Alarm configuration (explained)

Alarm configuration includes:

In general, alarms are controlled by the visibility of the object causing the alarm. This means that four possible aspects can play a role with regards to alarms and who can control/manage them and to what degree:

Name

Description

Source/device visibility

If the device causing the alarm is not set to be visible to the user's role, the user cannot see the alarm in the alarm list in XProtect Smart Client.

The right to trigger user-defined events

This right determines if the user's role can trigger selected user-defined events in XProtect Smart Client.

External plug-ins

If any external plug-ins are set up in your system, these might control users' rights to handle alarms.

General role rights

Determine whether the user is allowed to only view or also to manage alarms.

What a user of Alarms can do with alarms depends on the user's role and on settings configured for that particular role.

On the Alarms and Events tab in Options, you can specify settings for alarms, events and logs.

© 2018 Milestone Systems A/S