30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

112<br />

<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong><br />

<strong>User</strong> <strong>Manual</strong><br />

default to all operators in the system. This means that if a route definition has a scheduled<br />

route point from 8:00:00 to 17:00:00, then alarms and activity with that route point’s route<br />

definition are routed to only those operators listed in the route point during that time period.<br />

But there are two other time periods for which there are no route points: 23:59:00 to 8:00:00<br />

and 17:00:00 to 23:59:00. During these two time periods, alarms and activity with this route<br />

definition are routed to all operators in the system.<br />

• The Alarm Monitor reflects any changes made to the Alarm Monitor Routing configuration.<br />

Database updates, however, only add entries to the Alarm Monitor; they cannot remove<br />

entries.<br />

The Alarm Monitor Routing feature not only affects the Alarm Monitor; it also affects the Alarm Alerts<br />

pop-up. The same rules that apply to the Alarm Monitor also apply to the Alarm Alert. It displays only<br />

if alarms can be viewed on the Alarm Monitor.<br />

Related procedures<br />

To create, edit, or delete a Route Point record:<br />

1. Select Control, Routings, and then Route Points tab.<br />

2. Refer to Creating, editing, deleting, and printing records on page 36.<br />

Creating alarm instructions<br />

Use the Alarm Messages form to write instructions that display when the various alarms occur, and<br />

when they reset. Keep in mind that the same alarm may occur at different times of the day or week.<br />

Your instructions (who to call, who to dispatch) may change depending on the shift. These alarm<br />

messages appear in a list box that is used in the Alarms form.<br />

Example<br />

The policy at <strong>Global</strong> Corporation is to dispatch a security guard whenever an alarm comes in<br />

indicating that a door has been forced open. Therefore, they have created a message that appears<br />

on all Door Forced alarms instructing the operator to dispatch a guard.<br />

Figure 46.Alarm Messages Form

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!