Sie sind auf Seite 1von 143

Administration Guide

Release 4.3.2 R3
SecurOS Administration Guide (AG-En, built on November 18, 2008).
c Copyright ISS Technology 20052008

Printed in US.
ISS Technology reserves the right to make changes to both this Manual and to the products it describes. System speci-
fications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty,
promise or contractual condition, and must not be taken as such. No part of this publication may be reproduced, transmitted,
transcribed, stored in a retrieval system or translated into any human or computer language in any form by any means
without the express written permission of the copyright holder. Unauthorized copying of this publication may not only
infringe copyright but also reduce the ability of ISS Technology to provide accurate and up-to-date information to both users
and operators.
SecurOS 3 Administration Guide

Contents

Contents
1 Contents 3 Changing Superuser Password . . . 16
Updating License Key on All Servers . . . 17
2 Preface 6
The SecurOS Subsystems Structure . . . . 17
Scope . . . . . . . . . . . . . . . . . . . 6
Target Audience . . . . . . . . . . . . . . 6 5 Core Subsystem 19
Using This Manual . . . . . . . . . . . . . 6 Working Principles . . . . . . . . . . . . 19

Getting Technical Support . . . . . . . . . 6 Objects Reference . . . . . . . . . . . . . 19


System . . . . . . . . . . . . . . . . 19
3 SecurOS Architecture 8
Security Zone . . . . . . . . . . . . 20
Distributed Networking Environment . . . . 8
Setting Up Security Zone
Types of Servers and Workstations . . . . 9 Visibilities . . . . 22
Application Server . . . . . . . . . 9 Setting Up Event Redirection 24
Video Server . . . . . . . . . . . . 9 Department . . . . . . . . . . . . . 25
Operator Workstation . . . . . . . . 9 Person . . . . . . . . . . . . . . . . 26
Administrator Workstation . . . . . 9 Active Directory storage . . . . . . 27
Modular Structure . . . . . . . . . . . . . 10 User Rights . . . . . . . . . . . . . 28
Computer . . . . . . . . . . . . . . 31
4 Administration Overview 11
Area Zone . . . . . . . . . . . . . . 36
Entering And Leaving the Administration Mode 11
Region . . . . . . . . . . . . . . . . 36
Objects Tree Structure . . . . . . . . . . 12
Protocol filter . . . . . . . . . . . . 37
Object Classes . . . . . . . . . . . . . . 12
Configuration Examples . . . . . . . . . . 38
System Objects . . . . . . . . . . . 13
Defining Access Levels to Individ-
User Interface Objects . . . . . . . 13 ual Objects . . . . . . . . . 38
Working with Objects . . . . . . . . . . . 13 Configuration of Network Domain
Creating Objects . . . . . . . . . . 14 User Rights . . . . . . . . . 40

Editing Objects Properties . . . . . 14 Settings For Windows NT


Provider . . . . . . 40
Deleting Objects . . . . . . . . . . 15
Settings For LDAP Provider 40
Disabling Objects . . . . . . . . . . 15
Moving and Renaming Objects . . 15 6 Interface Subsystem 42
Searching Objects by Name . . . . 15 Maps Working Principles . . . . . . . . . 42
Managing User Rights Within Security Network 16 Map Creation . . . . . . . . . . . . 42

www.isscctv.com
SecurOS 4 Administration Guide

Contents

Drawing Map Layers . . . . . . . . 43 Video Concentrator . . . . . 79


Moving Map Objects onto Operator PTZ Controller . . . . . . . 81
Workstations . . . . . . . . 44
PTZ Device . . . . . . . . . 83
Objects Reference . . . . . . . . . . . . . 45
Archive Converter . . . . . 84
Screen . . . . . . . . . . . . . . . . 45
Archiver . . . . . . . . . . . 85
Map . . . . . . . . . . . . . . . . . 45
User Interface Objects . . . . . . . 87
Working with Map Layers . 46 Monitor . . . . . . . . . . . 87
Placing, Moving and Rotat- Archive Converter Dialog . 93
ing Objects on Map 47
Archiver Dialog . . . . . . . 93
Performing Additional Op-
erations on Objects 49 Configuration Examples . . . . . . . . . . 94

Map v2 . . . . . . . . . . . . . . . 49 Standalone Configuration . . . . . . 94

Working with Map Layers . 52 Video Server + Operator Workstation 96

Placing Objects on Map . . 53 Video Server + Video Concentrator


+ Operator Workstation . . 97
Setting Filters . . . . . . . 54
Joystick Configuration . . . . . . . 99
Setting Password . . . . . . 55
Event Viewer . . . . . . . . . . . . 55 8 Audio Subsystem 100
External Window . . . . . . . . . . 57 Objects Reference . . . . . . . . . . . . . 100
HTML Form . . . . . . . . . . . . 58 System Objects . . . . . . . . . . . 100
HTML Dialog . . . . . . . . . . . . 59 Audio Capture Device . . . 100
Microphone . . . . . . . . . 101
7 Video Subsystem 61
User Interface Objects . . . . . . . 102
Working Principles Of Motion Detection Zones 61
Audio Player . . . . . . . . 102
Special Settings For Video Subsystem Com-
ponents . . . . . . . . . . . . . . . 61
9 I/O Subsystem 104
Camera Imaging Control . . . . . . 61
Objects Reference . . . . . . . . . . . . . 104
Record Buffer Settings . . . . . . . 62
Sensor . . . . . . . . . . . . . . . . 104
Archive Recording . . . . . . . . . 62
Relay . . . . . . . . . . . . . . . . . 105
Objects Reference . . . . . . . . . . . . . 63
Keyboard . . . . . . . . . . . . . . 105
System Objects . . . . . . . . . . . 63
Video Capture Device . . . 63 10 Notification Subsystem 107
Camera . . . . . . . . . . . 67 Objects Reference . . . . . . . . . . . . . 107
Zone . . . . . . . . . . . . . 73 E-mail Message Service . . . . . . 107
Light Detector . . . . . . . 75 E-mail Message . . . . . . . . . . . 108
Zone Object Detector . . . 76 Short Message Service . . . . . . . 109

www.isscctv.com
SecurOS 5 Administration Guide

Contents

Short Message . . . . . . . . . . . 109 13 Appendix B: System Utilities 121


Voice Message Service . . . . . . . 110 ISS Hardware Report Utility . . . . . . . . 121
Voice Message . . . . . . . . . . . 111 ISS System Report Utility . . . . . . . . . 122
Audible Notification Service . . . . 112 ISS Media Export Utility . . . . . . . . . . 123
Export Settings dialog . . . . . . . 125
11 Automation Subsystem 114
Command-line parameters . . . . . 126
Working Principles . . . . . . . . . . . . 114
ISS Video Archive Conversion Utility . . . . 127
Macros . . . . . . . . . . . . . . . 114
ISS Startup Configuration Utility . . . . . . 128
Scripting . . . . . . . . . . . . . . . 114
DSAdmin Utility . . . . . . . . . . . . . . 130
Integration with External Systems 114
ISS Database Update Utility . . . . . . . . 131
Objects Reference . . . . . . . . . . . . . 114
ISS Object Types Database Editor . . . . . 132
Macro . . . . . . . . . . . . . . . . 114
Program . . . . . . . . . . . . . . . 116 14 Appendix C: TCP/IP Ports Used by Se-
IIDK Interface . . . . . . . . . . . . 117 curOS 134

12 Appendix A: Frequently Asked Questions 118 15 Index 137

www.isscctv.com
SecurOS 6 Administration Guide

Preface

Preface
Scope
Current manual provides general information about SecurOS architecture, describes the process of
configuring security network and system objects, gives some troubleshooting tips and recommenda-
tions.
It is assumed that the user have already deployed the security network physically and installed SecurOS
software on all computers of this network.

Target Audience
This manual is designed for SecurOS system installers and administrators. It is assumed the user has
advanced computer skills, has practical experience with TCP/IP networking, serial (COM) ports and
general CCTV knowledge. The user should have read SecurOS Installation Guide prior to reading this
document, because it gives introductory information on how to plan their system.

Using This Manual


This document is organized as a book, so the user can print it or use electronic version. In latter
case one can use Adobe Readers Bookmarks feature as well as cross-reference hyperlinks to navigate
through content. In several topics this manual refers to other SecurOS manuals (SecurOS Installa-
tion Guide, SecurOS User Guide, etc.). One can find these manuals as separate files on SecurOS
installation CD or download them from our web site (www.isscctv.com).

Getting Technical Support


If you have some questions this manual does not give answers to, we recommend you to contact your
system installer, who knows your system configuration in depth and can solve the problem.

www.isscctv.com
SecurOS 7 Administration Guide

Preface

For any further information you can contact our Technical Support Team:

phone in USA:

+1 (201) 641 60 30 (Monday to Friday, 10:00 to 18:00 EST)

e-mail:

support@isscctv.com

To ensure quality technical support, we advise you to provide us technical data on your computer and
SecurOS configuration. This data can be collected automatically by using ISS System Report Utility
that is distributed with SecurOS. See section ISS System Report Utility on page 122 for further
information.

www.isscctv.com
SecurOS 8 Administration Guide

SecurOS Architecture

SecurOS Architecture
SecurOS is an integrated security system distributed over TCP/IP network.
SecurOS modular architecture makes it flexible in terms of supported functions and performance tun-
ing. Intelligent plug-in modules like License Plate Recognition (LPR), Face Capture/Face Recognition
(FC/FR) engines and integration with the wide range of third-party hardware can extend SecurOS
applications to the highest level.

Distributed Networking Environment

Figure 1: SecurOS network architecture sample planning

www.isscctv.com
SecurOS 9 Administration Guide

SecurOS Architecture

Types of Servers and Workstations


All computers connected to SecurOS network are divided into three main categories: application
server, administrator workstation and operator workstation. There is also a video server as a particular
application server responsible for video stream receiving and recording, equipped with video capture
card (cards).

Application Server
Application server is a computer that is responsible for supporting and controlling specific part of the
security network. Security hardware like CCTV cameras, video capture cards, audio capture cards,
alarm controllers, fire alarm and access control subsystem, as well as intelligent modules (license
plate recognition etc.) should be installed in or connected to application server units to be operable in
security network for proper security network functioning.
Each server with proper settings has administration capabilities, i. e. entire SecurOS network can
be configured from this server equipped with display. To use an additional machine for remote
administration, install system with administrator workstation configuration (see below). To connect
to any of the servers remotely from any other computer within network domain, configure access to
the server through Microsoft Remote Desktop Connection using RDP protocol.

Video Server
Video server is an application server, equipped with video capture card (cards) and designed to receive
video from connected CCTV and IP network cameras.

Operator Workstation
Operator workstation is a client computer connected to SecurOS network, designed to remotely view
digital video from either analog CCTV camera (via video server) or IP cameras, listen to audio, send
commands to remote control PTZ devices, doors, to monitor access control and fire alarm systems,
etc.

Administrator Workstation
Administrator workstation is a client computer similar to operator workstation. It has additional
administration interface to configure SecurOS network, meaning this:

To create and configure objects

To delete existing objects

www.isscctv.com
SecurOS 10 Administration Guide

SecurOS Architecture

To modify the objects currently created and working in the system

Modular Structure
Modular structure implements the following options:

installation of specific modules (such as license plate recognition engines, modules for support-
ing third-party access control and fire alarm hardware) to the SecurOS network to extent its
functionality.

Application server software automatically decides, which modules and subsystems must be loaded
to establish the highest productivity. This depends on system configuration.

www.isscctv.com
SecurOS 11 Administration Guide

Administration Overview

Administration Overview
Administration mode is used for security network configuration. It is accessible from any application
server and administrator workstation. All security system components remains completely functional
when entering administration mode (without any restrictions).

Entering And Leaving the Administration Mode

Warning! After SecurOS and PostgreSQL software installation Windows OS creates the
postgres account. To configure SecurOS system use an administrator Windows account
but not the postgres one.

To launch application server / administrator workstation, double-click SecurOS icon on the desktop, or
choosing it from the Start Programs SecurOS menu.
A splash screen will appear, showing the progress of system initialization. To open SecurOS control
panel when SecurOS software has started, double-click the program icon in system tray area (see
figure 2) or press-hold Ctrl key and move the mouse pointer to the top edge of the screen.

Figure 2: SecurOS tray icon

Figure 3: SecurOS control panel

To enter administration mode, click Configuration button on control panel. Administration toolbar
and objects tree window will appear on screen (see figure 4). Objects tree window sizes can be
changed as for any other application window.
To leave administration mode, click Configuration button again. Then the administration toolbar and
objects tree window will hide.

www.isscctv.com
SecurOS 12 Administration Guide

Administration Overview

Figure 4: Administration mode

Objects Tree Structure


Entire security network configuration is represented as a hierarchical structure of objects called objects
tree. This structure is identical to operation system files and folders structure. The objects tree
represents mutual relation between objects.
Objects that are contained inside other objects are called child objects. In turn, objects that contain
child objects are called parent objects relative to their child objects (see figure ??).

Example: The Video Capture Device object can be a child object of a Computer object only. The Camera
object can be created as a child of a Video Capture Device object only. The logical structure represents
physical device connection: if video capture cards are installed into computers, then cameras are to be
attached to these cards.

Note: Wrongly functioned objects (e.g. with software or hardware errors) are marked with red cross
icon in the objects tree.

Object Classes
There are two object classes in SecurOS

system objects

www.isscctv.com
SecurOS 13 Administration Guide

Administration Overview

user interface objects

System Objects
System objects can be created and run on application servers and represent security network func-
tionality: physical devices, logical objects, intelligent modules like License Plate or Face Recognition
modules, etc. These objects are non-visible, i.e. they have no direct representation in user interface,
as opposed to user interface objects.
Examples of system objects are: Computer, Video Capture Device, Camera, Audio Capture Device,
Microphone, Sensor, Relay, etc.

User Interface Objects


User interface objects run either on operator workstations or on application servers / administrator
workstations. These objects are used to monitor and control security network. Every user interface
object belongs to particular computer of the network and appears as a rectangular window of the
specified size on one of the displays of the target computer.
Examples of user interface objects are: Monitor, Audio Player, Event Viewer, etc.

Working with Objects


To perform actions on objects, administration toolbar provides a set of buttons (see figure 5):

Create create new child object under currently selected parent object.

Delete delete object.

Disable disable object.

Move move object to other parent object, rename object.

Setup open/close objects properties window.

On Map place object on map (available if any map object exists). Object is placed on a
map only if it is represented by Map object in the system (this action does not relate to maps
represented by Map v2 object)

Figure 5: Administration toolbar buttons

Note: Some of these options are also available from context menu of the object in objects tree.

www.isscctv.com
SecurOS 14 Administration Guide

Administration Overview

Creating Objects
To create new object:

1. Select a parent object in object tree.


2. Click Create button and choose necessary object type from a drop-down list box.
3. A dialog window will appear containing base object properties (ID and Name). Enter these
parameters and click OK button to confirm object creation or click Cancel button to return
without creating an object.

If current object cannot have child objects, in drop-down list box you will see object types for its
parent, and newly created object will appear as a sibling node, as if you have selected the parent node
prior to creating new object.
Once an object is created, its properties window will appear automatically.

When I try to create an object, a message Current system configuration does not permit to
create more than N Xxx objects appears. Why?

The system configuration limits (amount of objects of each type within security network) is written
in license key file (key.iss). The message above tells that the limit of objects of the specified type
is already reached. To be able to have more objects of this type, contact our Technical Support Team
to get the new key. See also Updating License Key on All Servers on page 17 for more information
on how to install the new license key.

Editing Objects Properties


To edit or view objects properties:

1. Select the object in the objects tree and click Setup button.

Note: Several object types do not have editable properties, so Setup button will become disabled once
an object of this type is selected.

2. A window with objects properties will appear on the right edge of the screen. Each object type
has its own properties window appearance; all these windows and objects properties will be
described further. Alter objects settings.
3. Click Setup button again to apply changes and hide the window.

Warning! Due to technical limitations, you cannot close properties window without applying
changes to the object nor you can dismiss changes made in this window. All changes are applied
to system configuration immediately upon closing properties window, so change object settings
with care.

www.isscctv.com
SecurOS 15 Administration Guide

Administration Overview

Deleting Objects
To delete object, select it in the objects tree and click Delete button.
A confirmation dialog will pop up. Click OK button to delete object or Cancel button to return
without deleting.

Warning! If you delete object, its child objects will be deleted as well. This operation cannot
be undone, so use it carefully.

Disabling Objects
To temporarily exclude object from security network without deleting it and, thus, loosing its settings,
just disable it. Disabled objects are marked with cyan cross icon.
To disable object, select it in objects tree and click Disable button.
To enable object, click Disable button once again.

Moving and Renaming Objects


This function is used to move one child object from one parent to another preserving all its settings,
or to rename the object.
To move/rename object:

1. Select object in tree and click Move button.


2. A dialog will appear. Specify there the new parent object and/or objects name.
3. Click OK button to apply changes or Cancel button to escape from this dialog without changing
anything.

Once objects parent has changed, child object will physically move in tree to reflect changes.

Note: A restart of SecurOS may be required to apply the changes.

Searching Objects by Name


To find child objects by their names or parts of names:

1. Select parent object in tree, right-click it and choose Find menu item. A small input window
will appear.
2. Type in the name (or part of name) of the required object and press Enter. The focus will
switch to the first child object that matches the search string.

www.isscctv.com
SecurOS 16 Administration Guide

Administration Overview

3. Press Esc to close the search box or use Enter to search for the next object.

Note: To search through entire configuration tree, select root System object as a parent.

Managing User Rights Within Security Network


Once deploying security network, you can manage its internal security scheme and restrict access to
its administration interface, give some administrators the ability to administer only a part of security
network, or explicitly define, what UI objects each operator can see, what cameras she/he can control
and what she/he cannot, etc.
When no individual user rights are set, SecurOS does not ask any passwords when launching
server/workstation software and assumes you always log in with the superuser rights. Once you
add at least one person and define its rights within the system, SecurOS will require user name and
password when you launch server/workstation software next time. To get full access to all system
components and load the whole system database, use password and name of system superuser.
To implement access control within security network:

1. Change the default SecurOS superuser password and keep it safe (see below).

2. Manage user rights for individual administrators / operators on per object basis (see Defining
Access Levels to Individual Objects on page 38).

3. For these settings to take effect, force all administrator and operator workstations to reconnect
to security network.

Changing Superuser Password


Superuser is a person that has full access to all objects and administrator/operators features within
security network.

Warning! Superuser login name is root. Default superuser password is securos2006. Change
default superuser password to the new value and keep it safe before giving access to your
security network for other personnel!

To change superuser password:

1. Log in as superuser.

2. Open properties window for the root System object and click Change Superuser Password
button (see figure 6).

3. Provide current password and a new password twice.

www.isscctv.com
SecurOS 17 Administration Guide

Administration Overview

Note: After that, users other than superuser cannot see System object at all.

Updating License Key on All Servers


If you need to update your license key file (key.iss) on all application servers within your security
network, you can use the automated key installation function.
To update license key on all servers:

1. Copy the new key.iss file to your local SecurOS directory on administrator workstation or
application server.

2. Launch SecurOS software on this administrator workstation or application server and log in to
SecurOS as superuser.

3. Open System object properties window and click Update System Key button.

4. In a new window click Update list button. The update process will begin automatically and you
will see the progress on the screen.

The SecurOS Subsystems Structure


Configuration, basic features and objects of different parts (subsystems) of the SecurOS system are
described separately in the subsequent parts of the document. The following subsystems are involved
in SecurOS system structure:

1. Core subsystem, containing objects and their settings corresponding to main system components,
such as users and computers. Also organization structure of the system and data storage are
configured within this subsystem (see Core Subsystem on page 19).

2. Interface subsystem, containing objects responsible for visual representation of the system objects
and actually used by operators working with the system. These are screens, maps, HTML forms
and dialogs, system event viewer (see Interface Subsystem on page 42).

3. Video subsystem, which components are responsible for main video streams control, video cam-
eras displaying and recording process, video playback and live video monitoring, video motion
detectors and video archives (see Video Subsystem on page 61).

4. Audio subsystem, containing control facilities of audio recording and playback devices (see Audio
Subsystem on page 100).

5. I/O subsystem, which contains objects responsible for input/output peripheral devices (fire
alarm controllers, relays and various detectors, controlling keyboards) (see I/O Subsystem on
page 104).

www.isscctv.com
SecurOS 18 Administration Guide

Administration Overview

6. Notification subsystem that comprises objects for notification of users about system events by
media messages (see Notification Subsystem on page 107).

7. Automation subsystem, which contains tools for system scripts and macros programming, config-
uration an interpretation, time zones automation controls, third-party devices system integration
tools (see Automation Subsystem on page 114).

Note: Each of the following chapters describes basic working principles and configuration features of the
corresponding subsystem objects.

www.isscctv.com
SecurOS 19 Administration Guide

Core Subsystem

Core Subsystem
Core subsystem communicates with the computers in SecurOS distributed network and installed
intelligent modules (such as license plate recognition module) as well as other subsystems (such as
video or audio subsystem, or telemetry subsystem).

Working Principles
The core subsystemis the SecurOS core and it monitors the status of all connected objects, modules
and devices.
Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.
The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log
file in real time mode.
The SecurOS core subsystem allows connecting and disconnecting of the security network nodes,
configurating and synchronizing the configuration information between the security network nodes, as
well as monitoring any changes in modules and objects status.
If any single node or a certain network segment is disconnected, it is assigned the disconnected
status and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.
Permanent updating of the security network configuration data allows configuring the security network
from any computer running the necessary administration software, and watch video form connected
video cameras, listen to audio, send commands to hardware, monitor and control alarm and fire alarm
systems from each operators workstation within the security network.

Objects Reference

System
This is a root object of the entire objects tree and provides system-wide properties. This object cannot
be deleted, moved, or disabled. This object is visible to superuser only.
Parent object: none (root object).

www.isscctv.com
SecurOS 20 Administration Guide

Core Subsystem

Figure 6: System object properties window

Table 1: System object properties


Option Description
Insert name of the object as it appears in objects tree. Not used in any
Name of the System
other way.
Use this button to save current configuration as a pattern. Then,
sys config folder will be created in SecurOS directory (if it was
Save configuration not there). SecurOS objects database configuration will be saved to
selected name.xml file (in XML format) in the created folder. Type
in file name in the Configuration field below.
Drop-down list of saved patterns (all available patterns are saved in
Configuration sys config subdirectory of SecurOS program directory). Click on this
field to change a name of pattern (default name is default).
Change Superuser Click this button to change superuser password (see Changing Superuser
Password Password on page 16).
Click this button to update the system key (key.iss) on all applica-
Update System Key tion servers within security network (see Updating License Key on All
Servers on page 17).

Security Zone
This object is used to divide entire security network into separate security zones ranged over a large
territory when independent centralized monitoring and supervision is needed for certain physically
separated zones.
Then, some or all computers of one security zones can be displayed or hidden in the objects tree for
the users working on the selected computers of another security zones (see detailed information in
Setting Up Security Zone Visibilities on page 22).
Also, there is a possibility to set the filters for the events transmitting between the security zones.
Using filters, events communication can be completely or partially disabled between the different
security zones. Thus, event filters between the zones are useful to apply when a zone must be
completely isolated from the other ones (see detailed information in Setting Up Event Redirection on
page 24).

www.isscctv.com
SecurOS 21 Administration Guide

Core Subsystem

The users can be also granted with different access rights to implement multi-level access control for
the security objects (see Defining Access Levels to Individual Objects on page 38). For example, in
a security center the operators can observe the territory by watching the signals from the cameras.
The supervisor can be granted the rules to control the monitoring modes, enable or disable cameras,
control the rotatable cameras, and the head of the security center can generate reports.
Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is sep-
arated into several segments and each administrator may monitor and configure only one of those
segments.

Note: A separate events log is used for each security zone for the SecurOS installation.

It is recommended to use several security zones if:

access control subsystem uses hardware identifiers (cards) with different facility codes on differ-
ent territories

access control subsystem is distributed across several zones with different access schedule (dif-
ferent holidays), and if each zone has its own departments and persons (i. e. several organizations
within one office building)

you need to store separate event logs for a subset of SecurOS objects, with different database
depth

Parent object: System on page 19.

Figure 7: Security Zone object properties window

www.isscctv.com
SecurOS 22 Administration Guide

Core Subsystem

Table 2: Security Zone object properties


Option Description
Define length of the events database, in days. Event database stores
Event database length events from objects that belong to this security zone only. If this field
is empty the database length is not limited.
Optional: default facility code for identification cards used in access
Facility code control system. You can override this setting on a per user basis in
Person object settings (see Person on page 26).
A table containing list of dates (in DD.MM.YY format) that will be used
by access control subsystem as holidays. To add several entries into the
Holidays
table, use button. To delete entry from the table, select required row
and press Ctrl + Delete keyboard shortcut.
Select from the list of accessible macros (Macro objects, see Macro
Run macro at start on page 114) the one which will be activated on the system start, if
necessary.

Visibilities setup See Setting Up Security Zone Visibilities on page 22.

Event redirection See Setting Up Event Redirection on page 24.

Setting Up Security Zone Visibilities


The user can set up visibility of one security zones (or individual servers/workstations) from another
security zones or certain computer within security network. In this case, hiding one computer from
another means that it will be invisible in the object tree on the target computer, but it will not stop
sending and receiving data (events and commands) to the target computer so the automatic control
may still be implemented.

www.isscctv.com
SecurOS 23 Administration Guide

Core Subsystem

Figure 8: Object visibilities setup window

To setup object visibilities for a security zone and computers it contains:

1. Open the properties window for the Security Zone object and click Visibilities setup button
from this panel (see figure 7). The object visibilities setup window will appear (see figure 8).

2. From the list on the left side of the window (figure 8), select a single computer to create
system visibilities restrictions (to allow setting visibilities for a single computer, single-click its
icon consequently to change its state; see below icons list on figure 9 and corresponding states
description).

Figure 9: Types of visibility modes

Icon meanings for security zones and computer visibility states (see figure 9 from left to right):

Security zone is visible


Security zone is invisible
Computer is visible
Computer is invisible
Inherited visibility visibility for this computer is inherited from parent security
zone, computer is currently visible. When new Computer objects are created or moved
from another security zone, they have this visibility setting by default

www.isscctv.com
SecurOS 24 Administration Guide

Core Subsystem

Inherited visibility same as above, but computer is currently invisible

3. On the right side, set target object visibilities by changing their icons by single-clicking on
them. Defaults node defines the default visibility settings for newly created security zones (see
below description of icons meaning).

4. To accept the changes, click OK button. To cancel all changes, click Cancel button.

Warning! If you later move a computer from one security zone to another (in objects tree), all
its custom visibility settings will be abandoned, and the computer will inherit visibility from its
new parent zone.

Setting Up Event Redirection


SecurOS has the ability to setup event transmitting filters between security zones or individual
computers within the security network. Event redirection allows to completely isolate one security
zone from another zone and to setup specific event flow rules within SecurOS network.

Figure 10: Event redirections setup window

To setup event redirection it contains:

1. Open the properties window for the Security Zone object and click Event redirection button
from this panel (see figure 7). The event redirection setup window will appear (see figure 10).

www.isscctv.com
SecurOS 25 Administration Guide

Core Subsystem

2. Within Event source tree (see figure 10), select a security zone or single computer to set event
filtering for (to apply settings for a single computer, single-click its icon consequently to change
its state; see below icons list on figure 11 and corresponding states description).

Note: Types of icons are identical to those described in Setting Up Security Zone Visibilities on page 22)
but with slightly different meaning.

Figure 11: Types of event filtering modes

Icon meanings for event filters (see figure 11 from left to right):

Security zone receives events security zone by default receives all events from
source security zone or computer
Security zone does not receive events security zone by default does not receive
any events from source security zone or computer
Computer receives events
Computer does not receive events
Inherited settings event filtering for this computer is inherited from parent security
zone, computer currently receives events. When new Computer objects are created or
moved from another security zone, they have this setting by default
Inherited settings same as above, computer currently receives no events

3. Within Event target tree, select target object to filter events from the source object. To
change their icons, single-click on them consequently (see previous item for description of icons
meaning). Defaults node defines the default visibility settings for newly created security zones.
4. Define exceptions from this rule on per object basis using Exceptions table. If target security
zone or computer receives events by default, exceptions define events that should be filtered
out; if target does not receive events by default, exceptions define events that should reach the
target.

Note: Each line of the table of exceptions specifies the single object of the source computer or security
zone (by its type and ID) and specific event type. The list of events is specific to the type of the object.

5. To accept the changes, click OK button. To cancel all changes, click Cancel.

Department
Used to organize persons in groups, primarily in access control subsystem and to define persons
to manage user rights within security network itself (see Managing User Rights Within Security
Network on page 16).

www.isscctv.com
SecurOS 26 Administration Guide

Core Subsystem

Parent object: System on page 19.

Figure 12: Department object properties window

Table 3: Department object properties


Option Description

ID Object identifier. Read-only.


Insert meaningful object name as it appears in objects tree (e. g. de-
Name
partment name).

Person
Represents a single person (either a person of access control system or a user within security network).
Parent object: Department on page 25.

Figure 13: Person object properties window

Table 4: Person object properties


Option Description

ID Object identifier. Read-only.


(continued on next page)

www.isscctv.com
SecurOS 27 Administration Guide

Core Subsystem

(continued from previous page)

Option Description

Name Insert meaningful person name.


Additional Insert any text in free form. You can specify persons passport number,
information position or any other description you need. Not used by a system itself.
Optional: insert persons phone number. Not used by the system itself.
Phone You can use this field when writing SecurOS scripts to send voice or
SMS notifications.
Optional: insert persons e-mail address. Not used by a system itself.
E-mail You can use this field when writing SecurOS scripts to send email
notifications.

Active Directory storage


The object is used to configure settings of network domain to provide authorization in SecurOS
network. For further information see Configuration of Network Domain User Rights on page 40.
Parent object: Security Zone on page 20.

Figure 14: Active Directory storage object properties window

www.isscctv.com
SecurOS 28 Administration Guide

Core Subsystem

Table 5: Active Directory storage object properties


Option Description
Select type of protocol from the drop-down list box. Possible values:

Windows NT (local or domain) only for Windows.


Provider
LDAP (domain) for Windows and Linux.

Use primary domain


Select this field to use primary domain controller for connection.
controller

Server Specify server or local computer name.


Optional: server network port for connection. Used on specific server
Port
setting.

Use SSL Reserved for future use.

Credentials
Use credentials
Select this field to use name and password of Windows user currently
provided at system
logged in.
log on
Specify user name and password for authentication on server.These and
User name, Password
the following fields are not active when the previous field is activated.
Log on using Secure
Password Reserved for future use.
Authentication (SPA)

User Rights
This object is for defining user rights within the system. See Defining Access Levels to Individual
Objects on page 38 for detailed description.

Note: All users in User Rights object settings have equal access level. To attribute another set of rights
to another users group, create different User Rights object.

www.isscctv.com
SecurOS 29 Administration Guide

Core Subsystem

Parent object: Security Zone on page 20.

Figure 15: User Rights object properties window

Table 6: User Rights object properties


Option Description
Objects tree with icons that depict user rights on the object.
Rights To define a user access level to any object, press an icon of the object
consequently. See below fig. 16 and then for icons description.
(continued on next page)

www.isscctv.com
SecurOS 30 Administration Guide

Core Subsystem

(continued from previous page)

Option Description
Select this field to disable quick shutdown via control panel (Actions
Shutdown) (menu item is invisible). To shutdown client/server
Disable system
software, one should use the Actions Log Off option, provide user
shutdown for user
name and password which allow system shutdown, and use Shutdown
button to confirm shutdown.
Forbid to hide Select this field if user is not allowed to hide all the screens of user
interface interface [] button on the control panel is disabled.
Allow configure
Select the field to assign super-user rights to these users.
system
Specify priority level for simultaneous access to PTZ device (number
Control PTZ priority from 0 to 255). PTZ transactions will be processed in turn: first for
user rights with higher priority level.
Choose SecurOS (local) value to accept rights to access the selected
objects for users from the Users and Groups table (see below) or choose
Providers the Active Directory storage object name as it appears in objects tree to
accept certain rights to user/users group of network domain (see Active
Directory storage on page 27).
Users and Groups (list of users and groups that have the above rights). On selecting the
Active Directory storage object from the Providers list, the list should be formed as described
in Configuration of Network Domain User Rights on page 40.
Link to existing Person object. The name of the person will be used as
username when logging in to SecurOS.
To add several entries into the table, use button. To delete entry from
Operator
the table, select required row and press Ctrl + Delete keyboard shortcut.
Warning! The table appears only when SecurOS (local) value is
chosen in Providers field.
Enter non-empty password for this person. Note that the same per-
Password son can be assigned to several User rights objects simultaneously, but
username/password combination should be unique.

Figure 16: Types of user rights and corresponding icons

Each user access level corresponds to an icon from the following list (see figure 16 from left to right):

No access the user has no access to the object neither in administrative mode nor in operator
mode. The object, though, is still visible as a node in objects tree when in administrative mode.

www.isscctv.com
SecurOS 31 Administration Guide

Core Subsystem

View the user has no administrative access to the object, but the object (if it is a user interface
object like Monitor or Audio Player) can be visible in operator interface. Macros (Macro objects)
that have these level can be executed from within operator interface.

Control same as View rights, but the user can additionally control the object from within
operator interface (i. e. arm/disarm video cameras).

Configure same as Control rights, but the user can view and change objects properties
from within administrator interface. User cannot delete existing object and cannot create child
objects under this object.

Full access same as Configure rights plus ability to delete this object and create child
objects.

Inherited rights rights for this object are inherited from parent object. When new objects
are created, they have this access level by default.

Note: Several object types (like System, Program, Area, Department ) that do not have visual repre-
sentation within user interface on operator workstations, cannot have View and Control access level
types.

Note: If the user creates new User Rights object, he/she cannot define the rights for this object to
exceed the current user rights.

Computer
This object represents individual computer within security network (application server, administrator
workstation or operator workstation). The servers and workstations in the security network are
represented as the Computer objects in the object tree. The servers run the SecurOS server application,
and the workstations run the SecurOS client application.
The SecurOS workstations can send and receive the events from the other security network nodes.
Filters can be used to select the events that will be transmitted from one security network computer
to the other ones and to limit computers control and network load due to events transmission (see
Setting Up Event Redirection on page 24).

www.isscctv.com
SecurOS 32 Administration Guide

Core Subsystem

Parent object: Security Zone on page 20.

Figure 17: Computer object properties window

Table 7: Computer object properties


Option Description

Network connection
Specify IP address or DNS/WINS name of the current computer within
TCP/IP network. You can choose from the list or use [<] button to
Network Address determine computers IP automatically. Never use IP address if the
computer uses DHCP (dynamic IPs), use symbolic DNS name of the
computer instead!
If computer uses dial-up connection to connect to TCP/IP network,
Modem connection select this check box and define connection, user and password below to
dial this connection automatically on system startup.
(continued on next page)

www.isscctv.com
SecurOS 33 Administration Guide

Core Subsystem

(continued from previous page)

Option Description
Name of the Windows system installed dial-up connection, username,
Connection, User, and password for automatic connection with security network. For in-
Password formation on how to setup dial-up connections, consult the help on
Microsoft Windows operating system.
If this option is turned on, computer loads event log from security
network when connects to it. Option is useful when you monitor system
Auto Log Load events via Event Viewer (see Event Viewer on page 55) and want to
know about system-wide events which occurred before your computer
has logged on to security network.

Auto Log Backup Obsolete option. Do not use.


If this option is turned on, the local copy of the event log will not be
Disable Local saved to database. Since event log is synchronized between computers
Protocol and each computer saves its copy in local database by default, you can
turn event log saving on several machines without risk of loosing events.
Block system Option is enable if SecurOS has been run as service (see ISS Startup
shutdown in NT Configuration Utility on page 128). If this option is turned on, user is
service mode not allowed to shutdown (corresponding menu items are invisible).
Select this option to choose the default screen from the drop-down list
Activate screen on that will be shown on SecurOS startup on this computer. Auto value
startup means that the first screen will be displayed (with minimal ID). If this
option is not activated, no screens will be displayed at startup.
Initial user (settings for automatic log in to security network)
If security network requires log in procedure on startup (i. e. user rights
are defined within the network, see Managing User Rights Within Secu-
rity Network on page 16), you can set default user name and password
Name, Password
for automatic login. SecurOS will always start with the rights of this
default user, but you can always log off and then log in back under any
other user name defined within your system.
(continued on next page)

www.isscctv.com
SecurOS 34 Administration Guide

Core Subsystem

(continued from previous page)

Option Description
Drop-down list of SecurOS network computer functional types. Choose
type corresponding to required computer role in SecurOS network. Pos-
sible values:

Operator workstation computer will operate as network


Role client (even in case of other type SecurOS installation).

Administrator workstation, Application server,


Video server computer will operate as a server.

If role is not defined, computer will operate in accordance with initial


SecurOS installation type.
Disks to store archive (table of available local hard disks (HDD) with permissions to store
video and audio data on)

Drive Drive name (letter).

Free GB Current free space on that disk in GB.


Settings for video archiving. Possible values:

<empty> access denied.

Video Read read-only access (video archive can be read from this disk, but
writing to this disk is disabled).

Read/Write reading from and writing to this disk is allowed.

Settings for audio archiving. Possible values:

<empty> access denied.

Audio Read Only read-only access (audio archive can be read from this
disk, but writing to this disk is disabled).

Read/Write reading from and writing to this disk is allowed.

(continued on next page)

www.isscctv.com
SecurOS 35 Administration Guide

Core Subsystem

(continued from previous page)

Option Description
Servers to connect (the list of accessible servers in SecurOS network)
The list of SecurOS network application server that is available for
connection of this computer.
If this computer acts as operator workstation, you can specify the list
of alternative application servers here. When connecting to security
network, operator workstation will walk through this list and try to
connect to each server in order until it connects successfully. If the list
is empty, workstation will connect to single application server explicitly
specified in connection settings (see SecurOS Installation Guide) or
remembered from previous successful session.
In this computer acts as server, only servers which this computer is
allowed to connect should be given in this list. It is necessary to include
Servers to connect
this computer into the same Servers to connect list in all these servers
settings. Then they will be displayed as active in this computer objects
tree. If the list is empty, this computer will be allowed to connect to any
server of the security network, containing this computer in the Servers
to connect list, or also with empty list of servers.
Attention! Connection to all remaining servers will be denied and they
will be signed by green cross icon in this computer objects tree (see
figure 18). System data transfer between them will continue neverthe-
less, depending on events transmission filters.
To add several entries into the table, use button. To delete entry from
the table, select required row and press Ctrl + Delete keyboard shortcut.
Click this button to populate the list with all computers within security
Select All
network.

Clear All Click this button to clear the list of servers.

Move Up Click this button to move up the list.

Move Down Click this button to move down the list.

www.isscctv.com
SecurOS 36 Administration Guide

Core Subsystem

Figure 18: Objects tree containing computers with denied connection

Area Zone
Used for objects logical grouping based on territory location.
Parent object: Security Zone on page 20.
Object has no properties to alter.

Region
Represents a separated area of the territory defined by the parent Area Zone object. Used in access
control system configuration.

www.isscctv.com
SecurOS 37 Administration Guide

Core Subsystem

Parent object: Area Zone on page 36.

Figure 19: Region object properties window

Table 8: Region object properties


Option Description
Insert any text in free form. For example you can specify the area
Comments
location. Not used by a system itself.
Define a list of the Person object names allowed to configure the access
to this area.
Persons
To add several entries into the table, use button. To delete entry from
the table, select required row and press Ctrl + Delete keyboard shortcut.

Protocol filter
The object defines events to record them in protocol database. This object reduce computer memory
usage that avoids its overfull; the object may be used to monitor only the required events.

Warning! If the object is created then only defined events (or events from the defined objects)
will be recorded in database.

Note: To register all SecurOS events one need either to delete the Protocol filter object or to disable it.

Parent object: Computer on page 31.

www.isscctv.com
SecurOS 38 Administration Guide

Core Subsystem

Figure 20: Protocol filter object properties window

Table 9: Protocol filter object properties


Option Description
Choose filter type from the list. Possible values:

Allowing the filter defines events to register in protocol database


Filter type
Forbidding the filter defines events not to register in protocol
database

Table
Object type which events are needed to (or not to) be registered.
Type To add several entries into the table, use button. To delete entry from
the table, select required row and press Ctrl + Delete keyboard shortcut.
Object ID or name which events are needed to (or not to) be registered.
Id, name One may left it empty. Then all events of the defined objects will be
filtered.
Event to filter. One may left it empty. Then all events of the defined
Event
object will be filtered.

Configuration Examples

Defining Access Levels to Individual Objects


SecurOS supports managing administrator and operator rights for individual persons and individual
objects. This is done via configuration of Person objects (which define real user accounts) and User
rights object sets of access levels of users group for each object within security network. Persons
and their rights are defined for each security zone separately.

www.isscctv.com
SecurOS 39 Administration Guide

Core Subsystem

Also, the access level rights can be configured for the users of already created network domain, which
includes computers of a certain security zone (see Configuration of Network Domain User Rights on
page 40). In this case, local SecurOS user accounts will be disabled.

Warning! If security system has more than one security zone, you must define user rights
for each security zone, otherwise you will be able to automatically login to the system with
system-wide superuser rights from any computer that belongs to unrestricted security zone!

After you have defined user rights within security network, SecurOS will require to enter user
name and password on software startup. Since every computer belongs to some security zone, you
can login under users that belong to the same security zone as the computer in question. Other
username/password combinations will not work, even if they are valid within other security zones.
To implement the security scheme with user access restriction:

1. Plan, how many different access rights your security zone should have, and what users will use
each of these rights.

2. Create a Department object (see Department on page 25) under Security Zone object (see Se-
curity Zone on page 20).

3. Create a necessary number of Person objects (see Person on page 26) within this Department
object by the required number of SecurOS system users (administrators / operators).

4. Create User Rights objects within Security Zone object. Its properties window (see figure 15)
contains the tree at the top that is identical to the objects tree of the security network. Edit
access rights of one or more users to each particular object by clicking its icon consequently
(see User Rights on page 28).

5. Repeat steps 24 for each security zone within your network. For each security zone the objects
tree would contain elements shown in figure 21.

Figure 21: Objects tree with Department , Person and User Rights objects

6. Alter security zone visibilities from within other security zones. This allows you to completely
hide parts of your security network from within objects tree for local administrators that do not
need to know the configuration of entire security network.

www.isscctv.com
SecurOS 40 Administration Guide

Core Subsystem

The table at the bottom is used to link the above scheme of user rights to one or more Person
objects and to define individual passwords for each of these persons, or to list a network domain users,
depending on chosen user accounts provider type (see User Rights on page 28, item Providers).

Configuration of Network Domain User Rights


In this section the procedure of Active Directory storage (see Active Directory storage on page 27) and
User rights objects parameters configuration is described. The procedure depends on which domain
provider (Windows NT or LDAP) receives SecurOS user authorization request.

Settings For Windows NT Provider


To set domain parameters for Windows NT provider:

1. In Active Directory storage object properties window (see figure 14) choose
Windows NT (local or domain) value from Provider drop-down list box.

2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server. You do
not need to fill Port field (port for Windows NT provider).
3. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be already defined in domain controller, see item 2).
4. If User name and Password fields are filled, select Log on using Secure Password Authen-
tication (SPA) check box.

To set user rights for a user, fill Users and Groups field in User rights object properties window (see
figure 15) with a series of network domain user login names separated by commas (e. g. j-smith).
To set user rights for a user group, fill Users and Groups field in User rights object properties
window (see figure 15) with a network domain users group login and ,group postfix without space
(e. g. Users,group). The ,group postfix is obligatory.

Settings For LDAP Provider


To set domain parameters for LDAP provider:

1. In Active Directory storage object properties window (see figure 14) choose LDAP (domain)
value from Provider drop-down list box.
2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server.
3. Optional: fill Port field with 389 value (number of LDAP server port).
4. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be defined for domain controller, see item 2).

www.isscctv.com
SecurOS 41 Administration Guide

Core Subsystem

5. If User name and Password fields are filled, select Log on using Secure Password Authen-
tication (SPA) check box.

6. Optional: fill Maximum number of entries to return and Search timeout, sec fields with
search parameters. Empty value is equal to 10 value (default). Search Base field is not used in
current version.

To set user rights for a user, fill Users and Groups field in User rights object properties window (see
figure 15) with a series of the following strings: &(objectClass=user)(sAMAccountName=j-smith)
for each network domain user login (e. g. j-smith).
To set user rights for a usergroup, fill Users and Groups field
in User rights object propertieswindow with the following string:
&(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-dev,dc=test), where
Builtin is a system folder where Users users group is placed.

www.isscctv.com
SecurOS 42 Administration Guide

Interface Subsystem

Interface Subsystem
Maps Working Principles
In order to keep control on entire territory or building, maps can be used. Maps are multi-layer
graphical plans of entire territory under control, floors or single rooms the level of details depends
on your needs.
Once registered within security network, the maps can be used by administrator to place the icons of
security equipment elements, such as cameras, alarm sensors, door detectors on them, representing
objects physical location within the controlled territory.
These maps can then be used by operators to monitor entire territory at a glance and use icons on
maps as shortcuts to the corresponding objects functions.

Example: If an intrusion alarm has been detected, operator can immediately see the physical location
of the target area, switch to the video cameras that are located close to this area by double-clicking on
icons on map, switch lights on within that area.

Map Creation
To deploy a map:

1. Draw a set of images that will be used as map layers (see Drawing Map Layers on page 43).

2. In objects tree locate the Computer object that represents your current administration work-
station or application server from which you are currently administering security network. See
if there is any child Screen object under it and create it if necessary leaving default object
parameters.

3. Create child Map or Map v2 object for the selected Screen. Again, default object parameters
can be used on creation. Once the objects properties window appears (see object description
in Map on page 45 for Map object or Map v2 on page 49 for Map v2 object), provide its
position and dimensions. For Map v2 object it is necessary to choose previously created map
file (see about map file creation).

4. Click Setup button to apply changes and close objects properties window. The map window will
appear on screen with map file loaded.

5. In case of Map object place security network objects like Camera, Sensor, Microphone on
map from within that administration workstation or application server (see ).

6. Move Map (or Map v2 ) object onto operator workstation for real-time interaction (see Moving
Map Objects onto Operator Workstations on page 44 for detailed description of moving map
objects).

www.isscctv.com
SecurOS 43 Administration Guide

Interface Subsystem

Note: Map v2 object is an updated analog of Map object. The main difference from the old object
consists in object configuration process (moving objects on map), user interface (map scaling, working
with filters etc.), see .

Drawing Map Layers


Use of map layers is comfortable for large territory separation on several independent parts. Map layers
are raster graphical images in BMP format. To draw horizontal plans of your object from scratch,
one can use any graphical drawing software that allows to save raster images in these formats. You
can also export raster graphics directly from CAD software where you or the owner of the building
develops source documentation on the building or territory, or you can scan paper with previously
printed plans of your territory.

Note: Images in PNG, GIF or JPEG formats can be also used for Map v2 objects.

The resulting image or images can have any colors and style, but you should consider the following:

All plans of your territory should be done in the same graphical style for better visual perception.

Keep the image dimensions in pixels comparable to dimensions of the target Map or Map v2
object on the screen of the operator workstation to avoid redundant scrolling.

Colors should not distract operator from objects placed on map. Do not use gaudy colors, avoid
using red and orange colors. The more neutral the background is, the better.

Provide all territories with descriptive captions. Text should be clearly visible and readable.

Give images meaningful names (i. e. map floor1.bmp, map floor2.bmp, map room123.bmp).

Note: On Map object creation, default image will be loaded that is named map.bmp and placed in \Bmp
subfolder of SecurOS program folder. For convenience, it is recommended to place all your bitmap files
used as map images for Map object into the same subdirectory.

The figure 22 shows the sample sketch of one floor of a building, which can be used in a map.

www.isscctv.com
SecurOS 44 Administration Guide

Interface Subsystem

Figure 22: Sample of an image that can be used as a map

Moving Map Objects onto Operator Workstations


Once the map object has been fully configured, you can transfer it to the target operator workstation,
if necessary.
To move map to another computer within security network:

1. In case of Map object Manually copy all .bmp files, referenced by this map, from your com-
puter to target computers \Bmp subdirectory under SecurOS program directory.

2. In case of Map v2 object Manually copy the *.map resource file of this map from your
computer to target computers \Maps subdirectory under SecurOS program directory.

3. Setup or edit a map (place objects on map, move them, rotate, etc.).

www.isscctv.com
SecurOS 45 Administration Guide

Interface Subsystem

4. Ensure that the Computer object representing the target computer exists in your SecurOS
configuration, and that it contains at least one Screen object. Create these objects if necessary.

5. Move the Map or Map v2 object itself to the Screen object of the target computer.

6. In case of Map object Define a connection string to main SecurOS database using DSAdmin
utility (see DSAdmin Utility on page 130).

Objects Reference
The objects that have user interfaces or take a part in interaction with users.

Screen
This is a base user interface object that acts as a container to other UI objects. It is used for placement
of several components of user interface.

Warning! All user interface visual components are displayed only by means of SecurOS screens.

Example: Let two rooms are on a secured area. There are PTZ camera and microphone in the first room
and two cameras in the second room. System administrator may configure two Screen objects. On the
first screen there could be a PTZ control dialog window, video displaying monitor and audio player to
work with microphone. On the second screen there could be a second monitor to watch for cameras from
the second room, and a map of the whole territory to provide visual access to all the security devices and
to control their states.

Parent object: Computer on page 31.

Note: If the object name is Playback, then its child Monitor objects will be displayed in a drop-down
list (see SecurOS User Guide for more information).

Object has no properties to alter.

Map
Object represents a multi-layered graphical map of the territory under control. See below for more
information on how to setup and use maps.
Parent object: Screen on page 45.

www.isscctv.com
SecurOS 46 Administration Guide

Interface Subsystem

Figure 23: Map object properties window

Table 10: Map object properties


Option Description
Left and top positions, width and height of the window in percent,
X, Y, W, H
relative to desktop size.
Select this check box if you want the map to switch automatically to
Auto switching
layers that contain icons of the devices in alarm state.

Working with Map Layers


For the users convenience and ability to control large territories, maps can contain several image
layers (e. g. floors of the building). These layers can be linked together with special icons called links
(they can be imagined as hyperlinks between several pages on web site).
To add, remove and switch between layers and to change their titles, right-click the map on any place
not occupied with object icons to gain access to maps context menu (see figure 24).

Figure 24: Maps context menu

To add new bitmap image as a map layer:

1. Click Add map item, then choose *.bmp file for a new layer from standard Open file dialog box

2. Provide the descriptive title of a new layer and click OK button to create layer or press Esc key
to close dialog without adding a layer.

www.isscctv.com
SecurOS 47 Administration Guide

Interface Subsystem

To link two layers together:

1. Click Add link item and choose the target layer you want to link to and caption of the link (at
least two map layers already registered are necessary prior to using this feature).

2. Click OK button to create the link or Cancel button to quit dialog without adding a link. Once
created, a link icon will appear on the map (see figure 25).

Note: Link icon can be moved across the map by pushing left mouse button on icon, dragging your
mouse pointer to the new location and then releasing the left button.

Figure 25: Link icon

Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation,
we recommend to create another link on the target layer that points back to the source one. Thus, it
will be possible to switch between layers in both directions smoothly.
To remove layer from the map, use Remove map option.

Warning! Remove map operation deletes maps current layer without any confirmation and
cannot be undone. Original *.bmp image file will not be deleted.

To navigate forward/backward through the list of available layers, use Next Map and Previous Map
options. This is useful when layers are not linked together yet.

Note: This way of navigation is available in administrative mode only. You should link all layers together
using Add link feature before using map in operator mode.

To change title of the currently visible layer, use Set Title option.

Placing, Moving and Rotating Objects on Map


To place an object on map, select the object from the object tree and click On Map button on
administration toolbar. An icon representing the object will appear on the map (see figure 26).

www.isscctv.com
SecurOS 48 Administration Guide

Interface Subsystem

Figure 26: Map with Camera object icon on it

To move icon around, select it first by clicking on it (a currently selected icon is marked with four
green dots called handlers around it). Then drag the icon using mouse (push left mouse button on
icon, drag your mouse pointer to the new location and then release the left button).

Figure 27: Moving icon on map

To reflect real objects orientation in space, icon can be rotated (useful for video cameras)
To rotate icon, drag any of the icon handlers to turn the icon around its center.

Figure 28: Rotating icon on map

www.isscctv.com
SecurOS 49 Administration Guide

Interface Subsystem

Performing Additional Operations on Objects


To open an icons context menu, right-click on it.

Figure 29: Map icons context menu

Context menu contains following options (see figure 29):

Create copy duplicates object icon on map. This is useful, for example, for alarm loops,
where single Sensor object actually represents a garland of alarm sensors attached, for example,
to every window; you can create several icons of the single object in accordance with the real
number of alarm sensors and place each icon on every window depicted on the map.

Delete removes icon from the map without any confirmations.

Hide option marks object as hidden. It will be still visible while in administrative mode, but
will disappear from the map in operator mode.

Show title shows or hides icons caption on map.

Map v2
Object represents a graphical editable map of the territory under control and installed objects (see
below).
Parent object: Screen on page 45.

Figure 30: Map v2 object properties window

www.isscctv.com
SecurOS 50 Administration Guide

Interface Subsystem

Table 11: Map v2 object properties


Option Description
Left and top positions, width and height of the window in percent,
X, Y, W, H
relative to desktop size.

Display ID of physical display this monitor belong to.


Resource file with the map images and objects. You can quickly select
a target MAP file from the drop-down list of files located in \Maps
Resource file
subdirectory of SecurOS program folder or select MAP file from any
folder by using [...] button that invokes standard Open dialog.

To configure map resource file for Map v2 object use Map2 Editor application.
To create map file using Map2 Editor application:

1. Launch map2.exe file (placed in SecurOS installation folder).The application window will appear
(see figure 31).

Figure 31: Map2 Editor toolbar

2. Click Create button and add at least one layer to a new map (see Working with Map Layers on
page 52).

3. Set a password on map file, if necessary (see Setting Password on page 55).

4. Click Save button to save changes to a new map file. The standard Save As dialog will appear
to define map file name and folder where to save.

To edit map file using Map2 Editor application:

1. click Open button in Map2 Editor application window (see figure 31) and choose the required
map file from the SecurOS\maps folder, or add new layers to an empty map (see Working with
Map Layers on page 52). If a password was previously set for the selected map file (see Setting
Password on page 55), a request window will appear, see figure 32.

www.isscctv.com
SecurOS 51 Administration Guide

Interface Subsystem

Figure 32: Password request window

2. Type in password in Password field and click OK button. The chosen map will be displayed.

Figure 33: Map2 Editor window

The application window consists of the following areas (see figure 33):

Types to choose/place objects

Map image

www.isscctv.com
SecurOS 52 Administration Guide

Interface Subsystem

Levels to create/choose/work with map levels

Filters to create/choose/work with filters

Note: By means of Map2 Editor application it is possible to place/move/remove objects from map,
add/remove maps layers (levels). However, to operate with SecurOS objects (such as, to alarm camera),
use SecurOS map interface in operator mode (see SecurOS User Guide).

Working with Map Layers


To add a new image as a map layer:

1. Double-click add new item in Levels area of Map2 Editor application window. Levels properties
window will appear (see figure 34).

Figure 34: Levels properties window

2. Type in new layer name in Label field.

3. Set map image file in Image field. The following image file formats are supported: JPEG, BMP,
PNG, GIF.

4. Click OK button.

To switch between layers, use links map icons.

www.isscctv.com
SecurOS 53 Administration Guide

Interface Subsystem

To rename current layer, right-click its name in Levels area and choose Properties item from the
drop-down list (see figure 34).
Properties window will appear. Type in a new layer name in Label field.
To set link between layers:

1. Choose the required link from the Level Shortcuts item in Types area (see the note below).

Note: There are two link types for Map v2 object: common and blinking named with (blink) in link
list. The second one works as common link but starts blinking on the corresponding layer alarm. For
example, if one layer is active on SecurOS user map interface and there is an alarm on the other one
then the link map icon will start to blink.

2. Move the selected link to the map area by dragging left mouse button. Once moved, a link icon
will appear on the map (see figure 35).

Note: Link icon can be moved across the map by pushing left mouse button on icon, dragging your
mouse pointer to the new location and then releasing the left button.

Figure 35: Link map icon

To remove a layer from the map, right-click its name in Levels area and from the drop-down list
choose Erase item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see figure 31).

Placing Objects on Map


To place an object on map, select it in Map2 Editor object tree (Types area) and drag it to the map
area. Insert object ID into the appeared query window.

Warning! Identifier must be completely identical (including letters case) to this object ID value
in SecurOS system, otherwise the object would be invisible for an operator.

To replace an object icon, click it and dragging left mouse button move it to the required place.
To rotate an object icon:

www.isscctv.com
SecurOS 54 Administration Guide

Interface Subsystem

Figure 36: Selected icon

1. Click it.

2. Move mouse pointer to the double-side arrow (on the right icon side).

3. Dragging left mouse button rotate the icon.

To remove an object icon from map, click it and from the drop-down list choose Erase item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see figure 31).

Setting Filters
One can use filters to browse only required objects on map (e. g., filter can be configured to display
only cameras).
To create filter:

1. Double click add new item in Filters area of Map2 Editor application window. Filters properties
window will appear (see figure 37).

2. Type in a new filter name in Name field.

3. Choose objects to be displayed on the map from the Show types objects tree (see the note
below).

4. Click OK button.

New filter name will be displayed in Filters area.

Note: It is possible to choose the following cameras filter:


Show all cameras (the Cameras item is activated in Show types objects tree)
Show only PTZ cameras (the ptz item is activated in Show types objects tree)
Show only cameras of a remote video capture device (the ip item is activated in Show types objects
tree)

Working with filters parameters (delete or edit them) is similar with the layer ones (see Working with
Map Layers on page 52).

www.isscctv.com
SecurOS 55 Administration Guide

Interface Subsystem

Figure 37: Filters properties window

Setting Password
To protect the map from someone editing it is possible to set a password on the map file.
To set a password:

1. Click File button on the Map2 Editor toolbar. The drop-down list will appear.

2. Choose Set password item. New window will appear (see figure 38).

Figure 38: Setting password

3. Type in password in Password field and click OK button.

Now to open this map file a password request window will appear (see figure 32).

Event Viewer
Represents a visual log of the events that occur within entire system.

www.isscctv.com
SecurOS 56 Administration Guide

Interface Subsystem

Parent object: Screen on page 45.

Figure 39: Event Viewer object properties window

Table 12: Event Viewer object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.
Objects (table of source objects and their events that will be shown in the event log). To add
several entries into the table, use button. To delete entry from the table, select required row
and press Ctrl + Delete keyboard shortcut.

Type Choose source object type.


Source object ID. You can omit ID to refer to any objects of the specified
ID type within security network; in this case a list of valid areas (see below)
is used to filter objects.
(continued on next page)

www.isscctv.com
SecurOS 57 Administration Guide

Interface Subsystem

(continued from previous page)

Option Description
A title of the object (read-only; appears automatically after you select
Title
object type and specific ID).
Source object event. The list of events depends on the type of the object.
Event
Omit this field to refer to any events of this object type.
Areas (table of source areas of interest, used to additionally filter objects by their belonging to
the specific areas). To fill the table, use the same operations as in the table above.

Title A link to existing Area object.

Protocol list limits


No limits Enable this option for unlimited protocol list.
Enable this option and specified amount of days if you want to limit
Days
protocol list by days.
Enable this option and specified amount of records if you want to limit
Records
protocol list by records.
Operator reaction on alarm event

Enable Check this option to enable operator reaction on alarm event.


Time of
acknowledgement of Define the time for alarm event acknowledgement by the operator, in
alarm event by the seconds.
operator

External Window
Used to automatically launch external application and position its window on screen.
Parent object: Screen on page 45.

Figure 40: External Window object properties window

www.isscctv.com
SecurOS 58 Administration Guide

Interface Subsystem

Table 13: External Window object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
(W, H), in percentage of display horizontal and vertical size. Please
X, Y, W, H
note that not every application allows resizing itself from external appli-
cations.
Path to executable file. You can omit absolute path to the file if it is
Program
located in the directory specified in the Path environment variable.

HTML Form
Use this object to define HTML forms permanently displayed on the screen of parent Screen object.
Object is intended for integration of any custom user interface created by means of HTML forms into
SecurOS. SecurOS system includes a number of HTML forms ready to use most often to display PTZ
control panel on a screen (see SecurOS User Guide). Otherwise, a new HTML form can be also
programmed for specific means (see SecurOS Programming Guide).
Object is displayed while screen is active or until SecurOS system shut down.

Note: All system HTML forms are in \dialogscript subfolder of SecurOS folder.

Parent object: Screen on page 45.

Figure 41: HTML Form object properties window

Table 14: HTML Form object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.
(continued on next page)

www.isscctv.com
SecurOS 59 Administration Guide

Interface Subsystem

(continued from previous page)

Option Description
By checking this option, you can quickly select a target HTML form file
from the drop-down list of files located in \dialogscript subdirectory
of SecurOS program folder. If this option is not active, you can select
Use standart script
HTML file from any folder by using [...] button that invokes standard
file
Open dialog.
Note: to display PTZ camera control dialog, select file with name cor-
responding to PTZ protocol of the camera.

HTML Dialog
This object is used to define popup HTML windows (these windows are displayed dynamically or from
scripts). Note that HTML Dialog object does not belong to any particular screen due to its dynamic
nature: it can be closed by operator at any time. Basically, this object can be used for creation of PTZ
control dialog windows on the desktop (see SecurOS User Guide)
Parent object: Computer on page 31.

Figure 42: HTML Dialog object properties window

Table 15: HTML Dialog object properties


Option Description
Coordinates of the window left top corner on screen in percent, relative
X, Y
to desktop left top corner.

Center on screen Use this checkbox to attach dialog position to the center of the desktop.
(continued on next page)

www.isscctv.com
SecurOS 60 Administration Guide

Interface Subsystem

(continued from previous page)

Option Description
If you check this option, you can quickly select a target HTML dialog file
from the drop-down list of files located in \dialogscript subdirectory
Use default directory of SecurOS program folder. If you uncheck this option, you can select
HTML file from any folder by using [...] button that invokes standard
Open File dialog.

Events Deprecated. Do not use.

www.isscctv.com
SecurOS 61 Administration Guide

Video Subsystem

Video Subsystem
Video subsystem is used to operate and configure the video devices (video capture cards, analog
and IP cameras, PTZ devices) within the security network, transmit video streams between servers,
concentrators and workstations and work with live and archive video from within workstations.

Working Principles Of Motion Detection Zones


SecurOS system provides a multi-zone detector to split camera surveillance area into several indepen-
dent areas, which may have different motion detection parameters, such as object size threshold or
alarm states.
A Zone object corresponds to each motion detection zone (see Zone on page 73). Basically, all zones
are divided into two types:

alarming designed to fire an alarm immediately upon motion detection.

informational designed to generate a motion detected event, that can be used for scripting
and other purposes. This event would not fire an alarm on the camera, though.

Example: For instance, the user needs to control an area with a gate and several windows seen above the
gate. The task is to make alar activation each time somebody appears at a window whereas to neglect
firing alarms each time the gate is used. In this particular case, it is recommended to set two different
zones for the gate and the windows. The window zone should be configured to fire an alarm upon any
motion detection, while the gate zone should be configured to generate a motion detection event, but not
to fire an alarm. Moreover, if different windows have different types of illumination, you can configure
a lot of zones with different contrast parameters for reliable motion detection.

Both alarming and informational zones should be armed to detect motion. A zone can be configured
to be always armed, meaning an operator does not have to arm it manually (see Zone on page 73).
All the other zones should be armed manually.

Special Settings For Video Subsystem Components

Camera Imaging Control


Administrator can configure camera imaging in two different ways:

In Camera object properties (see Camera on page 67).

www.isscctv.com
SecurOS 62 Administration Guide

Video Subsystem

In operator workstation UI. Assuming that a Video Capture Device object and a Camera object
have been created, administrator has to create a Screen and a Monitor in order for camera frame
to appear.

To configure camera imaging from operator interface, right-click Img button on camera cell and choose
Adjust image item from the menu. Camera imaging control window would appear (see SecurOS User
Guide).

Record Buffer Settings


On using low speed network (see requirements in SecurOS Installation Guide) it is recommended to
configure the record buffer size by setting its parameters.
To set the record buffer parameters, do these steps on the computer keeping video archive:

1. Shutdown SecurOS.

2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).

3. Open SOFTWARE\\ISS\\Niss400\\Video key and set the minimal number of video frames in
the buffer by mplayer queue min parameter.

4. Open SOFTWARE\\ISS\\Niss400\\Video key and set the maximal number of video frames in
the buffer by mplayer queue max parameter.

5. Close the regedit utility.

6. Launch SecurOS again.

Archive Recording
To avoid situations when there is no free space on disk in case of permanent writing video archive in
SecurOS format from cameras (operative video archive) one should previously set mandatory free disk
space.
To define it, do these steps on the computer keeping operative video archive:

1. Shutdown SecurOS.

2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).

3. Open SOFTWARE\\ISS\\Niss400\\Video, create FreeMb key there and define mandatory free
disk space (in MB) for archive recording as its value. Now archiver will record video on the
defined disk till its free space is less than the FreeMb value. On mounting to the FreeMb value
the archiver will try to record to other available disks. If there is no free disks then the ring
recording will be used (old files will be deleted).

www.isscctv.com
SecurOS 63 Administration Guide

Video Subsystem

Warning! To set this key for video concentrator archive, it is necessary to open
HKLM\\SOFTWARE\\ISS\\Niss400\\gate.

4. Close the regedit utility.

5. Launch SecurOS again.

When recording video archive it splits into files. Each file contains fixed frames number and after
exceeding this number a new file recording begins. When operator navigates archive records are
scanned in the order of splitting on these files. To make more efficient search on archive, administrator
can change frames number in archive files.
To change frames number in archive files, do these steps on the computer with operative video archive
disks:

1. Shutdown SecurOS.

2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).

3. Open HKLM\\SOFTWARE\\ISS\\Niss400\\Video, create MaxFrame key and define maximum


number of frames in any new files of archive records.

Warning! To set this key for video concentrator archive, it is necessary to open
HKLM\\SOFTWARE\\ISS\\Niss400\\gate.

4. Close the regedit utility.

5. Launch SecurOS again.

Administrator can set duplication of the operative video archive recorded from a certain cameras to a
long-time video archive on any available disk by the help of Archiver object (see Archiver on page 85).

Note: Administrator can set video archive converting from SecurOS format to AVI-format from certain
cameras by the help of Archive Converter object (see Archive Converter on page 84). On this operation
files record into temporary files folder and are converted then.

Objects Reference

System Objects
Video Capture Device
The object represents a single capturing chip of a physical video capture card installed on the computer,
or video hub or IP camera plugged in to TCP/IP network.

www.isscctv.com
SecurOS 64 Administration Guide

Video Subsystem

Note: If add-on camera is analogue choose TVISS4 or TVISS1 (depends on installed capture card
type), if it is an IP-camera choose a value corresponding to the device model, for video hub choose
VideoHub or LinuxHub (depends on device type).

Example: In case of video capture cards, calculate the total number of chips on all video capture cards
and create N objects with N unique PCI Channel parameters. For example, TVISS4-02 and KV2004
cards have four independent video capturing chips onboard and should be represented within a system as
four Video Capture Device objects. TVISS1-02 has one video capturing chip and should be represented
as a single Video Capture Device object.

Note: Always start PCI Channel parameters number from 00 and avoid gaps in numbering. For example,
if there are one TVISS4-02 card and two TVISS1-02 cards on the computer, create six Video Capture
Device objects and set their PCI Channel parameters to 00, 01, 02, 03, 04, 05 and 06 respectively.

Parent object: Computer on page 31.

Figure 43: Video Capture Device object properties window

www.isscctv.com
SecurOS 65 Administration Guide

Video Subsystem

Table 16: Video Capture Device object properties


Option Description
Select the appropriate type of video capture device from the list (a phys-
ical video capture card, USB or PTZ (dome) camera, network video hub
or IP camera).
Choose TVISS4 or TVISS1 in case of analog camera connected (depends
on installed capture card type). In case of IP camera, choose the type
corresponding to device model. In case of video-HUB, choose VideoHub
Type or LinuxHub (depends on device type).
Virtual type stands for software emulation, that uses specially pre-
pared video clip as a video source. This option can be used to test
configuration without real video capture cards and cameras installed.
Note: the Xvid codec (www.xvid.org) has to be installed on the com-
puter for correct Smartec IP-camera working.

If the Type parameter is Virtual, KV2004, TVISS1 or TVISS4, set the


PCI channel
unique PCI channel number here.
Choose video signal characteristic from the list:

type of the video signal compression (MJPEG or MPEG4) for Type


parameter Sony IP Camera. For MJPEG format PCI channel num-
ber must be 0, for MPEG4 format 1.

type of the video signal source direction for Type parameter


Mobotix (PTZ protocol, two lenses camera). Possible values:
Format Left left camera lens, Right right camera lens, Both both
camera lenses, RiL scaled right window video image is displayed
on the top of left window video, LiR scaled left window video im-
age is displayed on the top of right window video, Auto default
value.

type of the video signal format (NTSC or PAL) for all other Type
parameter values

Live Resolution Not used for all device types.


(continued on next page)

www.isscctv.com
SecurOS 66 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Define frame size of compressed video feed. Valid for VideoHub,
PelcoNET 530x, Pelco IP370IH-ZX, Mobotix, Panasonic, Arecont,
iCanTek device types only. Possible values:

Normal CIF1 (1/4 of original frame size). For Mobotix devices cor-
responds to VGA 640 480 resolution, for Panasonic QVGA
320 240 resolution
Compressed
High CIF2 (half-frame). For Mobotix and Panasonic devices corre-
Resolution
sponds to Megapixel 1280 960 resolution

Full CIF4 (full frame). For Mobotix device corresponds to D1-


PAL 768 576 resolution, for Panasonic VGA 640x480
resolution

Note: For other devices resolution has to be changed in corresponding


Camera object settings.
Specify acquisition rate of raw video capture. Possible values:

Max every frame is processed.


Acquisition
Normal every second frame is processed, others are skipped.
Rate / Raw
Min every third frame is processed, others are skipped.

Valid for Virtual and LinuxHub device types.


Specify acquisition rate of compressed video feed. Values are the same
Acquisition Rate /
as for Acquisition Rate / Raw. Valid for Sony IP Camera, Smartec,
Compressed
VisioWave and Mobotix.

If you are using a networking video device (Sony IP Camera,


AXIS, Bosch, Mobotix, Smartec, VisioWave, Samsung SCC-C6475,
PIV-6732, PelcoNET 350, PelcoNET 530x, Pelco IP3701H-2X,
IP address VideoHub, LinuxHub, IPCamera or other IP network camera), spec-
ify its IP address or DNS/WINS name within TCP/IP network.
Attention: never use IP address if the device uses DHCP (dynamic IPs),
use symbolic DNS name of the device instead!
Specify a user name for IP camera connection. Default value securos
User
should be kept for all device types.
Specify individual device password. There is no need to change default
value.
Password Attention: password is displayed while typing, but on the next opening
of properties window "*" symbols are displayed in the field (the number
of symbols differs from actual password length).
(continued on next page)

www.isscctv.com
SecurOS 67 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Select from the list configuration parameters of the digitization. The list
is active only for TVISS device types in multiplexing mode.

Mode digitization mode. Allows to get maximal value of the fps


Capture settings
parameter. The Normal value is the optimal mode.

Gain gain level value.

Check this option to use hardware watchdog function on the specified


device: system will restart computer in case of hanging. Valid for
Activate watchdog
TVISS1 and TVISS4 device types only. See SecurOS Installation Guide
for more information.

Camera
This object represents physical CCTV camera or other analog video source.

Note: If at least one Region object (see Region on page 36) is registered in the system, then the Region
drop down list box would be accessible to choose a region of a new camera placement in Creating
parameters window when creating new Camera object.

Note: In case of Mobotix video capture device and Both video signal format create two cameras with
channels 1 and 2 for correct video signal recept. Then, camera on channel 1 would display video from the
left camera lens, whereas camera on channel 2 from the right lens.

www.isscctv.com
SecurOS 68 Administration Guide

Video Subsystem

Parent object: Video Capture Device on page 63.

Figure 44: Camera object properties window

Table 17: Camera object properties


Option Description
Equipment
Set the channel number corresponds to the number of the BNC connec-
Channel number
tor the camera is attached to (see labels on each BNC connector).
(continued on next page)

www.isscctv.com
SecurOS 69 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
If the camera can be controlled by a PTZ device, select a PTZ Device
object containing a list of PTZ presets that represents the corresponding
Pan/Tilt/Zoom device (see PTZ Device on page 83).
Note: corresponding list of presets will be displayed in PTZ control
panel on a monitor when operator selects this camera.
You can assign a Microphone object to this camera, so you can syn-
chronously record audio with video and to listen to audio from this
Microphone
microphone when you select video camera from within operator inter-
face.

Video archive
Codec Profile Select a profile from a predefined list.
Define a compression level/quality for this camera. There are five dis-
crete compression levels. Boundary values are:

Compression Min minimal compression, highest picture quality.

Max maximum compression, lowest picture quality.

Specify a minimum depth of video archive, in days. This is a recom-


mended value. If the free space on the hard disk comes to an end, system
automatically deletes eldest records, but tries its best to preserve archive
Store at least
for that camera for the specified amount of days. When everything else
is deleted, and the space is still required to store new archive, server
will give up and delete tail of archive disregarding of that value.
Specify a maximum depth of video archive, in days. If you set this
value, server will automatically delete all records that are elder than
the specified threshold value; the process of archive truncation launches
Store at most
at night, between 00:00 and 02:00. If you keep this field blank, the
archive will be kept as long as there is free space on hard disk to store
new archive fragments.
(continued on next page)

www.isscctv.com
SecurOS 70 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Set this option to protect the video archive for this camera with a pass-
word (this will apply to newly created video records; current archive
will remain untouched). Specify the password twice (to avoid typos).
To view password-protected cameras from operator interface later, you
Protect archive with will need to specify the same password in camera settings within the
password Monitor object settings (see Monitor on page 87). This password will
also be requested to view and convert video archive from ISS Media
Export Utility (see ISS Media Export Utility on page 123). For this
setting to take effect, you must restart video server that has the target
camera connected to.
Blinding detector (settings for blinding detector)
Select this check box to generate special events each time blinding is
Notify about blinding
detected. These events can be used in macros.
Detection size sensitivity slider. Boundary values:

0% camera is treated as always blinded.

50% blinding will be detected if 50% of the frame area has low con-
Size trast.

100% only full blinding (entire camera view has low contrast) will be
detected.

Detection contrast sensitivity slider. Boundary values:

Min only areas of minimal contrast are taken into consideration (e. g.
Contrast evenly colored surfaces like sheet of paper).

Max areas with higher contrast are also taken into consideration.

Defocusing detector
Notify about Select this check box to turn on defocusing detector. This detector is
defocusing used to detect camera focus failure.
Defocusing detector sensitivity. Boundary values:

0% detector is insensitive, camera is always focused


Sensitivity
100% detector is very sensitive, camera is always defocused

(continued on next page)

www.isscctv.com
SecurOS 71 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Alarm recording
If this option is turned on, video will start recording automatically when
a motion by this camera is detected, and will stop automatically when
Record alarms
motion ends. Recommended for working with DVR search panel (see
SecurOS User Guide).
Hot recording is a feature of temporary increasing the quality of the
video from camera immediately when motion is detected and recording
starts. Possible values:

Dont use hot recording do not use this feature at all.


Hot recording mode
Use hot recording use this feature for the specified duration from
the start of the alarm.

Whole alarm is hot hot recording lasts during the whole alarm.

Set the duration of pre-recording phase, in seconds. The more the length
Pre-recording phase
of this phase, the more RAM is used to cache video. If not set or set to
duration
zero, pre-recording wont be used.
Set the maximum duration of hot phase, in seconds. Used in conjunction
Hot phase duration
with Use hot recording mode.
Post-recording phase Set the duration of post-recording phase, in seconds. If not set or set to
duration zero, post-recording wont be used.
Set the frame rate of hot phase, in frames per second (fps). This field is
accessible when Use hot recording or Whole alarm is hot values
are chosen in Hot recording mode list. This frame rate should be
Hot phase frame bigger than the value in Normal frame rate field (see next parameter).
rate The frame rate can not exceed physical frame rate of the video from
the camera. That is if your camera supplies video with 5 fps setting
more that 5 fps will give no effect. If not set, uses original fps value of
camera video feed.
Set the normal frame rate in fps. This rate is used on prerecording,
alarm and post-recording phases. If the Whole alarm in hot mode is set,
Normal frame rate use Hot phase frame rate instead. The frame rate can not exceed
physical frame rate of the video from the camera. If not set, uses original
fps value of camera video feed.
(continued on next page)

www.isscctv.com
SecurOS 72 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Image settings (settings that affect image quality, colors, etc.). Attention: all these settings
affect the video being stored in archive. These are NOT view-only settings!
If this camera is connected to TVISS1-02 or TVISS4-02 video capture
device, you can set individual resolution for this camera here. Possible
values:

Resolution Normal [352288] CIF1 (1/4 of original frame size).

High [704288] CIF2 (half-frame).

Full [704576] CIF4 (full frame).

Use this option to turn on automatic gain control (AGC) hardware fea-
ture of your video camera. Not all cameras support this function.
Automatic Gain
Note: For active video channels, Auto Gain field in image settings
Control
context menu (see SecurOS User Guide) would be permanently active
whether this option is enabled or not.
This option enables software image deinterlacing on full resolution video.
Choose type of deinterlacing from the list box. Possible values:

Deinterlacing Adaptive corresponds to adaptive deinterlacing algorithm.

Standard corresponds to smoothing algorithm.

Check this option to enable software auto brightness/contrast adjust-


Auto-adjust ment. If the option is off, you can adjust brightness and contrast manu-
ally with the sliders below.
Adjust hardware brightness setting with this slider. Option is available
when Auto-adjust feature is disabled. Note that you cant preview your
changes to brightness/contrast/hue/saturation in real-time. Changes
Brightness
are applied when you finish object setup. To fine-tune camera settings
with instant preview, change these image settings from within operator
interface instead.
Adjust hardware contrast setting with this slider. Option is available
Contrast
when Auto-adjust feature is disabled.
Check this option to enable color video from camera or uncheck it to
Color
make video black-and-white).
Adjust hardware hue setting with this slider. Option is available when
Hue
Colour feature is disabled.
(continued on next page)

www.isscctv.com
SecurOS 73 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Adjust hardware saturation setting with this slider. Option is available
Saturation
when Colour feature is disabled.

Zone
Represents single detection zone of the motion detector (see Working Principles Of Motion Detection
Zones on page 61 for detailed information). One default zone Main is created automatically when
Camera object is created.

Note: Graphical configuration of detection zones is performed from the operator interface (see SecurOS
User Guide).

While configuring a zone, take into account the following parameters:

Contrast slider defines a threshold for object contrast, relative to the background. Top position
of the slider means the zone would detect motion only if a moving object differs greatly from
the surroundings. Bottom position of the slider means the zone would detect motion even if
a moving object slightly differs from the surroundings.

Size slider defines a threshold for object size. Top position of the slider means the zone would
detect motion of big objects only. Bottom position of the slider means the zone would detect
motion of small objects.

Note: The values of the Contrast and Size sliders should be set by practical consideration.

Alarming flag should be active to fire an alarm on the camera upon any motion detection within
the zone. If this flag is not checked, the zone is considered informational.

Always armed flag should be active to have the zone always armed, regardless of the
armed/unarmed state of other zones on the same camera.

Parent object: Camera on page 67.

www.isscctv.com
SecurOS 74 Administration Guide

Video Subsystem

Figure 45: Zone object properties window

Table 18: Zone object properties


Option Description
If this option is set, motion detection within this zone will be treated
as alarm (camera will enter alarmed state, recording will be stared
automatically, etc.).
Alarming If you clear this option, the zone will be treated as informational:
no predefined actions will be performed, the Zone object will generate
events upon detection start and end, thus allowing you to program
custom reactions via macros or scripts.

Armed always Set this option if you want to forbid operator to disarm this zone.
Set this option if you want to enable DVR search panel, see SecurOS
User Guide). If the checkbox was selected then the following events will
be detected (its time intervals will be recorded to database also):

alarms for all moving objects which size is more then md2 alarm size
parameter value, see

alarms for all objects (which size is more then md2 alarm size pa-
Smart Search rameter value) movements in each 10 10 cell

All records will be registered in SecurOS database in case of PostgreSQL


database only. In case of other databases, records will not be recorded
and search will be impossible.
Note: alarm time intervals are registered irrespective of archive exis-
tence for that time. It is implied that the camera writes video constantly
or on motion detector triggering.
Set this option if you want to forbid operator to watch some part of
camera view. The zone will be blacked.
Blackened Note: Blackened zone should contain single rectangular area only. If
defined area of a blackened zone is non-rectangular, a bounding rectangle
is calculated and then drawn to black this area on a camera cell.
(continued on next page)

www.isscctv.com
SecurOS 75 Administration Guide

Video Subsystem

(continued from previous page)

Option Description

Motion detection
Detection size sensitivity slider. Boundary values:

min even smallest objects will be detected.


Size
max only large objects will be detected.

Detection contrast sensitivity slider. Boundary values:

min even low-contrast objects will be detected.


Contrast
max only objects with high contrast will be detected.

Zones separated from the Main zone are recommended to create for each secured area within the
camera view.
Each Motion detector object has a pre-configured zone named Main. This zone by default covers all
the camera space. Editing zone shape is implemented through the camera monitor in operator interface
(see SecurOS User Guide)

Note: To avoid drawing delay disable Hyper Threading item in BIOS. This note is for CPU Pentium
IV only.

Light Detector
Represents detector of contrast between inner and outer zones.

www.isscctv.com
SecurOS 76 Administration Guide

Video Subsystem

Parent object: Camera on page 67.

Figure 46: Light Detector object properties window

Table 19: Light Detector object properties


Option Description
Detection light sensitivity slider. Boundary values:

min even smallest light difference will be detected.


Sensitivity
max only high light difference will be detected.

Inner zone Name of the inner zone object. Select from the list.

Outer zone Name of the outer zone object. Select from the list.
Outer zone Name of the secondary (additional) outer zone object to check light level
(secondary) by comparison with two independent zones. Select from the list.

Zone Object Detector


Designed to detect object activity within a selected area of camera view. The main difference of
ZOD from a standard motion detector is that the latter looses a static object while ZOD can detect it
presence constantly.
ZOD uses a background subtraction technique to build a scene when foreground objects are absent.
ZOD implements a so-called museum mode when there are no dynamic objects within the zone most
of the time, and it is necessary to attract attention when someone changes a state of a static object
within a zone.

www.isscctv.com
SecurOS 77 Administration Guide

Video Subsystem

ZOD applications can cover:

Human activity monitoring

Store or museum 24 7 object watching

ZOD can work on grayscale or color images. Color mode can significantly increase the accuracy of
object detection if there is a low contrast between object and a background. Grayscale mode offers
a special brightness compensation algorithm (BCA) to reduce effect from camera lens auto iris.
To increase the performance of the detection algorithm, the environment should meet the following
requirements:

Camera should have an indoor placement.

Camera vibrations should be avoided.

There should be no great changes in light conditions when object is present in zone.

There should be no dynamic background (e. g. windows, waving curtains, blinking lamps, TV
sets and so on) within a zone.

To setup a Zone Object Detector:

1. Create a Zone object under certain Camera object, and define (draw) this zone from within
operator interface (see ).

2. Create a Zone Object Detector object for the same Camera object that references the Zone
object from the step above and uses it as an area of interest.

Several Zone Object Detector objects can be created for a single camera, and each such object can
reference independent Zone object. This will allow to determine the position of the dynamic object
within a camera view.

Note: Dynamic objects can cross several zones within short time periods while moving. To avoid false
alarms there is a delay parameter in Zone Object Detector object settings, which prevents duplicate object
detection within specified amount of time.

www.isscctv.com
SecurOS 78 Administration Guide

Video Subsystem

Parent object: Camera on page 67.

Figure 47: Zone Object Detector object properties window

Table 20: Zone Object Detector object properties


Option Description
Specify the number of frames for initial scene building stage. During
this initialization the detection is not performed. After that, scene statis-
Frames
tics is updated constantly in background while no dynamic objects are
detected within a zone.
Specify the number of frames the ZOD is insensitive for state changing
i. e. object presence or absence. Decrease this parameter to force ZOD
Delay frames response. Increase this parameter to avoid duplicate object detection
within specified amount of time (used especially when zone consists of
several regions).
The level of filtering between an estimated background and an object.
The minimum value can force object detection in poorly illuminated
Contrast threshold apartments but increase the noise influence. The maximum value can
exclude shadows from being detected but could lose objects if there is
low contrast with a background.
The minimum size of object to be detected with ZOD. Minimum value
Area threshold
is 10% of a zone area. The maximum value is 100%.
SecurOS motion zone to be used as ZOD region of interest. Select from
Zone
the list.
(continued on next page)

www.isscctv.com
SecurOS 79 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Compensation for brightness (brightness compensation algorithm settings, valid for grayscale
video only)

Use compensation Check this option to turn the algorithm on.


Minimum/Maximum
Specify low/high filtering levels for background updating.
background threshold

System reacts on detecting any object in camera view (zone). So it is necessary to define such object
size to avoid alarm situations caused by insignificant motion but enough to detect alarm one.
To set a detected object minimal size:

1. Shutdown SecurOS.

2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).

3. Open HKLM\\ISS\\VIDEO md2 alarm size and set a detected object minimal size. Possible
values: 0...255. Default value 100.

4. Close the regedit utility.

5. Launch SecurOS again.

Video Concentrator
Represents video concentrator engine. For more information on video concentrators and routing video
see SecurOS Installation Guide. Do not create Video Concentrator objects on application servers that
already process video from attached cameras. Use free (not used) servers instead.

www.isscctv.com
SecurOS 80 Administration Guide

Video Subsystem

Parent object: Computer on page 31.

Figure 48: Video Concentrator object properties window

Table 21: Video Concentrator object properties


Option Description
Click this button to populate the Cameras table with all cameras
All
within security network.
Cameras (list of cameras, which video will be gathered by video concentrator). To add several
entries into the table, use button. To delete entry from the table, select required row and press
Ctrl + Delete keyboard shortcut.

ID ID of a Camera object.
Name of a Camera object. You can use either ID or Title to specify
Title
target camera.
Optional: select another video concentrator to get this camera video
Video concentrator feed from. This is used to make chains of video concentrators. If no
concentrator is specified, video is taken directly from video server.
Optional: select the maximum frame rate of the video feed delivered to
Fps clients. The frame rate cannot exceed physical frame rate of the video
from the camera. If not specified, original frame rate is used.
(continued on next page)

www.isscctv.com
SecurOS 81 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Optional: select the compression type of the video that will be trans-
mitted to the clients (if the source and target compression levels differ,
Compression video will be recompressed). If not specified, original compression is
used. Use the recompression feature with caution, since it consumes
much CPU resources.
Do recording on discs (table of available hard disks with permissions to store video on each of
them). Adding or deleting table elements is the same as for Cameras table.

Drive Drive name (letter).

Free GB Current free space on that disk in GB.


Settings for video archiving. Possible values:

<empty> access denied.

Video Read Only read-only access (video archive can be read from this
disk, but writing to this disk is disabled).

Read/Write reading from and writing to this disk is allowed.

Select a profile from a predefined list. Possible values:


Codec Profile
High compression, High quality, Low traffic, MJPEG, Standard.

PTZ Controller
Represents interface (e. g. RS485 port or serial communication port with RS232 to RS485 converter
attached if PTZ device works through the RS232/RS485 interface, or a network device), which is used
to connect PTZ devices to, and a specific PTZ protocol.

www.isscctv.com
SecurOS 82 Administration Guide

Video Subsystem

Parent object: Computer on page 31.

Figure 49: PTZ Controller object properties window

Table 22: PTZ Controller object properties


Option Description

Protocol type Select from the list box the required PTZ protocol to control PTZ device.
Computers (or video hubs) serial communication port that has RS232
Port to RS485 converter attached. For PTZ devices integrated with camera,
use default value, as well as for Speed and Parity fields.
Speed of the data transmission. Consult PTZ device documentation for
Speed information on required speed value. The lesser speed, the more reliable
is communication. 9600 is a typical value.
Serial communication settings. Consult PTZ device documentation for
information on required settings.
Note: If the PelcoNET 350 device type was selected for the Video
Capture Device object then the following protocol configurations are
Parity, DTR, RTS possible:

selected DTR and non-selected RTS check boxes the RS-232 protocol

in other cases the RS-482/422 protocol

(continued on next page)

www.isscctv.com
SecurOS 83 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Check this option to work with PTZ device over the network.
Optional: select video hub (Video-Hub, LinuxHub) or IP camera (e. g.
AXIS or Bosch) from the drop down list box to use it as a proxy to
Use remote hub
transmit PTZ commands. If a video hub is selected, the port settings
above will apply to hubs serial port (video hubs usually have single
serial communication port).

PTZ Device
Represents physical PTZ device connected with a camera through RS485 interface or integrated with
a camera (analog or digital), and a list of its patrol routes (presets).

Note: When you create new PTZ Device object, its ID should match unique RS485 ID of the physical
device (in case of using the camera analog connection only). ID is set on device by DIP switches (consult
PTZ device documentation for more information). ID should be in 0. . . 255 range as single RS485 line
can address up to 256 devices.

Note: Name of this PTZ Device object has to be chosen from corresponding list in the Camera object
properties window of the camera controlled by this PTZ device (see Camera on page 67.

Note: To control PTZ device through HTML form, it is necessary to indicate an identifier of the
corresponding PTZ Device object in the Address field of the PTZ dialog window (see SecurOS User
Guide).

Parent object: PTZ Controller on page 81.

Figure 50: PTZ Device object properties window

www.isscctv.com
SecurOS 84 Administration Guide

Video Subsystem

Table 23: PTZ Device object properties


Option Description
Preset identifier. To add several entries into the table, use button. To
Id delete entry from the table, select required row and press Ctrl + Delete
keyboard shortcut.
Name of preset. A list of these presets will be displayed in the operator
Name
interface when working with this PTZ device.

Archive Converter
Used to convert remote servers video in SecurOS format to AVI or ASF format. It is recommended
to set special folder or logical disk for temporary files before archive converting, see .
Parent object: Computer on page 31.

Figure 51: Archive Converter object properties window

Table 24: Archive Converter object properties


Option Description

Codec Select the installed codec name.


(continued on next page)

www.isscctv.com
SecurOS 85 Administration Guide

Video Subsystem

(continued from previous page)

Option Description

Refresh Click this button to refresh the codec list.


Table. To add several entries into the table, use button. To delete entry from the table, select
required row and press Ctrl + Delete keyboard shortcut.
Click this button to populate the cameras table with all Camera objects
All
within security network.

Id Source Camera object ID.

Name Source Camera object name.


Enable corresponding field to select format of converted file: AVI or
File type
ASF.
Folder for converted video and temporary video in SecurOS native for-
mat copied from video servers. There is Avi and Native folders will be
created automatically in working folder.
Note: it is recommended to set a specific folder on a separate logical
Working folder
disk as a working folder. It should be done because temporary files
size may exceed the capacity of the system disk when converting large
amount of data and there would be no free space on system disk (that
would result in system crash).
Field to set typical names of archive files. The following masks are
available (curly brackets are necessary):

{SID} export session ordering number. Reset to zero when Se-


curOS is restarted

{CAMID} camera identifier


Names mask {COMPID} computer (videoserver) identifier

{EXPORT START TIME} the beginning of conversion period


time interval

{EXPORT STOP TIME} the end of of conversion period time


interval

Archiver
Used to write video from predefined cameras to long-time archive (video in SecurOS format). It is
recommended to define the required free disk space before archive recording, see below.
Parent object: Computer on page 31.

www.isscctv.com
SecurOS 86 Administration Guide

Video Subsystem

Figure 52: Archiver object properties window

Table 25: Archiver object properties


Option Description
Click this button to load a list of all available local and network disks
Fetch
into the HDD table (see below).

Drives
List of hard disks. To enable or disable reading/writing to one select the
HDD
corresponding value from the drop-down list box in Mode row.
List of readable disks. To enable or disable reading from one select the
CD/DVD
corresponding value from the drop-down list box in Mode row.
Cameras table (list of cameras to archive video from). To add several entries into the table, use
button. To delete entry from the table, select required row and press Ctrl + Delete keyboard
shortcut.
Click this button to populate the Cameras table with all cameras
All
within security network.
(continued on next page)

www.isscctv.com
SecurOS 87 Administration Guide

Video Subsystem

(continued from previous page)

Option Description

ID ID of a Camera object.
Name of a Camera object. You can use either ID or Name to specify
Name
target camera.

To avoid situations when long-time video archive is completely updated immediately rather than step
by step one should previously set mandatory size of old files to be deleted on the ring (repeat)
recording.
To define it, do these steps on the computer keeping long-time video archive:

1. Shutdown SecurOS.

2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).

3. Open SOFTWARE\\ISS\\Niss400\\Archiver, create ringSize key and define size (in MB) of
old files to be deleted on the ring recording.

4. Close the regedit utility.

5. Launch SecurOS again.

User Interface Objects


Monitor
Object is used to display video streams from the cameras and to create an operator interface with
tools for any camera control and video archive operations.

www.isscctv.com
SecurOS 88 Administration Guide

Video Subsystem

Parent object: Screen on page 45.

Figure 53: Monitor object properties window

Table 26: Monitor object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.

Display Choose ID of physical display this monitor belongs to.


Cameras (table with list of used cameras and their video settings). To add several entries
into the table, use button. To delete entry from the table, select required row and press
Ctrl + Delete keyboard shortcut.
Click this button to populate the Cameras table with all cameras avail-
Add All
able within security network.

ID ID of a Camera object.
(continued on next page)

www.isscctv.com
SecurOS 89 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Name of the camera object. You can use either ID or Camera to specify
Camera
target camera.
Optional: select a video concentrator to get this camera video feed from.
Video concentrator
If no concentrator is specified, video is taken directly from video server.
Optional: select the maximum frame rate of the video feed delivered to
Fps clients. The frame rate cannot exceed physical frame rate of the video
from the camera. If not specified, original frame rate is used.
Optional: select the compression type of the video that will be trans-
mitted to the clients (if the source and target compression levels differ,
Compression
video will be recompressed). If not specified, original compression is
used.
Optional: set the token string (unique ID) to activate titles as overlay
on video of this camera cell using script commands. That is if you want
to display titles from POS subsystem, use pos N as token string where
N is the ID of the POS Terminal object attributed to this camera, and
Token
use this value as a parameter for script commands of adding or deleting
titles.
Note: titles are displayed only when Display titles option is enabled
(see below)
Optional: if the source came is password-protected, you should specify
the password to be able to watch video from this camera. If a password
Password
does not match, in monitor you will see a green canvas instead of real
video.
(continued on next page)

www.isscctv.com
SecurOS 90 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Monitor type
Show all cameras This mode is enabled by default. Monitor displays a fixed list of cameras
from table above specified in the table.
Monitor mode. Possible values:

Normal default mode. All cameras are in live video mode, operator
may enter and leave archive mode by any camera. Operator may
enter and leave DVR mode. PTZ control panel is available if the
Show PTZ control option is activated;

Live only all cameras are in live mode. Operator is forbidden to


enter in archive mode. DVR button is absent;

Archive only all cameras are in archive mode. Operator is forbid-


den to leave archive mode. Operator may enter and leave DVR
mode. PTZ control panel is absent;

DVR only all cameras are in archive mode. Operator is forbidden


Mode to leave archive mode. Monitor in DVR mode. DVR button is
absent. PTZ control panel is absent;

DVR + MaskSearch the same as DVR only but only search for active
camera mask mode becomes accessible in Search DVR panel;

DVR + CameraSearch the same as DVR only but search for multiple
cameras mode becomes accessible in Search DVR panel;

LPR the same as DVR only but only one active camera is shown,
Search DVR panel is absent;

Map (2x vertical) mode for wide screen live video viewing, only
one active camera is shown, control panels and cameras block are
absent.

Check this option for the monitor to display control toolbar. Toolbar
options include switching between layouts, cameras, list cameras by
Show control toolbar
pages manually or automatically, view alarm log for target cameras,
etc.
Check this option to show PTZ control panel. The panel is active only
Show PTZ control for active PTZ camera displays in live mode. Otherwise PTZ control
panel is blocked.

Show camera list Check this option to show camera block in user interface.
(continued on next page)

www.isscctv.com
SecurOS 91 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Specify a delay in seconds between automatic switching of named layouts
Dwell time or page flipping on a monitor. Default value is 1. See SecurOS User
Guide for more information on that feature.
Check this option to automatically display on this monitor a set of
Show alarm cameras cameras that are currently in alarm state for the current Computer
only object. Set the values in Min and Max fields (see below) to limit the
minimum and the maximum number of displayed alarm cameras.
Set the minimum (1. . . 16) and maximum (1. . . 16) numbers of alarm
cameras displayed. Numbers will be rounded up to a higher value of
Min, Max either 1, 4, 9 or 16 in accordance with a layout selected for the monitor.
If there will be more than Max alarm cameras at the same time, only
the most recent cameras will be displayed.
Check this option to automatically displays each time on this monitor
only one currently active camera from another monitor for the same
Screen object. The table of cameras is used to define or override video
settings for some cameras to display. If the camera is not in the list, its
Show single active
default video settings will be used, and video feed will be taken directly
camera only
from video server.
Note: this additional (active) monitor is recommended to create for
more comfortable work with another monitor containing large number
of cameras.
(continued on next page)

www.isscctv.com
SecurOS 92 Administration Guide

Video Subsystem

(continued from previous page)

Option Description
Common options
Select hardware acceleration type for displaying video. Possible values:

No software rendering is used (warning: software rendering con-


sumes a lot of CPU resources; use hardware acceleration whenever
possible)

Overlay Type 1 or Overlay Type 2 use one of acceleration


modes. The differences between overlay types are typically in-
significant. Try to experiment with both types and see what mode
Hardware is supported by your video card, gives better picture quality and,
Acceleration possibly, lesser CPU usage. Note that if you have double-monitor
configuration, hardware acceleration using overlays is likely to be
supported on primary monitor only. Consult manufacturer manual
on your video card for more information.
Warning! If it is necessary to display titles on user moni-
tor make sure that the current video capture board supports
Overlay Type 2 and select the Overlay Type 2 value for this
object property.

Choose a priority for controlling PTZ devices from this monitor. Select
PTZ control priority
Deny to completely disable this feature for monitor.

Select Archive Converter object used to export video (see Archive Con-
Export Engine verter on page 84). Warning: it is not possible to export a video
sequence if this parameter is empty!
Select Archiver object used to write video in archive (see Archiver on
page 85). On selecting archive mode (see SecurOS User Guide for more
Archive Engine information) Long-time mode will become accessible.
Note: the monitor will play archive video from cameras that are defined
in Archiver object settings.

External monitor The field is not used in current version.


Check this option to display internal camera IDs along with names.
Show Camera IDs
Used primarily for script debugging purposes.
Enable or disable displaying of titles for all cameras on the monitor. If
Display titles you disable this option, titles will not be shown on all cameras, regard-
less of Token option value (see above).

www.isscctv.com
SecurOS 93 Administration Guide

Video Subsystem

Warning! To display correctly all interface elements in the monitor DVR mode, it is recom-
mended to set physical display resolution to no less than 1280 1024 and the W, H monitor
parameters to no less than 80.

Archive Converter Dialog


Used to manage the converting remote servers video to AVI format as well as to get information about
converting status).
Parent object: Screen on page 45.

Figure 54: Archive Converter Dialog object properties window

Table 27: Archive Converter Dialog object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.

Display ID of physical display this object belongs to.

Export engine Choose specified Archive converter object.

Archiver Dialog
Used to manage the archiving video as well as to write it on CD and get information (log) about
archiving status.

www.isscctv.com
SecurOS 94 Administration Guide

Video Subsystem

Parent object: Screen on page 45.

Figure 55: Archiver Dialog object properties window

Table 28: Archiver Dialog object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.
Archivers table (list of Archiver objects). To add several entries into the table, use button.
To delete entry from the table, select required row and press Ctrl + Delete keyboard shortcut.
Click this button to populate the Archivers table with all accessible
All
Archiver objects within security network.

ID ID of an Archiver object.
Name of an Archiver object. You can use either ID or Name to specify
Name
target camera.

Configuration Examples

Standalone Configuration
Original problem: a single computer with one TVISS1 (single-chip) video capture card and two CCTV
cameras connected to it. Computer should be used not only to capture and record video, but to monitor
cameras also (see figure 56).

www.isscctv.com
SecurOS 95 Administration Guide

Video Subsystem

Figure 56: Object tree for standalone configuration

Solution:

1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter:

Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).

2. Create Video Capture Device object (see Creating Objects on page 14).

3. Create Camera object with the following parameter:

Channel number set the actual number of the labeled BNC connector the first camera
is attached to.

4. Create Camera object with parameter:

Channel number set the actual number of the labeled BNC connector the second camera
is attached to.

5. Create Screen object.

6. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:

X 0.
Y 0.
W 100.
H 100.

7. Exit administration mode.

Now you will see a full-screen monitor with live video from two cameras.

www.isscctv.com
SecurOS 96 Administration Guide

Video Subsystem

Video Server + Operator Workstation


Original problem: a video server with one TVISS4 (4 chips) video capture card and two CCTV
cameras connected to it; each camera uses its own chip for better performance. One separate operator
workstation to monitor cameras (see figure 57).

Figure 57: Object tree for server-workstation configuration

Solution:

1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter.
Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).
2. Create Video Capture Device object (see Creating Objects on page 14).
3. Create Camera object with the following parameter:
Channel number set the actual number of the labeled BNC connector the first camera
is attached to.
4. Create second Video Capture Device object with the parameter:
PCI channel 01 (unique PCI channel number).
5. Create Camera object with parameter:
Channel number set the actual number of the labeled BNC connector the second camera
is attached to.
6. Create Computer object with ID equal to NetBIOS name of computer to be used as workstation,
and set the following parameter:
Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.

www.isscctv.com
SecurOS 97 Administration Guide

Video Subsystem

7. Create Screen object.

8. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:

X 0.
Y 0.
W 100.
H 100.

9. Launch SecurOS client on operator workstation and specify video server IP address (or
DNS/WINS name) when prompted.

When client has started, you will see on its display a full-screen monitor with live video from two
server-side cameras.

Video Server + Video Concentrator + Operator Workstation


Original problem: a video server with video capture card and one PTZ (dome) CCTV camera con-
nected to it. One video concentrator to gather video from server and store a copy of video archive.
One separate operator workstation to monitor camera video is streamed through concentrator (see
figure 58).

Figure 58: Object tree for server-concentrator-workstation configuration, PTZ device configuration

Solution:

1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter.

www.isscctv.com
SecurOS 98 Administration Guide

Video Subsystem

Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).

2. Create PTZ Controller object with the following parameters:

Protocol type set the protocols type for your camera.


Port set the serial port number the PTZ device is connected to (via RS232-to-RS485
converter, see SecurOS Installation Guide for more information).
Speed, Parity, DTS, RTS alter these settings if your RS232-to-RS485 converter or
PTZ device requires specific settings.

3. Create PTZ Device object with ID equal to identifier of PTZ device defined by DIP switches
(consult manufacturers manual for information on setting up your PTZ device).

4. Create Video Capture Device (see Creating Objects on page 14).

5. Create Camera object with the following parameter:

Channel number set the actual number of the labeled BNC connector the second camera
is attached to.
Pat/Tilt/Zoom select the PTZ Device 1 from the drop-down list.

6. Create Computer object with ID equal to NetBIOS name of computer to be used as video
concentrator, and set the following parameter:

Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.

7. Create Video Concentrator object. In its properties window click All button to assign all cameras
to this concentrator. Set the parameters:

Do recording on disks set Read/Write access for video for at least one hard disk (e. g.
for C:).

8. Create Computer object with ID equal to NetBIOS name of computer to be used as workstation,
and set the following parameter:

Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.

9. Create Screen object.

10. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:

X 0.
Y 0.
W 100.
H 100.

www.isscctv.com
SecurOS 99 Administration Guide

Video Subsystem

11. Launch SecurOS server application on both video server and video concentrator. Then launch
SecurOS client application on operator workstation and specify video server IP address (or
DNS/WINS name) when prompted.

When client has started, you will see on its display a full-screen monitor with live video from
camera.

Joystick Configuration
Joysticks can be used for PTZ video monitor control (see SecurOS User Guide). Configuration and
setting procedure for joystick has some hints.
To configure joystick:

1. Connect joystick to a computer of SecurOS network. The device will be detected automatically
or drivers should be installed.

2. Find the installed joystick in the devices list (Control Panel Game Controllers) and write
down its name exactly as in the list (for example, Joystick Name).

3. Copy default.xml file describing the joystick configuration in the folder


\Securos\Joy config into Joystick Name.xml in the same folder.

4. Click the Properties button in game controllers list, then Calibration tab in the appeared
window. Calibrate installed joystick buttons and control sticks.

Warning! Calibration procedure is absolutely necessary otherwise a joystick will not function
in SecurOS!

www.isscctv.com
SecurOS 100 Administration Guide

Audio Subsystem

Audio Subsystem
Audio subsystem is used to operate and configure the audio devices (audio capture cards, microphones)
within the security network, transmit audio streams between servers, concentrators and workstations
and work with live and archive audio from within workstations.

Objects Reference

System Objects
Audio Capture Device
Represents stereo audio input source of a physical audio board installed in the system, or audio capture
chip of a video capture device (TVISS1 or TVISS4).
Parent object: Computer on page 31.

Figure 59: Audio Capture Device object properties window

Table 29: Audio Capture Device object properties


Option Description
Select a stereo input source from the list of available on your computer.
Note that TVISS4-02 and KV2004 video capture cards have four stereo
Board
input channels, thus each card of this type is represented here as four
independent audio sources.
Select the sampling rate for this audio source. The higher the value,
the better sound quality you will achieve, but keep in mind that high
Samplerate
sampling rates result in more disk space consumed by audio archives
and more CPU usage on server.

www.isscctv.com
SecurOS 101 Administration Guide

Audio Subsystem

Microphone
Represents single mono channel. To record stereo signal, use two Microphone objects connected to
the same Audio Capture Device object and using two different channels (Left and Right).
Parent object: Audio Capture Device on page 100.

Figure 60: Microphone object properties window

Table 30: Microphone object properties


Option Description
Select a channel from list of available channels of parent Audio Capture
Device object. The same input channel can be shared between any
Channel
number of microphone objects. This is useful for recording audio in
several formats or to several locations simultaneously.
Compression codec. 16 Bit PCM no compression, best sound qual-
ity, stream rate is 128 Kbps at 8 KHz sampling rate; IMA ADPCM
average compression quality, good sound quality, stream rate is 32 Kbps
Compression
at 8 KHz sampling rate; GSM 6.10 best compression, average sound
quality (this codec is intended primarily to compress speech), stream
rate is 13 Kbps at 8 KHz sampling rate.

Type Reserved for future use. Always WAV.


Read-only indicator of current volume level. Used to test microphone
Level
on-the-fly.
Gain level (-12. . . 12 dB). Increase gain if your audio source is weak.
Gain
Use Level indicator above to visually control volume level.
(continued on next page)

www.isscctv.com
SecurOS 102 Administration Guide

Audio Subsystem

(continued from previous page)

Option Description
Voice Operated Control (feature of automatic sound recording upon reaching threshold volume;
this feature is disabled for microphones linked with video cameras for synchronous video + audio
recording; see Camera on page 67 for more information)
Threshold level (-60. . . 0 dB). When volume reaches this level, auto-
matic sound recording starts. Use Level indicator above to visually
Level
estimate current volume level. If set to Off, voice operated control
feature is disabled.
Minimum amount of recording, in seconds. Recording continues while
Delay volume is higher than threshold level but not less than the specified
amount in seconds.

User Interface Objects


Audio Player
This is an interface object used to listen to live and recorded audio from microphones.
Parent object: Screen on page 45.

Figure 61: Audio Player object properties window

www.isscctv.com
SecurOS 103 Administration Guide

Audio Subsystem

Table 31: Audio Player object properties


Option Description
Window top left corner coordinates (X, Y) as well as width and height
X, Y, W, H
(W, H), in percentage of display horizontal and vertical size.

Sound Card Select an audio output line to play audio files through.
Select target channel to play audio through. You can select either mono
or stereo output (stereo means pseudostereo: it just plays the same mono
Channel to play sound on both channels). You can choose the same audio channel for
several audio players, in this case system will mix all sounds together,
if you play audio on several players simultaneously.
Table of audio sources (defines a list of registered audio sources that should be available from
this audio player)

Source Link to a Microphone object.


Optional: select the compression with which audio will be delivered from
server to client. If compression differs from that on server, audio will
be recompressed on the fly. The operation of recompression takes CPU
resources, so use it with care. This option is useful if you want to store
audio archive with best quality possible (16 Bit PCM compression), but
Compression
want to listen to audio compressed with either IMA ADPCM or GSM 6.10
compression, thus reducing network load at the cost of some audio
quality loss. If you do not select the compression or set it to Default, live
audio will be transmitted with best quality (16 Bit PCM) and archived
audio will be transmitted in the original format it was saved with.
Click this button to populate the table with all microphones within
Add all
security network.

Clear all Click this button to clear the entire table.

www.isscctv.com
SecurOS 104 Administration Guide

I/O Subsystem

I/O Subsystem
I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays) and
controlling keyboards (see Keyboard on page 105) within the security network.

Note: General purpose I/O devices are connected to specialized TVISS8IO plates (see SecurOS Installa-
tion Guide).

Objects Reference

Sensor
The object represents a physical sensor device or a daisy chain of sensors (security loop).
Parent object: Video Capture Device on page 63.

Figure 62: Sensor object properties window

Table 32: Sensor object properties


Option Description
Channel number the sensor is connected to (see documentation on video
Channel
capture devices for more information on channel numbering).

Alarm condition
Alarm when switch
Trigger alarm state when contacts are short circuited.
on
Alarm when switch
Trigger alarm state when contacts are open.
off
(continued on next page)

www.isscctv.com
SecurOS 105 Administration Guide

I/O Subsystem

(continued from previous page)

Option Description
Select the most appropriate sensor type (this only changes devices icon
Hardware
on map, but not its behavior).

Relay
The object represents a physical executive unit (e. g. relay) that controls any device.
Parent object: Video Capture Device on page 63.

Figure 63: Relay object properties window

Table 33: Relay object properties


Option Description
Channel number the sensor is connected to (see documentation on video
Channel
capture devices for more information on channel numbering).
Select the most appropriate device type controlled by this relay (this
Hardware
only changes devices icon on map, but not its behavior).

Keyboard
Object represents a specialized keyboard for operator mode system control. Up to 10 keyboards with
programmed command set can be connected to the system.
When creating Keyboard object, define which keys are responsible for each system object. To do this,
use special configuration file keyb N.ini supplied with keyboard, where N is an identifier of created
Keyboard object. That file should be placed in SecurOS root folder. One may change this file on ones
discretion to program keys different assignment.
Parent object: Computer on page 31.

www.isscctv.com
SecurOS 106 Administration Guide

I/O Subsystem

Figure 64: Keyboard object properties window

Table 34: Keyboard object properties


Option Description
Window top left corner coordinates (X, Y, relative to top left monitor
Output window
corner), width and height (W, H) in percentage of display size.
Enable this option to control every interface object from this keyboard,
Operate all
in accordance with ini-file settings.
Enable this option to control only system objects listed in the table
below. Fill in table by object list. To add several entries into the table,
From list
use button. To delete entry from the table, select required row and
press Ctrl + Delete keyboard shortcut.

For this object hardware setting it is necessary to open


HKEY LOCAL MACHINE\\SOFTWARE\\ISS\\Niss400\\Keyb chain of Windows registry and cre-
ate Prefix string character with 192 value.

www.isscctv.com
SecurOS 107 Administration Guide

Notification Subsystem

Notification Subsystem
Notification subsystem allows to inform personnel of events within security network by the means of
e-mail, voice phone calls, SMS messaging and audible notifications.

Objects Reference

E-mail Message Service


This object represents an SMTP service which will be used to send E-mail notifications.
Parent object: Computer on page 31.

Figure 65: E-mail Message Service object properties window

Table 35: E-mail Message Service object properties


Option Description
IP address or DNS/WINS name of SMTP server. You can either use
SMTP Server
local or external SMTP servers.

Port SMTP server port. Default value is 25.


SMTP Server requires
Select this check box if your SMTP server requires authentication.
authentication

Login, Password Specify login and password for SMTP authentication.

www.isscctv.com
SecurOS 108 Administration Guide

Notification Subsystem

E-mail Message
Represents an individual e-mail message (or a message template).
Parent object: E-mail Message Service on page 107.

Figure 66: E-mail Message object properties window

Table 36: E-mail Message object properties


Option Description
E-mail address of a recipient. You can specify several ad-
To dresses separated by semicolon (e. g.: admin@domain.com;
security@domain.com).

E-mail address of a sender. You can specify several addresses separated


From
by semicolon.
E-mail address to which you want to send copy of the message. You
CC
can specify several addresses separated by semicolon.
Subject of the message. You can specify variable parameters here in
#param name# format. The real parameter are substituted automatically
Subject
when message is sent. Parameters are useful when sending e-mail
messages from scripts.

Message field Message body. You can specify variable parameters here.
You can specify one or more files that should be attached to the message.
You can browse for single file using [...] button. If you need to specify
Attachment
more than one file, type their names manually, separating them by
semicolons (e. g. c:\temp\image.jpg; c:\temp\log.txt).
(continued on next page)

www.isscctv.com
SecurOS 109 Administration Guide

Notification Subsystem

(continued from previous page)

Option Description
You can optionally pack all the specified attachments into single archive
Pack file. Select an archiver that will be used for compressing files, or leave
this field blank to send attachments as uncompressed files.

Short Message Service


Represents a mobile phone or other similar device connected to computer via serial (COM) port. This
device will be used to send SMS messages.
Parent object: Computer on page 31.

Figure 67: Short Message Service object properties window

Table 37: Short Message Service object properties


Option Description
Select device from the list. Click Refresh button to rescan serial ports
Device
for available devices and update the list.

Short Message
Represents an individual SMS message.
Parent object: Short Message Service on page 109.

Figure 68: Short Message object properties window

www.isscctv.com
SecurOS 110 Administration Guide

Notification Subsystem

Table 38: Short Message object properties


Option Description
Number of target mobile phone to send message to. Use international
Phone phone format: +, country code, city code, local phone number. Maxi-
mum phone length is 30 symbols (e. g. +74951234567).
Message body. You can enter up to 255 symbols. Use ASCII (latin)
Message
characters only!

Voice Message Service


This object represents a voice-modem installed or connected to computer, which can be used to make
automatic phone calls and play a predefined message (audio file) to the phone line.

Note: You should properly install voice-modem drivers (both base modem drivers and audio drivers) for
this feature to work properly.
Due to technical reasons, modem device name in Windows should not contain @ symbols.

Parent object: Computer on page 31.

Figure 69: Voice Message Service object properties window

Table 39: Voice Message Service object properties


Option Description
Select modem from the list. Click Refresh button to rescan computer
Modem
for available devices and update the list.
(continued on next page)

www.isscctv.com
SecurOS 111 Administration Guide

Notification Subsystem

(continued from previous page)

Option Description
If enabled, modem uses pulse dialing mode by default. If disabled,
a tone dialing mode (using DTMF tones) is used by default. You can
Pulse
later override the default pulse/tone dialing mode using special symbols
in phone number for individual Voice Message objects.

Redial attempts The number of redial attempts, if the target phone is busy.
Time between redial
Set the time between redial attempts, in seconds.
attempts
If this option is enabled, modem will wait for a dialtone before dialing
Wait for dialtone
number.

Voice Message
Represents single voice message.
Parent object: Voice Message Service on page 110.

Figure 70: Voice Message object properties window

www.isscctv.com
SecurOS 112 Administration Guide

Notification Subsystem

Table 40: Voice Message object properties


Option Description
Phone number. Use local phone number format. You can use the follow-
ing symbols: 0. . . 9, comma, W, P, T. Comma symbol represents a pause
(typically it is a 2 seconds, but can be altered in modem settings; to
make longer pause, use several commas in a row), W is used to wait for
a dialtone after dialing a part of a phone number (used for international
Phone calls or other calls outside the local area), P switches to pulse dialing
mode and T switches to tone dialing mode. Examples: 1234567 dial
the specified local number; 1234567,,T123 dial the specified local
number, wait for some tome, then dial 123 extension number in tone
mode; 8W123,1234567 dial 8, then wait for a dialtone, then dial 123,
wait for some time, then dial the rest of a number.
Choose sound file to play to the line. Use [...] button to browse for the
file. Modem uses 8 bit 8 KHz Mono PCM wave file format for playback
purposes. We recommend you to prepare wave files in this format
Wave File
to avoid audio recompression on modem side and possible problems
connected with this recompression (for example, file formats other than
PCM or ADPCM may not be understood by modem at all).
To be sure that remote part answers the call and listens to the phone,
you can enable volume-based answer detection: when a call is made, the
volume will be constantly compared with the threshold value; if a person
says hello (or whatever) loudly enough, this will be the signal to start
Sense
playback of the sound file to the line. Sensitivity ranges from 1 (lowest
sensitivity, high volume threshold) to 10 (highest sensitivity, low volume
threshold). If you set this value to 0 or leave the field empty, detection
will be disabled.
The delay between a successful detection of an answer and the actual
start of the playback, in ms. The maximum value is 10000 (10 seconds).
Skip (ms) If answer detection is disabled, this parameter means a delay between
the end of number dialing and the beginning of a playback; in this case
the playback will start even if no one takes the phone on remote side.
Optional: type a numeric confirmation code that remote person should
type on his phone keyboard in tonal (DTMF) mode to listen to this voice
Confirm
message. If not specified, the voice message will be played to anyone
without any confirmation. Valid symbols are: 0. . . 9, *, #.

Audible Notification Service


This object represents a sound card that should be used to playback event-specific sounds. The
correspondence between individual sounds and object events can be viewed and altered via DDI

www.isscctv.com
SecurOS 113 Administration Guide

Notification Subsystem

Utility (see ISS Object Types Database Editor on page 132). All sounds should be placed to \wav
subdirectory of SecurOS program folder.
Parent object: Computer on page 31.

Figure 71: Audible Notification Service object properties window

Table 41: Audible Notification Service object properties


Option Description

Sound card Select an audio output line to play audio files through.
Set output sound channels (left, right, or both). Use NONE value to
Channel
temporarily disable audible notifications.

www.isscctv.com
SecurOS 114 Administration Guide

Automation Subsystem

Automation Subsystem
Automation subsystem provides means to interconnect reactions on events within security network,
thus building custom logic within entire security network.

Working Principles

Macros
Macros are used to define the links between the events and system actions. Every system object has
its own set of events, and you can use visual tools to select the system reactions for them. These
definitions are stored as a special system object called Macro.
Macros are a special group of system objects called virtual objects. When you create the first Macro,
a new Macros group is added to the objects tree. All macros you create are located in this group of
SecurOS system objects (see SecurOS Programming Guide for more information).

Scripting
SecurOS provides the scripting language that can be used to describe and program complex scenarios.
In these scenarios, you can define the system behavior for some specific cases or just set the SecurOS
system reactions to the events triggered by SecurOS objects. You can use scripting tools for any
physical or virtual system object, for example, camera, screen or reader as well as Screen or Macro.
The process of creating the scripts is described in the SecurOS Programming Guide.

Integration with External Systems


The SecurOS provides the possibility to exchange data with the external computers. This data
exchange is implemented by means of IIDK (ISS Integration Development Kit), a special protocol sup-
ported by SecurOS(for detailed information about IIDK see IIDK Manual). Using this data exchange
protocol, an external computer can be connected to the SecurOS to transmit events to the security
network and control the SecurOS objects.

Objects Reference

Macro
Used to define SecurOS system behavior by linking source objects events to target objects actions.
Parent object: Security Zone on page 20.

www.isscctv.com
SecurOS 115 Administration Guide

Automation Subsystem

Figure 72: Macro object properties window

Table 42: Macro object properties


Option Description
Prevents the macro from being executed on any other computer located
Local on the same network (clearing this check box will execute the macro on
all of the computers on the same network).
By default, all macros can be executed manually from Actions menu
on SecurOS software control panel on application servers, administrator
Hidden workstations or operator workstations which belong to the same security
zone as Macro object itself. Selecting this check box will hide the macro
from this menu on all computers of security network.
Event (table of source events that trigger macro execution, all events are equal in rights and
any single event can trigger the macro). To add several entries into the table, use button. To
delete entry from the table, select required row and press Ctrl + Delete keyboard shortcut.

Type Source object type.


Source object ID. You can omit ID to refer to any objects of the specified
ID
type within security network.
Title of the object (read-only; appears automatically after you select
Title
object type and specific ID).
Source object event. The list of events depends on the type of the object.
Event
Omit this field to refer to any events of this object type.
Actions (table of target objects and actions to perform on them on macro execution, actions are
executed in the order they appear in table). To add several entries into the table, use button.
To delete entry from the table, select required row and press Ctrl + Delete keyboard shortcut.

Type Target object type.


(continued on next page)

www.isscctv.com
SecurOS 116 Administration Guide

Automation Subsystem

(continued from previous page)

Option Description
Target object ID. You can omit ID to refer to any objects of the specified
ID
type within security network.
Title of the object (read-only; appears automatically after you select
Title
object type and specific ID).
Action to perform on object. The list of actions depends on the type of
Action
the object.

Program
Used to define programs (scripts) to program SecurOS behavior in custom way. See SecurOS Pro-
gramming Guide for information on creating scripts.
Parent object: Security Zone on page 20.

Figure 73: Program object properties window

www.isscctv.com
SecurOS 117 Administration Guide

Automation Subsystem

Table 43: Program object properties


Option Description
Select Never (never operate) or Always (always operate) to specify the
time when this script is active. Note that by default this parameter
Time Zone
is set to Never and newly created script is inactive unless you specify
different time zone.
Click this button to open a dialog, where you can setup, on what par-
ticular computers of the parent security zone this script will run on.
Run on The procedure is similar to setting object visibilities (see Setting Up
Security Zone Visibilities on page 22). By default, the script is executed
simultaneously on all servers of security zone.

Script text area Text area which contains script body itself.

IIDK Interface
This is a service for external connection to SecurOS via IIDK protocol. Create this object on one or
more computers that will act as IIDK servers. See SecurOS Programming Guide for more information.
Parent object: Computer on page 31.
Object has no properties to alter.

www.isscctv.com
SecurOS 118 Administration Guide

Appendix A: Frequently Asked Questions

Appendix A: Frequently Asked


Questions
I have installed my TVISS1/TVISS4/etc. PCI expansion card (cards), but my computer does not
boot up. What can I do?

Check that the mainboard is in the list of supported hardware. See for a list of tested main-
boards.

Remove the power supply cord from the system unit, remove all newly installed PCI expansion
cards, reconnect the power supply and try to boot your computer once again. If it boots correctly,
proceed to next step. Otherwise, contact your system installer for further assistance.

Remove the power supply cord from the system unit, install just one (any) expansion card,
reconnect your power supply and turn the computer on. If the computer boots up correctly,
repeat this step for each card you should install. Otherwise, proceed to next step.

Try to re-install the problematic card to any other spare PCI slot. If the card works at the new
location, the problem might be either there is bad contact for that PCI slot (physical defects,
bending, etc.) or some other defects with mainboard. We recommend you to vacuum clean the
PCI slot, install the card gently and try to boot up again. If the problem persists, contact your
system installer.

When I start SecurOS setup, an information dialog Another copy of SecurOS is installed on this
computer. . . appears. What does it mean?

This means that SecurOS is already installed on this computer, or that the previous version has not
been uninstalled properly. Please consult section for more information on upgrading SecurOS.

I cannot find key.iss file on provided installation CD / Ive lost my original installation CD. Where
can I obtain this file?

Please contact your system installer or Technical Support Team. See for contact information.

When I start SecurOS, it halts with error message. What should I do?

See the table of possible errors on system startup.

www.isscctv.com
SecurOS 119 Administration Guide

Appendix A: Frequently Asked Questions

Table 44: Possible error messages on system startup


Message Error description
If the PostgreSQL database is used:

Check the database connection parameters correct-


ness using DSAdmin Utility (see DSAdmin Utility
on page 130)

Check the database connection using PostgreSQL util-


ity PgAdmin III

Make sure the Windows service PostgreSQL8 exists


and is running

Reinstall SecurOS. Pay special attention to Post-


greSQL installation procedure steps

If these recommendations do not eliminate the prob-


DB Connection Error lem, please contact Technical Support Team. Attach
the system information obtained from ISS System
Report Utility (see ISS System Report Utility on
page 122).

If the Microsoft Access database is used:

Check if the file called \data\niss.mdb exists in Se-


curOS program directory. If there is no such file,
reinstall SecurOS, otherwise proceed to the next step.

Check if niss.mdb file is not corrupted: try to open


niss.mdb in Microsoft Access. If it is not opened, re-
install SecurOS, otherwise contact Technical Support
Team, providing the niss.mdb file for examination.

Check that there is a file called key.iss in SecurOS pro-


gram folder. If there is no such a file, you should copy it
Key file not found
manually from SecurOS installation CD or, if you received
it by e-mail, extract it from there.
Unexpected program error has occurred during system
startup. Generate system report using ISS System Report
Starting failed Utility (see ISS System Report Utility on page 122 for more
information) and contact Technical Support Team, providing
this report (see ).
Your key.iss file has expired. Contact Technical Support
Key file expired
Team for a new key (see ).
(continued on next page)

www.isscctv.com
SecurOS 120 Administration Guide

Appendix A: Frequently Asked Questions

(continued from previous page)

Message Error description


During the SecurOS installation you specified interface lan-
guage that is not allowed in your license key. You should ei-
Languages not supported ther re-install SecurOS software on this machine and choose
valid interface language in Setup Wizard, or provide new
key.iss file that permits using this language.

Country settings Start Control Panel Regional and


Language Options differ from those allowed in your license
Country not supported key. Check these settings to see if country is specified
properly or provide new key.iss file that permits using
current country settings.
Hardware identifiers of TVISSx video capture cards installed
in your computer do not match the list in your key.iss file.
Key file does not correspond to Launch ISS Hardware Report Utility (see ) to generate the
cards report about TVISSx and Guardant devices found on your
computer and send this report to Technical Support Team to
obtain valid key.iss file (see ).

Computer cannot connect to the guide server. How can I solve the problem?

Try to use IP address instead of DNS/WINS name.

Try to ping the specified IP address from current computer using ping utility. See for more
information. If the ping does not work, check firewall settings on both guide server and your
computer and open required TCP/IP ports, listed in .

Try to make the reverse ping of your computer from the guide server using ping utility. If the
ping does not work, check network and firewall settings again.

Check the computers real IP address using ipconfig utility (see ) and see if it is registered
properly on the guide server. Note that if your computer has dynamic IP address, you should
register its DNS name, not IP address, within SecurOS network.

www.isscctv.com
SecurOS 121 Administration Guide

Appendix B: System Utilities

Appendix B: System Utilities


SecurOS software comes with several helper utilities. You can find them in \Tools subfolder of
SecurOS installation folder or in SecurOS installation folder itself:

ISS Hardware Report Utility (HardwareReportUtility.exe). Reports all installed TVISSx


video capture cards and Guardant keys (see ISS Hardware Report Utility on page 121).

ISS System Report Utility (ISSInfo.exe). Collects system information required by ISS
Technical Support (see ISS System Report Utility on page 122).

ISS Media Export Utility (Backup.exe). Plays archived video/audio, exports selected parts
of archive to AVI, WAV and BMP files (see ISS Media Export Utility on page 123).

ISS Video Archive Conversion Utility (Convert.exe). Converts archives from old format,
performs indexing and integrity checking on archives (see ISS Video Archive Conversion Utility
on page 127).

ISS Startup Configuration Utility (RegService.exe). Configures SecurOS to run as Win-


dows service or as a normal application (see ISS Startup Configuration Utility on page 128).

DSAdmin Utility (dsadmin.exe). Defines databases for registering data, protocol and video
(see DSAdmin Utility on page 130).

ISS Database Update Utility (idb.exe). Defines access to database: to update and configure
(see ISS Database Update Utility on page 131).

ISS Object Types Database Editor (DDI.exe). Editor for SecurOS object types database (not
the actual database itself) (see ISS Object Types Database Editor on page 132).

ISS Hardware Report Utility


Location:
<SecurOS folder>/Tools/HardwareReportUtility.exe
Start menu:
Start Programs SecurOS Hardware Report Utility
This utility is used to detect all installed TVISSx video capture cards and Guardant keys (see figure
74). The report is used to generate license key file key.iss by ISS Technical Support Team. This
utility can be used to check the correct installation of the above hardware devices and associated
drivers: if hardware identifier is missing, this means that drivers were not installed properly.

www.isscctv.com
SecurOS 122 Administration Guide

Appendix B: System Utilities

Figure 74: ISS Hardware Report Utility

ISS System Report Utility


Location:
<SecurOS folder>\Tools\ISSInfo.exe

Figure 75: ISS System Report Utility

This utility is intended for gathering technical information about SecurOS installation and your com-
puter (see figure 75). This information is necessary to resolve problems and will always be requested

www.isscctv.com
SecurOS 123 Administration Guide

Appendix B: System Utilities

by the Technical Support Team. ISS System Report Utility collects the following data: all version
of *.exe, *.dll and *.log files in SecurOS folder, key.iss, niss.mdb, video.cfg files, *.nis,
*.dlg, *.dbi and *.ddi files, SecurOS registry keys and generic computer system information.

Note: ISS System Report Utility does not collect any private information.

To start the process, click Go button.


The \ISSInfo subfolder with gathered data will be created in the \Tools directory. The contents of
this directory will be packed into single archive file and will be placed into the specified directory.
You can alter the output directory before running the process of data gathering by pressing Select
button and choosing the target directory and the archive file name.

ISS Media Export Utility


Location:
<SecurOS folder>\Backup.exe
Start menu:
Start Programs SecurOS Media Export Utility

Figure 76: ISS Media Export Utility

www.isscctv.com
SecurOS 124 Administration Guide

Appendix B: System Utilities

This utility (see figure 76) is used to export video archives to AVI, ASF and BMP files to view on
any computer without the SecurOS has to be installed.
To export video :

1. Specify ID of Camera object.

2. Define the Start time and Stop time items for archive search.

3. Optionally, define password for video archive in Export Settings dialog (see figure 77) (click
Settings button to open dialog). You will be asked for a password if current password is not
suitable for selected camera.

4. Click Rescan archive button to scan for media that fits given object and time range. If the
archive is password-protected and the password from Export Settings dialog is not set or not
valid, you will be asked for password.

5. Use slider or Rewind / Forward buttons to navigate through the selected time range. Use
Play / Stop buttons to start and stop playback.

6. If needed, change your selection by repeating steps 15.

7. Define export settings (video/audio codecs, output directory, etc.) in Export Settings dialog,
make sure you specify valid password for video archive if video is password-protected.

8. Click Export button to start the procedure. The process may take several minutes depending
on the length of the video and export settings.

9. While exporting is in progress, you can click Stop button to stop export at this point. The part
that has already been exported will be saved as AVI.

Note: While playing or navigating through archive click Save frame to BMP button to export single
video frame in BMP format. Files will be saved to the directory defined in Export Settings dialog.

www.isscctv.com
SecurOS 125 Administration Guide

Appendix B: System Utilities

Export Settings dialog

Figure 77: ISS Export Settings Dialog

Table 45: Export Settings dialog


Option Description
Common
Path to a directory where output files will be saved. Type it
Target folder manually or use the button on the right to open Choose folder
dialog.
Use this option to split large output files to several smaller ones
Max. file size, MB with the specified size in megabytes. Default value is 650MB.
This is useful when preparing files for saving to CD-R/RW disks.

File type Select option corresponded to output file format (AVI or ASF).
If your video archive is password-protected, set the valid
Password
password here before exporting video.
Codecs
required video codec from a list of available codecs. Consult the
Video codec manufacturers documentation on video codecs for detailed
information on their characteristics.
(continued on next page)

www.isscctv.com
SecurOS 126 Administration Guide

Appendix B: System Utilities

(continued from previous page)

Option Description
required audio codec from a list of available codecs. Consult the
Audio codec manufacturers documentation on audio codecs for detailed
information on their characteristics.

Command-line parameters
You can use ISS Media Export Utility from command-line and from batch files to automate the
exporting process. When executed from command line, currently defined export settings will be used.
To change these settings, open ISS Media Export Utility in normal (windowed) mode, setup export
parameters, then close utility.

Note: Before starting the converter from the command line you should select a video codec that will be
used for the file converting. To do this, enter into the graphical interface and select the required codec
on the setup panel.

www.isscctv.com
SecurOS 127 Administration Guide

Appendix B: System Utilities

ISS Media Export Utility command-line syntax:


backup --out <out file> --cam <camera number> --from
<start date time>"
--to " <end date time>" --span <span size> --silent

--out <out file> resulting file name. Example: out.avi for video and out.wav for audio

--cam <camera number> camera number video archive of which are converted

--span <span size> span to fragments up to Mb [set a value or type in dvd on using
DVD disk (4.7 GB); cd on using CD disk (650 MB)

--from <start date time> start date/time of the archive to export. Example:
19-02-05 00:00:00

--to <end date time> end date/time of the archive to export. Example:
20-02-05 23:59:59

Example 1:
backup --cam 1 --from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span 2
Description: export video archive by camera 1 for the defined period spanning to fragments up to
2 Mb.
Example 2:
backup --out "c:\custom path\pwnage.avi"
--from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span cd
Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).

Note: Camera number and another settings are taken from the utility configuration.

ISS Video Archive Conversion Utility


Location:
<SecurOS folder>\Tools\convert.exe
This console program registers, indexes and checks for integrity video archive files. It also converts
video from old format (3.9.x) to the newer one. Use this utility when you move video archive files
from one server to another, or when upgrading SecurOS software from elder versions.

Note: When migrating video archives from one server to another, place files to the \Video folder on
any local hard drive (i. e. C:\Video, D:\Video), otherwise you will need to specify their location
explicitly with /DIR: command-line switch (see below).

www.isscctv.com
SecurOS 128 Administration Guide

Appendix B: System Utilities

If you start utility with /? parameter, you will get the help on syntax and available switches.

Listing 1: ISS Video Archive Conversion Utility Output


Converting Video Database to vX.XX
Video Database Converter
Syntax: CONVERT [/H[ELP]|?] [/V:Volumes] [/DIR:Dir] [/NC]
[/VER[:Channels]] [/CI] [/FI] [/VERBOSE]
where: /H - Display brief usage message
/V:Volumes - Specify set of volumes separated by comma
/NC - Do not perform conversion
/DIR - Specify directory for conversion
/VER - Perform verification of archive. If channels (separated
by comma) were not specified all channels are checked
/CI - Enable checking of existing index files
/FI - Use only existing index files for initialization
/VERBOSE - Verbose mode

ISS Startup Configuration Utility


Location:
<SecurOS folder>\Tools\RegService.exe

Figure 78: ISS Startup Configuration Utility

This utility configures SecurOS to run as Windows service or as a normal Win32 application (see
figure 78). If you choose Run as service, SecurOS will start automatically at operating system
startup.

www.isscctv.com
SecurOS 129 Administration Guide

Appendix B: System Utilities

To properly configure SecurOS as a Windows service, it is recommended to use SecurOS Control


Service utility that itself runs SecurOS as service.
Location:
<SecurOS folder>\securos svc.exe
Help information on syntax and utility keys is displayed on running this utility from command line
with -h parameter.
SecurOS Control Service Utility Syntax:
securos svc -h -i n -r -s -k -t n -u s -p s -l s -d

-h gives utility keys with description


-i n register SecurOS as a Windows service. Specify service running type n (1 disable,
2 automatic, 3 manual)

-r delete SecurOS from Windows services list


-s run the service
-k stop the service
-t specify service running type of already registered service (1 disable, 2 automatic, 3
manual)
-u s specify user name s for service run
-p s specify user password s for service run
-l s specify names of dependent services
-d enable verbose mode

It is recommended to register automatic start of SecurOS service for correct work of SecurOS and to
set dependency on PostgreSQL service:
securos svc.exe -i 2 -l "pgsql-8.2"
It is necessary to check real name of PostgreSQL service on your computer (the above example uses
pgsql-8.2).
To find PostgreSQL service name:

1. Open Windows Control Panel (Start Settings Control Panel).


2. Choose Administrative Tools, then Services.
3. Locate PostgreSQL8 service in the services list and choose Properties. Service name is
specified in Service name field.

After such registration, upon starting of SecurOS service it will wait until PostgreSQL service starts.

Note: It is recommended to use automatic Windows logon in case when SecurOS is configured as
Windows service.

www.isscctv.com
SecurOS 130 Administration Guide

Appendix B: System Utilities

DSAdmin Utility
Location:
<SecurOS folder>\dsadmin.exe
This utility defines connection strings to databases for data, system protocol and video.

Note: All strings are defined on installation process.

Figure 79: DSAdmin Utility

There are four fixed fields to set connection strings:

Basic Data string to connect to general database of all systems events and commands.

Protocol string to connect to protocol database.

Synchro Source string to connect to database of synchronization (optional).

Videoi string to connect to database for video.

To enable a connection string, activate it by clicking its checkbox.

Note: There are an additional field New feature to set a new database. One may set it if is needed.

To change a connection string, click its Build button. To test a connection, Test button.
On Build button click Data Link Properties window will appear. This window will help to build the
connection string:

Provider tab: select PostgreSQL OLE DB Provider from the list.

www.isscctv.com
SecurOS 131 Administration Guide

Appendix B: System Utilities

Connection tab:

Type in servers name or address in Data Source field (e. g., 127.0.0.1, localhost).
Type in database name in Location field (e. g., securos db).
Type in database account in User Name and Password fields.

To apply changes in connection strings, click OK button. The changes will be applied and the utility
window will be closed.

ISS Database Update Utility


Location:
<SecurOS folder>\idb.exe
This utility allows to configure and update SecurOS database.

Figure 80: ISS Database Update Utility

Table 46: ISS Database Update Utility parameters


Parameter Description
String to connect to database. Type in manually according to
Database Connection
mask or click Select DB button to build it automatically (see
String
below).
Path to SecurOS database. Type in manually or click Select
Database description path
button to choose the corresponding file from .
(continued on next page)

www.isscctv.com
SecurOS 132 Administration Guide

Appendix B: System Utilities

(continued from previous page)

Parameter Description

Button Update Database Start update process.

On Select DB button click Data Link Properties window will appear. See DSAdmin Utility on
page 130 for more information.

ISS Object Types Database Editor


Location:
<SecurOS folder>\Tools\DDI.exe
This utility allows viewing and editing database of SecurOS object types (not the actual database
itself). You can use this utility primarily to view or alter file names for sound notifications (see
figure 81).
There are the following tabs:

Names displays the selected object name and its group name. Also may be used to search for
object by its name or type.

Note: To search object automatically type in a full or a part of its type or name and choose the required
from the list below.

Events contains the selected object events and its properties: events description, window type,
sound support, net blocking and log.
Reacts contains the selected object commands and its properties: commands description and
flags.
Markers contains a list of the selected object markers.
States contains a list of the selected object possible states and its properties: image file name,
description, enabling blinking.
State rules displays rules of changing states.

To edit an object type:

1. Select an object type from the tree manually (e. g. for Camera object select CAM) or use
Search by name field to find the required one automatically.
2. Click on the required tab.
3. Double-click non-empty line to edit one. New window will appear.
4. Type in a new features and click OK button to save changes or Cancel to exit.

www.isscctv.com
SecurOS 133 Administration Guide

Appendix B: System Utilities

Figure 81: ISS Object Types Database Editor

www.isscctv.com
SecurOS 134 Administration Guide

Appendix C: TCP/IP Ports Used by SecurOS

Appendix C: TCP/IP Ports Used by


SecurOS
SecurOS and its modules use a list of TCP/IP ports for interaction. You should check your firewall
settings and open the following ports in both directions for SecurOS executable files *.exe located in
SecurOS program directory.

Table 47: TCP/IP Ports


Service Port numbers
Core
21111 (this port must be opened prior to installing
Core interconnection
SecurOS)
Core services

Graphical map 21051

System event log 21055

Programmable keyboard 21005

IIDK interface 21030


Video subsystem
Video monitor, video concentrator, video cap-
21050
ture, video cameras

PTZ device 21010

Live video stream 20900

Video concentrator stream 20902


Audio subsystem

Microphone 21004

Audio stream 20910

Audio player 21060


Alarm, fire alarm subsystems

Sensor, Relay 21003


(continued on next page)

www.isscctv.com
SecurOS 135 Administration Guide

Appendix C: TCP/IP Ports Used by SecurOS

(continued from previous page)

Service Port numbers


Notification subsystem

Short Message Service 22092

Mail Message Service 22093

Voice Message Service 22094


Access Control subsystem

Access control service 21057


LPR module

Detector camera 21033

Detector engine 21081

Operator UI 21062 (21091)

External database interconnection 22100


Transit module

Server (Pro) 22120

Server (Light) 21121

Detector camera 21122


Face recognition module

Engine 21080

Face data stream 20920

Operator IU 21061
Activity analyzer module

Engine 22110

Engine (Pro) 22111


POS module

POS Terminal 21012

Fraud detection engine 21041


(continued on next page)

www.isscctv.com
SecurOS 136 Administration Guide

Appendix C: TCP/IP Ports Used by SecurOS

(continued from previous page)

Service Port numbers


Third-party integration subsystems

Vista 21015

Rubezh 21002

Flex 21043

Apollo 21014

Bolid 21025

www.isscctv.com
SecurOS 137 Administration Guide

Index

Index
Symbols archive converting, 63
Hot phase duration property, 71 temporary files, 63, 84
Hot phase frame rate property, 71 Archive Engine property, 92
Hot recording mode property, 71 archive recording, 62
free disk space, 62
Archiver object, 63, 92, 94
A
Area threshold property, 78
access, configure, 31
Area Zone object, 36
access, control, 31
Area object, 31, 57
access, full, 31
Armed always property, 74
access, inherited rights, 31
Attachment property, 108
access, no, 30
audio, 100
access, view, 31
Audio Capture Device object, 13, 101
Acquisition Rate / Compressed property, 66
Audio Player object, 13, 31
Acquisition Rate / Raw property, 66
Audio property, 34
Action property, 116
Auto Log Backup property, 33
Activate screen on startup property, 33
Auto Log Load property, 33
Activate watchdog property, 67
Auto switching property, 46
Active Directory storage object, 30, 40
Auto-adjust property, 72
Add All property, 88
Automatic Gain Control property, 72
Add all property, 103
automation, macros, 114
Additional information property, 27
automation, program, 116
administration mode, 11
automation, scripting, 114
Adobe Reader, 6
Alarm when switch off property, 104
Alarm when switch on property, 104
B
Alarming property, 74
Blackened property, 74
All property, 80, 85, 86, 94
Block system shutdown in NT service mode prop-
Allow configure system property, 30 erty, 33
Archive Converter object, 63, 92 Board property, 100
Archive converter object, 93 Brightness property, 72

www.isscctv.com
SecurOS 138 Administration Guide

Index

C Confirm property, 112


camera, imaging control, 61 Connection, User, Password property, 33
Camera object, 12, 13, 42, 61, 62, 66, 67, 73, 77, Contrast threshold property, 78
80, 83, 85, 87, 88, 95, 96, 98, 124, 132
Contrast property, 70, 72, 75
Camera property, 89
Control PTZ priority property, 30
Capture settings property, 67
CC property, 108 D
CD/DVD property, 86 Days property, 57
Center on screen property, 59 DDI Utility, 113
Change Superuser Password property, 20 Deinterlacing property, 72
Channel number property, 68 Delay frames property, 78
Channel to play property, 103 Delay property, 102
Channel property, 101, 104, 105, 113 Department object, 31, 39
Clear All property, 35 detected object size, 79
Clear all property, 103 settings, 79
Codec Profile property, 69, 81 Device property, 109
Codec property, 84 disable interface hiding, 22
Color property, 72 Disable Local Protocol property, 33
Comments property, 37 Disable system shutdown for user property, 30
Compressed Resolution property, 66 Display titles property, 92
Compression property, 69 Display property, 50, 88, 93
Compression property, 81, 89, 101, 103 Drive property, 34, 81
Computer object, 12, 13, 23, 25, 31, 42, 45, 91, DSAdmin Utility, 119, 121
9598 Dwell time property, 91
configuration
examples, 94 E
server-concentrator-workstation configura- e-mail, 107
tion, 97 E-mail property, 27
standalone, 94 Enable property, 57
video server-workstation configuration, 96 Event database length property, 22
configuration examples Event redirection property, 22
domain for LDAP provider, 40 Event Viewer object, 13
domain for Windows NT provider, 40 event, redirection, 24
user rights, 40, 41 event, source, 25
Configuration property, 20 Event property, 38, 57, 115

www.isscctv.com
SecurOS 139 Administration Guide

Index

Events property, 60 Id, name property, 38


export ID property, 26, 56, 80, 87, 88, 94, 115, 116
video, 124 Id property, 84, 85
Export Engine property, 92 Inner zone property, 76
Export engine property, 93 installation, 121
External monitor property, 92 integration with external systems, 114
interface, 42
F
interface language, 120
Facility code property, 22
IP address property, 66
Fetch property, 86
IP camera, 9
File type property, 85
ipconfig, 120
Filter type property, 38
ISS Database Update Utility, 121
Forbid to hide interface property, 30
ISS Hardware Report Utility, 121
Format property, 65
ISS Media Export Utility, 70, 121, 126, 127
Fps property, 80, 89
ISS Object Types Database Editor, 121
Frames property, 78
ISS Startup Configuration Utility, 121
Free GB property, 34, 81
ISS System Report Utility, 7, 119, 121, 123
From list property, 106
ISS Video Archive Conversion Utility, 121
From property, 108
K
G
Keyboard object, 105
Gain property, 101
guardant, 120, 121 L
guide server, 120 Level property, 101, 102
license key, 14, 120, 121
H
license key, updating, 17
Hardware Acceleration property, 92
Live Resolution property, 65
Hardware property, 105
Local property, 115
HDD property, 86
Log on using Secure Password Authentication
Hidden property, 115 (SPA) property, 28
Holidays property, 22 Login, Password property, 107
HTML Dialog object, 59
M
HTML form, 58
Macro object, 22, 31, 114, 115
Hue property, 72
mainboard, 118
I map, 42

www.isscctv.com
SecurOS 140 Administration Guide

Index

layers, 43, 46, 52 O


moving objects to operator workstations, 44 Operate all property, 106
password, 55 Operator property, 30
placing objects, 47, 53 Outer zone (secondary) property, 76
registration, 42 Outer zone property, 76
Map v2 object, 13, 4245, 50, 53 Output window property, 106
Map object, 13, 4245
Message field property, 108
P
Message property, 110
Pack property, 109
Microphone object, 13, 42, 69, 101, 103
Pan/Tilt/Zoom property, 69
Microphone property, 69
Parity, DTR, RTS property, 82
Microsoft Remote Desktop Connection, 9
Password property, 30, 66, 89
Min, Max property, 91
PCI channel property, 65
Minimum/Maximum background threshold prop-
Person object, 22, 30, 3740
erty, 79
Persons property, 37
Mode property, 90
PgAdmin III, 119
Modem connection property, 32
Phone property, 27, 110, 112
Modem property, 110
ping, 120
Monitor object, 13, 31, 45, 62, 70, 95, 97, 98
Port property, 28, 82, 107
Motion detector object, 75
POS Terminal object, 89
Move Down property, 35
Post-recording phase duration property, 71
Move Up property, 35
postgres account, 11
Pre-recording phase duration property, 71
N Program object, 31
Name of the System property, 20 Program property, 58
Name, Password property, 33 Protect archive with password property, 70
Name property, 26, 27, 84, 85, 87, 94 Protocol filter object, 37
Names mask property, 85 Protocol type property, 82
Network Address property, 32 Provider property, 28
networking environment, 8 Providers property, 30
No limits property, 57 PTZ control priority property, 92
Normal frame rate property, 71 PTZ Controller object, 98
Notify about blinding property, 70 PTZ device, 9
Notify about defocusing property, 70 PTZ Device object, 69, 83, 98

www.isscctv.com
SecurOS 141 Administration Guide

Index

Pulse property, 111 Show alarm cameras only property, 91


Show all cameras from table above property, 90
R
Show Camera IDs property, 92
RDP protocol, 9
Show camera list property, 90
Record alarms property, 71
Show control toolbar property, 90
record buffer, 62
Show PTZ control property, 90
settings, 62
Show single active camera only property, 91
Records property, 57
Size property, 70, 75
Redial attempts property, 111
Skip (ms) property, 112
Refresh property, 85
Smart Search property, 74
regedit, 62, 63, 79, 87
SMTP Server requires authentication property,
Region object, 67 107
Relay object, 13 SMTP Server property, 107
Resolution property, 72 Sound Card property, 103
Resource file property, 50 Sound card property, 113
Rights property, 29 Source property, 103
Role property, 34 Speed property, 82
Run macro at start property, 22 Store at least property, 69
Run on property, 117 Store at most property, 69
Subject property, 108
S
superuser, 16
Samplerate property, 100
System object, 16, 17, 31
Saturation property, 73
Save configuration property, 20 T

Screen object, 42, 45, 58, 62, 91, 95, 97, 98, 114 technical support, 6, 120, 121

Script text area property, 117 Time between redial attempts property, 111

Security Zone object, 23, 24, 39 Time of acknowledgement of alarm event by the
operator property, 57
SecurOS Control Service, 129
Time Zone property, 117
Select All property, 35
Title property, 57, 80, 115, 116
Sense property, 112
To property, 108
Sensitivity property, 70, 76
Token property, 89
Sensor object, 13, 42, 49
Type property, 38, 56, 65, 101, 115
server, 9, 10
Server property, 28 U
Servers to connect property, 35 Update System Key property, 20

www.isscctv.com
SecurOS 142 Administration Guide

Index

Use compensation property, 79 Zone Object Detector object, 77


Use credentials provided at system log on prop- Zone object, 61, 74, 77
erty, 28
Zone property, 78
Use default directory property, 60
Use primary domain controller property, 28
Use remote hub property, 83
Use SSL property, 28
Use standart script file property, 59
User name, Password property, 28
User Rights object, 28, 39
User rights object, 30, 38, 40, 41
User property, 66

V
video capture card, 9, 121
Video Capture Device object, 12, 13, 62, 64, 82,
95, 96, 98
Video Concentrator object, 79, 98
Video concentrator property, 80, 89
Video property, 34, 81
Visibilities setup property, 22
Voice Message object, 111

W
Wait for dialtone property, 111
Wave File property, 112
WINS, 120
Working folder property, 85
workstation, 9

X
X, Y, W, H property, 46, 50, 56, 58, 88, 93, 94,
103
X, Y property, 59

Z
Zone Object Detector, 76

www.isscctv.com
SecurOS 143 Administration Guide

Index

www.isscctv.com

Das könnte Ihnen auch gefallen