30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

114<br />

<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong><br />

<strong>User</strong> <strong>Manual</strong><br />

Fields and controls<br />

Table 51. Alarm Response form fields<br />

Field<br />

Alarm Response<br />

Facility<br />

Description<br />

Type an alarm response for the operator to use (up to 60 alphanumeric characters).<br />

Alarm responses appear in a list box that is used when the operator responds to an alarm. When<br />

the operator selects a response, the response and the alarm event automatically route to the log.<br />

Pre-written responses save time, but if none of the responses on the list box are appropriate, the<br />

operator can type a unique alarm response.<br />

Click Facility to display the facilities list box. This field reflects the facility to which this record is<br />

assigned. For more information, see Creating facilities on page 52.<br />

Related procedures<br />

To create, edit, or delete an Alarm Response record:<br />

1. Select Configuration, Alarms, and then Alarm Responses tab.<br />

2. Refer to Creating, editing, deleting, and printing records on page 36.<br />

Defining alarms<br />

Use the Alarms form to define the alarms – both physical alarms (such as Door Forced Open) and<br />

logical alarms (such as Invalid Badge). Define the alarm priority, whether or not the alarm can be<br />

scheduled, how alarm inputs and outputs reset, where the alarm is routed, and which alarm<br />

instructions display when the alarm occurs. These entries form a list box that is used in the Input<br />

Groups form, where alarms are assigned to a specific input group. (See Input Groups Form on<br />

page 125.)<br />

Example<br />

Ann Davis is the system administrator at <strong>Global</strong> Corporation and she has defined the Door Forced<br />

Open alarm as a priority 1 alarm, to be routed to the Alarm Monitor on the Lobby workstation. The<br />

instruction “Forced Door-Send <strong>Security</strong> Guard” displays in red letters on a yellow background.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!