30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

110<br />

<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong><br />

<strong>User</strong> <strong>Manual</strong><br />

Table 49. Route Point form fields (continued)<br />

Field<br />

Route to Permission<br />

Bump to Permission<br />

Route to Email<br />

Description<br />

This field specifies the permissions that an operator must have for a message to be routed to<br />

this operator. A list of selected permissions is displayed. To add a permission to the list, click the<br />

arrow on the Permission drop-down list. One or more permissions may be selected for this route<br />

point. As permissions are selected or unselected from the list box, the Route to Permission<br />

window is updated. Only operators with the selected permissions receive activity and alarms that<br />

have this route point's route definition assigned.<br />

Ignore this field if you are creating a route point that is used only for Activity Monitor routing.<br />

This field identifies an alternate permission to use if the message is not responded to within the<br />

time specified in Bump Time. A list of selected permissions is displayed. To add a permission to<br />

the list, click the arrow on the Permission drop-down list. One or more permissions may be<br />

selected for this route point. As permissions are selected or unselected from the list box, the<br />

Bump to Permission window is updated.<br />

Ignore this field if you are creating a route point that is used only for Activity Monitor routing.<br />

This field identifies which email addresses are associated with the route point. A list of selected<br />

email addresses is displayed. To add an address to the list, click the arrow on the Email dropdown<br />

list. One or more addresses may be selected for this route point. As addresses are<br />

selected or unselected from the list box, the Route to Email window is updated. Only operators<br />

with the selected email addresses receive activity and alarms that have this route point<br />

assigned.<br />

Note:<br />

The alarm record (Alarm form) must be associated with a routing record (Routing form)<br />

that includes e-mail to use this feature.<br />

Bump to Email<br />

This field identifies an alternate email address to use if the message is not responded to within<br />

the time specified in Bump Time. A list of selected email addresses is displayed. To add an<br />

address to the list, click the arrow on the Email drop-down list. One or more addresses may be<br />

selected for this route point. As addresses are selected or unselected from the list box, the Bump<br />

to Email window is updated.<br />

Note:<br />

The alarm record (Alarm form) must be associated with a routing record (Routing form)<br />

that includes e-mail to use this feature.<br />

Ignore this field if you are creating a route point that is used only for Activity Monitor routing.<br />

Start Time<br />

Stop Time<br />

Time Zone<br />

This field identifies when a route point becomes enabled. The format of the value entered should<br />

conform to the time format in system configuration. To enable a route point 24 hours, set this<br />

time to 00:00:01.<br />

If this value is blank, the route definition is not enforced.<br />

This field identifies when a scheduled route point becomes disabled. The format of the value<br />

entered should conform to the time format in system configuration. To enable a route point 24<br />

hours, set this time to 23:59:59.<br />

If this value is blank, the route definition not enforced.<br />

From the drop-down list, select the time zone of one of the following: the host receiving the<br />

alarm, the micro from which the alarm originates, or the operator monitoring the alarm. See<br />

Verifying time zones on page 161.<br />

Note:<br />

In order for an operator to use this field, they must have at least View page level<br />

permission for the Time Zone form. See Creating facility permission profiles on<br />

page 79.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!