Alarm configuration includes:
In general, alarms are controlled by the visibility of the object causing the alarm. This means that four possible aspects can play a role with regards to alarms and who can control/manage them and to what degree:
Name |
Description |
---|---|
Source/device visibility |
If the device causing the alarm is not set to be visible to the user's role, the user cannot see the alarm in the alarm list in XProtect Smart Client. |
The right to trigger user-defined events |
This right determines if the user's role can trigger selected user-defined events in XProtect Smart Client. |
External plug-ins |
If any external plug-ins are set up in your system, these might control users' rights to handle alarms. |
General role rights |
Determine whether the user is allowed to only view or also to manage alarms. What a user of Alarms can do with alarms depends on the user's role and on settings configured for that particular role. |
On the Alarms and Events tab in Options, you can specify settings for alarms, events and logs.
© 2018 Milestone Systems A/S