Access Control and Integrated
Security Management System
Secure Perfect
®
User Manual
imagination at work
This publication may contain examples of screens and reports used in daily operations. Examples include fictitious
names of individuals and companies. Any similarity to names and addresses of actual business enterprises and
persons is entirely coincidental.
This document contains proprietary information of General Electric Company, USA and is furnished to its customer
solely to assist that customer in the installation, testing, operation, and/or maintenance of the equipment
described. This document shall not be reproduced in whole or in part nor shall its contents be disclosed to any
third party without the written approval of GE Security.
Copyright 2005 GE Security, Inc.
All Rights Reserved
Printed in the USA
Secure Perfect is a registered trademark of GE Security, Inc.
Access, Active Directory, Directory File Services, DirectX, Internet Explorer, Microsoft, .NET, SQL Mail, SQL
Server, Windows, Windows NT, and Windows XP are trademarks or registered trademarks of Microsoft
Corporation.
Adobe and Acrobat are trademarks of Adobe Systems Incorporated which may be registered in certain
jurisdictions.
Citrix is a trademark of Citrix Systems, Inc.
Crystal Reports is a registered trademark of Crystal Decisions.
Digi is a registered trademark of Digi International.
Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corporation in the
United States and other countries.
pcANYWHERE is a trademark of Symantec Corporation.
Yahoo is a registered trademark of Yahoo! Inc.
GE Infrastructure – Security
791 Park of Commerce Blvd., Suite 100
Boca Raton, FL 33487
(561) 998-6100
Part Number: 460556004B
May 2005
READ ME FIRST!
The content of this User Manual was generated from the Secure Perfect 6.1.1
Online Help system.
1. Books , as displayed in the Online Help, Contents, have become
sections in this document.
2. Hyperlink locations throughout this Guide display in green text.
3. Reference Topics (displayed as hyperlinks in the Online Help System)
can be accessed in this document as well, using typical Adobe PDF
navigation, including the Adobe Acrobat bookmark navigation pane.
4. We encourage you to take advantage of the Adobe Reader Search icons
, when navigating this manual.
5. ‘Show me’ video demonstration files can be executed and viewed from
the Secure Perfect Online Help ONLY.
6. Increase or decrease the page magnification as you
prefer for your personal use.
Secure Perfect 6.1.1 User Manual 1
Secure Perfect 6.1.1 User Manual 2
Table of Contents
READ ME FIRST! ............................................................................................................... 1
Introduction to SP Editions ...................................................................................... 13
Window Menu Selections....................................................................................................... 266
Z ......................................................................................................................................267
Zone History........................................................................................................................... 267
Secure Perfect 6.1.1 User Manual 12
Introduction to SP Editions
Welcome
Reference Topics:
What's New?
Client/Server Architecture
Related Documentation
Getting Started
Welcome to Secure Perfect!
Secure Perfect Editions is a multi-edition offering of Integrated Secure Management Software designed
on Microsoft Windows technology. Secure Perfect Editions provide full security management functions
including access control, intrusion zone control, alarm monitoring, reporting, photo ID badging, and CCTV
interfaces as standard features. Secure Perfect Editions also offers integrated system options that
include digital video surveillance and Web-based reporting.
Throughout this Help system, reference to Secure Perfect is represented as "SP" in text content to
avoid repetition where the product name and/or version may have already been established.
SP Global Edition: SQL Server 2000 Replication services are used to distribute the data from a Global
Server to Regional Servers. Secure Perfect installation creates the necessary components for a
replicated system, configuring publications and subscriptions at each level. The Global Database Server
is the ‘main’ Secure Perfect database server. The term ‘main’ as used in this context means that the
Global Database Server acts as a hub for all replication activity. This Global Server hosts a Distributor
whose role is to store history and miscellaneous information about merge replication. When the
Distributor is created on a database, it generates its own database to store information. Once publishing
is enabled on the Global Server, it is able to control and monitor publications and subscriptions as well as
the starting and stopping of replication agents. Regional Database Servers act as ‘client’ database
servers. They have the ability to subscribe to publications located on the Global Server. These Regional
Servers operate independent of the Global Server for a period of time as necessary. Subscriptions are
‘pushed’ to each Regional Server by the Global Server. This means that the Regional Servers are not
required to request updated data from the Global Server, because updates are periodically supplied to
Regional Servers according to a set schedule. Replication intervals are configurable through SQL Server
Enterprise Manager user interface. Data is continually synchronized by implementing this customized
replication configuration. Refer to the Secure Perfect Installation Guide for a terminology list and
complete description of this feature. Also refer to Global Edition Regional Configuration Rules and
Replication and Synchronization Conflicts in this Help file.
SP Enterprise Edition is licensed for Windows 2000/2003 Standard Edition Server as the operating
system and SQL Server 2000 Standard Edition as the database. SP Enterprise Edition is designed for
mid to large-sized systems with capacity requirements of up to 25 client workstations, 256 micros, and
4,096 readers.
Cluster technology selections in this Enterprise-level installation provide new architecting options.
SP Professional Edition is licensed for Windows 2000 Professional Server or XP Professional Server as
the operating system and SQL Server 2000 Desktop Engine (MSDE) as the database. SP Professional
Edition is designed for small to mid-sized systems with capacity requirements of up to 5 client
workstations, 32 micros, and 256 readers.
eZ Edition is licensed for Windows 2000 Professional Server or XP Professional Server as the operating
system and SQL Server 2000 Desktop Engine (MSDE) as the database. eZ Edition is designed for small
systems with capacity requirements of 5 client workstations, 32 micros (PX-2000 Series ONLY), and 128
readers.
This Help system provides information for system administrators to configure and operate the SP Editions
software.
Secure Perfect 6.1.1 User Manual 13
What's New?
What’s New in Secure Perfect
New in 6.1.1 ONLY:
Configure APB Status by Region: This feature allows you to configure APB readers across Regions or
within a specific Region only. If configured across Regions, entering a Region activates the badge only in
that region and disables the badge in all other Regions.
Micro Connection Type Network + Direct Communication: This is a new network configuration option
selectable on the Micro Form, Micro Definition tab. This selection allows a micro that loses network
connection to fail over to a serial connection. On the Micro Utility Form, a network micro normally displays
an IP address in the Comm device column. When a network micro loses connection, the Alarm Monitor
Form displays a Host Comm alarm. After approximately two minutes, the alarm resets and the serial
connection begins communications. The Micro Utility Form Comm device column now displays the
Comm port.
Micro Connection Type Network + Network: This is a new network configuration option selectable on
the Micro Form, Micro Definition tab. This selection allows a micro that loses network connection to fail
over to a secondary network connection. When a network micro loses connection, Alarm Monitor Form
displays a Host Comm alarm. After approximately two minutes, the alarm resets and network
communications begin. The Micro Utility Form Comm device column now displays the backup IP address
or network name, as assigned on the Micro Form, Port Settings tab.
Alarm Graphics Viewer Window is a Separate Application: The window launches independently from
the Secure Perfect application and can be moved outside of the Secure Perfect window area. This is
useful for dual-display monitors or wide monitor display.
Suspend Badge After Invalid PIN Attempts: This option is configured on the Reader tab of the Reader
Form. Select Max Invalid PIN Count and enter a number between 1 and 6 as the number of times an
invalid PIN can be entered at a reader before the badge is suspended. If the badge is suspended, the
badge must be reset to Active by a system administrator.
DVR Search - Play Single Recorded Frame: The Search Results windowpane in DVR Search returns a
list of recorded video event tags based on the search parameter criteria specified. Select an event tag
from the list and right-click to display a shortcut menu. The shortcut menu has been expanded to include
Play Single Recorded Frame. When selected, a single image displays in the video window. This is the
first frame of the event recording displayed as a still photo. To play the rest of the video clip, unpause the
video on the DVR Viewer.
Two New Micro Types: MicroPXNPlus or MicroPXNPlus 2000 are selectable on the Micro Form, Micro
Definition tab. A board provides direct, dial-up, and network capabilities in one board. The network
supports Ethernet only. The board also has an integrated modem option which means that the modem is
a chip that can be ordered with the board or added at a later date. This modem can also be used as dialup fallback to a network board. Both boards support the following reader boards, 2RP, 2SRP, 8RP, and
CK8RP. The boards provide nonvolatile storage that provides faster reset recovery and allows hostless
operation. A new Web Integrated Configuration Tool was created for flashing these micro types,
eliminating the need to install Flashtool on each computer in order to download and flash the micros.
Database Connection: This feature is configured on the Parameter Form, Settings tab. This feature
allows you to configure the amount of time that elapes before your Secure Perfect system retries the
connection and considers that the database is not accessable.
• Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120 seconds.
1) In a Secure Perfect Global Edition configuration, this is the amount of time until a Regional failover
begins. 2) In a typical Secure Perfect configuration, this is the amount of time before Secure Perfect
transactions are saved, Secure Perfect services shut down, and a message advises you to repair your
database.
• Retry: The default is 3 retries. The minimum is ‘0’; the maximum is 5 retries.
Secure Perfect 6.1.1 User Manual 14
Enable ‘Valid No Passage’: This option is configured on the Reader Form, Reader tab. Select this
checkbox if you want your Secure Perfect system to notify you when a valid badge read occurs but the
door did not open within the configured sense time. This may be an indication of a duress situation,
someone deciding not to pass through the door, or an accidental read as someone passes a reader.
• This feature must be associated with an alarm type of door forced or door held in order to be notified
of a change in state of the door.
• In order to notify of a duress situation, Grant Access on Duress must be configured.
New in 6.1:
Guard Tour:
This feature makes use of two new forms in Secure Perfect, Guard Tours and Tour Point. A Guard Tour
is an inspection of your facility premises, by a security guard. The officer stops at pre-determined tour
points along the way, where a digital input (DI) is triggered or a badge is presented to a reader so that the
Secure Perfect system can track the tour progress. Each time a badge is presented to a reader, a tour
point is ‘hit.’ DIs can also be assigned as tour points. An additional tab has been added to the Manual
Control form. The Guard Tour tab of the Manual Control form displays the status of Guard Tours
configured in your Secure Perfect system. Select a Guard Tour to display tour details and tour points. An
occasion may arise that requires a tour to be started, paused, resumed, or stopped manually. This
feature and related forms are not available for input if you are not licensed for Guard Tour.
Global Edition Enhancements:
• Database Server and Fileserver Redundancy: Global Editions systems can be configured for
database redundancy, at the Region level. A Regional Database Server can be configured to have
backup servers. Refer to the Backup Regions tab of the Region Form. If a client is not able to connect
to its Regional Database Server for any reason, it fails over to the backup Regional Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers.
• Client Region Failover: If you have Region backups configured, all clients in that region, by default,
will fail over to the backup Region when the system detects that it cannot access the database. You
might choose to clear this checkbox on the Client tab of the Client form, to prevent nonessential client
failover and keep extra traffic on your system network to a minimum.
Alarms:
• Alarm Bumping and Routing: The Client Group Form allow you to assign Secure Perfect computers
into logical Client Groups. Then, Alarms can be routed to these Client Groups by time schedule or at
all times. Additionally, alarms can be ‘bumped’ (forwarded) to one or more additional Client Groups
when alarms are unacknowledged and unpurged within configured time limits.
• Alarm Graphics Enhancements: Alarm Graphics can now be configured for digital inputs and digital
outputs. The Alarm Graphics Viewer displays active status. Right-click menu options display newly
enhanced functionality. Operators for the Alarm Graphics Viewer must be assigned ‘Update’ and
facility permissions in order to select right-click menu options. For shortcut menu functionality, rest
your mouse pointer on an assigned point and right-click. The shortcut menu that displays with a rightclick mouse button depends on the Point Type assigned to the point. The options allow manual control
of doors.
• Duress: This selection determines whether the door will open when a duress PIN code (with the final
digit incremented by + 1) is entered with a valid badge. This feature is configured for your Secure
Perfect system on the Parameters Form, Settings Tab.
Event Trigger Updates:
Assigning Intrusion Zones to an Event Trigger: The Intrusion Zone tab on the Event Trigger form
allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will trigger an event.
Extended Unlock Time Options:
Extended unlock time is enabled on the Personnel Tab of the Person Form. When this option is selected,
enabled badges associated with a Person record allow extra time to gain access to an entry or exit point.
Extended times (in minutes and seconds) are configured and assigned on the Door Functions tab of the
Reader Form. For example, if a door is used by disabled persons or the reader is mounted at a distance
from the door, a longer unlock time may be required to exit or enter.
Secure Perfect 6.1.1 User Manual 15
Real-Time Digital Output Status:
Digital output status is reflected in real-time updates on the Alarm Graphics Viewer if this option is
selected on the Micro Definition tab of the Micro Form.
UL Certification:
Secure Perfect is a UL-listed Grade A system (UL 1076 Grade A Proprietary Burglary Requirements/UL 294 Access Control Requirements). Your installation must adhere to the requirements listed in the
Certification section of the Secure Perfect Installation Manual, in order to qualify as UL-listed Grade A
certified.
Badging:
• Designer Upgrade: The integrated Badge Designer program is an upgraded version with many new
features. On the Secure Perfect Badge Design Form, click Edit Badge Design to display a new
windowpane. This is a separate program with its own toolbar. If you had a previous version of badge
designer that created files with a .gdr extension, you will be prompted to save the file as a .dgn when
you edit a badge design for the first time. Access the extensive Online Help system from the Badge
Designer toolbar. Additionally, refer to the Badge Designer User Manual, and review the "What’s New"
section. A PDF of the manual is provided on your documentation CD.
• Badge Format: This option on the Administration menu allows an operator to design, import, or export
custom badge formats for your Secure Perfect system. Custom magnetic stripe or Wiegand formats
can be loaded and stored in the Secure Perfect database. After identifying the required custom format,
the format is flashed to the micro. A new tab on the Micro Flash and Micro Parameter Configuration
window allows you to configure custom badge formats.
Auto Shutdown of Secure Perfect Services:
This is a default option on the Client tab of the Client form. If selected, Secure Perfect Services will
automatically shut down when the client application is closed. A list of prerequisite criteria must be met.
Manual Control Form:
• Shortcut from Client Monitor Form to Manual Control Form: This feature allows the current operator to
quickly locate a client, right-click and select the Manual Control form, and manually perform operations
of the Secure Perfect system.
• Mode Tab on the Manual Control Form: This feature allows the operator to select all or individual
micros or clients for immediate change of mode from the Manual Control Form, on the new Mode Tab.
The micro’s current real-time mode and address are also displayed.
Report Generation Upgrades:
• Guard Tour History Report: This option on the Administration menu allows you to generate a report of
completed Guard Tours, displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start, and manual stops.
• Administration Report: The list of report types has been expanded to include details of Alarm Routing
and Bumping configurations and Badge Format (UBF) custom badge configurations.
Secure Perfect 6.1.1 User Manual 16
Client/Server Architecture
Reference Topic:
SP Services
Micro Definition Tab
Secure Perfect Server, client workstation, and network-enabled microcontrollers communicate over
10/100Mb Ethernet LAN/WAN typologies. Refer to Micro Form, Micro Definition Tab for a list of supported
Microcontroller types.
PC Function Configuration
Win2000/2003
Standard
Edition Server
Win2000
Professional
Edition Server
Win2000
Professional
or XP
Professional
Client
Workstation
Secure Perfect Software
Cluster technology or Global Edition selections in this
Enterprise-level system installation provide new architecting
options. All configuration options are detailed in the Secure Perfect Installation Guide.
Allows database and file Server to be placed on different Windows
Server computers.
SQL Server 2000 Standard Edition Database and applicable SQL
Server Service Packs
Imaging: The feature is installed but not recommended for
production as an Imaging workstation.
Clients: Secure Perfect supports 25 system-wide clients (any client
can host a micro).
Micros: Secure Perfect supports 256 system-wide micros (32 on the
server and up to 64 per communications client).
Secure Perfect Software
SQL Server 2000 Desktop Engine (MSDE) and applicable Service
Packs
Imaging: The feature is installed on the server as an Imaging
workstation.
Clients: The system supports five system-wide clients (any five can
also be configured as communications clients for hosting micros).
Micros: The system supports 32 system-wide micros.
Secure Perfect Software
Imaging: The feature is installed.
Secure Perfect 6.1.1 User Manual 17
Getting Started
Reference Topic:
Secure Perfect Services
Before you proceed, make sure that your peripheral system hardware is installed and running. This
includes micros, readers, modems, printers, and network lines. Refer to your Secure Perfect Installation Guide or follow specific installation instructions for your brand of hardware.
The following order is recommended for initial setup, beginning with configuring your Server computer
Secure Perfect system:
1. Set system parameters.
2. OPTIONAL: Define facilities.
3. Identify clients.
4. Create permissions.
5. Add operators.
6. Set up schedules and events.
7. Configure devices.
8. Create access rights, persons, and badges.
9. Back up your system. (This procedure is detailed in your Secure Perfect Installation Guide.)
10. Configure client computers. (This procedure is detailed in your Secure Perfect Installation Guide.)
Related Documentation
Reference Topic:
Navigational Conventions
For more information about Secure Perfect Editions and hardware that works with it, consult the
following:
• Micro/5 Installation Guide
• Micro/PX-2000 and Micro/PXN-2000 Installation Guide
• Micro/PX-2000 and Micro/PXN/2000 Microcontroller Quick Installation Instructions
• Secure Perfect Installation Guide
• Badge Designer Manual for Picture Perfect v3 and Secure Perfect v6
These documents and others are included on the Documentation CD-ROM in PDF format. The CD
is included in the media kit, shipped with your system. You must have Adobe Acrobat Reader installed on
your computer to view PDF documents. For your convenience, a copy of the Adobe Acrobat Reader
software is included on the CD.
Sources of training material include the following:
1. Additional detail or related information can be viewed by clicking the linked Reference Topics listed
at the bottom of each topic pane.
2. A Training CD-ROM is shipped with each system media kit. The CD contains an operations and
training course that consumes approximately 16 hours.
You may want to take advantage of the XtremeLearning library of convenient, comprehensive, and
interactive Web-based training courses available through your GE Security Business Partner.
Secure Perfect 6.1.1 User Manual 18
Navigation
Log On/Log Off or Shut Down
Reference Topic:
Secure Perfect Services
Auto Shutdown of Client Services
Log On/Log Off
Enter your logon/logoff ID and Password:
• To start the Secure Perfect client program from the File menu.
• To quit the Secure Perfect client program using the Close button in the top right corner of the
Secure Perfect window.
The default Login/logout ID is secure and the default Password is master. If you purchased your
system from GE Security, the default ID and Password are set for you.
UPGRADES: Versions of Secure Perfect 4.0 and earlier did not require case-sensitive default login
passwords. When upgrading from a version of Secure Perfect 4.0 or earlier, you may experience a
problem logging in. If you have never changed it, your Secure Perfect default password may be set to
initial caps, as in 'Master' and not 'master.'
Logoff
The Logoff option on the File menu allows you to log off of Secure Perfect without closing the program. A
message box displays. Click OK to log off of the Secure Perfect application (logging off allows an
operator to log off and another operator to log in without ending the program.) or Cancel to cancel the
logoff process. While logged off, no one can enter data into SP; however, Secure Perfect continues to
communicate with the micros, store alarm and badge transactions in the history database, and notify you
of alarms based on you facility assignment. Refer to the Client Form for information on turning alarm
notifications on and off.
The Secure Perfect services are still running but you will not receive any alarm notifications. DO NOT
shut down services unless you are instructed or the system requires maintenance.
Shutting Down
It is ESSENTIAL that you shut down Secure Perfect and your computer properly. The results could be
disastrous if you do not follow this procedure. You may be required to re-install all of the software on your
computer.
To shut down the Secure Perfect services:
1. Click START, Settings, Control Panel, Administrative Tools, and then Services. Scroll to
Secure Perfect services. The services must be stopped in the following order:
Secure Perfect Manager (Shutting down Secure Perfect Manager service stops micro
communications.)
Secure Perfect System Manager (Shutting down Secure Perfect System service stops client
communications.)
Secure Perfect Diagnostics
2. Exit Control Panel.
3. From the taskbar, click Start, then Shut Down.
4. From the Shut Down Windows form, verify that Shutdown the computer? is selected and click Yes.
Secure Perfect 6.1.1 User Manual 19
Navigational Conventions
Reference Topics:
SP Menus
SP Toolbar
SP Taskbar
Log On/Log Off or Shut Down
Typical Microsoft Windows navigation is used in this application. Selecting menu bar, drop-down menu,
and task bar options are typical Microsoft navigational procedures. Color or format in text, or changes in
the cursor identify hotspot links to related topics.
To change the Help window size:
To make the navigation or topic panes larger:
• Point to the divider between panes. When the pointer displays, hold down the left mouse and
drag the divider left or right.
• Point to any corner of the windowpane. When the pointer changes to a double-sided arrow,
hold down the left mouse button and drag the corner.
Move up or down the topic window by clicking the scroll bar on the right side of the topic pane.
SP Menus
Reference Topics:
Administration Menu Selections
Device Menu Selections
File Menu Selections
Help Menu Selections
Operations Menu Selections
Personnel Menu Selections
Reports Menu Selections
Search Menu Selections
View Menu Selections
Window Menu Selections
Following a successful logon, your Secure Perfect screen displays a menu bar, toolbar, and taskbar.
Selecting a menu bar item results in a drop-down group of related options. Clicking icons on the Secure
Perfect toolbar can also access many of the drop-down menu-bar options. Unavailable options will
display dimmed.
SP Menu Bar
Secure Perfect 6.1.1 User Manual 20
SP Taskbar
Reference Topic:
Status Bar
You can elect to view the Secure Perfect Taskbar across the bottom of your Secure Perfect window
indicating the current operator, communication port status, number of clients connected, number of
alarms, and number of background tasks. It may look similar to the following:
The numbers indicate the total status of all facilities assigned to the current operator.
Communication Port Status indicator will vary in color depending on the status:
Blue: All micros for the operator’s facility are offline.
Green: All micros for the operator’s facility are online.
Yellow: Some micros for the operator’s facility are in error state.
Clients indicates number of clients licensed, online, and logged into SP.
Alarms indicates unacknowledged alarms displaying on the Alarm Monitor Form.
Background Tasks indicates the number of tasks currently in progress. The length of the task is
dependent on size of the job and hardware components of your computer. The process may take hours
to complete.
DO NOT shut down Secure Perfect services until the background task is complete.
Secure Perfect 6.1.1 User Manual 21
SP Toolbar
The Toolbar selection on the View menu is a toggle election and determines whether or not the toolbar is
visible across the top of the Secure Perfect screen. The following toolbar icons and functionality are
unique to SP:
Click To
Save changes to the current record.
Preview before printing a report.
Add a new record to the database, on the current form.
Delete the current record from the database.
Clear all data in the current form.
Recall a previous search and load the current form with the last search criteria data.
Search and display a list of existing records.
Display the Micro Utility Form.
Display the Alarm Graphics Viewer.
Display the Activity Monitor Form.
Display the Alarm Monitor Form.
Display the Client Monitor Form.
Display the Person Form.
Display the Manual Control Form.
Display the Digital Video Recorder network.
Access the SP Help system.
Secure Perfect 6.1.1 User Manual 22
Frequently Performed Tasks
Tasks and Functions You Will Perform Frequently
To: Reference Topics:
Alarm Routing and Bumping Alarm Routing and Bumping Form
Arm/Disarm an Intrusion Zone Arm/Disarm an Intrusion Zone
Create a Dial-Up Micro Record Creating a Dial-Up Micro Record
Create a Direct-Connect Micro
Record
Create Badges Badging Overview
Create Access Rights Access Rights
Create Person Records Person Records Creation
Create Reports Overview - Reports
Display DVR Windows Digital Video Viewer
Manual Control DI, DOs, & Intrusion
Zones
Mass Updates Mass Update
Monitor Activities Activity Monitoring Using the Activity
Overview – Diagnostics Overview - Diagnostics
Set the Automatic Logoff Time Setting the Automatic Logoff Time
View Alarm Graphics Alarm Graphics Viewer
View and Remove Alarms from the
Alarm Monitor Form
Creating a Direct-Connect Micro Record
Video Windows Overview
Overview - Manual Control Form
Monitor Form
How Do I Remove an Alarm from the
Alarm Monitor Form
Secure Perfect 6.1.1 User Manual 23
Operations Menu
Activity Monitoring
Overview
Reference Topics:
Activity Monitoring Using the Activity Monitor Form
Activity Monitor Form Toolbar
Swipe and Show Option
Activity Monitor
The Activity Monitor displays badge and intrusion zone transactions on the system’s readers. Once you
configure your readers, this is a way to verify that the configuration is correct and that the readers work
as you expect. Before the Activity Monitor can display badge transactions for a reader, the reader MUST
be marked as Active and Online and the activity for the reader MUST be routed to the Activity Monitor. By
default, routing for all transactions is set to the Activity Monitor.
Intrusion Zone activity is based on reader, Digital Inputs, or manual control transactions within assigned
Intrusion Zones. Arm, disarm, or fail activity is displayed for activity within that Intrusion Zone.
In a system using database partitioning (facilities), the Activity Monitor Form will display activity based on
the reader’s facility regardless of the person’s facility assignment.
Activity Monitoring Using the Activity Monitor Form
Reference Topics:
Activity Monitor Form Toolbar
Activity Monitor Form Shortcut Menu
For a shortcut to the functions available within the Activity Monitor Form or to a related form, rightclick anywhere in the area where the badge transactions display. Not all options will be available to you.
You must click on a badge transaction with a DVR association in order to enable video options on the
shortcut menu. Camera and reader association (linking) is accomplished on the Administration Menu,
Event Trigger Form.
Date:
Time:
Activity Type:
Type
• Valid
• Invalid Person was not granted access. Examples: Person was not given
• Lost
• Unknown
• APB In Invalid
Displays the date in the micro on which the badge transaction occurred.
Displays the time of the badge transaction occurrence in the micro.
Displays the type of activity that occurred, along with a graphic:
Activity
Person was granted access.
access to the reader, the badge was suspended, the reader was
inactive, the reader was offline, or the door was unlocked.
Badge status is lost.
Badge is not in the Secure Perfect database.
Current badge APB current status of IN, and attempted to gain access
to an APB IN reader.
Secure Perfect 6.1.1 User Manual 24
• APB Out
Invalid
• TA In Invalid
Current badge APB current status of OUT, and attempted to gain
access to an APB OUT reader.
Current badge T&A current status of IN, and attempted to gain access to
T&A IN reader.
• TA Out Invalid
Current badge T&A current status of OUT, and attempted to gain access
to a T&A OUT reader.
• Valid Floor
Elevator control with floor tracking is being used and the person was
granted access to the selected floor.
• Invalid Floor
Elevator control with floor tracking is being used and the person was not
granted access to the selected floor.
• Duress Valid
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered.
• Duress Invalid
‘Grant Access on Duress’ is not active on this system (not selected on
the Parameter Form) and an attempted door access with a PIN code
(with the final digit incremented by + 1) was denied.
• Duress Valid
Open
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The door is open.
• Duress Valid
No Passage
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The unlock time expired
and the door did not open.
• Valid Open
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs and the door opens.
• Valid No
Passage
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs but the door did not open within the configured unlock time. This
may be an indication of someone deciding not to pass through the door,
or an accidental read as someone passes a reader.
• Invalid PIN
A badge was presented at a reader and an invalid PIN was entered.
This message displays for as many times as you enter an invalid PIN,
unless ‘Max Invalid Pin’ is configured on the Reader Form, Reader tab.
The badge does not grant access.
• Max Invalid PIN
‘Max Invalid PIN Count’ is active on this reader and the number of
invalid badge counts has reached the maximum, as configured on the
Reader Form, Reader tab. The badge did not grant access and the
badge is suspended.
The following are intrusion zone activities:
• Zone Armed
• Zone Disarmed
• Arm/Disarm
By reader, DI, or manual control.
By reader, DI, or manual control.
An alarm is in alarm state. Device or badge transaction failed.
Failed, Zone
Not Secure
• Arm/Disarm
Failed, Time
Expired
• Arm/Disarm
No badge transaction. The 10-second time period allowed for
completion of the arm/disarm process at keypad and reader, has
expired.
Intrusion Zone not assigned to access right or is invalid.
Failed, Invalid
Access Right
• Arm/Disarm
Reader is not assigned to the zone.
Secure Perfect 6.1.1 User Manual 25
Failed Not in
Zone
The following are Guard Tour activities:
• Tour Started
• Tour Ended
• Tour Started
Manually
• Tour Ended
Manually
• Tour Activity
• Invalid Tour
Activity
Security officer has started a Guard Tour.
• Security officer has completed a Guard Tour.
• All tour points have been ‘hit.’
• A Guard Tour was started manually, at the control station and not
by presenting a badge at a reader or DI point.
A Guard Tour was ended manually, at the control station and not by
presenting a badge at a reader or DI point.
A tour point was hit along a Guard Tour.
• Double ‘hit’ of any assigned tour point.
• A tour point is ‘hit’ during a paused tour.
• If a tour has not started and its points are hit, an invalid tour activity
transaction is not generated.
• Tour Paused
• This previously started tour has been paused. The clock time to
complete this tour is temporarily stopped.
• Tour Resumed
• This previously paused tour has resumed. The clock time to
complete this tour is resumed
Location
• Displays the DI or reader description.
• If an event trigger has been defined for associating video with
transactions from specified reader(s), a camera icon will display as
part of the reader description. When selecting a badge transaction
identified with a camera icon, right-click to display the shortcut
menu, then select a video option.
• If this badge is a guard tour badge, this field displays the description
of the tour point.
• If activity is manual control, Client name displays.
Name
• If this badge is assigned to a person, the name of the person
displays.
• If this activity is manual control, the operator name displays.
• If this badge is a guard tour badge, the name of the person
displays.
• If this hit is a DI point, this field is blank.
Number
• If the badge is unknown or not assigned to a person, the badge
number or, if aliasing is used, the badge alias number is displayed.
• Otherwise, this field will be blank.
Reference
• If this is an elevator reader (Valid Floor or Invalid Floor displayed in
the field), this field displays the floor selected.
• If this is a zone intrusion reader, this is a zone description.
• If this is a guard tour, the guard tour desciption displays.
• If ‘Max Invalid PIN Count’ displays in the activity type, then ‘Badge
Suspended’ displays here.
• For any other activity type, this field is blank.
Secure Perfect 6.1.1 User Manual 26
Alarm Graphics Functions
Alarm Graphics Editor
Reference Topic:
Adding Sound to an Alarm
Alarm Graphics Viewer
Alarm Graphics Editor Form
This form allows you to create a graphical view of alarm states for the alarms you select. In general, you
import a map drawn as a Windows MetaFile (.wmf or .emf) and place alarm points on the map. A single
file may be imported multiple times. An alarm may be placed on multiple maps and each point on the
map may contain multiple alarms.
Map
Click the drop-down list of available maps. If there are no maps listed or you want to create a new map,
click Add record on the Secure Perfect toolbar, allowing you to navigate to additional sources.
Link Alarms to this map
Because you have an alarm on several maps, click to display the Select Default Alarms dialog
box. Designate one map as the default, which means that this map will display whenever you
select this alarm point from the Alarm Monitor Form and then, display the Alarm Graphics Viewer
Form.
Magnification
Slide to zoom out or zoom in, on the map view currently displayed. Once you have zoomed in or
increased the size of the map, the scroll bars on the side and bottom of the map windowpane
become available. To return the map to the original size, use the magnification slide.
Map Taller
Click to change the width to height ratio; the map becomes taller.
Map Shorter
Click to change the width to height ratio; the map becomes shorter.
Point Settings Group:
• Point Type: Select Alarm, Camera, Digital Input, Digital Output, or Jump to Map from the
drop-down list. Designating the point type as Camera enables access to live video only, a
camera alarm, or both.
• Add Point: This button become active when you click the map at a spot where you want to
add an alarm point, then click Add Point to display the alarm point on the map. This step
activates the remaining fields in this grouping.
• Delete Point: Click to remove alarms from the map. This button will become active after you
click Add Point or select an existing alarm point on the current map.
• Label: Displays the current label of the alarm point.
• Change: Click to display the Point Label dialog box, allowing you to change the label of the
map point.
• Jump to map: Allows you to define the point as a jump to another map when this point is
selected from the Alarm Graphics Viewer Form. Click the drop-down list to display a list of
available maps and select the map to which you want to link.
Links for this point:
• Alarm link: Link a physical alarm point to the point you are creating on this map by selecting
an alarm from the drop-down list. Select more than one by clicking Link to More Than One
Alarm.
- This setting label changes to Digital Input if the assigned Point Type is a Digital Input. The
drop-down displays a list of available digital inputs.
- This setting label changes to Digital Output if the assigned Point Type is a Digital Output.
Secure Perfect 6.1.1 User Manual 27
The drop-down displays a list of available digital outputs.
• Link to more than one alarm: Allows you to link more than one physical alarm or DI/DO
point to the point you are creating on this map. This button label changes based on the type
of point that you are configuring. The icon that will display for the group reflects the most
severe alarm in the group.
• Camera: Select a camera from the drop-down list to link live video access from a map. (This
setting is not available if the assigned Point Type is a Digital Input or Digital Output.)
Icons for this point:
Select an appropriate icon to represent the alarm state. An alarm in reset condition is low severity. An
alarm in alarm condition is medium severity. An alarm in trouble condition is high severity.
• Trouble: Select the icon you want to display when this alarm point is in a trouble condition
(short or cut). Click the drop-down list to display a list of currently available icons. You may
add more icons by clicking Add New Icon to Database. (This setting does not display if the
Point Type is Digital Output.)
• Alarm: Select the icon you want to display when this alarm point is in an alarm condition.
Click the drop-down list to display a list of currently available icons. You may add more icons
by clicking Add New Icon to Database.
- This setting label changes to Set if the assigned Point Type is a Digital Input.
- This setting label changes to Active if the assigned Point Type is a Digital Output.
• Inactive: Select the icon you want to display when this point is in a reset condition. Click the
drop-down list to display a list of currently available icons. You may add more icons by
clicking Add New Icon to Database.
• Add New Icon to Database: Click to import your own icon files to the list of available icons
used in the previous three fields to represent a specific alarm state.
You can navigate between the Alarm Monitor Form and Alarm Graphics by clicking the right mouse
button.
Alarm Graphics Viewer
Reference Topics:
Alarm Graphics Editor
Alarm Graphics Viewer Shortcut Menu
Secure Perfect Viewer
Use this form to view an alarm graphics map, as configured on the Alarm Graphics Editor Form. This is a
separate application and can be moved anywhere on your monitor. This is useful for dual-display
monitors or wide monitor display.
• Alarm Graphics Viewer Toolbar:
File Menu Exit: Closes the Secure Perfect Viewer application.
Operations Menu
Help Menu Help Topics: Opens the Secure Perfect Help system.
This menu conveniently allows access to related Secure Perfect
Operations menu options.
• Alarm Graphics Viewer: Use this option to reopen the Alarm
Graphics Viewer Form when you have previously closed the form.
• Alarm Monitor: Opens the Alarm Monitor form in the Secure
Perfect windowpane.
• Activity Monitor: Opens the Activity Monitor form in the Secure
Perfect windowpane.
• Manual Control: Opens the Manual Control form in the Secure
Perfect windowpane.
• Alarm Graphics Viewer Form: Indicates that an Alarm Graphics
Viewer Form session is in progress.
About Secure Perfect: Opens the About Secure Perfect window in the
Secure Perfect windowpane and displays the Secure Perfect version,
service pack number, copyright information, licensing information, and
Secure Perfect 6.1.1 User Manual 28
contact information.
Magnification
• The Secure Perfect Viewer application window opens with a maximized Alarm Graphics Viewer Form
window inside. Click the controls in the top-right corner of the Alarm Graphics Viewer Form window to
minimize, return to maximized, or close. To reopen, select Alarm Graphics Viewer from the Secure
Perfect Viewer toolbar, Operations menu.
• Select a map from the Map drop-down list to display in the Viewer windowpane. The Viewer
application is limited to one windowpane. For shortcut menu functionality, move your mouse pointer to
an assigned point and right-click. The menus that display with a right-click mouse button depend on
the Point Type assigned.
• If another map is linked to an icon, click the icon to display the linked map.
• Click the controls in the top-right corner of this window to minimize, return to maximized, or close the
Secure Perfect Viewer window.
Slide to zoom out or zoom in, on the map view currently displayed.
Once you have zoomed in or increased the size of the map, the
navigation bars on the side and bottom of the map windowpane
become available. To return the map to the original size, use the
magnification slide.
MapTaller
Click to change the width to height ratio; the map displays as taller and
the width narrows.
Map Shorter
Click to change the width to height ratio; the map becomes shorter and
spreads in width.
Alarm Monitoring
Overview
Reference Topics:
Alarm Monitoring Using the Alarm Monitor
Alarm Monitor Form Toolbar
Alarm Monitor
The Alarm Monitor Form displays alarm activity.
• An operator can see alarms on the Alarm Monitor Form only for facilities that are currently active
and assigned to the current operator.
• The option to monitor an alarm must be selected on the Alarm Form in order for a specific alarm to
display on the Alarm Monitor Form.
• Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is removed,
even though Alarm Routing and Bumping may be configured.
All responses can be obtained from the Administration Report, with ‘Response’ as the selected report
type.
Secure Perfect 6.1.1 User Manual 29
Alarm Monitoring Using the Alarm Monitor Form
Reference Topics:
Alarm Monitor Form Toolbar
Alarm Monitor Form Shortcut Menu
For a shortcut menu to the functions available within the Alarm Monitor Form or to a related form,
click the right mouse button within the first windowpane where the alarms display or the second pane
where the messages display. Not all options will be available. You must select an alarm activity with a
DVR association in order to enable video options on the shortcut menu.
Click the Show me icon to view a step-by-step animated demo.
There are three sections to the Alarm Monitor Form:
• The top section or pane lists the alarms.
• The second pane lists any instructions assigned to the current (highlighted) alarm.
• The third pane allows you to respond to an alarm by either selecting a predefined response
or entering your own.
Column Headings: (These are read-only categories for display purposes and cannot be used for
sorting.)
Priority
Displays the priority of the alarm. The priority tells the system in which order it should alert the operator
when multiple alarms occur simultaneously. The priority range is 0 to 9 and the lower the number, the
higher the priority of the alarm.
Description
Displays the alarm description. Refer to the following examples:
• Tamper Alarm: mmm-b-pp Tamper where mmmm represents the micro number to which this alarm
is associated, b represents the board number, pp represents the point or device number, and
Tamper is the alarm description.
• Regional Failover on a Global System: bcttestpc–Region Failover Alarm where
bcttestpc is the PC Name of the client that has failed over to its configured backup Region, and
Region Failover Alarm is the alarm desciption.
If an event trigger has been defined for associating video with transactions from specified alarm(s), a
camera icon
will display as part of the alarm description. When selecting an alarm transaction
identified with an alarm icon, right-click to display a shortcut menu, then select a video option.
Reference
Displays additional information relating to the type of badge alarm. Only reader alarms have a reference,
such as a person name or badge number. This column may be blank.
Alarm State
Displays the current state of the alarm. The four possible states are as follows:
• Alarm: The point is in the Active alarm state (either Closed or Opened). The Active alarm
state for an alarm is defined on the Alarm Form.
• Reset: The point is no longer in the active alarm state.
• Cut: The wiring to the alarm point has been cut.
• Short: The wiring to the alarm point has been short circuited.
Process State
The process state is either Unacknowledged or Acknowledged. To acknowledge an alarm, select the
desired alarm and click Acknowledge. The alarm icon will change to reflect the acknowledgement and
clear from the window after reset.
Secure Perfect 6.1.1 User Manual 30
Count
The number of times the alarm has entered an alarm state since the alarm was last cleared from the
Alarm Monitor.
Host Date/Time
The date and time the alarm occurred according to the system date and time.
Micro Date/Time
The date and time the alarm occurred according to the micro’s date and time.
Instructions
Displays the instructions linked to the current alarm. When an alarm is displayed on the Alarm Monitor
Form, select the alarm. The alarm instructions set up for this alarm will display in the Instruction
windowpane, providing guidelines for the operator to resolve the alarm condition. Predefined Instructions
were created on the Instruction Form of the Administration menu.
Response
This is a multi-line dialog box, allowing you to manually enter a response of up to 256 alphanumeric
characters, for the current alarm.
Response Button
Click to display a list of predefined responses. Predefined responses are created on the Alarm Response
Form of the Administration menu. If the entire list does not fit, scroll bars become available on the right of
the window. Select a response and click OK for the selected response to display in the Response
windowpane of the Alarm Monitor Form.
• You can manually extend the response by placing your cursor at the end of the entry and
appending to a maximum of 256 alphanumeric characters.
• You can append an additional predefined response without overwriting the existing entry.
• When you append an additional predefined response to the existing entry, a warning
message displays if the response exceeds 256 characters. The additional response will not
be appended.
The selected response is recorded in alarm history when the alarm is acknowledged.
Acknowledge
Click to acknowledge an alarm. Forced acknowledgement to an alarm is required only if the Operator
Acknowledge check box has been checked to enable this function on the Alarm Form.
Secure Perfect 6.1.1 User Manual 31
Changing Operator Password
Change Password
Reference Topic:
Operator Tab
Password Tab
Operations Menu
This dialog box is available only if this operator has permission to change the operator password, as
assigned on the Operator tab of the Operator Form.
This dialog box allows you to change the password of the operator currently logged in.
Because it is difficult to retrieve, it is very important that operators remember their login password,
exactly as created. The password is case sensitive. Create a password and write it down or store in a
safe place. The assigned password cannot match any previous five passwords.
• Old password: Enter the current password.
• New password: Enter the new password you will use going forward.
• Confirm new password: Re-enter the new password.
• Password Rules: The parameters displayed in this dialog box were assigned on the
Password tab of the Parameters Form.
An error message displays all rule violations if an attempt to change the operator password violates any
of the parameters.
Secure Perfect 6.1.1 User Manual 32
Client Monitoring
Client Monitoring
Reference Topics:
Client Monitor Form Shortcut Menu
Client Monitor Form Toolbar
Licensing
Client Monitor Form
Use this form to obtain client information, such as client type, Imaging status, and connection status. A
client is a computer that has all the functionality of the server but does not store the Secure Perfect
database and it does not validate license information.
For a shortcut menu to related functions, select an entry and then click the right mouse button.
Element Description
Client
Active Client
Client Type
Imaging Status
Thin Client
Status
Connection
Status
Description
Region
Active Region
Name of the networked computer. To delete, client must have a
connection Status of Not Connected.
When adding clients on the Client Form, the PCName must
exactly match the network name of the computer, in order for
connection to be made.
This column displays an entry when a client failed and a backup
client is now hosting its devices.
• The column displays the currently active hostname.
• If a backup attempt to a backup client failed, the column
displays [Hostname] Backup Failed where Hostname = the
backup client that was unable to host devices for the failed
default host.
• During the process of recovery to the default client, the column
displays [Hostname] <recovering>. This only displays at the
default client computer.
Following a recovery to the default host, this column is blank.
Type of client: Secure Perfect or CCTV.
Shows whether the client currently has Imaging capabilities. To
change the Imaging status, the client must have a connection status
of Not Connected.
Enabled: This client has Imaging capabilities, that is, you can
capture, design, and print using this computer.
Disabled: This client does NOT have Imaging capabilities.
Displays whether this client is licensed for Thin Client terminal
services.
Current status of the connection between the client and the server:
• Connected: The client and server are communicating.
• Not Connected: The client and server are not communicating.
Displays the description of the Secure Perfect client.
This is a Global system and this is the name of the Region for this
client.
This column displays an entry when a Regional Database Server
has failed and a backup Server is now hosting the database.
• The column displays the currently active Region.
• Following a recovery to the default host, this column is blank.
Secure Perfect 6.1.1 User Manual 33
File Server
Hosting
Mode
Primary Com
Port
Secondary Com
Port
Connection
Information
Imaging
Information
Thin Client
Information
Display name of the File Server that is hosting the database for this
client.
Displays the status of the Mode for this client.
Displays the primary communications port used for CCTV serial
interface.
Displays the secondary communications port used for CCTV serial
interface.
Licenses Used: The number of clients currently connected to the
server. (CCTV interface clients do not count against client licenses.)
Client Licenses: The total number of licenses authorized.
Licenses Used: The number of clients currently given Imaging
permissions.
Imaging Licenses: The total number of Imaging licenses authorized.
Licenses used: The number of host computers enabled with the
Thin Client option.
Thin Client Licenses: The number of Thin Client licenses
authorized.
Secure Perfect 6.1.1 User Manual 34
Digital Input Status Configuration
Digital Input Status
Reference Topic:
Status Tab
Digital inputs are physical sensing devices, such as door sensors or motion sensors, used to monitor an
electronic contact connected to a micro. Refer to your micro installation for information on how to connect
a digital input device to the micro.
The Digital Input Status Form provides a snapshot of the current status in the micros (active or inactive)
and physical state (open or closed) of a digital input (contact). Once you have set up your digital inputs
and alarms, you will need to verify the accuracy of your configuration.
Digital Output Status Configuration
Digital Output Status
Reference Topic:
Status Tab
The Digital Output Status Form provides a snapshot of the current digital output status in the micros. A
digital output represents an external device, such as lights, sirens, and door strikes that may be
connected to the micro.
Digital Video Viewer Program Configuration
Digital Video Viewer Application
The Digital Video Viewer application can be accessed from the Operations menu and by clicking the
camera icon from the toolbar.
Refer to the Digital Video Viewer Help system for additional information and features of this
program, including window management, PTZ control, and event tagging.
Secure Perfect 6.1.1 User Manual 35
Enable Alarm Video Window
Enable Alarm Video Pop-up
Related Topic:
Event Trigger Form, Alarms Tab
Operations Menu
Select this item to enable/disable an automatic live video pop-up window when an alarm occurs with an
associated alarm trigger. By default, this is a toggle option and is not selected. This option must also be
activated by selection of Video Window Auto Pop-up on the Event Trigger Form, if the operator has
been assigned permission for Digital Video Viewer.
If operator permission for Digital Video Viewer is not made available, this option will not activate even
though selected here. Once selected, the operator login will retain this feature until disabled, no matter
which computer in the Secure Perfect system was used for logging in.
Manually Control - Doors, DOs, Alarms, DIs, Intrusion Zones
Overview
Reference Topics:
Reader/Digital Output Tab
Alarm/Digital Input Tab
Intrusion Zone Tab
Overview - Intrusion Zones
Mode Tab
Guard Tour Tab – Manual Control Form
Manual Control Form
The Manual Control Form allows the operator to perform the following, depending on the operator’s
facilities and permissions:
• Manually lock/unlock doors.
Click the Show me icon to view a step-by-step animated
demo.
• Turn on/off DO (digital output).
• Monitor on/off alarms and alarm groups.
• Enable/disable DI inputs.
• Arm/disarm Intrusion Zones.
• Change the mode of a micro.
• Start/stop a Guard Tour.
Refer to the individual tab controls for additional information regarding the available functions.
Secure Perfect 6.1.1 User Manual 36
Micro Monitoring
Overview
Reference Topics:
Micro Monitoring Using the Micro Utility Form
Micro Utility Form Toolbar
Micro Utility Form Shortcut Menu
Micro Utility Form
The Micro Utility Form allows you to view all types of micros, the activities of those micros, monitor
communications, and control each micro in the system. Using the Micro Utility Form, you have the
capability to select, sort, and display only the micros that you want to view, and then save that view. The
first time the Micro Utility Form is opened for viewing, all micros will be displayed if their number is equal
to or less than 64.
Micro Monitoring Using the Micro Utility Form
Reference Topics:
Micro Utility Form Shortcut Menu
Micro Utility Form Toolbar
Micro Form
Time Schedule Form
Mode Schedule Form
Operations Menu
For a shortcut menu to functions available within the Micro Utility Form, select a micro from the list
and right-click.
The icon to the left of the description represents the type of micro. The table below explains the micro
types.
Icons Symbolize
a direct-connect micro
a dial-up micro
a network micro
Column Headings:
Description: Description assigned to the micro when defined on the Micro Form.
Active Hostname: The name of the computer that controls communications to the micro. (For those
computers licensed for Client Redundancy, the current Active Hostname may be a backup client and
have a different name than the Default Hostname computer.)
Default Hostname: (This column does not display if this computer is not licensed for Client
Redundancy.) The hostname displayed is the computer that normally hosts this micro. The icon image
displays in green when the micros are controlled by the originating host. The icon image displays in
yellow to signify a failed system. The backup client computer listed in the Active Hostname column is
controlling the dial-up and network+dialup micros for this computer.
Firmware version: The version of firmware operating the micro.
Secure Perfect 6.1.1 User Manual 37
Address: Physical address assigned to the micro when defined.
State: Current state of the communications with the micro.
• Online means that the host will attempt to communicate with the micro.
• Offline means that the host will not attempt to communicate with the micro.
• Error means that there is a communications problem.
Connection messages include the following:
• Connected - micro is online and working.
• Shut down - No connection.
• Create port - trying to open a physical medium.
• Set up connection - physical medium is open.
• Tear down connection - connection is in the process of being closed.
• Waiting for call.
• Dialing.
• Retrying call.
• Destroy port – physical medium is being closed.
Status shows what is happening between the host and the micro. Messages include the following:
• Alarm download.
• Alarm message download.
• Badge download.
• DO download.
• DO group download.
• Download start.
• Elevator download.
• Error.
• Flash Error (See Diagnostic Log)
• Flashing Micro. (The entry includes the percent of flash download complete.)
• Flashing Completed.
• Idle.
• Incorrect micro type.
• Inquiry.
• Normal.
• Password download.
• Reader download.
• Reset.
• Schedule download.
• Telephone download.
• There are less then 4 passwords defined.
Mode: This is the current mode or state of the micro. The mode will be Normal, Mode 1, Mode 2, or
Mode 3, as previously defined on the Mode Schedule Form or by a manual control command.
Comm device messages include the following:
• If this is a direct-connect micro, lists the COM port to which this micro is connected.
• If this is a dial-up micro, the text Dial-Up will be displayed.
• If this is a network micro, the IP address of the micro will be displayed.
• If this is a network + direct micro, the IP address displays. If the micro loses network connection
and fails over to a direct connect, in approximately two minutes, the display changes from the IP
address to COM port. When a failover occurs, a yellow LED displays in the COM address column.
• If this is a network + network micro, the IP address displays. If the micro loses network
connection, fails over to a secondary network IP address, the display changes to the secondary IP
address. When a failover occurs, a yellow LED displays in the COM address column.
If a host computer is licensed for Client Redundancy, has assigned a backup client, and a
failover occurs, a failover COM port displays.
Secure Perfect 6.1.1 User Manual 38
Head Of Line
• If the micro is defined as head-of-line, this field will be blank.
• If the selected micro is not head-of-line, this field contains a description of the micro that is the head
of this line.
Message Count
This field will display the number of messages waiting to be sent to a selected micro.
Selecting Facilities
Select Facilities
Reference Topic:
Operator Form
Set Active Facilities Dialog Box
This dialog box allows you to select the active facilities (those you want to assign to the current operator)
from a list of facilities available for assignment, as set using the Operator Form.
• Select, then click the right arrow to assign an available facility.
• Select, then click the left arrow to unassign a facility.
Available
This column lists all facilities that have been assigned to the current operator.
Active
This column lists the facilities that are currently active. Only those access rights that are assigned to the
facilities listed in this column will be available.
Secure Perfect 6.1.1 User Manual 39
Devices
Configuring Devices
In case of a default host computer that has failed, devices that have been added to this default host
computer during the failover cannot come online until the default host has recovered and a system
recovery notification is received.
The following order is recommended for completion of Secure Perfect device configuration:
1. Create micro records (Additional device records can be configured following the creation of micro
records.)
2. Configure reader records
3. Configure digital inputs
4. Set up alarm instructions
5. Configure alarm records
6. Configure alarm groups
7. Configure digital outputs
8. Configure digital output groups
9. Configure elevators
10. Configure DVRs
11. Configure cameras
12. Start micro communications
Alarms
Overview
Reference Topic:
Alarm Form Completion
Alarms
An alarm is a notification that something has happened within SP. An alarm occurs when a defined
device, such as a digital input changes to a state defined as the alarm state. For example, if a digital input
alarm state is defined as Open in the Active State, then an alarm occurs when the state changes to
Open. Alarms can also be used for nonmicro related events such as CCTV alarms. Most alarms are tied
to digital output points associated with devices such as switches and motion detectors.
Not all alarms will be present at the same time, and are determined by the boards installed in the
micro.
When you set up your micro, some alarms are automatically set up for you. The Alarm Form is used to
modify an alarm record. However, alarms for digital inputs must be set up manually using the Digital Input
Form.
Secure Perfect 6.1.1 User Manual 40
Alarm Form Completion
Reference Topics:
Alarm Tab
Set Instruction Tab
Digital Outputs Tab
DO Groups Tab
Schedule Tab
Events Tab
Status Tab
CCTV Tab
Overview
Editing or Modifying Alarm Records on the Alarm Form
Use the Alarm Form to modify an alarm record. With the exception of external alarms, you cannot delete
alarm records; alarms are managed by the owner of the alarm record. The alarm owner can be an API,
board, CCTV Interface, digital input, Kalatel camera, Kalatel DVMR, micro, or reader. For an alarm to
display on the Alarm Monitor Form, you can either select the Monitor field on the Alarm Form or schedule
the alarm to be monitored. The alarm will now display if it is set to be monitored and changes to an alarm
condition.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Time Schedules Form or Events
Form, all schedule or event records will display.
To search for, view, or edit existing records, click Search. A list of records will display.
Description
When the records are created, the default description is in the format: mmmm-b-pp where mmmm
represents the micro number to which this alarm is associated, b represents the board number, and pp
represents the point or device number.
• Example: 0001-1-01 Tamper
This tamper alarm is on micro 1, board 1, alarm 1. To change this description, select and enter text over
the existing text and save the record. It is recommended that you keep the mmmm-b-pp prefix in each
alarm displayed to aid in locating the alarm points on the physical hardware.
• Example Failover Alarm: BCTTOKYO Failover Alarm
A failover alarm is created when backup clients are assigned to the default client computer. The alarm
record displays the default client computer name as part of the description. This failover alarm indicates
the default client as BCTTOKYO. If the description indicates Region Failover Alarm, the name of
the Regional Database Server is included in the description.
• Alarm descriptions coming into Secure Perfect from an API can be ambiguous, and the source of the
alarm point may be unclear. It is recommended that you rename API alarm points to correspond to the
actual physical point, to assist in processing and acknowledging when an alarm displays on the Alarm
Monitor.Facility
A facility can be assigned for the alarm from the drop-down list of available facilities for assignment by
this operator.
Secure Perfect 6.1.1 User Manual 41
Alarm Groups
Alarm Groups
Reference Topics:
Group Tab
Events Tab
Keypad Alarm Shunting
Alarm Group Form
Alarm groups provide two things: 1) a convenient way of scheduling many alarms at once, and 2) a
means of disabling monitoring in many alarms from a keypad reader. Refer to the reference topic,
Keypad Alarm Shunting, for additional information. When a micro record is created, 16 alarm groups
are also created. You cannot delete an alarm group record. Alarm groups are owned by the associated
micro record. Use the Alarm Group Form to assign events or schedules to alarm groups. See Keypad
Alarm Shunting for more information.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
Click Search to locate and view or edit existing alarm group records.
Description
The description of the alarm group should be unique. When the records are created, the default
description includes the micro to which this alarm group is associated and the number of the alarm group,
for example 0001 Group 1, which represents alarm group one on micro one. All alarms are
automatically assigned alarm group 0. To change this description, type over the existing text and save
the record. It is recommended that you keep the alarm group number and micro number prefix to aid in
locating the alarm points on the physical hardware.
Facility
A facility option can be assigned for the alarm group from the drop-down list of available facilities for
assignment by this operator.
Be very careful when assigning the facility of an alarm group to a different facility than the micro.
You can create an undesired result if you do not fully understand facility assignment.
Secure Perfect 6.1.1 User Manual 42
Cameras
Camera Form
Reference Topics:
Definition Tab
Presets Tab
Use the Camera Form to edit existing camera parameters. Camera records are automatically created
when a DVR is defined on the Digital Video Recorder Form. The camera records display in the format
00X-0X Camera where 00X is the DVR address and 0X is the camera number.
Description
Enter a camera name or click Search to display a list box of existing cameras.
Device description upates are communicated to corresponding alarms, DIs, and DOs. In order for
changes to migrate to additional form windows that may be open at the time of a change, the open
windows should be closed and then re-opened before the device description is able to be seen.
Facility
A facility option can be designated for your camera.
Digital Inputs
Digital Input Form Completion
Reference Topics:
Digital Input Tab
Digital Output Tab
DO Groups Tab
Schedule Tab
Events Tab
Status Tab
Overview - Intrusion Zones
Digital inputs are physical sensing devices, such as door sensors or motion sensors, used to monitor an
electronic contact connected to a micro. When a micro record is created, digital input records are also
created. Use the Digital Input Form to modify a digital input record. You cannot delete digital input
records. The digital inputs are managed by the associated micro record. The number of digital inputs is
based on the micro you set up and boards that the micro contains.
The alarms for digital inputs are not created automatically when you set up a micro. Set the Type field to
Alarm and then save the record. The associated alarm record is created. Refer to the Micro Installation
Guide for information on how to connect a digital input device to the micro.
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button. If you are using this shortcut menu to get to the Time Schedules Form or Events Form, all
schedule or event records will display.
To view and edit existing records, click Search. A list of records displays.
Secure Perfect 6.1.1 User Manual 43
Description
When the records are created, the default description is in the format: mmmm-b-pp where mmmm
represents the micro number to which this digital input is associated, b represents the board number, and pp represents the point or device number.
Example: 0001-1-01 DI
This digital input is on micro 1, board 1, point 1. To change or add to this description, enter text over the
existing text and save the record. It is recommended that you keep the mmmm-b-pp prefix in each digital
input displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 64 characters.
Facility
A facility can be assigned for the new Digital Input record from the Facility drop-down list.
The same facility is assigned for all devices associated with the micro when a micro is created.
Be very careful when assigning the facility of a DI to a different facility than the micro. You can
create an undesired result if you do not fully understand facility assignment.
Digital Outputs
Digital Output Form
Reference Topics:
Digital Output Tab
Schedule Tab
Manual Control Tab
Device Menu
A digital output represents an external device, such as lights, sirens and door strikes that may be
connected to the micro. Refer to your micro installation manual for information on how to connect a digital
output device to the micro. The digital outputs available depend on the micro setup and readers used.
Use the Digital Output Form to search and view or modify an existing digital output record.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form, all schedule
records will display.
Description
When the records are created, the default description is in the format: mmmm-b-pp where mmmm
represents the micro number to which this digital output is associated, b represents the board number,
and pp represents the point or device number.
Example: 0001-1-01 DO
This digital output is on micro 1, board 1, point 1. To change this description, type over the existing text
and save the record. It is recommended that you keep the mmm-b-pp prefix in each digital output
description displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 32 characters.
Facility
A facility option can be assigned for your new Digital Output record from the Facility drop-down list.
Be very careful when assigning the facility of a digital output to a different facility than the micro.
You can create an undesired result if you do not fully understand facility assignment.
Secure Perfect 6.1.1 User Manual 44
Digital Output Groups
Digital Output Group Form
Reference Topics:
Group Tab
Schedule Tab
Digital output groups provide an easy, convenient way of scheduling many digital outputs at once. To
create digital output groups, manually create the groups and then assign the digital outputs to them. Use
the Digital Output Group Form to assign digital outputs to a group and schedules to digital output groups.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button. If you are using this shortcut menu to get to the Schedules Form, all schedule records will
display.
To locate and view existing records, click Search button. A list of records will display. You can either click
the Add button to add a new record OR search and view or change an existing record.
Description
Assign a unique description to the digital output group.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
If you assign DOs that belong to a different facility, you may be creating an undesired result; not all
DOs will be visible under certain facilities.
Digital Video Recorders
Overview
Reference Topic:
Digital Video Recorder Form Completion
Digital Video Surveillance
Digital video surveillance is integrated into the Secure Perfect system and requires its own hardware and
software. The system supports the following Kalatel digital video multiplexer/recorders:
Kalatel DVMR
Kalatel DVMR
Kalatel DVMRe-16 CD
(Requires duplex PPC firmware Version 3.18 or later and MUX firmware Version 3.24 or later.)
Kalatel DVMR
Kalatel DVMR
Kalatel DVMRe-16 CT
(Requires triplex firmware Version 5.xx or later. Kalatel DVMRe Matrix is supported as a 16 CT recorder.)
Increasing the processor speed and memory on the Secure Perfect Server and/or client workstations
may be required for optimizing performance in your specific application.
The Digital Video Recorder Form allows you to configure integrated digital video surveillance within SP.
This option provides event-driven video recording, allowing you to access and control live and recorded
video and initiate camera control at any workstation within a Secure Perfect system.
e
-4 CD
e
-10 CD
e
-4 CT
e
-10 CT
Secure Perfect 6.1.1 User Manual 45
SP Enterprise Edition supports up to 64 licensed DVR connections.
SP Professional Edition supports up to 16 licensed DVR connections.
EZ Edition supports up to 8 licensed DVR connections.
The following order is recommended for configuration of an SP Editions DVR system:
1. Set up operators and permissions.
2. Configure the DVR.
3. Configure DVR devices. DVR devices can be hosted on the SP Server computer and/or client
workstations. The actual number of DVR devices hosted on each Server computer may vary.
Distributing DVR hosting across multiple computers may be required for optimizing system
performance in your specific application.
4. Create preset records.
5. Configure cameras.
6. Set up event triggers.
7. OPTIONAL: Set up alarm graphics.
Digital Video Recorder Form Completion
Reference Topics:
Communications Settings Tab
Video Display Tab
Overview
Definition Tab
Status Tab
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button.
Click Search to display or change an existing record or click Add to add a new record and display default
values.
Description
Enter a unique descriptive name for your DVR in the Description field.
Facility
A facility option can be assigned for your new DVR from the Facility drop-down list. When you change a
facility designation, it changes the facility for the DVR only. You receive a message displaying, Do other
devices change to the same facility as the digital video recorder? Select Yes or No. If you select
Yes, the alarm record and camera records will change as well. You will need to verify the accuracy of the
revised records.
The Digital Video Recorder Form contains the tabs listed below. Complete each tab in the order they are
listed.
Refer to the Digital Video Viewer Help file for additional information about features of PTZ control and
event tagging.
Secure Perfect 6.1.1 User Manual 46
Elevator Management
Overview
Reference Topics:
Elevator Form
Elevators
The first step in configuring elevator control is setting up floors. The Floor Form of the Administration
menu allows you to set up floors.
Now, you can configure the elevator records. You will use the Elevator Form to configure elevator
records. Here, you select the method of elevator control, the readers, and the floors that will be used. You
can set a reader for elevator control using this form only. When you return to the Reader Form and
display a corresponding reader record, you will notice that all other options in the Logical Type section
are not available.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
The type of boards you want to use in your dedicated micro (DO only or a combination of DO and DI
boards) determines the number of floors available. After installing the CPU board, the
Power/Communication board, and at least one reader board, there are four slots available that can be
used for digital input boards or a combination of digital input boards and digital output boards.
Methods of Elevator Control
There are three methods of implementing elevator control:
No Floor Tracking Method
With this method, you define the floors available and define a digital output for each floor. Only digital
outputs provided by the 16 DO board can be used. In addition, each DO can by used in only one
elevator and mapped to only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the micro; the maximum is four. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
Floor Tracking by Input
Define the floors available, then define a digital input and digital output for each floor. The digital
inputs are used for floor selection. Only digital inputs provided by the 20 DI board can be used for floor
selection and each digital input can by used for only one elevator and mapped to only one floor. The
digital outputs are used to control where the elevator moves. Only digital outputs provided by the 16
DO board can be used, and each digital output can only be used in one elevator and mapped to one
floor. Using this method, a maximum of 32 floors can be supported (2 boards x 16 DOs = 32 DOs).
Floor Tracking by Keypad
Define the floors available and define a digital output for each floor. The reader’s keypad is used to
select the desired floor. Only digital outputs provided by the 16 DO board can be used. In addition,
each DO can be used in only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the micro; the maximum if four. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
Floor Tab of Access Right Form
On the Personnel menu, select Access Right to open the Access Right Form, Floor tab to assign access
rights to elevators and floors. Select from the Available list those elevators you want to use with the form.
The elevators that display in this list are those that are set up on the Elevator Form. Floors and DOs can
be assigned an access right to define which floors a person can access and what DOs a person can
trigger with a valid badge.
Secure Perfect 6.1.1 User Manual 47
Elevator Form
Reference Topics:
Overview
Setting Up an Elevator
Elevator Tab
Floor/Digital Output Tab
Floor/Digital Output/Digital Input Tab
Use this form to create or modify an elevator record.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
Description
To locate and view existing records, click Search. A list of records will display. You can search and view
or edit an existing record.
Micros
Overview
Reference Topics:
Micro Form Completion
Records Generation
Micros
Micro records can be created within Secure Perfect without having the micros attached and
configured. Additional device records can be configured after creating micro records.
Micros control access through the use of devices such as badge readers, alarm points, and output points
physically wired to the micro, which is then connected to the host by one of the following methods:
1. Directly
2. Using RS-232 cabling through a modem
3. Through a network
Secure Perfect provides a micro auto-configuration feature, allowing you to set up the database with the
exact board configuration that you selected during the micro configuration process. When you create a
micro record, only those records for the associated devices (readers, alarms, alarm groups, and digital
outputs) supported by the micro’s configuration are created. The auto-configuration feature anticipates
your configuration requirements. For example, the Micro/PX2000 is a single-board microcontroller. Other
boards do not display for selection, as shown in the image below. This board address is 2.
Secure Perfect 6.1.1 User Manual 48
In this example, notice the DI records created automatically when the Micro/PX2000 record was saved.
The Micro Form contains a combination of tabs. The settings selected on the Micro Definition tab
determine which tabs display.
Note that any time a badge that is not in a micro is presented to a reader, it is reported as unknown and
the host sends the badge to the micro. This happens regardless of the Badge Loading option. The micros
can store only a limited number of badges. When a previously unknown badge is sent to a micro whose
badge capacity is exceeded, the micro randomly chooses a badge to delete to make room for the new
badge. The badge is deleted from the micro but not from the Secure Perfect system.
Secure Perfect 6.1.1 User Manual 49
Micro Form Completion
Reference Topics:
Overview
Micro Definition Tab
Security Tab
Time Zone Tab
Comments Tab
Events Tab – Micro Form
Status Tab – Micro Form
Micro Configuration Tab
Port Settings Tab
Settings to Reach Host Tab
Settings to Reach Micro Tab
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
ADDING OR MODIFYING A RECORD:
Click Add to add a new record or Search to display or change an existing record.
Description
The description of the micro should be unique and include where the micro is located and/or how it is
used.
Example: 1 - Building A2 North Telco Closet could represent Micro 1 located in Building A2
North in the Telco Closet.
Facility
A facility option can be assigned for your new micro record from the Facility drop-down list. All devices,
such as readers, alarms, and DIs added with the micro will belong to the same facility as the micro. If you
edit the Facility option on an existing micro record, a messages displays, Do other devices change to the same facility as the micro? If you select Yes, all associated devices and alarms will change to
newly assigned facility. If you select No, the facility change takes place only on the micro record.
Secure Perfect 6.1.1 User Manual 50
Readers
Readers Overview
Reference Topics:
Reader Tab
Door Functions Tab
Routing Tab
Functions Schedule Tab
Routing Schedule Tab
Reader Type Events Tab
Status Tab
Readers Form
Readers are the devices that interpret the encoded numbers on badges. Readers are usually located
near doors or gates that the system controls. Badges are presented to the readers in order to gain
access through a door.
When a micro record is created, reader records are also created. The number of records depends on the
micro you configure and the reader boards that the micro contains. The reader is automatically enabled
as Online and Active, and configured to accept badge transactions when a reader record is created. The
number of active readers counts against your reader limit. For example, if your license key allows the use
of 128 readers, you may have only 128 readers marked as active.
When the total of all reader records equals the maximum number of active readers allowed by your
license, you will receive a warning message.
The reader record controls both the physical reader and how the door locks and unlocks. See your micro
and reader installation manual for information on how to connect readers to a micro. Use the Reader
Form to modify the reader configuration.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
ADDING OR MODIFYING A RECORD:
Click Search to display a list of previously created reader records. You can either click Add on the
Secure Perfect toolbar to add a new record OR modify an existing record.
Description
When reader records are created, the default description is in the format: mmmm-b-pp where mmmm
represents the micro number to which this reader is associated, b represents the board number, and pp
represents the reader number.
Example: 0001-1-01 Reader
This reader is on micro 1, board 1, reader 1. To change or add to this description, select and enter text
over the existing text and save the record. It is recommended that you keep the mmmm-b-pp prefix in
each reader displayed to aid in locating the reader points on the physical hardware. This field accepts a
maximum of 64 characters.
Facility
A facility option can be assigned for your new Reader record from the drop-down list of available facilities
for assignment by this operator.
Secure Perfect 6.1.1 User Manual 51
Person Records Creation
Access Rights
Reference Topics:
Access Rights Tab
Floor Tab
Digital Output Groups Tab
Intrusion Zone Tab
Overview - Intrusion Zones
Access Right Form
Use this form to create access rights to define where (with readers) and when (with time schedules) an
individual can gain entry. Floors and digital output groups can be assigned to an access right to define
which floors a person can access and what digital output groups a person can trigger with a valid badge.
Intrusion Zones can be assigned to an access right, allowing the ability to arm/disarm (with a reader) the
zone and access to a particular zone.
ADDING OR MODIFYING A RECORD:
Description
Click Add to add and assign a unique title to this record or Search to display or change an existing
record.
Facility
You can assign a facility from the drop-down list of those facilities available for assignment by this
operator.
For a shortcut menu to related forms, move the mouse pointer below any tab and right-click.
Departments
Reference Topic:
Department Tab
The Department Form allows you to create a department that you can then assign to a person record
using the Person Form. Department selection can also be used to group records when running a Person
Report.
ADDING OR MODIFYING A RECORD:
Click Search to display a list of previously created Departments. You can either click Add on the Secure
Perfect toolbar to add a new Department record OR modify an existing record.
Facility
A facility option can be assigned for the Department from the drop-down list of available facilities for
assignment by this operator.
Secure Perfect 6.1.1 User Manual 52
Person Records Creation
Reference Topics:
Personnel Tab
Location Tab
User Fields Tab
Access Rights Tab
Photo Tab
Mass Update
Person Form
Use this form to create a record for a person, someone who can access the readers controlled by the
Secure Perfect system. Click Add to add a new record or click Search to display a list of previously
created person records to review or modify.
Click the Show me icon to view a step-by-step animated demo.
Last Name
Enter the last name of the individual record you are creating. This is a required field.
A facility option can be assigned to this record from the drop-down list of available facilities for
assignment by this operator.
For a shortcut menu to related forms, right-click below any of the tabs on this form.
Personnel Type Assignment
Reference Topic:
Personnel Type Tab
Personnel Type Form
This form is used to create category types for employees and assign default badge designs for each
category.
Secure Perfect 6.1.1 User Manual 53
Badging
Badge Alias Form
Reference Topic:
Badge Alias Tab
This form is available only if aliasing option was elected during initial Secure Perfect Server
installation.
Use this form to control the alias numbers that will display in place of the encoded badge number. An
alias is a number that represents the encoded badge number. You decided whether to use badge alias
and which method during installation of SP. If you chose None, this form is unavailable in the Secure
Perfect program.
Badge alias provides added security in that the encoded number is displayed only to authorized users.
The encoded badge number is hidden on the Badge Form, reports, and Activity Monitor Form. There are
two methods of using badge alias:
Manual: Enter the badge alias number on this form.
Automatic: The badge alias number is chosen for you.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Badge Design
Reference Topics:
Design Tab
Badge Design Creation Overview
Image Capture Overview
Complete the Badge Design Form to create badge designs. Badge designs are the graphics printed on
badges. You may want to use different graphics for different types of personnel, such as a specific
graphic for regular employees and a different graphic for contract employees within your organization.
Element Description
Search
Add
Delete
Displays existing records.
Configure a new Badge Design record. Default values display for you.
Delete a selected Badge Design record from the list in the windowpane on the right,
that is no longer required or applicable.
Secure Perfect 6.1.1 User Manual 54
Description
Facility
Enter a unique or suggestive description for this badge design. The field accepts 1 to
32 characters.
During installation of Badge Designer, four standard badge designs are included, in
the Designs folder of Secure Perfect:
• Landscape
• Portrait
• No Design
• Wanted Poster
Do one of the following:
• Select from the list of existing standard design records.
• Select and edit a standard design by renaming and saving.
• Create a new design.
When you add a design, enter a desciption and click Save to enable the Edit
Badge Design button on this form.
Assign a facility option from the drop-down list of available facilities for assignment by
this operator. If you do not select a facility, Ignore Facilities will be assigned for you.
Badge Design Creation Overview
The Badge Design application has an extensive Help system to assist in designing your badge layout,
import graphics, link designs to badgeholder information, and add barcodes or encode magnetic stripes.
This topic is an abridged summary of the badge design process.
To create your own simple badge design:
1. Select Badge Design from the Secure Perfect Personnel menu.
2. The Badge Design Form, Design tab displays.
3. Click Add and enter a unique Description, then click Save. The Edit Badge Design button is now
enabled.
Click Edit Badge Design to run the Badge Design application.
1. Select New from Imaging File menu.
2. Draw a shape in your design window the size of your badge.
3. For a background color, select Edit, Background, then select a color from Color dialog that
displays.
4. Add one or several bitmaps inside the badge design parameters.
5. Add one or several text boxes.
6. Move or resize the photo and text as desired.
7. Click Save.
Secure Perfect 6.1.1 User Manual 55
Badging Overview
Reference Topic:
Badge Definition Tab
Status Tab
User Fields Tab
Mass Update
Badge Form
A badge identifies a person to SP. This is usually a card with an embedded number that uniquely
identifies the card. However, the badge does not have to be a card; it could be a unique number that is
entered into a keypad reader. The Badge Form is used to define a badge by entering specific
information, such as the badge number and the person to whom this badge is assigned. Click Add to add
a new record or click Search to display a list of previously created badge records to review or modify.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Description:
Enter a unique description of the badge, person name, or badge type. This is a required field and this
record will not save without an entry in this dialog box. If you attempt to save a record without a
description, a dialog box displays, asking if you want to use the badge identification number as the
Description. Click Yes to use the badge identification number or return to the form and enter a
Description of your choice. (If you are entering badge records before person assignment, consider
entering a badge identification number as the Description.) This dialog box accepts up to 32
alphanumeric characters.
If this is a converted database from an earlier version of Secure Perfect that allowed blank
Description fields, the badge identification number now displays in the Description field of those records.
Facility:
The facility assignment is a read-only field. Facilities are assigned by the operator when creating a
Person record.
Image Capture Overview
Your photographs and signatures can be created by digital cameras, video cameras, and signature
pads. Support for certain Imaging features and functions may be product specific and not necessarily
supported by all compatible peripherals.
Selecting an Input Device
Follow the instructions provided by the device manufacturer for installing an input device. Imaging can
use any device that has a TWAIN, WINTAB, or Video for Windows (VFW) driver installed.
To select an input device:
1. Go to the Personnel menu and select Person. The Person Form displays.
2. Select the Photo tab, then click Search to display a current list of records.
3. Select one of the records in the records list, then click Capture Image/Signature. The Secure
Perfect Image Capture Application screen displays.
4. Using the mouse, point to the photo area and right-click. A context menu displays.
5. Select Input Device from the context menu. A Select Profile window displays, listing the available
input devices on your computer. By default, the input device loads from a file.
Secure Perfect 6.1.1 User Manual 56
6. Select the input device you will be using and click OK. The next time you capture a photo, the
program will use the input device you selected.
7. Repeat these steps to set up an input device for signature pads. The program will recognize a
separate input device for photos and signatures.
To select a record and capture a NEW image for the selected record:
1. Select Person from the Personnel menu.
2. Select the Photo tab on the Person Form.
3. Select ONE of the records in the Record List.
4. Click Capture Image/Signature to capture a new image. Based on the input device you previously
selected, the proper interface window will come up for adjusting, capturing, and loading a new
image.
5. Adjust, then save the adjusted settings.
6. Click Capture Photo to capture the new image. Once the photo is taken, the Image Enhancement
dialog box will display.
7. The dialog box that displays allows you to crop and enhance the newly captured image. You will
notice that a highlighting box with eight sizing handles is placed directly over the center of the
Original Image.
8. Place your mouse pointer over the image. The pointer will change from a single arrow to a fourheaded arrow. This allows you to move the cropping area across the newly acquired image.
9. At this point, you can either capture a different portion of the image "as is," or adjust the highlighting
box to capture some or all of the image.
Refer to the Image Capture Application Help system for additional specific details of this application.
To crop an image:
1. Place your mouse pointer within the highlighting box’s cropping area.
2. Press and hold down your left mouse button, and drag (move) the cropping area to the desired
location on the image. Release the left mouse button when you are satisfied with the new location
of the highlighting box.
3. Click OK. The photo can be placed on either the front or the back of your badge design. To print
the photo, your badge design must include photo image keylines. When you print the badge from
the Secure Perfect application, the keylines are replaced by the image.
To resize the crop box:
1. Place your mouse pointer directly over one of the highlighting box handles. The pointer changes
from a four-headed arrow to a two-headed arrow. This allows you to resize the cropping area.
2. Press and hold down your left mouse button, and drag (move) the handle toward the center of the
cropping area. The size of this highlighting box is fixed to the aspect ratio of the image type: 4 x 5
for photos; 5 x 1 for signatures.
3. When the cropping area is sized to your satisfaction, move the highlighting box so that it covers the
portion of the image that you want to capture.
4. Click OK. The Secure Perfect Image Capture Application screen displays with the selected image
in place. To print the photo, your badge design must include photo image keylines. When you print
the badge from the Secure Perfect application, the keylines are replaced by the image. The photo
can be placed on either the front or the back of your badge design.
5. Click OK. The selected image will be moved to the Photo tab of the Person Form.
6. Click Save. The image capture is saved to the database.
Displaying Existing Images
During normal operations, images are not downloaded from the server. In order to view an existing image
for a badge record, the image(s) must be loaded to the computer. On the Person Form, select the Photo
tab, then click Search, and highlight a record from the record list. Click Capture Image/Signature button
to enable the Secure Perfect Image Capture Application screen. Move the mouse pointer to the existing
image and right-click. A shortcut menu for the image will appear. The available image options on that
menu are discussed in the paragraphs that follow.
Secure Perfect 6.1.1 User Manual 57
Capture
Based on the input device you previously selected, the appropriate interface window will come up for
adjusting, capturing and loading a new image.
Enhance and Crop
These options allow you to individually crop or enhance the current image. You can adjust the existing
image without having to recapture the image.
Compare (and Restore)
When a stored image is downloaded and a new image is captured, the Compare option will be enabled
on the shortcut menu to compare the newly captured or edited image to the original image. Choosing
Restore will undo any changes made to the original image.
Clear
When you select the Clear option from the shortcut menu, the image will be cleared and the image file
will be deleted. (The image cannot be recovered.)
Enhancement Shortcut Menu:
There are four submenus for the Enhancement shortcut menu option.
Adjust by Example
When you select this option, a dialog box will display. You can adjust the brightness, contrast, focus,
exposure, and red, green, and blue colors.
Special Effect by Example
This dialog box allows you to add special effects to any image. The applicable effects are Mosaic,
Impressionist, Watercolor, Emboss, and Posterize.
Remove Red Eye
This dialog box allows you to remove the red eye effect of any person in an image.
Vignette
The Vignette dialog box allows you to configure a vignette effect to any image.
Manipulation Shortcut Menu:
Mirroring
Flip Vertically: Flip an image from top to bottom.
Flip Horizontally: Flip an image from left to right.
Invert (negative)
Select this option to invert an image (create a color negative).
Convert to 8-bit grayscale
Select this option to convert an image to an 8-bit 256-grayscale image. Once this election is selected,
there is no undo. You will have to reload your image.
Save Image
Changes to an existing image or newly captured image are saved to the host when you click Save.
Export To File
When you select this option, a Save As window will display. Navigate to the Secure Perfect Images folder
that contains previously captured photo images. You may select a filename, image format, bit depth, and
JPEG compression factor. When you click Save, the contents of the image control are saved using the
selected settings. If you want, you can replace an existing image.
Select Input Device
This option allows you to select an input device on the Select Profile dialog box, from a list of Capture
Profiles. You may also set and apply automatic properties for the image you are about to capture.
Secure Perfect 6.1.1 User Manual 58
Select Image Type
This dialog box enables you to configure image types in the EPISUITE SDK configuration database. You
can use this dialog box to edit, create, or remove image types. To modify an image type, highlight the
image type name in the list and click Edit to open the Image Type Manager dialog box. Click Add to
create a new image type, or click Remove to delete the highlighted image type.
Revert Changes
When you make any change to the image, the Revert Changes option will be enabled. Otherwise, the
option is dimmed and you will not be able to select it. Selecting this option will reload the original image.
Secure Perfect 6.1.1 User Manual 59
Administration Menu Options
Alarm Instruction Form
Reference Topics:
Alarm Instruction Tab
Alarm Monitor Form
Alarm instructions are directions on how to react to alarms. Use this form to create messages that will
display on the Alarm Monitor Form whenever the associated alarm occurs.
ADDING OR MODIFYING A NEW RECORD:
Click Add to add a new record OR Search and view or change an existing record.
Facility: A facility can be assigned to your new Alarm Instruction record from the Facility drop-down list.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Alarm Notifier Form
Reference Topics:
Alarm Selection Tab
Person Selection Tab
Message Format Tab
Keep in mind that you can use an SMTP Server such as Lotus Notes or SendMail, or even online mail
services such as Yahoo, to send e-mail. Contact your local network administrator to get the SMTP server
name to be used. E-mail sent by Secure Perfect will be sent through this SMTP Server. If you receive an
error message or have a problem with your configuration, contact your local network administrator.
The Alarm Notifier form allows you to:
• Assign those alarms and reset conditions that will trigger an e-mail message.
• Assign people who will receive that e-mail notification of the alarm/reset condition.
• Format the style and content of the e-mail message.
Click Add to add a new record or Search to display or change an existing record.
Description
Enter a unique or suggestive description for this alarm notification.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual 60
Alarm Response Form
Related Topic:
Alarm Response Tab
A response describes a reaction to an alarm. The Alarm Response Form allows you to create a list of
frequently used, predefined responses to an alarm, and reduces the need to type an entry. The response
entries that you create will display as selections on the Alarm Monitor Form.
Click Search to view or edit existing response records or click Add to begin a new response record.
A facility can be assigned for the alarm from the drop-down list of available facilities for assignment by
this operator.
Alarm Routing and Bumping Form
Reference Topics:
Definition Tab - Alarm Routing and Bumping
Alarms Tab - Alarm Routing and Bumping Form
This form allows you to configure the routing of alarms to one or more Client Groups by time schedule or
at all times. Bumping is a term used to describe forwarding the alarms to an additional location.
• You must have Client Groups configured beforehand.
• You can bump an alarm to one or more Client Groups following a time lapse of an unacknowledged
and unpurged alarm to the Client Groups selected for routing.
• Alarm bumping information is displayed on the Alarm Monitor form in the alarm state column.
You may want to review this Sample Scenario before you begin. This is a routing and bumping schedule
for a business in two buildings (administration building and a factory, working three shifts).
Time
Schedules
8am to 5pm Group 1 Group 4 10 min Group 1 WS#1: Front Door - Admin Bldg
5pm to Midnight Group 2 Group 5 5 min Group 2 WS#4: Back Door - Admin Bldg
Midnight to 8am Group 2 Group 6 1 min Group 3 N/A
Group 4 WS#2 (Supervisor’s desk -
Group 5 WS#6 (Supervisor’s desk -
Group 6 WS#5 (Supervisor’s desk -
Alarms
Route to:
Alarms
Bump to:
Alarms
Bump
After
Example: An alarm comes in at 8:30am that is configured to be routed to Group 1. The alarm is not
purged or acknowledged; therefore, it is bumped to Group 4 at 8:40am. The transaction is written to
Alarm History.
Group Descriptions:
Client Work Station (WS) #s
WS#3: Front Door - Factory
WS#5: Back Door - Factory
Admin Bldg, 8am to 5pm)
Factory, 5pm to Midnight)
Factory, Midnight to 8am)
Secure Perfect 6.1.1 User Manual 61
Complete this form as follows:
Element Description
Search
Add
Display or change an existing record.
Configure a new alarm routing and/or bumping record. Default values display for
you.
Delete
Delete a selected record from the list in the windowpane on the right that is no
longer required or applicable.
Description
Enter a unique or suggestive description for this record. The field accepts 1 to 64
characters.
Facility
Assign a facility option from the drop-down list of available facilities for
assignment by this operator. If you do not select a facility, Ignore Facilities will be
assigned for you.
API Connections Form
Reference Topics:
Definition Tab
About Secure Perfect
This option is purchased individually and licensed with your Secure Perfect system. For complete
details, contact your GE Security Sales Representative.
The number of API records that you can configure is limited to the number of API connections for which
you are licensed. This form allows you to define an interface license for external application integration,
by assigning a description of the API (Application Program Interface) service that has been configured to
communicate with Secure Perfect.
Once configured, real-time event processing and remote command and control functionality extended by
way of the API includes the following:
• Bi-directional alarm event processing for monitoring and acknowledgement
• Receiving Secure Perfect access control badge events
• Receiving digital input events
• Receiving intrusion zone events
• Control of alarm point monitoring On/Off
• Control of digital input points Enable/Disable
• Control of digital output points Open/Close
• Control of intrusion zones Arm/Disarm.
An API can be installed on any computer in your Secure Perfect system; however, do not attempt to
install on a domain controller. The installation will not complete properly. Review the system configuration
with your IT Department for alternative reconfiguration options.
Description: Enter the title of the external API. This should be a unique identifier to the product.
Secure Perfect 6.1.1 User Manual 62
Badge Format Form
Reference Topic:
Badge Format Tab
Administration Menu
If you experience difficulty with this form, contact GE Customer Support for assistance.
This form allows an operator to do the following:
• Import or export custom badge records in a Wiegand or magnetic stripe format, into the micros on
your Secure Perfect system.
• Identify the pattern of data bits (mask) of the badge numbers that you will importing or export to your
Secure Perfect system.
• Store standard custom badge format in the Secure Perfect database.
• Interpret data from badges presented at a Wiegand or magnetic stripe reader.
Element Description
Search
Add
Delete
Description
Facility
Badge Format Tab
Display or change an existing record.
Configure a new Badge Format record. Default values display for you.
Delete a selected Badge Format record from the list in the windowpane on the
right, that is no longer required or applicable.
Enter a unique or suggestive description for this badge format. The field accepts 1
to 64 characters.
Example: 33 Bit Indala
Assign a facility option from the drop-down list of available facilities for
assignment by this operator. If you do not select a facility, Ignore Facilities will be
assigned for you.
Configure the specific mask of this custom badge format. You cannot save this
record until you have completed the entries on this tab.
Camera Preset Form
Reference Topic:
Definition Tab
After setup and programming of your DVR devices to meet your monitoring requirements, you will need
to parallel the settings and positions in the Secure Perfect configurations. This form allows you to edit or
enter a description and number for a camera preset. Presets must be defined before you can assign
them to a camera on the Presets tab of the Camera Form.
This option is available for PTZ cameras only.
Description
In this field, enter or edit the description for the selected preset. This should be a unique name describing
or numbering a preset camera position.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
Secure Perfect 6.1.1 User Manual 63
CCTV Alarm Form
Reference Topic:
CCTV Tab
This form is used for serial interfaces that are interfaced to Secure Perfect. Following installation of
hardware and the CCTV interface software, you must create CCTV alarm records. This form is used to
set up CCTV alarms.
To locate and view existing records, click Search. When a list of records displays, you can edit an
existing record OR click Add to add a new record.
Description: Enter a description of this CCTV interface.
Facility: A facility option can be designated for the CCTV Alarm record from the Facility drop-down list.
Client Form
Reference Topics:
Client Tab
Backup Clients Tab
Networking
Client Redundancy Overview
Use this form to add a client to the Secure Perfect network or assign backup clients.
Only systems licensed for Client Redundancy will have the ability to select backup clients.
Element Description
Search
Add
Delete
Description*
Facility
You must restart the Secure Perfect client program for changes to the Auto logoff selection to take
effect.
Click to display and view or edit an existing client record.
Click to add a new record. Note that default values display where appropriate.
Select a Client Name from the right windowpane and click to delete the client record .
Enter or edit a unique description for the client you are adding. If you do not enter a
description, this field automatically populates with the PC Name selected on the
Client tab.
Global Edition Client Descriptions: We recommend that your client description
include a meaningful name of the Global or Regional Database Server computer.
When the description displays on the Client Monitor Form, the Global and Regional
Server will be easily identifiable.
Example Description: bcttestpc(client to bcteeserver)
where bcttestpc is the name of the client computer and bcteeserver is the
name of the Regional Database Server for this client.
A facility option can be designated for your new client record from the Facility dropdown list.
Secure Perfect 6.1.1 User Manual 64
Client Group Form
Reference Topic:
Client Group Tab
Alarm Bumping and Routing Form
This form allows you to assign Secure Perfect client computers into logical groups. Members of a Client
Group cannot have conflicting Mode Schedules. A comment box is available for entry to describe the
reason for this group or configuration.
Client groups can be assigned to specific alarm routing and bumping configurations. You may want to
review the Sample Scenario in the Alarm Routing and Bumping Form Help topic.
Element Description
Search
Add
Delete
Descriptions
Facility
Save
Display or change an existing record.
Configure a new record. Default values display for you.
Delete a selected record that is no longer required or applicable, from the list in the
windowpane on the right.
Enter a unique description that identifies this Client Group.
Assign a facility option from the drop-down list of available facilities for assignment
by this operator. If you do not select a facility, Ignore Facilities will be assigned for
you.
You cannot save this record until at least one client is assigned to this group on the
Client Group tab.
Diagnostic Setting Form
Reference Topic:
Settings Tab
Use this form to select items to monitor using the DiagView program.
Use this form with care. The more items you turn on for monitoring, the more your system
performance is affected. This is even more important when monitoring port, communications, or micro
items.
Click Search to display a list of components that you can monitor.
Description: Select a component from the list box in the right windowpane. The selected component
displays in the Description field as a read-only entry.
Secure Perfect 6.1.1 User Manual 65
Event Schedule Form
Reference Topic:
Event Schedules Tab
An event schedules when an action occurs, such as resetting an anti-passback status, dialing a micro, or
changing a physical reader type. There is no end time associated with an event. Events are comprised of
one or more times on one or more days of the week and modes. Events differ from time schedules in that
events define when an action occurs and time schedules define an interval of time over which an action
occurs. Note that an event can schedule an action multiple times, even within the same day. Once an
event is defined, it may be applied anywhere events are used.
Deleting an event schedule does not affect the current state of any devices currently under the effect
of the deleted event schedule. An event will remain active until another event occurs to change it.
This form is used to create event schedules. Events define the day(s) of the week and time(s) an action
will start. Click Search to display a list of previously created event schedules or Add to add a new event.
Description
Enter a meaningful and unique 32-digit or less alphanumeric description for this event.
Event Tagging Overview
Reference Topic:
Event Trigger Form Completion
When a digital video camera is activated and associated with a reader event or alarm event, the
recording for that activity is tagged. During this tagging process, the camera remains actively recording
and then archives the recording to disk.
Once recorded, the recording can be retrieved by a search option based on the event tag. If the Event
Trigger that activated the tagging was defined as Tag as event instead of Tag only, the DVR would have
changed recording rate to a special event-recording rate for a period of time, as predefined during the
DVR setup and configuration.
When tagged events are identified by a search, retrieved, and viewed, the video playback begins at the
start of the event and continues playing until you elect to discontinue the playback.
Event triggers must be created on the Event Trigger Form, to define the logical rules that will initiate
event-driven video response.
Secure Perfect 6.1.1 User Manual 66
Event Trigger Form Completion
Reference Topics:
Preset/Camera Tab
Readers Tab
Alarms Tab
Intrusion Zone Tab
The Event Trigger Form opens with the Preset/Camera tab displayed. An event consists of a camera and
either readers, alarms, or zone activity. A trigger causes an event or program routine to be executed,
depending on what options you set on the tabs of this form. Intrusion Zone activities can also trigger an
event.
Example: A camera begins recording in response to an invalid badge transaction. An alarm is recorded
in response to the badge transaction.
Element Description
Search
Add
Delete
Description
Save
Click to display or change an existing record.
Click to add a new record.
Select and then click to remove an Event Trigger record.
Enter text up to 64 alphanumeric characters in length. The description should convey
specific information relating to a physical location, camera, reader, or state, such as.
Front Door Inv Badge Camera 1 Reader 1
You can assign a reader alarm or camera alarm or both and this can be reflected in
the description of the Trigger.
Following the completion of applicable options for this record, click to save this
record. The selection results display in the columns of the form window on the right.
Facility Form
Reference Topic:
Facility Tab
Use this form to define facilities. Your database can be partitioned and related records can be grouped.
These groupings are called facilities. If facilities will be used, you must create Facility definitions in the
Secure Perfect system.
A facility option can be designated on MOST forms throughout the system and any number of
facilities can be defined.
Usually, the system administrator is assigned to all facilities. Operators can be assigned to one or more
facilities and can choose which facilities to be active at any given time. All records have the default Ignore
Facilities, which means the records are not under facility protection; therefore, those records are visible to
all operators.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual 67
Floor Form
Reference Topic:
Floor Tab
Use this form to associate a description to a floor number.
Click Add to add a new record OR Search and view or change an existing record.
Facility: A facility can be designated for the new Floor record from the Facility drop-down list.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Guard Tour Form
Reference Topics:
Guard Tour Tab
Activity Monitor
Guard Tour Tab - Manual Control Form
Administration Menu
This form is unavailable if you are not licensed for Guard Tour.
A Guard Tour is an inspection of your facility premises, made by a security officer at random intervals.
The officer stops at pre-determined tour points along the way, where a badge must be presented to a
reader or hit a DI point, so that the Secure Perfect system can track the tour progress. Each time the
officer presents a badge to a reader, a tour point is ‘hit.’ The following statements are true of Guard Tour
features:
• Tour Point Form must be configured before a Guard Tour record is configured.
• A Guard Tour must be configured before a physical tour can begin.
• All tour points must be associated with micros within the same Region.
• Tour points can be both readers and DIs.
• The same badge must complete the entire tour. A badge can only be assigned to one tour at
a time.
• The badge read does not grant access or cause an invalid alarm.
• Double-hit points by the tour badge along the tour result in invalid tour transactions.
• A tour begins when the Start Point is ‘hit’ or manually started by the operator at a Secure
Perfect computer.
• A tour ends when all points assigned to the tour are ‘hit,’ or at the expiration of the time
assigned for the duration of the tour. Also, a tour can be ended manually, by the operator at a
Secure Perfect computer.
• An alarm is generated if a tour is not completed within the assigned maximum tour time.
• Badge transactions are stored in badge history and available to generate reports.
• DI tour points are assigned to only one tour.
• Badges must be assigned to a tour in order to be a tour badge.
Requirements are indicated by an asterisk.
Element Description
Search
Add
Delete
Display or change an existing record.
Configure a new Guard Tour record. Default values display for you.
Delete a selected Guard Tour record from the list in the windowpane on the right,
that is no longer required or applicable. The associated alarm record for this Guard
Tour is simultaneously deleted.
If a tour is in progress, this record cannot be deleted or edited. Refer to the Activity
Secure Perfect 6.1.1 User Manual 68
Monitor or the Guard Tour tab of the Manual Control form for tour status.
Description*
Facility
Guard Tour Tab*
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button.
Enter a unique or suggestive description for this tour. The field accepts 1 to 64
characters.
Assign a facility option from the drop-down list of available facilities for assignment
by this operator. If you do not select a facility, Ignore Facilities will be assigned for
you.
Configure the specifics of this tour. You cannot save this record until you have
completed the Tour tab.
Intrusion Zone Form Completion
Reference Topics:
Intrusion Zone Tab
Status Tab
Overview - Intrusion Zones
Administration Menu
This option opens the Intrusion Zone Form that allows you to create or edit an Intrusion Zone record, then
assign related devices, based on the current operators’ facilities and permissions. If you are modifying an
existing zone configuration, it is recommended that you verify the state of the zone by obtaining a current
status.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button.
Description
Enter a unique description for the Intrusion Zone in this field.
In the process of saving a modified configuration, a dialog box will display: Please note, if zone is
currently armed, this update will disarm and rearm with your new configuration. Do you want to
continue? If you select Yes, the new configuration will save to the database. If you select No, your
changes will not be saved.
Facility
A facility option can be assigned for this intrusion zone record from the drop-down list of available
facilities for this operator.
Secure Perfect 6.1.1 User Manual 69
LogFile Form
Reference Topics:
LogFile Tab
Diagnostics Overview
The LogFile Form allows you to select a computer in your Secure Perfect network, set up a new logfile
(establish an identity for the file), and designate a path and directory in which to place your LogFile. All
log files should be saved in the Secure Perfect/Logs folder; it will be easier to locate for backups
and upgrades. It is a shared folder, which means other clients can gain access to the log files.
Each client computer will have a set of diagnostic objects that represent what can be monitored on that
machine. Diagnostic objects can be controlled remotely (turned on or off). All diagnostic objects can write
messages to a common default logfile or any diagnostic object can write to a separate log file created
and defined by the user.
Before any logfile can be deleted from Secure Perfect, you must re-assign diagnostic objects to another
logfile.
Mode Schedule Form
Reference Topic:
Mode Schedule Tab
Mode schedules define the date and time a mode goes into effect. The purpose of a mode is to allow the
micros to operate differently than predefined for Normal mode (Monday through Sunday, which is the
default mode of the Secure Perfect system). Operating modes are an administrative decision, as each
facility has unique requirements. For each mode, Secure Perfect micros will control its devices such as
readers and doors in a predefined way.
You may have a schedule configured, but never see a schedule change if you do not have the
schedule associated with an Alarm Routing and Bumping configuration.
Description: Click Search to edit an existing mode schedule or click New to add a new mode schedule.
• The Host PC and micros may be in different modes at the same time.
• Modes are not partitioned by facilities. If you need to use facilities in your system, create a mode
schedule for each facility. Use the facility description as a prefix on the Mode Schedule Form, in the
Description to indicate to which facility this mode will apply. For example: BocaHQ 8 to 5 would
indicate a facility-specific mode, where BocaHQ refers to a geographic location.
• There are four possible modes. Normal is day-of-the-week dependent and it is the default mode for
the Secure Perfect system. The remaining three are not day-of-the-week dependent. Both schedules
and events can be defined in terms of modes. Sunday through Saturday configurations are only in
effect in Normal mode. Then, you could define Mode 1 as Half-Day Holiday, and Mode 2 as
Full-Day Holiday. Mode 3 might be Return to Normal.
Like events, there is no end time associated with a mode. The mode will remain active until changed
by another mode schedule.
Secure Perfect 6.1.1 User Manual 70
Operator Form
Reference Topics:
Operator Tab
Facilities Tab
An operator is an individual who can access and control the Secure Perfect software.
To locate and view existing operator records, click Search. A list of operator records will display. You can
either click Add to add new operators OR search and view or change the existing list of operators on the
Secure Perfect system.
Once a facility is assigned to an operator, it will appear in the Facility field after a successful login by that
operator. Operators are associated with permissions that define the actions operators can perform within
SP. Use this form to configure operator records.
Facility
A facility can be assigned from the drop-down list of available facilities for assignment by this operator.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Override Form
Reference Topic:
Override Tab
Use this form to manually enter an In or Out status for badge transactions that you want to enter into the
history. This information can be used by those who create reports to track, view, and verify employee
transactions, pair In and Out transactions, or review total transactions.
Parameters Form
Reference Topics:
Settings Tab
User Fields Tab
Mode Labels Tab
Address Fields Tab
Communication Settings Tab
Clear Archive Tab
Password Tab
Complete the tabs of the Parameter Form to assign global settings used throughout the Secure Perfect
system. You will want to configure the global system parameters before you begin loading your database
by creating records and assigning permissions.
Secure Perfect 6.1.1 User Manual 71
Permission Form
Reference Topic:
Permission Tab
The forms in Secure Perfect will display an icon in the left corner indicating the permissions assigned
to this operator. The form icons correspond to the icons and permissions assigned here.
Use the Permission Form to create permission records.
Permissions and facilities must be created before they are assigned to operators. Permissions are
assigned to operators and define what operators can do within SP.
To locate and view existing permission records, click Search. A list of records will display. You can either
click Add to add a new permission OR search and view or change an existing permission.
Description: Enter a description for the permission.
Secure Perfect comes with a System Administrator permission that allows full action on all forms. You
can create more restrictive permissions and apply the System Administrator permission ONLY to those
operators fully trained in SP.
Secure Perfect 6.1.1 User Manual 72
Region Form
Reference Topics:
Region Form Tab
Backup Regions Tab
APB Region Configuration
Welcome
This form displays if you are licensed for Global Edition software. Refer to the Secure Perfect Installation Guide for complete details of the Global Edition features. When a Server computer is added to a Secure
Perfect Global Edition system, Region Form records are also created. You cannot delete a Region Form
record.
The Region Form allows you to assign or edit the frequency of synchronization intervals for your Global
Edition database replication. Global Edition systems can also be configured for database redundancy, at
the Regional level. A Regional Database Server can be configured to have backup Servers in the event
of a failure at the default Regional Server. Additionally, APB options are available for configuration in the
selected Region.
REMINDER: A subscription is a request for a copy of data or database objects to be replicated. It
defines what publication will be received, where, and when. The time that it takes to complete this
process of replication and synchronization is dependent on the amount of data needed to be
synchronized.
Description
Click Search to display a list of Database Servers in your Secure Perfect system. Select one of the
Database Servers from the list box in the right windowpane. The selected server name now displays in
the Description field.
Secure Perfect 6.1.1 User Manual 73
SP Auto Update Configuration Form
Administration Menu
Use this form to configure your Secure Perfect network computer for automatic notification and
installation of the latest Quick Fixes and Service Packs. This feature must be coordinated with your IT
Department. They may have certain procedures, restrictions, or security policies in place.
Enable Auto Update: Select this check box to enable the Check for Update item of the File menu.
Settings:
HTTP Server Path: This is the Server to which you need to connect in order to search for available
updates. This field may look something like the following: http://ge-interlogix.com
HTTP Server User Name: Enter the User Name used to reach the HTTP Server, if required.
HTTP Server Password: Enter the password used to reach the HTTP Server, if required.
Repeat HTTP Server Password: Enter the password used to reach the HTTP Server, a second time as
a security check.
Secure Perfect supports Basic Authenication only and not Integrated Windows Authenication.
Product Update Available:
Notify Clients Immediatlely that Product Update is Available: Select this check box to automatically
notify client computers that a product update is available.
Update Message Text: In this box, enter a message that will display in a popup, notifying client
computers that a product update is available.
OK: Click this button when configuration is complete. The entries on this window are saved.
Cancel: Click this button to terminate and close this window. The entries will not be saved.
Secure Perfect 6.1.1 User Manual 74
Time Schedule Form
Reference Topic:
Time Schedules Tab
Administration Menu
Time schedules define the day(s) of the week and time(s) an action will start AND end.
This form is used to create time schedules. A time schedule determines when an action will occur, such
as turning on alarm monitoring. Time schedules are comprised of one or more time intervals (start and
stop times) on one or more days of the week and modes. Time schedules differ from events in that time
schedules define an interval of time over which an action occurs while events schedule when an action
occurs. Note that a time schedule can define an action multiple times, even within the same day. Once a
time schedule is defined, it can be applied anywhere time schedules are used.
Deleting a time schedule does not affect the current state of any devices currently under the effect of
the deleted schedule. If you delete a schedule while it is currently active, this schedule will never end.
Time schedules are not partitioned by facilities. If you need to use facilities in your system, create an
event for each facility. Use the facility description as a prefix on the Time Schedule Form, Description to
indicate to which facility this event will apply.
Example:BocaHQ Normal Workweek would indicate a facility-specific time schedule, where BocaHQ
refers to a geographic location. For example, you can create a time schedule that is active Monday
through Friday 8:00 A.M. to 5:00 P.M. This particular time schedule (perhaps called Normal Workweek)
can be applied to the Access Right for Permanent Employees and you may want to turn off alarm
monitoring during those hours.
The maximum number of supported time schedules for any one micro is 1,023. Click Search to display a
list of previously created time schedules or Add to add a new schedule.
Description
Enter a meaningful and unique 32-digit or less alphanumeric description for this schedule.
Secure Perfect 6.1.1 User Manual 75
Tour Point Form
Reference Topic:
Tour Point Tab
Administration Menu
This form is unavailable if you are not licensed for Guard Tour.
A Guard Tour is an inspection of your facility premises, made by a security officer at random intervals.
The officer stops at pre-determined tour points along the way, where a badge must be presented to a
reader or DI point so that the Secure Perfect system can track the badge progress. Each time the officer
presents a badge to a reader, a tour point is ‘hit.’
• Tour Points and a Guard Tours record must be created before a tour can begin.
• Tour points can be any readers or DIs that are not on a dialup micro.
• DIs must be configured as a DI type of Guard Tour.
• DI points can only be assigned to one Guard Tour.
• Reader tour points can be assigned to any tours and any number of tours.
• All tour points must be associated with micros within the same Region.
• The badge read does not grant access or cause an invalid alarm.
• Double-hit points along the tour result in invalid tour transactions.
• Badge transactions are stored in badge history and available to generate reports.
• A badge must be assigned to the tour.
Additional statements relating to Guard Tours are listed in the Guard Tours topic of this Help file.
Requirements are indicated by an asterisk.
Element Description
Search
Add
Delete
Description*
Facility
Tour Point Tab*
Click to display or change an existing Guard Tour point record. If this is a Secure
Perfect Global Edition, points that display are limited to the active Region. You
cannot edit a Guard Tour Point if it is assigned to a Guard Tour.
Click to configure a new Tour Point record.
Click to delete a selected Tour Point record from the list in the windowpane on the
right, that is no longer required and is not assigned to an existing Guard Tour. If this
is a Secure Perfect Global Edition, points that display are limited to the active Region.
Enter a unique or suggestive description for this tour point. The field accepts 1 to 64
characters.
Assign a facility option from the drop-down list of available facilities for assignment by
this operator. If you do not select a facility, Ignore Facilities will be assigned for you.
Configure a reader or digital input. You cannot save this record until you have
completed the Tour Point tab.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual 76
Reporting Capabilities
Overview - Reports
Reference Topics:
New Template Dialog
Print Preview Report
Print Report
Export
Report Templates Window
Secure Perfect provides extensive reporting capabilities based on your system configuration. All reports
are selections on the Secure Perfect Reports drop-down menu.
Reports are filtered so that supplied information pertains only to the selected facilities of the current
operator.
A list of standard reports is provided below. Seven are history reports. In addition, Secure Perfect
has the ability to access reports created by using a third-party report generator. The following is a
brief description of each report:
1. Person: Provides person information, such as address and department, on all or a subset of
persons in the system.
2. Badge: Provides information in areas you select on all or a subset of badges in the system.
3. Administration: Generates reports about the administrative areas of the system. Reports cover
4. Device Configuration: Generates reports about the devices in the system, such as readers,
alarms, cameras, and digital video recorders.
5. Schedules/Events: Lists the schedules and events assigned for each micro.
6. Floor Access: Provides a list of floors defined in the system and the access granted to each one.
7. Reader Access: Provides a list of persons who have access to the specified reader(s); that is, who
has access where.
8. Roll Call: Provides a list of the last access granted to any or all persons in the system; that is, who
last went where based on individual badge activity.
9. Alarm History: Generates reports on alarm transactions.
10. Badge History: Generates reports on badge transactions.
11. Zone History: Generates reports on intrusion zone transactions.
12. DI History: Generates reports on digital input transactions.
13. Time and Attendance History: Generates reports on the number of hours employees were in their
facilities.
14. Operator History: Generates reports on operator actions relating to operations on Secure Perfect
forms.
15. Guard Tour History: Generates sets of Guard Tour activities containing start points, hits, invalid
points, pauses, resumes, tour end points, and tour time exceeded.
16. External Reports: The External Reports option opens the Launch External Reports window,
allowing you to access an executable application or report that was not created within SP. For
example, you may want to access a report created by a third party report generator such as Crystal
Reports or Microsoft Access 2002. Within SP, you can navigate to the application or folder, select
the file, and click to Open, once the report has been created and saved in a folder. This is a view
only function; you cannot launch Access or edit entries.
Secure Perfect 6.1.1 User Manual 77
Reports
Administration Report
Reference Topics:
Generates reports about the administration and organization of your Secure Perfect system.
Template: Displays the name of the currently loaded template, if there is one.
Templates: The Templates button is for saving a template or making it a default.
Alarm History Report Form
Reference Topics:
This form generates reports based on alarm transactions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make the displaying template the default.
General Tab
Fonts Tab
General Tab
Filters Tab
Date Range Tab
Database Tab
Fonts Tab
Badge History Report Form
Generates reports based on badge transactions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Click the Show me icon to view a step-by-step animated demo.
Reference Topics:
General Tab
Filters Tab
Additional Filters Tab
Date Range Tab
Database Tab
Fonts Tab
Secure Perfect 6.1.1 User Manual 78
Badge Report Form
Reference Topics:
General Tab
Filters Tab
Expiration Date Filter Tab
Return Date Filter Tab
Fonts Tab
This report provides information in areas you select on all or a subset of badges in the system.
Template: Displays the name of the currently loaded template, if there is one.
Templates: The Templates button is for saving a template or making it the default.
Device Report Form
Reference Topics:
General Tab
Filters Tab
Fonts Tab
This form generates reports about the devices in the system. Device Reports cover alarms, alarm groups,
digital inputs, digital outputs, digital output groups, elevators, cameras, digital video recorders, micros,
and readers.
Template: Displays the name of the currently loaded template, if there is one.
Templates: This button is for saving a template or making it a default.
DI History Report Form
Generates reports on digital input history transactions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Reference Topics:
General Tab
Filters Tab
Date Range Tab
Database Tab
Fonts Tab
Secure Perfect 6.1.1 User Manual 79
Floor Access Report Form
Reference Topics:
General Tab
Fonts Tab
This report lists the people who have access to floors.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make the displaying template the default.
Guard Tour History Report Form
Reference Topics:
General Tab
Guard Tours Tab
Date Range Tab
Database Tab
Fonts
Generates reports that include such information as start points, hits, invalid points, pauses, resumes, and
tour end points.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Operator History Report Form
Generates reports on operator actions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Reference Topics:
General Tab
Filters Tab
Date Range Tab
Database Tab
Fonts Tab
Secure Perfect 6.1.1 User Manual 80
Person Report
Reference Topics:
General Tab
Filters Tab
Additional Filters Tab
Fonts Tab
Overview - Reports
This report provides personal information, such as address, department, badge, access rights, and user
fields on all or a subset of persons in the system.
Click the Show me icon to view a step-by-step animated demo.
Template: Displays the name of the currently loaded template, if there is one.
Templates: The Templates button is for saving a template or making it the default.
Reader Access Report Form
Reference Topics:
General Tab
Readers Tab
Fonts Tab
This report provides a list of persons who have access to the specified reader(s); that is, who has access
where.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make the displaying template the default.
Roll Call Report Form
Reference Topics:
General Tab
Readers Tab
Date Range Tab
Fonts Tab
This report provides a list of the last access granted to any or all persons in the system and each of their
badges; that is, who last went where.
Template: Displays the name of the currently loaded template, if there is one.
Templates: This button is for saving a template or making it the default.
Secure Perfect 6.1.1 User Manual 81
Schedule Report Form
This report lists the schedules and events assigned for each micro.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Time and Attendance History Report Form
Generates reports on time and attendance transactions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Reference Topics:
General Tab
Filters Tab
Fonts Tab
Reference Topics:
General Tab
Filters Tab
Readers Tab
Date Range
Database Tab
Fonts Tab
Zone History Report Form
Template: Displays the name of the currently loaded templete, if there is one.
Templates: Click to save a template or make it the default.
Reference Topics:
General Tab allows you to set parameters of the form and the method to use for grouping and presenting
the information.
Filters Tab allows you to limit the person or badgeholder records printed on this report.
Additional Filters Tab allows you to limit the type of records printed on this report.
Date Range Tab allows you to select the date and time range on which the report should be based.
Database Tab allows you to select the history file you want to report on. You can select the default listed
on the tab or select the archived history file.
Fonts Tab allows you to select the fonts you want to use in the report.
Generates reports on intrusion zone transactions.
Secure Perfect 6.1.1 User Manual 82
Troubleshooting and Help
Customer Support
If you require assistance, first contact your local Business Partner.
To contact GE Security, use the following numbers and addresses:
Telephone 1 888 GE SECURITY (437-3287)
FAX 561 998 6244
Web Site www.ge-security.com
Training rs-bcttraining@ge.com
Documentation bctdocs@ge.com
Check the Web site periodically for timely information on all GE Security products.
Help Menu Selections
Support rs-bctsupport@ge.com
The following selections display in the Help drop-down menu:
Help Topics
About Secure Perfect
Overview - Diagnostics
Reference Topic:
LogFile Form
Diagnostics
Secure Perfect provides an extensive and convenient diagnostic utility to turn the monitoring of Secure
Perfect system components on and off. To display debug messages in the Diagnostics Log within SP, the
diagnostics for that component you want to monitor must be turned on. Each client computer will have a
set of diagnostic objects that represent what can be monitored on that computer.
For each client, Secure Perfect creates a default logfile (others can be created) for each day of the week
such as SPEEFriday.spl. This file is overwritten each week, thus creating a new log for that day.
During normal operation of SP, informational as well as debug messages are written to the daily log file.
Under abnormal conditions, the log file may also contain warning and/or fatal messages indicating failure
conditions.
Additionally, for each client, there is a log located in the WINNT\system32 folder. Under normal system
operation, this log will be empty. It will be used to log messages if the server and the database cannot be
reached.
DiagView is a separate program within Secure Perfect. To access DiagView, select Diagnostic Viewer
from the Administration menu. It operates in "real time." That is, every time Secure Perfect writes an entry
to the log file, DiagView automatically displays the latest message. By default, DiagView displays only the
latest 1000 messages. The number of displayed messages can be changed on the DiagView,
Preferences form.
All log files should be saved in the Secure Perfect/Logs folder; it will be easier to locate for backups
and upgrades. It is a shared folder, which means other clients can gain access to the log files.
Secure Perfect 6.1.1 User Manual 83
Remote Diagnostics
If you purchased your computer from GE Security, the program pcANYWHERE was included. If you are
experiencing problems, this program allows your GE Security Business Partner or Support Center
personnel to dial into your Secure Perfect computer and observe the situation, thus providing a quicker
response and resolution time.
The LogFile Form allows you to select your computer, set up a new logfile (establish an identity for the
file), and designate a path and directory in which to place your LogFile.
Troubleshooting
While Secure Perfect was created to be as user-friendly as possible, this topic is created to assist you
with answers to frequently asked questions. Click to display the linked topic.
Software:
Can I customize the toolbar and add more buttons?
How do I perform a search on a specific item?
Why can't I delete a record?
No readers display in the reader list box. Why?
Why are there no alarms displayed on the Alarm Monitor Form?
How do I put a reader online?
I deleted all the records on one of my forms. I clicked Add to add a record and the text <deleted> displays
and sometimes information from the previous record. How do I get rid of the text <deleted>?
Our site uses SP in two languages. Sometimes, when we log in, the Help files are not in the correct
language. Why?
How do I remove an alarm from the Alarm Monitor Form?
How do I troubleshoot my Global Edition system?
Setup:
Why aren't the supervised DI points on my 2SRP board working?
Dial-Up Troubleshooting Tips: While some information is automatically saved to the logfile, you can
decide whether certain items (ports, lines, micro, or forms) will be sent to the logfile. Select Diagnostic
Settings from the Administration menu. For more persistent problems, Secure Perfect provides an
extensive diagnostic utility, Diagview. DiagView allows you to view the diagnostic log file, apply filters to
view information, and search for a specific log entry. Diagview has its own Help system for additional
information.
Why does the host dial a micro?
Secure Perfect 6.1.1 User Manual 84
Index of 'Show me' Demo Files
Index of 'Show Me' Demo Files
This is a comprehensive list of all demonstration files displayed throughout this Help system. The demo
files are in English only. Click the Show me icon to view a step-by-step animated demo. There is a
short pause as the demo begins.
Demo Title
Alarm Monitor
Backing Up a Secure Perfect Professional/eZ System
Backing Up a Secure Perfect Enterprise Edition System
Badge Assignment
DVR to Online
Intrusion Zone Arm/Disarm
Mass Updates
Manual Control: Unlock a Door
Online Help Contents
Online Help Index
Online Help Search
Person Record Creation
Report Export
Report Generation: History Report
Report Generation: Person Report
Report Template
Restoring Secure Perfect on an eZ/ Professional System
Secure Perfect 6.1.1 User Manual 85
Restoring Secure Perfect on an Enterprise Edition System
Video – Recording and Playing Back
Video Save
Video Search – General Event Tab
Video Search – General Playback Tab
Video Search – Motion Tab
Secure Perfect 6.1.1 User Manual 86
Reference Topics (Elements, Descriptions)
A
About Secure Perfect
Help Menu
Selection of this option opens a screen displaying the Secure Perfect software version, service pack
number, copyright information, licensing information, and contact information.
A sample window for a Secure Perfect system might display as follows:
Access Right
Personnel Menu
The Access Right option displays the Access Right Form that allows you to assign when (using a time
schedule or allowing access at all times) and where (using readers) access is given, that is then assigned
to a person.
Secure Perfect 6.1.1 User Manual 87
Access Rights Assignment
Select from the Available list those access rights you want to assign to this person. The access rights
that display in this list are those that were previously set up on the Access Rights Form. Only access
rights in the operators’ facilities are available for assignment by this operator.
• Select, then click the right arrow to assign an available access right.
• Select, then click the left arrow to unassign an access right.
Access Rights Tab
Access Right Form
Use this tab to create and define access right records.
• Assigned readers: This windowpane lists all readers currently assigned to this access right.
• Assign Readers: Click to display the Reader Assignment dialog box and select from a list of
readers available for assignment by this operator. If no readers are listed, check that the
readers have been marked Active on the Readers tab of the Reader Form.
Access control:
• Allow access at all times: Select this option to allow access all the time, in all modes.
• Allow access by schedule: Select this option to assign a time schedule to this access right.
The time schedule governs when the access right grants access to the assigned readers.
• Time schedule: If you selected Allow access by schedule, this field is now available to select
a time schedule from the drop-down list of previously created time schedules.
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Access Rights Tab
Person Form
Use this tab to assign access rights to this person.
Assigned access rights
This windowpane lists any currently assigned access rights.
Assign
Click to display the Access Rights Assignment dialog box, enabling you to select the access rights you
want to assign or unassign for this badgeholder.
Activity Monitor
Operations Menu
The Activity Monitor option opens the Activity Monitor Form that allows you to monitor badge and
intrusion zone transactions. The shortcut key combination for Activity Monitor Form is CTRL+A.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 88
Activity Monitor Form Shortcut Menu
Options of the shortcut menu are as follows:
Resume: Starts the scrolling of badge transactions. This option will be active only if you previously
selected Pause. All badge transactions that occurred while the Pause option was on will be displayed
once you select Resume.
Pause: Suspends scrolling of badge transactions on the Activity Monitor.
Clear: Clears all badge transactions from the Activity Monitor.
Swipe and Show Readers: Select to display an Edit Readers List assignment form. Select those
readers you want monitored in the Swipe and Show window. If readers have not been selected, the
Swipe and Show program will not start.
Launch Swipe and Show: Starts the Swipe and Show program. Only one instance of Swipe and Show
is available for display on a computer at one time. If Imaging is not licensed for the system, this option is
not available.
Badge: Displays the Badge Form, making available the selected badge record.
View Live Video: Accesses live video from the camera(s) associated with the reader’s badge transaction
as defined by its event trigger. In order to view live video, the DVR must be online (if it is a duplex
recorder, the recorder must also be in record mode). The following windows open:
• The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
• Video window(s) displaying the current live view of the camera(s) associated with the badge
transaction. Each window displays a dialog box containing the current date and time.
View Recorded Video: Accesses previously recorded video from the camera(s) associated with the
reader’s badge transaction as defined by its event trigger. In order to view recorded video, the DVR must
be online and available. The DVR cannot be serving another request for playback of any recorded video
event. The following windows open:
• The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
• Video window(s) displaying the recorded video associated with the badge transaction. Each
window displays a dialog box containing the current date and time.
View Single Recorded Frame: Select to display the first frame of the event recording as a still photo.
Quick Launch: Accesses live and recorded video from camera(s) associated with the reader’s badge
transaction as defined by its event trigger.
A message dialog will display if video is not available because associated cameras are not assigned
to the current active facility.
Secure Perfect 6.1.1 User Manual 89
Activity Monitor Form Toolbar
The Activity Monitor Form toolbar consists of the following options:
Click To
Resume or restart the scrolling of badge transactions.
Pause or suspend the scrolling of badge transactions.
Clear all badge transactions.
Display an Edit Readers List dialog.
Start the Swipe and Show program. This option will not
be available if the system is not licensed for Imaging or
readers have not been selected.
Reference Topic:
Activity Monitor Form Shortcut Menu
Add Map
An Add Map dialog box displays when you click Add Record on the Secure Perfect toolbar while the
Alarm Graphics Editor window is displayed, allowing you to navigate to a file source for an existing map.
Description
Enter a description of the type of map. Example: Overview of Main Building.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
File
Enter the full pathname of the file or click Browse to navigate, locate, and select the file. Secure Perfect
supports map files in the Windows MetaFile format (.wmf or .emf).
Add New Icon to Database
Alarm Graphics Viewer Form
Click to import your own icon files to the list of available icons used in the previous three fields to
represent a specific alarm state. Icon files must be .ico format.
Secure Perfect 6.1.1 User Manual 90
Adding Sound to an Alarm
If you would like to hear a sound from the Secure Perfect computer when an alarm occurs, follow the
steps below:
You MUST have a sound card in your computer!
1. Click Start, Settings, then Control Panel.
2. From the Control Panel window, double-click the Sounds and Multimedia icon.
3. In Sound Events, scroll to Secure Perfect.
4. Select the alarm to which you want to assign sound; then select the sound you want for that alarm.
5. Click OK to save the change and exit the window or Apply to save that change and add more sounds.
6. Start SP; select Administration, then Parameters.
7. On the Settings tab of the Parameters Form, verify that the Console alarm sound field is set for the
results you anticipate (either Continuous or Short).
Additional Filters Tab
Person Report
This tab displays ONLY if you have selected User Data in the field Report Type on the General Tab of the
Person Report. Use this tab to add user fields as an additional filter for the report.
• User Fields: This window lists all the user fields, the user field value you want to use as a
filter, and whether the user field should print. (You can print the user field on the report by
selecting the field Print selected user field or deselect this field so the user field will not print.)
• Modify Value: To change the value of a user field, select the user field you want and enter a
new value in this field.
• User fields printed on report: If this field is enabled, then the currently selected user field will
print on the report.
• Clear All/Set All: Click Clear All so that none of the User Fields are set to print. Click Set All
to set all of the User Fields to print.
• Print selected user field: Enable this field to set the selected User Field to print or disable this
field so that the selected User Field does not print.
Additional Filters Tab - Badge History Report Form
Use this tab to select additional, specific criteria by which this report will be generated.
• Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
• Reader: Select the reader you want to use to generate report information. If you want to use
all readers, select <ALL>.
• Department: Select the department you want to use to generate report information. If you
want to use all departments, select <ALL>.
• Activity: Select the badge activity you want to use to filter report information, such as Duress
Invalid, Duress Valid, Duress Valid No Passage, Duress Valid Open, Guard Tour Activity,
Invalid, Invalid APB In, Invalid APB Out, Invalid Floor, Invalid PIN, Invalid T&A In, Invalid T&A
Out, Invalid Timed APB, Lost, Max Invalid PIN, Overdue, Override, Unknown, Valid, Valid No
Passage, and Valid Open. If you want to use all activities, select <ALL>.
• Logical Reader Type: Select the logical reader type that you want to use to limit the report,
such as APB In, APB In or Out, APB Out, Elevator, In Required, Normal, T&A In, T&A In and
Out, T&A In or Out, or T&A Out. If you want to use all the logical reader types, select <ALL>.
• Floor Description: Select the range of floor descriptions you want to display on the report. If
you want to list all floor descriptions, leave these fields blank.
Secure Perfect 6.1.1 User Manual 91
Additional Filters Tab - Zone History Report
Use this tab to select additional, specific source criteria by which this report will be generated.
• Activity Type: Select the type of activity to use in generating this report. If you want to use all
intrusions zone activity type messages, select <ALL>.
• Locaton : Select the source of the zone activity as a Badge, Digital Input, Manual, Micro, or
<ALL>.
• Device Description: Enter the range of device descriptions on which you want to report.
Leave blank for all descriptions.
• Micro Description: Enter the range of micro descriptions you want to use to generate report
information. If you want to use all micros, select <ALL>.
Address Fields Tab
Parameters Form
Use this tab to modify the labels of the address fields. These labels are used on the Person Form.
Address 1/Address 2/Address 3/Address 4/Address 5
Displays the current label. To edit or create a new label, select and enter text over the existing text. The
address field label can be up to 32 alphanumeric characters in length.
Click Save before you exit this form.
Administration
Reports Menu
The Administration option opens the Administration Report Form that allows you to create a report on
the administrative aspects of your Secure Perfect system, such as alarm instructions, events, host
parameters, operators, permissions, responses, schedules, archives, client, and floors.
Secure Perfect 6.1.1 User Manual 92
Administration Menu Selections
The following selections display in the Administration drop-down menu:
Operator
Permission
Client
Region
API Connections
Event Schedule
Time Schedule
Mode Schedule
Instruction
Response
Alarm Notifier
Client Group
Alarm Routing and Bumping
Floor
Parameters
Override
Badge Format
Auto Update
LogFile
Diagnostic Setting
Diagnostic Viewer
CCTV Alarm
Camera Preset
Event Trigger
Intrusion Zone
Guard Tour
Tour Point
Facility
Secure Perfect 6.1.1 User Manual 93
Alarm
Device Menu
The Alarm option displays the Alarm Form that allows you to modify records that are automatically
generated when you define a micro. It also displays alarms created from Digital Inputs.
Alarm Assignment
This window displays a list of alarms in the Secure Perfect system for the facilities available for
assignment by this operator. All alarms display. If this is a Global Edition system, alarms are not filtered
by Region.
• Select, then click the right arrow to assign an available alarm.
• Select, then click the left arrow to unassign an alarm.
Click OK to display results in the Assigned Alarms windowpane.
Alarm Bumping Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this bumping record. Only Client
Groups in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available Client Group.
• Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Bumping, Client Groups windowpane.
Alarm/Digital Input Tab
Manual Control
Manually monitor alarms and DIs (digital Input points) depending on the current operator’s facilities and
permissions.
There may be schedules in effect that will override manually controlled changes if schedule override
is selected; otherwise, the manual control selection is truly indefinitely.
Select type
Select one of the alarm/DI types from the drop-down list:
• Alarms
• Alarm Groups
• Digital Input
Nothing will display in the list box until you choose a micro option.
Select micro
Select a micro option.
• All displays all the selected type of devices in the current operator’s facilities for all micros.
• By Micro displays all the selected type of devices in the current operator’s facilities for a specific micro.
Columns in Windowpane
• Description: Description of the Alarm/DI in the database.
• Micro: Micro on which the Alarm/DI is located.
Secure Perfect 6.1.1 User Manual 94
Set state to:
The names of the buttons change depending on the DI type (Alarm or Other) selected.
If an Alarm or Alarm Group is selected, click . . .
• Monitor On: To monitor the selected alarms or alarm groups. Setting Monitor On will display the
alarms on the Alarm Monitor Form.
• Monitor Off: To immediately discontinue monitoring the selected alarms or alarm groups. Setting
Monitor Off will not display alarms on the Alarm Monitor Form.
• Indefinite: To make the change permanent. This selection does not allow it to be overridden by a
schedule (can be monitor ON or OFF).
• Sched. Override: To change the state of the monitoring by a schedule override. For example, use
Sched. Override to monitor an alarm until a schedule overrides it. If you don’t want the schedule to
stop the monitoring, click Indefinite.
If a DI is selected, click . . .
• Enable: To enable the selected DI on the micro so a state change will be reported.
• Disable: To immediately disable the selected DI on the micro so its state changes will not be reported
to the host or trip a Digital Output.
• Indefinite: To Enable or Disable permanently.
• Sched. Override: Use this option to change operation state of a DI if you want a schedule to override
its setting. For example, use Sched. Override to control operation of the DI until a schedule takes
over. If you don’t want a schedule to control activation of a DI, use the On Indefinite selection.
Purpose
Enter an explanation for monitoring an alarm or enabling/disabling DI points. This field accepts 255
alphanumeric characters. These comments are written to the operator history field and display on the
Operator History Report, Purpose Field.
Alarm Graphics Editor
Operations Menu
The Alarm Graphics Editor option opens the Alarm Graphics Editor that allows you to add icons on
graphical map views to point out the location and type of incoming alarms. You cannot create a map
using SP; create it using the program of your choice and save it in .WMF or .EMF format.
Alarm Graphics Viewer
Operations Menu
The Alarm Graphics Viewer option opens the Alarm Graphics Viewer that allows you to view the maps
of your facility that were created. These maps point out the location and type of incoming alarms. The
shortcut key combination for Alarm Graphics Viewer is CTRL+V.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 95
Alarm Graphics Viewer Shortcut Menu
Operator permissions for the Alarm Graphics Viewer must be assigned to ‘Update’ in order to view
and select right-click menu options. Points, alarms, DIs, and DOs do not display if not in the operator’s
facility. For shortcut menu functionality, move your mouse pointer to an assigned point and click the right
mouse button. The shortcut menu that displays with a right-click mouse button depends on the Point
Type assigned.
Element Description
• Alarm Monitor Form
Alarm Point Right-Click
Menu Options:
• Alarm Monitor Form
• Monitor On Indefinite
• Monitor Off Indefinite
• Monitor On Schedule Override
• Monitor Off Schedule Override
Digit Input Point Right-Click
Menu Options:
• Enable On Indefinite
• Enable Off Indefinite
• Enable On Schedule Override
• Enable Off Schedule Override
Digit Output Point Right-Click
Menu Options:
• Unlock Reader/On for Duration
• Unlock Reader Indefinitely/On
• Lock Reader/Off
• Unlock Reader Schedule Override
Displays the Alarm Monitor form. This is the right-click menu
option when mouse pointer is not on an assigned map point.
Displays the Alarm Monitor form.
Activates the assigned alarm. The alarm will remain active
until you manually turn it off.
Immediately deactivates the alarm.
Immediately activates this alarm and the schedule overrides
any active setting.
Immediately deactivates this alarm and the schedule overrides
any active setting.
Enables this DI and will remain enabled until you change the
state manually.
Disables this DI and this DI will remain Off until you change
the state manually.
Immediately activates this digital input and a schedule can
override any active setting for this digital input.
Immediately deactivates the digital input and a schedule can
override any active setting for this digital input.
Immediately unlocks the reader or turns on the DO and
remains unlocked for the specified ‘On Time.’
Immediately unlocks the reader or turns on the DO associated
with this reader and remains unlocked indefinately.
Immediately locks the reader or turns off the DO associated
with this reader.
Immediately unlocks the reader or turns on the DO associated
with this reader and the schedule overrides any active setting.
Alarm Group
Device Menu
The Alarm Group option opens the Alarm Group Form that allows you to assign alarms into groups or
sets for scheduling purposes. Example: To apply a schedule to a series of alarms, apply the schedule to
a group that contains the specific alarms.
Secure Perfect 6.1.1 User Manual 96
Alarm History
Reports Menu
The Alarm History option opens the Alarm History Report Form that allows you to create a report based
on the history of alarm activity.
Alarm Instruction Assignment
This window displays when you click Edit, allowing you to modify the list of alarm instructions assigned to
this alarm. Only alarm instructions in the operators’ facilities are available for assignment by this operator.
Select, and then click the right arrow to assign an available instruction. A maximum of six alarm
instructions can be assigned.
Select, and then click the left arrow to unassign an instruction.
Click OK to display results in the Instruction windowpane of the Alarm Form.
Alarm Instruction Tab
Use this tab to create instructions on how to react to alarms. The instructions should belong to the same
facility as the alarm with which they will be associated.
• Number: Assign a number to the instruction records. The range for alarm instructions is 0 to
254 for a total of 255 instructions.
• Instructions: Enter the text you want to display when the associated alarm occurs. The
instruction can be 0 to 64 alphanumeric characters in length.
Alarm Monitor
Operations Menu
The Alarm Monitor option opens the Alarm Monitor Form that allows you to monitor alarm activity. The
shortcut key combination for Alarm Monitor Form is CTRL+M.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 97
Alarm Monitor Form Shortcut Menu
Select To
Show Inactive
Alarms
Alarm
Alarm Graphics
Viewer
Alarm Graphics
Editor
View Live Video
View Recorded
Video
View Single
Recorded Frame
Display alarms in an inactive state and removed from view. These
alarms were previously acknowledged or purged from the Alarm
Monitor. This is a toggle election and is a way to display previous
alarm activity without running a report.
Opens the Alarm Form, allowing you to modify or view that
particular alarm record.
Opens the Alarm Graphics Viewer Form, allowing you to view the
alarm graphics map to which the alarm belongs.
Opens the Alarm Graphics Editor Form, allowing you to create or
edit a graphical view of alarm states for the alarms you select.
(If a camera icon is not displayed to the left of the alarm description,
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, right-click to view
live video from the camera(s) associated with the alarm’s
transaction as defined by its event trigger. Refer to Video Windows
- An Overview topic in this Help system for window management
information.
In order to view live video, the DVR must be online (if it is a
duplex recorder, the recorder must also be in record mode).
The following windows open: 1) Digital Video Viewer. Refer to
Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
(If a camera icon is not displayed to the left of the alarm description,
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, select to view live
video from the camera(s) associated with the alarm’s transaction as
defined by its event trigger. Refer to Video Windows - An Overview
for window management information.
In order to view recorded video, the DVR must be online and
available, and not serving another request for playback of recorded
video based on this event.
The following windows open: 1) Digital Video Viewer window. Refer
to Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
Select to display the first frame of the event recording as a still
photo.
Reference Topic:
Alarm Monitor Form Toolbar
Secure Perfect 6.1.1 User Manual 98
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.