for communication between failover recording servers. Default port is
UDP port
8844.
Specify the path to the database used by the failover recording server for storing recordings.
Database You cannot change the database path while the failover recording server is taking over from
location a recording server. The system applies the changes when the failover recording server is no
longer taking over from a recording server.
If you are using failover servers, and you have enabled multicasting of live streaming, you must specify the IP
address of the network interface card you are using, on both the recording servers and the failover servers.
For more information about multicasting, see Enable multicasting for the recording server on page 203.
Field Description
Name The name of the failover group as it appears in the Management Client, logs and more.
Field Description
Specify the failover Use Up and Down to set the wanted sequence of regular failover recording
sequence servers within the group.
Name Description
The system uses the name whenever the remote server is listed in the system and clients.
Name The name does not have to be unique.
When you rename a server, the name is changed globally in the Management Client.
Software
license The software license code of the remote system.
code
Driver Identifies the driver that handles the connection to the remote server.
Name Description
Opens the default home page of the hardware vendor. You can use this page for
IE
administration of the hardware or system.
Remote
The unique system ID of the remote site used by XProtect to, for example, manage licenses.
system ID
On the Settings tab, you can view the name of the remote system.
You can add events from the remote system to your central site in order to create rules and thereby respond
immediately to events from the remote system. The number of events depend on the events configured in the
remote system. You cannot delete default events.
1. Right-click the relevant remote server in the Overview pane and select Update Hardware.
2. The dialog box lists all changes (devices removed, updated and added) in the remote system since you
established or last refreshed the Milestone Interconnect setup. Click Confirm to update your central site
with these changes.
On the Remote Retrieval tab, you can handle remote recording retrieval settings for the remote site in a
Milestone Interconnect setup:
Name Description
Retrieve
Determines the maximum bandwidth in Kbits/s to be used for retrieving recordings from a
recordings
remote site. Select the check box to enable limiting retrievals.
at max
Name Description
Determines that retrieval of recordings from a remote site are limited to a specific time
interval.
Unfinished jobs at the end time continue until completion, so if the end time is critical, you
Retrieve need to set it earlier to allow for unfinished jobs to complete.
recordings If the system receives an automatic retrieval or request for retrieval from the XProtect
between Smart Client outside the time interval, it is accepted, but not started until the selected time
interval is reached.
You can view pending remote recording retrieval jobs initiated by the users from System
Dashboard -> Current Tasks.
Retrieve on Determines the maximum number of devices from which recordings are retrieved
devices in simultaneously. Change the default value if you need more or less capacity depending on
parallel your system's capabilities.
When you change the settings, it may take several minutes until the changes are reflected in the system.
Devices node
You can manage devices via the device groups if they have the same properties, see Device groups (explained)
on page 58.
Enabling/disabling and renaming of individual devices take place on the recording server hardware. See
Enable/disable devices via device groups.
For all other configuration and management of cameras, expand Devices in the Site Navigation pane, then
select a device:
l Cameras
l Microphones
l Speakers
l Metadata
l Inputs
l Outputs
In the Overview pane, you group your cameras for an easy overview of your cameras. Initial grouping is done as
part of the Add hardware wizard.
For information about supported hardware, see the supported hardware page on the
Milestone website (https://www.milestonesys.com/support/tools-and-
references/supported-devices/).
When you select a device, information about the current status appears in the Preview pane.
The following icons indicate the status of the devices:
The system comes with a default start feed rule which ensures that video feeds from all connected cameras are
automatically fed to the system. The default rule can be deactivated and/or modified as required.
Follow this configuration order to complete the most typical tasks related to configuration of a camera device:
4. Configure recording, see Record tab (devices) and Monitor the databases for devices.
The system comes with a default start audio feed rule which ensures that audio feeds from all connected
microphones are automatically fed to the system. The default rule can be deactivated and/or modified as
required.
The system comes with a default start audio feed rule that starts the device so the device is ready to send user
activated audio to the speakers. The default rule can be deactivated and/or modified as required.
Before you specify use of external input units on a device, verify that the device itself
recognize the sensor operation. Most devices can show this in their configuration
interfaces, or via Common Gateway Interface (CGI) script commands.
Input devices are added automatically when you add hardware to the system. They are by default disabled, so
you must enable them before use, either as part of the Add Hardware wizard or afterwards. Input devices do
not require separate licenses. You can use as many input devices as required on your system.
Before you specify use of external output units on a device, verify that the device itself can
control the device attached to the output. Most devices can show this in their
configuration interfaces, or via Common Gateway Interface (CGI) script commands.
Output devices are added automatically when you add hardware to the system. They are by default disabled, so
you must enable them before use, either as part of the Add Hardware wizard or afterwards. Output devices do
not require separate licenses. You can use as many output devices as required on your system.
Devices tabs
On the Info tab, you can view and edit basic information about a device in a number of fields.
All devices have an Info tab.
Name Description
The name is used whenever the device is listed in the system and clients.
Name
When you rename a device, the name is changed globally in the Management Client.
Displays the name of the hardware, with which the device is connected. The field is non-
Hardware
editable from here, but you can change it by clicking Go To next to it. This takes you to
name
hardware information where you can change the name.
To apply a short name for the camera, enter it here. The maximum length of characters is
128.
Short name
If you are using smart map, automatically the short name is displayed with the camera on
the smart map. Otherwise the full name is displayed.
Enter the geographic location of the camera in the format latitude, longitude. The value
you enter determines the position of the camera icon on the smart map in XProtect Smart
Geo Client and XProtect Mobile client.
coordinates
The field is mainly for Smart Map and third-party integrations.
Enter the viewing direction of the camera measured against a due north point on a vertical
axis. The value you enter determines the direction of the camera icon on the smart map in
Direction XProtect Smart Client and XProtect Mobile client.
Name Description
Enter the width of the field of view in degrees. The value you enter determines the angle of
the field of view for the camera icon on the smart map in XProtect Smart Client and XProtect
Mobile client.
Field of
view The default value is 0.0.
Enter the depth of the field of view in meters or feet. The value you enter determines the
length of the field of view for the camera icon on the smart map in XProtect Smart Client and
XProtect Mobile client.
Depth The default value is 0.0.
To verify that you have entered the correct geographic coordinates, click the button. Google
Preview Maps will open in your standard Internet browser on the position you specify.
position in
browser The field is mainly for Smart Map and third-party integrations.
On the Settings tab, you can view and edit settings for a device in a number of fields.
All devices have a Settings tab.
The values appear in a table as changeable or read-only. When you change a setting to a non-default value, the
value appears in bold.
Allowed ranges appear in the information box below the settings table:
For more information about camera settings, see View or edit camera settings.
l Cameras
The Streams tab lists by default a single stream. It is the selected camera's default stream, used for live and
recorded video. If you use adaptive playback, two streams must be created.
Name Description
l Cameras
l Microphones
l Speakers
l Metadata
Recordings from a device are only saved in the database when you have enabled recording and the recording-
related rule criteria are met.
Name Description
Enable/disable recording
Recording
Enable recording on related devices
Use this button if you have added all devices in the group to
Delete All the same server:
Recordings
Delete recordings
Automatically
retrieve
remote
recordings Save and retrieve remote recording
when
connection is
restored
l Cameras
On the Motion tab, you can enable and configure motion detection for the selected camera.
Name Description
Motion
Enable and disable motion detection
detection
Hardware Select Automatic to enable hardware acceleration or select Off to disable the setting.
acceleration For more information, see Enable or disable hardware acceleration.
If you have defined areas with permanent privacy masks, you can select the Privacy
Privacy masks masks check box to display the privacy masks on the Motion tab. You define areas with
privacy masks on the Privacy masking tab (devices) on page 446.
Name Description
Determine how much each pixel in the image must change before it is regarded as
Manual motion:
sensitivity
Enable manual sensitivity to define motion
Determine how many pixels in the image must change before it is regarded as motion:
Threshold
Specify threshold to define motion
Select this check box to do motion detection on keyframes only instead of on the entire
Keyframes video stream. Only applies to MPEG-4/H.264/H.265.
only (MPEG-
4/H.264/H.265) Motion detection on keyframes reduces the amount of processing power used to carry
out the analysis.
Select an image processing interval in this list to determine how often the system
performs the motion detection analysis.
Process image
For example, every 1000 milliseconds are once every second. Default value is every 500
every (msec)
milliseconds.
The interval is applied if the actual frame rate is higher than the interval you set here.
Only the selected percentage of the image is analyzed, for example 25%. By analyzing
Detection
25%, only every fourth pixel in the image is analyzed instead of all pixels.
resolution
Using optimized detection reduces the amount of processing power used to carry out the
analysis, but also means a less accurate motion detection.
With this check box enabled, the system generates motion data for the images used for
Generate motion detection. For example, if you select motion detection on keyframes only, the
motion data motion data is also produced for keyframes only.
for smart The extra motion data enables the client user, via the smart search function, to quickly
search search for relevant recordings based on motion in the selected area of the image. The
system does not generate motion data within areas covered by permanent privacy
Name Description
masks, but only for areas with liftable privacy masks (see Motion detection (explained)).
Motion detection threshold and exclude regions do not influence the generated motion
data.
l Specify the default setting of generating smart search data for cameras under
Tools > Options > General.
Use exclude Exclude motion detection from specific areas of a camera view:
regions Specify exclude regions for motion detection
On the Presets tab, you can create or import preset positions, for example:
l In rules for making a PTZ (pan-tilt-zoom) camera move to a specific preset position when an event occurs
l In patrolling, for the automatic movement of a PTZ camera between a number of preset positions
You assign PTZ permission to roles on the Overall Security tab (see Overall Security tab (roles) on page 497) or
the PTZ tab (see PTZ tab (roles) on page 540).
Name Description
Select this check box to lock a preset position. You can lock
a preset position if you want to prevent users in XProtect
Smart Client or users with limited security permissions
from updating or deleting a preset. Locked presets are
Locked
indicated with this icon .
Name Description
PTZ session can run the PTZ camera in this mode. This
prevents other users from taking control over the camera.
With sufficient permissions, you can release other users'
reserved PTZ sessions:
The PTZ session table shows the current status of the PTZ camera.
Name Description
Displays the user that has pressed the Reserved button and currently controls the PTZ
User camera.
Displays the user's PTZ priority. You can only take over PTZ sessions from users with a lower
Priority
priority than you.
The check boxes in the PTZ session section enable you to change the following timeouts for each PTZ camera.
Name Description
Timeout
Specify the timeout period for manual PTZ sessions on this
for
camera if you want the timeout to be different from the default
manual
period. You specify the default period in the Tools menu under
PTZ
Options.
session
Timeout
Specify the timeout period for pause patrolling PTZ sessions on
for pause
this camera if you want the timeout to be different from the
patrolling
default period. You specify the default period in the Tools menu
PTZ
under Options.
session
Timeout
Specify the timeout period for reserved PTZ sessions on this
for
camera if you want the timeout to be different from the default
reserved
period. You specify the default period in the Tools menu under
PTZ
Options.
session
l PTZ cameras
On the Patrolling tab, you can create patrolling profiles - the automatic movement of a PTZ (pan-tilt-zoom)
camera between a number of preset positions.
Before you can work with patrolling, you must specify at least two preset positions for the camera in the Presets
tab, see Add a preset position (type 1).
Name Description
Wait time
Specify the time at each preset position
(sec)
Customize
Customize transitions (PTZ)
transitions
Go to specific
position on Specify an end position when patrolling
finish
Manual
Monitor if the system is currently patrolling or a user has taken control.
patrolling
Use the Start and Stop buttons to initiate and stop manual patrolling.
Start and Stop See Specify PTZ session timeouts for information about how to specify how much time
should pass before regular patrolling is resumed for all or for individual PTZ cameras.
The Manual patrolling table shows the current status of the PTZ camera.
Name Description
Displays the user who has either reserved the PTZ session or started a manual patrolling and
User currently controls the camera.
Name Description
Displays the user's PTZ priority. You can only take over PTZ sessions from users or patrolling
Priority
profiles with a lower priority than yours.
Timeout Displays the remaining time of the current reserved or manual PTZ sessions.
On the Fisheye Lens tab, you can enable and configure fisheye lens support for the selected camera.
Name Description
Enable fisheye
Enable and disable fisheye lens support
lens support
l Cameras
l Microphones
l Inputs
In addition to the system's event, some devices can be configured to trigger events. You can use these events
when creating event-based rules in the system. Technically, they occur on the actual hardware/device rather
than on the surveillance system.
Name Description
Name Description
Configured Which events you may select and add in the Configured events list is determined entirely by
events the device and its configuration. For some types of devices, the list is empty.
The list of properties depends on the device and the event. In order for the event to work as
General intended, you must specify some or all of the properties identically on the device as well as
on this tab.
l Cameras
On the Client tab you can specify which other devices are viewed and heard when you use the camera in
XProtect Smart Client.
The related devices also record when the camera records, see Enable recording on related devices on page 227.
You can also enable Live multicast on the camera. It means that the camera multicasts live streams to the
clients via the recording server.
Multicast streams are not encrypted, even if the recording server uses encryption.
Name Description
Name Description
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
XProtect Essential+ 2018 R1 and onwards does not support privacy masking, so if you upgrade from a system
with privacy masks applied, the masks will be removed.
l Cameras
On the Privacy masking tab, you can enable and configure privacy protection for the selected camera.
Name Description
Task Description
Create a devices report with information about your Create a report of your privacy masking
cameras' current privacy masking settings. configuration
Name Description
The selected grid size determines the density of the grid, regardless whether the grid is
Grid size
visible in the preview or not.
Name Description
Show grid Select the Show grid check box to make the grid visible.
When you select the Show privacy masks check box (default), permanent privacy masks
Show appear in purple in the preview and liftable privacy masks in green.
privacy
masks Milestone recommends that you keep the Show privacy masks box selected so that you and
your colleagues can see the current privacy protection configuration.
Use the Pen size slider to indicate the size of the selections you wish to make when you click
Pen size and drag the grid to select regions. Default is set to small, which is equivalent to one square
in the grid.
Appears in purple in the preview on this tab and on the Motion tab.
Permanent privacy masks are always visible in XProtect Smart Client and cannot be lifted.
Permanent Can be used to cover areas of the video that never requires surveillance, like public areas,
mask where surveillance is not allowed. Motion detection is excluded from permanent masks.
You specify the coverage of privacy masks as either solid or some level of blurred. The
coverage settings apply to both live and recorded video.
Liftable privacy masks can be lifted in XProtect Smart Client by users with sufficient user
permissions. By default, the privacy masks are lifted for 30 minutes, or until the user apply
them again. Be aware that the privacy masks are lifted on video from all the cameras that
Liftable the user has access to.
mask
If the XProtect Smart Client user does not have the permission to lift privacy masks, the
system asks for a user with permission to authorize the lift.
You specify the coverage of privacy masks as either solid or a level of blurred. The coverage
settings apply to both live and recorded video.
Use the slider to select the blurring level of the privacy masks in the clients or set the
coverage to solid.
By default, the coverage of areas with permanent privacy masks are solid (nontransparent).
Blurring
By default, liftable privacy masks are medium blurred.
You can inform the client users about the appearance of permanent and liftable privacy
masks, so they are able to distinguish.
If your hardware is located behind a NAT-enabled router or a firewall, you may need to
specify a different port number and configure the router/firewall so it maps the port and
IP addresses that the hardware uses.
The Add Hardware wizard helps you detect hardware like cameras and video encoders on your network and
add them to the recording servers on your system. The wizard also helps you add remote recording servers for
Milestone Interconnect setups. Only add hardware to one recording server at a time.
For information about the Info tab for remote servers, see Info tab (remote server) on page 418.
Name Description
Enter a name. The system uses the name whenever the hardware is listed in the system and
Name in the clients. The name does not have to be unique.
When you rename hardware, the name is changed globally in the Management Client.
Serial Hardware serial number as specified by the manufacturer. The serial number is often, but
number not always, identical to the MAC address.
Driver Identifies the driver that handles the connection to the hardware.
Opens the default home page of the hardware vendor. You can use this page for
IE
administration of the hardware.
Name Description
Specifies the Media Access Control (MAC) address of the system hardware. A MAC address
MAC
is a 12-character hexadecimal number uniquely identifying each piece of hardware on a
address
network.
Firmware The firmware version of the hardware device. To ensure that the system displays the current
version: version, run the Update hardware data wizard after every firmware update.
Password
The Password last changed field shows the time stamp of the latest password change
last
based on the local time settings of the computer that the password was changed from.
changed
Hardware
data last Time and date of the last update of the hardware data.
updated:
On the Settings tab, you can verify or edit settings for the hardware.
The content of the Settings tab is determined by the selected hardware, and varies
depending on the type of hardware. For some types of hardware, the Settings tab
displays no content at all or read-only content.
For information about the Settings tab for remote servers, see Settings tab (remote server) on page 419.
On the PTZ tab, you can enable PTZ (pan-tilt-zoom) for video encoders. The tab is available if the selected device
is a video encoder or if the driver supports both non-PTZ and PTZ cameras.
You must enable the use of PTZ separately for each of the video encoder's channels on the PTZ tab before you
can use the PTZ features of the PTZ cameras attached to the video encoder.
Not all video encoders support the use of PTZ cameras. Even video encoders that support
the use of PTZ cameras may require configuration before the PTZ cameras can be used. It
is typically the installation of additional drivers through a browser-based configuration
interface on the device's IP address.
PTZ tab, with PTZ enabled for two channels on a video encoder.
Client node
Clients (node)
This article describes how to customize the user interface for operators in XProtect Smart Client and for system
administrators in the Management Client.
Info tab
On the Info tab for a Smart Wall definition, you can add and edit Smart Wall properties.
Name Description
Name The name of the Smart Wall definition. Displayed in XProtect Smart Client as the Smart Wall
Name Description
A description of the Smart Wall definition. The description is only used internally in XProtect
Description
Management Client.
Status text Display camera and system status information in camera view items.
No title bar Hide the title bar on all view items on the video wall.
Title bar Show the title bar on all view items on the video wall.
Presets tab
On the Presets tab for a Smart Wall definition, you can add and edit Smart Wall presets1.
Name Description
Apply the preset on the Smart Wall monitors that are configured to use the preset. To apply a
Activate
preset automatically, you must create a rule that uses the preset.
Layout tab
On the Layout tab for a Smart Wall definition, you position the monitors, so their positions resemble the
mounting of the physical monitors on the video wall. The layout is also used in XProtect Smart Client.
1A predefined layout for one or more Smart Wall monitors in XProtect Smart Client. Presets determine which
cameras are displayed, and how content is structured on each monitor on the video wall.
Name Description
To move a monitor to a new position, select the monitor and drag it to the desired position, or
Movement
click one of the arrow buttons to move the monitor in the selected direction.
Zoom Zoom in or out of the Smart Wall layout preview to ensure you position the monitors
buttons correctly.
Name The name of the monitor. The name is displayed in XProtect Smart Client.
Aspect
The height/width relationship of the physical monitor on the video wall.
ratio
Monitor properties
Info tab
On the Info tab for a monitor in a Smart Wall preset, you can add monitors and edit the monitor settings.
Name Description
Name The name of the monitor. The name is displayed in XProtect Smart Client.
A description of the monitor. The description is only used internally in the XProtect
Description
Management Client.
Aspect
The height/width relationship of the physical monitor on the video wall.
ratio
Empty Defines what should be displayed on a monitor with an empty preset layout when a new
preset Smart Wall preset is triggered or selected in XProtect Smart Client:
Name Description
Defines what should be displayed in an empty preset item when a new Smart Wall preset is
Empty triggered or selected in XProtect Smart Client:
preset
l Select Preserve to keep the current content in the layout item.
item
l Select Clear to clear the content so nothing is displayed in the layout item.
Defines how cameras are inserted in the monitor layout when viewed in the XProtect Smart
Client:
l Independent - only the content of the affected layout item changes, the rest of the
content in the layout remain the same.
l Linked - the contents of the layout items are pushed from left to right. If, for
example, a camera is inserted in position 1, the previous camera of position 1 is
Element pushed to position 2, the previous camera of position 2 is pushed to position 3, and so
insertion on. llustrated in this example:
Presets tab
On the Presets tab for a monitor in a Smart Wall preset, you can edit the view layout and content of the monitor
in the selected Smart Wall preset.
Name Description
Preset A list of Smart Wall presets for the selected Smart Wall definition.
Name Description
Click Edit to edit the layout and the content of the selected monitor.
Click Clear to define a new layout or to exclude the monitor in the Smart Wall preset so the
Edit
monitor is available for other content not controlled by the Smart Wall preset.
Click to select the layout you want to use with your monitor, and click OK.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
On the following tabs, you can specify the properties of each Smart Client profile. You can lock the settings in the
Management Client if required, so the users of XProtect Smart Client cannot change them.
To create or edit Smart Client profiles, expand Client and select Smart Client Profiles.
Tab Description
Name and description, priority of existing profiles and an overview of which roles use the profile.
Info If a user is a member of more than one role, each with their individual Smart Client profile, the user
gets the Smart Client profile with the highest priority.
Tab Description
Settings such as show/hide and mini- and maximize menu settings, login/-out, startup, timeout,
info and messaging options, and enabling or disabling of certain tabs in XProtect Smart Client.
The Camera error messages, Server error messages, and Live video error message settings
let you control if these error messages are displayed as an overlay, as a black image with
overlay, or if they are hidden.
The Live video stopped message is displayed in XProtect Smart Client when the camera live
feed is stopped. For example if the camera has stopped sending images even though it's
connected.
If you Hide the camera error messages, there is a risk that the operator
General
overlooks that the connection to a camera has been lost.
The Cameras allowed during search setting lets you control how many cameras operators can
add to searches in XProtect Smart Client. Setting a camera limit can help you prevent
overloading the system.
The Online help setting lets you to disable the help system in XProtect Smart Client.
The Video tutorials setting lets you disable the Video tutorials button in XProtect Smart Client.
The button redirects operators to the video tutorials page:
https://www.milestonesys.com/support/help-yourself/video-tutorials/
Tab Description
Advanced settings such as maximum decoding threads, deinterlacing and time zone settings.
Maximum decoding threads controls how many decoding threads are used to decode video
Advanced streams. It can help improve performance on multi-core computers in live as well as playback
mode. The exact performance improvement depends on the video stream. It is mainly
relevant if using heavily coded high-resolution video streams like H.264/H.265, for which the
Tab Description
performance improvement potential can be significant, and less relevant if using, for example,
JPEG or MPEG-4.
With deinterlacing, you convert video into a non-interlaced format. Interlacing determines
how an image is refreshed on a screen. The image is refreshed by first scanning the odd lines
in the image, then scanning the even lines. This allows a faster refresh rate because less
information is processed during each scan. However, interlacing may cause flickering, or the
changes in half of the image's lines may be noticeable.
Adaptive streaming enables XProtect Smart Client to automatically select the live video
streams with the best match in resolution to the streams requested by the view item. This
decreases the load on the CPU and the GPU and thereby improves the decoding capability
and performance of the computer. This requires multi-streaming of live video streams with
different resolutions to be configured, see Manage multi-streaming. Adaptive streaming can
be applied in both live and playback mode. In playback mode, adaptive streaming is referred
to as adaptive playback. Adaptive playback requires that two streams are set to recording. For
more information about how to add streams for adaptive streaming in live mode and for
adaptive playback, see Add a stream on page 229.
Tab Description
Availability of the live mode and other live features, camera playback, camera overlay buttons, and
Live
bounding boxes, and also live-related MIP plug-ins.
Tab Description
Availability of the playback mode and other playback features, layout of print reports,
Playback independent playback, bookmarks, and bounding boxes, and also playback-related MIP plug-
ins.
Tab Description
Tab Description
Paths, privacy masks, video and still image formats and what to include when exporting these,
Export
export formats for XProtect Smart Client – Player and much more.
Tab Description
Whether to include audio or not, visibility of indication of time and motion, and finally how to
Timeline handle playback gaps.
You can also select whether to show additional data or additional markers from other sources.
Tab Description
Access Select if access request notifications should pop up on the XProtect Smart Client screen
Control when triggered by events.
Tab Description
Specify whether:
l Desktop notifications for alarms should be displayed on the computers where XProtect
Smart Client is installed. The notifications appear only if XProtect Smart Client is running
- even if minimized
l Alarms should play sound notifications on the computers where XProtect Smart Client is
installed. The sound notifications play only if XProtect Smart Client is running - even if
minimized
Tab Description
l XProtect Smart Client will automatically create locations when a user adds a custom
Smart overlay to the smart map.
map You can also specify how often you want the system to delete data related to smart maps from
your computer. To help XProtect Smart Client display smart map faster, the client saves map data
in the cache on your computer. Over time this might slow down your computer.
If you want to use Bing Maps or Google Maps as geographic backgrounds, enter a Bing Maps API
key, or a Maps Static API key from Google.
On the Info tab, you can set the following for Management Client profiles:
Component Requirement
Component Requirement
Use the up and down arrows to set a priority for the Management Client
Priority
profile.
Roles using the This field shows the roles that you have associated with the Management
Management Client profile Client profile. You cannot edit this.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
On the Profile tab, you can enable or disable the visibility of the following elements from the Management
Client's user interface:
Navigation
In this section, decide if an administrator user associated with the Management Client profile is allowed to see
the various features and functionality located in the Navigation pane.
Navigation
Description
element
Allows the administrator user associated with the Management Client profile to see License
Basics
Information and Site Information.
Remote
Allows the administrator user associated with the Management Client profile to see Axis
Connect
One-click Camera Connection.
Services
Navigation
Description
element
Allows the administrator user associated with the Management Client profile to see
Servers
Recording Servers and Failover Servers.
Allows the administrator user associated with the Management Client profile to see
Devices
Cameras, Microphones, Speakers, Metadata, Input and Output.
Allows the administrator user associated with the Management Client profile to see Smart
Client
Wall, View Groups, Smart Client Profiles, Management Client Profiles and Matrix.
Allows the administrator user associated with the Management Client profile to see Rules,
Rules and
Time Profiles, Notification Profiles, User-defined Events, Analytics Events and Generic
Events
Events.
Allows the administrator user associated with the Management Client profile to see Roles
Security
and Basic Users.
Allows the administrator user associated with the Management Client profile to see System
System
Monitor, System Monitor Thresholds, Evidence Lock, Current Tasks and Configuration
Dashboard
Reports.
Server Allows the administrator user associated with the Management Client profile to see system,
Logs audit, and rule-triggered logs.
Allows the administrator user associated with the Management Client profile to see Access
Access
Control features, if you have added any access control system integrations or plug-ins to
Control
your system.
Details
In this section, decide if an administrator user associated with the Management Client profile is allowed to see
the various tabs for a specific device channel, for example the Settings tab or Record tab for cameras.
Device
Description
channel
Allows the administrator user associated with the Management Client profile to see some
Cameras
or all camera-related settings and tabs.
Allows the administrator user associated with the Management Client profile to see some
Microphones
or all microphone-related settings and tabs.
Allows the administrator user associated with the Management Client profile to see some
Speakers
or all speaker-related settings and tabs.
Allows the administrator user associated with the Management Client profile to see some
Metadata
or all metadata-related settings and tabs.
Allows the administrator user associated with the Management Client profile to see some
Input
or all input-related settings and tabs.
Allows the administrator user associated with the Management Client profile to see some
Output
or all output-related settings and tabs.
Tools Menu
In this section, decide if an administrator user associated with the Management Client profile is allowed to see
the elements that are part of the Tools menu.
Tool Menu
Description
option
Registered Allows the administrator user associated with the Management Client profile to see
Services Registered Services.
Allows the administrator user associated with the Management Client profile to see
Effective Roles
Effective Roles.
Allows the administrator user associated with the Management Client profile to see
Options
Options.
Federated Sites
In this section, decide if an administrator user associated with the Management Client profile is allowed to see
the Federated Site Hierarchy pane.
Default
Description
rule
Go to Ensures that PTZ cameras go to their respective default preset positions after you have
Preset operated them manually. This rule is not enabled by default.
when PTZ Even when you have enabled the rule, you must have defined default preset positions for the
is done relevant PTZ cameras in order for the rule to work. You do this on the Presets tab.
Ensures that video is recorded automatically when an operator sets a bookmark in XProtect
Smart Client. This is provided you have enabled recording for the relevant cameras.
Recording is enabled by default.
Record on
Bookmark The default recording time for this rule is three seconds before the bookmark is set and 30
seconds after the bookmark is set. You can edit the default recording times in the rule. The
pre-buffer which you set on the Record Tab must match or be longer than the pre-recording
time.
Ensures that as long as motion is detected in video from cameras, the video is recorded,
Record on provided recording is enabled for the relevant cameras. Recording is by default enabled.
Motion While the default rule specifies recording based on detected motion, it does not guarantee
that the system records video, as you may have disabled individual cameras' recording for
Default
Description
rule
one or more cameras. Even when you have enabled recording, remember that the quality of
recordings may be affected by individual camera's recording settings.
Ensures that video is recorded automatically when an external request occurs, provided
Record on recording is enabled for the relevant cameras. Recording is enabled by default.
Request The request is always triggered by a system integrating externally with your system, and the
rule is primarily used by integrators of external systems or plug-ins.
Ensures that audio feeds from all connected microphones and speakers are automatically
fed to the system.
Start Audio
Feed While the default rule enables access to connected microphones' and speakers' audio feeds
immediately upon installing the system, it does not guarantee that audio is recorded, as you
must specify recording settings separately.
Ensures that video feeds from all connected cameras are automatically fed to the system.
Start Feed While the default rule enables access to connected cameras' video feeds immediately upon
installing the system, it does not guarantee that video is recorded, as cameras' recording
settings must be specified separately.
Ensures that data feeds from all connected cameras are automatically fed to the system.
Start
Metadata While the default rule enables access to connected cameras' data feeds immediately upon
Feed installing the system, it does not guarantee that data is recorded, as cameras' recording
settings must be specified separately.
Show
Ensures that all access control events categorized as 'Access Request', will cause an access
Access
request notification to pop up in XProtect Smart Client, unless the notification function is
Request
disabled in the Smart Client profile.
Notification
If you accidentally delete any of the default rules, you can recreate them by entering the following content:
Goto preset Perform an action on PTZ Manual Session Stopped from All Cameras
when PTZ is
done Move immediately to default preset on the device on which event occurred
Play Audio on Perform an action on Request Play Audio Message from External
Request Play audio message from metadata on the devices from metadata with priority 1
Perform an action on Motion Started from All Cameras start recording three seconds
Record on before on the device on which event occurred
Motion Perform stop action on Motion Stopped from All Cameras stop recording three seconds
after
Perform an action on Request Start Recording from External start recording immediately
Record on on the devices from metadata
Request Perform stop action on Request Stop Recording from External stop recording
immediately
Start Audio Perform an action in a time interval always start feed on All Microphones, All Speakers
Feed Perform an action when time interval ends stop feed immediately
Start Metadata Perform an action in a time interval always start feed on All Metadata
Feed Perform an action when time interval ends stop feed immediately
Show Access Perform an action on Access request (Access Control Categories) from Systems [+ units]
Request
Notification Show built-in access request notification
Component Requirement
Enter a descriptive name for the notification profile. The name appears later whenever you
Name
select the notification profile during the process of creating a rule.
Description Enter a description of the notification profile. The description appears when you pause your
(optional) mouse pointer over the notification profile in the Overview pane's Notification Profiles list.
Enter the e-mail addresses to which the notification profile's e-mail notifications should be
Recipients sent. To enter more than one e-mail address, separate addresses with a semicolon.
Example: [email protected];[email protected];[email protected]
Enter the text you want to appear as the subject of the e-mail notification.
Subject
You can insert system variables, such as Device name, in the subject and message text
field. To insert variables, click the required variable links in the box below the field.
Enter the text you want to appear in the body of the e-mail notifications. In addition to the
message text, the body of each e-mail notification automatically contains this information:
Message
text l What triggered the e-mail notification
Specify required minimum time (in seconds) to pass between the sending of each e-mail
notification. Examples:
Number of Specify the maximum number of still images you want to include in each of the notification
Component Requirement
Time
Specify the number of milliseconds you want between the recordings presented on the
between
included images. Example: With the default value of 500 milliseconds, the included images
images
show recordings with half a second between them.
(ms)
This setting is used to specify the start of the AVI file. By default, the AVI file contains
Time before
recordings from 2 seconds before the notification profile is triggered. You can change this to
event (sec.)
the number of seconds you require.
This setting is used to specify the end of the AVI file. By default, the AVI file ends 4 seconds
Time after
after the notification profile is triggered. You can change this to the number of seconds you
event (sec.)
require.
Specify the number of frames per second you want the AVI file to contain. Default is five
Frame rate
frames per second. The higher the frame rate, the higher the image quality and AVI file size.
Embed
If selected (default), images are inserted in the body of e-mail notifications. If not, images
images in
are included in e-mail notifications as attached files.
e-mail
Events overview
When you add an event-based rule in the Manage Rule wizard, you can select between a number of different
event types. In order for you to get a good overview, events you can select are listed in groups according to
whether they are:
Hardware:
Some hardware can create events themselves, for example to detect motion. You can use these as events but
you must configure them on the hardware before you can use them in the system. You may only be able to use
the events listed on some hardware as not all types of cameras can detect tampering or temperature changes.
Configurable events from hardware are automatically imported from device drivers. This means that they vary
from hardware to hardware and are not documented here. Configurable events are not triggered until you have
added them to the system and configured them on the Event tab for hardware. Some of the configurable events
also require that you configure the camera (hardware) itself.
Event Description
Configurable events from devices are automatically imported from device drivers. This means that they vary
from device to device and are not documented here. Configurable events are not triggered until you have added
them to the system and configured them on the Event tab on a device.
Event Description
Bookmark
Occurs when a bookmark is made in live mode in the clients. Also, a requirement for
Reference
using the Default record on bookmark rule.
Requested
Communication
Occurs when communication with a device is successfully established.
Started (Device)
Communication
Stopped Occurs when communication with a device is successfully stopped.
(Device)
Event Description
Evidence Lock Occurs when an evidence lock is changed for devices by a client user or via the MIP
Changed SDK.
Evidence
Occurs when an evidence lock is created for devices by a client user or via the MIP SDK.
Locked
Evidence Occurs when an evidence lock is removed for devices by a client user or via the MIP
Unlocked SDK.
Feed overflow (media overflow) occurs when a recording server cannot process
received data as quickly as specified in the configuration and therefore is forced to
discard some recordings.
If the server is healthy, feed overflow usually happens because of slow disk writes. You
can resolve this either by reducing the amount of data written, or by improving the
Feed Overflow storage system's performance. Reduce the amount of written data by reducing frame
Started rates, resolution or image quality on your cameras, but this may degrade recording
quality. If you are not interested in that, instead improve your storage system's
performance by installing extra drives to share the load or by installing faster disks or
controllers.
You can use this event to trigger actions that helps you avoid the problem, for example,
to lower the recording frame rate.
Feed Overflow
Occurs when feed overflow (see Feed Overflow Started on page 470) ends.
Stopped
Live Client Feed The event occurs upon the request even if the client user's request later turns out to be
Requested unsuccessful, for example because the client user does not have the permissions
required for viewing the requested live feed or because the feed is for some reason
stopped.
Manual Occurs when a client user starts a recording session for a camera.
Recording
Started The event is triggered even if the device is already recording via rule actions.
Event Description
Manual Occurs when a client user stops a recording session for a camera.
Recording If the rule system also has started a recording session it continues recording even after
Stopped the manual recording is stopped.
Marked Data Occurs when an evidence lock is made in playback mode in the clients or via the MIP
Reference SDK.
Requested An event is created that you can use in your rules.
Occurs when the system detects motion in video received from cameras.
This type of event requires that the system's motion detection is enabled for the
cameras to which the event is linked.
Motion Started
In addition to the system's motion detection, some cameras can detect motion
themselves and trigger the Motion Started (HW) event, but it depends on the
configuration of the camera hardware and in the system. See also Hardware -
Configurable events: on page 468.
Occurs when motion is no longer detected in received video. See also Motion Started on
page 471.
This type of event requires that the system's motion detection is enabled for the
cameras to which the event is linked.
Motion Stopped
In addition to the system's motion detection, some cameras can detect motion
themselves and trigger the Motion Stopped (HW) event, but it depends on the
configuration of the camera hardware and in the system. See also Hardware -
Configurable events: on page 468.
Output
Occurs when an external output port on a device is deactivated.
Deactivated
Event Description
This type of event requires that at least one device on your system supports output
ports.
Occurs when a manually operated PTZ session (as opposed to a PTZ session based on
PTZ Manual scheduled patrolling or automatically triggered by an event) is started on a camera.
Session Started This type of event requires that the cameras to which the event is linked are PTZ
cameras.
Occurs when a manually operated PTZ session (as opposed to a PTZ session based on
PTZ Manual scheduled patrolling or automatically triggered by an event) is stopped on a camera.
Session
Stopped This type of event requires that the cameras to which the event is linked are PTZ
cameras.
Recording Occurs whenever recording is started. There is a separate event for manual recording
Started started.
Recording Occurs whenever recording is stopped. There is a separate event for manual recording
Stopped stopped.
Settings
Occurs when settings on a device are successfully changed.
Changed
Settings Occurs when an attempt is made to change settings on a device, and the attempt is
Changed Error unsuccessful.
Event Description
Request Play Activated when play audio messages are requested via the MIP SDK.
Audio Through the MIP SDK a third-party vendor can develop custom plug-ins (for example,
Message integration to external access control systems or similar) for your system.
Request Start Activated when start recordings are requested via the MIP SDK.
Event Description
Through the MIP SDK a third-party vendor can develop custom plug-ins (for example,
Recording
integration to external access control systems or similar) for your system.
Activated when stop recordings are requested via the MIP SDK.
Request Stop
Recording Through the MIP SDK a third party vendor can develop custom plug-ins (for example,
integration to external access control systems or similar) for your system.
Generic events allow you to trigger actions in the system by sending simple strings via the IP network to the
system. The purpose of generic events is to allow as many external sources as possible to interact with the
system.
A number of events custom made to suit your system may also be selectable. You can use such user-defined
events for:
l Making it possible for client users to manually trigger events while viewing live video in the clients
l Countless other purposes. For example, you may create user-defined events which occur if a particular
type of data is received from a device
Recording servers:
Event Description
Occurs when an archive for a recording server becomes available after having
Archive Available
been unavailable. See also Archive Unavailable on page 473.
Occurs when an archive for a recording server becomes unavailable, for example
if the connection to an archive located on a network drive is lost. In such cases,
Archive Unavailable you cannot archive recordings.
You can use the event to, for example, trigger an alarm or a notification profile so
that an email notification is automatically sent to relevant people in your
Event Description
organization.
Occurs when an archive for a recording server is not finished with the last
Archive Not Finished
archiving round when the next is scheduled to start.
Database Deleting
Recordings Before Set Occurs when the retention time limit is reached before the database size limit.
Retention Size
Database Deleting
Recordings Before Set Occurs when database size limit is reached before the retention time limit.
Retention Time
Occurs when a database disk is full. A database disk is full when there is less than
Database Disk Full - 5GB of space is left on the disk:
Auto Archiving The oldest data in a database is always auto-archived (or deleted if no next
archive is defined) when less than 5GB of space is free.
Occurs when a database disk is full and less than 1GB space is free. Data is
deleted even if a next archive is defined. A database always requires 250MB of
Database Disk Full - free space. If this limit is reached (if data is not deleted fast enough), no more
Deleting data is written to the database until enough space has been freed. The actual
maximum size of your database is the number of gigabytes you specify, minus
5GB.
Database Full - Auto Occurs when an archive for a recording server is full and needs to auto-archive to
Archiving an archive in the storage.
Occurs when a storage for a recording server becomes available after having
Database Storage been unavailable. See also Database Storage Unavailable on page 475.
Available You can, for example, use the event to start recording if it has been stopped by a
Database Storage Unavailable event.
Event Description
Occurs when a storage for a recording server becomes unavailable, for example
if the connection to a storage located on a network drive is lost. In such cases,
Database Storage you cannot archive recordings.
Unavailable You can use the event to, for example, stop recording, trigger an alarm or a
notification profile so an e-mail notification is automatically sent to relevant
people in your organization.
Failover encrypted Occurs when there is an SSL communication error between the failover server
communication error and monitored recording servers.
Occurs when a failover recording server takes over from a recording server. See
Failover Started
also Failover servers (node).
Occurs when a recording server becomes available again and can take over from
Failover Stopped
a failover recording server.
System monitor events are triggered by exceeded thresholds values configured in the System Monitor
Thresholds node. See also View the current state of your hardware and troubleshoot if needed on page 287.
Event Description
CPU usage critical Occurs when the CPU usage exceeds the critical CPU threshold.
CPU usage normal Occurs when the CPU usage falls back below the warning CPU threshold.
Occurs when the CPU usage exceeds the warning CPU threshold or falls back
CPU usage warning
below the critical CPU threshold.
Event Description
Memory usage
Occurs when the memory usage exceeds the critical memory threshold.
critical
Memory usage
Occurs when the memory usage falls back below the warning memory threshold.
normal
Memory usage Occurs when the memory usage exceeds the warning memory threshold or falls
warning back below the critical memory usage threshold.
NVIDIA decoding Occurs when the NVIDIA decoding usage exceeds the critical NVIDIA decoding
critical threshold.
NVIDIA decoding Occurs when the NVIDIA decoding usage falls back below the warning NVIDIA
normal decoding threshold.
NVIDIA decoding Occurs when the NVIDIA decoding usage exceeds the warning NVIDIA decoding
warning threshold or falls back below the critical NVIDIA decoding threshold.
NVIDIA memory Occurs when the NVIDIA memory usage exceeds the critical NVIDIA memory
critical threshold.
NVIDIA memory Occurs when the NVIDIA memory usage falls back below the warning NVIDIA
normal memory threshold.
NVIDIA memory Occurs when the NVIDIA memory usage exceeds the warning NVIDIA memory
warning threshold or falls back below the critical NVIDIA memory threshold.
NVIDIA rendering Occurs when the NVIDIA rendering usage exceeds the critical NVIDIA rendering
critical threshold.
NVIDIA rendering Occurs when the NVIDIA rendering usage falls back below the warning NVIDIA
normal rendering threshold.
NVIDIA rendering Occurs when the NVIDIA rendering usage exceeds the warning NVIDIA rendering
warning threshold or falls back below the critical NVIDIA rendering threshold.
Event Description
Event Description
Live FPS critical Occurs when the live FPS rate falls below the critical live FPS threshold.
Live FPS normal Occurs when the live FPS rate exceeds the warning live FPS threshold.
Occurs when the live FPS rate falls below the warning live FPS threshold or
Live FPS warning
exceeds the critical live FPS threshold.
Occurs when the recording FPS rate falls below the critical recording FPS
Recording FPS critical
threshold.
Recording FPS
Occurs when the recording FPS rate exceeds the warning recording FPS threshold.
normal
Recording FPS Occurs when the recording FPS rate falls below the warning recording FPS
warning threshold or exceeds the critical recording FPS threshold.
Occurs when the storage used for recordings by a specific camera exceeds the
Used space critical
critical used space threshold.
Occurs when the storage used for recordings by a specific camera falls back
Used space normal
below the warning used space threshold.
Occurs when the storage used for recordings by a specific camera exceeds the
Used space warning warning used space threshold or falls back below the critical used space
threshold.
Event Description
Free space critical Occurs when the disk space usage exceeds the critical free space threshold.
Free space normal Occurs when the disk space usage falls below the warning free space threshold.
Occurs when the disk space usage exceeds the warning free space threshold or
Free space warning
falls back below the critical free space threshold.
Event Description
Occurs when the system predicts that the storage will be filled up faster than the
Retention time
critical retention time threshold value. For example, when data from video streams
critical
is filling up the storage faster than expected.
Occurs when the system predicts that the storage will be filled up slower than the
Retention time
warning retention time threshold value. For example, when data from video
normal
streams is filling up the storage at the expected rate.
Occurs when the system predicts that the storage will be filled up faster than the
warning retention time threshold value or slower than the critical retention time
Retention time
threshold value. For example, when data from video streams is filling up the
warning
storage faster than expected due to more motion detected by the cameras
configured to record on motion.
Other:
Event Description
Scheduled password change started Occurs when a scheduled password change starts.
Scheduled password change completed Occurs when a scheduled password change completes
successfully without errors.
Scheduled password change completed Occurs when a scheduled password change completes
with errors with errors.
Events from XProtect extensions and integrations can be used in the rule system, for example:
Action Description
Start recording and saving data in the database from the selected devices.
When your select this type of action, the Manage Rule wizard prompts you to specify:
Start recording
on <devices> When recording should start. This happens either immediately or a number of
seconds before the triggering event/beginning of the triggering time interval and on
which devices the action should take place.
Action Description
This type of action requires that you have enabled recording on the devices to which
the action is linked. You can only save data from before an event or time interval if you
have enabled pre-buffering for the relevant devices. You enable recording and specify
pre-buffering settings for a device on the Record tab.
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Stop recording.
Without this stop action, recording would potentially continue indefinitely. You also
have the option of specifying further stop actions.
Begin data feed from devices to the system. When the feed from a device is started,
data is transferred from the device to the system, in which case you may view and
record, depending on the data type.
When you select this type of action, the Manage Rule wizard prompts you to specify
on which devices to start the feeds. Your system includes a default rule which ensures
that feeds are always started on all cameras.
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Stop feed.
Sets the XProtect Smart Wall to a selected preset. Specify the preset on the Smart
Set <Smart Wall> Wall Presets tab.
to <preset> No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
Action Description
time.
Sets a specific XProtect Smart Wall monitor to display live video from the selected
Set <Smart Wall> cameras on this site or any child site configured in Milestone Federated Architecture.
<monitor> to No mandatory stop action: This type of action does not require a stop action.You can
show <cameras> specify optional stop actions to be performed on either an event or after a period of
time.
Sets a specific XProtect Smart Wall monitor to display a user-defined text message of
Set <Smart Wall> up to 200 characters.
<monitor> to
show text No mandatory stop action: This type of action does not require a stop action.You can
<messages> specify optional stop actions to be performed on either an event or after a period of
time.
Sets a particular frame rate to use when the system displays live video from the
selected cameras that substitutes the cameras' default frame rate. Specify this on the
Settings tab.
When you select this type of action, the Manage Rule wizard prompts you to specify
which frame rate to set, and on which devices. Always verify that the frame rate you
Set live frame specify is available on the relevant cameras.
rate on <devices>
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Restore default live frame rate.
Without this stop action, the default frame rate would potentially never be restored.
You also have the option of specifying further stop actions.
Sets a particular frame rate to use when the system saves recorded video from the
Set recording selected cameras in the database, instead of the cameras' default recording frame
frame rate on rate.
<devices>
When you select this type of action, the Manage Rule wizard prompts you to specify
Action Description
You can only specify a recording frame rate for JPEG, a video codec with which each
frame is separately compressed into a JPEG image. This type of action also requires
that you have enabled recording on the cameras to which the action is linked. You
enable recording for a camera on the Record tab. The maximum frame rate you can
specify depends on the relevant camera types, and on their selected image resolution.
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Restore default recording frame rate.
Without this stop action, the default recording frame rate would potentially never be
restored. You also have the option of specifying further stop actions.
Sets the frame rate to record all frames when the system saves recorded video from
the selected cameras in the database, instead of keyframes only. Enable the
recording keyframes only function on the Record tab.
When you select this type of action, the Manage Rule wizard prompts you to select
which devices the action should apply for.
Set recording
frame rate to all You can only enable keyframe recording for MPEG-4/H.264/H.265. This type of action
frames for MPEG- also requires that you have enabled recording on the cameras to which the action is
4/H.264/H.265 on linked. You enable recording for a camera on the Record tab.
<devices>
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Restore default recording frame rate of keyframes for MPEG-4/H.264/H.265
Without this stop action, the default setting would potentially never be restored. You
also have the option of specifying further stop actions.
Begins PTZ patrolling according to a particular patrolling profile for a particular PTZ
camera with a particular priority. This is an exact definition of how patrolling should be
carried out, including the sequence of preset positions, timing settings, and more.
Start patrolling
on <device> If you have upgraded your system from an older version of the system, the old values
using <profile> (Very Low, Low, Medium, High and Very High) have been translated as follows:
with PTZ priority
l Very Low = 1000
<priority>
l Low = 2000
l Medium = 3000
Action Description
l High = 4000
When you select this type of action, the Manage Rule wizard prompts you to select a
patrolling profile. You can only select one patrolling profile on one device and you
cannot select several patrolling profiles.
This type of action requires that the devices to which the action
is linked are PTZ devices.
You must define at least one patrolling profile for the device(s).
You define patrolling profiles for a PTZ camera on the
Patrolling tab.
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Stop patrolling
Without this stop action, patrolling would potentially never stop. You can also specify
further stop actions.
Pauses PTZ patrolling. When you select this type of action, the Manage Rule wizard
prompts you to specify the devices on which to pause patrolling.
This type of action requires that the devices to which the action
is linked are PTZ devices.
Pause patrolling
on <devices> You must define at least one patrolling profile for the device(s).
You define patrolling profiles for a PTZ camera on the
Patrolling tab.
Stop action required: This type of action requires one or more stop actions. In one of
the following steps, the wizard automatically prompts you to specify the stop action:
Resume patrolling
Action Description
Without this stop action, patrolling would potentially pause indefinitely. You have also
the option of specifying further stop actions.
This type of action requires that the devices to which the action
is linked are PTZ devices.
Move <device> to
<preset> position
with PTZ priority
<priority> This action requires that you have defined at least one preset
position for those devices. You define preset positions for a PTZ
camera on the Presets tab.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Moves one or more particular cameras to their respective default preset positions -
however always according to priority. When you select this type of action, the Manage
Rule wizard prompts you to select which devices the action should apply for.
This type of action requires that the devices to which the action
Move to default
is linked are PTZ devices.
preset on
This action requires that you have defined at least one preset
<devices> with
position for those devices. You define preset positions for a PTZ
PTZ priority
camera on the Presets tab.
<priority>
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Set device Sets an output on a device to a particular state (activated or deactivated). When you
output to <state> select this type of action, the Manage Rule wizard prompts you to specify which state
Action Description
This type of action requires that the devices to which the action is linked each have at
least one external output unit connected to an output port.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Plays back an audio message on selected devices triggered by an event. Devices are
mostly speakers or cameras.
This type of action requires that you have uploaded the message to the system on
Tools > Options > Audio messages tab.
You can create more rules to the same event and send different messages to each
Play audio
device, but always according to priority. The priorities that control the sequence are
<message> on
those set on the rule and on the device for a role on the Speech tab:
<devices> with
<priority> l If a message is played back and another message with the same priority is
sent to the same speaker, the first message will complete and then the second
one starts
l If a message is played back and another message with a higher priority is sent
to the same speaker, the first message is interrupted and the second one
starts immediately
Sends a notification, using a particular notification profile. When you select this type of
action, the Manage Rule wizard prompts you to select a notification profile, and which
Send notification
devices to include pre-alarm images from. You can only select one notification profile
to <profile>
and you cannot select several notification profiles. A single notification profile may
contain several recipients.
Action Description
You can also create more rules to the same event and send different notifications to
each of the notification profiles. You can copy and re-use the content of rules by right-
clicking a rule in the Rules list.
This type of action requires that you have defined at least one notification profile. Pre-
alarm images are only included if you have enabled the Include images option for the
relevant notification profile.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Generates an entry in the rule log. When selecting this type of action, the Manage
Rule wizard prompts you to specify a text for the log entry. When you specify the log
text, you can insert variables, such as $DeviceName$, $EventName$, into the log
Make new <log message.
entry>
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Starts one or more plug-ins. When you select this type of action, the Manage Rule
wizard prompts you to select required plug-ins, and on which devices to start the plug-
ins.
Start plug-in on This type of action requires that you have at least one or more plug-ins installed on
<devices> your system.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Stops one or more plug-ins. When you select this type of action, the Manage Rule
wizard prompts you to select required plug-ins, and on which devices to stop the plug-
ins.
Stop plug-in on This type of action requires that you have at least one or more plug-ins installed on
<devices> your system.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Action Description
Changes device settings on one or more devices. When you select this type of action,
the Manage Rule wizard prompts you to select relevant devices, and you can define
the relevant settings on the devices you have specified.
If you define settings for more than one device, you can only
change settings that are available for all of the specified
devices.
Apply new
settings on
<devices>
Example: You specify that the action should be linked to Device 1 and Device 2.
Device 1 has the settings A, B and C, and Device 2 has the settings B, C and D. In this
case, you can only change the settings that are available for both devices, namely
settings B and C.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Makes video from the selected cameras appear on a computer capable of displaying
Matrix-triggered video such as a computer on which you have installed XProtect Smart
Client.
When you select this type of action, the Manage Rule wizard prompts you to select a
Matrix recipient, and one or more devices from which to display video on the selected
Set Matrix to Matrix recipient.
view <devices>
This type of action allows you to select only a single Matrix recipient at a time. If you
want to make video from the selected devices appear on more than one Matrix
recipient, you should create a rule for each required Matrix recipient or use the
XProtect Smart Wall feature. By right-clicking a rule in the Rules list, you can copy and
re-use the content of rules. This way, you can avoid having to create near-identical
rules from scratch.
Action Description
Generates a small message which logs events on selected devices. The text of SNMP
traps is auto-generated and cannot be customized. It can contain the source type and
name of the device on which the event occurred.
Send SNMP trap
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Retrieves and stores remote recordings from selected devices (that support edge
recording) in a specified period before and after the triggering event.
Retrieve and
This rule is independent of the Automatically retrieve remote recordings when
store remote
connection is restored setting.
recordings from
<devices> No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Retrieves and stores remote recordings in a specified period from selected devices
Retrieve and (that support edge recording).
store remote
This rule is independent of the Automatically retrieve remote recordings when
recordings
connection is restored setting.
between <start
and end time> No mandatory stop action: This type of action does not require a stop action.You can
from <devices> specify optional stop actions to be performed on either an event or after a period of
time.
Ensures that when an image is received from the Images Received event (sent via
Save attached
SMTP email from a camera), it is saved for future usage. In future, other events can
image
possibly also trigger this action.
Action Description
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Starts archiving on one or more archives. When you select this type of action, the
Activate Manage Rule wizard prompts you to select relevant archives.
archiving on No mandatory stop action: This type of action does not require a stop action.You can
<archives> specify optional stop actions to be performed on either an event or after a period of
time.
Relevant mostly within Milestone Federated Architecture, but you can also use this in a
single site setup. Use the rule to trigger a user-defined event on a site, normally a
On <site> trigger remote site within a federated hierarchy.
<user-defined
event> No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Lets you access request notifications pop up on the XProtect Smart Client screen when
the criteria for the triggering events are met. Milestone recommends that you use
access control events as triggering events for this action, because access request
notifications typically are configured for operating on related access control
Show <access commands and cameras.
request
This type of action requires that you have at least one access control plug-in installed
notification>
on your system.
No mandatory stop action: This type of action does not require a stop action.You can
specify optional stop actions to be performed on either an event or after a period of
time.
Action Description
You can view the progress of this action in the Current Tasks node. For more
information, seeView currently ongoing tasks on recording servers on page 285.
To view the action results - go to the Server Logs node, on the System logs tab. For
more information, see Server Logs tab (options) on page 377.
Send
Did sending a test event to the
analytics See table below.
Event Server succeed?
event
Error messages and solutions for the condition Send analytics event:
Error connecting to Unable to connect to the event server on the stated port. The error occurs most
event server likely because of network problems, or the Event Server service has stopped.
The connection to the event server is established, but the event cannot be sent.
Error sending
The error most likely occurs because of network problems, for example a time
analytics event
out.
The event has been sent to the event server, but no reply received. The error
Error receiving most likely occurs because of network problems or a port that is busy.
response from event
server See the event server log, typically located at
ProgramData\Milestone\XProtect Event Server\Logs\.
Analytics event
The Event Server service does not know the event. The error most likely occurs
unknown by event
because the event or changes to the event have not been saved.
server
Sender unauthorized
Most likely your machine is not on the list of allowed IP addresses or host names.
by event server
Invalid response The response is invalid. Possibly the port is busy or there are network problems.
received from Event See the event server log, typically located at
server ProgramData\Milestone\XProtect Event Server\Logs\.
The response is valid, but not understood. The error occurs possibly because of
Unknown response network problems, or the port is busy.
from event server See the event server log, typically located at
ProgramData\Milestone\XProtect Event Server\Logs\.
This feature only works if you have the XProtect event server installed.
Component Requirement
Unique name for the generic event. Name must be unique among all types of events, such
Name
as user defined events, analytics events, and so on.
Enabled Generic events are by default enabled. Clear the check box to disable the event.
Expression that the system should look out for when analyzing data packages. You can use
Expression
the following operators:
Component Requirement
l ( ): Used to ensure that related terms are processed together as a logical unit. They
can be used to force a certain processing order in the analysis
Example: The search criteria (User001 OR Door053) AND Sunday first processes the two
terms inside the parenthesis, then combines the result with the last part of the string. So,
the system first looks for any packages containing either of the terms User001 or Door053,
then takes the results and run through them in order to see which packages also contain the
term Sunday.
l AND: With an AND operator, you specify that the terms on both sides of the AND
operator must be present
Example: The search criteria User001 AND Door053 AND Sunday returns a result only if
the terms User001, Door053 and Sunday are all included in your expression. It is not
enough for only one or two of the terms to be present. The more terms you combine with
AND, the fewer results you retrieve.
l OR: With an OR operator, you specify that either one or another term must be present
Example: The search criteria "User001" OR "Door053" OR "Sunday" returns any results
containing either User001, Door053 or Sunday. The more terms you combine with OR, the
more results you retrieve.
Indicates how particular the system should be when analyzing received data packages. The
options are the following:
l Search: In order for the event to occur, the received data package must contain the
text specified in the Expression field, but may also have more content
Example: If you have specified that the received package should contain the terms
User001 and Door053, the event is triggered if the received package contains the
Expression terms User001 and Door053 and Sunday since your two required terms are
type contained in the received package
l Match: In order for the event to occur, the received data package must contain
exactly the text specified in the Expression field, and nothing else
l Regular expression: In order for the event to occur, the text specified in the
Expression field must identify specific patterns in the received data packages
If you switch from Search or Match to Regular expression, the text in the Expression field
is automatically translated to a regular expression.
Priority The priority must be specified as a number between 0 (highest priority) and 999999 (lowest
Component Requirement
priority).
The same data package may be analyzed for different events. The ability to assign a priority
to each event lets you manage which event should be triggered if a received package
matches the criteria for several events.
When the system receives a TCP and/or UDP package, analysis of the packet starts with
analysis for the event with the highest priority. This way, when a package matches the
criteria for several events, only the event with the highest priority is triggered. If a package
matches the criteria for several events with an identical priority, for example two events
with a priority of 999, all events with this priority is triggered.
Check if
expression
matches An event string to be tested against the expression entered in the Expression field.
event
string
The following fields are available when creating and editing webhooks:
Field Description
The URL of the web server or application you want to send event data to. If the URL of the
web server is updated, you must update the webhook URL in the webhook node.
Address
Using HTTP through unsecure networks (like open internet) exposes all the events in plain
text.
Enter a token which is used to help secure communication with other applications by
Token
validating the source of the HTTP POST.
Field Description
API version The version of the webhook plugin and API utilized for the webhook functionality.
Security node
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Name Description
Smart Client profile Select a Smart Client profile to associate with the role.
Name Description
Evidence lock profile Select an evidence lock profile to associate with the role.
Select a time profile for which the XProtect Smart Client user associated with this
role is allowed to log in.
Smart Client login
If the XProtect Smart Client user is logged in when the period expires, he or she is
within time profile
logged off automatically.
Select the check box to allow users associated with this role to log in to XProtect
Allow Smart Client Smart Client.
login Access to Smart Client is not allowed by default. Clear the check box to deny
access to XProtect Smart Client.
Select the check box to allow users associated with this role to log in to XProtect
Allow XProtect Mobile Mobile client.
client login Access to XProtect Mobile client is not allowed by default. Clear the check box to
deny access to XProtect Mobile client.
Select the check box to allow users associated with this role to log in to XProtect
Allow XProtect Web Web Client.
Client login Access to XProtect Web Client is not allowed by default. Clear the check box to
deny access to XProtect Web Client.
Select the check box to associate login authorization with the role. It means that
Login authorization
XProtect Smart Client or the Management Client asks for a second authorization,
required
typically by a superuser or manager, when the user logs in.
Name Description
Make users
Select the check box to hide the names of users associated with this role when
anonymous during
they control PTZ sessions.
PTZ sessions
On the User and Groups tab, you assign users and groups to roles (see Assign/remove users and groups
to/from roles on page 282). You can assign Windows users and groups or basic users (see Users (explained) on
page 66).
On the External IDP tab, you can view existing claims and add new claims to roles.
Name Description
External
The name of the external IDP.
IDP
Claim
A variable that is defined in the external IDP.
name
Claim The value of the claim, such as a group name, that can be used to assign the appropriate role to
value the user.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
On the Overall Security tab, you set up overall permissions for roles. For every component available in your
system, define access permissions for the roles by setting Allow or Deny. When a role is denied access to a
component, that component is not visible in the Overall Security tab to a user in that role.
The Overall Security tab is not available in the free XProtect Essential+.
You can define more access permissions for XProtect Corporate than for the other XProtect VMS products. This
is because you can only set up differentiated administrator permissions in XProtect Corporate, while you can set
up overall permissions for a role that uses XProtect Smart Client, XProtect Web Client, or XProtect Mobile client
in all products.
If you associate a user with more than one role and select Deny on a security setting for one role and Allow for
another, the Deny permission overrules the Allow permission.
In the following, the descriptions show what happens on each individual permission for the different system
components if you select Allow for the relevant role. If you use XProtect Corporate, you can see which settings
are available only to your system under each system component.
For every system component or functionality, the full system administrator can use the Allow or Deny check
boxes to set up security permissions for the role. Any security permissions that you set up here are set up for the
whole system component or functionality. If, for example, you select the Deny check box on Cameras, all
cameras added to the system are unavailable for the role. In contrast, if you select the Allow check box, the role
can see all cameras added to the system. The result of selecting Allow or Deny on your cameras is that the
camera settings on the Device tab then inherit your selections on the Overall Security tab so that either all
cameras are either available or unavailable to the particular role.
If you want to set security permissions for individual cameras or similar, you can only set these individual
permissions on the tab of the relevant system component or functionality if you have not set any overall
permissions for the system component or functionality on the Overall Security tab.
The descriptions below also apply to the permissions that you can configure through the MIP SDKs.
If you want to switch your base license from XProtect Corporate to one of the other
products, make sure that you remove all security permissions that are available to only
XProtect Corporate. If you do not remove those permissions, you cannot complete the
switch.
Management Server
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
You can temporarily deny connection permission on roles for maintenance purposes,
Connect
and then reapply access to the system.
l Server logs
l Matrix
l Time Profiles
Security
Description
permission
This permission does not reveal credentials for users of the XProtect VMS. This
includes Basic Users, Windows users and users from external IDPs.
l Options
l License Management
l Device groups
Edit l Matrix
l Time Profiles
l Notification Profiles
l Registered Servers
System Monitor Enables the permission to view the data of the System Monitor.
Status API Enables the permission to perform queries on the Status API located on the recording
Security
Description
permission
server. This means that the role with this permission enabled has access to read the
status of the items located on the recording server.
Enables the permission to add and detach the current site to other sites in a federated
site hierarchy.
Manage
Federated site
hierarchy If you set this permission to allowed on the child site only, the
user can still detach the site from the parent site.
Backup Enables the permission to create backups of the system configuration using the
Configuration system's backup and restore functionality.
Enables the permission to authorize users when they are asked for a second login in
Authorize users XProtect Smart Client or Management Client. You define if a role requires login
authorization on the Info tab.
It also enables users to create, delete, and edit the following features:
l Roles
Manage security
l Basic users
Recording Servers
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to edit properties on the recording servers, except for network
Edit
configuration settings that require edit permission on the management server.
Enables the permission to delete recording servers. To do this, you must also give the user
delete permissions on:
l Hardware security group if you have added hardware to the recording server
Delete
Manage
Enables the permission to add hardware on recording servers.
hardware
Manage Enables the permission to administrate storage containers on recording server, that is, to
storage create, delete, move, and empty storage containers.
Manage
Enables the permission to manage security permissions for recording servers.
security
Failover Servers
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Full control Enables the permission to manage all security entries on this part of the system.
Read Enables the permission to see and access failover servers in the Management
Client.
Enables the permission to create, update, delete, move, and enable or disable
Edit
failover servers in the Management Client.
Manage security Enables the permission to manage security permissions for the failover servers.
Mobile Servers
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to see and access mobile servers in the Management
Read
Client.
Edit Enables the permission to edit and delete mobile servers in the Management Client.
Manage security Enables the permission to manage security permissions for the mobile servers.
Hardware
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Delete If any of the hardware devices contains evidence locks, you can only
delete the hardware if the recording server is offline.
Enables the permission to send special commands to the drivers and thereby control
features and configuration on the device itself.
Driver
commands The Driver commands permission is for special developed MIP plug-
ins in the clients only. It does not control standard configuration
tasks.
View Enables the permission to view passwords on hardware devices in the Edit Hardware
passwords dialog box.
Manage
Enables the permission to manage security permissions for the hardware.
security
Cameras
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view camera devices in the clients and the Management
Read
Client.
Enables the permission to edit properties for cameras in the Management Client. It
Edit
also enables users to enable or disable a camera.
Enables the permission to view live video from cameras in the clients and the
View Live
Management Client.
View restricted Enables the permission to view live restricted video from cameras in the clients and
live the Management Client.
Playback Enables the permission to play back recorded video from cameras in all clients.
Playback
Enables the permission to play back recorded restricted video from cameras in all
restricted
clients.
recordings
Retrieve remote Enables the permission to retrieve recordings in the clients from cameras on
recordings remotes sites or from edge storages on cameras.
Enables the permission to read the sequence information related to, for example,
Read sequences
playing back recorded video in the clients.
Smart search Enables the permission to use the Smart search function in the clients.
Create
Enables the permission to create bookmarks in recorded and live video in the clients.
bookmarks
Read bookmarks Enables the permission to search for and read bookmark details in the clients.
Security
Description
permission
Delete
Enables the permission to delete bookmarks in the clients.
bookmarks
Create and
extend evidence Enables the permission to create and extend evidence locks in the clients.
locks
Read evidence
Enables the permission to search and read evidence locks in the clients.
locks
Delete and
reduce evidence Enables the permission to delete or reduce evidence locks in the clients.
locks
Create and
extend live and
Enables the permission to create and extend restrictions in the clients.
playback
restrictions
Delete and
reduce live and
Enables the permission to delete and reduce restrictions in the clients.
playback
restrictions
Start manual
Enables the permission to start manual recording of video in the clients.
recording
Stop manual
Enables the permission to stop manual recording of video in the clients.
recording
Enables the permission to use auxiliary (AUX) commands on the camera from the
AUX commands offer users the control of, for example, wipers on a camera
Security
Description
permission
Enables the permission to use PTZ functions on PTZ cameras in the clients and the
Manual PTZ
Management Client.
Enables the permission to move PTZ cameras to preset positions, start and stop
Activate PTZ patrolling profiles, and pause a patrolling in the clients and the Management Client.
presets or
patrolling profiles To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
permission.
Enables the permission to add, edit, and delete PTZ presets and patrolling profiles on
Manage PTZ PTZ cameras in the clients and the Management Client.
presets or
patrolling profiles To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
permission.
Enables the permission to lock and unlock PTZ presets in the Management Client.
Lock/unlock PTZ
This prevents or allows other users from changing preset positions in the clients and
presets
in the Management Client.
Enables the permission to set PTZ cameras in reserved PTZ session mode in the
clients and the Management Client.
Reserve PTZ In a reserved PTZ session, other users with higher PTZ priority are not able to take
sessions over the control.
To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
permission.
Enables the permission to release other users' PTZ sessions from the Management
Release PTZ Client.
sessions
You can always release your own PTZ sessions - without this permission.
Enables the permission to delete stored video recordings from the system via the
Delete recordings
Management Client.
Lift privacy Enables the permission to temporarily lift privacy masks in XProtect Smart Client. It
Security
Description
permission
also enables the permission to authorize other XProtect Smart Client users to lift
privacy masks.
masks
Lifting privacy masks only applies to privacy masks configured
as liftable privacy masks in the Management Client.
Microphones
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Enables the permission to manage all security entries on this part of the
Full control
system.
Enables the permission to view microphone devices in the clients and the
Read
Management Client.
Enables the permission to listen to live audio from speakers in the clients
Listen live
and the Management Client.
Listen restricted Enables the permission to listen to live restricted audio from speakers in the
live audio clients and the Management Client.
Security
Description
permission
Playback
Enables the permission to play back recorded restricted audio from
restricted
microphones in the clients.
recordings
Retrieve remote Enables the permission to retrieve recordings in the clients from
recordings microphones on remotes sites or from edge storages on cameras.
Enables the permission to read the sequence information related to, for
Read sequences
example, the Playback tab in the clients.
Create
Enables the permission to create bookmarks in the clients.
bookmarks
Enables the permission to search for and read bookmark details in the
Read bookmarks
clients.
Delete
Enables the permission to delete bookmarks in the clients.
bookmarks
Create and
extend evidence Enables the permission to create or extend evidence locks in the clients.
locks
Read evidence Enables the permission to search and read evidence lock details in the
locks clients.
Delete and
reduce evidence Enables the permission to delete or reduce evidence locks in the clients.
locks
Security
Description
permission
Create and
extend live and Enables the permission to create and extend restrictions on microphones in
playback the clients.
restrictions
Delete and
reduce live and Enables the permission to delete and reduce restrictions on microphones in
playback the clients.
restrictions
Start manual
Enables the permission to start manual recording of audio in the clients.
recording
Stop manual
Enables the permission to stop manual recording of audio in the clients.
recording
Delete recordings Enables the permission to delete stored recordings from the system.
Speakers
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Enables the permission to manage all security entries on this part of the
Full control
system.
Enables the permission to view speaker devices in the clients and the
Read
Management Client.
Enables the permission to listen to live audio from speakers in the clients
Listen live
and the Management Client.
Listen restricted Enables the permission to listen to live restricted audio from speakers in the
live audio clients and the Management Client.
Speak Enables the permission to speak through the speakers in the clients.
Enables the permission to play back recorded audio from speakers in the
Playback
clients.
Playback
Enables the permission to play back recorded audio from speakers in the
restricted
clients.
recordings
Retrieve remote Enables the permission to retrieve recordings in the clients from speakers
recordings on remotes sites or from edge storages on cameras.
Create
Enables the permission to create bookmarks in the clients.
bookmarks
Read bookmarks Enables the permission to search for and read bookmark details in the
Security
Description
permission
clients.
Delete
Enables the permission to delete bookmarks in the clients.
bookmarks
Create and
Enables the permission to create or extend evidence locks to protect
extend evidence
recorded audio in the clients.
locks
Read evidence Enables the permission to view recorded audio protected by evidence locks
locks in the clients.
Delete and
Enables the permission to delete or reduce evidence locks on protected
reduce evidence
audio in the clients.
locks
Create and
extend live and Enables the permission to create and extend restrictions on speakers in the
playback clients.
restrictions
Delete and
reduce live and Enables the permission to delete and reduce restrictions on speakers in the
playback clients.
restrictions
Start manual
Enables the permission to start manual recording of audio in the clients.
recording
Stop manual
Enables the permission to stop manual recording of audio in the clients.
recording
Security
Description
permission
Delete recordings Enables the permission to delete stored recordings from the system.
Metadata
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Enables the permission to manage all security entries on this part of the
Full control
system.
View restricted Enables the permission to receive live restricted metadata from metadata
live devices in the clients.
Enables the permission to play back recorded data from metadata devices in
Playback
the clients.
Playback Enables the permission to play back restricted recorded data from metadata
restricted devices in the clients.
Security
Description
permission
recordings
Retrieve remote Enables the permission to retrieve recordings in the clients from metadata
recordings devices on remotes sites or from edge storages on cameras.
Enables the permission to read the sequence information related to, for
Read sequences
example, the Playback tab in the clients.
Create and
extend evidence Enables the permission to create evidence locks in the clients.
locks
Read evidence
Enables the permission to view evidence locks in the clients.
locks
Delete and
reduce evidence Enables the permission to delete or reduce evidence locks in the clients.
locks
Create and
extend live and Enables the permission to create and extend restrictions on metadata in the
playback clients.
restrictions
Delete and
reduce live and Enables the permission to delete and reduce restrictions on metadata in the
playback clients.
restrictions
Start manual
Enables the permission to start manual recording of metadata in the clients.
recording
Security
Description
permission
Stop manual
Enables the permission to stop manual recording of metadata in the clients.
recording
Delete recordings Enables the permission to delete stored recordings from the system.
Input
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view input devices in the clients and the Management
Read
Client.
Enables the permission to edit properties for input devices in the Management Client.
Edit
It also enables users to enable or disable an input device.
Enables the permission to manage security permissions in the Management Client for
Manage security
input devices.
Output
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to edit properties for output devices in the Management
Edit
Client. It also enables users to enable or disable an output device.
Enables the permission to manage security permissions in the Management Client for
Manage security
output devices.
Smart Wall
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Read Enables the permission to view a video wall in XProtect Smart Client.
Edit Enables the permission to edit properties for the Smart Wall definition in XProtect
Security
Description
permission
Management Client.
Enables the permission to activate and modify Smart Wall definitions, for example to
change and activate presets or apply cameras on views in XProtect Smart Client and in
XProtect Management Client.
Operate
You can associate Operate with time profiles that define when
the user permission applies.
Create Smart Enables the permission to create new Smart Wall definitions in XProtect Management
Wall Client.
Enables the permission to play back recorded data from a video wall in XProtect Smart
Client.
Playback
You can associate Playback with time profiles that define when
the user permission applies.
View Groups
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view View Groups in the clients and in the Management
Read
Client. View groups are created in the Management Client.
Enables the permission to edit properties on the View Groups in the Management
Edit
Client.
Delete Enables the permission to delete View Groups in the Management Client.
Enables the permission to use View Groups in XProtect Smart Client, that is, to create
Operate
and delete subgroups and views.
Create view
Enables the permission to create View Groups in the Management Client.
group
Enables the permission to manage security permissions in the Management Client for
Manage security
View Groups.
User-defined Events
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Security
Description
permission
Management Client.
Delete Enables the permission to delete user-defined events in the Management Client.
Create user- Enables the permission to create new user-defined events in the Management
defined event Client.
Analytics Events
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Read Enables the permission to view analytics events in the Management Client.
Manage Enables the permission to manage security permissions in the Management Client for
security analytics events.
Generic Events
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view generic events in the clients and the Management
Read
Client.
Edit Enables the permission to edit properties on generic events in the Management Client.
Manage Enables the permission to manage security permissions in the Management Client for
security generic events.
Matrix
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to select and send video to the Matrix recipient from the
Read
clients.
Edit Enables the permission to edit properties for a Matrix in the Management Client.
Create Matrix Enables the permission to create a new Matrix in the Management Client.
Enables the permission to manage security permissions in the Management Client for
Manage security
all Matrix's.
Rules
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Read Enables the permission to view existing rules in the Management Client.
Enables the permission to edit properties for rules and to define rule behavior in the
Management Client.
Edit
It also requires that the user has read permissions on all the devices that are impacted
by the rule.
Manage Enables the permission to manage security permissions in the Management Client for
security all rules.
Sites
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view other sites in the Management Client. Connected sites are
Read connected via Milestone Federated Architecture.
To edit properties, you need Edit permissions on the Management Server on each site.
Manage
Enables the permission to manage security permissions on all sites.
security
System Monitor
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Read Enables the permission to view system monitors in XProtect Smart Client.
Enables the permission to edit properties for system monitors in the Management
Edit
Client.
Manage Enables the permission to manage security permissions in the Management Client for
security all system monitors.
Metadata search
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Manage security Enables the permission to manage security permissions for metadata searches.
Search
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Read
public Enables the permission to view and open saved public searches in XProtect Smart Client.
searches
Create
Enables the permission to save newly configured searches as public searches in XProtect
public
Smart Client.
searches
Security
Description
permission
Edit public Enables the permission to edit the details or the configuration of saved public searches in
searches XProtect Smart Client, for example the name, description, cameras, and search categories.
Delete
public Enables the permission to delete saved public searches.
searches
Manage Enables the permission to manage security permissions in the Management Client for
security search.
Alarms
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to manage alarms in the Smart Client. For example, changing
priorities of alarms, re-assigning alarms to other users, acknowledging alarms, changing
the alarm state of multiple alarms (for example from New to Assigned). To edit alarm
settings, you also need the Edit alarm settings permission.
Manage
Only when you set this to allowed does the Alarms and Events tab in
the Options dialog appear.
Enables the permission to view the Alarm Manager tab in XProtect Smart Client and
View retrieve alarms and alarm settings through the API.
To view alarms in XProtect Smart Client, you must enable the View permission for at least
Security
Description
permission
one alarm definition. You view alarms from third-party solutions by default.
Disable
Enables the permission to disable alarms.
alarms
Receive Enables the permission to receive notifications about alarms in XProtect Mobile clients and
notifications XProtect Web Client.
Manage
Enables the permission to manage security permissions for alarms.
security
Enables the permission to edit alarm definitions, alarm states, alarm categories, alarm
Edit alarm
sounds, alarm retention, and event retention. To edit alarm settings, you also need the
settings
Manage permission.
Alarm Definitions
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view alarm definitions, alarm states, alarm categories, alarm
View
sounds, alarm retention, and event retention.
Manage
Enables the permission to manage security permissions for alarm definitions.
security
Server Logs
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Enables the permission to manage all security entries on this part of the
Full control
system.
Read system log entries Enables the permission to see system log entries.
Read audit log entries Enables the permission to see audit log entries.
Enables the permission to read log settings in Tools > Options > Server
Read log configuration
Logs.
Enables the permission to change log settings in Tools > Options > Server
Update log configuration
Logs.
Manage security Enables the permission to manage security permissions for alarms.
Access Control
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Security
Description
permission
Enables the permission to edit properties for the Access Control systems in the
Edit
Management Client.
Use access
Allows the user to use any access control-related features in the clients.
control
View cardholders
Allows the user to view the cardholders list on the Access Control tab in the clients.
list
Receive
Allows the user to receive notifications about access requests in the clients.
notifications
Enables the permission to manage security permissions for all Access Control
Manage security
systems.
LPR
If your system runs with XProtect LPR, specify the following permissions for the user:
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Use LPR Enables the permission to use any LPR-related features in the clients
Manage Enables the permission to add, import, modify, export, and delete match lists in the
match lists Management Client.
Read match
Enables the permission to view match lists.
lists
Manage Enables the permission to manage security permissions in the Management Client for all
security Transaction definitions.
Transaction sources
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view properties for the Transaction sources in the
Read
Management Client.
Enables the permission to edit properties for the Transaction sources in the
Edit
Management Client.
Delete Enables the permission to delete Transaction sources in the Management Client.
Create Enables the permission to create new Transaction sources in the Management Client.
Manage Enables the permission to manage security permissions in the Management Client for
security all Transaction sources.
Transaction definition
Security
Description
permission
Full control Enables the permission to manage all security entries on this part of the system.
Enables the permission to view properties for the Transaction definitions in the
Read
Management Client.
Enables the permission to edit properties for the Transaction definitions in the
Edit
Management Client.
Delete Enables the permission to delete Transaction definitions in the Management Client.
Create Enables the permission to create new Transaction definitions in the Management Client.
Manage Enables the permission to manage security permissions in the Management Client for all
security Transaction definitions.
MIP plug-ins
Through the MIP SDK, a third-party vendor can develop custom plug-ins for your system, for example,
integration to external access control systems or similar functionality.
Available functionality depends on the system you are using. See the complete feature
list, which is available on the product overview page on the Milestone website
(https://www.milestonesys.com/products/software/product-index/).
The Device tab lets you specify which features users/groups with the selected role can use for each device (for
example, a camera) or device group in XProtect Smart Client.
Remember to repeat for each device. You can also select a device group, and specify role permissions for all the
devices in the group in one go.
You can still select or clear such square-filled check boxes, but note that your choice in that case applies for all
devices within the device group. Alternatively, select the individual devices in the device group to verify exactly
which devices the relevant permission applies for.
Camera-related permissions
Name Description
Allows live viewing of video from the selected camera(s) in the clients.
View live For XProtect Smart Client, it requires that the role has been granted the permission to
view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Allows live viewing of restricted video from the selected camera(s) in the clients.
View restricted For XProtect Smart Client, it requires that the role has been granted the permission to
live view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Playback > Within Allows playback of recorded video from the selected camera(s) in the clients. Specify
Name Description
Playback > Limit Allows playback of recorded video from the selected camera(s) in the clients. Specify
playback to a playback limit or apply no restrictions.
Playback
Allows playback of recorded restricted video from the selected camera(s) in the
restricted
clients. Specify the time profile or leave the default value.
recordings
Allows reading the sequence information related to, for example, the Sequence
Read sequences
explorer in the clients.
Smart search Allows the user to use the Smart search function in the clients.
Start manual
Allows starting manual recording of video from the selected camera(s) in the clients.
recording
Stop manual
Allows stopping manual recording of video from the selected camera(s) in the clients.
recording
Read bookmarks Allows search for and read bookmark details in the clients.
Create
Allows adding bookmarks in the clients.
bookmarks
Delete
Allows deleting bookmarks in the clients.
bookmarks
AUX commands Allows the use of auxiliary commands from the clients.
Name Description
Read evidence
Allows the client user to search for and read evidence lock details.
locks
Name Description
l Filter and search the list of live and playback restrictions on the camera
Microphone-related permissions
Name Description
Allows listening to live audio from the selected microphones in the clients.
For XProtect Smart Client, it requires that the role has been granted the permission to
Listen live
view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Allows listening to live restricted video from the selected microphone(s) in the clients.
Listen restricted For XProtect Smart Client, it requires that the role has been granted the permission to
live audio view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Playback > Within Allows playback of recorded audio from the selected microphone(s) in the clients.
time profile Specify the time profile or leave the default value.
Name Description
Playback > Limit Allows playback of recorded audio from the selected microphone(s) in the clients.
playback to Specify a playback limit or apply no restrictions.
Playback
Allows playback of recorded restricted audio from the selected microphone(s) in the
restricted
clients. Specify the time profile or leave the default value.
recordings
Allows reading the sequence information related to, for example, the Sequence
Read sequences
explorer in the clients.
Start manual Allows starting manual recording of audio from the selected microphone(s) in the
recording clients.
Stop manual Allows stopping manual recording of audio from the selected microphone(s) in the
recording clients.
Read bookmarks Allows search for and read bookmark details in the clients.
Create
Allows adding bookmarks in the clients.
bookmarks
Delete
Allows deleting bookmarks in the clients.
bookmarks
Create and l Extend the expiry time for existing evidence locks
extend evidence l Extend the protected interval for existing evidence locks
locks
Name Description
Read evidence
Allows the client user to search for and read evidence lock details.
locks
Name Description
Speaker-related permissions
Name Description
Allows listening to live audio from the selected speaker(s) in the clients.
For XProtect Smart Client, it requires that the role has been granted the permission to
Listen live
view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Allows listening to live restricted video from the selected speaker(s) in the clients.
Listen restricted For XProtect Smart Client, it requires that the role has been granted the permission to
live audio view the clients' Live tab. This permission is granted as part of the application
permissions. Specify the time profile or leave the default value.
Playback > Within Allows playback of recorded audio from the selected speaker(s) in the clients. Specify
time profile the time profile or leave the default value.
Playback > Limit Allows playback of recorded audio from the selected speaker(s) in the clients. Specify
playback to a playback limit or apply no restrictions.
Playback
Allows playback of recorded restricted audio from the selected speaker(s) in the
restricted
clients. Specify the time profile or leave the default value.
recordings
Read sequences Allows reading the sequence information related to, for example, the Sequence
Name Description
Start manual
Allows starting manual recording of audio from the selected speaker(s) in the clients.
recording
Stop manual
Allows stopping manual recording of audio from the selected speaker(s) in the clients.
recording
Read bookmarks Allows search for and read bookmark details in the clients.
Create
Allows adding bookmarks in the clients.
bookmarks
Delete
Allows deleting bookmarks in the clients.
bookmarks
Create and l Extend the expiry time for existing evidence locks
extend evidence l Extend the protected interval for existing evidence locks
locks
Name Description
Read evidence
Allows the client user to search for and read evidence lock details.
locks
Metadata-related permissions
Name Description
Enables the permission to see metadata devices and retrieve data from them in
Read
the clients.
Enables the permission to edit metadata properties. It also allows users to enable
Edit
or disable metadata devices in the Management Client and via the MIP SDK.
Enables the permission to view live metadata from cameras in the clients.
View Live For XProtect Smart Client, it requires that the role has been granted the
permission to view the clients' Live tab. This permission is granted as part of the
application permissions.
Enables the permission to view live restricted metadata from cameras in the
clients.
View live
restriction For XProtect Smart Client, it requires that the role has been granted the
permission to view the clients' Live tab. This permission is granted as part of the
application permissions.
Enables the permission to play back recorded data from metadata devices in the
Playback
clients.
Playback
Enables the permission to play back recorded data from restricted metadata
restricted
devices in the clients.
recordings
Enables the permission to use the Sequences feature while browsing recorded
Read sequences
data from metadata devices in the clients.
Enables the permission to export recorded audio from metadata devices in the
Export
clients.
Create and
Enables the permission to create and extend the evidence locks on metadata in
extend evidence
the clients.
locks
Read evidence
Enables the permission to view evidence locks on metadata in the clients.
locks
Name Description
Delete and
Enables the permission to delete or reduce evidence locks on metadata in the
reduce evidence
clients.
locks
Start manual
Enables the permission to start manual recording of metadata in the clients.
recording
Stop manual
Enables the permission to stop manual recording of metadata in the clients.
recording
Input-related permissions
Name Description
Output-related permissions
Name Description
The selected output(s) will be visible in the clients. If visible, the output will be selectable
Read
on a list in the clients.
The selected output(s) can be activated from the Management Client and the clients.
Activate
Specify the time profile or leave the default value.
You set up permissions for pan-tilt-zoom (PTZ) cameras on the PTZ tab. You can specify the features
users/groups can use in the clients. You can select individual PTZ cameras or device groups containing PTZ
cameras.
Name Description
Determines if the selected role can use PTZ functions and pause a patrolling on the
selected camera.
Manual PTZ
Specify a time profile, select Always, or leave the default value that follows the default
time profile defined on the Info tab for that role.
Name Description
Determines if the selected role can move the selected camera to preset positions,
start and stop patrolling profiles, and pause a patrolling.
Activate PTZ
presets or Specify a time profile, select Always, or leave the default value that follows the default
patrolling time profile defined on the Info tab for that role.
profiles
To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
permission.
Determines the priority of PTZ cameras. When several users on a surveillance system
want to control the same PTZ camera at the same time, conflicts may occur.
PTZ Priority You can avoid such a situation by specifying a priority for use of the selected PTZ
camera(s) by users/groups with the selected role. Specify a priority from 1 to 32,000,
where 1 is the lowest priority. The default priority is 3,000. The role with the highest
priority number is the one who can control the PTZ camera(s).
Manage PTZ Determines the permission to add, edit and delete PTZ presets and patrolling profiles
presets or on the selected camera in both the Management Client and XProtect Smart Client.
patrolling To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
profiles permission.
Lock/unlock PTZ
Determines if the role can lock and unlock preset positions for the selected camera.
presets
Determines the permission to set the selected camera in reserved PTZ session mode.
In a reserved PTZ session other users or patrolling sessions with higher PTZ priority
Reserve PTZ
are not able to take over the control.
sessions
To allow this role to use other PTZ functions on the camera, enable the Manual PTZ
permission.
Determines if the selected role can release other users' PTZ sessions from the
Release PTZ Management Client.
sessions
You can always release your own PTZ sessions - without this permission.
Relevant only if you use speakers on your system. Specify the following permissions for speakers:
Name Description
Determine if users should be allowed to talk through the selected speaker(s). Specify the time
Speak
profile or leave the default value.
When several client users want to talk through the same speaker at the same time, conflicts may
occur.
Solve the problem by specifying a priority for use of the selected speaker(s) by users/groups with
Speak
the selected role. Specify a priority from Very low to Very high. The role with the highest priority
priority
is allowed use the speaker before other roles.
Should two users with the same role want to speak at the same time, the first come, first served-
principle applies.
Name Description
Retrieve
Enables the permission to retrieve recordings in the clients from cameras, microphones,
remote
speakers, and metadata devices on remotes sites or from edge storages on cameras.
recordings
Through roles, you can grant your client users Smart Wall-related user permissions:
Name Description
Read Allows users to view the selected Smart Wall in XProtect Smart Client.
Edit Allows users to edit the selected Smart Wall in the Management Client.
Delete Allows users to delete the selected Smart Wall in the Management Client.
Name Description
Allows users to apply layouts on the selected Smart Wall in XProtect Smart Client and to
Operate
activate presets.
Playback Allows users to play back recorded data from the selected Smart Wall in XProtect Smart Client.
Name Description
Allows users to search for and view the selected external system event in the clients and the
Read
Management Client.
Edit Allows users to edit the selected external system event in the Management Client.
Delete Allows users to delete the selected external system event in the Management Client.
Trigger Allows users to trigger the selected external system event in the clients.
On the View Group tab, you specify which view groups the users and user groups with the selected role can use
in the clients.
Name Description
Enables the permission to view the View Groups in the clients and in the Management Client.
Read
View groups are created in the Management Client.
Edit Enables the permission to edit properties on View Groups in the Management Client.
Name Description
Delete Enables the permission to delete View Groups in the Management Client.
Enables the permission to use View Groups in XProtect Smart Client, that is to create and delete
Operate
subgroups and views.
Specifying role permissions on the Servers tab is only relevant if your system works in a Milestone Federated
Architecture setup.
Name Description
Enables the permission to view the selected site in the Management Client. Connected sites are
Sites connected via Milestone Federated Architecture.
To edit properties, you need Edit permissions on the Management Server on each site.
If you have configured Matrix recipients on your system, you may configure Matrix role permissions. From a
client, you can send video to selected Matrix recipients. Select the users who can receive this on the Matrix tab.
Name Description
Determine if users and groups with the selected role can select and send video to the Matrix
Read
recipient from the clients.
If you use alarms in your system setup to provide central overview and control of your installation (including any
other XProtect servers), you can use the Alarms tab to specify the alarm permissions for users and groups with
the selected role they should have, for example, how to handle alarms in the clients.
Security
Description
permission
Enables the permission to manage alarms in the Smart Client. For example, changing
priorities of alarms, re-assigning alarms to other users, acknowledging alarms, changing
the alarm state of multiple alarms (for example from New to Assigned). To edit alarm
settings, you also need the Edit alarm settings permission.
Manage
Only when you set this to allowed does the Alarms and Events tab in
the Options dialog appear.
Enables the permission to view the Alarm Manager tab in XProtect Smart Client and
retrieve alarms and alarm settings through the API.
View
To view alarms in XProtect Smart Client, you must enable the View permission for at least
one alarm definition. You view alarms from third-party solutions by default.
Disable
Enables the permission to disable alarms.
alarms
Receive Enables the permission to receive notifications about alarms in XProtect Mobile clients and
notifications XProtect Web Client.
Enables the permission to edit alarm definitions, alarm states, alarm categories, alarm
Edit alarm
sounds, alarm retention, and event retention. To edit alarm settings, you also need the
settings
Manage permission.
In Alarm Definitions, you specify the permissions for a specific alarm definition:
Name Description
Enables the permission to view alarm definitions, alarm states, alarm categories, alarm sounds,
View
alarm retention, and event retention.
When you add or edit basic users, Windows users or groups, specify access control settings:
Name Description
Use access control Allows the user to use any access control-related features in the clients.
View cardholders list Allows the user to view the cardholders list on the Access Control tab in the clients.
Receive notifications Allows the user to receive notifications about access requests in the clients.
If your system runs with XProtect LPR, specify the following permissions for the users:
Name Description
Use LPR Enables the permission to use any LPR-related features in the clients.
Manage match Enables the permission to add, import, modify, export, and delete match lists in the
lists Management Client.
Read match
Enables the permission to view match lists.
lists
If you have XProtect Incident Manager, you can specify the following permissions for your roles.
To give a Management Client administrator role the permissions to manage or view incident properties, select
the Incident properties node.
To give an operator of XProtect Smart Client permission to view your defined incident properties, select Incident
properties and give View permission. To give general permissions to manage or view incident projects, select
the Incident project node. Expand the Incident project node and select one or more sub-nodes to give
permissions for these additional specific features or capabilities.
Name Description
Permission to manage (view, create, edit, and delete) settings and properties related to a
Manage feature or view a user interface element represented by the selected node in either
Management Client or XProtect Smart Client.
Permission to view (but not create, edit, and delete) the settings and properties related to a
View feature, view defined incident properties, or view a user interface element represented by the
selected node in either Management Client or XProtect Smart Client.
Through the MIP SDK, a third-party vendor can develop custom plug-ins for your system, for example,
integration to external access control systems or similar functionality. The third-party plug-ins will have their own
settings on individual tabs.
The settings you change depend on the actual plug-in. Find the custom settings for the plug-ins on the MIP tab.
Basic users are user accounts that you create in Milestone XProtect VMS. It is a dedicated system user account
with a basic user name and password authentication for the individual user.
Windows users are user accounts that you add through Microsoft's Active Directory.
There are some differences between basic users and Windows users:
l Basic users are authenticated by a user name and password combination and are specific to one
system/site. Note that even if a basic user created at one federated site has the same name and
password as a basic user on another federate site, the basic user only has access to the site it has been
created on.
l Windows users are authenticated based on their Windows login and are specific to a machine.
Name Description
System Monitor Monitor the status of your servers and cameras by parameters you define.
System Monitor Set threshold values for monitored parameters on server and monitor tiles used
Thresholds in System Monitor.
Configuration Print a report with your system configuration. You can decide what to include in
Reports the report.
The information shown in the Current Tasks window is not dynamically updated but is a snapshot of the current
tasks from the moment you opened the window. If you have had the window open for some time, refresh the
information by selecting the Refresh button in the lower right corner of the window.
Tiles
The upper part of the System monitor dashboard window shows colored tiles that represent the state of your
system's server hardware and camera hardware.
The tiles change their state and thereby color based on threshold values set under System Monitor Thresholds
node. For more information, see System Monitor Thresholds (System Dashboard node) on page 551. Define the
thresholds, so tile colors mean the following:
Tile
Description
color
Warning state. One or more monitoring parameters is above the threshold value for the Normal
Yellow
state.
Critical state. One or more monitoring parameters is above the threshold value for the Normal
Red
and Warning state.
If you click a tile, you can see the state of each selected monitoring parameter for each hardware represented
by the tile in the bottom part of the System monitor dashboard window.
Example: A camera's LIVE FPS monitoring parameters have reached the Warning state.
Select Customize in the upper right corner of the window to open the Customize dashboard window.
In the Customize dashboard window, you can select which tile to create, edit or delete. When creating or editing
tiles, you can select which hardware and which monitoring parameters you want to monitor on the tile.
Details window
If you select a tile and then from the hardware list with monitoring parameters, select the Details button to the
right of a camera or server, you can -depending on the selected hardware - view system information and create
reports regarding:
Hardware Information
l CPU Usage
Management
server l Memory available
l CPU usage
l Memory available
l Disks
Recording
server(s) l Storage
l Network
l Cameras
l CPU usage
Failover
l Memory available
recording
servers l Monitored recording servers
Hardware Information
l Storage
l Used Space
l Recording FPS
l Memory available
Select the camera name to see its historical states and create a
report on:
If you access the system monitor's details from a server operating system, you may
experience a message regarding Internet Explorer Enhanced Security Configuration.
Follow the instructions to add the System Monitor page to the Trusted sites zone before
proceeding.
You can change thresholds for servers, cameras, disks, and storage, and all thresholds have some common
buttons and settings.
Buttons &
Description Unit
settings
Often there are short outages in the connection to your different hardware. If
you specify a calculation interval of 0 seconds, all these short outages will trigger
alerts about changes in hardware state. Therefore, define a calculation interval
of some length.
If you define a one (1) minute calculation internal, it means that you only get
Calculation
alerts if the average value for the whole minute exceeds the threshold. With the sec
interval
correct calculation interval setting, you will not receive false-positive alerts but
only alerts about sustained issues with, for example, CPU usage or memory
consumption.
To change the values of calculation intervals, see Edit thresholds for when
hardware states should change on page 290.
If you select the Advanced button, you can define thresholds and calculation
Advanced intervals for individual servers, cameras, disks, and storage. For more -
information, see below.
You can combine events from System Monitor and rules to trigger actions, for
example, when a server's CPU usage is critical, or a disk is running out of free
Create rule space. -
For more information, see Rules and events (explained) on page 81 and Add
rules on page 267.
Server thresholds
CPU usage Thresholds for the CPU usage on the servers you monitor. %
Memory available Thresholds for RAM in use on the servers you monitor. MB
NVIDIA decoding Thresholds for the NVIDIA decoding usage on the servers you monitor. %
NVIDIA memory Thresholds for NVIDIA RAM in use on the servers you monitor. %
NVIDIA rendering Thresholds for the NVIDIA rendering usage on the servers you monitor. %
Camera thresholds
Thresholds for cameras' FPS in use when live video is shown on cameras you
Live FPS %
monitor.
Recording Thresholds for cameras' FPS in use when the system is recording video on cameras,
%
FPS you monitor.
Used space Thresholds for the space used by cameras you monitor. GB
Disk thresholds
Free
Thresholds for available space on disks you monitor. GB
space
Storage thresholds
All information shown in the Evidence Lock window is snapshots. Press F5 to refresh.
The following settings are available when creating and printing configuration reports:
Name Description
Select All Adds all elements in the Reports list to the configuration report.
Name Description
Clear All Removes all elements in the Reports list from the configuration report.
Exclude Removes personal data like user names, e-mail addresses, and other types of sensitive
sensitive data from the configuration report and makes it GDPR compliant.
data Information about the license owner is always exclude from the report.
Export Select a save location for the report and create it as a PDF.
Each row in a log represents a log entry. A log entry contains a number of information fields:
Name Description
Source name The name of the equipment on which the logged incident occurred.
Each row in a log represents a log entry. A log entry contains a number of information fields:
Name Description
Message
Shows a description of the logged incident.
text
Permission The information about whether the remote user action was allowed (granted) or not.
Source type The type of equipment on which the logged incident occurred, for example, server or device.
Source
The name of the equipment on which the logged incident occurred.
name
User The user name of the remote user causing the logged incident.
User The IP address or host name of the computer from which the remote user caused the
location logged incident.
Each row in a log represents a log entry. A log entry contains a number of information fields:
Name Description
Name Description
Source name The name of the equipment on which the logged incident occurred.
Rule name The name of the rule triggering the log entry.
Service name The name of the service on which the logged incident occurred.
To manage and configure metadata devices, see Show or hide metadata search
categories and search filters on page 292.
What is metadata?
Metadata is data about data, for example, data that describes the video image, the content or objects in the
image, or the location of where the image was recorded.
l The device itself delivering the data, for example a camera that is delivering video
Metadata search
Metadata search is any search for video recordings in XProtect Smart Client that uses search categories and
search filters related to metadata.
l Location: Users can define geo coordinates and a search radius from these coordinates.
l People: Users can search for gender and approximate height and age as well as select to show results
with faces.
l Vehicles: Users can search for vehicle color, speed, and type, as well as search for a specific license
plate.
l At least one device in your video surveillance system that can perform video analytics and is configured
correctly
l A video processing service in your video surveillance system that generates metadata
For more information, see the documentation for integration of Metadata Search.
Name Description
Systems are by default enabled, meaning that they are visible in XProtect Smart Client for
users with sufficient permissions and that the XProtect system receives access control
Enable events.
You can disable a system, for example during maintenance, to avoid creating unnecessary
alarms.
The name of the access control integration as it appears in the management application
Name
and in the clients. You can overwrite the existing name with a new one.
Integration
Shows the type of access control system selected during the initial integration.
plug-in
Last
Shows the date and time of the last time the configuration was imported from the access
configuration
control system.
refresh
Name Description
Click the button when you need to reflect configuration changes made in the access
control system in XProtect, for example if you have added or deleted a door.
Refresh
configuration A summary of the configuration changes from the access control system appears. Review
the list to ensure that your access control system is reflected correctly before you apply
the new configuration.
Enable an additional login for the client users, if the access control system supports
Operator differentiated user permissions. If you enable this option, the access control system will
login not be available in XProtect Mobile client.
required This option is only visible if the integration plug-in supports differentiated user
permissions.
The naming and content of the following fields are imported from the integration plug-in. Below are examples of
some typical fields:
Name Description
Address Enter the address of the server that hosts the integrated access control system.
Port Specify the port number on the server to which the access control system is connected.
User Enter the name of the user, as defined in the access control system, who should be
name administrator of the integrated system in XProtect.
This tab provides mappings between door access points and cameras, microphones or speakers. You associate
cameras as part of the integration wizard, but you can change the setup at any time. Mappings to microphones
and speakers are implicit through the related microphone or speaker on the camera.
Name Description
Lists the available door access points defined in the access control system, grouped by door.
For an easier navigation to the relevant doors, you can filter on the doors in your access control
system with the dropdown list box at the top.
Enabled: Licensed doors are by default enabled. You can disable a door to free a license.
Doors
License: Shows if a door is licensed or if the license has expired. The field is blank when the
door is disabled.
Remove: Click Remove to remove a camera from an access point. If you remove all cameras,
the check box for associated cameras is automatically cleared.
Event categories allow you to group events. The configuration of event categories affects the behavior of access
control in the XProtect system and allows you to, for example, define an alarm to trigger a single alarm on
multiple event types.
Name Description
Lists the access control events imported from the access control system. The integration
Access plug-in controls default enabling and disabling of events. You can disable or enable events
Control any time after the integration.
Event When an event is enabled, it is stored in the XProtect event database and is, for example,
available for filtering in the XProtect Smart Client.
Source
Shows the access control unit that can trigger the access control event.
Type
Assign none, one or more event categories to the access control events. The system
Event
automatically maps relevant event categories to the events during integration. This enables a
Category
default setup in the XProtect system. You can change the mapping at any time.
Name Description
l Access denied
l Access granted
l Access request
l Alarm
l Error
l Warning
Events and event categories defined by the integration plug-in also appear, but you can also
define your own event categories, see User-defined Categories.
You can create event categories when the built-in categories do not meet your requirements,
for example, in connection with defining triggering events for access control actions.
User-
defined The categories are global for all integration systems added to the XProtect system. They
Categories allow setting up cross-system handling, for example on alarm definitions.
If you delete a user-defined event category, you receive a warning if it is used by any
integration. If you delete it anyway, all configurations made with this category, for example
access control actions, do not work anymore.
You can specify access request notifications that appear on the XProtect Smart Client screen when a given event
occurs.
Name Description
Name Description
Access
Specify which cameras, microphones or speakers that appear in the access request
request
notifications when a given event occurs. Also specify the sound to alert the user when the
notification
notification pops up.
details
Select which commands that should be available as buttons in the access request
notification dialogs in the XProtect Smart Client.
System command:
Use the Cardholders tab to review information about cardholders in the access control system.
Name Description
Search cardholder Enter the characters of a cardholder name and it appears in the list, if it exists.
Name Lists the names of the cardholders retrieved from the access control system.
l Employee
Type
l Guard
l Guest
If your access control system supports adding/deleting pictures in the XProtect system, you can add pictures to
the cardholders. This is useful if your access control system does not include pictures of the cardholders.
Name Description
Specify the path to a file with a picture of the cardholder. This button is not visible if the access
control system manages the pictures.
Select Allowed file-formats are .bmp, .png, and .jpg.
picture
Pictures are resized to maximize the view.
Delete Click to delete the picture. If the access control system had a picture, then this picture is shown
picture after deletion.
Incidents node
You define all incident properties for your XProtect Smart Client operators on these tabs:
l Types
l Statuses
l Categories
l Category 1-5
Name Description
Incident property names do not have to be unique, but it is an advantage to use unique and
Name
descriptive incident property names in many situations.
An additional explanation of the defined incident property. For example, if you have created
Description
a category named Location, its description could be Where did the incident happen?
Transact node
For more information about adding a source, see Add transaction source (wizard).
Name Description
If you want to disable the transaction source, clear this check box. The stream of transaction
data stops, but the data already imported remains on the event server. You can still view
transactions from a disabled transaction source in XProtect Smart Client during its retention
period.
Enable
Name Description
Name If you want to change the name, enter a new name here.
You cannot change the connector you selected when you created the transaction source. To
Connector select a different connector, you need to create a new transaction source, and during the
wizard, select the connector you want.
You can select a different transaction definition that defines how to transform the
transaction data received into transactions and transaction lines. This includes defining:
Transaction
definition l When a transaction begins and ends
Specify, in days, for how long transaction data is maintained on the event server. The default
retention period is 30 days. When the retention period expires, automatically the data is
Retention deleted. This is to avoid the situation, where the storage capacity of the database is
period exceeded.
The minimum value is 1 day, whereas the maximum value is 1000 days.
TCP client l Host name: enter the host name of the TCP server associated with the transaction
connector source
l Port: enter the port name on the TCP server associated with the transaction source
If you selected Serial port connector, specify these settings and make sure that they match
the settings on the transaction source:
l Parity: specify the method for detecting errors in the transmissions. By default, None
Serial port
is selected
connector
l Data bits: specify the number of bits used to represent one character of data
l Stop bits: specify the number of bits to indicate when a byte has been transmitted.
Most devices need 1 bit
For more information about creating and adding transaction definitions, see Create and add transaction
definitions.
Name Description
Select the character set used by the transaction source, for example the cash register.
This helps XProtect Transact convert the transaction data to understandable text that you
Encoding can work with when configuring the definition.
If you select the wrong encoding, the data may appear as non-sense text.
Collect transaction data from the connected transaction source. You can use the data to
Start configure a transaction definition.
collecting data
Wait for at least one, but preferably more, transactions to complete.
Stop collecting
When you have collected sufficient data to configure the definition, click this button.
data
If you want to import data from an already existing file, click this button. Typically this is a
file that you have created previously in the file format .capture. It can be other file
Load from file
formats. What is important here is that the encoding of the import file matches the
encoding selected for the current definition.
Save to file If you want to save the collected raw data to a file, click this button. You can reuse it later.
Select the match type to use to search for the start pattern and the stop pattern in the
collected raw data:
Match type
l Use exact match: The search identifies strings that contain exactly what you have
entered in the Start pattern and Stop pattern fields
Name Description
l Use wildcards: The search identifies strings that contain what you have entered in
the Start pattern and Stop pattern fields in combination with a wild card symbol
(*, #, ?)
* matches any number of characters. For example, if you have entered "Start
tra*tion", the search identifies strings that contain "Start transaction".
# matches exactly 1 digit. For example, if you have entered "# watermelon", the
search identifies strings that contain, for example, "1 watermelon".
? matches exactly 1 character. For example, you may use the search expression
"Start trans?ction" to identify strings that contain "Start transaction"
l Use regular expression: Use this match type to identify strings that contain
specific notation methods or conventions, for example a date format or credit
card number. For more information, see the Microsoft website
(https://docs.microsoft.com/dotnet/standard/base-types/regular-expression-
language-quick-reference/)
Transaction data strings from the connected transaction source are displayed in this
Raw data
section.
Specify a start pattern to indicate where a transaction begins. Horizontal lines are
Start pattern inserted in the Preview field to visualize where the transaction starts and ends, and will
help to keep individual transactions separated.
Specify a stop pattern to indicate where a transaction ends. A stop pattern is not
mandatory, but is useful if the received data contains irrelevant information, such as
Stop pattern information about opening hours or special offers, between actual transactions.
If you do not specify a stop pattern, the end of the receipt is defined in terms of where the
next receipt starts. The start is determined by what is entered in the Start pattern field.
Use the Add filters button to point out the characters that you want to be omitted in
XProtect Smart Client or replaced by other characters or a line break.
Add filter Replacing characters is useful when the transaction source string contains control
characters for non-printing purposes. Adding line breaks is necessary to make receipts in
XProtect Smart Client resemble the original receipts.
Displays the characters currently selected in the Raw data section. If you are aware of
Filter text
characters that you want to be omitted or replaced, but they do not occur in the collected
Name Description
raw data string, you can enter the characters manually in the Character field.
If the character is a control character, you need to enter its hexadecimal byte value. Use
this format for the byte value: {XX} and {XX, XX,...} if a characters consists of more bytes.
For each filter you add, you should specify how the characters you have selected are
handled:
l Substitute: the characters you select are replaced with the characters you specify
l Add line break: the characters you select are replaced by a line break
Enter the text to replace the characters selected. Only relevant if you have selected the
Substitution
action Substitute.
Remove
control Remove non-printing characters that were not already removed after adding filters.
characters
that are not In the Raw data pane and the Preview section, see how the transaction data strings
defined as change when you enable or disable this setting.
filter text
Use the Preview section to verify that you have identified and filtered out unwanted
Preview characters. The output you see here resembles what the real-life receipt looks like in
XProtect Smart Client.
Alarms node
Name Description
Enable By default, the alarm definition is enabled. To disable it, clear the check box.
Alarm names do not have to be unique, but using unique and descriptive alarm names are
Name
advantageous in many situations.
Enter a descriptive text about the alarm and how to resolve the issue that caused the alarm.
Instructions
The text appears in XProtect Smart Client when the user handles the alarm.
Select the event message to use when the alarm is triggered. Choose from two dropdowns:
l The first drop-down: Select the type of event, for example analytics event and system
Triggering
events
event
l The second drop-down: Select the specific event message to use. The messages
available are determined by the event type you selected in the first drop-down menu
Specify the sources that the events originate from. Aside from cameras or other devices,
Sources sources may also be plug-in defined sources, for example VCA and MIP. The options depend
on the type of event you have selected.
Alarm trigger:
Name Description
Select the Time profile radio button to specify the time interval during which the alarm definition
Time
is active. Only the time profile you have defined under the Rules and Events node are displayed in
profile
the list. If none are defined, only the Always option is available.
If you want the alarm to be based on an event, select this radio button. Once selected, specify the
Event start and stop event. You can select hardware events defined on cameras, video servers and
based input. See also Events overview. Also, global/manual event definitions can be used. See also User-
defined events (explained).
Name Description
Time Select a time limit for when operator action is required. The default value is 1 minute. The time
limit limit is not active before you have attached an event in the Events triggered drop-down menu.
Events
Select which event to trigger when the time limit has passed.
triggered
Maps:
Name Description
Assign either a smart map or a map to the alarm when the alarm is listed in XProtect
Smart Client > Alarm Manager.
Alarm Manager
view Smart map displays alarms if they are triggered by a device and
if the device is added to the smart map.
Other:
Name Description
Initial alarm owner Select a default user responsible for the alarm.
Name Description
Initial alarm Select a priority for the alarm. Use these priorities in XProtect
priority Smart Client to determine the importance of an alarm.
Select an alarm category for the alarm, for example False alarm
Alarm category
or Need investigation.
Events triggered Define an event that the alarm can trigger in XProtect Smart
by alarm Client.
Alarm assignable The Assigned to list is in the alarm details on the Alarm
to Administrators Manager tab in XProtect Smart Client.
Clear the check box to filter out users with an administrator role
from the Assigned to list to shorten the list.
Priorities
Name Description
Add new priorities with level numbers of your choosing or use/edit the default priority levels
Level (numbers 1, 2 or 3). These priority levels are used to configure the Initial alarm priority
setting.
Name Description
Name Enter a name for the entity. You can create as many as you like.
Select the sound to be associated with the alarm. Use one of the default sounds or add
Sound
more in Sound Settings.
Repeat Decide whether the sound should play only once or repeatedly until in XProtect Smart
sound Client, the operator clicks the alarm in the alarm list.
Enable For each alarm priority, you can enable or disable desktop notifications. If you are using an
desktop XProtect VMS that supports Smart Client profiles, you must also enable notifications on the
notifications required Smart Client profiles. See Alarm Manager tab (Smart Client profiles) on page 459.
States
Name Description
In addition to the default state levels (numbers 1, 4, 9 and 11, which cannot be edited or reused),
Level add new states with level numbers of your choosing. These state levels are only visible in the
XProtect Smart Client's Alarm List.
Categories
Name Description
Add new categories with level numbers of your choosing. These category levels are used to
configure the Initial alarm category setting.
Level
Level 99 is reserved for the Emergency Alert alarm in XProtect Mobile
client.
Name Enter a name for the entity. You can create as many as you like.
Name Description
Available Use > to select which columns should be available in the XProtect Smart Client's Alarm List. Use
columns < to clear selection. When done, Selected columns should contain the items to be included.
Name Description
Enable Select to enable that all alarms must be assigned a reason for closing before they can be closed.
Add reasons for closing that the user can choose between when closing alarms. Examples could
Reason
be Solved-Trespasser or False Alarm. You can create as many as you like.
Name Description
Select the sound to be associated with the alarm. The list of sounds contains a number of
Sounds
default Windows sounds. You can also add new sounds (.wav or .mp3).
Add Add sounds. Browse the sound file and upload one or several .wav or .mp3 files.
Remove a selected sound from the list of manually added sounds. Default sounds cannot be
Remove
removed.
Test Test the sound. In the list, select the sound. The sound plays once.
General tab
You can change some of the information related to the site that you are currently logged in to.
Name Description
Use the list to add and remove URL(s) for this site and indicate if they are external or
URLs
not. External addresses can be reached from outside the local network.
Service account The service account under which the management server is running.
Status for last The status of the last synchronization of the hierarchy. It can be either Successful or
synchronization Failed.
This tab shows information about the parent site of the site that you are currently logged in to. The tab is not
visible if your site has no parent site.
Name Description
Name Description
Lists URL(s) for the parent site and indicates if they are external or not. External
URLs
addresses can be reached from outside the local network.
Service account The service account under which the management server is running.
Status for last The status of the last synchronization of the hierarchy. It can be either Successful or
synchronization Failed.
Select a unit name in the node to display key system health statistics for that unit in a new page.
Only system health data from Husky IVO units can be displayed in the node.
The Husky IVO System Health node is only accessible after the Husky IVO System Health
plug-in has been installed on the XProtect Management Client machine.
Husky IVO System Health is currently released as a beta version. The appearance and
function of the final version may differ from the beta version.
l Needs Attention: One or more issues have been detected that require your attention.
The system health data will automatically be updated at fixed 5-minute intervals and cannot be manually
refreshed.
About Milestone
Milestone Systems is a leading provider of open platform video management software; technology that helps
the world see how to ensure safety, protect assets and increase business efficiency. Milestone Systems
enables an open platform community that drives collaboration and innovation in the development and use of
network video technology, with reliable and scalable solutions that are proven in more than 150,000 sites
worldwide. Founded in 1998, Milestone Systems is a stand-alone company in the Canon Group. For more
information, visit https://www.milestonesys.com/.