Professional Documents
Culture Documents
Securos Administration Guide
Securos Administration Guide
Release 4.3.2 R3
SecurOS Administration Guide (AG-En, built on November 18, 2008).
c Copyright ISS Technology 20052008
Printed in US.
ISS Technology reserves the right to make changes to both this Manual and to the products it describes. System speci-
fications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty,
promise or contractual condition, and must not be taken as such. No part of this publication may be reproduced, transmitted,
transcribed, stored in a retrieval system or translated into any human or computer language in any form by any means
without the express written permission of the copyright holder. Unauthorized copying of this publication may not only
infringe copyright but also reduce the ability of ISS Technology to provide accurate and up-to-date information to both users
and operators.
SecurOS 3 Administration Guide
Contents
Contents
1 Contents 3 Changing Superuser Password . . . 16
Updating License Key on All Servers . . . 17
2 Preface 6
The SecurOS Subsystems Structure . . . . 17
Scope . . . . . . . . . . . . . . . . . . . 6
Target Audience . . . . . . . . . . . . . . 6 5 Core Subsystem 19
Using This Manual . . . . . . . . . . . . . 6 Working Principles . . . . . . . . . . . . 19
www.isscctv.com
SecurOS 4 Administration Guide
Contents
www.isscctv.com
SecurOS 5 Administration Guide
Contents
www.isscctv.com
SecurOS 6 Administration Guide
Preface
Preface
Scope
Current manual provides general information about SecurOS architecture, describes the process of
configuring security network and system objects, gives some troubleshooting tips and recommenda-
tions.
It is assumed that the user have already deployed the security network physically and installed SecurOS
software on all computers of this network.
Target Audience
This manual is designed for SecurOS system installers and administrators. It is assumed the user has
advanced computer skills, has practical experience with TCP/IP networking, serial (COM) ports and
general CCTV knowledge. The user should have read SecurOS Installation Guide prior to reading this
document, because it gives introductory information on how to plan their system.
www.isscctv.com
SecurOS 7 Administration Guide
Preface
For any further information you can contact our Technical Support Team:
phone in USA:
e-mail:
support@isscctv.com
To ensure quality technical support, we advise you to provide us technical data on your computer and
SecurOS configuration. This data can be collected automatically by using ISS System Report Utility
that is distributed with SecurOS. See section ISS System Report Utility on page 122 for further
information.
www.isscctv.com
SecurOS 8 Administration Guide
SecurOS Architecture
SecurOS Architecture
SecurOS is an integrated security system distributed over TCP/IP network.
SecurOS modular architecture makes it flexible in terms of supported functions and performance tun-
ing. Intelligent plug-in modules like License Plate Recognition (LPR), Face Capture/Face Recognition
(FC/FR) engines and integration with the wide range of third-party hardware can extend SecurOS
applications to the highest level.
www.isscctv.com
SecurOS 9 Administration Guide
SecurOS Architecture
Application Server
Application server is a computer that is responsible for supporting and controlling specific part of the
security network. Security hardware like CCTV cameras, video capture cards, audio capture cards,
alarm controllers, fire alarm and access control subsystem, as well as intelligent modules (license
plate recognition etc.) should be installed in or connected to application server units to be operable in
security network for proper security network functioning.
Each server with proper settings has administration capabilities, i. e. entire SecurOS network can
be configured from this server equipped with display. To use an additional machine for remote
administration, install system with administrator workstation configuration (see below). To connect
to any of the servers remotely from any other computer within network domain, configure access to
the server through Microsoft Remote Desktop Connection using RDP protocol.
Video Server
Video server is an application server, equipped with video capture card (cards) and designed to receive
video from connected CCTV and IP network cameras.
Operator Workstation
Operator workstation is a client computer connected to SecurOS network, designed to remotely view
digital video from either analog CCTV camera (via video server) or IP cameras, listen to audio, send
commands to remote control PTZ devices, doors, to monitor access control and fire alarm systems,
etc.
Administrator Workstation
Administrator workstation is a client computer similar to operator workstation. It has additional
administration interface to configure SecurOS network, meaning this:
www.isscctv.com
SecurOS 10 Administration Guide
SecurOS Architecture
Modular Structure
Modular structure implements the following options:
installation of specific modules (such as license plate recognition engines, modules for support-
ing third-party access control and fire alarm hardware) to the SecurOS network to extent its
functionality.
Application server software automatically decides, which modules and subsystems must be loaded
to establish the highest productivity. This depends on system configuration.
www.isscctv.com
SecurOS 11 Administration Guide
Administration Overview
Administration Overview
Administration mode is used for security network configuration. It is accessible from any application
server and administrator workstation. All security system components remains completely functional
when entering administration mode (without any restrictions).
Warning! After SecurOS and PostgreSQL software installation Windows OS creates the
postgres account. To configure SecurOS system use an administrator Windows account
but not the postgres one.
To launch application server / administrator workstation, double-click SecurOS icon on the desktop, or
choosing it from the Start Programs SecurOS menu.
A splash screen will appear, showing the progress of system initialization. To open SecurOS control
panel when SecurOS software has started, double-click the program icon in system tray area (see
figure 2) or press-hold Ctrl key and move the mouse pointer to the top edge of the screen.
To enter administration mode, click Configuration button on control panel. Administration toolbar
and objects tree window will appear on screen (see figure 4). Objects tree window sizes can be
changed as for any other application window.
To leave administration mode, click Configuration button again. Then the administration toolbar and
objects tree window will hide.
www.isscctv.com
SecurOS 12 Administration Guide
Administration Overview
Example: The Video Capture Device object can be a child object of a Computer object only. The Camera
object can be created as a child of a Video Capture Device object only. The logical structure represents
physical device connection: if video capture cards are installed into computers, then cameras are to be
attached to these cards.
Note: Wrongly functioned objects (e.g. with software or hardware errors) are marked with red cross
icon in the objects tree.
Object Classes
There are two object classes in SecurOS
system objects
www.isscctv.com
SecurOS 13 Administration Guide
Administration Overview
System Objects
System objects can be created and run on application servers and represent security network func-
tionality: physical devices, logical objects, intelligent modules like License Plate or Face Recognition
modules, etc. These objects are non-visible, i.e. they have no direct representation in user interface,
as opposed to user interface objects.
Examples of system objects are: Computer, Video Capture Device, Camera, Audio Capture Device,
Microphone, Sensor, Relay, etc.
Create create new child object under currently selected parent object.
On Map place object on map (available if any map object exists). Object is placed on a
map only if it is represented by Map object in the system (this action does not relate to maps
represented by Map v2 object)
Note: Some of these options are also available from context menu of the object in objects tree.
www.isscctv.com
SecurOS 14 Administration Guide
Administration Overview
Creating Objects
To create new object:
If current object cannot have child objects, in drop-down list box you will see object types for its
parent, and newly created object will appear as a sibling node, as if you have selected the parent node
prior to creating new object.
Once an object is created, its properties window will appear automatically.
When I try to create an object, a message Current system configuration does not permit to
create more than N Xxx objects appears. Why?
The system configuration limits (amount of objects of each type within security network) is written
in license key file (key.iss). The message above tells that the limit of objects of the specified type
is already reached. To be able to have more objects of this type, contact our Technical Support Team
to get the new key. See also Updating License Key on All Servers on page 17 for more information
on how to install the new license key.
1. Select the object in the objects tree and click Setup button.
Note: Several object types do not have editable properties, so Setup button will become disabled once
an object of this type is selected.
2. A window with objects properties will appear on the right edge of the screen. Each object type
has its own properties window appearance; all these windows and objects properties will be
described further. Alter objects settings.
3. Click Setup button again to apply changes and hide the window.
Warning! Due to technical limitations, you cannot close properties window without applying
changes to the object nor you can dismiss changes made in this window. All changes are applied
to system configuration immediately upon closing properties window, so change object settings
with care.
www.isscctv.com
SecurOS 15 Administration Guide
Administration Overview
Deleting Objects
To delete object, select it in the objects tree and click Delete button.
A confirmation dialog will pop up. Click OK button to delete object or Cancel button to return
without deleting.
Warning! If you delete object, its child objects will be deleted as well. This operation cannot
be undone, so use it carefully.
Disabling Objects
To temporarily exclude object from security network without deleting it and, thus, loosing its settings,
just disable it. Disabled objects are marked with cyan cross icon.
To disable object, select it in objects tree and click Disable button.
To enable object, click Disable button once again.
Once objects parent has changed, child object will physically move in tree to reflect changes.
1. Select parent object in tree, right-click it and choose Find menu item. A small input window
will appear.
2. Type in the name (or part of name) of the required object and press Enter. The focus will
switch to the first child object that matches the search string.
www.isscctv.com
SecurOS 16 Administration Guide
Administration Overview
3. Press Esc to close the search box or use Enter to search for the next object.
Note: To search through entire configuration tree, select root System object as a parent.
1. Change the default SecurOS superuser password and keep it safe (see below).
2. Manage user rights for individual administrators / operators on per object basis (see Defining
Access Levels to Individual Objects on page 38).
3. For these settings to take effect, force all administrator and operator workstations to reconnect
to security network.
Warning! Superuser login name is root. Default superuser password is securos2006. Change
default superuser password to the new value and keep it safe before giving access to your
security network for other personnel!
1. Log in as superuser.
2. Open properties window for the root System object and click Change Superuser Password
button (see figure 6).
www.isscctv.com
SecurOS 17 Administration Guide
Administration Overview
Note: After that, users other than superuser cannot see System object at all.
1. Copy the new key.iss file to your local SecurOS directory on administrator workstation or
application server.
2. Launch SecurOS software on this administrator workstation or application server and log in to
SecurOS as superuser.
3. Open System object properties window and click Update System Key button.
4. In a new window click Update list button. The update process will begin automatically and you
will see the progress on the screen.
1. Core subsystem, containing objects and their settings corresponding to main system components,
such as users and computers. Also organization structure of the system and data storage are
configured within this subsystem (see Core Subsystem on page 19).
2. Interface subsystem, containing objects responsible for visual representation of the system objects
and actually used by operators working with the system. These are screens, maps, HTML forms
and dialogs, system event viewer (see Interface Subsystem on page 42).
3. Video subsystem, which components are responsible for main video streams control, video cam-
eras displaying and recording process, video playback and live video monitoring, video motion
detectors and video archives (see Video Subsystem on page 61).
4. Audio subsystem, containing control facilities of audio recording and playback devices (see Audio
Subsystem on page 100).
5. I/O subsystem, which contains objects responsible for input/output peripheral devices (fire
alarm controllers, relays and various detectors, controlling keyboards) (see I/O Subsystem on
page 104).
www.isscctv.com
SecurOS 18 Administration Guide
Administration Overview
6. Notification subsystem that comprises objects for notification of users about system events by
media messages (see Notification Subsystem on page 107).
7. Automation subsystem, which contains tools for system scripts and macros programming, config-
uration an interpretation, time zones automation controls, third-party devices system integration
tools (see Automation Subsystem on page 114).
Note: Each of the following chapters describes basic working principles and configuration features of the
corresponding subsystem objects.
www.isscctv.com
SecurOS 19 Administration Guide
Core Subsystem
Core Subsystem
Core subsystem communicates with the computers in SecurOS distributed network and installed
intelligent modules (such as license plate recognition module) as well as other subsystems (such as
video or audio subsystem, or telemetry subsystem).
Working Principles
The core subsystemis the SecurOS core and it monitors the status of all connected objects, modules
and devices.
Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.
The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log
file in real time mode.
The SecurOS core subsystem allows connecting and disconnecting of the security network nodes,
configurating and synchronizing the configuration information between the security network nodes, as
well as monitoring any changes in modules and objects status.
If any single node or a certain network segment is disconnected, it is assigned the disconnected
status and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.
Permanent updating of the security network configuration data allows configuring the security network
from any computer running the necessary administration software, and watch video form connected
video cameras, listen to audio, send commands to hardware, monitor and control alarm and fire alarm
systems from each operators workstation within the security network.
Objects Reference
System
This is a root object of the entire objects tree and provides system-wide properties. This object cannot
be deleted, moved, or disabled. This object is visible to superuser only.
Parent object: none (root object).
www.isscctv.com
SecurOS 20 Administration Guide
Core Subsystem
Security Zone
This object is used to divide entire security network into separate security zones ranged over a large
territory when independent centralized monitoring and supervision is needed for certain physically
separated zones.
Then, some or all computers of one security zones can be displayed or hidden in the objects tree for
the users working on the selected computers of another security zones (see detailed information in
Setting Up Security Zone Visibilities on page 22).
Also, there is a possibility to set the filters for the events transmitting between the security zones.
Using filters, events communication can be completely or partially disabled between the different
security zones. Thus, event filters between the zones are useful to apply when a zone must be
completely isolated from the other ones (see detailed information in Setting Up Event Redirection on
page 24).
www.isscctv.com
SecurOS 21 Administration Guide
Core Subsystem
The users can be also granted with different access rights to implement multi-level access control for
the security objects (see Defining Access Levels to Individual Objects on page 38). For example, in
a security center the operators can observe the territory by watching the signals from the cameras.
The supervisor can be granted the rules to control the monitoring modes, enable or disable cameras,
control the rotatable cameras, and the head of the security center can generate reports.
Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is sep-
arated into several segments and each administrator may monitor and configure only one of those
segments.
Note: A separate events log is used for each security zone for the SecurOS installation.
access control subsystem uses hardware identifiers (cards) with different facility codes on differ-
ent territories
access control subsystem is distributed across several zones with different access schedule (dif-
ferent holidays), and if each zone has its own departments and persons (i. e. several organizations
within one office building)
you need to store separate event logs for a subset of SecurOS objects, with different database
depth
www.isscctv.com
SecurOS 22 Administration Guide
Core Subsystem
www.isscctv.com
SecurOS 23 Administration Guide
Core Subsystem
1. Open the properties window for the Security Zone object and click Visibilities setup button
from this panel (see figure 7). The object visibilities setup window will appear (see figure 8).
2. From the list on the left side of the window (figure 8), select a single computer to create
system visibilities restrictions (to allow setting visibilities for a single computer, single-click its
icon consequently to change its state; see below icons list on figure 9 and corresponding states
description).
Icon meanings for security zones and computer visibility states (see figure 9 from left to right):
www.isscctv.com
SecurOS 24 Administration Guide
Core Subsystem
3. On the right side, set target object visibilities by changing their icons by single-clicking on
them. Defaults node defines the default visibility settings for newly created security zones (see
below description of icons meaning).
4. To accept the changes, click OK button. To cancel all changes, click Cancel button.
Warning! If you later move a computer from one security zone to another (in objects tree), all
its custom visibility settings will be abandoned, and the computer will inherit visibility from its
new parent zone.
1. Open the properties window for the Security Zone object and click Event redirection button
from this panel (see figure 7). The event redirection setup window will appear (see figure 10).
www.isscctv.com
SecurOS 25 Administration Guide
Core Subsystem
2. Within Event source tree (see figure 10), select a security zone or single computer to set event
filtering for (to apply settings for a single computer, single-click its icon consequently to change
its state; see below icons list on figure 11 and corresponding states description).
Note: Types of icons are identical to those described in Setting Up Security Zone Visibilities on page 22)
but with slightly different meaning.
Icon meanings for event filters (see figure 11 from left to right):
Security zone receives events security zone by default receives all events from
source security zone or computer
Security zone does not receive events security zone by default does not receive
any events from source security zone or computer
Computer receives events
Computer does not receive events
Inherited settings event filtering for this computer is inherited from parent security
zone, computer currently receives events. When new Computer objects are created or
moved from another security zone, they have this setting by default
Inherited settings same as above, computer currently receives no events
3. Within Event target tree, select target object to filter events from the source object. To
change their icons, single-click on them consequently (see previous item for description of icons
meaning). Defaults node defines the default visibility settings for newly created security zones.
4. Define exceptions from this rule on per object basis using Exceptions table. If target security
zone or computer receives events by default, exceptions define events that should be filtered
out; if target does not receive events by default, exceptions define events that should reach the
target.
Note: Each line of the table of exceptions specifies the single object of the source computer or security
zone (by its type and ID) and specific event type. The list of events is specific to the type of the object.
5. To accept the changes, click OK button. To cancel all changes, click Cancel.
Department
Used to organize persons in groups, primarily in access control subsystem and to define persons
to manage user rights within security network itself (see Managing User Rights Within Security
Network on page 16).
www.isscctv.com
SecurOS 26 Administration Guide
Core Subsystem
Person
Represents a single person (either a person of access control system or a user within security network).
Parent object: Department on page 25.
www.isscctv.com
SecurOS 27 Administration Guide
Core Subsystem
Option Description
www.isscctv.com
SecurOS 28 Administration Guide
Core Subsystem
Credentials
Use credentials
Select this field to use name and password of Windows user currently
provided at system
logged in.
log on
Specify user name and password for authentication on server.These and
User name, Password
the following fields are not active when the previous field is activated.
Log on using Secure
Password Reserved for future use.
Authentication (SPA)
User Rights
This object is for defining user rights within the system. See Defining Access Levels to Individual
Objects on page 38 for detailed description.
Note: All users in User Rights object settings have equal access level. To attribute another set of rights
to another users group, create different User Rights object.
www.isscctv.com
SecurOS 29 Administration Guide
Core Subsystem
www.isscctv.com
SecurOS 30 Administration Guide
Core Subsystem
Option Description
Select this field to disable quick shutdown via control panel (Actions
Shutdown) (menu item is invisible). To shutdown client/server
Disable system
software, one should use the Actions Log Off option, provide user
shutdown for user
name and password which allow system shutdown, and use Shutdown
button to confirm shutdown.
Forbid to hide Select this field if user is not allowed to hide all the screens of user
interface interface [] button on the control panel is disabled.
Allow configure
Select the field to assign super-user rights to these users.
system
Specify priority level for simultaneous access to PTZ device (number
Control PTZ priority from 0 to 255). PTZ transactions will be processed in turn: first for
user rights with higher priority level.
Choose SecurOS (local) value to accept rights to access the selected
objects for users from the Users and Groups table (see below) or choose
Providers the Active Directory storage object name as it appears in objects tree to
accept certain rights to user/users group of network domain (see Active
Directory storage on page 27).
Users and Groups (list of users and groups that have the above rights). On selecting the
Active Directory storage object from the Providers list, the list should be formed as described
in Configuration of Network Domain User Rights on page 40.
Link to existing Person object. The name of the person will be used as
username when logging in to SecurOS.
To add several entries into the table, use button. To delete entry from
Operator
the table, select required row and press Ctrl + Delete keyboard shortcut.
Warning! The table appears only when SecurOS (local) value is
chosen in Providers field.
Enter non-empty password for this person. Note that the same per-
Password son can be assigned to several User rights objects simultaneously, but
username/password combination should be unique.
Each user access level corresponds to an icon from the following list (see figure 16 from left to right):
No access the user has no access to the object neither in administrative mode nor in operator
mode. The object, though, is still visible as a node in objects tree when in administrative mode.
www.isscctv.com
SecurOS 31 Administration Guide
Core Subsystem
View the user has no administrative access to the object, but the object (if it is a user interface
object like Monitor or Audio Player) can be visible in operator interface. Macros (Macro objects)
that have these level can be executed from within operator interface.
Control same as View rights, but the user can additionally control the object from within
operator interface (i. e. arm/disarm video cameras).
Configure same as Control rights, but the user can view and change objects properties
from within administrator interface. User cannot delete existing object and cannot create child
objects under this object.
Full access same as Configure rights plus ability to delete this object and create child
objects.
Inherited rights rights for this object are inherited from parent object. When new objects
are created, they have this access level by default.
Note: Several object types (like System, Program, Area, Department ) that do not have visual repre-
sentation within user interface on operator workstations, cannot have View and Control access level
types.
Note: If the user creates new User Rights object, he/she cannot define the rights for this object to
exceed the current user rights.
Computer
This object represents individual computer within security network (application server, administrator
workstation or operator workstation). The servers and workstations in the security network are
represented as the Computer objects in the object tree. The servers run the SecurOS server application,
and the workstations run the SecurOS client application.
The SecurOS workstations can send and receive the events from the other security network nodes.
Filters can be used to select the events that will be transmitted from one security network computer
to the other ones and to limit computers control and network load due to events transmission (see
Setting Up Event Redirection on page 24).
www.isscctv.com
SecurOS 32 Administration Guide
Core Subsystem
Network connection
Specify IP address or DNS/WINS name of the current computer within
TCP/IP network. You can choose from the list or use [<] button to
Network Address determine computers IP automatically. Never use IP address if the
computer uses DHCP (dynamic IPs), use symbolic DNS name of the
computer instead!
If computer uses dial-up connection to connect to TCP/IP network,
Modem connection select this check box and define connection, user and password below to
dial this connection automatically on system startup.
(continued on next page)
www.isscctv.com
SecurOS 33 Administration Guide
Core Subsystem
Option Description
Name of the Windows system installed dial-up connection, username,
Connection, User, and password for automatic connection with security network. For in-
Password formation on how to setup dial-up connections, consult the help on
Microsoft Windows operating system.
If this option is turned on, computer loads event log from security
network when connects to it. Option is useful when you monitor system
Auto Log Load events via Event Viewer (see Event Viewer on page 55) and want to
know about system-wide events which occurred before your computer
has logged on to security network.
www.isscctv.com
SecurOS 34 Administration Guide
Core Subsystem
Option Description
Drop-down list of SecurOS network computer functional types. Choose
type corresponding to required computer role in SecurOS network. Pos-
sible values:
Video Read read-only access (video archive can be read from this disk, but
writing to this disk is disabled).
Audio Read Only read-only access (audio archive can be read from this
disk, but writing to this disk is disabled).
www.isscctv.com
SecurOS 35 Administration Guide
Core Subsystem
Option Description
Servers to connect (the list of accessible servers in SecurOS network)
The list of SecurOS network application server that is available for
connection of this computer.
If this computer acts as operator workstation, you can specify the list
of alternative application servers here. When connecting to security
network, operator workstation will walk through this list and try to
connect to each server in order until it connects successfully. If the list
is empty, workstation will connect to single application server explicitly
specified in connection settings (see SecurOS Installation Guide) or
remembered from previous successful session.
In this computer acts as server, only servers which this computer is
allowed to connect should be given in this list. It is necessary to include
Servers to connect
this computer into the same Servers to connect list in all these servers
settings. Then they will be displayed as active in this computer objects
tree. If the list is empty, this computer will be allowed to connect to any
server of the security network, containing this computer in the Servers
to connect list, or also with empty list of servers.
Attention! Connection to all remaining servers will be denied and they
will be signed by green cross icon in this computer objects tree (see
figure 18). System data transfer between them will continue neverthe-
less, depending on events transmission filters.
To add several entries into the table, use button. To delete entry from
the table, select required row and press Ctrl + Delete keyboard shortcut.
Click this button to populate the list with all computers within security
Select All
network.
www.isscctv.com
SecurOS 36 Administration Guide
Core Subsystem
Area Zone
Used for objects logical grouping based on territory location.
Parent object: Security Zone on page 20.
Object has no properties to alter.
Region
Represents a separated area of the territory defined by the parent Area Zone object. Used in access
control system configuration.
www.isscctv.com
SecurOS 37 Administration Guide
Core Subsystem
Protocol filter
The object defines events to record them in protocol database. This object reduce computer memory
usage that avoids its overfull; the object may be used to monitor only the required events.
Warning! If the object is created then only defined events (or events from the defined objects)
will be recorded in database.
Note: To register all SecurOS events one need either to delete the Protocol filter object or to disable it.
www.isscctv.com
SecurOS 38 Administration Guide
Core Subsystem
Table
Object type which events are needed to (or not to) be registered.
Type To add several entries into the table, use button. To delete entry from
the table, select required row and press Ctrl + Delete keyboard shortcut.
Object ID or name which events are needed to (or not to) be registered.
Id, name One may left it empty. Then all events of the defined objects will be
filtered.
Event to filter. One may left it empty. Then all events of the defined
Event
object will be filtered.
Configuration Examples
www.isscctv.com
SecurOS 39 Administration Guide
Core Subsystem
Also, the access level rights can be configured for the users of already created network domain, which
includes computers of a certain security zone (see Configuration of Network Domain User Rights on
page 40). In this case, local SecurOS user accounts will be disabled.
Warning! If security system has more than one security zone, you must define user rights
for each security zone, otherwise you will be able to automatically login to the system with
system-wide superuser rights from any computer that belongs to unrestricted security zone!
After you have defined user rights within security network, SecurOS will require to enter user
name and password on software startup. Since every computer belongs to some security zone, you
can login under users that belong to the same security zone as the computer in question. Other
username/password combinations will not work, even if they are valid within other security zones.
To implement the security scheme with user access restriction:
1. Plan, how many different access rights your security zone should have, and what users will use
each of these rights.
2. Create a Department object (see Department on page 25) under Security Zone object (see Se-
curity Zone on page 20).
3. Create a necessary number of Person objects (see Person on page 26) within this Department
object by the required number of SecurOS system users (administrators / operators).
4. Create User Rights objects within Security Zone object. Its properties window (see figure 15)
contains the tree at the top that is identical to the objects tree of the security network. Edit
access rights of one or more users to each particular object by clicking its icon consequently
(see User Rights on page 28).
5. Repeat steps 24 for each security zone within your network. For each security zone the objects
tree would contain elements shown in figure 21.
Figure 21: Objects tree with Department , Person and User Rights objects
6. Alter security zone visibilities from within other security zones. This allows you to completely
hide parts of your security network from within objects tree for local administrators that do not
need to know the configuration of entire security network.
www.isscctv.com
SecurOS 40 Administration Guide
Core Subsystem
The table at the bottom is used to link the above scheme of user rights to one or more Person
objects and to define individual passwords for each of these persons, or to list a network domain users,
depending on chosen user accounts provider type (see User Rights on page 28, item Providers).
1. In Active Directory storage object properties window (see figure 14) choose
Windows NT (local or domain) value from Provider drop-down list box.
2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server. You do
not need to fill Port field (port for Windows NT provider).
3. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be already defined in domain controller, see item 2).
4. If User name and Password fields are filled, select Log on using Secure Password Authen-
tication (SPA) check box.
To set user rights for a user, fill Users and Groups field in User rights object properties window (see
figure 15) with a series of network domain user login names separated by commas (e. g. j-smith).
To set user rights for a user group, fill Users and Groups field in User rights object properties
window (see figure 15) with a network domain users group login and ,group postfix without space
(e. g. Users,group). The ,group postfix is obligatory.
1. In Active Directory storage object properties window (see figure 14) choose LDAP (domain)
value from Provider drop-down list box.
2. Select Use primary domain controller check box to use primary domain controller where the
computer is registered, or fill Server field with IP address of domain controller server.
3. Optional: fill Port field with 389 value (number of LDAP server port).
4. Select Use credentials provided at system logon check box to connect domain controller using
current MS Windows login and password, or fill User name and Password fields (specified user
must be defined for domain controller, see item 2).
www.isscctv.com
SecurOS 41 Administration Guide
Core Subsystem
5. If User name and Password fields are filled, select Log on using Secure Password Authen-
tication (SPA) check box.
6. Optional: fill Maximum number of entries to return and Search timeout, sec fields with
search parameters. Empty value is equal to 10 value (default). Search Base field is not used in
current version.
To set user rights for a user, fill Users and Groups field in User rights object properties window (see
figure 15) with a series of the following strings: &(objectClass=user)(sAMAccountName=j-smith)
for each network domain user login (e. g. j-smith).
To set user rights for a usergroup, fill Users and Groups field
in User rights object propertieswindow with the following string:
&(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-dev,dc=test), where
Builtin is a system folder where Users users group is placed.
www.isscctv.com
SecurOS 42 Administration Guide
Interface Subsystem
Interface Subsystem
Maps Working Principles
In order to keep control on entire territory or building, maps can be used. Maps are multi-layer
graphical plans of entire territory under control, floors or single rooms the level of details depends
on your needs.
Once registered within security network, the maps can be used by administrator to place the icons of
security equipment elements, such as cameras, alarm sensors, door detectors on them, representing
objects physical location within the controlled territory.
These maps can then be used by operators to monitor entire territory at a glance and use icons on
maps as shortcuts to the corresponding objects functions.
Example: If an intrusion alarm has been detected, operator can immediately see the physical location
of the target area, switch to the video cameras that are located close to this area by double-clicking on
icons on map, switch lights on within that area.
Map Creation
To deploy a map:
1. Draw a set of images that will be used as map layers (see Drawing Map Layers on page 43).
2. In objects tree locate the Computer object that represents your current administration work-
station or application server from which you are currently administering security network. See
if there is any child Screen object under it and create it if necessary leaving default object
parameters.
3. Create child Map or Map v2 object for the selected Screen. Again, default object parameters
can be used on creation. Once the objects properties window appears (see object description
in Map on page 45 for Map object or Map v2 on page 49 for Map v2 object), provide its
position and dimensions. For Map v2 object it is necessary to choose previously created map
file (see about map file creation).
4. Click Setup button to apply changes and close objects properties window. The map window will
appear on screen with map file loaded.
5. In case of Map object place security network objects like Camera, Sensor, Microphone on
map from within that administration workstation or application server (see ).
6. Move Map (or Map v2 ) object onto operator workstation for real-time interaction (see Moving
Map Objects onto Operator Workstations on page 44 for detailed description of moving map
objects).
www.isscctv.com
SecurOS 43 Administration Guide
Interface Subsystem
Note: Map v2 object is an updated analog of Map object. The main difference from the old object
consists in object configuration process (moving objects on map), user interface (map scaling, working
with filters etc.), see .
Note: Images in PNG, GIF or JPEG formats can be also used for Map v2 objects.
The resulting image or images can have any colors and style, but you should consider the following:
All plans of your territory should be done in the same graphical style for better visual perception.
Keep the image dimensions in pixels comparable to dimensions of the target Map or Map v2
object on the screen of the operator workstation to avoid redundant scrolling.
Colors should not distract operator from objects placed on map. Do not use gaudy colors, avoid
using red and orange colors. The more neutral the background is, the better.
Provide all territories with descriptive captions. Text should be clearly visible and readable.
Give images meaningful names (i. e. map floor1.bmp, map floor2.bmp, map room123.bmp).
Note: On Map object creation, default image will be loaded that is named map.bmp and placed in \Bmp
subfolder of SecurOS program folder. For convenience, it is recommended to place all your bitmap files
used as map images for Map object into the same subdirectory.
The figure 22 shows the sample sketch of one floor of a building, which can be used in a map.
www.isscctv.com
SecurOS 44 Administration Guide
Interface Subsystem
1. In case of Map object Manually copy all .bmp files, referenced by this map, from your com-
puter to target computers \Bmp subdirectory under SecurOS program directory.
2. In case of Map v2 object Manually copy the *.map resource file of this map from your
computer to target computers \Maps subdirectory under SecurOS program directory.
3. Setup or edit a map (place objects on map, move them, rotate, etc.).
www.isscctv.com
SecurOS 45 Administration Guide
Interface Subsystem
4. Ensure that the Computer object representing the target computer exists in your SecurOS
configuration, and that it contains at least one Screen object. Create these objects if necessary.
5. Move the Map or Map v2 object itself to the Screen object of the target computer.
6. In case of Map object Define a connection string to main SecurOS database using DSAdmin
utility (see DSAdmin Utility on page 130).
Objects Reference
The objects that have user interfaces or take a part in interaction with users.
Screen
This is a base user interface object that acts as a container to other UI objects. It is used for placement
of several components of user interface.
Warning! All user interface visual components are displayed only by means of SecurOS screens.
Example: Let two rooms are on a secured area. There are PTZ camera and microphone in the first room
and two cameras in the second room. System administrator may configure two Screen objects. On the
first screen there could be a PTZ control dialog window, video displaying monitor and audio player to
work with microphone. On the second screen there could be a second monitor to watch for cameras from
the second room, and a map of the whole territory to provide visual access to all the security devices and
to control their states.
Note: If the object name is Playback, then its child Monitor objects will be displayed in a drop-down
list (see SecurOS User Guide for more information).
Map
Object represents a multi-layered graphical map of the territory under control. See below for more
information on how to setup and use maps.
Parent object: Screen on page 45.
www.isscctv.com
SecurOS 46 Administration Guide
Interface Subsystem
1. Click Add map item, then choose *.bmp file for a new layer from standard Open file dialog box
2. Provide the descriptive title of a new layer and click OK button to create layer or press Esc key
to close dialog without adding a layer.
www.isscctv.com
SecurOS 47 Administration Guide
Interface Subsystem
1. Click Add link item and choose the target layer you want to link to and caption of the link (at
least two map layers already registered are necessary prior to using this feature).
2. Click OK button to create the link or Cancel button to quit dialog without adding a link. Once
created, a link icon will appear on the map (see figure 25).
Note: Link icon can be moved across the map by pushing left mouse button on icon, dragging your
mouse pointer to the new location and then releasing the left button.
Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation,
we recommend to create another link on the target layer that points back to the source one. Thus, it
will be possible to switch between layers in both directions smoothly.
To remove layer from the map, use Remove map option.
Warning! Remove map operation deletes maps current layer without any confirmation and
cannot be undone. Original *.bmp image file will not be deleted.
To navigate forward/backward through the list of available layers, use Next Map and Previous Map
options. This is useful when layers are not linked together yet.
Note: This way of navigation is available in administrative mode only. You should link all layers together
using Add link feature before using map in operator mode.
To change title of the currently visible layer, use Set Title option.
www.isscctv.com
SecurOS 48 Administration Guide
Interface Subsystem
To move icon around, select it first by clicking on it (a currently selected icon is marked with four
green dots called handlers around it). Then drag the icon using mouse (push left mouse button on
icon, drag your mouse pointer to the new location and then release the left button).
To reflect real objects orientation in space, icon can be rotated (useful for video cameras)
To rotate icon, drag any of the icon handlers to turn the icon around its center.
www.isscctv.com
SecurOS 49 Administration Guide
Interface Subsystem
Create copy duplicates object icon on map. This is useful, for example, for alarm loops,
where single Sensor object actually represents a garland of alarm sensors attached, for example,
to every window; you can create several icons of the single object in accordance with the real
number of alarm sensors and place each icon on every window depicted on the map.
Hide option marks object as hidden. It will be still visible while in administrative mode, but
will disappear from the map in operator mode.
Map v2
Object represents a graphical editable map of the territory under control and installed objects (see
below).
Parent object: Screen on page 45.
www.isscctv.com
SecurOS 50 Administration Guide
Interface Subsystem
To configure map resource file for Map v2 object use Map2 Editor application.
To create map file using Map2 Editor application:
1. Launch map2.exe file (placed in SecurOS installation folder).The application window will appear
(see figure 31).
2. Click Create button and add at least one layer to a new map (see Working with Map Layers on
page 52).
3. Set a password on map file, if necessary (see Setting Password on page 55).
4. Click Save button to save changes to a new map file. The standard Save As dialog will appear
to define map file name and folder where to save.
1. click Open button in Map2 Editor application window (see figure 31) and choose the required
map file from the SecurOS\maps folder, or add new layers to an empty map (see Working with
Map Layers on page 52). If a password was previously set for the selected map file (see Setting
Password on page 55), a request window will appear, see figure 32.
www.isscctv.com
SecurOS 51 Administration Guide
Interface Subsystem
2. Type in password in Password field and click OK button. The chosen map will be displayed.
The application window consists of the following areas (see figure 33):
Map image
www.isscctv.com
SecurOS 52 Administration Guide
Interface Subsystem
Note: By means of Map2 Editor application it is possible to place/move/remove objects from map,
add/remove maps layers (levels). However, to operate with SecurOS objects (such as, to alarm camera),
use SecurOS map interface in operator mode (see SecurOS User Guide).
1. Double-click add new item in Levels area of Map2 Editor application window. Levels properties
window will appear (see figure 34).
3. Set map image file in Image field. The following image file formats are supported: JPEG, BMP,
PNG, GIF.
4. Click OK button.
www.isscctv.com
SecurOS 53 Administration Guide
Interface Subsystem
To rename current layer, right-click its name in Levels area and choose Properties item from the
drop-down list (see figure 34).
Properties window will appear. Type in a new layer name in Label field.
To set link between layers:
1. Choose the required link from the Level Shortcuts item in Types area (see the note below).
Note: There are two link types for Map v2 object: common and blinking named with (blink) in link
list. The second one works as common link but starts blinking on the corresponding layer alarm. For
example, if one layer is active on SecurOS user map interface and there is an alarm on the other one
then the link map icon will start to blink.
2. Move the selected link to the map area by dragging left mouse button. Once moved, a link icon
will appear on the map (see figure 35).
Note: Link icon can be moved across the map by pushing left mouse button on icon, dragging your
mouse pointer to the new location and then releasing the left button.
To remove a layer from the map, right-click its name in Levels area and from the drop-down list
choose Erase item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see figure 31).
Warning! Identifier must be completely identical (including letters case) to this object ID value
in SecurOS system, otherwise the object would be invisible for an operator.
To replace an object icon, click it and dragging left mouse button move it to the required place.
To rotate an object icon:
www.isscctv.com
SecurOS 54 Administration Guide
Interface Subsystem
1. Click it.
2. Move mouse pointer to the double-side arrow (on the right icon side).
To remove an object icon from map, click it and from the drop-down list choose Erase item.
To save changes and apply it on SecurOS user map interface, click Save button on the Map2 Editor
window toolbar (see figure 31).
Setting Filters
One can use filters to browse only required objects on map (e. g., filter can be configured to display
only cameras).
To create filter:
1. Double click add new item in Filters area of Map2 Editor application window. Filters properties
window will appear (see figure 37).
3. Choose objects to be displayed on the map from the Show types objects tree (see the note
below).
4. Click OK button.
Working with filters parameters (delete or edit them) is similar with the layer ones (see Working with
Map Layers on page 52).
www.isscctv.com
SecurOS 55 Administration Guide
Interface Subsystem
Setting Password
To protect the map from someone editing it is possible to set a password on the map file.
To set a password:
1. Click File button on the Map2 Editor toolbar. The drop-down list will appear.
2. Choose Set password item. New window will appear (see figure 38).
Now to open this map file a password request window will appear (see figure 32).
Event Viewer
Represents a visual log of the events that occur within entire system.
www.isscctv.com
SecurOS 56 Administration Guide
Interface Subsystem
www.isscctv.com
SecurOS 57 Administration Guide
Interface Subsystem
Option Description
A title of the object (read-only; appears automatically after you select
Title
object type and specific ID).
Source object event. The list of events depends on the type of the object.
Event
Omit this field to refer to any events of this object type.
Areas (table of source areas of interest, used to additionally filter objects by their belonging to
the specific areas). To fill the table, use the same operations as in the table above.
External Window
Used to automatically launch external application and position its window on screen.
Parent object: Screen on page 45.
www.isscctv.com
SecurOS 58 Administration Guide
Interface Subsystem
HTML Form
Use this object to define HTML forms permanently displayed on the screen of parent Screen object.
Object is intended for integration of any custom user interface created by means of HTML forms into
SecurOS. SecurOS system includes a number of HTML forms ready to use most often to display PTZ
control panel on a screen (see SecurOS User Guide). Otherwise, a new HTML form can be also
programmed for specific means (see SecurOS Programming Guide).
Object is displayed while screen is active or until SecurOS system shut down.
Note: All system HTML forms are in \dialogscript subfolder of SecurOS folder.
www.isscctv.com
SecurOS 59 Administration Guide
Interface Subsystem
Option Description
By checking this option, you can quickly select a target HTML form file
from the drop-down list of files located in \dialogscript subdirectory
of SecurOS program folder. If this option is not active, you can select
Use standart script
HTML file from any folder by using [...] button that invokes standard
file
Open dialog.
Note: to display PTZ camera control dialog, select file with name cor-
responding to PTZ protocol of the camera.
HTML Dialog
This object is used to define popup HTML windows (these windows are displayed dynamically or from
scripts). Note that HTML Dialog object does not belong to any particular screen due to its dynamic
nature: it can be closed by operator at any time. Basically, this object can be used for creation of PTZ
control dialog windows on the desktop (see SecurOS User Guide)
Parent object: Computer on page 31.
Center on screen Use this checkbox to attach dialog position to the center of the desktop.
(continued on next page)
www.isscctv.com
SecurOS 60 Administration Guide
Interface Subsystem
Option Description
If you check this option, you can quickly select a target HTML dialog file
from the drop-down list of files located in \dialogscript subdirectory
Use default directory of SecurOS program folder. If you uncheck this option, you can select
HTML file from any folder by using [...] button that invokes standard
Open File dialog.
www.isscctv.com
SecurOS 61 Administration Guide
Video Subsystem
Video Subsystem
Video subsystem is used to operate and configure the video devices (video capture cards, analog
and IP cameras, PTZ devices) within the security network, transmit video streams between servers,
concentrators and workstations and work with live and archive video from within workstations.
informational designed to generate a motion detected event, that can be used for scripting
and other purposes. This event would not fire an alarm on the camera, though.
Example: For instance, the user needs to control an area with a gate and several windows seen above the
gate. The task is to make alar activation each time somebody appears at a window whereas to neglect
firing alarms each time the gate is used. In this particular case, it is recommended to set two different
zones for the gate and the windows. The window zone should be configured to fire an alarm upon any
motion detection, while the gate zone should be configured to generate a motion detection event, but not
to fire an alarm. Moreover, if different windows have different types of illumination, you can configure
a lot of zones with different contrast parameters for reliable motion detection.
Both alarming and informational zones should be armed to detect motion. A zone can be configured
to be always armed, meaning an operator does not have to arm it manually (see Zone on page 73).
All the other zones should be armed manually.
www.isscctv.com
SecurOS 62 Administration Guide
Video Subsystem
In operator workstation UI. Assuming that a Video Capture Device object and a Camera object
have been created, administrator has to create a Screen and a Monitor in order for camera frame
to appear.
To configure camera imaging from operator interface, right-click Img button on camera cell and choose
Adjust image item from the menu. Camera imaging control window would appear (see SecurOS User
Guide).
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).
3. Open SOFTWARE\\ISS\\Niss400\\Video key and set the minimal number of video frames in
the buffer by mplayer queue min parameter.
4. Open SOFTWARE\\ISS\\Niss400\\Video key and set the maximal number of video frames in
the buffer by mplayer queue max parameter.
Archive Recording
To avoid situations when there is no free space on disk in case of permanent writing video archive in
SecurOS format from cameras (operative video archive) one should previously set mandatory free disk
space.
To define it, do these steps on the computer keeping operative video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).
3. Open SOFTWARE\\ISS\\Niss400\\Video, create FreeMb key there and define mandatory free
disk space (in MB) for archive recording as its value. Now archiver will record video on the
defined disk till its free space is less than the FreeMb value. On mounting to the FreeMb value
the archiver will try to record to other available disks. If there is no free disks then the ring
recording will be used (old files will be deleted).
www.isscctv.com
SecurOS 63 Administration Guide
Video Subsystem
Warning! To set this key for video concentrator archive, it is necessary to open
HKLM\\SOFTWARE\\ISS\\Niss400\\gate.
When recording video archive it splits into files. Each file contains fixed frames number and after
exceeding this number a new file recording begins. When operator navigates archive records are
scanned in the order of splitting on these files. To make more efficient search on archive, administrator
can change frames number in archive files.
To change frames number in archive files, do these steps on the computer with operative video archive
disks:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).
Warning! To set this key for video concentrator archive, it is necessary to open
HKLM\\SOFTWARE\\ISS\\Niss400\\gate.
Administrator can set duplication of the operative video archive recorded from a certain cameras to a
long-time video archive on any available disk by the help of Archiver object (see Archiver on page 85).
Note: Administrator can set video archive converting from SecurOS format to AVI-format from certain
cameras by the help of Archive Converter object (see Archive Converter on page 84). On this operation
files record into temporary files folder and are converted then.
Objects Reference
System Objects
Video Capture Device
The object represents a single capturing chip of a physical video capture card installed on the computer,
or video hub or IP camera plugged in to TCP/IP network.
www.isscctv.com
SecurOS 64 Administration Guide
Video Subsystem
Note: If add-on camera is analogue choose TVISS4 or TVISS1 (depends on installed capture card
type), if it is an IP-camera choose a value corresponding to the device model, for video hub choose
VideoHub or LinuxHub (depends on device type).
Example: In case of video capture cards, calculate the total number of chips on all video capture cards
and create N objects with N unique PCI Channel parameters. For example, TVISS4-02 and KV2004
cards have four independent video capturing chips onboard and should be represented within a system as
four Video Capture Device objects. TVISS1-02 has one video capturing chip and should be represented
as a single Video Capture Device object.
Note: Always start PCI Channel parameters number from 00 and avoid gaps in numbering. For example,
if there are one TVISS4-02 card and two TVISS1-02 cards on the computer, create six Video Capture
Device objects and set their PCI Channel parameters to 00, 01, 02, 03, 04, 05 and 06 respectively.
www.isscctv.com
SecurOS 65 Administration Guide
Video Subsystem
type of the video signal format (NTSC or PAL) for all other Type
parameter values
www.isscctv.com
SecurOS 66 Administration Guide
Video Subsystem
Option Description
Define frame size of compressed video feed. Valid for VideoHub,
PelcoNET 530x, Pelco IP370IH-ZX, Mobotix, Panasonic, Arecont,
iCanTek device types only. Possible values:
Normal CIF1 (1/4 of original frame size). For Mobotix devices cor-
responds to VGA 640 480 resolution, for Panasonic QVGA
320 240 resolution
Compressed
High CIF2 (half-frame). For Mobotix and Panasonic devices corre-
Resolution
sponds to Megapixel 1280 960 resolution
www.isscctv.com
SecurOS 67 Administration Guide
Video Subsystem
Option Description
Select from the list configuration parameters of the digitization. The list
is active only for TVISS device types in multiplexing mode.
Camera
This object represents physical CCTV camera or other analog video source.
Note: If at least one Region object (see Region on page 36) is registered in the system, then the Region
drop down list box would be accessible to choose a region of a new camera placement in Creating
parameters window when creating new Camera object.
Note: In case of Mobotix video capture device and Both video signal format create two cameras with
channels 1 and 2 for correct video signal recept. Then, camera on channel 1 would display video from the
left camera lens, whereas camera on channel 2 from the right lens.
www.isscctv.com
SecurOS 68 Administration Guide
Video Subsystem
www.isscctv.com
SecurOS 69 Administration Guide
Video Subsystem
Option Description
If the camera can be controlled by a PTZ device, select a PTZ Device
object containing a list of PTZ presets that represents the corresponding
Pan/Tilt/Zoom device (see PTZ Device on page 83).
Note: corresponding list of presets will be displayed in PTZ control
panel on a monitor when operator selects this camera.
You can assign a Microphone object to this camera, so you can syn-
chronously record audio with video and to listen to audio from this
Microphone
microphone when you select video camera from within operator inter-
face.
Video archive
Codec Profile Select a profile from a predefined list.
Define a compression level/quality for this camera. There are five dis-
crete compression levels. Boundary values are:
www.isscctv.com
SecurOS 70 Administration Guide
Video Subsystem
Option Description
Set this option to protect the video archive for this camera with a pass-
word (this will apply to newly created video records; current archive
will remain untouched). Specify the password twice (to avoid typos).
To view password-protected cameras from operator interface later, you
Protect archive with will need to specify the same password in camera settings within the
password Monitor object settings (see Monitor on page 87). This password will
also be requested to view and convert video archive from ISS Media
Export Utility (see ISS Media Export Utility on page 123). For this
setting to take effect, you must restart video server that has the target
camera connected to.
Blinding detector (settings for blinding detector)
Select this check box to generate special events each time blinding is
Notify about blinding
detected. These events can be used in macros.
Detection size sensitivity slider. Boundary values:
50% blinding will be detected if 50% of the frame area has low con-
Size trast.
100% only full blinding (entire camera view has low contrast) will be
detected.
Min only areas of minimal contrast are taken into consideration (e. g.
Contrast evenly colored surfaces like sheet of paper).
Max areas with higher contrast are also taken into consideration.
Defocusing detector
Notify about Select this check box to turn on defocusing detector. This detector is
defocusing used to detect camera focus failure.
Defocusing detector sensitivity. Boundary values:
www.isscctv.com
SecurOS 71 Administration Guide
Video Subsystem
Option Description
Alarm recording
If this option is turned on, video will start recording automatically when
a motion by this camera is detected, and will stop automatically when
Record alarms
motion ends. Recommended for working with DVR search panel (see
SecurOS User Guide).
Hot recording is a feature of temporary increasing the quality of the
video from camera immediately when motion is detected and recording
starts. Possible values:
Whole alarm is hot hot recording lasts during the whole alarm.
Set the duration of pre-recording phase, in seconds. The more the length
Pre-recording phase
of this phase, the more RAM is used to cache video. If not set or set to
duration
zero, pre-recording wont be used.
Set the maximum duration of hot phase, in seconds. Used in conjunction
Hot phase duration
with Use hot recording mode.
Post-recording phase Set the duration of post-recording phase, in seconds. If not set or set to
duration zero, post-recording wont be used.
Set the frame rate of hot phase, in frames per second (fps). This field is
accessible when Use hot recording or Whole alarm is hot values
are chosen in Hot recording mode list. This frame rate should be
Hot phase frame bigger than the value in Normal frame rate field (see next parameter).
rate The frame rate can not exceed physical frame rate of the video from
the camera. That is if your camera supplies video with 5 fps setting
more that 5 fps will give no effect. If not set, uses original fps value of
camera video feed.
Set the normal frame rate in fps. This rate is used on prerecording,
alarm and post-recording phases. If the Whole alarm in hot mode is set,
Normal frame rate use Hot phase frame rate instead. The frame rate can not exceed
physical frame rate of the video from the camera. If not set, uses original
fps value of camera video feed.
(continued on next page)
www.isscctv.com
SecurOS 72 Administration Guide
Video Subsystem
Option Description
Image settings (settings that affect image quality, colors, etc.). Attention: all these settings
affect the video being stored in archive. These are NOT view-only settings!
If this camera is connected to TVISS1-02 or TVISS4-02 video capture
device, you can set individual resolution for this camera here. Possible
values:
Use this option to turn on automatic gain control (AGC) hardware fea-
ture of your video camera. Not all cameras support this function.
Automatic Gain
Note: For active video channels, Auto Gain field in image settings
Control
context menu (see SecurOS User Guide) would be permanently active
whether this option is enabled or not.
This option enables software image deinterlacing on full resolution video.
Choose type of deinterlacing from the list box. Possible values:
www.isscctv.com
SecurOS 73 Administration Guide
Video Subsystem
Option Description
Adjust hardware saturation setting with this slider. Option is available
Saturation
when Colour feature is disabled.
Zone
Represents single detection zone of the motion detector (see Working Principles Of Motion Detection
Zones on page 61 for detailed information). One default zone Main is created automatically when
Camera object is created.
Note: Graphical configuration of detection zones is performed from the operator interface (see SecurOS
User Guide).
Contrast slider defines a threshold for object contrast, relative to the background. Top position
of the slider means the zone would detect motion only if a moving object differs greatly from
the surroundings. Bottom position of the slider means the zone would detect motion even if
a moving object slightly differs from the surroundings.
Size slider defines a threshold for object size. Top position of the slider means the zone would
detect motion of big objects only. Bottom position of the slider means the zone would detect
motion of small objects.
Note: The values of the Contrast and Size sliders should be set by practical consideration.
Alarming flag should be active to fire an alarm on the camera upon any motion detection within
the zone. If this flag is not checked, the zone is considered informational.
Always armed flag should be active to have the zone always armed, regardless of the
armed/unarmed state of other zones on the same camera.
www.isscctv.com
SecurOS 74 Administration Guide
Video Subsystem
Armed always Set this option if you want to forbid operator to disarm this zone.
Set this option if you want to enable DVR search panel, see SecurOS
User Guide). If the checkbox was selected then the following events will
be detected (its time intervals will be recorded to database also):
alarms for all moving objects which size is more then md2 alarm size
parameter value, see
alarms for all objects (which size is more then md2 alarm size pa-
Smart Search rameter value) movements in each 10 10 cell
www.isscctv.com
SecurOS 75 Administration Guide
Video Subsystem
Option Description
Motion detection
Detection size sensitivity slider. Boundary values:
Zones separated from the Main zone are recommended to create for each secured area within the
camera view.
Each Motion detector object has a pre-configured zone named Main. This zone by default covers all
the camera space. Editing zone shape is implemented through the camera monitor in operator interface
(see SecurOS User Guide)
Note: To avoid drawing delay disable Hyper Threading item in BIOS. This note is for CPU Pentium
IV only.
Light Detector
Represents detector of contrast between inner and outer zones.
www.isscctv.com
SecurOS 76 Administration Guide
Video Subsystem
Inner zone Name of the inner zone object. Select from the list.
Outer zone Name of the outer zone object. Select from the list.
Outer zone Name of the secondary (additional) outer zone object to check light level
(secondary) by comparison with two independent zones. Select from the list.
www.isscctv.com
SecurOS 77 Administration Guide
Video Subsystem
ZOD can work on grayscale or color images. Color mode can significantly increase the accuracy of
object detection if there is a low contrast between object and a background. Grayscale mode offers
a special brightness compensation algorithm (BCA) to reduce effect from camera lens auto iris.
To increase the performance of the detection algorithm, the environment should meet the following
requirements:
There should be no great changes in light conditions when object is present in zone.
There should be no dynamic background (e. g. windows, waving curtains, blinking lamps, TV
sets and so on) within a zone.
1. Create a Zone object under certain Camera object, and define (draw) this zone from within
operator interface (see ).
2. Create a Zone Object Detector object for the same Camera object that references the Zone
object from the step above and uses it as an area of interest.
Several Zone Object Detector objects can be created for a single camera, and each such object can
reference independent Zone object. This will allow to determine the position of the dynamic object
within a camera view.
Note: Dynamic objects can cross several zones within short time periods while moving. To avoid false
alarms there is a delay parameter in Zone Object Detector object settings, which prevents duplicate object
detection within specified amount of time.
www.isscctv.com
SecurOS 78 Administration Guide
Video Subsystem
www.isscctv.com
SecurOS 79 Administration Guide
Video Subsystem
Option Description
Compensation for brightness (brightness compensation algorithm settings, valid for grayscale
video only)
System reacts on detecting any object in camera view (zone). So it is necessary to define such object
size to avoid alarm situations caused by insignificant motion but enough to detect alarm one.
To set a detected object minimal size:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).
3. Open HKLM\\ISS\\VIDEO md2 alarm size and set a detected object minimal size. Possible
values: 0...255. Default value 100.
Video Concentrator
Represents video concentrator engine. For more information on video concentrators and routing video
see SecurOS Installation Guide. Do not create Video Concentrator objects on application servers that
already process video from attached cameras. Use free (not used) servers instead.
www.isscctv.com
SecurOS 80 Administration Guide
Video Subsystem
ID ID of a Camera object.
Name of a Camera object. You can use either ID or Title to specify
Title
target camera.
Optional: select another video concentrator to get this camera video
Video concentrator feed from. This is used to make chains of video concentrators. If no
concentrator is specified, video is taken directly from video server.
Optional: select the maximum frame rate of the video feed delivered to
Fps clients. The frame rate cannot exceed physical frame rate of the video
from the camera. If not specified, original frame rate is used.
(continued on next page)
www.isscctv.com
SecurOS 81 Administration Guide
Video Subsystem
Option Description
Optional: select the compression type of the video that will be trans-
mitted to the clients (if the source and target compression levels differ,
Compression video will be recompressed). If not specified, original compression is
used. Use the recompression feature with caution, since it consumes
much CPU resources.
Do recording on discs (table of available hard disks with permissions to store video on each of
them). Adding or deleting table elements is the same as for Cameras table.
Video Read Only read-only access (video archive can be read from this
disk, but writing to this disk is disabled).
PTZ Controller
Represents interface (e. g. RS485 port or serial communication port with RS232 to RS485 converter
attached if PTZ device works through the RS232/RS485 interface, or a network device), which is used
to connect PTZ devices to, and a specific PTZ protocol.
www.isscctv.com
SecurOS 82 Administration Guide
Video Subsystem
Protocol type Select from the list box the required PTZ protocol to control PTZ device.
Computers (or video hubs) serial communication port that has RS232
Port to RS485 converter attached. For PTZ devices integrated with camera,
use default value, as well as for Speed and Parity fields.
Speed of the data transmission. Consult PTZ device documentation for
Speed information on required speed value. The lesser speed, the more reliable
is communication. 9600 is a typical value.
Serial communication settings. Consult PTZ device documentation for
information on required settings.
Note: If the PelcoNET 350 device type was selected for the Video
Capture Device object then the following protocol configurations are
Parity, DTR, RTS possible:
selected DTR and non-selected RTS check boxes the RS-232 protocol
www.isscctv.com
SecurOS 83 Administration Guide
Video Subsystem
Option Description
Check this option to work with PTZ device over the network.
Optional: select video hub (Video-Hub, LinuxHub) or IP camera (e. g.
AXIS or Bosch) from the drop down list box to use it as a proxy to
Use remote hub
transmit PTZ commands. If a video hub is selected, the port settings
above will apply to hubs serial port (video hubs usually have single
serial communication port).
PTZ Device
Represents physical PTZ device connected with a camera through RS485 interface or integrated with
a camera (analog or digital), and a list of its patrol routes (presets).
Note: When you create new PTZ Device object, its ID should match unique RS485 ID of the physical
device (in case of using the camera analog connection only). ID is set on device by DIP switches (consult
PTZ device documentation for more information). ID should be in 0. . . 255 range as single RS485 line
can address up to 256 devices.
Note: Name of this PTZ Device object has to be chosen from corresponding list in the Camera object
properties window of the camera controlled by this PTZ device (see Camera on page 67.
Note: To control PTZ device through HTML form, it is necessary to indicate an identifier of the
corresponding PTZ Device object in the Address field of the PTZ dialog window (see SecurOS User
Guide).
www.isscctv.com
SecurOS 84 Administration Guide
Video Subsystem
Archive Converter
Used to convert remote servers video in SecurOS format to AVI or ASF format. It is recommended
to set special folder or logical disk for temporary files before archive converting, see .
Parent object: Computer on page 31.
www.isscctv.com
SecurOS 85 Administration Guide
Video Subsystem
Option Description
Archiver
Used to write video from predefined cameras to long-time archive (video in SecurOS format). It is
recommended to define the required free disk space before archive recording, see below.
Parent object: Computer on page 31.
www.isscctv.com
SecurOS 86 Administration Guide
Video Subsystem
Drives
List of hard disks. To enable or disable reading/writing to one select the
HDD
corresponding value from the drop-down list box in Mode row.
List of readable disks. To enable or disable reading from one select the
CD/DVD
corresponding value from the drop-down list box in Mode row.
Cameras table (list of cameras to archive video from). To add several entries into the table, use
button. To delete entry from the table, select required row and press Ctrl + Delete keyboard
shortcut.
Click this button to populate the Cameras table with all cameras
All
within security network.
(continued on next page)
www.isscctv.com
SecurOS 87 Administration Guide
Video Subsystem
Option Description
ID ID of a Camera object.
Name of a Camera object. You can use either ID or Name to specify
Name
target camera.
To avoid situations when long-time video archive is completely updated immediately rather than step
by step one should previously set mandatory size of old files to be deleted on the ring (repeat)
recording.
To define it, do these steps on the computer keeping long-time video archive:
1. Shutdown SecurOS.
2. Launch the system utility for registry editing (type regedit in Start Run box and click
OK).
3. Open SOFTWARE\\ISS\\Niss400\\Archiver, create ringSize key and define size (in MB) of
old files to be deleted on the ring recording.
www.isscctv.com
SecurOS 88 Administration Guide
Video Subsystem
ID ID of a Camera object.
(continued on next page)
www.isscctv.com
SecurOS 89 Administration Guide
Video Subsystem
Option Description
Name of the camera object. You can use either ID or Camera to specify
Camera
target camera.
Optional: select a video concentrator to get this camera video feed from.
Video concentrator
If no concentrator is specified, video is taken directly from video server.
Optional: select the maximum frame rate of the video feed delivered to
Fps clients. The frame rate cannot exceed physical frame rate of the video
from the camera. If not specified, original frame rate is used.
Optional: select the compression type of the video that will be trans-
mitted to the clients (if the source and target compression levels differ,
Compression
video will be recompressed). If not specified, original compression is
used.
Optional: set the token string (unique ID) to activate titles as overlay
on video of this camera cell using script commands. That is if you want
to display titles from POS subsystem, use pos N as token string where
N is the ID of the POS Terminal object attributed to this camera, and
Token
use this value as a parameter for script commands of adding or deleting
titles.
Note: titles are displayed only when Display titles option is enabled
(see below)
Optional: if the source came is password-protected, you should specify
the password to be able to watch video from this camera. If a password
Password
does not match, in monitor you will see a green canvas instead of real
video.
(continued on next page)
www.isscctv.com
SecurOS 90 Administration Guide
Video Subsystem
Option Description
Monitor type
Show all cameras This mode is enabled by default. Monitor displays a fixed list of cameras
from table above specified in the table.
Monitor mode. Possible values:
Normal default mode. All cameras are in live video mode, operator
may enter and leave archive mode by any camera. Operator may
enter and leave DVR mode. PTZ control panel is available if the
Show PTZ control option is activated;
DVR + MaskSearch the same as DVR only but only search for active
camera mask mode becomes accessible in Search DVR panel;
DVR + CameraSearch the same as DVR only but search for multiple
cameras mode becomes accessible in Search DVR panel;
LPR the same as DVR only but only one active camera is shown,
Search DVR panel is absent;
Map (2x vertical) mode for wide screen live video viewing, only
one active camera is shown, control panels and cameras block are
absent.
Check this option for the monitor to display control toolbar. Toolbar
options include switching between layouts, cameras, list cameras by
Show control toolbar
pages manually or automatically, view alarm log for target cameras,
etc.
Check this option to show PTZ control panel. The panel is active only
Show PTZ control for active PTZ camera displays in live mode. Otherwise PTZ control
panel is blocked.
Show camera list Check this option to show camera block in user interface.
(continued on next page)
www.isscctv.com
SecurOS 91 Administration Guide
Video Subsystem
Option Description
Specify a delay in seconds between automatic switching of named layouts
Dwell time or page flipping on a monitor. Default value is 1. See SecurOS User
Guide for more information on that feature.
Check this option to automatically display on this monitor a set of
Show alarm cameras cameras that are currently in alarm state for the current Computer
only object. Set the values in Min and Max fields (see below) to limit the
minimum and the maximum number of displayed alarm cameras.
Set the minimum (1. . . 16) and maximum (1. . . 16) numbers of alarm
cameras displayed. Numbers will be rounded up to a higher value of
Min, Max either 1, 4, 9 or 16 in accordance with a layout selected for the monitor.
If there will be more than Max alarm cameras at the same time, only
the most recent cameras will be displayed.
Check this option to automatically displays each time on this monitor
only one currently active camera from another monitor for the same
Screen object. The table of cameras is used to define or override video
settings for some cameras to display. If the camera is not in the list, its
Show single active
default video settings will be used, and video feed will be taken directly
camera only
from video server.
Note: this additional (active) monitor is recommended to create for
more comfortable work with another monitor containing large number
of cameras.
(continued on next page)
www.isscctv.com
SecurOS 92 Administration Guide
Video Subsystem
Option Description
Common options
Select hardware acceleration type for displaying video. Possible values:
Choose a priority for controlling PTZ devices from this monitor. Select
PTZ control priority
Deny to completely disable this feature for monitor.
Select Archive Converter object used to export video (see Archive Con-
Export Engine verter on page 84). Warning: it is not possible to export a video
sequence if this parameter is empty!
Select Archiver object used to write video in archive (see Archiver on
page 85). On selecting archive mode (see SecurOS User Guide for more
Archive Engine information) Long-time mode will become accessible.
Note: the monitor will play archive video from cameras that are defined
in Archiver object settings.
www.isscctv.com
SecurOS 93 Administration Guide
Video Subsystem
Warning! To display correctly all interface elements in the monitor DVR mode, it is recom-
mended to set physical display resolution to no less than 1280 1024 and the W, H monitor
parameters to no less than 80.
Archiver Dialog
Used to manage the archiving video as well as to write it on CD and get information (log) about
archiving status.
www.isscctv.com
SecurOS 94 Administration Guide
Video Subsystem
ID ID of an Archiver object.
Name of an Archiver object. You can use either ID or Name to specify
Name
target camera.
Configuration Examples
Standalone Configuration
Original problem: a single computer with one TVISS1 (single-chip) video capture card and two CCTV
cameras connected to it. Computer should be used not only to capture and record video, but to monitor
cameras also (see figure 56).
www.isscctv.com
SecurOS 95 Administration Guide
Video Subsystem
Solution:
1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter:
Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).
2. Create Video Capture Device object (see Creating Objects on page 14).
Channel number set the actual number of the labeled BNC connector the first camera
is attached to.
Channel number set the actual number of the labeled BNC connector the second camera
is attached to.
6. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:
X 0.
Y 0.
W 100.
H 100.
Now you will see a full-screen monitor with live video from two cameras.
www.isscctv.com
SecurOS 96 Administration Guide
Video Subsystem
Solution:
1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter.
Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).
2. Create Video Capture Device object (see Creating Objects on page 14).
3. Create Camera object with the following parameter:
Channel number set the actual number of the labeled BNC connector the first camera
is attached to.
4. Create second Video Capture Device object with the parameter:
PCI channel 01 (unique PCI channel number).
5. Create Camera object with parameter:
Channel number set the actual number of the labeled BNC connector the second camera
is attached to.
6. Create Computer object with ID equal to NetBIOS name of computer to be used as workstation,
and set the following parameter:
Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.
www.isscctv.com
SecurOS 97 Administration Guide
Video Subsystem
8. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:
X 0.
Y 0.
W 100.
H 100.
9. Launch SecurOS client on operator workstation and specify video server IP address (or
DNS/WINS name) when prompted.
When client has started, you will see on its display a full-screen monitor with live video from two
server-side cameras.
Figure 58: Object tree for server-concentrator-workstation configuration, PTZ device configuration
Solution:
1. Open Computer object properties (see Editing Objects Properties on page 14) and setup the
following parameter.
www.isscctv.com
SecurOS 98 Administration Guide
Video Subsystem
Disks to store archive set Read/Write access for video for at least one hard disk (e. g.
for C:).
3. Create PTZ Device object with ID equal to identifier of PTZ device defined by DIP switches
(consult manufacturers manual for information on setting up your PTZ device).
Channel number set the actual number of the labeled BNC connector the second camera
is attached to.
Pat/Tilt/Zoom select the PTZ Device 1 from the drop-down list.
6. Create Computer object with ID equal to NetBIOS name of computer to be used as video
concentrator, and set the following parameter:
Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.
7. Create Video Concentrator object. In its properties window click All button to assign all cameras
to this concentrator. Set the parameters:
Do recording on disks set Read/Write access for video for at least one hard disk (e. g.
for C:).
8. Create Computer object with ID equal to NetBIOS name of computer to be used as workstation,
and set the following parameter:
Network address IP address or DNS/WINS name of the computer within local TCP/IP
network.
10. Create Monitor object. In its properties window click All button to assign all cameras to this
monitor. Set the parameters:
X 0.
Y 0.
W 100.
H 100.
www.isscctv.com
SecurOS 99 Administration Guide
Video Subsystem
11. Launch SecurOS server application on both video server and video concentrator. Then launch
SecurOS client application on operator workstation and specify video server IP address (or
DNS/WINS name) when prompted.
When client has started, you will see on its display a full-screen monitor with live video from
camera.
Joystick Configuration
Joysticks can be used for PTZ video monitor control (see SecurOS User Guide). Configuration and
setting procedure for joystick has some hints.
To configure joystick:
1. Connect joystick to a computer of SecurOS network. The device will be detected automatically
or drivers should be installed.
2. Find the installed joystick in the devices list (Control Panel Game Controllers) and write
down its name exactly as in the list (for example, Joystick Name).
4. Click the Properties button in game controllers list, then Calibration tab in the appeared
window. Calibrate installed joystick buttons and control sticks.
Warning! Calibration procedure is absolutely necessary otherwise a joystick will not function
in SecurOS!
www.isscctv.com
SecurOS 100 Administration Guide
Audio Subsystem
Audio Subsystem
Audio subsystem is used to operate and configure the audio devices (audio capture cards, microphones)
within the security network, transmit audio streams between servers, concentrators and workstations
and work with live and archive audio from within workstations.
Objects Reference
System Objects
Audio Capture Device
Represents stereo audio input source of a physical audio board installed in the system, or audio capture
chip of a video capture device (TVISS1 or TVISS4).
Parent object: Computer on page 31.
www.isscctv.com
SecurOS 101 Administration Guide
Audio Subsystem
Microphone
Represents single mono channel. To record stereo signal, use two Microphone objects connected to
the same Audio Capture Device object and using two different channels (Left and Right).
Parent object: Audio Capture Device on page 100.
www.isscctv.com
SecurOS 102 Administration Guide
Audio Subsystem
Option Description
Voice Operated Control (feature of automatic sound recording upon reaching threshold volume;
this feature is disabled for microphones linked with video cameras for synchronous video + audio
recording; see Camera on page 67 for more information)
Threshold level (-60. . . 0 dB). When volume reaches this level, auto-
matic sound recording starts. Use Level indicator above to visually
Level
estimate current volume level. If set to Off, voice operated control
feature is disabled.
Minimum amount of recording, in seconds. Recording continues while
Delay volume is higher than threshold level but not less than the specified
amount in seconds.
www.isscctv.com
SecurOS 103 Administration Guide
Audio Subsystem
Sound Card Select an audio output line to play audio files through.
Select target channel to play audio through. You can select either mono
or stereo output (stereo means pseudostereo: it just plays the same mono
Channel to play sound on both channels). You can choose the same audio channel for
several audio players, in this case system will mix all sounds together,
if you play audio on several players simultaneously.
Table of audio sources (defines a list of registered audio sources that should be available from
this audio player)
www.isscctv.com
SecurOS 104 Administration Guide
I/O Subsystem
I/O Subsystem
I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays) and
controlling keyboards (see Keyboard on page 105) within the security network.
Note: General purpose I/O devices are connected to specialized TVISS8IO plates (see SecurOS Installa-
tion Guide).
Objects Reference
Sensor
The object represents a physical sensor device or a daisy chain of sensors (security loop).
Parent object: Video Capture Device on page 63.
Alarm condition
Alarm when switch
Trigger alarm state when contacts are short circuited.
on
Alarm when switch
Trigger alarm state when contacts are open.
off
(continued on next page)
www.isscctv.com
SecurOS 105 Administration Guide
I/O Subsystem
Option Description
Select the most appropriate sensor type (this only changes devices icon
Hardware
on map, but not its behavior).
Relay
The object represents a physical executive unit (e. g. relay) that controls any device.
Parent object: Video Capture Device on page 63.
Keyboard
Object represents a specialized keyboard for operator mode system control. Up to 10 keyboards with
programmed command set can be connected to the system.
When creating Keyboard object, define which keys are responsible for each system object. To do this,
use special configuration file keyb N.ini supplied with keyboard, where N is an identifier of created
Keyboard object. That file should be placed in SecurOS root folder. One may change this file on ones
discretion to program keys different assignment.
Parent object: Computer on page 31.
www.isscctv.com
SecurOS 106 Administration Guide
I/O Subsystem
www.isscctv.com
SecurOS 107 Administration Guide
Notification Subsystem
Notification Subsystem
Notification subsystem allows to inform personnel of events within security network by the means of
e-mail, voice phone calls, SMS messaging and audible notifications.
Objects Reference
www.isscctv.com
SecurOS 108 Administration Guide
Notification Subsystem
E-mail Message
Represents an individual e-mail message (or a message template).
Parent object: E-mail Message Service on page 107.
Message field Message body. You can specify variable parameters here.
You can specify one or more files that should be attached to the message.
You can browse for single file using [...] button. If you need to specify
Attachment
more than one file, type their names manually, separating them by
semicolons (e. g. c:\temp\image.jpg; c:\temp\log.txt).
(continued on next page)
www.isscctv.com
SecurOS 109 Administration Guide
Notification Subsystem
Option Description
You can optionally pack all the specified attachments into single archive
Pack file. Select an archiver that will be used for compressing files, or leave
this field blank to send attachments as uncompressed files.
Short Message
Represents an individual SMS message.
Parent object: Short Message Service on page 109.
www.isscctv.com
SecurOS 110 Administration Guide
Notification Subsystem
Note: You should properly install voice-modem drivers (both base modem drivers and audio drivers) for
this feature to work properly.
Due to technical reasons, modem device name in Windows should not contain @ symbols.
www.isscctv.com
SecurOS 111 Administration Guide
Notification Subsystem
Option Description
If enabled, modem uses pulse dialing mode by default. If disabled,
a tone dialing mode (using DTMF tones) is used by default. You can
Pulse
later override the default pulse/tone dialing mode using special symbols
in phone number for individual Voice Message objects.
Redial attempts The number of redial attempts, if the target phone is busy.
Time between redial
Set the time between redial attempts, in seconds.
attempts
If this option is enabled, modem will wait for a dialtone before dialing
Wait for dialtone
number.
Voice Message
Represents single voice message.
Parent object: Voice Message Service on page 110.
www.isscctv.com
SecurOS 112 Administration Guide
Notification Subsystem
www.isscctv.com
SecurOS 113 Administration Guide
Notification Subsystem
Utility (see ISS Object Types Database Editor on page 132). All sounds should be placed to \wav
subdirectory of SecurOS program folder.
Parent object: Computer on page 31.
Sound card Select an audio output line to play audio files through.
Set output sound channels (left, right, or both). Use NONE value to
Channel
temporarily disable audible notifications.
www.isscctv.com
SecurOS 114 Administration Guide
Automation Subsystem
Automation Subsystem
Automation subsystem provides means to interconnect reactions on events within security network,
thus building custom logic within entire security network.
Working Principles
Macros
Macros are used to define the links between the events and system actions. Every system object has
its own set of events, and you can use visual tools to select the system reactions for them. These
definitions are stored as a special system object called Macro.
Macros are a special group of system objects called virtual objects. When you create the first Macro,
a new Macros group is added to the objects tree. All macros you create are located in this group of
SecurOS system objects (see SecurOS Programming Guide for more information).
Scripting
SecurOS provides the scripting language that can be used to describe and program complex scenarios.
In these scenarios, you can define the system behavior for some specific cases or just set the SecurOS
system reactions to the events triggered by SecurOS objects. You can use scripting tools for any
physical or virtual system object, for example, camera, screen or reader as well as Screen or Macro.
The process of creating the scripts is described in the SecurOS Programming Guide.
Objects Reference
Macro
Used to define SecurOS system behavior by linking source objects events to target objects actions.
Parent object: Security Zone on page 20.
www.isscctv.com
SecurOS 115 Administration Guide
Automation Subsystem
www.isscctv.com
SecurOS 116 Administration Guide
Automation Subsystem
Option Description
Target object ID. You can omit ID to refer to any objects of the specified
ID
type within security network.
Title of the object (read-only; appears automatically after you select
Title
object type and specific ID).
Action to perform on object. The list of actions depends on the type of
Action
the object.
Program
Used to define programs (scripts) to program SecurOS behavior in custom way. See SecurOS Pro-
gramming Guide for information on creating scripts.
Parent object: Security Zone on page 20.
www.isscctv.com
SecurOS 117 Administration Guide
Automation Subsystem
Script text area Text area which contains script body itself.
IIDK Interface
This is a service for external connection to SecurOS via IIDK protocol. Create this object on one or
more computers that will act as IIDK servers. See SecurOS Programming Guide for more information.
Parent object: Computer on page 31.
Object has no properties to alter.
www.isscctv.com
SecurOS 118 Administration Guide
Check that the mainboard is in the list of supported hardware. See for a list of tested main-
boards.
Remove the power supply cord from the system unit, remove all newly installed PCI expansion
cards, reconnect the power supply and try to boot your computer once again. If it boots correctly,
proceed to next step. Otherwise, contact your system installer for further assistance.
Remove the power supply cord from the system unit, install just one (any) expansion card,
reconnect your power supply and turn the computer on. If the computer boots up correctly,
repeat this step for each card you should install. Otherwise, proceed to next step.
Try to re-install the problematic card to any other spare PCI slot. If the card works at the new
location, the problem might be either there is bad contact for that PCI slot (physical defects,
bending, etc.) or some other defects with mainboard. We recommend you to vacuum clean the
PCI slot, install the card gently and try to boot up again. If the problem persists, contact your
system installer.
When I start SecurOS setup, an information dialog Another copy of SecurOS is installed on this
computer. . . appears. What does it mean?
This means that SecurOS is already installed on this computer, or that the previous version has not
been uninstalled properly. Please consult section for more information on upgrading SecurOS.
I cannot find key.iss file on provided installation CD / Ive lost my original installation CD. Where
can I obtain this file?
Please contact your system installer or Technical Support Team. See for contact information.
When I start SecurOS, it halts with error message. What should I do?
www.isscctv.com
SecurOS 119 Administration Guide
www.isscctv.com
SecurOS 120 Administration Guide
Computer cannot connect to the guide server. How can I solve the problem?
Try to ping the specified IP address from current computer using ping utility. See for more
information. If the ping does not work, check firewall settings on both guide server and your
computer and open required TCP/IP ports, listed in .
Try to make the reverse ping of your computer from the guide server using ping utility. If the
ping does not work, check network and firewall settings again.
Check the computers real IP address using ipconfig utility (see ) and see if it is registered
properly on the guide server. Note that if your computer has dynamic IP address, you should
register its DNS name, not IP address, within SecurOS network.
www.isscctv.com
SecurOS 121 Administration Guide
ISS System Report Utility (ISSInfo.exe). Collects system information required by ISS
Technical Support (see ISS System Report Utility on page 122).
ISS Media Export Utility (Backup.exe). Plays archived video/audio, exports selected parts
of archive to AVI, WAV and BMP files (see ISS Media Export Utility on page 123).
ISS Video Archive Conversion Utility (Convert.exe). Converts archives from old format,
performs indexing and integrity checking on archives (see ISS Video Archive Conversion Utility
on page 127).
DSAdmin Utility (dsadmin.exe). Defines databases for registering data, protocol and video
(see DSAdmin Utility on page 130).
ISS Database Update Utility (idb.exe). Defines access to database: to update and configure
(see ISS Database Update Utility on page 131).
ISS Object Types Database Editor (DDI.exe). Editor for SecurOS object types database (not
the actual database itself) (see ISS Object Types Database Editor on page 132).
www.isscctv.com
SecurOS 122 Administration Guide
This utility is intended for gathering technical information about SecurOS installation and your com-
puter (see figure 75). This information is necessary to resolve problems and will always be requested
www.isscctv.com
SecurOS 123 Administration Guide
by the Technical Support Team. ISS System Report Utility collects the following data: all version
of *.exe, *.dll and *.log files in SecurOS folder, key.iss, niss.mdb, video.cfg files, *.nis,
*.dlg, *.dbi and *.ddi files, SecurOS registry keys and generic computer system information.
Note: ISS System Report Utility does not collect any private information.
www.isscctv.com
SecurOS 124 Administration Guide
This utility (see figure 76) is used to export video archives to AVI, ASF and BMP files to view on
any computer without the SecurOS has to be installed.
To export video :
2. Define the Start time and Stop time items for archive search.
3. Optionally, define password for video archive in Export Settings dialog (see figure 77) (click
Settings button to open dialog). You will be asked for a password if current password is not
suitable for selected camera.
4. Click Rescan archive button to scan for media that fits given object and time range. If the
archive is password-protected and the password from Export Settings dialog is not set or not
valid, you will be asked for password.
5. Use slider or Rewind / Forward buttons to navigate through the selected time range. Use
Play / Stop buttons to start and stop playback.
7. Define export settings (video/audio codecs, output directory, etc.) in Export Settings dialog,
make sure you specify valid password for video archive if video is password-protected.
8. Click Export button to start the procedure. The process may take several minutes depending
on the length of the video and export settings.
9. While exporting is in progress, you can click Stop button to stop export at this point. The part
that has already been exported will be saved as AVI.
Note: While playing or navigating through archive click Save frame to BMP button to export single
video frame in BMP format. Files will be saved to the directory defined in Export Settings dialog.
www.isscctv.com
SecurOS 125 Administration Guide
File type Select option corresponded to output file format (AVI or ASF).
If your video archive is password-protected, set the valid
Password
password here before exporting video.
Codecs
required video codec from a list of available codecs. Consult the
Video codec manufacturers documentation on video codecs for detailed
information on their characteristics.
(continued on next page)
www.isscctv.com
SecurOS 126 Administration Guide
Option Description
required audio codec from a list of available codecs. Consult the
Audio codec manufacturers documentation on audio codecs for detailed
information on their characteristics.
Command-line parameters
You can use ISS Media Export Utility from command-line and from batch files to automate the
exporting process. When executed from command line, currently defined export settings will be used.
To change these settings, open ISS Media Export Utility in normal (windowed) mode, setup export
parameters, then close utility.
Note: Before starting the converter from the command line you should select a video codec that will be
used for the file converting. To do this, enter into the graphical interface and select the required codec
on the setup panel.
www.isscctv.com
SecurOS 127 Administration Guide
--out <out file> resulting file name. Example: out.avi for video and out.wav for audio
--cam <camera number> camera number video archive of which are converted
--span <span size> span to fragments up to Mb [set a value or type in dvd on using
DVD disk (4.7 GB); cd on using CD disk (650 MB)
--from <start date time> start date/time of the archive to export. Example:
19-02-05 00:00:00
--to <end date time> end date/time of the archive to export. Example:
20-02-05 23:59:59
Example 1:
backup --cam 1 --from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span 2
Description: export video archive by camera 1 for the defined period spanning to fragments up to
2 Mb.
Example 2:
backup --out "c:\custom path\pwnage.avi"
--from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span cd
Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).
Note: Camera number and another settings are taken from the utility configuration.
Note: When migrating video archives from one server to another, place files to the \Video folder on
any local hard drive (i. e. C:\Video, D:\Video), otherwise you will need to specify their location
explicitly with /DIR: command-line switch (see below).
www.isscctv.com
SecurOS 128 Administration Guide
If you start utility with /? parameter, you will get the help on syntax and available switches.
This utility configures SecurOS to run as Windows service or as a normal Win32 application (see
figure 78). If you choose Run as service, SecurOS will start automatically at operating system
startup.
www.isscctv.com
SecurOS 129 Administration Guide
It is recommended to register automatic start of SecurOS service for correct work of SecurOS and to
set dependency on PostgreSQL service:
securos svc.exe -i 2 -l "pgsql-8.2"
It is necessary to check real name of PostgreSQL service on your computer (the above example uses
pgsql-8.2).
To find PostgreSQL service name:
After such registration, upon starting of SecurOS service it will wait until PostgreSQL service starts.
Note: It is recommended to use automatic Windows logon in case when SecurOS is configured as
Windows service.
www.isscctv.com
SecurOS 130 Administration Guide
DSAdmin Utility
Location:
<SecurOS folder>\dsadmin.exe
This utility defines connection strings to databases for data, system protocol and video.
Basic Data string to connect to general database of all systems events and commands.
Note: There are an additional field New feature to set a new database. One may set it if is needed.
To change a connection string, click its Build button. To test a connection, Test button.
On Build button click Data Link Properties window will appear. This window will help to build the
connection string:
www.isscctv.com
SecurOS 131 Administration Guide
Connection tab:
Type in servers name or address in Data Source field (e. g., 127.0.0.1, localhost).
Type in database name in Location field (e. g., securos db).
Type in database account in User Name and Password fields.
To apply changes in connection strings, click OK button. The changes will be applied and the utility
window will be closed.
www.isscctv.com
SecurOS 132 Administration Guide
Parameter Description
On Select DB button click Data Link Properties window will appear. See DSAdmin Utility on
page 130 for more information.
Names displays the selected object name and its group name. Also may be used to search for
object by its name or type.
Note: To search object automatically type in a full or a part of its type or name and choose the required
from the list below.
Events contains the selected object events and its properties: events description, window type,
sound support, net blocking and log.
Reacts contains the selected object commands and its properties: commands description and
flags.
Markers contains a list of the selected object markers.
States contains a list of the selected object possible states and its properties: image file name,
description, enabling blinking.
State rules displays rules of changing states.
1. Select an object type from the tree manually (e. g. for Camera object select CAM) or use
Search by name field to find the required one automatically.
2. Click on the required tab.
3. Double-click non-empty line to edit one. New window will appear.
4. Type in a new features and click OK button to save changes or Cancel to exit.
www.isscctv.com
SecurOS 133 Administration Guide
www.isscctv.com
SecurOS 134 Administration Guide
Microphone 21004
www.isscctv.com
SecurOS 135 Administration Guide
Engine 21080
Operator IU 21061
Activity analyzer module
Engine 22110
www.isscctv.com
SecurOS 136 Administration Guide
Vista 21015
Rubezh 21002
Flex 21043
Apollo 21014
Bolid 21025
www.isscctv.com
SecurOS 137 Administration Guide
Index
Index
Symbols archive converting, 63
Hot phase duration property, 71 temporary files, 63, 84
Hot phase frame rate property, 71 Archive Engine property, 92
Hot recording mode property, 71 archive recording, 62
free disk space, 62
Archiver object, 63, 92, 94
A
Area threshold property, 78
access, configure, 31
Area Zone object, 36
access, control, 31
Area object, 31, 57
access, full, 31
Armed always property, 74
access, inherited rights, 31
Attachment property, 108
access, no, 30
audio, 100
access, view, 31
Audio Capture Device object, 13, 101
Acquisition Rate / Compressed property, 66
Audio Player object, 13, 31
Acquisition Rate / Raw property, 66
Audio property, 34
Action property, 116
Auto Log Backup property, 33
Activate screen on startup property, 33
Auto Log Load property, 33
Activate watchdog property, 67
Auto switching property, 46
Active Directory storage object, 30, 40
Auto-adjust property, 72
Add All property, 88
Automatic Gain Control property, 72
Add all property, 103
automation, macros, 114
Additional information property, 27
automation, program, 116
administration mode, 11
automation, scripting, 114
Adobe Reader, 6
Alarm when switch off property, 104
Alarm when switch on property, 104
B
Alarming property, 74
Blackened property, 74
All property, 80, 85, 86, 94
Block system shutdown in NT service mode prop-
Allow configure system property, 30 erty, 33
Archive Converter object, 63, 92 Board property, 100
Archive converter object, 93 Brightness property, 72
www.isscctv.com
SecurOS 138 Administration Guide
Index
www.isscctv.com
SecurOS 139 Administration Guide
Index
www.isscctv.com
SecurOS 140 Administration Guide
Index
www.isscctv.com
SecurOS 141 Administration Guide
Index
Screen object, 42, 45, 58, 62, 91, 95, 97, 98, 114 technical support, 6, 120, 121
Script text area property, 117 Time between redial attempts property, 111
Security Zone object, 23, 24, 39 Time of acknowledgement of alarm event by the
operator property, 57
SecurOS Control Service, 129
Time Zone property, 117
Select All property, 35
Title property, 57, 80, 115, 116
Sense property, 112
To property, 108
Sensitivity property, 70, 76
Token property, 89
Sensor object, 13, 42, 49
Type property, 38, 56, 65, 101, 115
server, 9, 10
Server property, 28 U
Servers to connect property, 35 Update System Key property, 20
www.isscctv.com
SecurOS 142 Administration Guide
Index
V
video capture card, 9, 121
Video Capture Device object, 12, 13, 62, 64, 82,
95, 96, 98
Video Concentrator object, 79, 98
Video concentrator property, 80, 89
Video property, 34, 81
Visibilities setup property, 22
Voice Message object, 111
W
Wait for dialtone property, 111
Wave File property, 112
WINS, 120
Working folder property, 85
workstation, 9
X
X, Y, W, H property, 46, 50, 56, 58, 88, 93, 94,
103
X, Y property, 59
Z
Zone Object Detector, 76
www.isscctv.com
SecurOS 143 Administration Guide
Index
www.isscctv.com