18.02.2013 Views

Manual - Surveillance System, Security Cameras, and CCTV ...

Manual - Surveillance System, Security Cameras, and CCTV ...

Manual - Surveillance System, Security Cameras, and CCTV ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6. To activate the function at certain times only, click the Schedule button <strong>and</strong> select Active<br />

Schedule. For details, see Video Analysis Schedule later in this chapter.<br />

7. Click OK to apply the setting.<br />

8. Enable monitoring to start intrusion detection.<br />

When the intrusion event is detected, the configured computer alarm or output device will be activated,<br />

<strong>and</strong> the event will be recorded as Intruder in <strong>System</strong> Log for later retrieval.<br />

More options in the Alarm dialog box:<br />

Show Alarm Region: Displays the drawn lines on the preview image.<br />

Never Recycle: When the option is checked, the alarm-triggered events won’t be recycled even<br />

when disk space is full.<br />

3<br />

Video Analysis<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!