Milestone Retail 2.2 User Manual

XProtect
Retail 2.2
User’s Manual
Target Audience for this Document
This document is aimed at users of Milestone XProtect Retail and provides descriptions of how to create and use different types of queries.
The manual should be helpful to both the user who investigates known kinds of fraud or shrinkage using existing queries, and to the advanced user who creates or adjusts queries to match new types of fraud or shrinkage.
Note: The installation of Milestone XProtect Retail is not covered in this manual.
www.milestonesys.com Page 2 Target Audience
Copyright, Trademarks and Important Information
Copyright
© 2008 Milestone Systems A/S.
Trademarks
XProtect is a registered trademark of Milestone Systems A/S.
Microsoft and Windows are registered trademarks of Microsoft Corporation.
All other trademarks mentioned in this document are trademarks of their respective owners.
Disclaimer
This document is intended for general information purposes only, and due care has been taken in its preparation.
Any risk arising from the use of this information rests with the recipient, and nothing herein should be construed as constituting any kind of warranty.
Milestone Systems A/S reserve the right to make adjustments without prior notification.
All names of people and organizations used in this document's examples are fictitious. Any resemblance to any actual organization or person, living or dead, is purely coincidental and unintended.
www.milestonesys.com Page 3 Copyright, Trademarks and …
Milestone XProtect Retail 2.2; User’s Manual
Contents
INTRODUCTION.......................................................... 5
System Requirements ........................................................................... 5
HOW TO INVESTIGATE ............................................... 6
Custom Parameters .............................................................................. 7
Query types .......................................................................................... 8
Performing a Normal Query................................................................... 8
Performing a Group By Query................................................................ 9
Drilling Down a Group By Query ........................................................ 9
Viewing Transactions and Video ......................................................... 10
Printing............................................................................................... 11
Exporting a Query Result .................................................................... 11
MANAGING QUERIES ................................................ 12
Creating a Query................................................................................. 12
Using the SQL Interface.......................................................................14
Editing a Query ................................................................................... 14
Deleting a Query ................................................................................. 15
RETAIL APPLICATION SETTINGS.............................. 16
Connecting to the Surveillance System ............................................... 16
Reloading Database Structure ............................................................ 17
www.milestonesys.com Page 4 Contents
Milestone XProtect Retail 2.2; User’s Manual
Introduction
The Milestone XProtect Retail application is a powerful investigation tool which can help you to pinpoint shrinkage and fraud.
With the Retail software you are able to:
Execute queries in business data to find suspicious transactions
View video matching suspicious transactions
Export recordings for video evidence
Create your own queries
System Requirements
The requirements for the Milestone XProtect Retail system are project specific and can only be calculated based on the individual project.
www.milestonesys.com Page 5 Introduction
Milestone XProtect Retail 2.2; User’s Manual
How to Investigate
With the Milestone XProtect Retail application you can investigate different kinds of suspicious data to identify shrinkage and fraud. This is done by using one of the defined queries to look for suspicious activity in the business data. Queries find transactions, which are linked to the video recorded from by a camera at the till when the specific transaction took place.
1. Select a query in the Query list to find data that you want to investigate.
www.milestonesys.com Page 6 How to Investigate
Loading...
+ 12 hidden pages