DSX Access System, Inc. WinDSX User Manual

®
WinDSX User’s Guide
b
This page was intentionally left blank.
c
DSX, Our Commitment to Service
Our Commitment to service is continually demonstrated through our Training Programs and Technical Support Department. DSX stands behind its products and customers and constantly strives for excellence.
Our technical staff consists of engineers with field installation and service experience that are always ready to answer any question. By providing a staff with years of security experience, DSX is able to offer valuable insight into the complex issues that face the security contractor installing DSX equipment. DSX commitment to service is unmatched in the security industry.
Information contained in this document was known to be true at the time of printing. This information is subject to change at any time without notice. This document is a Team effort by the Technical Support Group at DSX.
Intent of this User Guide is to assist the actual user of the system in their daily operations. This Guide is a supplement to the extensive Help system integrated into the software. Help is available by pressing F1.
DSX is a registered trademark of DSX Access Systems Inc; WinDSX is a trademark of DSX Access Systems Inc.
The use of or reference to the term's Eltron, Fargo, Nisca, Pentium, Penware, Windows and Windows NT may or may not be the registered trademarks of the respective companies.
Compliance
You must consult your local fire codes before installing any locking device on doors, gates, or barriers. A construction and fire approval permit may be required before installing any equipment. Call your local Fire Marshall for building code requirements in your area.
For UL installations, you must install the DSX System according to the UL Installation Manual and in accordance with the National Electric Code, ANSI / NFPA 70 regulations and recommendations for US Installations. Canadian installations must be in accordance with the Canadian Electric Code C22.1.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-CKI-C, DSX­CKI-K, DSX-DP485 and DSX-FRB8 have been tested and found to conform to the requirements of UL 294.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-1040-PE-B, DSX­MCI, DSX-LAN, DSX-SPS and DSX-2PC have been tested and found to conform to the requirements of UL
1076.
Camera and DVR integration was not tested by UL.
DSX Access Systems, Inc. 10731 Rockwall Road Dallas, Texas 75238 888-419-8353 Sales, Shipping and Accounting 800-346-5288 Technical Support 214-553-6147 FAX www.dsxinc.com
d
DataBase / Setup
WinDSX Startup
DataBase / Location
Table of Contents
Startup...................................................................................................... 1
DataBase Login........................................................................................2
Workstation Login ................................................................................. 85
ToolBar & Menus .................................................................................... 3
Menus Map .............................................................................................. 4
Operator Comments ................................................................................. 5
Operator Passwords.................................................................................. 6
Password Profiles..................................................................................... 7
Profiles – Locations.................................................................................. 8
Profiles – Menus ...................................................................................... 9
Profiles – Input/Output/Device Overrides............................................... 11
Profiles – Companies.............................................................................. 12
Profiles – Card Fields............................................................................. 13
Profiles – Access Level .......................................................................... 14
Reports / System Programming .............................................................. 15
Reports / Card Holder............................................................................. 17
DataBase Backup ................................................................................... 23
History Backup ...................................................................................... 25
Restore/Repair Data ............................................................................... 28
Event Filters........................................................................................... 31
Card Holder............................................................................................ 34
Card Holder Search ................................................................................ 35
Card Holder List..................................................................................... 38
Adding a Card........................................................................................ 39
Card Holder Phone # .............................................................................. 45
Card Holder Keys................................................................................... 46
Card Holder Skills.................................................................................. 47
Capture Card Holder Image.................................................................... 48
Import Card Holder Image...................................................................... 49
Edit Card Holder Image.......................................................................... 50
Print Card Holder Badge ........................................................................ 51
Activate/De-activate Company............................................................... 52
Access Level .......................................................................................... 53
Bulk Load Access Levels ....................................................................... 56
Time Zones ............................................................................................ 60
Company................................................................................................ 63
d
f
Workstation
DataBase / Location
Holiday.................................................................................................. 64
User Defined Fields ............................................................................... 65
Guard Tour ............................................................................................ 68
Maps………………………………………………………… ................. 71
Override Group...................................................................................... 72
Badge Image Source .............................................................................. 73
Badge Image Type................................................................................. 74
Badge Templates ................................................................................... 75
Keys ...................................................................................................... 80
History................................................................................................... 81
Email Groups – Alarm Email Notification ............................................. 89
Workstation Login ................................................................................. 91
Workstation Overview ........................................................................... 92
Workstation Overview continued........................................................... 93
Card Holder Search................................................................................ 94
In / Out Status........................................................................................ 95
Location Operations............................................................................... 96
Devices (readers, keypads)..................................................................... 97
Inputs (alarm points).............................................................................. 98
Outputs (locks, gates)............................................................................. 99
Override Groups / Comments............................................................... 100
Cameras............................................................................................... 101
Maps / Alarms .................................................................................... 102
Alarms / Customize ............................................................................. 103
DVR Operations .................................................................................. 104
Message Definitions............................................................................. 106
g
This page was intentionally left blank.
Startup
1
DataBase
The Database program is the very core of the system. It is where the system is defined and configured. Database manages all of the system data and provides the user with an easy but dynamic graphical user interface. The database program not only houses the data entry mechanism but also contains all system management utilities including Photo ID Badging.
Workstation
The Workstation program is the actual user interface for all communications and controller interaction in the system. There are four interactive windows within the workstation program. These four windows are all sizeable with scroll bars to allow customizing of the desktop for ease of use. The four Windows are Alarm, Event, Selection, and Control.
Page 2
Page 92
Comm Server
The Comm Server program is a multi-tasking, communication application that runs as a Process or Service and is located on the PC that has the physical and/or virtual connection to the DSX Controllers. The Comm Server has no user interface, it simply communicates with the DSX Controllers, downloading new data, uploading panel history, and logging all transactions to the hard disk. The Workstation program interrogates the Comm Server program through the network using the Comm Servers TCP/IP address. The Comm Server Program responds to the Workstation requests and routes all alarm, input/output control and system events to the Workstation Program.
Comm Server is started and closed by the Workstation program
Press F1 for Help Help can be received by pressing the F1 key from any Menu and
Data-Entry Screen in the DataBase program and from any location in the Workstation Program.
DataBase
2
Login
Double Click on the DataBase ICON to start the program.
The Login Screen below is displayed when the program is started. Enter your User Name and Password. The Default User Name is master, the default Password is master both entered in all lower case.
ToolBar & Menus
3
File
Double Click on System
Double Click on Locations
Copy
Delete
User Name
Menu Window
List Window
Operator Log Off
System Date and Time
Add
Who Is In Report
Change Operator Password – Used to change password. Enable Multiple Selections – For multiple card holder selections to be used
with the Activate/De-activate buttons and Bulk Modify Access Levels.
Bulk Modify Access Levels – Used to make group access level changes. Exit – Exits the Program.
Select File to access the following:
– Click here to Log Off and Return to the Login Screen.
– Click here to add new record.
– Click here after selecting a
data record that you wish to copy.
– Click here after selecting a
data record you wish to delete.
receive a detailed report as to who is in the facility and where they last used their card. Card Holders are listed by IN reader. Each list shows a total number IN location wide and a subtotal of those IN at that reader.
The Who is In Report can be configured to run from an Input Alarm. For more Information press “F1” for Help.
DataBase
– Click here to
expand the menu to display all locations defined in the system
expand the menu to display Passwords, Reports, and Setup.
to
to
The
.
Logged onto the System is displayed here.
of the Operator
DataBase
4
Add button
Operator Passwords and Configuration, Page 6
DataBase and History Backup Utilities, Page 23
Card Holder Management, Page 34
Location History Report Generator, Page 81
Menus Map
Double Click on: System, Reports, Setup, and Locations to expand their menus.
Click on the Menu Item, then click on the Add button in the Toolbar at the top.
Access Level – Page 53 Time Zone – Page 60
Company – Page 63 Holiday – Page 64
UDFs – Page 65 Guard Tour – Page 68
Badge Temp – Page 75 Keys / Skills – Page 80
Operator Comments
5
Operator Comments
Operator Comment
Edit
Name
comments can be made and stored in history for future retrieval. The comments can be in response to an alarm or restoral or any other incident. Predefined statements or comments can be described here and later used by the operator. Free format comments can also be used instead of or in conjunction with the predefined comments. Predefined Operator Comments can be used for consistent recording of a common or recurring situation.
Click on Menu then on Add.
are notes or text that can be recorded by the operator at any time. These
in the
Double Click here to existing Operator Comment.
an
DataBase
1. Enter the
2. Enter the Comment to be displayed and recorded.
3. Enter the Display Order, which determines its order in the comment pick list.
of the Comment as it will be referred to and selected by.
DataBase
6
Operator Passwords
Operator Name
Operator Password
Operator Password
is the mechanism that secures the system from unauthorized use. The Operator Passwords are unique to each operator providing the operators the same use of the system regardless of which workstation they are at. Each operator has a Password Profile that determines what privileges the operator has in the software. Each operator can have their own Password Profile or multiple operators can share a profile. The Operator must enter their Password when starting the system and must log off when leaving the workstation.
This method of password protection allows the manager to add the operator into the system and assign them the appropriate password profile, and an initial password. The operator is given their login name and password profile at which time they can change their password to one they only know. Once this is done the manager can go back and modify the login name and profile without viewing or changing the password.
Double Click here to Edit an Operator.
Click on the Menu and then on Add.
in
1. Enter the
2. Enter up a minimum of 6 and up to 10
alphanumeric characters for a Password. The user name and password must be entered in all upper case letters for them to be case sensitive.
3. Enter the same password again in the Confirm
Password field.
4. Select a Password Profile from the drop down
selection box.
5. Enter Notes about this Operator if applicable.
Note /// When using AD Authentication, Enter the Operator Name and select the PassWord Profile without clicking on the password fields.
.
Password Profiles
7
Click on the checkbox
to the
operator to manage visitors.
Password Profiles
Password Profiles
Password Profile
Menu and then on
Add.
Edit
a Profile
- Double Click on the selected
Profile
is valid for. Custom profiles can be created for each Operator or can be shared by more then one Operator.
Click on
are the describing elements of where a password is valid and what it
DataBase
in the
New
have rights to nothing by default, indicated by no checkmarks in the column of selection boxes below. By clicking in the box you place a checkmark and provide full rights to that selection. By clicking on the checkmark you take it away which takes you to the selection menus and break down for that listing.
left of each description to view the breakdown of, and restrict privileges in, each category.
View the following pages for a breakdown of all 6 categories.
Select Visitors only if this profile should only allow the
DataBase
8
Location List
Select All
Profiles – All Locations
Use the profile will be valid for. Select the Locations this Password should work at.
Select a Location and press the Space Bar or Double Right Click to include or exclude a location.
below to determine which locations this password
Click on one of the selections to the left to view All Locations or to only view the Locations selected for this profile.
Click on the checkbox to automatically select all locations. Click on the Clear All Selections button to deselect all locations.
Profiles – All Menus
9
All Menus
File, Edit
Click on View, Add, Edit, and/or
Reports
Profile will be valid, are selected. Items selected here are accessible to a password with this profile. This answers the question of what functions this Password is allowed to perform. Select the items from the list corresponding to what this profile should be valid for and have access to.
is where menu items and functions, for which this Password
DataBase
Click on one of these to
Select All or Clear All Selections.
Double Click on: and System to expand their menus.
Select a Menu Item then Delete to provide the respective privileges for the menu selection.
Double Right Click on the Menu Item to provide full rights.
Double Click on expand the menu to display all of the system reports available. Select all reports this profile should have access to.
to
DataBase
10
Set Card Status
Add
allows
controlled.
Menu Items
View, Add, Edit,
Profiles – All Menus
Double Click to expand the Locations Menu. Select the appropriate Locations followed by Workstation, DataBase, and Cardholder Menus and set the level of access for each item.
Under the operator to Activate Cards, and selecting Delete allows the operator to Deactivate Cards. These two functions can now be separately
– selecting
Select the assign the and/or Delete privileges by checking the appropriate box to the right and then Click OK at the bottom. Double Right Click on the Menu Item to provide full rights.
and
I/O, Device, & Camera Control
11
Input, Output, and Device
Overrides and
Double Click on the Location
Device, Input, Output and/or
Camera
Cameras
– Live / Recorded
Camera Control are assigned to a profile here. Select the devices, inputs, outputs, and cameras an operator with this profile will be allowed to manipulate and have manual control over. Select the point then select one or all of the override commands in the lower right corner. These overrides also apply to Scheduled Overrides.
Double Click on each Device to expand the menu to display all of the inputs and outputs associated with that device.
Double Click on Cameras to expand the menu to display all of the cameras.
(card readers and/or keypads)
to expand the menu and display all devices.
Click on one of these to Select All or Clear All Selections.
DataBase
A right double click on the title item will select/de-select all items below it.
Select the click on the Override(s) appropriate for the point and the profile.
Devices – Disable / Time Zone Inputs – Arm / Bypass / Time Zone Outputs – Secure / Open / Time Zone / Grant Access
above and then
DataBase
12
Companies
Double click on the Location or Location Group
Selections.
All Companies
are the different organizations, businesses, departments, or other groups of card holders. By Selecting a Company here, the operator with this profile will only have access to the card holder data for that company as well as the history that pertains to that company.
below to expand the
menu to display all of the Companies defined for the location or locations.
Click on one of these to
Select All or Clear All
Select the company you wish to give this operator access to and then click here on Show Card Holders. This gives the operator
access to all company data such as the card holders assigned to the company and their associated history.
All Card Fields
13
Card Data Fields
Selections.
Select the to be able to view and/or edit in the DataBase program under Card Holder / Cards.
Double click on the Location or Location Group and then click on Cards to expand the menu to display the list of card data fields.
Select the Card Fields from the list above then click on View Data and/or Edit Data to determine which of these fields a user with this password
profile will be allowed to view and edit.
you wish an operator with this password profile
DataBase
Click on one of these to Select All or Clear All
DataBase
14
Devices
Double click on the Location or Location Group
Selections.
Select a Device then click on Display in Access Level
Access Level All Devices
Select the profile will be able to view and assign when creating and issuing access levels to Card Holders.
and view the list of all Card Readers/Keypads in the system.
be displayed in the list of devices to choose from when an Operator with this Profile is creating an Access Level.
(Card Reader/Keypad Locations) the operator with this
to expand the menu
for that device to
Click on one of these to Select All or Clear All
15
Reports
Card Holder Repo
rt
2. Select the Report desired then click on the Add Button.
1. Double Clicking on reports expands the Reports selection menu.
The can be accessed by clicking on Card Holder Report in the menu and then clicking on the Add Button. Page 17
viewed and printed. Card Holders can be searched, sorted, viewed and printed. All reports except Keys, Who is In, History, and Time &
Attendance are exclusively run from this menu.
Reports
is the location that all system programming can be selected,
DataBase
Press F1 for Help
anywhere in the DataBase and Workstation programs.
DataBase
16
Location Reports
List All Locations
Printer
Number of Copies
Print Preview
View Screen as
Location
Reports / Example
include all location information such as which
features are enabled, address information and phone numbers.
Use this example for all reports except Card Holder.
Select the report if there is more than one Location.
Select all locations in the database.
Select Windows Default Printer.
Click here to incorporate custom Notes in the report if desired.
desired in the
to show
if different than the
Set the for the printing of this Report.
required
Click here to screen prior to printing. The Report can be exported to file from the Pre­well as printed to the selected printer.
the report on
Reports / Card Holder
17
Card Holder Report
or
Location
The this screen to select the Card Data to be included in the Report and whether or not it should be in the condensed or full format. Each Tab represents different reports available such as List by Reader Access or List by Access Level. These Tabs represent separate reports and do not interact.
3. After selecting a Location, Click here for a report which contains Card Holders that have access to a specific Reader/Keypad that are listed here.
2. Select the this Card Holder Report should be pulled from.
can include all card holder information as well as all code / card data. Use
3. After selecting a Location, Click here for a report which contains Card Holders that have a particular Access Level or Linking Level listed here.
4. Answer the column of questions to the left using the following page.
that
5. Before using the Print Roster Option, be sure the correct Template has been defined. See page 74.
DataBase
1. The Full Format contains all Card Holder data and prints approximately 5 Card Holders per page. The Condensed Format prints the most common data and can print approximately 53 Card Holders per page. The condensed format consists of Code, Imprinted Card Number, Access Level, Output Linking Level, and Company.
For additional report information access the Help Screen by pressing F1.
DataBase
18
Print Car
d Data
-
Include All Card Holders
Reports / Card Holder
5. including the state in any or all of the 4 Anti-Passback Zones, then click on Print.
and the subsequent configuration questions and optionally
Click here, remove the checkmark and jump to the Card Holder Search Engine to select the card holders to be in the report. See next page.
Separate Report for each Company - The Card Holder
Report can be sorted by Company or printed without regard to the company identifier. For a report that is sorted by company select this option. If selected, Card Holders will be listed by name or code but separated by company.
Select any or all of the additional data to be included in the report.
Print Phone Number Print User Defined Data Print Notes Print Keys
Sort the Card Holder Report in one of the three ways listed by clicking on one of the three radial buttons.
List by Name List by Card Number List by Imprinted Card NumberList by UDF
6. Click on OK and proceed to page 22.
When selected this option includes Card data such as name, code, access levels, number of uses, activate and de-activate dates, visitor and trace options. Click on this field one time to select or deselect this option. A check mark indicates the report will include the data. Data included also depends on the condensed format selection.
Include Where Passback Status is:
Select one or all of the four anti-passback zones and set the status selection to In / Out or Either.
This will further set the search criteria to only find those card holders who currently hold “In”, “Out”, or “Either” status in one or all of the four zones.
Select Names List Criteria
19
Search Names Tab
The
shown below allows for card holders to be searched and
reported based on their First and/or Last Name, Company, Visitor and Trace status.
The Search UDF Tab allows for Card Holders to be searched by the custom User Defined Field information.
The Search Cards Tab allows for the Card Holders to be Searched by any of the Card data such as the encoded card number, the imprinted card number, the number of days since the card had been used or pending start and stop dates.
The Search Skills Tab allows for the Card Holders to be Searched by any of the Skills or Trades assigned to the Card Holders.
How to Use Card Holder Search
Any or all of the data fields on any of the Search Tabs can be used to search for Card Holders. Enter complete or partial search criteria in any or all of the data fields on each Search Tab and click on OK. The selections form an AND statement and can be used to form very precise Card Holder Lists. The Card Holder must meet all of the criteria entered in all search fields on all 3 Tabs in order to be shown in the Card Holder List shown.
DataBase
Enter the specifying criteria for the search on any or all-4 Search Tabs and click on OK.
Search Include Where Company is:
Select one or more Companies from the list. To select more than 1 company press and hold the Ctrl-Key while clicking on each one desired. The selection “Any Company” instructs the system that the company identifier is ignored and the search will be based on name without regard to the card holder’s company assignment.
DataBase
20
Search UDF Tab
If you are entering an
Email Address for Alar
Select UDFs List Criteria
The searched by the custom User Defined Field information.
Any or all of the data fields on any of the Search Tabs can be used to search for Card Holders. Enter complete or partial search criteria in any or all of the data fields on each Search Tab and click on OK. The selections form an AND statement and can be used to form very precise Card Holder Lists. The Card Holder must meet all of the criteria entered in all search fields on all 3 Tabs in order to be shown in the Card Holder List shown.
allows for Card Holders to be
Email Notification be s
Page 81
Enter the specifying criteria for the search on any or all-4 Search Tabs and click on OK.
Select Card # List Criteria
21
Imprinted Card Number
Number of days
Card Holder search is complete
Search Cards
Tab
The
allows for the Card Holders to be Searched by any of the Card data such as the encoded card number, the imprinted card number, the number of days since the card had been used, or a pending start and stop date.
Enter the internal working or Encoded Number of the card.
Enter the that is found printed on the card.
Specify the
the card
would not have been used since.
DataBase
Include where Start and Stop Date is Between. Use the drop
down calendar selection box to set a range of dates to find cardholders that have a Start and/or Stop date within that range. This search can be useful to find Card Holders whose cards have been set to turn on or off on a certain date.
Specify if the code(s) to be searched for must have the Guard Tour feature enabled -
True, False, or Either.
Once the to the location in the software that you requested the Card Holder Search from. This could be Card Holder Reports, History, DataBase/Card Holder.
Include where status is: Set the status of the Card Holder you wish to include in the Search. Click on Active, Inactive, or Either to set the search status appropriately. Active are those cards that are operational in the system. Inactive is those cards that have been turned off and no longer functional. Select Either if the active status should have no bearing on the search.
click on OK and you are returned
DataBase
22
Title for the
Print Pre
-
View
Report is printed
Report can be
or
binoculars at the top of the report.
Reports / Card Holder
Print PreView & Export
7. Enter a Card Holder Report and click on OK.
The screen appears and provides the ability to change the print size for larger and smaller viewing.
8. The
exported to a File by clicking on the Envelope ICON and selecting the
file format of choice. Use the RTF format to best maintain the page formatting.
8. The
by clicking on the Printer ICON that in turn
sends the report to the default or selected Windows Printer.
To search for an item within the report click on the search
Loading...
+ 86 hidden pages