18.02.2013 Views

Manual - Surveillance System, Security Cameras, and CCTV ...

Manual - Surveillance System, Security Cameras, and CCTV ...

Manual - Surveillance System, Security Cameras, and CCTV ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6. To activate the function at certain times only, click the Schedule button <strong>and</strong> select Active<br />

Schedule. For details, see Video Analysis Schedule later in this chapter.<br />

7. Click OK to apply the setting.<br />

8. Enable monitoring to start intrusion detection.<br />

When the intrusion event is detected, the configured computer alarm or output device will be activated,<br />

<strong>and</strong> the event will be recorded as Intruder in <strong>System</strong> Log for later retrieval.<br />

More options in the Alarm dialog box:<br />

� Show Alarm Region: Displays the drawn lines on the preview image.<br />

� Never Recycle: When the option is checked, the alarm-triggered events won’t be recycled even<br />

when disk space is full.<br />

3<br />

Video Analysis<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!