Access Control and Integrated
Security Management System
Secure Perfect
®
User Manual
imagination at work
This publication may contain examples of screens and reports used in daily operations. Examples include fictitious
names of individuals and companies. Any similarity to names and addresses of actual business enterprises and
persons is entirely coincidental.
This document contains proprietary information of General Electric Company, USA and is furnished to its customer
solely to assist that customer in the installation, testing, operation, and/or maintenance of the equipment
described. This document shall not be reproduced in whole or in part nor shall its contents be disclosed to any
third party without the written approval of GE Security.
Copyright 2005 GE Security, Inc.
All Rights Reserved
Printed in the USA
Secure Perfect is a registered trademark of GE Security, Inc.
Access, Active Directory, Directory File Services, DirectX, Internet Explorer, Microsoft, .NET, SQL Mail, SQL
Server, Windows, Windows NT, and Windows XP are trademarks or registered trademarks of Microsoft
Corporation.
Adobe and Acrobat are trademarks of Adobe Systems Incorporated which may be registered in certain
jurisdictions.
Citrix is a trademark of Citrix Systems, Inc.
Crystal Reports is a registered trademark of Crystal Decisions.
Digi is a registered trademark of Digi International.
Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corporation in the
United States and other countries.
pcANYWHERE is a trademark of Symantec Corporation.
Yahoo is a registered trademark of Yahoo! Inc.
GE Infrastructure – Security
791 Park of Commerce Blvd., Suite 100
Boca Raton, FL 33487
(561) 998-6100
Part Number: 460556004B
May 2005
READ ME FIRST!
The content of this User Manual was generated from the Secure Perfect 6.1.1
Online Help system.
1. Books , as displayed in the Online Help, Contents, have become
sections in this document.
2. Hyperlink locations throughout this Guide display in green text.
3. Reference Topics (displayed as hyperlinks in the Online Help System)
can be accessed in this document as well, using typical Adobe PDF
navigation, including the Adobe Acrobat bookmark navigation pane.
4. We encourage you to take advantage of the Adobe Reader Search icons
, when navigating this manual.
5. ‘Show me’ video demonstration files can be executed and viewed from
the Secure Perfect Online Help ONLY.
6. Increase or decrease the page magnification as you
prefer for your personal use.
Secure Perfect 6.1.1 User Manual 1
Secure Perfect 6.1.1 User Manual 2
Table of Contents
READ ME FIRST! ............................................................................................................... 1
Introduction to SP Editions ...................................................................................... 13
Window Menu Selections....................................................................................................... 266
Z ......................................................................................................................................267
Zone History........................................................................................................................... 267
Secure Perfect 6.1.1 User Manual 12
Introduction to SP Editions
Welcome
Reference Topics:
What's New?
Client/Server Architecture
Related Documentation
Getting Started
Welcome to Secure Perfect!
Secure Perfect Editions is a multi-edition offering of Integrated Secure Management Software designed
on Microsoft Windows technology. Secure Perfect Editions provide full security management functions
including access control, intrusion zone control, alarm monitoring, reporting, photo ID badging, and CCTV
interfaces as standard features. Secure Perfect Editions also offers integrated system options that
include digital video surveillance and Web-based reporting.
Throughout this Help system, reference to Secure Perfect is represented as "SP" in text content to
avoid repetition where the product name and/or version may have already been established.
SP Global Edition: SQL Server 2000 Replication services are used to distribute the data from a Global
Server to Regional Servers. Secure Perfect installation creates the necessary components for a
replicated system, configuring publications and subscriptions at each level. The Global Database Server
is the ‘main’ Secure Perfect database server. The term ‘main’ as used in this context means that the
Global Database Server acts as a hub for all replication activity. This Global Server hosts a Distributor
whose role is to store history and miscellaneous information about merge replication. When the
Distributor is created on a database, it generates its own database to store information. Once publishing
is enabled on the Global Server, it is able to control and monitor publications and subscriptions as well as
the starting and stopping of replication agents. Regional Database Servers act as ‘client’ database
servers. They have the ability to subscribe to publications located on the Global Server. These Regional
Servers operate independent of the Global Server for a period of time as necessary. Subscriptions are
‘pushed’ to each Regional Server by the Global Server. This means that the Regional Servers are not
required to request updated data from the Global Server, because updates are periodically supplied to
Regional Servers according to a set schedule. Replication intervals are configurable through SQL Server
Enterprise Manager user interface. Data is continually synchronized by implementing this customized
replication configuration. Refer to the Secure Perfect Installation Guide for a terminology list and
complete description of this feature. Also refer to Global Edition Regional Configuration Rules and
Replication and Synchronization Conflicts in this Help file.
SP Enterprise Edition is licensed for Windows 2000/2003 Standard Edition Server as the operating
system and SQL Server 2000 Standard Edition as the database. SP Enterprise Edition is designed for
mid to large-sized systems with capacity requirements of up to 25 client workstations, 256 micros, and
4,096 readers.
Cluster technology selections in this Enterprise-level installation provide new architecting options.
SP Professional Edition is licensed for Windows 2000 Professional Server or XP Professional Server as
the operating system and SQL Server 2000 Desktop Engine (MSDE) as the database. SP Professional
Edition is designed for small to mid-sized systems with capacity requirements of up to 5 client
workstations, 32 micros, and 256 readers.
eZ Edition is licensed for Windows 2000 Professional Server or XP Professional Server as the operating
system and SQL Server 2000 Desktop Engine (MSDE) as the database. eZ Edition is designed for small
systems with capacity requirements of 5 client workstations, 32 micros (PX-2000 Series ONLY), and 128
readers.
This Help system provides information for system administrators to configure and operate the SP Editions
software.
Secure Perfect 6.1.1 User Manual 13
What's New?
What’s New in Secure Perfect
New in 6.1.1 ONLY:
Configure APB Status by Region: This feature allows you to configure APB readers across Regions or
within a specific Region only. If configured across Regions, entering a Region activates the badge only in
that region and disables the badge in all other Regions.
Micro Connection Type Network + Direct Communication: This is a new network configuration option
selectable on the Micro Form, Micro Definition tab. This selection allows a micro that loses network
connection to fail over to a serial connection. On the Micro Utility Form, a network micro normally displays
an IP address in the Comm device column. When a network micro loses connection, the Alarm Monitor
Form displays a Host Comm alarm. After approximately two minutes, the alarm resets and the serial
connection begins communications. The Micro Utility Form Comm device column now displays the
Comm port.
Micro Connection Type Network + Network: This is a new network configuration option selectable on
the Micro Form, Micro Definition tab. This selection allows a micro that loses network connection to fail
over to a secondary network connection. When a network micro loses connection, Alarm Monitor Form
displays a Host Comm alarm. After approximately two minutes, the alarm resets and network
communications begin. The Micro Utility Form Comm device column now displays the backup IP address
or network name, as assigned on the Micro Form, Port Settings tab.
Alarm Graphics Viewer Window is a Separate Application: The window launches independently from
the Secure Perfect application and can be moved outside of the Secure Perfect window area. This is
useful for dual-display monitors or wide monitor display.
Suspend Badge After Invalid PIN Attempts: This option is configured on the Reader tab of the Reader
Form. Select Max Invalid PIN Count and enter a number between 1 and 6 as the number of times an
invalid PIN can be entered at a reader before the badge is suspended. If the badge is suspended, the
badge must be reset to Active by a system administrator.
DVR Search - Play Single Recorded Frame: The Search Results windowpane in DVR Search returns a
list of recorded video event tags based on the search parameter criteria specified. Select an event tag
from the list and right-click to display a shortcut menu. The shortcut menu has been expanded to include
Play Single Recorded Frame. When selected, a single image displays in the video window. This is the
first frame of the event recording displayed as a still photo. To play the rest of the video clip, unpause the
video on the DVR Viewer.
Two New Micro Types: MicroPXNPlus or MicroPXNPlus 2000 are selectable on the Micro Form, Micro
Definition tab. A board provides direct, dial-up, and network capabilities in one board. The network
supports Ethernet only. The board also has an integrated modem option which means that the modem is
a chip that can be ordered with the board or added at a later date. This modem can also be used as dialup fallback to a network board. Both boards support the following reader boards, 2RP, 2SRP, 8RP, and
CK8RP. The boards provide nonvolatile storage that provides faster reset recovery and allows hostless
operation. A new Web Integrated Configuration Tool was created for flashing these micro types,
eliminating the need to install Flashtool on each computer in order to download and flash the micros.
Database Connection: This feature is configured on the Parameter Form, Settings tab. This feature
allows you to configure the amount of time that elapes before your Secure Perfect system retries the
connection and considers that the database is not accessable.
• Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120 seconds.
1) In a Secure Perfect Global Edition configuration, this is the amount of time until a Regional failover
begins. 2) In a typical Secure Perfect configuration, this is the amount of time before Secure Perfect
transactions are saved, Secure Perfect services shut down, and a message advises you to repair your
database.
• Retry: The default is 3 retries. The minimum is ‘0’; the maximum is 5 retries.
Secure Perfect 6.1.1 User Manual 14
Enable ‘Valid No Passage’: This option is configured on the Reader Form, Reader tab. Select this
checkbox if you want your Secure Perfect system to notify you when a valid badge read occurs but the
door did not open within the configured sense time. This may be an indication of a duress situation,
someone deciding not to pass through the door, or an accidental read as someone passes a reader.
• This feature must be associated with an alarm type of door forced or door held in order to be notified
of a change in state of the door.
• In order to notify of a duress situation, Grant Access on Duress must be configured.
New in 6.1:
Guard Tour:
This feature makes use of two new forms in Secure Perfect, Guard Tours and Tour Point. A Guard Tour
is an inspection of your facility premises, by a security guard. The officer stops at pre-determined tour
points along the way, where a digital input (DI) is triggered or a badge is presented to a reader so that the
Secure Perfect system can track the tour progress. Each time a badge is presented to a reader, a tour
point is ‘hit.’ DIs can also be assigned as tour points. An additional tab has been added to the Manual
Control form. The Guard Tour tab of the Manual Control form displays the status of Guard Tours
configured in your Secure Perfect system. Select a Guard Tour to display tour details and tour points. An
occasion may arise that requires a tour to be started, paused, resumed, or stopped manually. This
feature and related forms are not available for input if you are not licensed for Guard Tour.
Global Edition Enhancements:
• Database Server and Fileserver Redundancy: Global Editions systems can be configured for
database redundancy, at the Region level. A Regional Database Server can be configured to have
backup servers. Refer to the Backup Regions tab of the Region Form. If a client is not able to connect
to its Regional Database Server for any reason, it fails over to the backup Regional Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers.
• Client Region Failover: If you have Region backups configured, all clients in that region, by default,
will fail over to the backup Region when the system detects that it cannot access the database. You
might choose to clear this checkbox on the Client tab of the Client form, to prevent nonessential client
failover and keep extra traffic on your system network to a minimum.
Alarms:
• Alarm Bumping and Routing: The Client Group Form allow you to assign Secure Perfect computers
into logical Client Groups. Then, Alarms can be routed to these Client Groups by time schedule or at
all times. Additionally, alarms can be ‘bumped’ (forwarded) to one or more additional Client Groups
when alarms are unacknowledged and unpurged within configured time limits.
• Alarm Graphics Enhancements: Alarm Graphics can now be configured for digital inputs and digital
outputs. The Alarm Graphics Viewer displays active status. Right-click menu options display newly
enhanced functionality. Operators for the Alarm Graphics Viewer must be assigned ‘Update’ and
facility permissions in order to select right-click menu options. For shortcut menu functionality, rest
your mouse pointer on an assigned point and right-click. The shortcut menu that displays with a rightclick mouse button depends on the Point Type assigned to the point. The options allow manual control
of doors.
• Duress: This selection determines whether the door will open when a duress PIN code (with the final
digit incremented by + 1) is entered with a valid badge. This feature is configured for your Secure
Perfect system on the Parameters Form, Settings Tab.
Event Trigger Updates:
Assigning Intrusion Zones to an Event Trigger: The Intrusion Zone tab on the Event Trigger form
allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will trigger an event.
Extended Unlock Time Options:
Extended unlock time is enabled on the Personnel Tab of the Person Form. When this option is selected,
enabled badges associated with a Person record allow extra time to gain access to an entry or exit point.
Extended times (in minutes and seconds) are configured and assigned on the Door Functions tab of the
Reader Form. For example, if a door is used by disabled persons or the reader is mounted at a distance
from the door, a longer unlock time may be required to exit or enter.
Secure Perfect 6.1.1 User Manual 15
Real-Time Digital Output Status:
Digital output status is reflected in real-time updates on the Alarm Graphics Viewer if this option is
selected on the Micro Definition tab of the Micro Form.
UL Certification:
Secure Perfect is a UL-listed Grade A system (UL 1076 Grade A Proprietary Burglary Requirements/UL 294 Access Control Requirements). Your installation must adhere to the requirements listed in the
Certification section of the Secure Perfect Installation Manual, in order to qualify as UL-listed Grade A
certified.
Badging:
• Designer Upgrade: The integrated Badge Designer program is an upgraded version with many new
features. On the Secure Perfect Badge Design Form, click Edit Badge Design to display a new
windowpane. This is a separate program with its own toolbar. If you had a previous version of badge
designer that created files with a .gdr extension, you will be prompted to save the file as a .dgn when
you edit a badge design for the first time. Access the extensive Online Help system from the Badge
Designer toolbar. Additionally, refer to the Badge Designer User Manual, and review the "What’s New"
section. A PDF of the manual is provided on your documentation CD.
• Badge Format: This option on the Administration menu allows an operator to design, import, or export
custom badge formats for your Secure Perfect system. Custom magnetic stripe or Wiegand formats
can be loaded and stored in the Secure Perfect database. After identifying the required custom format,
the format is flashed to the micro. A new tab on the Micro Flash and Micro Parameter Configuration
window allows you to configure custom badge formats.
Auto Shutdown of Secure Perfect Services:
This is a default option on the Client tab of the Client form. If selected, Secure Perfect Services will
automatically shut down when the client application is closed. A list of prerequisite criteria must be met.
Manual Control Form:
• Shortcut from Client Monitor Form to Manual Control Form: This feature allows the current operator to
quickly locate a client, right-click and select the Manual Control form, and manually perform operations
of the Secure Perfect system.
• Mode Tab on the Manual Control Form: This feature allows the operator to select all or individual
micros or clients for immediate change of mode from the Manual Control Form, on the new Mode Tab.
The micro’s current real-time mode and address are also displayed.
Report Generation Upgrades:
• Guard Tour History Report: This option on the Administration menu allows you to generate a report of
completed Guard Tours, displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start, and manual stops.
• Administration Report: The list of report types has been expanded to include details of Alarm Routing
and Bumping configurations and Badge Format (UBF) custom badge configurations.
Secure Perfect 6.1.1 User Manual 16
Client/Server Architecture
Reference Topic:
SP Services
Micro Definition Tab
Secure Perfect Server, client workstation, and network-enabled microcontrollers communicate over
10/100Mb Ethernet LAN/WAN typologies. Refer to Micro Form, Micro Definition Tab for a list of supported
Microcontroller types.
PC Function Configuration
Win2000/2003
Standard
Edition Server
Win2000
Professional
Edition Server
Win2000
Professional
or XP
Professional
Client
Workstation
Secure Perfect Software
Cluster technology or Global Edition selections in this
Enterprise-level system installation provide new architecting
options. All configuration options are detailed in the Secure Perfect Installation Guide.
Allows database and file Server to be placed on different Windows
Server computers.
SQL Server 2000 Standard Edition Database and applicable SQL
Server Service Packs
Imaging: The feature is installed but not recommended for
production as an Imaging workstation.
Clients: Secure Perfect supports 25 system-wide clients (any client
can host a micro).
Micros: Secure Perfect supports 256 system-wide micros (32 on the
server and up to 64 per communications client).
Secure Perfect Software
SQL Server 2000 Desktop Engine (MSDE) and applicable Service
Packs
Imaging: The feature is installed on the server as an Imaging
workstation.
Clients: The system supports five system-wide clients (any five can
also be configured as communications clients for hosting micros).
Micros: The system supports 32 system-wide micros.
Secure Perfect Software
Imaging: The feature is installed.
Secure Perfect 6.1.1 User Manual 17
Getting Started
Reference Topic:
Secure Perfect Services
Before you proceed, make sure that your peripheral system hardware is installed and running. This
includes micros, readers, modems, printers, and network lines. Refer to your Secure Perfect Installation Guide or follow specific installation instructions for your brand of hardware.
The following order is recommended for initial setup, beginning with configuring your Server computer
Secure Perfect system:
1. Set system parameters.
2. OPTIONAL: Define facilities.
3. Identify clients.
4. Create permissions.
5. Add operators.
6. Set up schedules and events.
7. Configure devices.
8. Create access rights, persons, and badges.
9. Back up your system. (This procedure is detailed in your Secure Perfect Installation Guide.)
10. Configure client computers. (This procedure is detailed in your Secure Perfect Installation Guide.)
Related Documentation
Reference Topic:
Navigational Conventions
For more information about Secure Perfect Editions and hardware that works with it, consult the
following:
• Micro/5 Installation Guide
• Micro/PX-2000 and Micro/PXN-2000 Installation Guide
• Micro/PX-2000 and Micro/PXN/2000 Microcontroller Quick Installation Instructions
• Secure Perfect Installation Guide
• Badge Designer Manual for Picture Perfect v3 and Secure Perfect v6
These documents and others are included on the Documentation CD-ROM in PDF format. The CD
is included in the media kit, shipped with your system. You must have Adobe Acrobat Reader installed on
your computer to view PDF documents. For your convenience, a copy of the Adobe Acrobat Reader
software is included on the CD.
Sources of training material include the following:
1. Additional detail or related information can be viewed by clicking the linked Reference Topics listed
at the bottom of each topic pane.
2. A Training CD-ROM is shipped with each system media kit. The CD contains an operations and
training course that consumes approximately 16 hours.
You may want to take advantage of the XtremeLearning library of convenient, comprehensive, and
interactive Web-based training courses available through your GE Security Business Partner.
Secure Perfect 6.1.1 User Manual 18
Navigation
Log On/Log Off or Shut Down
Reference Topic:
Secure Perfect Services
Auto Shutdown of Client Services
Log On/Log Off
Enter your logon/logoff ID and Password:
• To start the Secure Perfect client program from the File menu.
• To quit the Secure Perfect client program using the Close button in the top right corner of the
Secure Perfect window.
The default Login/logout ID is secure and the default Password is master. If you purchased your
system from GE Security, the default ID and Password are set for you.
UPGRADES: Versions of Secure Perfect 4.0 and earlier did not require case-sensitive default login
passwords. When upgrading from a version of Secure Perfect 4.0 or earlier, you may experience a
problem logging in. If you have never changed it, your Secure Perfect default password may be set to
initial caps, as in 'Master' and not 'master.'
Logoff
The Logoff option on the File menu allows you to log off of Secure Perfect without closing the program. A
message box displays. Click OK to log off of the Secure Perfect application (logging off allows an
operator to log off and another operator to log in without ending the program.) or Cancel to cancel the
logoff process. While logged off, no one can enter data into SP; however, Secure Perfect continues to
communicate with the micros, store alarm and badge transactions in the history database, and notify you
of alarms based on you facility assignment. Refer to the Client Form for information on turning alarm
notifications on and off.
The Secure Perfect services are still running but you will not receive any alarm notifications. DO NOT
shut down services unless you are instructed or the system requires maintenance.
Shutting Down
It is ESSENTIAL that you shut down Secure Perfect and your computer properly. The results could be
disastrous if you do not follow this procedure. You may be required to re-install all of the software on your
computer.
To shut down the Secure Perfect services:
1. Click START, Settings, Control Panel, Administrative Tools, and then Services. Scroll to
Secure Perfect services. The services must be stopped in the following order:
Secure Perfect Manager (Shutting down Secure Perfect Manager service stops micro
communications.)
Secure Perfect System Manager (Shutting down Secure Perfect System service stops client
communications.)
Secure Perfect Diagnostics
2. Exit Control Panel.
3. From the taskbar, click Start, then Shut Down.
4. From the Shut Down Windows form, verify that Shutdown the computer? is selected and click Yes.
Secure Perfect 6.1.1 User Manual 19
Navigational Conventions
Reference Topics:
SP Menus
SP Toolbar
SP Taskbar
Log On/Log Off or Shut Down
Typical Microsoft Windows navigation is used in this application. Selecting menu bar, drop-down menu,
and task bar options are typical Microsoft navigational procedures. Color or format in text, or changes in
the cursor identify hotspot links to related topics.
To change the Help window size:
To make the navigation or topic panes larger:
• Point to the divider between panes. When the pointer displays, hold down the left mouse and
drag the divider left or right.
• Point to any corner of the windowpane. When the pointer changes to a double-sided arrow,
hold down the left mouse button and drag the corner.
Move up or down the topic window by clicking the scroll bar on the right side of the topic pane.
SP Menus
Reference Topics:
Administration Menu Selections
Device Menu Selections
File Menu Selections
Help Menu Selections
Operations Menu Selections
Personnel Menu Selections
Reports Menu Selections
Search Menu Selections
View Menu Selections
Window Menu Selections
Following a successful logon, your Secure Perfect screen displays a menu bar, toolbar, and taskbar.
Selecting a menu bar item results in a drop-down group of related options. Clicking icons on the Secure
Perfect toolbar can also access many of the drop-down menu-bar options. Unavailable options will
display dimmed.
SP Menu Bar
Secure Perfect 6.1.1 User Manual 20
SP Taskbar
Reference Topic:
Status Bar
You can elect to view the Secure Perfect Taskbar across the bottom of your Secure Perfect window
indicating the current operator, communication port status, number of clients connected, number of
alarms, and number of background tasks. It may look similar to the following:
The numbers indicate the total status of all facilities assigned to the current operator.
Communication Port Status indicator will vary in color depending on the status:
Blue: All micros for the operator’s facility are offline.
Green: All micros for the operator’s facility are online.
Yellow: Some micros for the operator’s facility are in error state.
Clients indicates number of clients licensed, online, and logged into SP.
Alarms indicates unacknowledged alarms displaying on the Alarm Monitor Form.
Background Tasks indicates the number of tasks currently in progress. The length of the task is
dependent on size of the job and hardware components of your computer. The process may take hours
to complete.
DO NOT shut down Secure Perfect services until the background task is complete.
Secure Perfect 6.1.1 User Manual 21
SP Toolbar
The Toolbar selection on the View menu is a toggle election and determines whether or not the toolbar is
visible across the top of the Secure Perfect screen. The following toolbar icons and functionality are
unique to SP:
Click To
Save changes to the current record.
Preview before printing a report.
Add a new record to the database, on the current form.
Delete the current record from the database.
Clear all data in the current form.
Recall a previous search and load the current form with the last search criteria data.
Search and display a list of existing records.
Display the Micro Utility Form.
Display the Alarm Graphics Viewer.
Display the Activity Monitor Form.
Display the Alarm Monitor Form.
Display the Client Monitor Form.
Display the Person Form.
Display the Manual Control Form.
Display the Digital Video Recorder network.
Access the SP Help system.
Secure Perfect 6.1.1 User Manual 22
Frequently Performed Tasks
Tasks and Functions You Will Perform Frequently
To: Reference Topics:
Alarm Routing and Bumping Alarm Routing and Bumping Form
Arm/Disarm an Intrusion Zone Arm/Disarm an Intrusion Zone
Create a Dial-Up Micro Record Creating a Dial-Up Micro Record
Create a Direct-Connect Micro
Record
Create Badges Badging Overview
Create Access Rights Access Rights
Create Person Records Person Records Creation
Create Reports Overview - Reports
Display DVR Windows Digital Video Viewer
Manual Control DI, DOs, & Intrusion
Zones
Mass Updates Mass Update
Monitor Activities Activity Monitoring Using the Activity
Overview – Diagnostics Overview - Diagnostics
Set the Automatic Logoff Time Setting the Automatic Logoff Time
View Alarm Graphics Alarm Graphics Viewer
View and Remove Alarms from the
Alarm Monitor Form
Creating a Direct-Connect Micro Record
Video Windows Overview
Overview - Manual Control Form
Monitor Form
How Do I Remove an Alarm from the
Alarm Monitor Form
Secure Perfect 6.1.1 User Manual 23
Operations Menu
Activity Monitoring
Overview
Reference Topics:
Activity Monitoring Using the Activity Monitor Form
Activity Monitor Form Toolbar
Swipe and Show Option
Activity Monitor
The Activity Monitor displays badge and intrusion zone transactions on the system’s readers. Once you
configure your readers, this is a way to verify that the configuration is correct and that the readers work
as you expect. Before the Activity Monitor can display badge transactions for a reader, the reader MUST
be marked as Active and Online and the activity for the reader MUST be routed to the Activity Monitor. By
default, routing for all transactions is set to the Activity Monitor.
Intrusion Zone activity is based on reader, Digital Inputs, or manual control transactions within assigned
Intrusion Zones. Arm, disarm, or fail activity is displayed for activity within that Intrusion Zone.
In a system using database partitioning (facilities), the Activity Monitor Form will display activity based on
the reader’s facility regardless of the person’s facility assignment.
Activity Monitoring Using the Activity Monitor Form
Reference Topics:
Activity Monitor Form Toolbar
Activity Monitor Form Shortcut Menu
For a shortcut to the functions available within the Activity Monitor Form or to a related form, rightclick anywhere in the area where the badge transactions display. Not all options will be available to you.
You must click on a badge transaction with a DVR association in order to enable video options on the
shortcut menu. Camera and reader association (linking) is accomplished on the Administration Menu,
Event Trigger Form.
Date:
Time:
Activity Type:
Type
• Valid
• Invalid Person was not granted access. Examples: Person was not given
• Lost
• Unknown
• APB In Invalid
Displays the date in the micro on which the badge transaction occurred.
Displays the time of the badge transaction occurrence in the micro.
Displays the type of activity that occurred, along with a graphic:
Activity
Person was granted access.
access to the reader, the badge was suspended, the reader was
inactive, the reader was offline, or the door was unlocked.
Badge status is lost.
Badge is not in the Secure Perfect database.
Current badge APB current status of IN, and attempted to gain access
to an APB IN reader.
Secure Perfect 6.1.1 User Manual 24
• APB Out
Invalid
• TA In Invalid
Current badge APB current status of OUT, and attempted to gain
access to an APB OUT reader.
Current badge T&A current status of IN, and attempted to gain access to
T&A IN reader.
• TA Out Invalid
Current badge T&A current status of OUT, and attempted to gain access
to a T&A OUT reader.
• Valid Floor
Elevator control with floor tracking is being used and the person was
granted access to the selected floor.
• Invalid Floor
Elevator control with floor tracking is being used and the person was not
granted access to the selected floor.
• Duress Valid
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered.
• Duress Invalid
‘Grant Access on Duress’ is not active on this system (not selected on
the Parameter Form) and an attempted door access with a PIN code
(with the final digit incremented by + 1) was denied.
• Duress Valid
Open
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The door is open.
• Duress Valid
No Passage
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The unlock time expired
and the door did not open.
• Valid Open
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs and the door opens.
• Valid No
Passage
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs but the door did not open within the configured unlock time. This
may be an indication of someone deciding not to pass through the door,
or an accidental read as someone passes a reader.
• Invalid PIN
A badge was presented at a reader and an invalid PIN was entered.
This message displays for as many times as you enter an invalid PIN,
unless ‘Max Invalid Pin’ is configured on the Reader Form, Reader tab.
The badge does not grant access.
• Max Invalid PIN
‘Max Invalid PIN Count’ is active on this reader and the number of
invalid badge counts has reached the maximum, as configured on the
Reader Form, Reader tab. The badge did not grant access and the
badge is suspended.
The following are intrusion zone activities:
• Zone Armed
• Zone Disarmed
• Arm/Disarm
By reader, DI, or manual control.
By reader, DI, or manual control.
An alarm is in alarm state. Device or badge transaction failed.
Failed, Zone
Not Secure
• Arm/Disarm
Failed, Time
Expired
• Arm/Disarm
No badge transaction. The 10-second time period allowed for
completion of the arm/disarm process at keypad and reader, has
expired.
Intrusion Zone not assigned to access right or is invalid.
Failed, Invalid
Access Right
• Arm/Disarm
Reader is not assigned to the zone.
Secure Perfect 6.1.1 User Manual 25
Failed Not in
Zone
The following are Guard Tour activities:
• Tour Started
• Tour Ended
• Tour Started
Manually
• Tour Ended
Manually
• Tour Activity
• Invalid Tour
Activity
Security officer has started a Guard Tour.
• Security officer has completed a Guard Tour.
• All tour points have been ‘hit.’
• A Guard Tour was started manually, at the control station and not
by presenting a badge at a reader or DI point.
A Guard Tour was ended manually, at the control station and not by
presenting a badge at a reader or DI point.
A tour point was hit along a Guard Tour.
• Double ‘hit’ of any assigned tour point.
• A tour point is ‘hit’ during a paused tour.
• If a tour has not started and its points are hit, an invalid tour activity
transaction is not generated.
• Tour Paused
• This previously started tour has been paused. The clock time to
complete this tour is temporarily stopped.
• Tour Resumed
• This previously paused tour has resumed. The clock time to
complete this tour is resumed
Location
• Displays the DI or reader description.
• If an event trigger has been defined for associating video with
transactions from specified reader(s), a camera icon will display as
part of the reader description. When selecting a badge transaction
identified with a camera icon, right-click to display the shortcut
menu, then select a video option.
• If this badge is a guard tour badge, this field displays the description
of the tour point.
• If activity is manual control, Client name displays.
Name
• If this badge is assigned to a person, the name of the person
displays.
• If this activity is manual control, the operator name displays.
• If this badge is a guard tour badge, the name of the person
displays.
• If this hit is a DI point, this field is blank.
Number
• If the badge is unknown or not assigned to a person, the badge
number or, if aliasing is used, the badge alias number is displayed.
• Otherwise, this field will be blank.
Reference
• If this is an elevator reader (Valid Floor or Invalid Floor displayed in
the field), this field displays the floor selected.
• If this is a zone intrusion reader, this is a zone description.
• If this is a guard tour, the guard tour desciption displays.
• If ‘Max Invalid PIN Count’ displays in the activity type, then ‘Badge
Suspended’ displays here.
• For any other activity type, this field is blank.
Secure Perfect 6.1.1 User Manual 26
Alarm Graphics Functions
Alarm Graphics Editor
Reference Topic:
Adding Sound to an Alarm
Alarm Graphics Viewer
Alarm Graphics Editor Form
This form allows you to create a graphical view of alarm states for the alarms you select. In general, you
import a map drawn as a Windows MetaFile (.wmf or .emf) and place alarm points on the map. A single
file may be imported multiple times. An alarm may be placed on multiple maps and each point on the
map may contain multiple alarms.
Map
Click the drop-down list of available maps. If there are no maps listed or you want to create a new map,
click Add record on the Secure Perfect toolbar, allowing you to navigate to additional sources.
Link Alarms to this map
Because you have an alarm on several maps, click to display the Select Default Alarms dialog
box. Designate one map as the default, which means that this map will display whenever you
select this alarm point from the Alarm Monitor Form and then, display the Alarm Graphics Viewer
Form.
Magnification
Slide to zoom out or zoom in, on the map view currently displayed. Once you have zoomed in or
increased the size of the map, the scroll bars on the side and bottom of the map windowpane
become available. To return the map to the original size, use the magnification slide.
Map Taller
Click to change the width to height ratio; the map becomes taller.
Map Shorter
Click to change the width to height ratio; the map becomes shorter.
Point Settings Group:
• Point Type: Select Alarm, Camera, Digital Input, Digital Output, or Jump to Map from the
drop-down list. Designating the point type as Camera enables access to live video only, a
camera alarm, or both.
• Add Point: This button become active when you click the map at a spot where you want to
add an alarm point, then click Add Point to display the alarm point on the map. This step
activates the remaining fields in this grouping.
• Delete Point: Click to remove alarms from the map. This button will become active after you
click Add Point or select an existing alarm point on the current map.
• Label: Displays the current label of the alarm point.
• Change: Click to display the Point Label dialog box, allowing you to change the label of the
map point.
• Jump to map: Allows you to define the point as a jump to another map when this point is
selected from the Alarm Graphics Viewer Form. Click the drop-down list to display a list of
available maps and select the map to which you want to link.
Links for this point:
• Alarm link: Link a physical alarm point to the point you are creating on this map by selecting
an alarm from the drop-down list. Select more than one by clicking Link to More Than One
Alarm.
- This setting label changes to Digital Input if the assigned Point Type is a Digital Input. The
drop-down displays a list of available digital inputs.
- This setting label changes to Digital Output if the assigned Point Type is a Digital Output.
Secure Perfect 6.1.1 User Manual 27
The drop-down displays a list of available digital outputs.
• Link to more than one alarm: Allows you to link more than one physical alarm or DI/DO
point to the point you are creating on this map. This button label changes based on the type
of point that you are configuring. The icon that will display for the group reflects the most
severe alarm in the group.
• Camera: Select a camera from the drop-down list to link live video access from a map. (This
setting is not available if the assigned Point Type is a Digital Input or Digital Output.)
Icons for this point:
Select an appropriate icon to represent the alarm state. An alarm in reset condition is low severity. An
alarm in alarm condition is medium severity. An alarm in trouble condition is high severity.
• Trouble: Select the icon you want to display when this alarm point is in a trouble condition
(short or cut). Click the drop-down list to display a list of currently available icons. You may
add more icons by clicking Add New Icon to Database. (This setting does not display if the
Point Type is Digital Output.)
• Alarm: Select the icon you want to display when this alarm point is in an alarm condition.
Click the drop-down list to display a list of currently available icons. You may add more icons
by clicking Add New Icon to Database.
- This setting label changes to Set if the assigned Point Type is a Digital Input.
- This setting label changes to Active if the assigned Point Type is a Digital Output.
• Inactive: Select the icon you want to display when this point is in a reset condition. Click the
drop-down list to display a list of currently available icons. You may add more icons by
clicking Add New Icon to Database.
• Add New Icon to Database: Click to import your own icon files to the list of available icons
used in the previous three fields to represent a specific alarm state.
You can navigate between the Alarm Monitor Form and Alarm Graphics by clicking the right mouse
button.
Alarm Graphics Viewer
Reference Topics:
Alarm Graphics Editor
Alarm Graphics Viewer Shortcut Menu
Secure Perfect Viewer
Use this form to view an alarm graphics map, as configured on the Alarm Graphics Editor Form. This is a
separate application and can be moved anywhere on your monitor. This is useful for dual-display
monitors or wide monitor display.
• Alarm Graphics Viewer Toolbar:
File Menu Exit: Closes the Secure Perfect Viewer application.
Operations Menu
Help Menu Help Topics: Opens the Secure Perfect Help system.
This menu conveniently allows access to related Secure Perfect
Operations menu options.
• Alarm Graphics Viewer: Use this option to reopen the Alarm
Graphics Viewer Form when you have previously closed the form.
• Alarm Monitor: Opens the Alarm Monitor form in the Secure
Perfect windowpane.
• Activity Monitor: Opens the Activity Monitor form in the Secure
Perfect windowpane.
• Manual Control: Opens the Manual Control form in the Secure
Perfect windowpane.
• Alarm Graphics Viewer Form: Indicates that an Alarm Graphics
Viewer Form session is in progress.
About Secure Perfect: Opens the About Secure Perfect window in the
Secure Perfect windowpane and displays the Secure Perfect version,
service pack number, copyright information, licensing information, and
Secure Perfect 6.1.1 User Manual 28
Loading...
+ 239 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.