0% found this document useful (0 votes)
88 views

SecurOS Administration Guide

Uploaded by

apulidolechuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

SecurOS Administration Guide

Uploaded by

apulidolechuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 543

Version 11

Administration Guide
SecurOS Administration Guide (AG - EN, build 117 on 7/13/2023).

© Copyright Intelligent Security Systems, 2023.

SecurOS® ("SecurOS") and all respective logos are trademarks of ISS Corp, in the U.S. and/or other countries.

Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Administration Guide
Contents

Contents
1 Preface 12
1.1 Scope
........................................................................... 12
1.2 Target
. . . . Audience
....................................................................... 12
1.3 Using
. . . .This
. . . .Manual
................................................................... 12
1.4 Getting
. . . . .Technical
. . . . . . . . .Support
............................................................. 12
1.5 SecurOS
. . . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
...................................................... 13
1.6 Design
. . . . .Convention
...................................................................... 14
1.7 Design
. . . . .Elements
...................................................................... 15

2 Purpose, Implementation And Operation Principles 16


2.1 SecurOS
. . . . . . Architecture
..................................................................... 16
2.1.1 Types Of. . .Servers
. . . . . . .And
. . . .Workstations
....................................................................... 16
2.1.1.1 Classification by . .Functionality
........................................................................ 16
2.1.1.1.1 Video Server .......................................................................... 16
2.1.1.1.2 Operator Workstation
.......................................................................... 16
2.1.1.2 Classification of. .Roles . . . . .in. .Configuration
. . . . . . . . . . .Management
...................................................... 17
2.1.1.2.1 Configuration . . . .Server
...................................................................... 17
2.1.1.2.2 Managing. Network . . . . . . .Configuration
. . . . . . . . . . .by. . Configuration
. . . . . . . . . . . Server
.......................................... 17
2.1.1.2.2.1 How. To . . .Configure
. . . . . . . .Servers
. . . . . . .When
. . . . .Deploying
. . . . . . . .Network
.......................................... 17
2.1.1.2.2.2 Configuration
. . . . . . . . Update
. . . . . . Procedure
............................................................ 18
2.1.1.2.2.3 Restoring . . . . . Configuration
. . . . . . . . . . . from
. . . . Backup
. . . . . . .Copy
............................................... 18
2.1.2 Software
. . .Implementation
.................................................................................. 18
2.2 Software
. . . . . . And
. . . . Hardware
. . . . . . . . .Platform
........................................................ 19
2.2.1 Video Server
. . . . . . System
. . . . . . .Requirements
........................................................................ 19
2.2.2 Operator
. . .Workstation
. . . . . . . . . . .System
. . . . . . Requirements
................................................................. 20
2.2.3 Audio Subsystem
. . . . . . . . . . Requirements
........................................................................... 21
2.2.4 Notification
. . . . . Subsystem
. . . . . . . . . .Requirements
...................................................................... 21
2.2.5 ACS Requirements
..................................................................................... 21
2.2.6 Environment
. . . . . . Requirements
............................................................................... 21
2.2.6.1 Computer Name . . Restrictions
........................................................................ 21
2.3 SecurOS'
. . . . . . .Subsystems
.................................................................... 22

3 SecurOS Installation and Update on Windows 23


3.1 Installing,
. . . . . . .Configuring
. . . . . . . . . . .and
. . . .Launching
. . . . . . . . . Configuration
. . . . . . . . . . . . .Server
............................... 23
3.1.1 Hardware
. . . .Installation
................................................................................. 23
3.1.1.1 Guardant Key Installation
.......................................................................... 23
3.1.1.2 Installing Guardant. . . .Key
. . . .in. .Manual
. . . . . .Mode
.......................................................... 24
3.1.2 License. .Key
................................................................................... 24
3.1.2.1 The Key is a part
. . .of. .a.product
.................................................................... 24
3.1.2.2 Request the key
. .by
. . e-mail
...................................................................... 25
3.1.3 Software
. . .Installation
.................................................................................. 26
3.1.3.1 Using Current Parameters
. . . . . . . . . .of. .the
. . .Windows
. . . . . . . User
. . . . .Account
. . . . . . .needed
. . . . . .for
. . PostgreSQL
................................ 26
3.1.3.2 Using Current Parameters
. . . . . . . . . .of. .the
. . .Database
. . . . . . . .and
. . . Administrator
. . . . . . . . . . .User
. . . . Account
................................. 27
3.1.3.3 Software Installation
. . . . . On
. . .The
. . . .Configuration
. . . . . . . . . . .Server
................................................... 27
3.1.4 Initial Configuration
..................................................................................... 33
3.1.4.1 Initial Configuration
. . . . Using
. . . . . The
. . . .System
. . . . . . Configuration
. . . . . . . . . . . Wizard
............................................ 33
3.1.4.2 Restoring Configuration
.......................................................................... 40
3.1.4.3 Start with Empty. . Database
........................................................................ 40
3.1.5 Launching
. . . . SecurOS
. . . . . . . . On
. . . The
. . . .Configuration
. . . . . . . . . . . .Server
...................................................... 40

www.issivs.com
SecurOS 4 Administration Guide
Contents

3.2 Installing,
. . . . . . .Configuring
. . . . . . . . . . .And
. . . .Launching
. . . . . . . . . .Peripheral
. . . . . . . . .Servers
.................................. 42
3.2.1 Adding. .To
. .The
. . . .Network
. . . . . . . And
. . . .Configuring
. . . . . . . . . . .Peripheral
. . . . . . . . .Servers
.............................................. 43
3.2.2 SecurOS
. . .Installation
. . . . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
............................................................ 44
3.2.3 Launching
. . . . And
. . . . Configuring
. . . . . . . . . . .SecurOS
. . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
.............................................. 45
3.3 Installing,
. . . . . . .Configuring
. . . . . . . . . . .and
. . . .Launching
. . . . . . . . . Operator
. . . . . . . . Workstations
.................................... 46
3.3.1 SecurOS. . .Installation
. . . . . . . . . .On
. . .Operator
. . . . . . . .Workstation
............................................................. 46
3.3.2 Operator
. . .Workstation
. . . . . . . . . . .Profiles
....................................................................... 47
3.3.2.1 Use Restrictions .......................................................................... 47
3.3.2.2 Creating Operator . . . Workstation
. . . . . . . . . . Profile
............................................................. 48
3.3.3 Fixed Operator
. . . . . . . .Workstations
............................................................................. 49
3.3.3.1 Adding To The.Network
. . . . . . .And
. . . Configuring
. . . . . . . . . .Fixed
. . . . .Operator
. . . . . . .Workstations
......................................... 49
3.3.4 Launching
. . . . SecurOS
. . . . . . . . On
. . . Operator
. . . . . . . . Workstation
.............................................................. 50
3.4 SecurOS
. . . . . . Update
. . . . . . .Order
.............................................................. 51

4 SecurOS Installation and Update on Linux 53


4.1 Installing,
. . . . . . .Configuring
. . . . . . . . . . .and
. . . .Launching
. . . . . . . . . Configuration
. . . . . . . . . . . . .Server
............................... 53
4.1.1 Hardware
. . . .Installation
................................................................................. 53
4.1.1.1 Guardant Key Installation
.......................................................................... 53
4.1.2 License. .Key
................................................................................... 54
4.1.2.1 Request the key
. .by
. . e-mail
...................................................................... 54
4.1.3 Software. . .Installation
. . . . . . . . . .On
. . .Configuration
. . . . . . . . . . . .Server
......................................................... 55
4.1.4 Initial Configuration
..................................................................................... 61
4.1.5 Launching
. . . . SecurOS
. . . . . . . . On
. . . The
. . . .Configuration
. . . . . . . . . . . .Server
...................................................... 61
4.2 Installing,
. . . . . . .Configuring
. . . . . . . . . . .And
. . . .Launching
. . . . . . . . . .Peripheral
. . . . . . . . .Servers
.................................. 61
4.3 Installing,
. . . . . . .Configuring
. . . . . . . . . . .and
. . . .Launching
. . . . . . . . . Operator
. . . . . . . . Workstations
.................................... 62
4.4 SecurOS
. . . . . . Update
. . . . . . .Order
.............................................................. 62

5 Installing Software to Provide Neural Network Algorithms


Operation 63
5.1 Installing NVIDIA Drivers to Provide Operation of Neural Network Algorithms Based on
. . . . . . in
Caffe2Server . . Linux
. . . . . .OS
............................................................. 63

6 SecurOS Administration Overview 65


6.1 Working
. . . . . .With
. . . . Control
. . . . . . . Panel
.......................................................... 65
6.1.1 Control. .Panel
. . . . .Activation,
. . . . . . . . . Configuring
. . . . . . . . . . .and
. . . .Hiding
...................................................... 66
6.1.2 Opening. . .and
. . . Closing
. . . . . . . Administration
. . . . . . . . . . . . .Center
........................................................... 68
6.1.3 Changing
. . . .Operator
. . . . . . . .Workspace
......................................................................... 69
6.1.4 User Session
. . . . . . .Administration
. . . . . . . . . . . . .and
. . . Client
. . . . . .Shutdown
........................................................ 69
6.1.5 System. .Shutdown
................................................................................... 70
6.1.6 Getting. .Help
................................................................................... 70
6.2 Administration
. . . . . . . . . . . Center
................................................................ 72
6.2.1 Working . . .with
. . . .Objects
.............................................................................. 73
6.2.1.1 Creating Objects .......................................................................... 75
6.2.1.2 Editing Object Settings
.......................................................................... 75
6.2.1.3 Deleting Objects .......................................................................... 75
6.2.1.4 Disabling/Enabling . . . .Objects
...................................................................... 76
6.2.1.5 Renaming Objects .......................................................................... 76
6.2.1.6 Searching for Objects
.......................................................................... 76
6.2.1.6.1 Searching. with . . . .Object
. . . . . .Search
. . . . . .Panel
......................................................... 77
6.2.1.6.2 Searching. with . . . .Search
. . . . . .Window
............................................................... 79
6.2.1.7 Favorite Objects .......................................................................... 80
6.2.1.8 Objects Requiring . . . Configuration
....................................................................... 81
6.2.2 Working
. . .with
. . . .Object
. . . . . .Table
. . . . .Parameters
................................................................... 83
6.2.3 Working
. . .with
. . . .Checkbox
. . . . . . . . .List
..................................................................... 84

www.issivs.com
SecurOS 5 Administration Guide
Contents

6.2.4 Adding. .IP. .Devices


................................................................................. 85
6.2.5 IP-Device
. . . Manager
.................................................................................. 86
6.2.5.1 Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
6.2.5.2 Basic Operations.......................................................................... 90
6.2.5.2.1 Launching. .IP-Device
. . . . . . . .Manager
................................................................ 90
6.2.5.2.2 Searching. Devices
. . . . . . . in
. .the
. . .Network
............................................................. 91
6.2.5.2.3 Adding IP. Device
......................................................................... 92
6.2.5.2.4 Editing IP.Device
. . . . . .Parameters
................................................................... 93
6.2.5.2.5 Copying IP. .Device
........................................................................ 94
6.2.5.2.6 Deleting IP
. . Device
........................................................................ 96
6.3 Users
. . . .and
. . . Rights
.................................................................... 96
6.3.1 SecurOS. . .Users
.................................................................................. 96
6.3.1.1 Changing Superuser
. . . . . Password
..................................................................... 97
6.3.2 User Registration
. . . . . . . . . . and
. . . .Configuring
. . . . . . . . . . User
. . . . .Rights
........................................................ 98
6.3.3 Configuration
. . . . . . . .of
. . Network
. . . . . . . .Domain
. . . . . . .User
. . . .Rights
........................................................ 103
6.3.3.1 Settings for Windows . . . . . . .NT
. . .Provider
................................................................ 103
6.3.3.2 Settings for LDAP . . . . Provider
...................................................................... 103
6.4 SecurOS
. . . . . . . Logging
.................................................................... 104
6.5 Updating
. . . . . . . .License
. . . . . . .Key
. . . .on
. . All
. . .Servers
................................................... 105
6.5.1 License
. . .Expiration
. . . . . . . . . Reminder
......................................................................... 105
6.6 Health
. . . . . Monitor
. . . . . . . self-diagnostic
. . . . . . . . . . . . . .Module
................................................. 106
6.6.1 System
..................................................................................... 112
6.6.2 Video. Server
.................................................................................... 112
6.6.3 Camera
..................................................................................... 121
6.6.4 Microphone
..................................................................................... 123
6.6.5 Sensor
..................................................................................... 123
6.6.6 Remote
. . .System
.................................................................................. 124
6.7 SecurOS
. . . . . . . Files
. . . . .Synchronization
............................................................... 124

7 Core Subsystem 126


7.1 Working
. . . . . . .Principles
.................................................................... 126
7.2 Data
. . . .Exchange
. . . . . . . . .Protocols
.............................................................. 126
7.3 Object
. . . . . Reference
...................................................................... 127
7.3.1 System..................................................................................... 127
7.3.2 Security
. . . Zone
.................................................................................. 131
7.3.2.1 General Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
7.3.2.2 Servers to Connect
. . . . . Tab
..................................................................... 133
7.3.2.3 Connection Restrictions
. . . . . . . . .Tab
................................................................. 135
7.3.3 Database
..................................................................................... 136
7.3.4 Department
..................................................................................... 138
7.3.5 User Account
..................................................................................... 139
7.3.6 Active. .Directory
. . . . . . . ./ .LDAP
.......................................................................... 140
7.3.7 User Rights
..................................................................................... 142
7.3.7.1 Two-factor authentication
. . . . . . . . . .in
. .SecurOS
.............................................................. 146
7.3.8 Computer
..................................................................................... 149
7.3.8.1 Archive .......................................................................... 153
7.3.8.2 Auto login .......................................................................... 157
7.3.9 Event. Filter
.................................................................................... 158
7.3.10 SNMP . . .agent
.................................................................................. 161
7.3.10.1 Setting up Windows
. . . . . . .Management
. . . . . . . . . . .and
. . .Monitoring
. . . . . . . . .Tools
............................................ 162
7.3.11 External
. . . . application
................................................................................. 163
7.3.12 Database
. . . . . Partitioner
................................................................................ 164
7.3.13 Databases
. . . . . . Replicator
............................................................................... 165

8 Interface Subsystem 167

www.issivs.com
SecurOS 6 Administration Guide
Contents

8.1 Object
. . . . . Reference
...................................................................... 167
8.1.1 Desktop
..................................................................................... 167
8.1.1.1 Desktop Setup
. .Operations
........................................................................ 169
8.1.2 Map ..................................................................................... 173
8.1.2.1 Maps Working. .Principles
........................................................................ 175
8.1.2.2 Drawing Map .Layers
......................................................................... 176
8.1.2.3 Working with Map
. . . . Layers
...................................................................... 176
8.1.2.4 Working with Objects
.......................................................................... 179
8.1.3 Map: .GUI
.................................................................................... 181
8.1.4 Event. Viewer
.................................................................................... 182
8.1.5 External
. . . Window
.................................................................................. 184
8.1.6 HTML5. . FrontEnd
................................................................................... 185

9 Video Subsystem 187


9.1 Hardware
. . . . . . . .Decoding
................................................................... 187
9.1.1 Setting
. . up
. . .Hardware
. . . . . . . . .Decompression
. . . . . . . . . . . . . in
. . Windows
. . . . . . . . .OS
............................................... 188
9.1.2 Setting
. . up
. . .Hardware
. . . . . . . . .Decompression
. . . . . . . . . . . . . in
. . Linux
. . . . . .OS
.................................................. 189
9.2 Hardware
. . . . . . . .compression
................................................................... 189
9.3 Configuring
. . . . . . . . . .Hardware
. . . . . . . . .Acceleration
. . . . . . . . . . .in
. .Linux
. . . . . OS
...................................... 189
9.3.1 Installing
. . . . Additional
. . . . . . . . . Packages
. . . . . . . . .on
. . .Linux
. . . . .OS
....................................................... 190
9.3.2 Installing
. . . . Additional
. . . . . . . . . Packages
. . . . . . . . .on
. . .Debian
. . . . . .OS
...................................................... 191
9.3.3 Checking
. . . . Hardware
. . . . . . . . .Acceleration
. . . . . . . . . . .Work
............................................................. 191
9.3.4 Solving
. . .Common
. . . . . . . .Hardware
. . . . . . . . .Acceleration
. . . . . . . . . . .Problems
...................................................... 193
9.4 Multi-streaming
........................................................................... 194
9.5 Frame
. . . . .Rate
. . . . .Reduction
................................................................. 195
9.6 Working
. . . . . . .Principles
. . . . . . . . .of
. . Motion
. . . . . . .Detection
. . . . . . . . Zones
.......................................... 195
9.6.1 Creating
. . . .Zones
................................................................................. 195
9.7 SecurOS
. . . . . . . Archives
.................................................................... 196
9.8 Camera
. . . . . . Local
. . . . . .Storage
. . . . . . .(Edge
. . . . . Storage)
................................................... 196
9.8.1 System
. . .Requirements
. . . . . . . . . . . .to. .Provide
. . . . . . .Edge
. . . . .Storage
. . . . . . .Use
................................................. 197
9.8.2 Configuring
. . . . . . System
. . . . . . . to
. . Use
. . . .Edge
. . . . .Storage
............................................................. 198
9.8.3 Restrictions
. . . . . . .on
. . Export
. . . . . . of
. . .Camera
. . . . . . Archive
. . . . . . . Viewed
. . . . . . .Through
. . . . . . . .EdgeStorage
. . . . . . . . . . .Gate
............................ 201
9.9 Forensic
. . . . . . . Search
.................................................................... 201
9.10 Special
. . . . . . .Settings
. . . . . . . .for
. . .Video
. . . . .Subsystem
. . . . . . . . . .Components
.......................................... 201
9.10.1 Camera
. . . .Image
. . . . . .Control
........................................................................... 202
9.10.2 Archive
. . . .Recording
................................................................................. 202
9.10.2.1 Disk Volume. Settings ......................................................................... 202
9.10.2.1.1 Partitioning . . . . and
. . . .Mounting
. . . . . . . Local
. . . . .Discs
. . . . .in
. .Linux
. . . . .OS
.......................................... 202
9.10.2.2 Video Recording . . . . Settings
...................................................................... 209
9.11 Object
. . . . . . Reference
..................................................................... 211
9.11.1 System
. . . .Objects
................................................................................. 211
9.11.1.1 Video Capture . . .Device
....................................................................... 212
9.11.1.1.1 Connection
. . . . Tab
...................................................................... 212
9.11.1.1.2 Firmware. . .Tab
....................................................................... 215
9.11.1.1.3 Active Camera
. . . . . . .Recorder
. . . . . . . .(AC
. . . Recorder)
........................................................ 216
9.11.1.2 Camera .......................................................................... 217
9.11.1.2.1 General. .Tab........................................................................ 218
9.11.1.2.2 Stream. Tab
......................................................................... 220
9.11.1.2.3 Recording
. . . .Tab
...................................................................... 225
9.11.1.2.4 Audio Tab
.......................................................................... 229
9.11.1.2.5 Detectors
. . .Tab
....................................................................... 230
9.11.1.2.6 PTZ Tab .......................................................................... 232
9.11.1.2.7 Advanced. . . Tab
....................................................................... 234
9.11.1.2.8 Multicast
.......................................................................... 242

www.issivs.com
SecurOS 7 Administration Guide
Contents

9.11.1.2.9 Configuring
. . . . .Panoramic
. . . . . . . . Cameras
............................................................. 244
9.11.1.3 Defocus detector
.......................................................................... 245
9.11.1.3.1 Fine Tuning
. . . . .Recommendations
..................................................................... 247
9.11.1.4 Layout .......................................................................... 248
9.11.1.5 View .......................................................................... 250
9.11.1.6 Zone .......................................................................... 250
9.11.1.7 Light Detector
.......................................................................... 254
9.11.1.8 Archive Converter
.......................................................................... 255
9.11.1.8.1 Digital Signature
.......................................................................... 263
9.11.1.8.2 Displaying
. . . .Subtitles
. . . . . . .in
. .Exported
. . . . . . . Video
...................................................... 263
9.11.1.9 Archive Export
. . .Profile
....................................................................... 264
9.11.1.10 Archiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
9.11.1.11 Image Processor
.......................................................................... 270
9.11.1.12 RTSP Server .......................................................................... 271
9.11.1.13 ONVIF Server.......................................................................... 273
9.11.2 User. Interface
. . . . . . . . Objects
............................................................................ 275
9.11.2.1 Media Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
9.11.2.1.1 Display. options
. . . . . . Tab
................................................................... 276
9.11.2.1.2 Layouts. .Tab ........................................................................ 280
9.11.2.1.3 Views Tab .......................................................................... 282
9.11.2.1.4 Cameras . . .Tab
....................................................................... 284
9.11.2.1.5 Export .and . . .Archive
. . . . . . Tab
................................................................ 287
9.11.2.1.6 Audio Tab .......................................................................... 290
9.11.2.1.7 Advanced . . . Tab
....................................................................... 292
9.11.2.1.8 About Views .......................................................................... 294
9.11.2.1.9 Working . .with
. . . .Views
.................................................................... 295
9.11.2.1.9.1 Creating. . . . . . View
.................................................................... 297
9.11.2.1.9.2 Editing . . . . .View
..................................................................... 297
9.11.2.1.9.3 Renaming. . . . . . . .View
.................................................................. 298
9.11.2.1.9.4 Deleting. . . . . . View
.................................................................... 298
9.12 Configuration
. . . . . . . . . . . . .Examples
.............................................................. 299
9.12.1 Standalone
. . . . . . .Configuration
.............................................................................. 299
9.12.2 Video
. . Server
. . . . . . and
. . . .Operator
. . . . . . . .Workstations
................................................................. 300
9.12.3 Setting
. . . Up
. . . Camera
............................................................................... 301
9.12.3.1 Adding Video. .Capture . . . . . . .Device
................................................................. 301
9.12.3.2 Adding Camera . . . .to. .System
.................................................................... 302
9.12.3.3 Selecting Camera . . . . . to
. . Work
. . . . .with
. . . .Media
. . . . .Client
..................................................... 303
9.12.3.4 Adding User.Rights ......................................................................... 304
9.12.3.5 Setting up telemetry .......................................................................... 306
9.12.3.5.1 Setting.up . . PTZ
. . . . Control
. . . . . . for
. . .IP
. . devices
........................................................ 306
9.12.3.5.1.1 Shared . . . . . PTZ
. . . . Control
................................................................. 308
9.12.3.5.1.2 Exclusive . . . . . . . PTZ
. . . .Control
............................................................... 308
9.12.4 Joystick
. . . . Configuration
................................................................................. 309

10 Audio Subsystem 311


10.1 Operation
. . . . . . . . . Modes
.................................................................. 311
10.1.1 Synchronized
. . . . . . . . .Audio/Video
. . . . . . . . . . .Recording
. . . . . . . . .and
. . . .Playback
.................................................... 311
10.1.2 Separate
. . . . .Audio
. . . . . Recording
. . . . . . . . . .and
. . .Playback
.............................................................. 311
10.2 Object
. . . . . . Reference
..................................................................... 312
10.2.1 Audio
. . Capture
. . . . . . . .Device
........................................................................... 312
10.2.2 Microphone
..................................................................................... 314
10.3 Example of System Configuration for Synchronized Audio/Video Recording and
...........................................................................
Playback 315

11 I/O Subsystem 317


11.1 Object
. . . . . . Reference
..................................................................... 317
11.1.1 Sensor
..................................................................................... 317

www.issivs.com
SecurOS 8 Administration Guide
Contents

11.1.2 Relay
..................................................................................... 319
11.1.3 CCTV. . Keyboard
. . . . . . . . .or
. .joystick
........................................................................ 319
11.1.3.1 Bosch Intuikey .......................................................................... 320
11.1.3.2 Hikvision DS-1100KI .......................................................................... 324
11.1.3.3 Hikvision DS-1600KI(B)
.......................................................................... 325
11.1.3.4 Panasonic WV-CU950 .......................................................................... 326
11.1.3.5 Pelco KBD300A .......................................................................... 327
11.2 Configuring
. . . . . . . . . . .System
. . . . . . .to
. .Work
. . . . .with
. . . . Wiper
.............................................. 328

12 Notification Subsystem 329


12.1 Object
. . . . . . Reference
..................................................................... 329
12.1.1 HTML5
. . . Pop-up
.................................................................................. 329
12.1.2 E-mail
. . .Message
. . . . . . . .Service
.......................................................................... 331
12.1.3 E-mail
. . .Message
.................................................................................. 332
12.1.4 Short
. .Message
. . . . . . . .Service
........................................................................... 334
12.1.5 Short
. .Message
................................................................................... 334
12.1.6 Audible
. . . .Notification
. . . . . . . . . .Service
....................................................................... 335
12.1.7 Emergency
. . . . . . .service
.............................................................................. 336
12.1.7.1 Incident Types . . .List.
. . . .File
. . .Format
................................................................ 339
12.1.8 Integration
. . . . . . .with
. . . .SIP
. . .Devices
....................................................................... 341
12.1.8.1 SIP Subsystem .......................................................................... 341
12.1.8.2 SIP Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
12.1.8.3 SIP: GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

13 Automation Subsystem 346


13.1 Object
. . . . . . Reference
..................................................................... 346
13.1.1 Schedule
..................................................................................... 346
13.1.2 Macro
..................................................................................... 349
13.1.3 Node.js
. . . .Script
................................................................................. 351
13.1.4 IIDK.Interface
.................................................................................... 353
13.1.5 HTTP. .Event
. . . . . Gate
.............................................................................. 354
13.1.6 REST. .API
................................................................................... 355
13.2 Setting
. . . . . . .up
. . .Macros
. . . . . . and
. . . .Scripts
....................................................... 356
13.2.1 Macros
..................................................................................... 356
13.2.2 Node.js
. . . .Scripts
................................................................................. 357

14 Computer Vision 359


14.1 General
. . . . . . . Recommendations
. . . . . . . . . . . . . . . . .on
. . .Camera
. . . . . . .Configuration
. . . . . . . . . . . . and
. . . .Location
......................... 360
14.2 System
. . . . . . .Setup
.................................................................... 361
14.2.1 Selecting
. . . . . a. .Video
. . . . .Stream
. . . . . . .for
. . Analytics
................................................................ 361
14.2.2 Configuring
. . . . . . . Plugin
. . . . . . and
. . . .Built-in
. . . . . . .Video
. . . . .Analytics
. . . . . . . .Detectors
................................................ 363
14.2.2.1 Configuring Tracking . . . . . . . .Kit
. .III
. .Plugin
.............................................................. 363
14.2.2.1.1 Scene .Tab ......................................................................... 364
14.2.2.1.2 Tracker. Tab ......................................................................... 368
14.2.2.1.3 Classification . . . . . .Tab
.................................................................... 369
14.2.2.1.4 Forensic . . Search
. . . . . . Tab
.................................................................. 371
14.2.2.2 Configuring Built-in . . . . . .Video
. . . . .Analytics
. . . . . . . .Detectors
....................................................... 371
14.2.2.2.1 Configuring . . . . .Controlled
. . . . . . . .Zone
............................................................. 373
14.2.2.2.2 Running . .Detector
........................................................................ 379
14.2.2.2.3 Wrong .Direction . . . . . . . Detector
.................................................................. 381
14.2.2.2.4 Left Behind . . . . and
. . . .Removed
. . . . . . . .Object
. . . . . .Detector
.................................................... 384
14.2.2.2.5 Line Crossing . . . . . . Detector
.................................................................... 386
14.2.2.2.6 Loitering . . Detector
........................................................................ 388
14.2.2.2.7 Dwell Time . . . . Detector
...................................................................... 390
14.2.2.2.8 Intrusion . . Detector
........................................................................ 392
14.2.2.2.9 Crowd .Detector ......................................................................... 395

www.issivs.com
SecurOS 9 Administration Guide
Contents

14.2.2.2.10 Object. .Counter


........................................................................ 396
14.2.3 Configuring
. . . . . . . Independent
. . . . . . . . . . . Video
. . . . . .Analytics
. . . . . . . .Detectors
..................................................... 398
14.2.3.1 Smoke Detector .......................................................................... 398
14.2.3.1.1 Recommendations. . . . . . . . . . on
. . .Camera
. . . . . . Configuration
. . . . . . . . . . . for
. . .Smoke
. . . . . .Detector
................................... 400
14.2.3.2 People with no . . .Helmet
. . . . . .Detector
................................................................. 400
14.2.3.2.1 Recommendations. . . . . . . . . . on
. . .Camera
. . . . . . Configuration
. . . . . . . . . . . for
. . .People
. . . . . .with
. . . .no
. .Helmet
. . . . . .Detector
....................... 403
14.2.3.3 NN Fight Detector .......................................................................... 403
14.2.3.4 NN Loitering.Detector ......................................................................... 404
14.2.3.4.1 Recommendations. . . . . . . . . . on
. . .Camera
. . . . . . Configuration
. . . . . . . . . . . for
. . .NN
. . .Loitering
. . . . . . . Detector
............................... 406
14.2.3.5 NN Fare Evasion . . . . .Detector
..................................................................... 406
14.2.3.5.1 Recommendations. . . . . . . . . . on
. . .Camera
. . . . . . Configuration
. . . . . . . . . . . for
. . .NN
. . .Fare
. . . .Evasion
. . . . . . .Detector
........................... 408
14.2.3.6 NN Fallen Person . . . . . Detector
..................................................................... 408
14.2.3.6.1 Recommendations. . . . . . . . . . on
. . .Camera
. . . . . . Configuration
. . . . . . . . . . . for
. . .NN
. . .Fallen
. . . . . Person
. . . . . . Detector
........................... 410
14.2.3.7 NN Occupancy . . .Counter
....................................................................... 410
14.2.4 Optimizing
. . . . . . .NUMA
. . . . . Systems
. . . . . . . .Performance
................................................................. 412
14.3 Representation
. . . . . . . . . . . . . .of
. .video
. . . . . analytics
. . . . . . . . .detector
. . . . . . .operation
. . . . . . . . .results
............................. 413

15 Monitoring & Control Center 414


15.1 Direct
. . . . . .Connection
..................................................................... 414
15.1.1 Limitations
..................................................................................... 414
15.1.2 Setting
. . . Up
. . . Direct
. . . . . .Connection
......................................................................... 415
15.1.2.1 MCC DC Gateway .......................................................................... 417
15.1.2.2 MCC DC HTTP . . . Proxy
....................................................................... 418
15.1.2.3 Remote System .......................................................................... 418
15.1.2.3.1 General. .Tab ........................................................................ 419
15.1.2.3.2 Gateway . . and
. . . .Proxy
. . . . .Tab
............................................................... 421
15.1.3 Setting
. . . Up
. . . to
. . Work
. . . . . with
. . . . SecurOS
. . . . . . . . Auto
............................................................ 422
15.2 Privileged
. . . . . . . . . Access
.................................................................. 425
15.2.1 Functionality
..................................................................................... 425
15.2.2 Limitations
..................................................................................... 426
15.2.3 System
. . . .Setup
................................................................................. 427
15.2.4 Transferring
. . . . . . . .Archive
. . . . . . .from
. . . .Remote
. . . . . . .System
. . . . . . .to
. .Monitoring
. . . . . . . . . .Center
........................................ 428

16 Redundancy 430
16.1 Failover
. . . . . . . .Cluster
................................................................... 430
16.1.1 Cluster
. . . .Structure
................................................................................. 430
16.1.1.1 Cluster Configuration
.......................................................................... 431
16.1.1.2 Cluster Operation.
. . . . . .Quorum
.................................................................... 431
16.1.1.3 Recommendations .......................................................................... 432
16.1.2 Configuring
. . . . . . . Cluster
.............................................................................. 432
16.1.2.1 Creating Cluster .......................................................................... 433
16.1.2.1.1 Creating . .Cluster
. . . . . . in
. .Existing
. . . . . . .SecurOS
. . . . . . . Configuration
.................................................. 434
16.1.2.1.2 Creating . .Cluster
. . . . . . and
. . . .SecurOS
. . . . . . . Configuration
. . . . . . . . . . . From
. . . . .the
. . .Scratch
.................................... 434
16.1.2.2 Getting Current . . . Cluster
. . . . . . Configuration
................................................................. 434
16.1.2.3 Creating Security. . . . .Zone
..................................................................... 436
16.1.2.4 Adding Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
16.1.2.5 Adding Computer . . . . .to. .the
. . .Redundant
. . . . . . . . .Servers
. . . . . . .Cluster
................................................ 436
16.1.2.6 Removing Host .......................................................................... 437
16.1.2.7 Switching to .Video. . . . .Server
. . . . . Mode
............................................................... 437
16.1.2.8 Adding Node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
16.1.2.9 Removing Node .......................................................................... 438
16.1.2.10 Getting Node . . .List
....................................................................... 438
16.1.2.11 Setting Preferred
. . . . . .Host
. . . .for
. . the
. . . Node
........................................................... 439
16.1.2.12 Moving Node . . .to. .the
. . .Host
. . . .Manually
.............................................................. 439
16.1.2.13 Recreating .Cluster
......................................................................... 440
16.1.2.14 Restoring SecurOS
. . . . . . . Configuration
. . . . . . . . . . . from
. . . . File
.................................................... 440
16.1.2.15 Setting Configuration
. . . . . . . . .Server
................................................................. 441

www.issivs.com
SecurOS 10 Administration Guide
Contents

16.1.2.16 Converting .Independent


. . . . . . . . . .Video
. . . . .Server
. . . . . .to. .Cluster
. . . . . .Node
............................................ 441
16.1.2.17 Service mode
.......................................................................... 441
16.1.2.18 Changing Network
. . . . . . .Interface
. . . . . . .for
. . .Virtual
. . . . .IP. . Addresses
.................................................. 442
16.1.2.19 Setting Up .Time
. . . .Intervals
..................................................................... 442
16.1.3 Connecting
. . . . . . .Operator
. . . . . . . .Workstations
. . . . . . . . . . . .to
. .the
. . .Cluster
. . . . . . .Servers
.............................................. 443
16.1.4 Storing
. . . .Data
. . . .in
. .Cluster
........................................................................... 443
16.1.4.1 iSCSI Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
16.1.4.2 Using iSCSI.Drive . . . . for
. . .Storing
. . . . . .Video
. . . . .Archive
....................................................... 446
16.1.4.3 Movable PostgreSQL .......................................................................... 446
16.1.4.4 Storing Video . .Archive
. . . . . . on
. . .the
. . .Host's
. . . . .Local
. . . . .Drives
.................................................. 447
16.1.5 Cluster
. . . .Creating
. . . . . . .and
. . . .Setting
. . . . . . Up
. . .Examples
............................................................. 448
16.1.5.1 Creating Cluster . . . .and
. . . SecurOS
. . . . . . . .Configuration
. . . . . . . . . . .From
. . . . .the
. . .Scratch.
. . . . . . .Example
................................. 448
16.1.5.1.1 Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
16.1.5.1.2 Requirements .......................................................................... 449
16.1.5.1.3 Computers . . . .Parameters
...................................................................... 449
16.1.5.1.4 Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
16.1.5.2 Creating Cluster . . . .in
. .Existing
. . . . . . .SecurOS
. . . . . . . Configuration.
. . . . . . . . . . . .Example
.......................................... 451
16.1.5.2.1 Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
16.1.5.2.2 Requirements .......................................................................... 451
16.1.5.2.3 Computers . . . .Parameters
...................................................................... 451
16.1.5.2.4 Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
16.1.6 Resolving
. . . . . .Common
. . . . . . . .Issues
....................................................................... 453
16.1.6.1 Quorum Loss .......................................................................... 453
16.1.6.2 Restoring Operating . . . . . . .System
. . . . . . from
. . . . .Backup
........................................................ 453
16.1.6.3 Unable to Connect . . . . . .Operator
. . . . . . . Workstation
............................................................. 454
16.1.6.4 Updating Software . . . . . .and
. . .Hardware
. . . . . . . . within
. . . . . Cluster
. . . . . . System
.............................................. 454
16.1.7 Limitations
..................................................................................... 454
16.2 Redundant
. . . . . . . . . .Servers
. . . . . . . Cluster
.......................................................... 455
16.2.1 Creating
. . . . .Configuration
. . . . . . . . . . . .on
. . the
. . . Base
. . . . .of
. . Redundant
. . . . . . . . . .Servers
. . . . . . .Cluster
....................................... 455
16.2.1.1 Task .......................................................................... 455
16.2.1.2 Steps .......................................................................... 456
16.2.2 Creating
. . . . ."1+1"
. . . . .Cluster
. . . . . . from
. . . . .Existing
. . . . . . .SecurOS
. . . . . . . .Configuration.
. . . . . . . . . . . . .Example
.................................... 456
16.2.2.1 Task .......................................................................... 456
16.2.2.2 Computers Parameters .......................................................................... 456
16.2.2.3 Steps .......................................................................... 456

17 Interaction with External Emergency Service 458

18 Special Purpose Modules 461


18.1 Thermometer
........................................................................... 461

19 Light Integration 463


19.1 General
. . . . . . . Description
.................................................................... 463
19.2 Integration
. . . . . . . . . .Point
................................................................. 463

20 Keyboard Shortcuts 465


20.1 Administration
. . . . . . . . . . . . . Toolbar
.............................................................. 465

21 Appendixes 466
21.1 Appendix
. . . . . . . . .A.
. .Upgrading/Uninstalling
. . . . . . . . . . . . . . . . . . . . .Software
........................................... 466
21.1.1 Upgrading
. . . . . . Software
............................................................................... 466
21.1.2 Uninstalling
. . . . . . . .Software
............................................................................. 466
21.1.3 SecurOS
. . . . .Version
. . . . . . .Upgrade
. . . . . . . .Features
................................................................. 467
21.1.3.1 Release 9.3 .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
......................................................... 468
21.1.3.2 Release 9.6 .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
......................................................... 469

www.issivs.com
SecurOS 11 Administration Guide
Contents

21.1.3.3 Release 10.0. .and


. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 469
21.1.3.4 Release 10.1. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 469
21.1.3.5 Release 10.2. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 469
21.1.3.6 Release 10.3. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 470
21.1.3.7 Release 10.6. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 471
21.1.3.8 Release 10.7. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 471
21.1.3.9 Release 10.9. .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 471
21.1.3.10 Release 10.10
. . . .and
. . .Earlier
. . . . . .Updating
. . . . . . .Procedure
...................................................... 471
21.1.3.11 Release 11.2
. . .and
. . .Earlier
. . . . . .Updating
. . . . . . .Procedure
....................................................... 472
21.1.3.12 Release 11.3
. . .and
. . .Earlier
. . . . . .Updating
. . . . . . .Procedure
....................................................... 472
21.1.3.13 Release 11.4
. . .and
. . .Earlier
. . . . . .Updating
. . . . . . .Procedure
....................................................... 472
21.1.3.14 Release 11.5
. . .and
. . .Earlier
. . . . . .Updating
. . . . . . .Procedure
....................................................... 472
21.2 Appendix
. . . . . . . . .B.
. . Updating
. . . . . . . . .PostgreSQL
....................................................... 472
21.3 Appendix
. . . . . . . . .C.
. . Quick
. . . . . .Video
. . . . .Subsystem
. . . . . . . . . . Configuration
........................................... 476
21.4 Appendix
. . . . . . . . .D.
. . System
. . . . . . .Utilities
......................................................... 477
21.4.1 Server
. . .Manager
. . . . . . . .Utility
.......................................................................... 478
21.4.1.1 Control Toolbar .......................................................................... 479
21.4.1.1.1 Working . .with
. . . .Host
. . . .List
................................................................ 479
21.4.1.1.2 Managing . . . Cluster
....................................................................... 480
21.4.1.1.3 Managing . . . Video
. . . . . Server
. . . . . .State
............................................................ 481
21.4.1.1.4 Connecting . . . . to
. . Host
. . . . .for
. .Configuring
............................................................. 482
21.4.1.1.5 Restoring . . .SecurOS
. . . . . . . .Configuration
............................................................... 482
21.4.1.1.6 Managing . . . Nodes
....................................................................... 482
21.4.1.1.7 Advanced . . . Cluster
. . . . . . Host
. . . . .Settings
............................................................ 483
21.4.1.1.8 Search.String ......................................................................... 484
21.4.1.2 Hosts Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
21.4.2 Hardware
. . . . . Report
. . . . . . .Utility
......................................................................... 486
21.4.3 SystemInfo
. . . . . . .Utility
.............................................................................. 488
21.4.4 Media
. . .Export
. . . . . .Utility
............................................................................ 492
21.4.4.1 Export Settings . . . dialog
....................................................................... 494
21.4.4.2 Command-line . . .parameters
....................................................................... 495
21.4.5 DSAdmin
. . . . . Utility
................................................................................ 497
21.4.6 Database
. . . . . Update
. . . . . . .Utility
......................................................................... 500
21.4.7 Registration
. . . . . . . .Files
. . . . Editor
. . . . . .(DDI)
. . . . .Utility
.............................................................. 502
21.4.8 ISS Server
. . . . . . Role
. . . . .Manager
. . . . . . . Utility
................................................................... 507
21.4.9 Server
. . .Control
. . . . . . .Agent
. . . . .Utility
...................................................................... 508
21.4.10 Media
. . . Archive
. . . . . . . Index
. . . . . Repair
. . . . . . Utility
................................................................ 510
21.4.11 Outdated
. . . . . .Audio
. . . . . .Archive
. . . . . . Updater
. . . . . . . .Utility
........................................................... 512
21.4.12 Certificate
. . . . . . .Generator
. . . . . . . . .Utility
..................................................................... 513
21.4.13 AuditClient
. . . . . . . .Utility
............................................................................. 515
21.4.13.1 Configuring. Result . . . . . .Table
................................................................... 521
21.4.13.2 User Actions . . Analysis
. . . . . . . Example
................................................................. 522
21.5 Appendix
. . . . . . . . .E.
. .Network
. . . . . . . .Ports
. . . . .Used
. . . . .in
. .SecurOS
............................................ 523
21.6 Appendix
. . . . . . . . .F.
. .Additional
. . . . . . . . . Windows
. . . . . . . . .Settings
.............................................. 525
21.6.1 Installing
. . . . . Media
. . . . . .Foundation
. . . . . . . . . .under
. . . . . MS
. . . Windows
. . . . . . . . .Server
. . . . . .2012
. . . .R2
..................................... 525
21.6.2 SMTP. . Mail
. . . . Server
. . . . . . Installation
. . . . . . . . . .and
. . . .Configuration
........................................................... 526
21.6.3 Disabling
. . . . . Disk
. . . . .Cleanup
. . . . . . .Master
.................................................................... 529
21.7 Appendix
. . . . . . . . .G.
. . Additional
. . . . . . . . . .SecurOS
. . . . . . . .Settings
.............................................. 529
21.7.1 Adjusting
. . . . . SecurOS
. . . . . . . . when
. . . . . scaling
. . . . . . .Windows
............................................................ 529
21.8 Appendix
. . . . . . . . .H.
. . Error
. . . . .Messages
. . . . . . . . . When
. . . . . .Launching
. . . . . . . . . System
................................... 529
21.9 Appendix
. . . . . . . . .I.. Technical
. . . . . . . . . Support
. . . . . . . .Information
................................................ 530

Index 532

www.issivs.com
SecurOS 12 Administration Guide
Preface

1 Preface
This section contains general information about this document, the means of its design and use, as well
as how to get additional technical support for the product.

1.1 Scope
This manual provides general information about the SecurOS architecture, describes the process of
configuring a security network and system objects, and gives some troubleshooting tips and
recommendations.

It is assumed that the user has already physically deployed the security network and installed the
SecurOS software on all computers of this network.

1.2 Target Audience


This manual is designed for SecurOS system installers and administrators. It is assumed the user has
advanced computer skills, has practical experience with TCP/IP networking, serial (COM) ports and
general CCTV knowledge.

1.3 Using This Manual


This document is organized in such a way that the user can use both its printed and electronic versions.
In the latter case one can use Adobe Reader's Bookmarks feature as well as cross-reference hyperlinks to
navigate through content. In several topics this manual refers to other SecurOS manuals, which can be
found as separate files on the SecurOS installation CD or downloaded from our website
(www.issivs.com).

To get online help (Microsoft HTML Help) just press the F1 key when running SecurOS. In
administration mode You can get context help for a given object/utility by pressing the F1 key when its
settings window/utility window is open. In operator mode, use the F1 key to open a description of the
active window of the current operator interface or utility.

1.4 Getting Technical Support

If you have any questions after reading this manual, please address them to your system administrator
or supervisor.

For any further information you can contact the Intelligent Security Systems Technical Support Team:

Note. For all technical support requests, please open a ticket from the ISS Partner Portal:
https://support.issivs.com. You will need to create an account if you don’t already have one.

www.issivs.com
SecurOS 13 Administration Guide
Preface

· in USA:
Phone: +1 732 855 1111
· in Canada:
Phone: +1 778 929 8565
· in Mexico:
Phone: +52 55 9001 5252
· in Colombia:
Phone: +57 320 303 2849
· in Brazil:
Phone: +55 85 9668 2530
· in Central America and Caribbean:
Phone: +502 5517 8395
· in Argentina/ Paraguay/ Uruguay:
Phone: +54 911 5039 6440
· in Peru/ Bolivia/ Chile:
Phone: +56 9 3261 9893
· in Ecuador:
Phone: +57 312 255 2932
· in Venezuela:
Phone: +57 321 722 0425
· in Europe:
Phone: +380 44 299 0810
· in Dubai:
Phone: +971 4 874 7100
· in Qatar:
Phone: +974 6 677 8309
· in Saudi Arabia:
Phone: +966 54 109 9699

To solve problems faster, we recommend preparing the service information described in the Technical
Support Information Section before addressing the Technical Support Team.

1.5 SecurOS Editions Naming Convention


This document represents a common manual for several editions of the "SecurOS integrated video
management platform" that differ in functional capabilities:

www.issivs.com
SecurOS 14 Administration Guide
Preface

Edition Supported OS

SecurOS® Monitoring & Control Center Windows/Linux

SecurOS® Datacenter Windows

SecurOS® Enterprise
Windows/Linux
SecurOS® Premium

SecurOS® Prof essional Windows

For product designation regardless of its edition the SecurOS general term is used in the framework of
the given document.

Sections that describe the functionality available for some editions are marked by a special footnote as
in the example below:

The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

Sections that describe the functionalities not available or partially available in Linux OS are marked
with the following footnote:

In Linux OS the functionality is not supported / limited.

1.6 Design Convention


For representation of various terms and titles the following fonts and formatting tools are used in this
document.

Font Description

Used in writing workstation names, utilities or screens, windows


bold type and dialog boxes as well as the names of their elements (GUI
elements).

italic type Used to mark out the SecurOS objects.

bold italic type Used to mark out the elements of homogeneous lists.

Used to mark out macro text and programming code, file names and
monospace their paths. Also it is used to specify the necessary options, to mark
out values specified by the user from the keyboard (manually).

Used to mark out the cross-references within the document and


green
links to the external available ones.

www.issivs.com
SecurOS 15 Administration Guide
Preface

1.7 Design Elements


Warning! Serves to alert the user to information which is necessary for the correct perception of the text set
out below. Typically, this information has a warning character.

Note. Note text in topic body.

Additional Information
Used to display additional information. These type of elements contain, for example, the description of options for
executing a task or reference to additional literature.

www.issivs.com
SecurOS 16 Administration Guide
Purpose, Implementation And Operation Principles

2 Purpose, Implementation And


Operation Principles
The SecurOS software is designed to control video surveillance and analytic systems deployed within
local or global networks. Simple scaling of software and hardware platforms allows to create video
surveillance systems of any complexity — from local systems which are intended to control small- and
mid-scale objects, to complex systems that allow to control physical and organizational structures and
facilities (e.g. buildings, roads, power plants) needed for the operation of a society or enterprise.

2.1 SecurOS Architecture


This section describes SecurOS's types of servers and workstations and their general features depending
on software installation types.

2.1.1 Types Of Servers And Workstations

Computers of the SecurOS network are distinguished by their functionality and have specific roles in
the network configuration management procedure.

This section contains general information on the types of SecurOS servers and workstations, their
intended purposes, basic capabilities, and operational specifics.

2.1.1.1 Classification by Functionality


All computers connected to the SecurOS network are divided by their functionality into two main
categories that define the SecurOS software installation type:

· Video Server.
· Operator Workstation.

The system administrator defines the installation type while planning the system architecture and sets it
during the installation procedure. On each computer on the network only one installation type is
allowed. A brief description of the installation types can be seen below.

2.1.1.1.1 Video Server


The Video Server is a computer that is used to connect IP cameras, to receive video from them, or to
connect audio capture devices. In addition to the direct connection of cameras, this installation type
allows to install or connect various security devices (fire alarm system controllers, access control
subsystem controllers, etc.) and ISS analytics modules (e. g., SecurOS Auto Module).

2.1.1.1.2 Operator Workstation


The Operator Workstation is a client computer in the security network designed for remote viewing of
video from surveillance cameras, listening to audio, managing various devices such as PTZ devices,
doors, fire alarm and other subsystems.

www.issivs.com
SecurOS 17 Administration Guide
Purpose, Implementation And Operation Principles

If privileges to configure system were granted to the operator, Administration Center is available to
him.
2.1.1.2 Classification of Roles in Configuration Management
The role of the Video Server defines it's place in the SecurOS network configuration management
procedure. One of the Video Servers within network must be assigned Conf iguration Server, and all other
Video Servers — Peripheral Servers.

2.1.1.2.1 Configuration Server


Reliable operation of security system within a network consists of several types of servers that allow to
configure the system independently. This is possible only if the system configuration is up to date on
each of these network servers at any given time.

The procedure to update and synchronize the system configuration on all the servers in the system
network is performed by the Conf iguration Server. The Conf iguration Server is a dedicated network server
which in addition to standard features, has some advanced functionality as well.

Conf iguration Server is assigned during system software installation among from Video Servers of the
SecurOS network.

Warning! System allows only one Conf iguration Server, which must be available for all Video Servers and
Operator Workstations, from which it is intended to configure the system.

The actual system configuration is stored on the Conf iguration Server. Each of Peripheral Servers stores the
current copy of the system configuration.

In case the Conf iguration Server fails, you can restore it from a backup after carrying out the necessary
steps (see Restoring Configuration from Backup Copy) or reassign one of the Peripheral servers (see ISS
Server Role Manager Utility).

Warning! The operating period for Peripheral Servers not connected to the Conf iguration Server is restricted. If
connection with the Conf iguration Server is not restored within 90 days, the system will automatically
shutdown on the given Peripheral Server and all Operator Workstations connected to it.

2.1.1.2.2 Managing Network Configuration by Configuration Server

This section describes the steps for server configuration when deploying a network and also procedures
for network management and recovery.

2.1.1.2.2.1 How To Configure Servers When Deploying Network

At the initial system setup, the Conf iguration Server must be installed and configured first (see Installing
And Configuring The Configuration Server section).

www.issivs.com
SecurOS 18 Administration Guide
Purpose, Implementation And Operation Principles

2.1.1.2.2.2 Configuration Update Procedure

The system configuration is updated according to the following set of rules:

Note. The described set of rules is applicable to any type of operations with the objects from the Object Tree,
including object creation, editing and deletion.

1. Using any of the Operator Workstation, the administrator (or operator) makes changes to the Object
Tree for that Computer (or Computers).
2. If a Operator Workstation is used to modify the configuration, then it generates an appropriate request
to the Conf iguration Server.

Notes:
1. If the Conf iguration Server is used to modify the configuration, the changes are applied on the
Conf iguration Server directly, with no request.
2. When the Conf iguration Server is unavailable it's not possible to modify the system configuration
using a Operator Workstation.

3. The Conf iguration Server processes the request(s). It applies changes by first renewing it's own Object
Tree and object settings, then generates and sends to each of the Peripheral Servers a command to
update the state of their appropriate objects and their settings. If a Peripheral Server is switched off
when changes must be applied, the command will be sent when connection with the Conf iguration
Server will be restored.
4. Having received the command to update its current configuration, each of the Peripheral Servers
applies the changes by updating its own Object Tree and/or settings of the appropriate objects.

Note. The update requests are processed by the Conf iguration Server consistently in order of creation. Only one
request is processed by the Conf iguration Server at the same time. The processing of the next request is locked
until the current request is finished and changes are applied on the Conf iguration Server.

2.1.1.2.2.3 Restoring Configuration from Backup Copy

The configuration can be restored from the backup copy. A backup copy can be created by any of the
network servers, but the restore procedure can be executed only on the Conf iguration Server.

Warning! Only a backup copy of the currently installed SecurOS version is applicable. Backup copy creation
procedure is described in the System section.

2.1.2 Software Implementation

SecurOS software consists of two components — Server part (further will be referred as Server) and
Client application (further as Client).

Server receives and processes video, allows to connect different security devices and intelligent program
Modules. This component starts automatically on each Video Server after software installation is
finished.

www.issivs.com
SecurOS 19 Administration Guide
Purpose, Implementation And Operation Principles

Client is installed both on Video Server and Operator Workstation. When installing SecurOS software on
Video Server, Client is installed automatically. Installation of Client on Operator Workstation is a separate
procedure. Using Client one can work with SecurOS objects — Cameras, Maps etc. with the help of
SecurOS interface objects (Media Client, Map: GUI etc.). Using Client one can also administrate the
system, if user has required rights.

Server part is implemented as Video Management System Server system service. This service is
started and stopped with the help of Server Control Agent utility or by means of OS tools (see System
Shutdown).

Client part is implemented as client.exe application. This application is located in the \SecurOS
folder of the product installation root directory.

Warning! It is recommended to use the same character encoding for all Users on all Computers within SecurOS
network. Otherwise some character may be displayed incorrectly on some Computers (namely in object or
event names etc.).

2.2 Software And Hardware Platform


This section covers software and hardware requirements for computers installing the SecurOS software.

2.2.1 Video Server System Requirements

Table 1. Video Server System Requirements

Parameter Description
· Windows 8.1 — all editions;
· Windows 10 — Home, Pro, Enterprise, Education;
· Windows 11 — Home, Pro, Pro for Workstations,
Enterprise (all plans), Education, Education Pro;
· Windows Server 2012 R2 — all editions;
OS · Windows Server 2016 — Standard, Datacenter;
· Windows Server 2019 — Standard, Datacenter;
· Windows Server 2022 — Standard, Datacenter;
· Debian — Debian 10.
Warning! Only 64-bit versions of operation systems listed above are
supported.

Intel Core i3-4330 or above. Intel Core i5-11600K is


CPU
recommended.

SecurOS Video Server: not less than 4 GB. 12 GB is


recommended
RAM
SecurOS FaceX Dedicated Video Server: Not less than 6 GB.
8 GB is recommended

HDD Not less than 150 GB

www.issivs.com
SecurOS 20 Administration Guide
Purpose, Implementation And Operation Principles

Parameter Description

Not less than 5 GB


HDD free space for software
installation Note. Additional intelligent modules require additional disk
space.

HDD free space for PostgreSQL Not less than 500 MB


installation

TCP/ IP network speed Not less than 100 Mbps. 1000 Mbps is recommended

2.2.2 Operator Workstation System Requirements


Warning! Within the SecurOS network, all Video Servers and Operator Workstations must operate under the
same OS (Windows or Linux).

Table 2. Operator Workstation System Requirements

Parameter Description
· Windows 8.1 — all editions;
· Windows 10 — Home, Pro, Enterprise, Education;
· Windows 11 — Home, Pro, Pro for Workstations,
Enterprise (all plans), Education, Education Pro;
OS · Windows Server 2012 R2 — all editions;
· Windows Server 2016 — Standard, Datacenter;
· Windows Server 2019 — Standard, Datacenter;
· Windows Server 2022 — Standard, Datacenter;
· Debian — Debian 10.

CPU Intel Core i3-4130 or above (for example, Intel Core i5-11xxx).

Not less than 4 GB. 8 GB is recommended. Recommended


RAM
frequency – not less than 1600 MHz

HDD Not less than 40 GB

Not less than 5 GB


HDD free space for software
installation Note. Additional intelligent modules require additional disk
space.

Recommended:

· Intel HD Graphics 4000 or above with Intel® Quick Sync


Video (QSV) 2.0 technology.
Video adapter or

· NVIDIA GPU with 4 GB memory (Ampere/Turing or


higher for better H.265 video stream decoding
performance).

www.issivs.com
SecurOS 21 Administration Guide
Purpose, Implementation And Operation Principles

Parameter Description

Not less than:

· 1366x768 px — for Windows;

Monitor Resolution · 1280x1024 px — for Linux.

Warning! If monitor resolution is less than specified above, the


correct displaying of the GUI for setting up and working with the
system is not guaranteed.

Not less than 100 Mbps. 1000 Mbps is recommended to view


TCP/ IP network speed
uncompressed video from several cameras simultaneously

2.2.3 Audio Subsystem Requirements

To capture and playback audio the Video Server should have either integrated audio on-board (check the
motherboard documentation) or any additional PCI or PCI-E sound card.

Note. Integrated or additional sound card provides audio capture only from one microphone.

2.2.4 Notification Subsystem Requirements

To use the Audible Notification Service (playing audio upon system events) to work on a particular
computer, it should have either integrated audio on-board or any additional PCI or PCI-E sound card.

2.2.5 ACS Requirements

The video server should have the required number of free (not used) serial (COM) ports to connect the
ACS/alarm/fire alarm controllers.

2.2.6 Environment Requirements

The sections below contain information about the system and requirements for setting up, starting, and
correctly using SecurOS.

2.2.6.1 Computer Name Restrictions


Names of computers on which the SecurOS software can be installed, should comply with the following
requirements:

1. The length of the name should not exceed 15 symbols.


2. Blank spaces, tabs and the following characters are restricted:
` ~ ! @ # $ % ^ & * ( ) = + _ [ ] { } |; : . ' \ " № , < > / ?
3. The name cannot consist of digits only.

www.issivs.com
SecurOS 22 Administration Guide
Purpose, Implementation And Operation Principles

Note. Refer to this section for any questions/concerns regarding the reading/editing/checking of the
computer_name value.

2.3 SecurOS' Subsystems


Configuration, basic features and objects of different subsystems of the SecurOS system are described
separately in the subsequent parts of the document. The following subsystems are part of the SecurOS
system structure:
· Core subsystem - contains objects and their settings corresponding to main system components,
such as users and computers. Also organization structure of the system and data storage are
configured within this subsystem, as well as system statistics collection parameters (see Core
Subsystem).
· Interface subsystem - contains objects responsible for visual representation of system objects which
are used by operators working with the system. These include desktops, external application
windows, maps, HTML forms and dialogs, system event viewer, etc. (see Interface Subsystem).
· Video subsystem - contains components which are responsible for main video stream control, video
camera displaying and recording process, video playback and live video monitoring, video motion
detectors and video archives (see Video Subsystem).
· Audio subsystem - contains control facilities of audio recording and playback devices (see Audio
Subsystem).
· I/O subsystem - contains objects responsible for input/output peripheral devices (fire alarm
controllers, relays and various detectors) (see I/ O Subsystem).
· Notification subsystem - contains objects for notification of users about system events by media
messages (see Notification Subsystem).
· Automation subsystem - contains tools for device integration, compilation and interpretation of the
system scripts and macros (see Automation Subsystem).
· Computer vision subsystem - represents integrated environment that allows to connect and use
within the SecurOS system the wide range of various analytics detectors (see Computer Vision).
· Monitoring and Control subsystem, that allows to deploy a common Monitoring & Control Center to
supervise a lot of the remote security systems (see Monitoring & Control Center).

Note. Each section contains a description of the basic operation principles and configuration specifics of the
selected subsystem.

www.issivs.com
SecurOS 23 Administration Guide
SecurOS Installation and Update on Windows

3 SecurOS Installation and Update on


Windows
This section describes in details the sequence of steps, that must be done in order to create and start
operation of the SecurOS security network on Windows platform.

Warning! Make sure that all required port are opened in the firewall settings (see Appendix E. Network Ports
Used in SecurOS).

First of all it is necessary to prepare Video Servers (see Types Of Servers And Workstations). Order of
SecurOS installation on Video Servers is described in the following sections:
· Installing, Configuring and Launching Configuration Server;
· Installing, Configuring And Launching Peripheral Servers.

Then, it is necessary to prepare Operator Workstations. SecurOS installation order onto Operator
Workstations is described in corresponding section:
· Installing, Configuring and Launching Operator Workstations.

Warning!
1. All components of all SecurOS Intelligent Modules that are used within the system must be installed
on each Video Server and Operator Workstation.
2. The software language must be the same for all network computers.
3. System time must be synchronized for all Video Servers within configuration.
4. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.

3.1 Installing, Configuring and Launching Configuration Server


This section describes installation and configuration of the SecurOS's managing server.

3.1.1 Hardware Installation


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys.

3.1.1.1 Guardant Key Installation

The Guardant key is the electronic device constantly connected to the computer through a USB port.
The SecurOS software addresses to a key for check the license information.

The key is necessary to place before the beginning of the SecurOS software installation. To install
Guardant key, plug the key into any free (not used) USB port.

www.issivs.com
SecurOS 24 Administration Guide
SecurOS Installation and Update on Windows

The Guardant key driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation) is selected.

3.1.1.2 Installing Guardant Key in Manual Mode


To install Guardant Key driver in manual mode after SecurOS is installed do the following:
1. Browse to the SecurOS root folder, then to the \Drivers\Guardant32 or \Drivers\Guardant64
folders for 32- and 64-bit OS, respectively.
2. Launch GrdDrivers.msi. System will display installation Wizard Welcome window.
3. Click on the Next button until Wizard finish installation.
4. When installation will complete system will display appropriate window. Click on the Finish button
to exit installation Wizard.

3.1.2 License Key


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.

The license key is created on the basis of the SecurOS hardware unique codes (Guardant) or
combinations of unique codes of the computer hardware on which SecurOS is installed.

License keys are checked according to the priority descending in the following order:

1. Guardant key;
2. key on the basis of the combinations of unique codes of the computer hardware (hardware code).

In addition to the unique hardware codes, the following data is also taken into account during license
key generation:

· program language selected on the SecurOS installation;


· default language of the installed operating system (Language parameter (local ID));
· SecurOS release number;
· SecurOS edition.

The license key is usually provided in one of the following ways:

· in the product delivery set, on the software CD;


· by e-mail.

3.1.2.1 The Key is a part of a product


If the license key is provided on a disk in the delivery set, then it is necessary to specify the key location
in the Installation of the license key file window at the corresponding step of the SecurOS installation
procedure (see Software Installation section).

www.issivs.com
SecurOS 25 Administration Guide
SecurOS Installation and Update on Windows

3.1.2.2 Request the key by e-mail

In case the license key isn't included in the SecurOS delivery set it is necessary contact Intelligent
Security Systems to request it from.

For key request registration perform the following steps:

1. Install the SecurOS hard and software on the computer.


2. To get hardware unique codes, run the Hardware Report Utility, thereto click the Start button on
the Windows Task bar. Consistently choose All Programs SecurOS ® ®
Hardware Report Utility
menu items.
3. The utility will display the report data in the Hardware Report Utility window (for example, see
figure 1).

Figure 1. Hardware Report Utility window

4. Click Copy Report to Clipboard button in the utility window. The utility will copy the report to
clipboard.
5. Create and open a new text file of any format. Paste the clipboard content to the file. Additionally
insert the following data into the file:
· program language selected on the SecurOS installation;
· SecurOS release number;
· SecurOS edition.
6. Save the file.
7. Send the file to the Intelligent Security Systems Technical Support Team (see Getting Technical
Support section).

On receiving the license key file copy it to the SecurOS root folder.

www.issivs.com
SecurOS 26 Administration Guide
SecurOS Installation and Update on Windows

3.1.3 Software Installation

This section covers a specifics of the SecurOS installation or upgrading, that make it possible to reuse
previously created objects.

Warning! To install the software, you must have administrator rights for Windows OS. Proceed to software
installation only when you finish hardware installation and network configuration for any computer.

3.1.3.1 Using Current Parameters of the Windows User Account needed for PostgreSQL
During first SecurOS installation Windows user account needed for PostgreSQL operation is created
with the name postgres and the same password.

Note. If current system security policy does not allow to create user account with default login and password,
specify password that meets the requirements of the active system security policy.

If default values were changed, but are supposed to be used further, do the following on the certain step
of the software installation:
1. In the Database update and formatting window (see figure 2) enter currently used password of the
PostgreSQL user account.

Figure 2. Database update and formatting Window

2. Click Next to continue. System will recreate Windows user account with name postgres and old
password.

Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.

www.issivs.com
SecurOS 27 Administration Guide
SecurOS Installation and Update on Windows

3.1.3.2 Using Current Parameters of the Database and Administrator User Account
During first SecurOS software installation default PostgreSQL administrator’s user account is created
with the name postgres and the same password, database is created with the name securos.

If default values were changed, but are supposed to be used further, do the following on the certain step
of the software installation:
1. In the Database update and formatting window (see figure 3) enter currently used database name
and database administrator’s credentials.

Figure 3. Database update and formatting Window

2. Click Next to continue. The database will be updated and reformatted with the old name and
administrator’s credentials.

Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.

3.1.3.3 Software Installation On The Configuration Server


To install the software on a Video Server do the following:

1. To start the SecurOS software installation run the product setup file. System will display the Choose
Setup Language window (see figure 4).

www.issivs.com
SecurOS 28 Administration Guide
SecurOS Installation and Update on Windows

Figure 4. Choose Setup Language window

From the drop-down list select the SecurOS InstallShield Wizard required language. Click the OK
button.

Additional Information
The Choose Setup Language information messages depends on the OS default language (the Language parameter
value (local ID)).

2. The Preparing To Install window will appear, in which the steps of the installation preparation will
be displayed.
After the end of procedure of preparation the system will automatically display the Welcome to the
InstallShield Wizard window (see figure 5).

Figure 5. Welcome to the InstallShield Wizard window

Click the Next button in the Welcome to the InstallShield Wizard window to continue.
3. The License Agreement window will appear (see figure 6).

www.issivs.com
SecurOS 29 Administration Guide
SecurOS Installation and Update on Windows

Figure 6. License Agreement window

Read the license agreement carefully. Select I accept the terms in the license agreement option if you
agree. Click the Next button.
4. The Install Type window will appear (see figure 7).

Figure 7. Install Type window

By default the typical installation mode allowing to install Video Server software with default settings is
selected. Click the Next button.
5. The Server Type window will appear (see figure 8).

www.issivs.com
SecurOS 30 Administration Guide
SecurOS Installation and Update on Windows

Figure 8. Server Type window

To install Conf iguration Server software select appropriate value from the drop-down list. Click the Next
button.
6. The Installation of the license key file window will appear (see figure 9).

Figure 9. Installation of the license key file window

Depending on the availability of the license key, do one of the following:


· if the key is available:

www.issivs.com
SecurOS 31 Administration Guide
SecurOS Installation and Update on Windows

- select the Copy the license key from the specified directory option, click the Browse button and
specify the directory that contains license key file using file manager;
- select the Copy the license key file from the setup directory option if setup directory contains
the license key file.

Additional Information
Copy the license key file from the setup directory option is displayed in the Installation of the license key file
window only when SecurOS setup directory contains the license key file.

· if the key is not available — select the Do not copy the license key file option. The key file can be
copied in the SecurOS installation directory after installation is complete. For more information
about getting license key file see License Key section.
Click the Next button.
7. The Software language selection window will appear (see figure 10).

Figure 10. Software language selection window

To define SecurOS program language select the required one rfom the drop-down list.

Warning! You should specify only the language, which is permitted by your license key file. For more
information about license key see License Key section.

Click the Next button.


8. The Device driver selection window will appear (see figure 11).

www.issivs.com
SecurOS 32 Administration Guide
SecurOS Installation and Update on Windows

Figure 11. Device driver selection window

Leave the Install Integrated Devices Pack checkbox selected if you suppose to connect an additional
hardware: for example, cameras. Select the Install Guardant driver checkbox if Guardant USB-key is
used. Click the Next button to continue.
9. The Ready to Install SecurOS window will appear (see figure 12).

Figure 12. Ready to Install SecurOS window

www.issivs.com
SecurOS 33 Administration Guide
SecurOS Installation and Update on Windows

If it is not necessary to start Video Management System Server immediately after installation has
finished deselect the Start Service after installation has finished checkbox selected by default. To start
the installation procedure click the Install button. The system will unpack required archives and then
will begin the installation and will display SecurOS Installation window, in which the indicator of the
process will be shown. After the installation process has successfully completed the InstallShield
Wizard Completed window will appear (see figure 13).

Figure 13. InstallShield Wizard Completed window

Click the Finish button to exit the installation program.

3.1.4 Initial Configuration

Initial SecurOS configuration is carried out on the Conf iguration Server with the help of the System
Conf iguration Wizard, which offers various options of configurations. Base configuration at which the
configuration data is entered by the administrator, is carried out by means of the First Start
Conf iguration Wizard. Upon the configuration finish, the system will be completely ready for use.

3.1.4.1 Initial Configuration Using The System Configuration Wizard


To configure SecurOS for the first time by means of the Wizard, perform the following steps:
1. Launch SecurOS Client application by going to the Windows Start menu and select the SecurOS
®
folder SecurOS application (see Figure 14).

www.issivs.com
SecurOS 34 Administration Guide
SecurOS Installation and Update on Windows

Figure 14. Start menu

2. When Client starts on Conf iguration Server for the first time, system will open the System Conf iguration
Wizard window which will provide options for system configuration (see figure 15). For basic
configuration select the Configure using Wizard option that is active by default.

Figure 15. Wizard scenario window


Click the Next button.

Note. Import configuration file and Start with empty database scenarios are described
below.

www.issivs.com
SecurOS 35 Administration Guide
SecurOS Installation and Update on Windows

3. The License view window will appear (see figure 16).

Figure 16. License view window


Window displays license restrictions for the currently installed SecurOS. Click the Next button to
continue.
4. The Superuser password setup window will appear (see figure 17).

Figure 17. Superuser password setup window

www.issivs.com
SecurOS 36 Administration Guide
SecurOS Installation and Update on Windows

To confirm default superuser password click the Confirm password button. To change superuser
password click the Change password button.

The system will display window to enter new parameter values (see figure 18).

Figure 18. Change superuser password window

Set and confirm new superuser's password, or click the Change to default button to use default value.
Click the Next button to continue.
5. System will display Users setup window (see figure 19).

www.issivs.com
SecurOS 37 Administration Guide
SecurOS Installation and Update on Windows

Figure 19. User setup window

To add a new users enter required values into the appropriate fields.

New users can be created with the following user account rights:
· Power user;
· Simple user.
Power user can do the following:
· View objects using the user interface;
· Control video cameras, for example, arm camera, start and stop recording;
· Control PTZ devices;
· Hide user interface;
· Log off current SecurOS user and close SecurOS Client application;
Simple user can do the following:
· View objects using the user interface;
· Log off current SecurOS user and close SecurOS Client application;
Click the Next button.
6. The Video Server settings window will appear (see figure 20).

www.issivs.com
SecurOS 38 Administration Guide
SecurOS Installation and Update on Windows

Figure 20. Computer name and video archive setup window

Do the following:
· If necessary edit the Computer object name in the Enter the 'Computer' object name field. By default
the computer name is set by system in the following way: Computer <computer_name> (see
Computer Name Restrictions section).
· Choose Drives to store recorded video by selecting the corresponding drive from the Select
available logical drivers for video archive recording table. SecurOS will store the recorded video
on the drives specified in this window.
· If the local export of video records isn't required, clear the The ability to export archive locally on
the Video Server check-box that was set by default.

Additional information
The given parameter regulates the possibility to create the additional objects (allowing to save video records on a
hard disk of the given computer) on the Video Server.

· If self-diagnostic with the built-in tool on the Video Server is not required, clear the The ability of
self-diagnostic with Health Monitor Module checkbox that was set by default.

Click the Next button.


7. The Summary information window will appear (see figure 21).

www.issivs.com
SecurOS 39 Administration Guide
SecurOS Installation and Update on Windows

Figure 21. Summary information window

Information about server configuration parameters specified with the help of the System Conf iguration
Wizard will be displayed in the table. In addition to the parameters above server will be configured so
that any Operator Workstation located on any Computer within the SecurOS network can connect to it.
The following operations will be available on each of these Operator Workstations:
· Export of the archive to the AVI and Evidence file formats;
· Self-diagnostic of the system with the help of the Health Monitor module (see Health Monitor self-
diagnostic Module).

Review the selected system parameters. If it is necessary to change anything click the Back button. Set a
new value. Click the Next button to return to the Summary information window. To create and save
the configuration click the Finish button.

After the procedure of data creation and saving has completed successfully the corresponding message
will be displayed (see figure 22).

Figure 22. Successful configuration saving message

As a result of the described actions the system will be ready for operation.

www.issivs.com
SecurOS 40 Administration Guide
SecurOS Installation and Update on Windows

3.1.4.2 Restoring Configuration


The backup copy allows to quickly and easily restore system configuration.

Warning!
1. Version of the backup copy should comply with the version of the currently installed SecurOS,
otherwise it is not applicable. Backup copy creation procedure is described in the System section.
2. Restoring configuration is feasible only on the Conf iguration Server (see Managing Network
Configuration by Configuration Server).

To restore system configuration from backup select Import configuration file scenario in the Wizard
scenario window (see figure 23).

Figure 23. Wizard scenario Window

Click the Next button to continue and follow the Wizard.

3.1.4.3 Start with Empty Database


To start system with empty database select appropriate scenario in the Wizard scenario window
(see figure 23). If this scenario is used the system start with minimal configuration containing one of
each following types: Security zone, Computer and Desktop. Further system configuration is performed in
manual mode.

3.1.5 Launching SecurOS On The Configuration Server

By default, the Server part of the SecurOS is launched automatically on the Conf iguration Server after
SecurOS installation is finished and each time when OS starts.

To launch SecurOS Client application on Video Server do the following:

www.issivs.com
SecurOS 41 Administration Guide
SecurOS Installation and Update on Windows

Warning! The two-factor authentication procedure can also be used to launch the SecurOS Client application
(see Two-factor authentication in SecurOS).

1. In the Windows Start menu select the SecurOS folder ® SecurOS application (see Figure 24).

Figure 24. Start menu

Additional Information
Client can also be launched with the help of the Server Control Agent utility, by means of the SecurOS shortcuts
in the Start menu, on the Desktop or in the Windows taskbar.

The Authorization window is used to log in. It is displayed after the system has successfully started
and loaded all configurations (see Figure 25).

www.issivs.com
SecurOS 42 Administration Guide
SecurOS Installation and Update on Windows

Figure 25. Authorization window

2. Select an appropriate option:


· Auto login — when selecting this option the credentials of the user specified by administrator in
the system settings (see Auto login) will be used automatically. When system is started for the first
time this option is selected by default.

Warning! Auto login is possible if this procedure is configured by the administrator.

· Specify user — when selecting this option specify User and Password, corresponding to the
personal credentials of the SecurOS User.

Warning! At the first start select this option and use credentials of the superuser (see SecurOS Users) or other
users, if they have been created with the help of the System Configuration Wizard.

3. Click the Log in button.

Warning! If you experience distortions of the SecurOS GUI elements after startup, adjust the automatic scaling
of SecurOS (see Adjusting SecurOS when scaling Windows).

3.2 Installing, Configuring And Launching Peripheral Servers


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

To add other Video Servers to the network it is necessary to do the following:

1. Add computers to the network for that create and configure the corresponding objects in the Object
Tree of the certain Security Zone object on the Conf iguration Server.

www.issivs.com
SecurOS 43 Administration Guide
SecurOS Installation and Update on Windows

2. On the added computers install the SecurOS software, that corresponds to the Peripheral server role
(see Types Of Servers And Workstations section).
3. Launch SecurOS and configure the system with the Wizard.

Warning! The possibility to add the given amount of the certain typed computers to the network is regulated
by the license restrictions.

3.2.1 Adding To The Network And Configuring Peripheral Servers

To add a computer to the Object Tree do the following:

1. Enter the Administration Mode on the Conf iguration Server (see SecurOS Administration
Overview).
2. In the Object Tree select the Servers & Workstations group, create a Computer child object and specify
for it the Video Server role.
3. In the Parameters of created object window set the required values:
· In the ID field set the computer name (see Computer Name Restrictions). It should correspond to
the value defined in the OS settings (see My Computer ® Properties ® Computer Name).
· In the Name field define the Computer object name as it will be displayed in the SecurOS Object Tree.
4. In the object settings window (see Figure 26) set the following obligatory parameters:

Figure 26. Computer object settings window

· Server IP address — the network address of the adding Computer object.

www.issivs.com
SecurOS 44 Administration Guide
SecurOS Installation and Update on Windows

Note. Parameter is a mandatory one only if the network computers are registered in the different
subnetworks.

· Disk— drives to save video and audio records.

Note. Without the parameter definition the video records saving will be impossible.

5. If needed set the other parameters. Apply new settings.


6. For the added Computer object create the own Object Tree. The type and content of the Object Tree is
defined by a computer role in a network.
7. Repeat the steps for all added to the network computers.

3.2.2 SecurOS Installation On Peripheral Servers

To install SecurOS software on peripheral servers (other Video servers that are not Conf iguration Server)
do the following:
1. To start SecurOS software installation on additional servers setting launch the product installation
file on the corresponding computer.
2. Up to the server type selection step in the Server type window steps of the procedure are similar to
software setting on the Conf iguration server (see Software Installation section).
3. In the Server type window (see figure 27) set the Peripheral Server.

Figure 27. Server Type window

4. The further steps are similar to the software installation on the Conf iguration Server (see Software
Installation On The Configuration Server section). When setting parameters It is recommended to
use default values.

www.issivs.com
SecurOS 45 Administration Guide
SecurOS Installation and Update on Windows

3.2.3 Launching And Configuring SecurOS On Peripheral Servers

By default, the Server part of the SecurOS is launched automatically on the Peripheral Server after
SecurOS installation is finished and each time when OS starts.

Initial configuration of the SecurOS on Peripheral Server is performed with the help of System
Conf iguration Wizard. To configure SecurOS for the first time by means of the Wizard, perform the
following steps:
1. Start SecurOS Client application by selecting Programs ®
SecurOS ®
SecurOS from Start Windows
menu. When Client is started for the first time, then System Conf iguration Wizard will appear.

Note. Client can also be launched with the help of Server Control Agent utility.

2. In the Join existing security network window (see figure 28) do one of the following to choose the
Conf iguration Server with the current network configuration:
· Set Conf iguration Server name or IP address in the Configuration server name or IP address field.
· For automatic search for Video Server in the network click Find servers in the local network
button. The searching procedure will be started and Conf iguration Server will be displayed in the
Servers found box. Click found Conf iguration Server to select it.

Warning! During the configuration procedure the Conf iguration Server must be active and the SecurOS should
be launched on it.

Figure 28. Join existing security network window

Click the Join button. The Loading configuration window will appear that indicates the loading
process.

3. After the configuration loading finished successfully the corresponding system message will be
displayed. Click on OK button. In the Loading configuration window click the Finish button.

www.issivs.com
SecurOS 46 Administration Guide
SecurOS Installation and Update on Windows

Warning! If you experience distortions of the SecurOS GUI elements after startup, adjust the automatic scaling
of SecurOS (see Adjusting SecurOS when scaling Windows).

3.3 Installing, Configuring and Launching Operator Workstations


To prepare Operator Workstation it is enough to install SecurOS software on the computer. Installation
procedure is described in the SecurOS Installation On Operator Workstation.

Launching operator interface on the Operator Workstation is possible immediately after installation
(see Launching SecurOS On Operator Workstation). To connect to the Video Server it is enough to
know its IP address or DNS/WINS name. When system starts for the first time operator can operate
only with such SecurOS administrative tools, as Control Panel and Object Tree.

Note. Administrative tools are available only if SecurOS user has a rights to configure the system (see User
Rights).

For further work it is necessary to create Operator Workspace, which is a collection of interface elements
for monitoring and other features.

There are two types of the Operator Workspace:


· Profile Workspace. Such Operator Workspace corresponds to Operator Workstation Prof ile
configuration (see Operator Workstation Profiles). It can be used on any number of computers.
· Local Workspace. Such Operator Workspace corresponds to the configuration of the Computer object,
ID of which matches the DNS/WINS name of the computer, used by operator. It can be used on this
computers. Use of local workspace allows to perform some operations only on certain computers.
Operator Workstations that use local workspaces are called Fixed. Procedure for adding Fixed
Operator Workstation to the network is described in Fixed Operator Workstations.

Notes:
1. Operator Workstation Prof iles can be used even on the Fixed Operator Workstations.
2. By default, local workspace is available on those Video Servers where operator interface is being
launched.

3.3.1 SecurOS Installation On Operator Workstation

To install SecurOS software on the Operator Workstation do the following:


1. To start SecurOS software installation on operator workstation launch the product installation file on
the computer.
2. Up to the setting type selection step in the Install type window the steps of the procedure are similar
to software setting on the video server (see Software Installation section).
3. In the Install type window select the Advanced configuration options type.
4. In the Setup type window (see figure 29) select the Operator Workstation installation type.

www.issivs.com
SecurOS 47 Administration Guide
SecurOS Installation and Update on Windows

Figure 29. Setup type window

5. Follow the further InstallShield Wizard instructions.

3.3.2 Operator Workstation Profiles

Operator Workstation Prof iles specify appearance of the operator interface and list of available modules.
Each Profile can be used by unlimited number of Operator Workstations. This ensures unification of user
interface and simplifies applying of changes. Any change of Profile will automatically applied for all
Operator Workstations that use this Profile.

To use profile it is necessary to create and configure it first (see Creating Operator Workstation
Profile), and then select it on the Operator Workstation as Operator Workspace (see Changing Operator
Workspace).

Note. Availability of the Operator Workspace to specific operator is defined by system settings. User access to
the profiles can be restricted via User Rights. Profile is accessible, if operator has the (View) access right to
this Profile or above.

3.3.2.1 Use Restrictions


The following objects and Modules are not supported when using Operator Workspace (exclude Local
Environment) on the Operator Workstation:
· Active Camera Recorder (AC Recorder).

When using Operator Workspace the limitations for work with Node.js Scripts and SecurOS messages are
applied:

www.issivs.com
SecurOS 48 Administration Guide
SecurOS Installation and Update on Windows

· To execute the Node.js Script on the Operator Workstation it is necessary to create it as a child object to
the same Computer, profile of which is used by the Operator Workstation as Operator Workspace. If the
Operator Workstation uses Local Environment then the Node.js Script must be created as a child object
to the current Computer.
· SecurOS messages (events and reacts) received by the Operator Workstation that uses Operator
Workspace, are not further transferred to the SecurOS network.

3.3.2.2 Creating Operator Workstation Profile


Operator Workstation Prof ile is represented in SecurOS configuration by the Computer object and its
children objects. To create a profile do the following:
1. Enter the Administration Mode (see SecurOS Administration Overview).
2. In the Object Tree select the Servers & Workstations group, create a Computer child object.
3. In the Parameters of created object window set the required values:
· In the ID field specify any value, that matches the requirements (see Computer Name Restrictions).
For Profiles, the identifier does not have to match the DNS \ WINS name of the computer.
· In the Name field specify name, that corresponds to Prof ile purpose (for example, Building
protection). This name will be displayed in the list of Operator Workspaces, available to operator.
· In the Computer's role drop-down list choose the Operator Workstation.
4. In the computer parameter settings window (see Figure 30) tick the Use as Operator Workstation
Profile checkbox.

Figure 30. Computer object settings window

5. For given Computer create all children interface objects, required for the operator (for example, Media
Client, Event Viewer). Configure these interface objects in accordance with your requirements to this

www.issivs.com
SecurOS 49 Administration Guide
SecurOS Installation and Update on Windows

Profile (for example, specify Media Client window size and working modes, specify list of available
Cameras).

After that Profile can be used by operator as Operator Workspace (see Changing Operator Workspace).

3.3.3 Fixed Operator Workstations

In some cases, it may be necessary for a certain features to be available to operators only on specific
computers. To solve this task one can use the Fixed Operator Workstations.

For such Fixed Operator Workstations the Local Workspace is used as Operator Workspace.

3.3.3.1 Adding To The Network And Configuring Fixed Operator Workstations


Fixed Operator Workstations are represented in SecurOS configuration by the Computer objects. To add a
computer to the network do the following:
1. Enter the Administration Mode (see SecurOS Administration Overview).
2. In the Object Tree select the Servers & Workstations group, create a Computer child object.
3. In the Parameters of created object window set the required values:
· In the ID field set the computer name (see Computer Name Restrictions). It should correspond to
the value defined in the OS settings (see My Computer ® Properties ® Computer Name).
· In the Name field define the Computer object name as it will be displayed in the SecurOS Object Tree.
· In the Computer's role drop-down list choose the Operator Workstation.

Figure 31. Computer object settings window

www.issivs.com
SecurOS 50 Administration Guide
SecurOS Installation and Update on Windows

4. If necessary, specify other parameters (see Figure 31). Apply new settings.
5. For the created Computer create all necessary children objects. Set of such children object is defined
by tasks, that will be performed on this Operator Workstation.
6. Repeat the steps for all Operator Workstations added to the network.

3.3.4 Launching SecurOS On Operator Workstation

To launch SecurOS Client application on Operator Workstation do the following:


1. In the Start Windows menu consistently choose the following menu options: Programs ® SecurOS
® SecurOS.
2. In the Authorization window (see Figure 32) in the Server to connect field specify IP address of the
Video Server to connect.
3. Select an appropriate option:
· Auto login — when selecting this option the credentials of the user specified by administrator in
the system settings will be used automatically. When system is started for the first time this option
is selected by default.

Warning! Auto login is possible if this procedure is configured by the administrator (see Auto login).

· Specify user — when selecting this option specify User and Password that match credentials of the
User earlier created by administrator or use superuser account credentials (see SecurOS Users).
4. Click the Log in button.

Warning! The two-factor authentication procedure can also be used to launch the SecurOS User GUI (see Two-
factor authentication in SecurOS).

For more information about the authorization see SecurOS Quick User Guide.

www.issivs.com
SecurOS 51 Administration Guide
SecurOS Installation and Update on Windows

Figure 32. Authorization window

5. After successful authorization, the operator interface will be displayed on the screen. When
connecting for the first time Operator Workspace will be selected automatically. If there is a local
workspace for this computer, then it will be used. Otherwise one of the available profile workspaces
will be used randomly. Later operator can change Operator Workspace (see Changing Operator
Workspace).

Notes:
1. Possibility to connect to the server is controlled by the Security Zone object settings (see Security
Zone) and User Rights (see User Rights). List of available Operator Workspaces is also defined by User
Rights.
2. For the Fixed Operator Workstations automatic authorization is possible for the user for which such
possibility is specified by the administrator. To apply automatic authorization choose the Auto login
option. Details of the automatic authorization procedure are described below (see Computer
parameters description and Auto login section).

Warning! If you experience distortions of the SecurOS GUI elements after startup, adjust the automatic scaling
of SecurOS (see Adjusting SecurOS when scaling Windows).

3.4 SecurOS Update Order


Correct SecurOS work is guaranteed in case the versions of the SecurOS software, installed on each
computer of the system, coincide.

Usually, updates are applied to all computers of any system at the same time. If it is not possible to stop
SecurOS on all computers within network at the same time, software upgrade procedure must be
performed in the following order:

www.issivs.com
SecurOS 52 Administration Guide
SecurOS Installation and Update on Windows

1. Stop, update and start SecurOS on Conf iguration Server.


2. Sequentially stop, update and start SecurOS on Peripheral Servers.
3. Sequentially stop, update and start SecurOS on Operator Workstations.

Update should be carried out with the following restrictions:


· During the upgrade, it is strongly recommended not to change the system configuration. Otherwise,
those Peripheral Servers, software on which is not updated, will not be able to receive modified
configuration from updated Conf iguration Server.
· Software update on the Peripheral Server should be carried out only if the Conf iguration Server is
enabled and available on the network from the computer, on which the update is performed.

When upgrading one must also consider the features specific to some SecurOS versions (see SecurOS
Version Upgrade Features in the Appendix A).

Software updating procedure on separate computer is described in Appendix A (see Upgrading


Software).

www.issivs.com
SecurOS 53 Administration Guide
SecurOS Installation and Update on Linux

4 SecurOS Installation and Update on


Linux
This section describes in details the sequence of steps, that must be done in order to create and start
operation of the SecurOS security network on Linux platform.

Warning! Make sure that all required port are opened in the firewall settings (see Appendix E. Network Ports
Used in SecurOS).

First of all it is necessary to prepare Video Servers (see Types Of Servers And Workstations). Order of
SecurOS installation on Video Servers is described in the following sections:
· Installing, Configuring and Launching Configuration Server;
· Installing, Configuring And Launching Peripheral Servers.

Then, it is necessary to prepare Operator Workstations. SecurOS installation order onto Operator
Workstations is described in corresponding section:
· Installing, Configuring and Launching Operator Workstations.

Warning!
1. All components of all SecurOS Intelligent Modules that are used within the system must be installed
on each Video Server and Operator Workstation.
2. The software language must be the same for all network computers.
3. System time must be synchronized for all Video Servers within configuration.
4. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.

4.1 Installing, Configuring and Launching Configuration Server


This section describes installation and configuration of the SecurOS's managing server.

4.1.1 Hardware Installation

The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys.

4.1.1.1 Guardant Key Installation


The Guardant key is the electronic device constantly connected to the computer through a USB port.
The SecurOS software addresses to a key for check the license information.

On Linux platform the Guardant Sign dongles are applied. To prepare Guardant Sing dongles for
operation, follow the steps described in the Installing a dongle on a Linux system article.

www.issivs.com
SecurOS 54 Administration Guide
SecurOS Installation and Update on Linux

Warning!
1. Installation of the Guardant Sign must be done before initial configuration of the installed SecurOS
(see Initial Configuration).
2. Before executing the install.sh file it must be granted the execution permission using the
sudo chmod +x install.sh command.

4.1.2 License Key

The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.

The license key is created on the basis of the SecurOS hardware unique codes (Guardant) or
combinations of unique codes of the computer hardware on which SecurOS is installed.

License keys are checked according to the priority descending in the following order:

1. Guardant key;
2. key on the basis of the combinations of unique codes of the computer hardware (hardware code).

In addition to the unique hardware codes, the following data is also taken into account during license
key generation:

· program language selected on the SecurOS installation;


· default language of the installed operating system (Language parameter (local ID));
· SecurOS release version;
· SecurOS edition.

The license key is usually provided in one of the following ways:

· in the product delivery set, on the software CD;


· by e-mail.

4.1.2.1 Request the key by e-mail

In case the license key isn't included in the SecurOS delivery set it is necessary contact Intelligent
Security Systems to request it from.

For key request registration perform the following steps:

1. Install the SecurOS hard and software on the computer.


2. Launch the Terminal console application.
3. Go to the SecurOS root directory (default is opt/iss/securos). To perform that do the following:

cd <SecurOS_root_directory>

4. Run the executable file of the utility (see Hardware Report Utility). To perform that do the
following:

./hru

www.issivs.com
SecurOS 55 Administration Guide
SecurOS Installation and Update on Linux

The result of the command is represented in Figure 33.

Figure 33. The result after executing the command ./ hru in the console

4. Copy the data generated by the command.


5. Create and open a new text file of any format. Paste the clipboard content to the file. Additionally
insert the following data into the file:
· program language selected on the SecurOS installation;
· SecurOS release number;
· SecurOS edition.
6. Save the file.
7. Send the file to the Intelligent Security Systems Technical Support Team (see Getting Technical
Support section).

On receiving the license key file copy it to the SecurOS root folder.

4.1.3 Software Installation On Configuration Server

Warning!
1. Before starting the installation, insert the disk with the Astra Linux distributive into the CD ROM or
mount the network disk with the images of the Astra Linux installation disks.
2. Create a directory on your hard drive and copy the SecurOS software distribution package there.
3. Copy the SecurOS license key file key.iss into the same directory.

Depending on the SecurOS software distribution package, one of the following methods is used for
installation:
· Installation using .deb-file.
· Installation using .run-file.

Installation using .deb-file


The securos_XXX-YYY_amd64.run file is used for the installation, where XXX is the SecurOS
software version, and YYY is the operating system version.

www.issivs.com
SecurOS 56 Administration Guide
SecurOS Installation and Update on Linux

To install the software on a Video Server do the following:


1. Launch the Terminal console application.
2. Go to the directory where the SecurOS installation file was copied (for example,
(<SecurOS_distributive_directory>). To do this run the following command:

cd <SecurOS_distributive_directory>

3. To start the installation of the SecurOS software, run the product installation file (for example,
securos_11.4-deb10_amd64.run) with the following command:

sudo dpkg -i securos_11.4-deb10_amd64.deb

4. If some required packages are missing, the system will display a corresponding message. Install
these packages using the following command:

sudo apt-get install -f

5. The system will unpack the archive and display the SecurOS language selection window
(see Figure 34):

Note. All windows described below are displayed in the specified sequence only when initial SecurOS
installation is performed. When updating already installed version only one window (see Figure 37) is
displayed.

Figure 34. Select application language window

Choose required language from the list. Click the OK button or press the Enter key to proceed with the
installation.
6. The system will display a window for selecting the installation type (see Figure 35):

www.issivs.com
SecurOS 57 Administration Guide
SecurOS Installation and Update on Linux

Figure 35. Installation type window

To install Video Server software select appropriate value from the drop-down list. Click the OK button
or press the Enter key to proceed with the installation.
7. The system will display a window for selecting the type of Video Server (see Figure 36):

Figure 36. Select Video Server type window

To install Conf iguration Server software select appropriate value from the drop-down list. Click the OK
button or press the Enter key to proceed with the installation.
8. The system will display the PostgreSQL administrator password window (see Figure 37):

www.issivs.com
SecurOS 58 Administration Guide
SecurOS Installation and Update on Linux

Figure 37. PostgreSQL administrator password window

Type the current password of the database Administrator. Click the OK button or press the Enter key to
proceed with the installation.
9. If an incorrect password has been entered, the system will display a connection error window (see
Figure 38):

Figure 38. Connection error window

Type the correct password or set the new one. When setting a new password, the system will display
the password setup window (see Figure 39):

Figure 39. Administrator password setup window

Click the OK button or press the Enter key to proceed with the installation.
10.The system will display a new password confirmation window (see Figure 40):

www.issivs.com
SecurOS 59 Administration Guide
SecurOS Installation and Update on Linux

Figure 40. New Administrator password confirmation window

Re-enter the new password. Click the OK button or press the Enter key to proceed with the installation.
11.System will display the user selection window (see Figure 41):

Figure 41. User selection window

In the list of users, select those Linux users who will be allowed to run SecurOS on this computer. Use
the arrow keys to navigate through the list. To select a user, highlight it in the list, then press the Space
key. The ‘*’ (asterisk) character will be placed to the left of the username. Click the OK button or press
the Enter key to proceed with the installation.
12.The system will execute required operations and will display the Installation complete window
(see Figure 42):

Figure 42. Installation complete window

Click the OK button or press the Enter key to finish the installation.

www.issivs.com
SecurOS 60 Administration Guide
SecurOS Installation and Update on Linux

Warning! To change the parameters, specified during the SecurOS installation in the described above
windows, use the sudo dpkg-reconfigure securos command. Without using this command,
changing parameters will be possible only after completely removing and reinstalling SecurOS.

13.Specify a directory for writing archive. It is recommended to use a hard disk different from system
disk or create a separate partition on the system disk. Provide rights to read and write for the
securos system user in the selected directory. To perform it, execute the following commands:

sudo chown securos -R <archive_write_directory>


sudo chmod 744 -R <archive_write_directory>

14.To start SecurOS client part for the first time on this computer, initiate a new Linux session for the
current user.

15.Copy the license key file from the previously created directory where it is located (for example,
<SecurOS_distributive_directory>) to the SecurOS root directory (/opt/iss/securos).
To do this run the following commands:

cd <SecurOS_distributive_directory>
sudo cp key.iss /opt/iss/securos

16.Change file owner and his rights for the key file:

cd /opt/iss/securos/
sudo chown root:securos key.iss
sudo chmod 640 key.iss

17.Start the vms_server daemon. To do this run the following command:

sudo service vms_server start

Installation using .run-file


The securos_XXX-YYY_amd64.run file is used for the installation, where XXX is the SecurOS
software version, and YYY is the operating system version.

To install the software on a Video Server do the following:


1. Launch the Terminal console application.
2. Go to the directory where the SecurOS installation file was copied (for example,
(<SecurOS_distributive_directory>). To do this run the following command:

cd <SecurOS_distributive_directory>

3. To start the installation of the SecurOS software, run the product installation file (for example,
securos_11.4_amd64.run) with the following command:

sudo ./securos_11.4_amd64.run

4. Further installation steps are completely similar to those described above (see Installation using
.deb-file).

www.issivs.com
SecurOS 61 Administration Guide
SecurOS Installation and Update on Linux

4.1.4 Initial Configuration

Initial SecurOS configuration is carried out on the Conf iguration Server with the help of the System
Conf iguration Wizard, which offers various options of configurations. Base configuration at which the
configuration data is entered by the administrator, is carried out by means of the First Start
Conf iguration Wizard. Upon the configuration finish, the system will be completely ready for use.

Warning!
1. The initial configuration procedure for SecurOS on Linux is exactly the same as for Windows
(see Initial Configuration).
2. Before launching initial configuration procedure install Guardant Sign dongle (see Guardant Key
Installation).

4.1.5 Launching SecurOS On The Configuration Server

Launching SecurOS on the Conf iguration Server on Linux is similar to launching it on Windows
(see Launching SecurOS On The Configuration Server).

4.2 Installing, Configuring And Launching Peripheral Servers


The initial conditions and steps of the installation procedure are similar to the installation of the
SecurOS software on the Video Server (see Software Installation On The Configuration Server).

To install SecurOS software on peripheral servers (other Video Servers that are not a Conf iguration
Server), select the Peripheral server type in the Server type window (see Figure 43). Follow the further
instructions of the Installation Wizard. After the installation is complete, start a new user session and
assign the necessary rights to the license key file (see Software Installation On The Configuration
Server).

Figure 43. Select Video Server type window

www.issivs.com
SecurOS 62 Administration Guide
SecurOS Installation and Update on Linux

The procedure for starting and configuring SecurOS on the Peripheral Server on Linux platform is similar
to the procedure for setting up on the Windows platform (see Installing, Configuring And Launching
Peripheral Servers).

4.3 Installing, Configuring and Launching Operator Workstations


The initial conditions and steps of the installation procedure are similar to the installation of the
SecurOS software on the Video Server (see Software Installation On The Configuration Server).

To install SecurOS software on the Operator Workstation, select the Operator Workstation type in the
Installation type window (see Figure 44). Follow the further instructions of the Installation Wizard.
After the installation is complete, start a new user session and assign the necessary rights to the license
key file (see Software Installation On The Configuration Server).

Figure 44. Installation type window

The procedure for starting and configuring the Operator Workstation on Linux platform is similar to the
procedure for setting up on the Windows platform (see Installing, Configuring and Launching
Operator Workstations).

4.4 SecurOS Update Order


The procedure for updating SecurOS software on Linux is the same as updating for Windows
(see SecurOS Update Order).

www.issivs.com
SecurOS 63 Administration Guide
Installing Software to Provide Neural Network Algorithms Operation

5 Installing Software to Provide Neural


Network Algorithms Operation
Warning! Installing this software is only necessary for the modules that use neural network functionality.
Information on using neural networks can be found in the separate documentation for a specific module.

Software for the neural network algorithms operation


To integrate neural network algorithms with SecurOS, special applications called neural network
servers are used.

Applicable neural network servers


SecurOS modules and components can use the following neural network servers:
· Caffe2Server (see also Installing NVIDIA Drivers to Provide Operation of Neural Network
Algorithms Based on Caffe2Server in Linux OS);
· OpenVINOServer.

For detailed information about the procedure of installing software that provides neural network
algorithms operation, you can contact the Intelligent Security Systems Technical Support Team.

5.1 Installing NVIDIA Drivers to Provide Operation of Neural Network


Algorithms Based on Caffe2Server in Linux OS
When using the Caffe2Server neural network server in Linux, you need to install the NVIDIA driver
starting from version 470 and newer.

Installing drivers in Debian 10


NVIDIA drivers are available in the backports repository.

1. Add the repository to /etc/apt/sources.list:

deb http://deb.debian.org/debian buster-backports main contrib non-free

2. Update package indexing:

sudo apt update

3. Install the driver by explicitly specifying the repository:

sudo apt install -t buster-backports nvidia-driver

www.issivs.com
SecurOS 64 Administration Guide
Installing Software to Provide Neural Network Algorithms Operation

4. Reboot computer.

www.issivs.com
SecurOS 65 Administration Guide
SecurOS Administration Overview

6 SecurOS Administration Overview


Administration mode is used to configure security network and it components. One can run this mode
on any Video Server and Operator Workstation, if operator has appropriate privileges to configure system
(see User Rights). All security system components remains completely functional when entering
administration mode (without any restrictions).

Warning! After SecurOS and PostgreSQL software installation Windows OS creates the postgres account.
To configure SecurOS system use an Windows administrator account but not the postgres one.

6.1 Working With Control Panel


The control panel is intended for opening Administration Center, Desktop and user session management,
and also configuring the panel itself. In addition, the control panel can be used to open help
documentation and to launch special system control commands (see Macro section). The control panel
is represented in figure 45.

Figure 45. SecurOS Control Panel

Active Desktops and Macros control buttons (see Disabling/ Enabling Objects) are placed in the panel.
Number of these buttons is specified by system settings. If this number is exceeded, extra buttons are
minimized and the corresponding menu for calling these objects is displayed on the panel:

· — for Desktops;

· — for Macros.

An active Desktop button is displayed in light blue (see Figure 45). If Administration Center is opened,
then the Configure the system button is displayed in the same color.

Move the delimiter to organize space on the Control Panel. It allows to increase the number of
displayed Desktops or Macros buttons if necessary. The button size also affects the number of displayed
elements and it can be changed in the Control Panel settings (see Control Panel Activation, Configuring
and Hiding section).

Use the drag-and-drop method to change the button order in the Desktops and Macros areas (see
Figure 46).

www.issivs.com
SecurOS 66 Administration Guide
SecurOS Administration Overview

Figure 46. Drag-and-drop method on the SecurOS Control Panel

Use the same method to move buttons from the Control Panel to the drop-down lists of the Desktops or
Macros areas and back.

See also:
· Control Panel Activation, Configuring and Hiding;
· Opening and Closing Administration Center;
· Changing Operator Workspace;
· User Session Administration and Client Shutdown;
· Getting Help;
· System Shutdown.

6.1.1 Control Panel Activation, Configuring and Hiding

This section describes typical operations with the Control Panel:


· Control Panel Activation;
· Configuring Control Panel;
· Hide Control Panel.

Control Panel Activation


By default, after logging on the system, Control Panel is displayed on the Windows desktop. If there are
several physical monitors connected to the operator's computer, panel is displayed on the first of them.

If Control Panel is not displayed on the Windows desktop, press and hold the Ctrl key, then move
mouse pointer so it touches the top of the screen.

Note. Depending on operation mode, you can use different methods to activate the Control Panel (see SecurOS
Quick User Guide).

Additional Information
The Control Panel also can be activated by clicking on the application icon in the Windows taskbar (system tray), or
using the Show Control Panel command in the application icon context menu.

Configuring Control Panel

To set Control Panel call/hide method click on the (Change user/ Shutdown system) button,
then select the Configure Control Panel command. In the Control Panel settings window
(see figure 47) set the required parameters.

www.issivs.com
SecurOS 67 Administration Guide
SecurOS Administration Overview

Figure 47. Control Panel settings window

Configure width of buttons located on the Control Panel by selecting one of the values of Minimum
width of Desktops and Macros buttons parameter.

Note. Buttons which can not fit the Control Panel will be moved to the drop-down list of the corresponding
area.

Hide Control Panel


Method to hide the Control Panel depends on its current settings (see Configuring Control Panel):

· In the Minimize panel automatically mode panel is hiding itself, if the mouse pointer is no longer
above the panel.

Note. Automatic hide of Control Panel is impossible if Administration Center is opened.

· To hide panel in the Minimize panel manually mode, click on the (Minimize the Control
Panel) button.

Note. The Control Panel can also be minimized by clicking it's icon in the Windows Taskbar notification area
(system tray), on the Windows Taskbar or with the help of application icon context menu in the system tray.

www.issivs.com
SecurOS 68 Administration Guide
SecurOS Administration Overview

6.1.2 Opening and Closing Administration Center

To open Administration Center click on the (Configure the system) button in the Control Panel.

Main window of the Administration Center will appear (see Figure 48).

Figure 48. Administration Center

To close Administration Center, click on the button again.

See also:
Administration Center.

www.issivs.com
SecurOS 69 Administration Guide
SecurOS Administration Overview

6.1.3 Changing Operator Workspace

Created Operator Workstation Prof iles (see Operator Workstation Profiles) are available for the operator
as Operator Workspaces. Operator Workspace specify appearance of the operator interface and list of
available modules. Each Operator Workspace can be used by unlimited number of Operator Workstations.
Current Operator Workspace can be changed in Control Panel. To do this click on the Change

user/ Shutdown system ( ), select Change Operator Workspace, then click on the required item
(see Figure 49).

Figure 49. Change Operator Workspace

Current Operator Workspace will be marked with the sign. Operator Workspace configured on the
fixed Operator Workstation (see Fixed Operator Workstations) is called Local.

Warning! Last time used Opertator Workspace is remembered only for Windows user.

For more information about how to use Operator Workspace see SecurOS Quick User Guide.

6.1.4 User Session Administration and Client Shutdown

Using Control Panel one can change user or close Client. Click the Change user/ Shutdown system

button ( ) and from the drop-down list select a necessary command (see figure 50).

www.issivs.com
SecurOS 70 Administration Guide
SecurOS Administration Overview

Figure 50. Change user/ Shutdown system menu options

In case of automatic or manual desktop locking the current user GUI session will be automatically
terminated (if the Auto user logging off after lock screen parameter of the Computer object is
selected).

6.1.5 System Shutdown

One can to shut down the system (Server part of the SecurOS) using one of the following ways:
· Stop the Server part of the SecurOS with the help of the Server Control Agent utility.
· Stop Video Management System Server system service. When stopping the service, the Server
part of the SecurOS will be stopped automatically. The service also can be stopped with the help of
the Server Control Agent utility or, when running Windows OS, with the help of the Computer
® ®
management console (Computer Manage Services and Applications Services). ®

6.1.6 Getting Help

When getting help, one can open the following descriptions:


· Full list of the Manuals and Guides;
· Description of the Administration Center;
· Description of the SecurOS object settings.

To open list of all available SecurOS Manuals and Guides you can use one of the following ways:

1. Click on the (Change user/ System shutdown) in the SecurOS Control Panel (see Figure 51):

www.issivs.com
SecurOS 71 Administration Guide
SecurOS Administration Overview

Figure 51. Getting help from the Control Panel

2. From the Windows task bar (system tray), by right clicking on the SecurOS icon (see figure 52):

Figure 52. Getting help from the Windows system tray

3. From the Windows taskbar (Start ® All Programs ® SecurOS ® Documentation).


To open description of the Administration Center, press the F1 key or click on the button in the
Administration Center.

www.issivs.com
SecurOS 72 Administration Guide
SecurOS Administration Overview

To open description of the object settings, open object settings window from the Object Tree and,

further, press the F1 key or click on the button in the Administration Center.

6.2 Administration Center

To open Administration Center click on the (Configure the system) button in the Control Panel.

Administration Center contains Administration Toolbar and Object Tree (see Figure 53):

Figure 53. Administration Center

www.issivs.com
SecurOS 73 Administration Guide
SecurOS Administration Overview

Administrator Toolbar
The Administrator Toolbar contains the controls (buttons) allowing one to make typical operations of
the system administrator (see Working with Objects).

Administration operations are done with the SecurOS object selected in the Object Tree. The list of
operations which can be done with an object (i.e. availability of each of the Toolbar buttons) depends on
the selected object.

Object tree
The security system elements are displayed in the form of a object tree — the hierarchical structure
reflecting correlations between them. The System object is the root element of the tree. All other SecurOS
objects are its children.

Additional information
Objects which are one level down the hierarchy are called child objects to the object one level above them. The parent
objects contain child objects.

There are two element types in the tree:


1. Group — this element is intended for grouping Objects by the functional sign. Group is being created
automatically and can not be deleted by administrator. To the left from icon of the group there is an
indicator. It can designate following group states:
— group with no child objects ("empty" group).
— group with some child objects.
Most group are child to Security Zone. Some groups are child to other SecurOS objects. For example,
Desktops group is child to Computer object.
2. Object — the functional element of the security network. In the SecurOS tree it can be allocated only
within a Group, if it is defined for the given type of object. An Object can be created, modified and
deleted by administrator

There are two object classes in the SecurOS network: system objects and user interface objects. System
objects reflect the network functionality, user interface objects are intended for security network
monitoring and management.

The Object Tree is used to configure/manage any aspect of the system.

6.2.1 Working with Objects

Administration toolbar contains the following buttons to work with objects (see Figure 54):

Figure 54. Administration Toolbar buttons

Note. If any operation is unavailable, the corresponding button is disabled.

www.issivs.com
SecurOS 74 Administration Guide
SecurOS Administration Overview

· Create — create new object (child to selected object/group);

Warning! Object with the same hierarchy level can be created only from context menu of parent object/group.

· Disable/ Enable — disable/enable object. When executing an operation, this button changes its
appearance and reverts an action;
· Setup — open/close object's settings window;
· Rename — rename object;
· Delete — delete object;
· Back/ forward — buttons to switch between objects within Object tree in the order those objects were
previously selected by user;
· Help — call help (context dependent on the currently selected object in the Object Tree);
· IP-Device Manager — open the IP-Device Manger utility to search for IP devices within the
SecurOS security network and add them to the system configuration;
· Favorite objects — open Favorite objects panel;
· Object search panel — open Object search panel.

Administration Toolbar's buttons are duplicated by commands of the object's context menu (for example,
see Figure 55):

Figure 55. Object context menu

To call context menu right click on the required object. Context menu allows the following additional
operations with objects: Find by name and Find by ID (see Searching objects).

www.issivs.com
SecurOS 75 Administration Guide
SecurOS Administration Overview

6.2.1.1 Creating Objects


To create a new object:
1. Select a parent object in the Object Tree.

2. In the Administration toolbar or to the right from the object click on the (Create) button and
choose the necessary object type from the drop-down list.
3. In the Parameters of created object window set the ID and Name of the object. Click on the OK
button.
4. In the object's settings window specify the required values. Apply changes.

Creating Objects Limits


Limits of the system configuration (amount of objects of each type within the security network) is
specified in the license key file (key.iss). If you have created maximum number of object of particular
type, then you will not be able to add extra objects of this type into the SecurOS network. To be able to
have more objects of this type, contact our Technical Support Team to get the new key (see Updating
License Key on All Servers).

Warning! If maximum number of objects is exceeded when copying objects with the help of IP-Device
Manager, the system will display the appropriate message. Only permitted number of object copies will be
created.

6.2.1.2 Editing Object Settings


To edit or view an object's settings:

1. Select an object in the Object Tree, then click on the (Setup) button on the Administrator
Toolbar or on the right of the object.
2. Change the current parameters of the object.

Notes:
1. Parameters in the object settings window are described in the section corresponding to the given
object for each subsystem (see Software Implementation. SecurOS Subsystems).
2. If you selected an objects, that have no editable parameters or operation is restricted by User Rights,
then the Setup button is disabled.

3. Apply changes.

6.2.1.3 Deleting Objects


To delete object:

1. Select an object in the Object Tree, then click on the ( Delete) button in the Administration
Toolbar.
2. To confirm operation click on the Yes button.

Warning! This operation cannot be undone, so use it carefully. If you delete an object, it's child objects will be
deleted as well. When you delete a group object, all objects within this group are deleted.

www.issivs.com
SecurOS 76 Administration Guide
SecurOS Administration Overview

6.2.1.4 Disabling/Enabling Objects


To temporarily exclude object from SecurOS network without deleting it and, thus, loosing its settings,
just disable it.

To disable an object select it in the Object Tree, then click on the (Disable) button. Disabled
objects are marked with "turquoise cross" icon (see Figure 56).

Figure 56. Disabled Object

To enable a disabled object select it in the Object Tree, then click on the (Enable) button.

Additional Information
You can disable/enable all objects in the group. To do this, disable/enable Group or Parent object. When doing so
name of the object\group will be marked with grey color.

6.2.1.5 Renaming Objects


It is possible to rename any object preserving all its settings.

To rename object:

1. Select an object in the Object Tree, then click on the (Rename) button.
2. In the pop-up dialog window specify a new object name.
3. Click the OK button to save the changes.

6.2.1.6 Searching for Objects


To search for objects within Object tree the Object search panel or Search window can be used.

· Searching with Object Search Panel.


· Searching with Search Window.

www.issivs.com
SecurOS 77 Administration Guide
SecurOS Administration Overview

6.2.1.6.1 Searching with Object Search Panel

To open Object search panel click the (Object search panel) button on the Administrator toobar or
select corresponding option in the context menu (see Figure 57). To search for objects set Search
parameters and click the (Search button). Search results are displayed in the Search results
section.

Figure 57. Object search panel

Search parameters:
· Type filter.
· Search by name and ID.

Type filter
Select an object type to see only objects of selected type in the search results (see Figure 58). By default
the Any type is selected that allows to search among objects of all types. To find required type enter
first symbols of the type's name into the Filter... text field.

www.issivs.com
SecurOS 78 Administration Guide
SecurOS Administration Overview

Figure 58. Filter by type

Note. After the Object search panel is closed, selected filter and all text fields are reset. Previously used filters
can be found under the Recent title in the list of object types.

Search by name and ID


When defining the search string (see Figure 59) be guided by the following rules:
· To search for an object by name enter its name or part of its name into the text field.
· To search for an object by full ID enter its ID within square brackets. For example, [23].
· To search for an object by part of ID enter the part of its ID starting from square bracket. For
example, [1.
· To search for an object by name and ID enter its name and ID using rules described above. For
example, if the search string is defined as Camera [2 all objects with word Camera withing their
titles and number 2 within their IDs will be found.
To clear the text field click the button.

Note. The search is non-case-sensitive.

Viewing search results


When selecting an object in the search results this object becomes selected in the Object tree as well (see
Figure 59). An object within the Object search panel can be interacted like in the Object tree.

The Object search panel displays changes of found objects:


· If an object was renamed it is marked with cursive.
· If an object was removed it becomes strikethrough and not available for an interaction.

Note. The Object search panel displays state changes (renaming and deleting) that happen after the search was
performed.

www.issivs.com
SecurOS 79 Administration Guide
SecurOS Administration Overview

Figure 59. Viewing search results

Note. Search results are shown only after all matching objects are found. Sometimes if there is a huge number
of objects in the Object tree the search process may take considerable time. The state line shows the search
progress.

Click the (Object search panel) button again to close Object search panel.

6.2.1.6.2 Searching with Search Window


To find objects by their type and name, do the following:
1. In the Object Tree call object/group context menu, then select Find by name.
2. In the search window (see Figure 60) select object type and enter the name (or part of the name) of
required object and press the Enter key or click on the Search button. If such objects exist, then the
object corresponding to the search conditions will be selected in the Object tree. The Previous and
Next buttons will become active.

www.issivs.com
SecurOS 80 Administration Guide
SecurOS Administration Overview

Figure 60. Searching object by name window

3. To continue search press the Enter key (or the Previous and Next in the search window).
4. To stop search and close the window, press the Esc key.

To find objects by their type and ID, do the following:


1. In the Object Tree call object/group context menu, then select Find by ID.
2. In the search window (see Figure 61) select object type and enter ID of required object and press the
Enter key or click on the Search button. If the object with such type and ID exists, it will be selected
in the Object tree.

Figure 61. Searching by ID Window

3. To stop search and close the window, press the Esc key.

6.2.1.7 Favorite Objects

Frequently used objects can be added to the Favorites for quick access. Click the (Favorite objects)
button on the Administration toolbar to open the Favorite objects panel (see Figure 62). To add an object
to the Favorites open its context menu and select Add to favorites option. To remove object from the
Favorites select Remove from favorites option in the context menu. Objects that were added to the
Favorites are marked in the Object tree, the Favorite objects panel and the Object search panel with the
sign.

www.issivs.com
SecurOS 81 Administration Guide
SecurOS Administration Overview

Figure 62. Favorite Objects

Note. Every SecurOS or AD/LDAP user has unique Favorites list that is only available at the computer where
it was created.

Click the (Favorite objects) button again to close the Favorite objects panel.

6.2.1.8 Objects Requiring Configuration


In Linux OS the functionality is not supported.

If there are problem objects in the system (objects whose settings require changes for the correct
functioning of the given or related objects), the Administration Center looks as follows (see Figure 63):

www.issivs.com
SecurOS 82 Administration Guide
SecurOS Administration Overview

Figure 63. Administration Center appearance if there are problem objects within the system

The red banner is displayed between the Toolbar and the Object Tree. The banner displays the Objects
requiring configuration: string and number of such objects in the Tree. Problem objects are marked
with the icon. To search for problem objects in the Objects Tree use the buttons located on the right
side of the banner. The search will be performed in the selected direction, starting from the currently
active object.

Note. The banner can be hidden by clicking the button on the left. Working with the Object Tree will
continue as usual. In this case, the hidden banner will be displayed automatically with each next call of the
Administration Center.

The description of the problem is displayed directly in the settings window for the problem object, for
example, see Figure 64.

www.issivs.com
SecurOS 83 Administration Guide
SecurOS Administration Overview

Figure 64. User Account problem object settings window

6.2.2 Working with Object Table Parameters

Object setting window can include both single parameter text boxes and tables. Example of the table
parameter (Holidays) is shown on figure 65.

Figure 65. Example of the object table parameter

When working with table parameters the following methods are used:
· To add several entries into the table, use 
key on the keyboard or click mouse below the last entry
in the list.
· To delete an entry from the table, select the required row and press the Delete keyboard key.

www.issivs.com
SecurOS 84 Administration Guide
SecurOS Administration Overview

6.2.3 Working with Checkbox List

Checkbox list in object settings may contain big number of elements and consist of several levels. The
example of checkbox list parameter (Media Client, Cameras Tab) is shown on the Figure 66.

Figure 66. Example of checkbox list parameter

To configure checkbox list parameters the mass selection/deselection feature is provided:


· To select or deselect all child checkboxes, select/deselect the checkbox of the parent element.
· To select or deselect several checkboxes at once click on the first checkbox. Press and hold the Shift
key and click on the second checkbox to select/deselect both clicked checkboxes and all checkboxes
between them.

www.issivs.com
SecurOS 85 Administration Guide
SecurOS Administration Overview

Mass selection feature works in accordance with following rules:


· Mass selection is possible only within the same tree level.
· State of the second checkbox defines the result of mass selection. For example, if the checkbox
clicked with pressed Shift key was already selected, it becomes unselected as well as the other ones.
· The second checkbox defines start position for the next mass selection operation.

6.2.4 Adding IP Devices

To manage a network IP device from SecurOS one need to do the following:


1. Connect the new device to the physical network. When connected, the IP device will be assigned
with IP address and, if necessary, some other parameters.
2. In the SecurOS Object Tree create objects that correspond to the type of the connected device (Video
Capture Device with a child Camera or Audio Capture Device with a child Microphone).
3. Configure created objects, i.e. enter the IP addresses assigned to devices when they have been added
to the physical network, and specify other parameters for accessing devices (for example, password
and user name).

After performing the operations above, the device can be controlled from SecurOS.

An IP device can be added to the SecurOS Object Tree in several ways:


· Adding by Copying.
· Adding using the IP device Manager.
· Adding using Administration Center.

Adding by Copying
When adding by copying, both Administration Center and IP Device Manager are used. This method
is used to add to the SecurOS Object Tree a large number of devices with similar parameters (for
example, many cameras of the same Type and Model, for which only the last digits of the IP address
differ).

To add many devices by copying:


1. Use Administration Center to create one device and its child object in the Object Tree (see Creating
Objects). For example, Video Capture Device and Camera.
2. Configure added objects (see Video Capture Device, Camera, Editing Object Settings).
3. Use IP device Manager to copy created objects (see Copying IP Device).

Note. When copying, the settings of the copied devices are completely duplicated in newly created devices.
This is useful, for example, if all such devices have the same purpose in the SecurOS security network.

4. Tweak the settings of the created devices in the SecurOS Object Tree manually.

Adding using the IP device Manager


Using the IP Device Manager one can add a large number of devices of different types with different
settings to the SecurOS Object Tree. To add IP device (-s), perform the Searching Devices in the
Network and Adding IP Device operations.

Warning! When added, many device parameters take their default values. If necessary, configure the added
devices manually (see Editing Object Settings).

www.issivs.com
SecurOS 86 Administration Guide
SecurOS Administration Overview

Adding using Administration Center


Administration Center is usually used to add to the SecurOS Object Tree a small number of IP devices
with very different settings (for example, cameras of different types). To add a camera, create and
configure the Video Capture Device and Camera objects (see Creating Objects). To add a microphone,
create and configure the Audio Capture Device and Microphone objects (see Creating Objects).

6.2.5 IP-Device Manager

The IP-Device Manager is designed to search for IP devices within the SecurOS security network and to
add them to the system configuration.

The search is performed with the help of standard network technologies (see Searching Devices in the
Network section) within the local network of the Computer, which is running the Manager. All found
devices are assumed un-tuned; you can perform the following operations with such devices:
· Adding IP Device;
· Editing IP Device Parameters.

With devices that are already registered in the network (with the help of the Manager or by standard
tools) you can perform the following operations:
· Editing IP Device Parameters;
· Deleting IP Device.

www.issivs.com
SecurOS 87 Administration Guide
SecurOS Administration Overview

6.2.5.1 Specification
The main application window is shown on figure 67.

Figure 67. IP-Device Manager

The window consists of the following controls (see table 3):

Table 3. IP-Device Manager controls

Parameter Description

System IP-devices

www.issivs.com
SecurOS 88 Administration Guide
SecurOS Administration Overview

Parameter Description

The Object Tree consists of Computers having the Video Server role
that exist within the SecurOS network. When expanding the Video
Server node all Video Capture Device child objects including their
Camera child objects are displayed. If a device has integrated audio
or it is configured to operate in the synchronized recording mode
(see Synchronized Audio/ Video Recording and Playback section), all
appropriate Microphone objects are also displayed in the tree.
Object Tree
Notes:
1. Objects which settings are currently being edited are
displayed in the Object Tree in italic.
2. Objects that are disabled in SecurOS, are displayed in the
Object Tree in grey (shaded out), similarly to inactive
Windows objects.

Object Settings

Name of the object selected in the Object Tree (see above).

Name Note. Object names are restricted with the following:


1. Name cannot be empty.
2. Name should be unique.

Type and model of the device, selected in the Object Tree. The
Type, Model
Information field is not editable by the user.

IP address IP address of the device.

Login/Password to access the device. By default when a device is


added, the values are assigned to admin/admin.
Login, Password Warning! If login and password were assigned earlier (when device was
physically added to the network) through the web interface of the device,
then enter the given values. Otherwise access to the device will be denied.

Check the box if the added device is an IP video server/encoder


with more than 1 physical video input, or an IP camera with several
lenses.

Limitations. To use this functionality the system must meet the


Multichannel device
following conditions:
1. The device should support several independent video
streams.
2. The device integration should support multichannel
systems.

Number of used independent video channels of the multichannel


device.
Number of channels
Note. Max number of video channels depends on the device Type and
Model.

www.issivs.com
SecurOS 89 Administration Guide
SecurOS Administration Overview

Parameter Description

Check the box, if you want to use the device's audio inputs (or
integrated microphone). Max number of audio channels depends on
the device Type and Model and are defined in the device
integration. In general, the number of audio channels ≤
number of the video channels.
Use audio inputs
Limitations. To use this functionality the system must meet the
following conditions:
1. Device must be equipped with audio inputs.
2. Device integration in SecurOS should support audio.

Buttons

Delete Delete a Video Capture Device, selected in the Manager's Object Tree.

Copy a Video Capture Device, selected in the Manager's Object Tree


Copy
(see Copying IP Device).

Save the newly entered or edited device settings (Discard changes


while saving previous settings).

Notes:
1. The buttons are enabled only if settings were assigned /
Apply (Cancel) edited in the Settings and/or Usage tabs.
2. If the current settings were edited and the Close button
was clicked before these new settings were saved or
canceled, the system will display a message to save the
changes.

New IP-devices

Start searching for non-configured IP devices in the local network of


Search
the SecurOS Computer, that's running the IP-Device Manager.

Select the Video Server in the Object Tree for which a new Video
Capture Device, associated with the network IP device selected below
Add devices to video server (see Table of IP-devices below) will be created and where the video
archive of this device will be created and stored. The Computer that's
running the IP-Device Manager is selected by default.

The table contains found non-configured IP devices.

Note. An IP device is assumed non-configured, if there is no parent


Video Capture Device in the SecurOS network, that has an IP address
specified in the IP address field (see below).

Table of IP-devices · IP address — IP address of the found device.

Note. If a port number was defined for the device at the initial IP
address assignment process, it is displayed in this field in standard
format (for example, 192.16.0.185:8080).

www.issivs.com
SecurOS 90 Administration Guide
SecurOS Administration Overview

Parameter Description

· Type — type of the IP device. Filled in automatically based on the


discovery results.

· Model — model of the IP device. Filled in automatically based on


the discovery results.

· Add — add the selected network IP device to the specified Video


Server.

Once all required tasks are completed, the IP-Device Manager window can be closed by clicking the
Close button.

6.2.5.2 Basic Operations


This section describes the following operations performed with the help of the IP-Device Manager:
· Searching Devices in the Network;
· Adding IP Device;
· Editing IP Device Parameters;
· Copying IP Device;
· Deleting IP Device.

Warning! If the connection with the Configuration Server is lost, all operations are blocked until the
connection is restored.

6.2.5.2.1 Launching IP-Device Manager


To launch the IP-Device Manager do the following:
1. Open Administration Center.

2. On the Administrator Toolbar (see Figure 68) click on the (IP-Device Manager) button.

www.issivs.com
SecurOS 91 Administration Guide
SecurOS Administration Overview

Figure 68. Launching IP-Device Manager

Notes: IP-Device Manager button is disabled in the following cases:


1. Setting window of any SecurOS object is opened.
2. Connection with the Conf iguration Server is lost.

3. System will display the IP-Device Manager window (see Specification).

Warning! When the IP-Device Manager window is active, the SecurOS object settings mode is blocked ( i.e. it
is impossible to open a object settings window from the SecurOS Object Tree).

6.2.5.2.2 Searching Devices in the Network


To search devices in the network the Universal Plug & Play technology is used. Search parameters are
completely defined by the UPnP internal mechanism with no restrictions (for example, by search
duration) on the SecurOS side.

To search IP devices in the SecurOS network do the following:


1. Enter the Administration Mode and launch the IP-Device Manager.
2. In the New IP-devices block click the Search button. The system will perform the search and display
all found devices in the Table of IP-devices (see Figure 69).

www.issivs.com
SecurOS 92 Administration Guide
SecurOS Administration Overview

Figure 69. Device search results

Additional Information
When placing the mouse cursor over the IP address field an informational message containing the device info will
be displayed. Typically, the message's string consists of three fields in the following format: <Device
Manufacturer> <Device Model> (<Device Name>). For example, Beward BD2570
(H.264 5M box camera).

Warning! The Table of IP-devices displays all found network devices, including printers, scanners, etc.

6.2.5.2.3 Adding IP Device


To add an IP device do the following:
1. Enter the Administration Mode and launch the IP-Device Manager.
2. In the New IP-devices block of the Manager window click the Search button. After the query is
finished, the Manager displays the list of un-tuned devices in the Table of IP-devices.
3. In the Add devices to video server field, select the Computer of the SecurOS network, where the
device should be added.
4. In the Table of IP-devices, select the device which should be added to the network, then do the
following:
· For an unrecognized device (only IP address is determined):
- In the selected device row click the Type cell, and in the drop-down list select device type
(see Figure 70).

www.issivs.com
SecurOS 93 Administration Guide
SecurOS Administration Overview

Figure 70. Select the Type of device

- Click the Model cell, and in the drop-down list select the model of the device. Select default if
there is no required model in the list. System will activate the Add button.
· For a recognized device (IP address, Type and Model parameters are determined):
- Select the device from the Table of IP-devices.
· For the arbitrary device (there is no device information in the table):
- Click the Type cell in the last (empty) table row, and in the drop-down list select the device type.
- Click the Model cell, and in the drop-down list select the model of the device.
5. Click the Add button.

Note. If the device can't be added due to license restrictions or if the connection with the Conf iguration Server is
lost, the system will display a corresponding informational message.

The system will create a new Video Capture Device with specified parameters and add it to the Manager's
Object Tree to the selected Computer, the added device will be currently selected in the device tree. A
Camera child object will be created for the added Video Capture Device automatically. You can edit it's
parameters in the Administration Mode from the SecurOS Object Tree.

Note. The default name for each added device is Video Capture Device N, where N — next sequential
digital identifier of the given type of object.

6. Further execute the Editing IP Device Parameters operation.

6.2.5.2.4 Editing IP Device Parameters


To specify/edit device settings do the following:
1. In the Manager's Object Tree select the device whose settings you wish to specify/edit.
2. Edit device settings in the Object Settings block (see Figure 71):

www.issivs.com
SecurOS 94 Administration Guide
SecurOS Administration Overview

Figure 71. Setting up audio inputs

· If necessary, change device name in the Name field.


· If necessary, specify or edit IP address.
· If necessary, change default Login/Password to access the Video Capture Device (admin/admin).
· In case of a multichannel device, activate the Multichannel device checkbox and specify the
required number of channels. Depending on the specified value, the appropriate number of Camera
objects will be created. The created objects will be child objects of the given Video Capture Device in
the SecurOS Object Tree, which will also be displayed in the Manager's Object Tree. The Camera with
the minimal identifier will be assigned to a Channel number equal to 1, additional channels are
numbered with increments of 1.
· If the added device supports audio, activate the Use audio inputs checkbox. An Audio Capture
Device with one or more (for multichannel device) Microphone child object(s) will be automatically
created in the SecurOS Object Tree. In the Manager's Object Tree such microphones will be linked
with the appropriate number of device's cameras (see Figure 71), and in the SecurOS Object Tree will
be specified in the settings of the appropriate Cameras.
3. Click Apply button.

6.2.5.2.5 Copying IP Device


Operation allows to create up to 99 copies of the configured Video Capture Device that exists within
SecurOS.

The following main parameters and child objects of the selected source object will remain intact for each
copy:
1. device Type;
2. device Model;
3. other parameters, that are specified by device Type and Model;
4. child Cameras. Number of the child Cameras of the each copy will correspond to the number of
Cameras child to the source device.

www.issivs.com
SecurOS 95 Administration Guide
SecurOS Administration Overview

The following associated objects and parameters are not copied:


1. Audio Capture Devices.
2. Microphones.
3. The following parameters of the Camera:
· Microphone;

Note. Built-in microphones are exceptions. So, if the Microphone parameter in the Camera settings is set to
Built-in (see Audio Tab), this Microphone and its all parameters are copied without restrictions.

· Presets;
· Tours;
· Wiper;
· Washing Kit;
· Zones. The one Zone is created by default (Main).

To copy Video Capture Device do the following:


1. In System IP-devices block (see Specification) select an object, that you want to copy.

Warning! You cannot copy device, which settings are not saved with the IP-Device Manager.

2. Click the Copy button. Depending of the type of the selected Video Capture Device system will
display one of the following Copying window (see Figure 72.

Figure 72. Copying window for the IP Cameras

3. Select a Video Server, where new devices will be added to, specify a Number of copies or range of
IP addresses, that will be assigned to the created devices. Click the OK button.

Note. If a Port was specified in the IP address parameter of the device is being copied, then this port will be
set for each device copy with no changes.

4. System will create required number of copies of the initial device on the specified Video Server.
5. If necessary, configure each created device copy on the Settings tab. Click the Apply button.

www.issivs.com
SecurOS 96 Administration Guide
SecurOS Administration Overview

6.2.5.2.6 Deleting IP Device


To delete an IP device do the following:
1. Enter the Administration Mode and launch the IP-Device Manager.
2. In the Manager's Object Tree select the device you want to delete.
3. In the System IP-devices block click the Delete button. The selected device will be deleted from all
Video Servers along with all child or linked objects.

6.3 Users and Rights


Restriction of the access to the SecurOS objects and operations with them is based on the access rights
assigned to each user. Users and their access rights can be specified both at the initial system
configuration (see Initial Configuration Using The System Configuration Wizard) and at the further
system operation (see User Registration and Configuring User Rights).

The following SecurOS objects are used to control users and their rights:
· Department — is used to group Users, for example, depending on user's role within the system.
· User Account — serves for the creation of the SecurOS's user personal account (contains login and
password that are used for authorization in the system).
· Active Directory / LDAP — this object provides authorization in SecurOS for the Windows users
registered in the Windows Active Directory domain.

Warning! In Linux OS the Active Directory / LDAP functionality is not supported.

· User Rights — is used to assign users (both native SecurOS Users and OS users) Access rights to
SecurOS objects and operations with them. For the details see User Registration and Configuring
User Rights.

Detailed information about users, their rights, SecurOS objects used for configuration is given in the
following sections:
· SecurOS Users;
· User Registration and Configuring User Rights;
· Configuration of Network Domain User Rights.

6.3.1 SecurOS Users

The following users can log in and work with SecurOS:


· SecurOS Superuser;
· Typical user of the SecurOS;
· OS user registered in domain.

SecurOS Superuser
Superuser account is created during initial system configuration via System Configuration Wizard and
has the root (user name) and password specified by the administrator (securos by default)
credentials. The set of the rights of such account gives user the full access to all system objects and the
right to execute any actions in the network. Objects of the superuser account aren't displayed in the
SecurOS Object Tree; to change the name and the set of the superuser rights is impossible.

www.issivs.com
SecurOS 97 Administration Guide
SecurOS Administration Overview

Warning! Superuser password can be changed with the help of Wizard (see 4 in the Initial Configuration
Using The System Configuration Wizard) or further at system operation (see Changing Superuser
Password).

Typical user of the SecurOS


Typical SecurOS user account can be created both via System Configuration Wizard and further system
operation. The operations for creating a typical user account and setting up its rights are described in
the User Registration and Configuring User Rights.

OS user registered in domain


In addition to the pointed above users, any user of Windows operating systems registered in the
Windows Active Directory domain can work with SecurOS. The operations of registering such user in
SecurOS and configuring his rights are described in the following sections:
· User Registration and Configuring User Rights;
· Configuration of Network Domain User Rights.

6.3.1.1 Changing Superuser Password


To change superuser password:
1. Log on the system using superuser credentials ( SecurOS Users).
2. Open settings window for the root System object (see Figure 73).

www.issivs.com
SecurOS 98 Administration Guide
SecurOS Administration Overview

Figure 73. System object settings window

3. Use text boxes of the Superuser password block to type and confirm new password. Click OK
button to save the changes.

Warning! Minimum superuser password length is 7 characters. After changing the password, keep it a secret.

6.3.2 User Registration and Configuring User Rights

Warning! If there are no other Users in the system except the Superuser (see SecurOS Users, access to the
system will be granted without taking into account the user name and password.

To create and configure new user accounts the following system objects are used:
· Department object (Security Zone ®
Users & Permissions group ®
Department) — contains a list
of the User object. The name of each User object is used at authorization as the User parameter.
User's Password is specified in the appropriate User Account object settings. New users can be
registered both in the given Department object, and in any other Department object created by the
system administrator.

www.issivs.com
SecurOS 99 Administration Guide
SecurOS Administration Overview

Note. Department object is created in the object tree only if Power user or Simple user were added during system
configuration with the help of System Configuration Wizard.

· Users & Permissions group (Security Zone ® Users & Permissions group) — contains the User
Rights objects. Each of the existing User Rights objects can be used repeatedly (i. e. can be assigned to
any user). This group contains two predefined set of user rights (Rights f or Power User and Rights f or
Simple User) which differ in the level of access to objects and operations with them.

User registration and user rights configuration procedures are described in the following sections
below:
· New user registration;
· Assigning rights to a user/ user group;
· Checking the possibility of authorization of the specified user of the OS network domain.

New user registration

Note. The procedure for registering in SecurOS an OS user registered in an Active Directory domain is
described in the Configuration of Network Domain User Rights.

To register in SecurOS a new SecurOS user do the following:

Warning! If system contains more than one Security Zone it is necessary to define user and his rights for each
of these zones. Users registered in the separate Security Zone can log on only the Computers that are children to
the given Security Zone. Superuser (see SecurOS Users) can log on any computer that belongs to any Security
Zone.

1. In the Users and Permission group create a new Department object or use existent.
2. Create an User object children to the selected Department.
3. In the Parameters of created object window in the Name field specify user name that will be used
for the authorization (see Figure 74).

Figure 74. Parameters of created object

4. In the object settings window (see Figure 75) specify required Password that will be used for the
authorization. Specify other parameters, if necessary (for the details see User Account).

www.issivs.com
SecurOS 100 Administration Guide
SecurOS Administration Overview

Figure 75. User Account object settings window

5. Save changes.

Assigning rights to a user/ user group


To implement the security scheme with user access restrictions:
1. Plan how many different levels of access your Security Zone should have, and what users will have
each of these levels of access.
2. Create required number of the User Account objects (see New user registration).
3. In the Users and Permissions group create User Rights object or use one of the predefined set of the
user rights (Rights for Power User/Rights for Simple User).
4. In the User Rights object settings window (see Figure 76):
· For each SecurOS object in the object tree (is placed at the top of the window) specify access level.
The specified access level will be assigned to each user from the Users and Groups having these
rights section list.

Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.

· Select required checkboxes.


· In the Providers list select provider database of which stores user accounts.
· In the Users and Groups having these rights section list, specify users that should have this rights.
Depending on selected Provider the list of users to whom the custom rights will be assigned is
formed differently:

- for the SecurOS users — click the button and select a new entry in the list with a double-click.
Select the required user from the drop-down list.

www.issivs.com
SecurOS 101 Administration Guide
SecurOS Administration Overview

Figure 76. User Rights object properties window

- for the Windows users registered in the Active Directory network domain — configuring rights
for the OS user group are described in the Configuration of Network Domain User Rights.

5. Repeat steps 2 - 4 for each Security Zone within your network. For each Security Zone SecurOS Object
Tree will contain elements shown in figure 77.

www.issivs.com
SecurOS 102 Administration Guide
SecurOS Administration Overview

Figure 77. Objects Tree with Department, User Accounts and User Rights objects

Checking the possibility of authorization of the specified user of the OS network domain
One can test the possibility of the authorization of the specified user of the OS network domain in the
User Rights object settings window. To perform the test do the following:
1. Configure the OS user rights (see Configuration of Network Domain User Rights).
2. In the Access testing block (see Figure 78):

Figure 78. Access testing block

· Enter the User name of the OS user for which it is necessary to check the possibility of the
authorization in SecurOS;
· Click the Test button.

The following is analyzed when testing is performed:


· correctness of the selected provider settings (see Active Directory / LDAP);
· correctness of the specified LDAP filter to define user/user group (when using LDAP provider);
· presence of the specified user/user group's account in AD.

3. Testing may complete with the following outcomes:


· Access granted — settings are correct. This OS user will be able to authorize in SecurOS;

Warning! Access level to the Computer object specified the in the configured User Rights is not taken into
account when checking.

www.issivs.com
SecurOS 103 Administration Guide
SecurOS Administration Overview

· Access denied — settings are incorrect or specified user is not registered in OS domain;
· Check failed — domain controller request timeout exceeded.

The ability to authorize the specified native SecurOS user can be checked in a similar way.

6.3.3 Configuration of Network Domain User Rights

In this section the Active Directory / LDAP (see Active Directory / LDAP) and User Rights object
configuration procedure is described for the domain provider (Windows NT or LDAP) that receives the
SecurOS user authorization request. Contains the following parts:
· Settings for Windows NT Provider;
· Settings for LDAP Provider.

Note. Active Directory authorization is possible only if computer of SecurOS network is a part of Windows
Active Directory domain.

6.3.3.1 Settings for Windows NT Provider

To set domain parameters for Windows NT provider:


1. In Active Directory / LDAP (see Active Directory / LDAP) object settings window choose Windows
NT (local or domain) value from the Provider drop-down list.
2. Select Use primary domain controller checkbox to use primary domain controller where the
computer is registered, or fill in the Server field with IP address of domain controller server. You do
not need to fill the Port field (port for Windows NT provider).
3. Select Use credentials provided at system login checkbox to connect domain controller using
current MS Windows login and password, or fill in the User name and Password fields (specified
user must be defined for domain controller, see item 2).

To set the rights for specific user, open the User Rights object settings and add an entry with system
name of Windows user (e.g., J-Smith) to the Users and Groups having these rights section list.

To set the rights for a user group, open the User Rights object settings and add an entry with system
name of Windows group with ,group postfix without spaces (e.g., Users,group) to the Users and
Groups having these rights section list. The ,group postfix must be used.

6.3.3.2 Settings for LDAP Provider

To set domain parameters for LDAP provider:


1. In Active Directory / LDAP (see Active Directory / LDAP) object settings window choose LDAP
(domain) value from the Provider drop-down list.
2. If necessary, select the Use encryption checkbox to encrypt data when interacting with the domain
controller.
3. Select Use primary domain controller checkbox to use primary domain controller where the
computer is registered, or fill in the Server field with IP address of domain controller server. For
non-standard server settings, specify the port number in the Port field.

www.issivs.com
SecurOS 104 Administration Guide
SecurOS Administration Overview

4. Select Use credentials provided at system login checkbox to connect domain controller using
current MS Windows login and password, or fill in the User name and Password fields (specified
user must be defined for domain controller, see item 3).

To set the rights for specific user, open the User Rights object settings and add the following entry to
the Users and Groups having these rights section list:

&(objectClass=user)(sAMAccountName=J-Smith)

where the user name (for example, J-Smith) is specified.

To set the rights for a user group, open the User Rights object settings and add the following entry to the
Users and Groups having these rights section list:

&(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-dev,dc=test)

where Builtin — system folder where the Users group is located.

6.4 SecurOS Logging

In operation, SecurOS provides continuous system logging. Data recording is done separately by each
of the servers in their own, local database. By default, each server stores information about all the
events occurring within the system. Database retention period, that is common for all servers within the
system, is specified in the Security Zone object settings.

Additionally, specific rules of data recording and storage can be specified for each of the system servers
in the Local database parameter block of the Computer object settings:
· List of events allowed to be recorded into the database — only events specified in the Event Filter
object settings will be recorded into the local database. Use Event filter parameter is used to specify if
event filter should be applied while recording;
· Database size — restriction on the local database size. Is specified in the Maximum Protocol DB size
parameter. If specified value is reached then information is re-recorded in ring mode — the oldest
protocol records are deleted first. If maximum is not reached, then common for all system servers
database retention period value is considered;
· Disable recording into the database — if this mode is on, then no information is recorded into the
local protocol database. Is specified in the Disable saving data into local Protocol DB parameter.

To view protocol database records the Event Viewer interface object is used. Event Viewer interface
object window displays information from database of the server to which you are connected. For the
Video Server this is it's own, local protocol database of the corresponding computer, and for the Operator
Workstation — database of that Video Server, to which operator's computer is connected. Thus if Operator
Workstation is connected to the servers where different rules of the database information recording and
storage are specified, then different information can be displayed in the Event Viewer interface object
window.

Database access control is ensured by the PostgreSQL DBMS access control system, eliminating the
possibility of unauthorized modification or deletion of records by a simple user. Event Viewer interface
object cannot be used for unauthorized data modification or deletion.

www.issivs.com
SecurOS 105 Administration Guide
SecurOS Administration Overview

6.5 Updating License Key on All Servers


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

To update license key on all servers:


1. Copy the latest version of the key.iss to the SecurOS program directory on the Conf iguration Server.
2. System will automatically update the license key on any of the Peripheral Server when given server
will connect to the Conf iguration Server for the next time.

Additional information
Outdated license key is stored in the SecurOS installation root directory in the key.iss.bak file.

Warning! After license key was updated on the Peripheral Server SecurOS program may automatically reboot.

6.5.1 License Expiration Reminder

All workstations can be configured to notify simultaneously about license key file expiration date.

If less than certain days remain before license expiration then an information window will appear on
each workstation during operator working (see figure 79). Operator may close the window and
continue working.

Notification window appears with a certain periodicity (e. g. three times a day, with three hours
between messages).

Figure 79. License expiration information window

To setup notification parameters, do these steps on each computer where reminder window should
appear:
1. Open the client_config.xml file located in directory %ProgramData%\ISS (for Windows OS)
or /var/opt/securos/ (for Linux OS).
2. Insert the following parameters into the <Main> section:
· DaysForRemaining — specify a number of days before license expiration date to begin operator
notification;

www.issivs.com
SecurOS 106 Administration Guide
SecurOS Administration Overview

· RemaindersPerDay — specify a number of notifications per day;

Warning! Zero value of this parameter results in that the reminder window will be never displayed!

· MinRemaindPeriod — specify a minimal time interval (in minutes) between two notifications
(must be no less than 30).
3. Save the changes and close the file.

Listing 1. client_config.xml example

<?xml version="1.0" encoding="UTF-8" standalone="no"?>


<client>
<params name="Common">
<param name="CoreAddress" value="localhost"/>
</params>
<params name="Main">
<param name="AutoLogin" value="false"/>
<param name="CoreRestartTimeout" value="30000"/>
<param name="CurDayRemaindCount" value="0"/>
<param name="DaysForRemaining" value="15"/>
<param name="KeepCoreAlive" value="true"/>
<param name="KeepProcessesAlive" value="true"/>
<param name="LastRemaind" value="2013-03-22 13:58:39"/>
<param name="LastUser" value="root"/>
<param name="MinRemaindPeriod" value="180"/>
<param name="ProcessWaitTimeout" value="30000"/>
<param name="RemaindersPerDay" value="10"/>
</params>
<params name="ServersList">
<param name="0" value="192.168.3.35"/>
</params>
<params name="UserServersList">
<param name="0" value="192.168.3.35"/>
<param name="1" value="192.168.0.51"/>
<param name="2" value="s-zhulev"/>
</params>
</client>

6.6 Health Monitor self-diagnostic Module

The Health Monitor self-diagnostic Module is designed for system monitoring to identify different
issues.

Working procedures are described in the following subsections:


· Configuring and Launching.
· Operation Modes.
· Health Monitor Window.
· Diagnosed issues.

Configuring and Launching


Parent object — Computer.

www.issivs.com
SecurOS 107 Administration Guide
SecurOS Administration Overview

Figure 80. Health Monitor object settings window

Table 4. Health monitor object settings

Parameter Description

Use this checkbox to select new problem notification mode:

· checkbox is not selected (default value) — Autoinforming


Do not show the mode — a pop-up window is used to inform operator about
notification window when new issues.
there are new problems
· checkbox is selected — Silent informing mode — an
application icon in system tray is used to inform operator about
new issues.

The Health Monitor can be located on any Computer within the network (Video Server or Operator
Workstation) and, regardless of location, allows you to monitor the state of the whole system.

After application is started its icon is displayed in system tray. Icon appearance indicates current system
state:
· — there are no issues;
· — there are issues;
· — a new issues were discovered (is used only for Silent inf orming mode). Displays the total
number of problems that occurred after the previous Health Monitor window session was closed.

Operation Modes
Depending on object settings (see Configuring and Launching) one of two modes is used to notify
operator about new issues:
· Autoinforming mode (pop-up informer window is used for informing) — when a new problem
occurs, the informer window that contains the list of problem objects and a brief description of the
problem is automatically displayed (see Figure 81). If there are no new problems, the informer
window will automatically hidden in 10 seconds. If informer window is hidden, one can call it by
clicking application icon in system tray;
· Silent informing mode (application icon in system tray is used for informing) — when total
number of problems changes, the system automatically updates the problem counter ( ) on the
application icon (see Figure 82). To view list of current issues call informer window by clicking
application icon.

www.issivs.com
SecurOS 108 Administration Guide
SecurOS Administration Overview

Figure 81. New issues informer window

Figure 82. Informing with the help of application icon

To view issue details description call Health Monitor window by clicking required one in the informer
window list. Informer window can also be called from the context menu of SecurOS icon in system tray
(see Figure 83).

Figure 83. Open Health Monitor Window

Health Monitor Window


This window displays detailed information about problem objects. Appearance of the window is
represented in Figure 84.

www.issivs.com
SecurOS 109 Administration Guide
SecurOS Administration Overview

Figure 84. Health Monitor Window. Table view

Note. When window is opened for the first time, then Table view is used.

Window contains the following components and controls:


· Problem objects data block — contains data about problem objects within the system. In this block
information can be displayed in Table or Tree view;
· Problem detailed description block — contains details about problem appearance and
disappearance conditions. This detailed information is displayed after issue is selected in Problem
objects data block or informer window problems list;
· Status bar — contains total number of issues and problem objects within the system;

· (Table) button — use Table view for data presentation;

· (Tree) button — use Tree view for data presentation.

Note. Current view of data representation is indicated by a turquoise button.

Table view
Appearance of the Health Monitor window when table view for data representation is used is shown in
Figure 84. Data is located in the following columns:
· Object type — type of the problem object;
· Object name — id and name of the problem object;
· Server — id and IP address of the Video Server where problem appears. If IP address is not specified
in the Computer object settings, then the "IP address is not set" string is displayed in the
cell;
· Problem type — name of the problem that occurred on the specified object;

www.issivs.com
SecurOS 110 Administration Guide
SecurOS Administration Overview

· Date and Time — problem date and time in OS format. Problems of the current day is marked with
the "Today" word.

One can change table columns width. To do this place mouse pointer over columns separator. Pointer
will be changed as it represented in Figure 85.

Figure 85. Changing table column width

Press the mouse button, and while holding it down, move the cursor in the required direction.

Note. Width of the last table column can not be changed.

Table data can be sorted by ascending/descending by column value. To sort table entries by any field,
click required column in the table head, then click the "up arrow/down arrow" icon (see Figure 86).
Table entries will be sorted by ascending/descending order in selected column.

Figure 86. Sorting list

Tree view
Appearance of the Health Monitor window when tree view for data representation is used is shown in
Figure 87.

www.issivs.com
SecurOS 111 Administration Guide
SecurOS Administration Overview

Figure 87. Health Monitor Window. Tree view

SecurOS objects with current problems are represented as a tree and grouped in eight main nodes,
representing the object type or SecurOS Intelligent Module: Systems, Video Servers, Concentrators,
Cameras, Microphones, Sensors, Remote systems, SecurOS Auto and SecurOS Cargo. The number of objects
of the given type is displayed to the right of the node name. The total amount of objects of the given
type within the SecurOS network is additionally displayed for the Video Servers node. Within the node
problem objects are grouped by video server name. The total number of problem objects of given type is
displayed to the right of the video server name.

One can use address bar of the Problem detailed description block to quickly navigate through the
branches of the Problem objects tree. To jump to the required level, simply click it (see Figure 88).

Figure 88. Navigation through Problem objects Tree from address bar

After such a jump is finished, all problem objects located on the selected level (for example, Cameras,
see Figure 89) will be displayed in the Problem detailed description block. To jump to detailed
description of the problem for any Camera, simply click this camera. Using this method one can move
through any branches within selected node of the Problem objects Tree.

www.issivs.com
SecurOS 112 Administration Guide
SecurOS Administration Overview

Figure 89. Result of moving through the levels

Diagnosed issues
Module can identify problems with different level of importance. List of issues to be detect and detailed
problem description is presented in the following sections corresponding to the nodes of the Problem
Objects Tree):
· System;
· Video Server;
· Camera;
· Microphone;
· Sensor;
· Remote system;
· SecurOS Auto (see SecurOS Auto User Guide);
· SecurOS Cargo (see SecurOS Cargo User Guide);
· SecurOS EDBE (see SecurOS EDBE User Guide).

6.6.1 System

The following problem is diagnosed for the System object:

Unconfigured objects
· The message appears if some configuration objects' settings must be updated. Go to the object tree
to see the objects with problems.
· The message disappears if all settings are updated.

One can find unconfigured objects using SecurOS Object tree (see Objects Requiring Configuration).

6.6.2 Video Server

The following problems are diagnosed for the Video Server object:
· Database Partitioner: DB is not available;
· Database Partitioner: invalid DB schema;
· Database Partitioner: invalid settings;
· Database Partitioner: failed to access database;
· Database Partitioner: errors on partitioning;
· Image Processor: task queue overloaded;

www.issivs.com
SecurOS 113 Administration Guide
SecurOS Administration Overview

· REST API: image export queue overloaded;


· REST API: event queue for subscribers overloaded;
· Archive was deleted because of insufficient drive space;
· Archiver: drive is unavailable;
· Archiver: file is corrupted;
· Archiver: archive write error;
· Audit database is not available;
· Video subsystem database is not available;
· ACS database is not available;
· Events database is not available;
· BOLID: time is not synchronized;
· Product version on Server does not match the one on the Configuration Server;
· More than one Configuration Server was found in the system;
· Traffic rules violation detector: detector execution error;
· Server configuration is not up to date: update queue is currently overloaded;
· Critical CPU load;
· License expires in 24 hours;
· Give way to pedestrians detector's and LPR settings do not match;
· Failed to load synchronized files;
· Failed to record metadata to Video subsystem database;
· Failed to start Movable PostgreSQL;
· Failed to connect iSCSI drive;
· Failed to access Remote system;
· Insufficient write speed;
· Insufficient speed of writing data to replicated database;
· Low free space on system drive;
· Not enough memory;
· There are unanalyzed dump files;
· Drive is not available;
· ACS is not available;
· Long-term archive file is corrupted;
· Disconnected;
· Event queue overloaded;
· Archive write error;
· Audio archive write error;
· Alarms write error to Database;
· Application start error;
· Configuration update failed: Modules installed on servers do not match;
· Crossroad: GNSS Receiver is not synchronized;

www.issivs.com
SecurOS 114 Administration Guide
SecurOS Administration Overview

· Crossroad: Incorrect LPR: License plate recognizer settings;


· Database query loss - insufficient database speed;
· Remote System objects exceed license limitations;
· Databases Replicator: replicated data mismatch;
· Databases Replicator: error while writing into database;
· Replicated database is not available;
· Diagnostics server: statistics saving DB request queue is overloaded;
· Configuration Server is not available;
· ACS: time isn’t in sync;
· Stereo: People detector. Module execution error;
· MCC DC Gateway: Gateway Video Server for live video is unavailable.

Database Partitioner: DB is not available


· The message appears if the connection with module database is lost.
· The message disappears immediately after restoring the database connection.

Database Partitioner: invalid DB schema


· The message appears if the database schema does not match the system requirements.
· The message disappears when conflict with requirements is resolved or connection with the
database is lost.

Database Partitioner: invalid settings


· The message appears if current module's settings are incorrect. For example, some mandatory
parameters of module or related Database are missing.
· The message disappears if module is properly configured.

Database Partitioner: failed to access database


· The message appears when the database is occupied by other Database Partitioner object.
· The message disappears after the database is successfully accessed.

Database Partitioner: errors on partitioning


· The message appears if there were errors during the partitioning process.
· The message disappears if the error does not repeat within 10 minutes.

Image Processor: task queue overloaded


· The message appears if any Image Processor's has more than 10,000 enqueued tasks. The queue
may grow when the Video Server connection is lost or when exported frames aren't yet recorded into
the video archive.
· The message disappears if the error does not repeat within 3 minutes.

www.issivs.com
SecurOS 115 Administration Guide
SecurOS Administration Overview

REST API: image export queue overloaded


· The message appears if the REST API's queue of image export requests is overloaded. New requests
will be rejected.
· The message disappears if the error does not repeat within 3 minutes.

REST API: event queue for subscribers overloaded


· The message appears if the REST API's queue of events is exceeded (10,000 events total for all
subscribers). New events are not enqueued for sending to subscribers.
· The message disappears if the error does not repeat within 3 minutes.

Archive was deleted because of insufficient drive space


· The message appears if the primary video archive was deleted while the minimal retention period
specified in the Store at least parameter of the Camera object (see Recording Tab) had not elapsed.
This might happen when there is not enough space on the video recording drives (is specified in the
Archive block of the Computer object settings) for the required archive retention time.
· The message disappears if the error does not repeat within 1 hour.

Archiver: drive is unavailable


· The message appears if it is impossible to connect to one of the drives specified in the Archiver
object settings. Possible reasons are the following:
- drive is disconnected;
- hardware or driver error.
· The message disappears after the drive is reconnected.

Archiver: file is corrupted


· The message appears if the Primary archive file is corrupted and it wasn't added to the Long-term
archive.
· The message disappears if the error does not repeat within 10 minutes.

Archiver: archive write error


· The message appears when it is impossible to save long-term video for any reason. For example, it
appears when there is not enough disk space.
· The message disappears if the error does not repeat within 3 minutes.

Audit database is not available


· The message appears if the connection with the Audit database is lost.
· The message disappears immediately after restoring the database connection.

Video subsystem database is not available


· The message appears if connection with the Video Subsystem database is lost. Information about
alarms, bookmarks, metadata and EdgeStorage tasks is unavailable.
· The message disappears immediately after restoring the database connection.

ACS database is not available


· The message appears if the connection with the ACS database is lost.

www.issivs.com
SecurOS 116 Administration Guide
SecurOS Administration Overview

· The message disappears immediately after restoring the database connection.

Events database is not available


· The message appears if the connection with the Events database is lost.
· The message disappears immediately after restoring the database connection.

BOLID: time is not synchronized


· The message appears if BOLID server time and system time difference is more than 10 seconds.
· The message disappears immediately after the problem is solved.

Product version on Server does not match the one on the Configuration Server
· The message appears if the version of the product installed on the Peripheral Server does not match
the version of the product installed on the Conf iguration Server. System administration is limited.
· The message disappears immediately after the required version of the product is installed on the
Peripheral Server.

More than one Configuration Server was found in the system


· The message appears if there are several Conf iguration Servers within the SecurOS network.
· The message disappears immediately after only one Conf iguration Server is left within the network.

Traffic rules violation detector: detector execution error


· The message appears if a fatal error occurred during the execution of the detector. Possible reasons:
- detector settings are not specified or specified incorrectly;
- neural network server is not installed;
- an error occurred when starting the neural network server.
· The message disappears when the detector successfully starts.

Server configuration is not up to date: update queue is currently overloaded


· The message appears if the configuration update queue on the server contains more than 500
updates.
· The message disappears after the number of updates in update queue is reduced down to 100.

Critical CPU load


· The message appears if any single CPU core load exceeds 90%.
· The message disappears if all CPU core loads remains under 90% for several consecutive
measurements.

License expires in 24 hours


· The message appears when the Product license is going to expire within 24 hours.
· The message disappears after the license key file is updated.

Give way to pedestrians detector's and LPR settings do not match


· The message appears if the license plate recognition event cannot be correctly processed because the
number and/or values of the parameters of the Give way to pedestrian detector and the License plate

www.issivs.com
SecurOS 117 Administration Guide
SecurOS Administration Overview

recognizer are different. For example, there are 3 lines specified in the detector parameters and only
2 lines in the License plate recognizer object settings.
· The message disappears if the error does not repeat within 30 minutes.

Failed to load synchronized files


· The message appears if synchronized files could not be loaded. Possible reasons:
- the file is damaged;
- there is no access to the file.
· The message disappears if synchronized files have been downloaded successfully on server reboot.

Failed to record metadata to Video subsystem database


· The message appears if unable to record metadata for Forensic search in Video subsystem database.
· The message disappears if the error does not repeat within 3 minutes.

Failed to start Movable PostgreSQL


· The message appears, if additional instance of PostgreSQL failed to start by any reason. For
example due to internal data damage.
· The message disappears after additional instance of PostgreSQL successfully started.

Failed to connect iSCSI drive


· The message appears, if there was an error during connecting, authorizing or mounting iSCSI drive.
· The message disappears after iSCSI drive was successfully mounted.

Failed to access Remote system


· The message appears if it failed to access the Remote system. Possible reasons are the following:
- the system access password is incorrect;
- the access is not configured.
· The message disappears immediately after the Remote system is successfully accessed.

Insufficient write speed


· The message appears if the total speed (bitrate) of the recorded streams exceed the actual drive
write performance.
· The message disappears if the error does not repeat within 1 hour.

Insufficient speed of writing data to replicated database


· The message appears if the time of coping the data received from any of the original databases to
the replicated database exceeds 3 minutes. Next data package from that database will be copied
after loading the previous one.
· The message disappears if the error does not repeat within 30 minutes.

Low free space on system drive


· The message appears if the system drive has less than 10 GB of free space.
· The message disappears if the free space on the system drive becomes more than 10 GB.

www.issivs.com
SecurOS 118 Administration Guide
SecurOS Administration Overview

Not enough memory


· The message appears when more than 80% of server virtual memory is used during 1 minute.
Virtual memory is the sum of the RAM size and the maximum size of the paging file.
· The message disappears if the error does not repeat within 1 minute.

There are unanalyzed dump files


· The message appears if C\:ProgramData\ISS\dumps folder (include subfolders) contains dump
files.
· The message disappears after removing dump files from the specified folders.

Warning! To resolve this problem it is recommended to create a report via the SystemInfo utility and send it
to the Technical Support Team.

Drive is not available


· The message appears if it is impossible to connect to one of the drives specified in the Archive tab of
the Computer object settings. Possible reasons are the following:
- drive is disconnected;
- hardware or driver error.
· The message disappears after drive is reconnected.

ACS is not available


· The message appears if it is impossible to connect to the external ACS system:
- there is no connection to the ACS server;
- connection parameters are specified incorrectly;
- SDK wasn't installed or installed incorrectly.
The message also appears if the connection with the ACS server is lost.

· The message disappears in 7 seconds after the connection with the ACS server is restored.

Long-term archive file is corrupted


· The message appears if the long-term archive file couldn't be found or read when performing
playback in the Media Client or exporting video via Archive Converter.
· The message disappears if the error does not repeat within 1 hour.

Disconnected
· The message appears if the connection with the server is lost.
· The message disappears in 7 seconds after the connection with the server is restored.

Warning! This message is also displayed if an invalid or incorrect IP address is specified in the IP address
parameter in the Computer settings.

Event queue overloaded


· The message appears if the Video Server's queue of events is exceeded (more than 10,000 events).
New events will not be added to queue and will be lost. The queue can grow if there is no
connection with the Video Server or if the saved events have not been recorded to the database yet.
· The message disappears if the error does not repeat within 3 minutes.

www.issivs.com
SecurOS 119 Administration Guide
SecurOS Administration Overview

Archive write error


· The message appears when it is impossible to save video for any reason. For example, not enough
space on the hard drive, insufficient write speed, drive is unavailable, etc.
· The message disappears if the error does not repeat within 3 minutes.

Audio archive write error


· The message appears when it is impossible to save audio for any reason. For example, not enough
space on the hard drive, insufficient write speed, drive is unavailable, etc.
· The message disappears if the error does not repeat within 3 minutes.

Alarms write error to Database


· The message appears if the alarms cannot be saved into the video subsystem database.
· The message disappears if the error does not repeat within 3 minutes after recording is resumed.

Application start error


· The message appears if an error occurred while starting the external application.
· The message disappears when the external application is successfully started.

Configuration update failed: Modules installed on servers do not match


· The message appears if the set of Modules installed on the Peripheral Server and the Conf iguration
Server does not match. The current peripheral server configuration is incorrect. It will be updated
automatically when the required Modules are installed on the Peripheral Server.
· The message disappears immediately after the configuration is updated.

Database query loss - insufficient database speed


· The message appears if the database transaction queue size is exceeded. New alarms, bookmarks
and EdgeStorage tasks will not be recorded into the database.
· The message disappears if the error does not repeat within 1 hour.

Crossroad: GNSS Receiver is not synchronized


· The message appears if the system time was not synchronized via the GNSS Receiver when
processing the violation. Possible reasons are the following:
- the device is broken or unavailable;
- unable to change the system time.
· The message disappears after 120 minutes or if the GNSS Receiver is synchronized while processing
a violation.

Crossroad: Incorrect LPR: License plate recognizer settings


· The message appears if the recording mode of at least one of the License plate recognizers is different
from "Record video";
· The message disappears if the recording mode of all used License plate recognizers is set to "Record
video".

www.issivs.com
SecurOS 120 Administration Guide
SecurOS Administration Overview

Remote System objects exceed license limitations


· The message appears if the total number of Cameras or License plate recognizers in the Remote systems
exceeds the numbers allowed by the SecurOS MCC license. Interaction with Remote Systems will be
limited.
· The message disappears if the amount of the Remote system objects becomes less than the number
allowed by SecurOS MCC license.

Databases Replicator: replicated data mismatch


· The message appears if the replicable database contains fields that are not present in the replicated
database. Only the same fields will be copied.
· The message disappears if the settings of the Databases replicator object are changed.

Databases Replicator: error while writing into database


· The message appears if replication is not possible or data cannot be copied in full for one of the
following reasons:
- distributed database or at least one of the original databases has incorrect markup;
- a record cannot be copied due to corruption in the source database.
· The message disappears if the error does not repeat within 10 minutes.

Replicated database is not available


· The message appears if the connection with replicated database is lost.
· The message disappears immediately after restoring the database connection.

Diagnostics server: statistics saving DB request queue is overloaded


· The message appears if the maximum size of the Diagnostics server DB request queue is reached.
New statistics saving requests will not be added to the queue and will be lost. Possible reasons of
the queue growth are:
- no connection with the DB;
- insufficient DB write speed;
- writing to the DB is not possible.
· The message disappears if the error does not repeat within 3 minutes.

Configuration Server is not available


· The message appears when connection with the Conf iguration Server is lost.
· The message disappears in 7 seconds after the connection with the Conf iguration Server is restored.

ACS: time is not synchronized


· The message appears in the following cases:
- event time stamp within ACS is more than 2 seconds ahead of Video Server's system time;
- time stamp of the current event within the ACS is less than the time stamp of the previous event.
· The message disappears if these errors are not repeated within 3 minutes.

Stereo: People detector. Module execution error


· The message appears if a fatal error occurred during the execution of the module. Possible reasons:

www.issivs.com
SecurOS 121 Administration Guide
SecurOS Administration Overview

- module settings are not specified or specified incorrectly;


- neural network server is not installed;
- an error occurred when starting the neural network server.
· The message disappears when the module successfully starts.

MCC DC Gateway: Gateway Video Server for live video is unavailable


· The message appears if any Gateway Video Server did not respond to the MCC DC Gateway request.
Possible reasons are the following:
- Video Server is unavailable;
- Video Server is running outdated version of the product.
· The message disappears if the problem does not repeat within 1 minute.

6.6.3 Camera

The following problems are diagnosed for the Camera object:


· Microphone is detached;
· Archive integrity error;
· Inappropriate video resolution;
· Camera is detached;
· Frame corrupted;
· Stream N is disconnected;
· Stream N GOP exceeds recommended size;
· Stream N GOP exceeds critical size;
· Edge Storage is not accessible;
· Edge: archive corrupted;
· Edge: time isn’t in sync;
· Edge: Video Server response timeout expired;
· Edge: no information about archive;
· Edge: requested records not found;
· Edge: error downloading archive.

Microphone is detached
· The message appears when there is no signal from the Microphone linked to the Camera.
· The message disappears in 7 seconds after the connection with the Microphone is established.

Archive integrity error


· The message appears if the primary video or audio archive file couldn't be found or read when
performing playback in the Media Client or exporting video via Archive Converter.

Warning! The archive file can be deleted when the drives don't have enough free space or when it's retention
period is expired. In this case it is not considered a problem.

· The message disappears if the error does not repeat within 1 hour.

www.issivs.com
SecurOS 122 Administration Guide
SecurOS Administration Overview

Inappropriate video resolution


· The message appears if the frame's width is not a multiple 16 for black-and-white image. This
results in significant decrease of performance and compression efficiency when using MJPEG codec.
· The message disappears when video stream of proper resolution is received from the camera.

Camera is detached
· The message appears when the system fails to receive the video stream selected as the Stream for
recording in the Camera object settings. If the Stream for recording is unavailable then all other
streams are disabled.
· The message disappears if the specified video stream is received from the Camera during 7 seconds
and the content of this stream is correct.

Frame corrupted
· The message appears if the frame couldn't be recorded or read when performing playback in the
Media Client from primary or long-term archive.
· The message disappears if the error does not repeat within 1 hour.

Stream N is disconnected
· The message appears if it is impossible to receive the specified video stream from the Camera or the
content of the video stream is incorrect.
· The message disappears if the specified video stream is received from the Camera during 7 seconds
and the content of this stream is correct.

Stream N GOP exceeds recommended size


· The message appears if Stream N's GOP size exceeds the recommended 1 seconds.
· The message disappears in 1 minute if the issue doesn't occur.

Stream N GOP exceeds critical size


· The message appears if Stream N's GOP size exceeds the recommended 2 seconds.
· The message disappears in 1 minute if the issue doesn't occur.

Problems when working with EdgeStorage Sync (see Camera Local Storage (Edge
Storage))

Edge Storage is not accessible


· The message appears if the attempt to connect to the camera's local data storage failed. This
message appears in case of connection errors other than camera connection loss. For example, when
authorization failed.
· The message disappears in 3 minutes after the camera's local date storage is connected.

Edge: archive corrupted


· The message appears if the camera's archive contains different recordings for the same time period.
· The message disappears if the error does not repeat within 3 minutes.

www.issivs.com
SecurOS 123 Administration Guide
SecurOS Administration Overview

Note. In many cases this problem raises due to overlapping records by time caused by moving camera's
system time backward.

Edge: time isn’t in sync


· The message appears if the camera's time is not synchronized with the Video Server's time.
· The message disappears if the error does not repeat within 3 minutes.

Edge: Video Server response timeout expired


· The message appears if the Video Server failed to provide information about the video archive
during the specified timeout.
· The message disappears if the error does not repeat within 3 minutes.

Edge: no information about archive


· The message appears if the camera failed to provide correct information about the edge archive.
· The message disappears if the error does not repeat within 3 minutes.

Edge: requested records not found


· The message appears if the requested recordings are missing in the camera's edge archive. It won't
be copied to the Video Server archive.
· The message disappears if the error does not repeat within 3 minutes.

Edge: error downloading archive


· The message appears if an error occurs when copying archive recording.
· The message disappears if the error does not repeat within 3 minutes.

6.6.4 Microphone

The following problem is diagnosed for the Microphone object:

Microphone is detached
· The message appears when there is no signal from the Microphone.
· The message disappears in 7 seconds after the connection with the Microphone is established.

6.6.5 Sensor

The following problem is diagnosed for the Sensor object:

Sensor is sabotaged
· The message appears when the Sensor produces a SABOTAGE event (see SecurOS Programming
Guide).
· The message disappears in 7 seconds after receiving an event other than SABOTAGE.

www.issivs.com
SecurOS 124 Administration Guide
SecurOS Administration Overview

6.6.6 Remote System

The following problems are diagnosed for the Remote System object:
· Configuration update failed: some objects are not supported by SecurOS MCC;
· Disconnected.

Warning! These problems are diagnosed for the Remote System object only for Direct Connect type of the
Monitoring Center connection.

Configuration update failed: some objects are not supported by SecurOS MCC
· The message appears if the set of Modules installed on SecurOS MCC and the Remote System does
not match. Interaction with the Remote System will be limited. The current configuration is out of
date. It will be updated automatically when the required Modules are installed on SecurOS MCC.
· The message disappears immediately after the configuration is updated.

Disconnected
· The message appears if the connection with the Conf iguration Server of the remote system is lost or
the server specified in the system settings is not a Conf iguration Server. Interaction with the Remote
System will be limited.
· The message disappears in 7 seconds after the connection with the Conf iguration Server is
established.

Note. This problem also raises if incorrect address is specified in the Configuration Server address parameter
of the Remote System object settings.

6.7 SecurOS Files Synchronization


Some modules, integrations and settings of SecurOS require additional or changed files to be located at
every Video Server and Operator Workstation. The SecurOS Conf iguration Server syncs such files between
all computers within the security network.

The synchronization process goes by the following rules:


· The following files are synchronized:
— *.dbi — only in SecurOS root folder;
— *.ddi — only in SecurOS root folder;
— Modules/map/*.ini;
— Modules/Map/scripts/*.js;
— skins/macro_icons — icons for Macros (see Macro);
— skins/_common/acs/*.png;
— acs_*.json — only in SecurOS root folder;
— *.integration.json — in SecurOS root folder and its subfolders;
—Modules/auto/LPR — all subdirectories and files are synchronized except for those not used by
LPR: License plate recognizer and LPR: GUI objects.

www.issivs.com
SecurOS 125 Administration Guide
SecurOS Administration Overview

· Files to sync are being uploaded to the Conf iguration Server memory when SecurOS starts. If new
files were created on the server or some files were changed, it is required to restart SecurOS on the
Conf iguration Server.
· If SecurOS on the Conf iguration Server is restarted with new/changed files, all Peripheral Servers
automatically restart their SecurOS instances to sync files.
· Operator Workstation downloads files from the Video Server it connects to. Received files are stored:
—in Windows OS in the %ProgramData%\ISS\client folder;
—in Linux OS in the /var/opt/securos/client folder.
· Synchronization is only possible between computers with the same version of SecurOS.

Warning! In case of cluster the files on the Conf iguration Server must be changed only in the service mode
(see Configuring Cluster).

www.issivs.com
SecurOS 126 Administration Guide
Core Subsystem

7 Core Subsystem
The core subsystem communicates with the computers in the SecurOS distributed network, with
installed intelligent modules (such as license plate recognition module), and with other subsystems
(such as the video or audio subsystem, or the PTZ control subsystem).

7.1 Working Principles


The core subsystem is the SecurOS core and it monitors the status of all connected objects, modules and
devices.

Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.

The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log file
in real time.

The SecurOS core subsystem allows connection and disconnection of the security network nodes,
configuration and synchronization of information between the security network nodes, as well as
monitoring any changes in modules and objects status.

If any single node or a certain network segment is disconnected, it is assigned the disconnected status
and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.

Permanent updating of the security network configuration data allows the configuring of the security
network from any computer running the necessary administration software, watching video form
connected video cameras, listening to audio, sending commands to hardware, and monitoring and
controlling alarm and fire alarm systems from every operator's workstation within the SecurOS
network.

7.2 Data Exchange Protocols


Data exchange between some modules within SecurOS network can be carried out using the TLS
protocol (version 1.2).

Data exchange mode within SecurOS network is specified in the System object settings. The following
connection options are possible:
· connections without using the TLS protocol;
· using the TLS protocol in connections for those modules that support encryption of the data
transmission channel. The connections between the other modules use the regular communication
protocols;
· connections that use only TLS data transmission protocol.

www.issivs.com
SecurOS 127 Administration Guide
Core Subsystem

7.3 Object Reference


The core subsystem includes the following objects:
· System.
· Security Zone.
· Database.
· Department.
· User Account.
· Active Directory / LDAP.
· User Rights.
· Computer.
· Event Filter.
· SNMP agent.
· External application.
· Database Partitioner.
· Databases Replicator.

7.3.1 System

This is the root object of the entire Object Tree and provides system-wide settings. This object cannot be
deleted, moved, or disabled. Operations of viewing and editing object parameters are available only to
the superuser (see SecurOS Users).

Parent object — none (root object).

www.issivs.com
SecurOS 128 Administration Guide
Core Subsystem

Figure 90. System object settings window

Table 5. System object settings

Parameter Description

Superuser password (To display entered characters click the button. To hide them click the
button.)

New password Enter new password (see Changing Superuser Password).

Confirm new password Retype new password to confirm.

Access from Monitoring & Control Center

Select to allow an access from the Monitoring Center to this system


and specify the access password. If not selected, an access from the
Monitoring Center to this system will be denied. If selected, an access
Allow access
from the Monitoring Center to this system will be granted if the
specified password matches the password, specified in the Remote
System object settings.

www.issivs.com
SecurOS 129 Administration Guide
Core Subsystem

Parameter Description

Select to prohibit access to the Remote system from the Monitoring


Center for conducting special operations (see Privileged Access).
Prohibit privileged access Available if the Allow access is selected.

Note. This setting can only be made on the Remote system side.

Monitoring & Control Center

Select to allow privileged access to Remote system for conducting


Privileged access to Remote special operations (see Privileged Access).
systems
Warning! The functionality is only available for SecurOS MCC PA type.

Select proxy server to transmit SecurOS FaceX Module's data


FaceX proxy server between the Remote system and the Monitoring Center Operator
Workstations (see MCC DC HTTP Proxy).

Saving and restoring configuration

Click this button to save the current configuration (Object Tree and
all object settings) to a JSON-file. Use Windows file manager to
specify folder and file name. By default, file will be saved as
default.json in the following folders:

· in Windows OS in the %ProgramData%\ISS\Sys_config


Save (button) folder;

· in Linux OS in the /var/opt/securos/Sys_config folder.

Warning! It is not recommended to save the configuration as


wizard.json because this file name is reserved and used to
automatically save the last successfully loaded configuration.

Click this button to restore system configuration from the file. The
configuration file is selected by the administrator from the list of
previously saved ones. Configuration restoring procedure contains
the following steps:

· Restoring configuration on the Conf iguration Server.

· Updating configuration on all Peripheral Servers from the


Restore (button) Conf iguration Server. Configuration of the Peripheral Server that
has been used before updating is saved to the file.

When it is impossible to restore the configuration from the file the


current configuration is rolled back.
Warning! For restoring it is recommended to use the copy of the
configuration file that corresponds to the currently installed version of
SecurOS. When restoring configuration from files of other versions, correct
operation of SecurOS is not guaranteed.

www.issivs.com
SecurOS 130 Administration Guide
Core Subsystem

Parameter Description

The flag to control automatic backup mode of the current system


configuration. By default it is selected. In this mode the backup
copy:

· Is created daily at 01:45 local time.

· Is created only if the configuration has been changed during the


last day.

· Is created on each Video Server even the connection between


Peripheral Server and Conf iguration Server is lost. In this case the
copies of the configuration will vary.

· Is created with the Backup_<date>_r<configuration


revision>.json name, for example, Backup_2019-07-
01_r0000000016.json, in the following folders:
Automatic backup
- in Windows OS in the %ProgramData%\ISS\Sys_config
folder;

- in Linux OS in the /var/opt/securos/Sys_config folder.

<Date> is specified in the ISO format.

· Is created out of schedule if the current non-empty


configuration is restored from a file. A copy is also created at
system startup, if at the start time the current system
configuration is different from the last backup copy or there is
no backup copy.

Note. When working in the SecurOS MCC configuration any changing


of the external system configuration results in changing of the SecurOS
configuration.

Specify maximum number of the backup copies. Range of values:


[1; 30]. When the maximum value is reached, automatically
Maximum backup number created configuration copy files are deleted “by the ring”.
Configuration files with names other than the template ones are not
deleted.

Audit

Select this checkbox to audit the system and record obtained data.
Data will be recorded to the special audit database that will be
Record system audit data
automatically created after applying new settings (for the details
see SecurOS AuditTrail User Guide).

www.issivs.com
SecurOS 131 Administration Guide
Core Subsystem

Parameter Description

Select the audit interval from the list. Audit interval means the time
period that is used to trace the prolonged user actions within the
system. The following user actions are called prolonged:

· viewing live and archive video;

· controlling PTZ.
Audit interval
Warning! Each astronomical hour contains several audit intervals. The
beginning of the first audit interval in an hour coincides with the beginning
of each astronomical hour.

Specified value affects the database entries creation, which can be


viewed via AuditClient utility. Analysis of the utility work results is
considered in detail in the User Action Analysis Example section.

Security

Select this checkbox to change the data transfer mode within


Use secure connections
SecurOS.

Select this option to use secure connections where possible.

Accept insecure connections Note. Modules that do not support data encryption protocols will
operate in normal mode.

Select this option to use secured connections only.


Accept TLS connections
only Note. Modules that do not support data encryption protocols will not
operate.

7.3.2 Security Zone

This object is used to divide the entire security network into separate security zones. Security Zones are
commonly used when the SecurOS system ranges over a large territory where independent centralized
monitoring and supervision is needed for certain physically separated zones.

Additionally, one can organize events filtering between system's Video Servers. Using filter it is possible
to permit or to forbid transmission of all system events to selected Video Server (see Servers to Connect
Tab).

System users can be also granted with different access rights to implement multi-level access control for
the security objects (see User Registration and Configuring User Rights). For example, in a security
center the operators can observe the territory by watching the signals from the cameras. The supervisor
can be granted the rules to control the monitoring modes, enable or disable cameras, control the PTZ
cameras, and the head of the security center can generate reports.

Object settings allows to distribute loading from Operator Workstations between Video Servers
(see Servers to Connect Tab). The white list of IP addresses, from which one can connect to the Video
Servers, can be created as additional protection feature (see Connection Restrictions Tab).

www.issivs.com
SecurOS 132 Administration Guide
Core Subsystem

Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is separated
into several segments and each administrator may monitor and configure only one of those segments.

Note. A separate events log is used for each security zone.

It is recommended to use several security zones if:


· access control subsystem uses hardware identifiers (cards) with different facility codes on different
territories;
· access control subsystem is distributed across several zones with different access schedule (different
holidays), and if each zone has its own departments and persons (i. e. several organizations within
one office building);
· you need to store separate event logs for a subset of SecurOS objects, with different database depth.

Parent object — System.

Parameter settings windows contains the following tabs:


· General Tab.
· Servers to Connect Tab.
· Connection Restrictions Tab.

7.3.2.1 General Tab

Figure 91. Security Zone object settings window. General Tab

www.issivs.com
SecurOS 133 Administration Guide
Core Subsystem

Table 6. Security Zone object settings. General Tab

Parameter Description

Define the events storage period in the Event Viewer database (in
days, max). Event database stores events from objects that belong to
this security zone only. Possible values: [1; 9999]. Default value:
Protocol database length
7. Messages will be deleted automatically when the retention period
has expired. Removal is performed when SecurOS starts or once a
day at 2:45:00 AM (hh:mm:ss).

Select from the list of accessible macros (Macro objects, see Macro)
Run Macro at start the one which will be activated on Video Server on system startup, if
necessary (see Macro running conditions).

Fill in the table containing a list of dates (in DD.MM.YY format) that
Holidays will be used by a access control subsystem as holidays. Those days
are also used in Schedule.

Macro running conditions

Macro will be started if all executors that implement the SecurOS features are successfully launched. If
SecurOS' Intelligent Modules (for example, SecurOS Auto) are installed, all executors of these Modules
must be started, too. If at least one of the executors has not started, the Macro will not be started.
7.3.2.2 Servers to Connect Tab
Operator Workstation is a client application and must be connected to the SecurOS server to work. For
the first time connection is performed manually. Operator specifies server to connect in the
Authorization window (see Launching SecurOS On Operator Workstation). Further automatic
authorization can be adjusted (see Auto login).

Appearance of the tab is represented in Figure 92.

Tab allows to specify to which servers Operator Workstations can connect, to which can not, and also
divide these servers into groups. Dividing servers into groups allows to balance servers loading. So, if
some server fails, system will attempt to reconnect Operator Workstation to other server of the same
group.

Note. To change server group to connect it is necessary logoff user and reconnect to the server from other
group.

www.issivs.com
SecurOS 134 Administration Guide
Core Subsystem

Figure 92. Security Zone object settings window. Servers to Connect Tab

By default, server list contains two groups — Allow connection and Don't allow connection. By
default all servers, existed in the SecurOS, are located in the Allow connection group. All newly created
Video Servers also are added to this group.

For the Video Server, depending on whether it belongs to a group, one can either allow or prohibit
receiving and processing events from other Video Servers of the system. This setting applies to all events.
Forbiddance to process an event reduces network loading associated with events transmission. If Video
Server is included in the group:
1. Allow connection — the Process events checkbox is selected by default and can't be deselected.
Such servers will always receive and process all events from other Video Servers of the system.
2. Don't allow connection — the Process events checkbox is selected by default and can be
deselected. Thus, receiving and processing events from other Video Servers of the system can be
prohibited for the Video Servers of this group.

Warning! When connecting to the servers from the Don't allow connection group logon can be performed
only by superuser (see SecurOS Users). Other users can logon only when client application is connected to
this server locally. Thus, if the Process events checkbox is not selected for such servers, then object's states on
these servers will be irrelevant, because events from other servers of the system are not received and
processed.

The following operations are available when working with the list:

1. Creating group — to create a new server group click on the (Create group) button. Group will
be created with the N: Allow connection name, where N — serial number of the group with this
default name (if server list contains such groups).
2. Renaming group — to rename group, click it and specify new name in the text field.

3. Deleting group — to delete group, select it in the list and click on the (Delete group) button.

www.issivs.com
SecurOS 135 Administration Guide
Core Subsystem

Warning! Group that contains servers can not be deleted. To delete such group, move all servers to other
group first. System groups Allow connection and Don't allow connection can not be also
deleted.

4. Moving server to other group — to move one or several servers select them, click on the Move to group
button and select required group from the list. Also, the server can be moved to the required group
using drag-and-drop.

7.3.2.3 Connection Restrictions Tab


This tab allows to set a list of computers, that can connect to the SecurOS servers. Tab appearance is
represented on Figure 93.

Figure 93. Security Zone object settings window. Connection Restrictions Tab

Any computer mode is set by default and means that any computer where SecurOS software is
installed can connect to any system server taking into account Servers to Connect tab settings. It is
enough to operator to know SecurOS user's login and password.

As an additional security option, you can restrict the list of computers from which the servers will
accept the connection. To set such restriction do the following:
· Set the Computers that are allowed to connect as Operator Workstations parameter to Computers
with following addresses.

· Add IP addresses of computers to the list below, using button. If there are many such
computers and they have serial IP addresses, it is convenient to specify the range of IP addresses.
For example, 172.16.1.110-172.16.1.150. IPv4 and IPv6 addresses can be specified.

Note. When working in cluster configuration (see Failover cluster) and operator interface is planned to be
used on cluster Hosts, all Hosts IP addresses, virtual IP addresses of the Nodes and virtual IP address of the
Conf iguration Server must be added to the list.

www.issivs.com
SecurOS 136 Administration Guide
Core Subsystem

7.3.3 Database
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

Within SecurOS this object represents the databases of the SecurOS security system, databases of the
SecurOS' Modules and external databases.

Parent object — Security Zone\Databases group.

Figure 94. Database object settings window

Table 7. Database object settings

Parameter Description

Database

Connect to the previously created Database using specified below


Connect (radio-button)
parameters.

Create new Database and User account (see Figure 95).

Create new (radio-button) Warning! The Database created by using this option is not supported by the
following Modules: SecurOS Auto, SecurOS Cargo, SecurOS Transit,
SecurOS POS.

www.issivs.com
SecurOS 137 Administration Guide
Core Subsystem

Parameter Description

Database type. Possible values:

· PostgreSQL — provides connection with PostgreSQL


database;
Type
· SQL Server — provides connection with Microsoft SQL
Server database.

Default value is PostgreSQL.

DNS-name or IP-address of database server. If the database is


Host installed on the local computer which is used to configure the
system, use default value.

Port Port number for database connection. Default value is 5432.

Database name, user name and password are as defined during the
Database name, User, database installation.
Password Warning! Use Latin characters only when specifying a Password. Latin-
1 code page (Western European character set) is acceptable.

To check the database connection with the defined parameters click


the Test connection button. If the parameters are set correctly and
Test connection (button)
there is a connection to the LAN, then OK will be displayed to the
left of the button.

Options

Retention period for records (in days). If set to 0, the records are not
deleted.
Erase records older than
Note. When working with some of the SecurOS intelligent Modules
parameter is ignored.

www.issivs.com
SecurOS 138 Administration Guide
Core Subsystem

Figure 95. Creating new Database and User account

Table 8. Database object creation settings

Parameter Description

Database

Create new Database to use it with external ACS systems


(see SecurOS ACS User Guide). After specifying parameters, click
Create DB and User on this button to create a new database in the PostgreSQL folder and
it's user account. Created database will be marked up to store data,
received from an external ACS system.

Note. Other parameters of the created Database are similar to described above.

7.3.4 Department

This object is used to organize system users into groups. Primarily it is used in conjunction with an
access control subsystem to define users to manage their user right policies within the SecurOS network
itself (see User Registration and Configuring User Rights).

Parent object — Security Zone\Users & Permissions group.

Object has no settings to configure.

Note. Department object is automatically created in the objects tree only if users with the Power user or Simple
user rights were added during system configuration with the help of System Configuration Wizard.

www.issivs.com
SecurOS 139 Administration Guide
Core Subsystem

7.3.5 User Account

This object represents a single person (either a person registered in an access control system or a user
within the SecurOS network).

Parent object — Department.

Warning! Name of the User account object, specified in the Parameters of created object window, will further
used as username when logging on the system. At the same time, the authorization is possible only on that
Computers, which belong to the same Security Zone, as a created User account.

Figure 96. User Account object settings window

Table 9. User Account object settings

Parameter Description

User password. Is used to log on the system if some access rights


Password were assigned to this user (see User Rights). Mandatory parameter.
To view hidden characters of the password click the button.

Insert person's phone number. Not used by the system itself. You
Phone can use this field when writing SecurOS scripts to send voice or SMS
notifications.

www.issivs.com
SecurOS 140 Administration Guide
Core Subsystem

Parameter Description

Insert person's e-mail address. If two-factor authentication


(see Two-factor authentication in SecurOS) is used in the system,
messages with a one-time access code will be sent to the specified
address.
Warning! If the Use two-factor authentication by e-mail checkbox is
E-mail selected in User Rights, the parameter is required. If the parameter is not
specified when the checkbox is selected, an icon is displayed next to the
field.

You can use this field when writing SecurOS scripts to send email
notifications.

Insert any text in this field, for example, person's passport number,
Additional Information position or any other description you need. Not used by the system
itself.

7.3.6 Active Directory / LDAP


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

This object is used to configure settings of the network domain to provide authorization in the SecurOS
network. For further information see Configuration of Network Domain User Rights.

Parent object — Security Zone\Users & Permissions group.

Note. Active Directory authorization is possible only if computer of SecurOS network is a part of Windows
Active Directory domain.

www.issivs.com
SecurOS 141 Administration Guide
Core Subsystem

Figure 97. Active Directory / LDAP object settings window

Table 10. Active Directory / LDAP object settings

Parameter Description

Common

Select the type of protocol from the drop-down list. Possible values:

Provider · Windows NT (local or domain)— only for Windows;

· LDAP (domain)— for Windows and Linux.

Select this checkbox to use encryption when interacting with a


Use encryption domain controller. Available if the Provider parameter is set to
LDAP (domain).

Use primary domain Select this checkbox to use the primary domain controller.
controller Warning! If selected, then the two next parameters are disabled.

Specify domain controller parameters depending on selected


Provider:

· Windows NT (local or domain) — specify short domain


name (for example, OFFICE) to provide user authorization on
the computer registered in the domain. To provide user
Server
authorization from the computer connected to the network, but
not registered in the domain, specify full domain name (for
example, OFFICE.COMPANY).

· LDAP (domain) — to provide user authorization specify IP


address or DNS name of the domain controller.

Optional: specify server network port for connection. Must be


Port specified for LDAP (domain) provider or when server has non-
standard settings.

www.issivs.com
SecurOS 142 Administration Guide
Core Subsystem

Parameter Description

Credentials

Select this checkbox to use name and password of Windows user


Use credentials provided at currently logged in.
system login
Warning! If selected, then the two next parameters are disabled.

User name, Password Specify user name and password for authentication on server.

7.3.7 User Rights

This object is used for defining user rights within the system (see User Registration and Configuring
User Rights for detailed description).

Note. All users in the User Rights object settings have the same level of access. To assign another set of rights
to another user or user group, create a different User Rights object.

Parent object — Security Zone\Users & Permissions group.

www.issivs.com
SecurOS 143 Administration Guide
Core Subsystem

Figure 98. User Rights object settings window

Table 11. User Rights object settings

Parameter Description

Object Tree with icons that depict user rights of each object. To
define access level to any object, click the icon to the left of the
Rights
object or group (Objects like...) and select the access level icon for
this object or group. Icons are described below.

www.issivs.com
SecurOS 144 Administration Guide
Core Subsystem

Parameter Description

Select this field if user is not allowed to hide user interface


Forbid to hide interface
objects.

This parameters defines user access to the SecurOS Object Tree


with the help of the Configure the system button
(see Administration Center).

If this field is selected, then user has access to the Object Tree to
Allow to configure system view and change system parameters (Administrator mode, see
icons description below).

If this field is not selected, then user has no access to the Object
Tree to view and change system parameters (Operator mode, see
icons description below).

Select the checkbox to allow user to edit SecurOS FaceX


Allow to edit FaceX watchlists watchlists (see SecurOS FaceX User Guide).

Select the checkbox to allow user to audit the system (for the
Allow to audit system details see SecurOS AuditTrail User Guide).

Select this checkbox to enable two-factor authentication in


SecurOS mode. Two-factor authentication is only available for
Use two-factor authentication local SecurOS users.
by e-mail
Warning! Mode restrictions are described in the Two-factor
authentication in SecurOS section.

Select the service that will be used to send one-time access codes
E-mail Message Service for to the user. The list contains all SecurOS E-mail Message Service
sending one-time access code objects that have the Use the service for two-factor
authentication checkbox selected in their settings.

PTZ

Select this checkbox to allow operator to hold PTZ control for a


Allow to hold PTZ control
long time (see Exclusive PTZ Control).

Select the checkbox to allow user to request access to PTZ control


Allow to request PTZ control of the camera in case when the user with higher priority value is
holding it.

Select the checkbox to reveal name of the user associated with


Reveal user name when
these rights to other users when holding PTZ control in exclusive
holding PTZ control
PTZ control mode (see Exclusive PTZ Control).

Parameter allows user ability to intercept camera PTZ control if


shared PTZ control mode if off (see Camera). Preferences of PTZ
PTZ control priority control has the user with greater priority value. If two or more
user have equal PTZ control priority, then preferences has that of
them who capture control first. Possible values: [1-10].

Users and Groups having these rights

www.issivs.com
SecurOS 145 Administration Guide
Core Subsystem

Parameter Description

Choose Local value to accept rights to access the selected


objects for users from the Users and Groups list (see below) or
choose the Active Directory / LDAP object name as it
appears in the Object Tree to accept certain rights to user / user
groups of the network domain (see Active Directory / LDAP).

Providers In Linux OS the Active Directory / LDAP value is not available.

If the Use two-factor authentication by e-mail checkbox is


selected, the icon is displayed next to the field.
Warning! Active Directory/LDAP network domain users
(see Providers) and SecurOS superuser (see SecurOS Users) cannot use
two-factor authentication.

List of users and groups that have above rights.

If Local value is selected in the Providers field, click the


button to add user. A new entry will appear in the list. Double-
click this entry, then select the required user from the drop-down
list. To delete user from the list, select the corresponding entry
and click the button or the Delete key.

On selecting the Active Directory / LDAP object from the


Providers list, the list should be formed as described
Users and Groups in Configuration of Network Domain User Rights.

In each case the name of the person will be used as the username
when logging into SecurOS.

Note. The same user (User Account object) cannot be selected in


several User Rights objects.

Warning! When User account is logging on into the SecurOS, then the
password specified in the settings of the appropriate object (see User
account) will be used.

Access testing

Enter the name of the OS user or typical SecurOS user for which
User name
it is necessary to check possibility of authorization in SecurOS.

Click this button to start testing. For the detailed description of


Test (button) the testing procedure see User Registration and Configuring
User Rights.

Access level of the user/user group to the object/object group (the Rights block) is marked with
appropriate icon. Icon can be changed by clicking on it.

The following icons are available:

· — No access. This access level defines the following rules of the object behavior:

www.issivs.com
SecurOS 146 Administration Guide
Core Subsystem

- in the Administration mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are not allowed (all buttons on the Administration toolbar
are disabled);
- in the Operator mode — object/group is not displayed in the SecurOS operator's interface.

Warning!
1. If this access level is set for the Security Zone, then this object and all children objects are not
displayed in the SecurOS Object Tree.
2. If this access level to the Computer object is set for the user/user group, then no one of these users
can log on into system on this computer.

· — View. This access level defines the following rules of the object/group behavior:
- in the Administration mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are not allowed (all buttons on the Administration toolbar
are disabled);
- in the Operator mode — object/group is displayed in the SecurOS operator's interface. Object
management is disabled. For example, Camera is displayed in the Media Client interface, but user
can not start record.
· — Control. This access level defines the following rules of the object/group behavior:
- in the Administration mode — similar to the View access level.
- in the Operator mode — object/group is displayed in the SecurOS operator's interface. Object
management is enabled. For example, Camera is displayed in the Media Client interface, user can
start record, control PTZ, etc.
· — Configure. This access level defines the following rules of the object/group behavior:
- in the Administration mode — object/group is displayed in the SecurOS Object Tree. Object
configuring is allowed (the Setup button on the Administration toolbar is enabled). All other
operations with object/group not allowed (all other buttons on the Administration toolbar are
disabled);
- in the Operator mode — similar to the Control access level.
· — Full access. This access level defines the following rules of the object behavior:
- in the Administration mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are allowed (all buttons on the Administration toolbar are
enabled);
- in the Operator mode — similar to the Control access level.
· — Inherited rights — rights for this object/group are inherited from parent object. This
access level is used by default when creating a new object.

7.3.7.1 Two-factor authentication in SecurOS

Warning!
1. Active Directory/LDAP network domain users (see Providers) and SecurOS superuser
(see SecurOS Users) cannot use two-factor authentication.
2. Two-factor authentication is possible for SecurOS users who have automatic login enabled
(see Auto login).
3. The two-factor authentication option only applies to SecurOS clients. The authorization procedure
in other System Modules (for example, SecurOS WebConnect, etc.) is not affected.

www.issivs.com
SecurOS 147 Administration Guide
Core Subsystem

In two-factor authentication mode, access to SecurOS is granted in two steps:


1. Checking the login and password entered by the user in the normal authorization window
(see Launching SecurOS On the Configuration Server and Launching SecurOS On the Operator
Workstation). If the entered login and password are registered in SecurOS, the system will send a
request for a one-time access code. A one-time access code will be sent to the current user's e-mail
address using a pre-configured E-mail Message Service.

2. If there are no problems with the functioning of the SMTP server and the settings of the E-mail
Message Service object are correct (see Possible errors), the system will display a window for
entering a one-time access code (see Figure 99).

Figure 99. Window for entering a one-time access code

Warning! A one-time access code is valid for 2 minutes after receiving it.

Enter the received code in the confirmation window and click the Verify button. If the correct code is
entered, you will be logged in.

If an incorrect access code is entered or its validity period has expired, the system will display a
window with the corresponding message (see Figure 100).

www.issivs.com
SecurOS 148 Administration Guide
Core Subsystem

Figure 100. Incorrect access code message window

Click the Re-send the code button, receive and enter the received one-time access code.

When working with one-time access codes, the following restrictions apply:
· A request to resend an access code can be sent no earlier than 30 seconds after the previous request
was sent (by the timer in the confirmation window).
· The number of attempts to request an access code is 10. If all 10 attempts have been exhausted,
click the Back button to re-authorize.
· The number of attempts to enter an access code is 10. If all 10 attempts have been exhausted, click
the Back button to re-authorize.

Possible errors
If there are problems with the functioning of the used SMTP server or incorrect settings of the E-mail
Message Service object, the system will display an error message window (see Figure 101).

www.issivs.com
SecurOS 149 Administration Guide
Core Subsystem

Figure 101. Error message window

7.3.8 Computer

This object represents an individual computer within SecurOS network (Video Server or Operator
workstation).

Video Servers and Operator Workstations within SecurOS network are registered and represented as
Computer objects in the system Object Tree. Server part of the SecurOS is started on Video Servers, and
client part is started on Operator Workstations. Client part can also be started on Video Server.

SecurOS' Video Servers can send and receive events from other Video Servers. To reduce the network load
associated with the events transmission one can exclude selected network servers from the event
distribution list (see Servers to Connect Tab).

To denote role and state of the Computer within SecurOS network the following icons of the Object Tree
are used (see Figure 102):
· — Conf iguration Server (computer role is Video Server);

· — any Video Server, configured and connected to the SecurOS network;

· — any Video Server, disconnected from the SecurOS network;

· — cluster Node (see Redundancy);

· — any Operator Workstation or Operator Workstation Prof ile (connection to SecurOS is not
indicated).

www.issivs.com
SecurOS 150 Administration Guide
Core Subsystem

Figure 102. Computers and their states in the SecurOS Object Tree

Parent object — Security Zone\Servers & Workstations group.

www.issivs.com
SecurOS 151 Administration Guide
Core Subsystem

Figure 103. Computer object settings window

Table 12. Computer object settings

Parameter Description

This value should correspond to the computer setup type, selected


during software installation. It specified when object creating and
can not be changed later. Possible values:

Computer's role · Operator Workstation — computer will operate as network


client (even installed SecurOS has other setup type) or as
Operator Workstation Prof ile (see Operator Workstation Profiles);

· Video Server — computer will operate as a server.

Use as Operator Tick this checkbox to use object as Operator Workstation Prof ile
Workstation Profile (see Operator Workstation Profiles).

Specify IP address of the current computer within the TCP/IP


network. You can choose from the list or use the [<] button to
determine the computer's IP address automatically.
Server IP address
Warning! If the computers are located in different subnetworks, it will not
be possible to get the IP address automatically. In this case, this parameter
is mandatory, and the IP address must be entered manually.

Enable failover of the Video If selected, the Computer object will represent not a physical server,
server and add to the cluster but a logical entity — the cluster Node (see Redundancy).

www.issivs.com
SecurOS 152 Administration Guide
Core Subsystem

Parameter Description

Archive Block (is enabled only for Computer object, role of which is Video Server, see the Archive
section).

Logging on and off (settings that are applied automatically at system startup)

Select this option to choose the default Desktop object from the drop-
down list that will be shown on SecurOS startup on this computer. If
Activate Desktop the Auto value is set then the first desktop will be displayed (with
minimal ID). If this option is not activated, no desktop will be
displayed at startup.

Option is available only for the Video Servers and Operator


Workstations, that are not Operator Workstation Prof iles.

Select the name of the registered user or group to login


automatically with (i. e. without entering Username and Password
in the Authorization window). You will be able to select this option
and set up its value only if you are logged in as superuser
Allow auto logon for (see SecurOS Users). It is impossible to set up the field value to
User(s) root.

Note. For detailed information about setting order and rules of the
procedure see the Auto login section.

User group can be specified if an Active Directory / LDAP object is


configured within the system. When specifying user group name
use the @ prefix before its name, for example, @usergroup.

Note. The parameter is available for the Computer with any role.

In Linux OS the functionality is not supported.

Activate this field so in the moment of automatic or manual desktop


Auto user logging off after locking the current user GUI session will be automatically
lock screen terminated.

Note. Automatic session termination will not be performed for user or a


user group that is specified in the Allow auto logon for User(s)
parameter (with configured Active Directory / LDAP object in the
system).

Local database
Warning! If Computer's role is Operator Workstation the following parameters will be unavailable.

Select this checkbox to disable saving the local copy of the event log
to the database. Since the event log is synchronized between
Disable saving data into
computers and each computer saves its copy in the local database by
local Protocol DB
default, you can turn on the event log saving on several machines
without risk of loosing events.

www.issivs.com
SecurOS 153 Administration Guide
Core Subsystem

Parameter Description

Select this checkbox to enable message parameters to be recorded


into the PROTOCOL_PARAMS database.
Write secondary event Warning! This option is used in conjunction with the ISS analytics modules
parameters into Protocol DB only. In all other cases using this option can reduce system performance. So
unless ISS analytics modules are being used, it is recommended to keep this
box unchecked.

Name of the filter, which will be used when saving events into the
database. The list of values consists of names of all the Event filter
objects, that are child objects to the current Security Zone. Optional
Use Event filter parameter. If not set, all system events will be saved into the
database. Otherwise, only the events allowed by the given filter will
be saved.
Warning! Using filters can reduce system performance.

Maximum database size (in GB) before data will be updated in a


Maximum Protocol DB size ring mode (oldest deleted first). Possible values: [0; 100]. Default
value is 0 (parameter is not used).

Bookmarks, Alarms and Metadata


Warning! If Computer's role is Operator Workstation the following parameters will be unavailable.

Parameters for storing Bookmarks, Alarms and Metadata (see Forensic Search) in the video
subsystem's database are specified in this block.

If this option is selected, then Bookmarks, Alarms and Metadata will be


Delete with primary archive
deleted from database together with primary archive.

If this option is selected, specify duration of storage for bookmarks,


alarms and metadata in DB, days. Bookmark storage period starts
from the beginning of the bookmark's validity; alarm storage period
starts from the time when alarm starts. Checking of expiration is
Store performed every hour or when SecurOS starts. [1; 3660]. Default
value is 7.

Note. Maximum metadata storage period is 365 days.

ACS and Fire Alarm System Select from list the Database, created earlier for working with ACS
Database Module (for details refer to the SecurOS ACS User Guide).

7.3.8.1 Archive

Note. For more information on writing an archive, see Archive Recording section.

This block is designed to create a directories (information carriers) that allow to work with the SecurOS'
archives. For each directory a list of available operations is specified.

Appearance of the block is represented in figure 104.

www.issivs.com
SecurOS 154 Administration Guide
Core Subsystem

Figure 104. Archive Tab

The following operations are available in this block:


1. Select archive recording mode — select Primary archive recording mode;
2. Add directory — add a new directory to work with archives and specify a list of available
operations;
3. Edit directory — change current list of available operations with archive for current directory;
4. Remove directory — remove current directory from the list of directories.

Select archive recording mode


One can use one of the following primary archive recording mode: with optimal performance or with
disk space savings. To set archive recording mode select required option:
· Optimal performance — allows to increase archive write speed to disk due to decreasing archive
file fragmentation. Efficiency of this mechanism depends of free disk space.

Note. Intelligent Security Systems recommends to use 10%. This value is also recommended by Microsoft
Corporation for NTFS partitions. One can change this value in the Computer object settings.

This mode is recommended to use in case of long-time fragments recording (for example, for
continuous archive recording). If archive is recorded in short-time fragments, then using this mode
will shorten archive storage time and require more disk space.

· Save space — allow to use disk space more efficiently, but may decrease disk write speed. This
mode is recommended to use in case of short-time fragments recording (for example, by commands
of intelligent Modules). For the details refer to Video Recording Settings, description of
MaxFrames parameter.

www.issivs.com
SecurOS 155 Administration Guide
Core Subsystem

Add directory
The directory to work with archive can be represented by one of the following objects:
· local hard drive;
· removable storage;
· network drive;
· network folder.

Warning! The Linux OS supports the following file systems: ext3, ext4, cifs.

To add a new directory do the following:


1. Click the Add directory button.
2. In the Add new directory window (see figure 105) set the following parameters:

Figure 105. Add new directory window

· Select the option, that corresponds to the connected carrier:


- Drive — use this option to connect a hard drive, removable storage or network drive;

www.issivs.com
SecurOS 156 Administration Guide
Core Subsystem

Notes:
1. How to add local hard drives on the cluster's Hosts is described in the Storing Video Archive on the
Host's Local Drives.
2. Adding local hard drives in Linux OS is described in Partitioning and Mounting Local Discs in
Linux OS.
3. To mount a network drive in Linux OS use the sudo mount -v -t cifs command with the
actimeo=0 parameter and the nobr option.

- Network path — use this option to connect a network folder.

Warning! It is not recommended to use the same Directory to record Primary and Long-term archives
(see Archiver).

If necessary, specify user name and password to get access to this network folder.

Note. If local computer is being configured the Drive list consists only of available drive letters. If a remote
computer is being configured the list consists of all letters from A to Z. In this case select required letter.

· In the Video and Audio select from the list the operations, that can be performed with the archive
on this directory:
- Disable — the Video Server is not allowed to read and write an archive;
- Read Only — the Video Server is allowed only to read an archive;
- Read and Write — the Video Server is allowed both to read and write an archive.

Notes:
1. Operations with audio archives are disabled for network drives.
2. The Video section specifies the rights to perform operations with video and corresponding audio
accompaniment. The Audio section — to perform operations with audio that are not associated with
any video.

· In Archive recording check and, if necessary, modify the Minimum free drive space value.

Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to write
archive in Optimal performance mode as efficiently, as possible (see Select archive recording
mode).

3. Click the Add button. Selected carrier will be added to the list of directories. Operations, enabled for
this directory, will be marked with the symbol.

Warning! Scheduled defragmentation (for example, in Windows 10, Control Panel ®


Administrative Tools,
Defragment and Optimize Drives subsection) must be turned off for all hard drives selected to work with
archive.

Edit directory
To change a list of operation applicable to a directory do the following:
1. Select required directory and click the Edit button.
2. In the Edit existing directory (see Figure 106) select new values for the Video and Audio.

www.issivs.com
SecurOS 157 Administration Guide
Core Subsystem

Figure 106. Edit existing directory window

3. Click the Save button.

Remove directory
To remove a directory from the list select connected one in the list, then click the Remove button. To
confirm removing click the Yes button in the informational panel (see Figure 107).

Figure 107. Confirm removing panel

7.3.8.2 Auto login


Auto login feature is available both for SecurOS Users and Windows/Linux users registered in the
Windows Active Directory domain. If the credentials of these users match, the preference is given to the
SecurOS users.

Allow auto logon for User(s) parameters can take the following values:
· Name of any user, registered in the current Security Zone object within the SecurOS network (Object
tree® Users & Permissions group ®Department ®
User Account), excluding the superuser
(see SecurOS Users).

www.issivs.com
SecurOS 158 Administration Guide
Core Subsystem

· Name of any Active Directory Group. For the given value, auto login may be performed for any
member of the selected Group.
· Name of any Active Directory User. For the given value, auto login may be performed for the
specified user only.

Warning! Active Directory domain of the Windows network can be used for the authentication only if there is
an Active Directory Storage object registered in SecurOS and it is selected as a provider for the User rights object
(see Active Directory / LDAP).

· "Not set" (default value). For the given value, auto login may be performed for any Active Directory
User or member of any Active Directory Group, granted with the access rights defined in the User
rights object.

7.3.9 Event Filter

This object is designed to set the rules used to filter events that must be either displayed in the Event
Viewer window or saved into the database.

Parent object — Security Zone\Event f ilters group.

Figure 108. Event Filter object settings window

Table 13. Event Filter object settings

Parameter Description

Rules list

Type of the system object (that is the event source). Select the All option
Type
to address all possible objects.

ID of the system object (that is the event source). Leave the list empty to
Id
address all the objects of selected type.

www.issivs.com
SecurOS 159 Administration Guide
Core Subsystem

Parameter Description

Inf ormation f ield: name of the selected source object (the Id and Name
parameters correspond to each other — if one is selected then the other is
Name
filled automatically). Leave the list empty to address all the objects of
selected type.

Event to process. List of values depends on the object type.

Notes: Besides an individual or all events of an object, one of the following


predefined event groups can be selected as well:
1. Alarm only.
2. Information only.
3. Alarm and information.
Event
· To create a filter rule for one or several object events tick
corresponding checkboxes in the drop-down list of possible events of
this object (see Figure 109).

· To create a filter rule for one of the predefined event groups, select
that group (in the top of the list).

· Select the All option to address all possible objects of selected type.

Rule result. Possible values:

· Forbid — event will be discarded (not displayed in the Event Viewer


Mode window or saved into the database).

· Allow — event will be allowed (displayed in the Event Viewer


window or saved into the database).

Buttons

Add rule Click to add a new rule to the list.

Remove rule Click to remove selected rule from the list.

Remove all Click to remove all rules from the list.

Click to display Events to test block that allows to check the rule. Rule
Test filter
checking procedure is described below.

Button is used to sort rules manually. Click to move the rule one position
Up
up.

Button is used to sort rules manually. Click to move the rule one position
Down
down.

www.issivs.com
SecurOS 160 Administration Guide
Core Subsystem

Figure 109. Choosing multiple events for the object

To check the rule (i.e. to make sure what kind of action for the event this rule results in) do the
following:
1. In the object settings block (see Figure 109) click the Test filter button.
2. System will display Events to test section (see fig. 110).

Figure 110. Events to test section

3. In the Events to test section click the Add event button. Set the event needed to be tested.

Note. Rule parameters of the Events to test section are the same as described above in Rule list.

4. Click the Run test button. System will execute test and display result in the Rule field:
· No filter rules — list of rules contains no rules for the defined event.

www.issivs.com
SecurOS 161 Administration Guide
Core Subsystem

· Event is allowed by rule N — list of rules contains rule N that allows defined event.
· Event is forbidden by rule N — list of rules contains rule N that forbids defined event.

Note. "N" stands for the sequence number of the rule in the rule list.

5. To clear Events from test list, click the Remove event or the Remove all button. To hide the Events
to test section click the Hide test filter button.
6. To save/discard changes and leave the administration mode click the OK/Cancel button.

Filtering algorithm is as follows:

· Rules are applied consecutively in order of appearance in the Rules list.


· Only the first corresponded rule is implemented for the event.
· If there is no one explicit rule that allows event then event will be discarded.

7.3.10 SNMP agent


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

This object is designed both to send events generated by the system's cameras and to transmit cameras'
states to the specified computers as SNMP traps. Traps for the following events are transmitted
automatically as soon as they arise in the system:
· Camera: changed state;
· Camera: focused;
· Camera: defocused;
· Camera: unblinding;
· Camera: blinding;
· Camera: attached;
· Camera: detached.
When changing cameras' states the current states are transmitted. Received traps are processed with the
help of a SNMP Manager.

To get Cameras table and their states load into SNMP Manager the SecurOS MIB-file ISS-SECUROS-
MIB, that is located in <SecurOS_root_directory>\MIB.

This object can only be used if the Management and Monitoring Tools component is installed on the
computer (see Setting up Windows Managing and Monitoring Tools section).

Parent object — Computer\Notif ications group.

Object has no settings to configure.

www.issivs.com
SecurOS 162 Administration Guide
Core Subsystem

Note. Only one SNMP agent object is allowed in the object tree of the local computer. If the object is already
®
created then the Create SNMP agent command is unavailable.

7.3.10.1 Setting up Windows Management and Monitoring Tools


To set up the SNMP traps sending procedure do the following:
1. Install the Simple Network Management Protocol service:
· run Programs and features (Control Panel ®Programs and features);
· click the Turn Windows features on or off tab and select Simple Network Management Protocol
(SNMP) component including children;
· restart Windows.
® ®
2. Run the Services tool (Control Panel Administrative Tools Services) and open the SNMP
service (SNMP Service) Properties.
3. Click the General tab and select Startup type: Automatic.
4. Click the Traps tab (see figure 111) and specify Community name and Trap destinations
parameters.

Figure 111. Traps tab of the SNMP Service settings window

5. Click the Security tab (see Figure 112).

www.issivs.com
SecurOS 163 Administration Guide
Core Subsystem

Figure 112. Security tab of the SNMP Service settings window


In the Accepted community names add SNMP community, which can interact with the local computer.
Specify the following parameters of the community that is being added:
· Community — specify community name acceptable within the SecurOS network, for example, ISS;

Note. In general, one can use arbitrary community name, including public default value.

· Rights — assign computers of the added community any rights, including ability to read MIB file
from the local computer, for example, READ ONLY.

If the Accept SNMP packets from these hosts is selected, specify IP addresses of the computers within
the SecurOS network, where SNMP manager is installed.
6. Apply new settings.
7. Create the SNMP agent object in the SecurOS Object Tree.

After the steps described above are performed, SecurOS will automatically send traps to the specified IP
addresses in real-time.

7.3.11 External application

The object is used to automatically start an external application from SecurOS. Application is started
when SecurOS Video Server starts, and also after an object is created or enabled on the Video Server.

Parent object — Computer\Integration and Automation group.

www.issivs.com
SecurOS 164 Administration Guide
Core Subsystem

Figure 113. External Application object settings window

Table 14. External Application object settings

Parameter Description

Specify the name (executable file name) of the application or the


name of the application and the full path to it. If only application
name is specified, then start of an application is managed by OS
Application system settings on given computer, for example, defined in the
Path system variable. You can specify application name both
manually and using the Select button. String value can contain any
characters, allowed by Windows or Linux Operating Systems.

Specify the parameters that must be passed to the external


application when it starts. If there are several parameters, they must
Arguments be separated by a space in the list, for example, 1 2 3. Optional
parameter. If not set the application will be started without
parameters.

Specify application working directory or use the file manager to


Working directory browse it. Optional parameter. If not set, the SecurOS root folder
will be set as working directory.

External application launched from the SecurOS, has the following properties:
· External application that involves GUI, is started without loading this GUI.
· External application itself and all its children processes are terminated when deleting/disabling an
External application object from the Object Tree.
· When closing an external application (due to failure or manually by user), it restarts automatically.

At startup/startup failure/close of the external application SecurOS generates appropriate Events


(see SecurOS Programming Guide).

7.3.12 Database Partitioner

The object is intended for optimization (table partitioning) of SecurOS Auto databases. It allows to
speed up operations for databases with large number of records and metadata (see SecurOS Auto User
Guide). Database Partitioner settings window is represented in Figure 114.

Parent object — Computer.

www.issivs.com
SecurOS 165 Administration Guide
Core Subsystem

Figure 114. Database Partitioner object settings window

Table 15. Database Partitioner object settings

Parameter Description

Partition tables of database Select SecurOS Auto Database for table partitioning.

Number of records in Set number of records required for one partition.


partition

Displays the storage period (in days) of recognition result records in


Erase recognition results
selected Database (see Database). If the storage period is indefinite,
older than
erasing is not required.

If not selected, vehicle images are erased along with recognition


Erase images of vehicles result records.
older than Select this option to remove vehicle images earlier than recognition
result records.

7.3.13 Databases Replicator

Object allows automatically copy content of the SecurOS Auto database into the common database.
Such common database can be used for searching and viewing all the events of the SecurOS Auto (see
SecurOS Auto User Guide).

Copying of the selected databases will start after object creating and configuring. Entries will be copied,
starting with the oldest ones. After all entries are copied, replication is started in real time mode. All
subsequent changes of the source database will also be taken into account in the replicated database.

Parent object — Computer.

www.issivs.com
SecurOS 166 Administration Guide
Core Subsystem

Figure 115. Databases Replicator object settings window

Table 16. Databases Replicator object settings

Parameter Description

Databases Select one or several source SecurOS Auto databases to replicate.

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Replicate to database Select target database where source databases will be copied to.

www.issivs.com
SecurOS 167 Administration Guide
Interface Subsystem

8 Interface Subsystem
The Interface subsystem, contains objects responsible for visual representation of the system objects and
is actually used by operators working with the system.

8.1 Object Reference


The interface subsystem includes the following objects:
· Desktop.
· Map.
· Map: GUI.
· Event Viewer.
· External Window.
· HTML5 FrontEnd.

8.1.1 Desktop

This is a base user interface object that acts as a container to other user interface objects. It is used for
placement of one or more user interface components.

Parent object — Computer\Desktops group.

Warning! All visual components of the user interface are displayed only by the means of SecurOS Desktops.

Example. There are two rooms in a secured area. There is a PTZ dome camera and a microphone in the
first room and two cameras in the second room. The system administrator can configure two Desktop
objects. On the first Desktop there could be a Media Client to control PTZ, view video and listen the sound. On
the second Desktop there could be a second Media Client to watch cameras from the second room, and a Map:
GUI displaying the map of the whole territory to provide visual access to all the security devices and to
control their states. If several displays connected to the operator's computer one can create create the one
Desktop instead of several ones and place all required interface object on these available displays.

www.issivs.com
SecurOS 168 Administration Guide
Interface Subsystem

Figure 116. Desktop object settings window

Table 17. Desktop object settings

Parameter Description

Located on the left part of the window. Object tree displays all
interface objects children to the Desktop that is being configured. If
operator's computer has several displays, these objects will be
grouped relative to the Display on which they are located. States of
the objects in the object tree are displayed similar to the object states
Object Tree in the SecurOS Object Tree (see Disabling/ Enabling Objects). Below
the tree the New Display field is located, that is used to create a
new display and place an object window on it.

Note. Context menu (see Desktop Setup Operations) is available for


each tree object.

Located on the right part of the window. Is intended for setting


operator windows' sizes and positions in graphic mode and
Visual settings area
previewing settings result. Contains buttons to control interface
object windows.

Located below the Visual settings area. In this block the name of
Information about
the selected window, relative coordinates of its position and sizes
configured window block
are displayed.

www.issivs.com
SecurOS 169 Administration Guide
Interface Subsystem

8.1.1.1 Desktop Setup Operations


To place windows of the SecurOS or the SecurOS intelligent Modules user interface on the Desktop it is
necessary to set relative coordinates of their position and sizes of these windows. Desktop object settings
window allows to set these parameters and visually analyze the result (see Figure 117).

Note. These parameters can also may be specified in the each SecurOS object settings.

Figure 117. Desktop object settings window

You can perform the following operations in the settings window:


· Adding new object to display.
· Changing object window position and size.
· Creating new display.
· Moving object window to selected display.
· Moving all object from one display to another.
· Deleting display.
· Other operations with object.

Details of operations with the multi-window objects (for example, SecurOS Auto operator GUI) are
described in the Features of working with multi-window objects.

www.issivs.com
SecurOS 170 Administration Guide
Interface Subsystem

Adding new object to display


1. In the Desktop object tree select the Display to which a new interface object must be added.
When configuring the Desktop for the first time an empty display is automatically created in the
object tree.
2. In the Visual settings area click the Add interface button.
3. Select required SecurOS interface object in the drop-down list. System will display the Parameters
of created object window (see Figure 118).

Figure 118. Parameters of created object

4. Specify required parameters and click OK. An object will be created in the SecurOS Object Tree
and added to the selected display.

Note. This operation can also may be performed via Display object's context menu in the Desktop object tree.

Changing object window position and size


1. In the Desktop object tree select an object which window have to be configured. In the Visual
settings area window of this object will be highlighted with a dotted line.
2. To change window's position drag-and-drop it to the required position.
3. To change window's size place mouse pointer over window vertex or any side then stretch the
window horizontally or vertically.

Creating new display


A new display may be created in the following ways:
· Via New Display button in the Desktop object tree:
1. Click the New Display button in the Desktop object tree. A new empty display will be
created in the tree.
2. Perform the Adding new object to display operation, othrwise created empty display will be
removed from the Desktop object tree.

· By drag-and-drop from an existing display:


1. In the Desktop object tree select an object which window must be placed on a new display. In
the Visual settings area window of this object will be highlighted with a dotted line.
2. Drag-and-drop object's window from the Desktop object tree or from the Visual settings area
to the New Display field.

· Selected window can also be moved using the Move button located in the Desktop visual
settings area:

www.issivs.com
SecurOS 171 Administration Guide
Interface Subsystem

1. In the Desktop object tree select an object which window must be placed on a new display. In
the Visual settings area window of this object will be highlighted with a dotted line.
2. In the Visual settings area click the Move button.
3. In the drop-down list select the New Display.

· Via Move command of the object context menu:


1. In the Desktop object tree select an object which window must be placed on a new display.
2. In the context menu select the Move command.
3. In the drop-down list select the New Display.

Warning! Number of displays connected to the operator's computer is not detected automatically and must be
controlled by the administrator.

Moving object window to selected display


1. In the Desktop object tree select an object which window must be placed on another display. In
the Visual settings area window of this object will be highlighted with a dotted line.
2. Drag-and-drop window from the Desktop object tree or from the Visual settings area to the
required display from the list.

Note. Selected window can also be moved with the help of the methods described above, see Creating new
display.

Moving all object from one display to another


1. In the Desktop object tree click the button to the left of the display all windows of which
must be moved to another display.
2. In the drop-down list select required display.

Deleting display
To delete display from the Desktop object tree it is enough to move all object windows located on it to
another display. Display will be automatically deleted when selecting another display in the Desktop
object tree or after applying object settings if there is only one display in the tree.

Other operations with object


Other operations are performed via object context menu. Context menu is available both in the Desktop
object tree and Visual settings area. The following operations are available in the context menu:
· Moving object — see Moving object window to selected display;
· Disabling object — allows temporary disable an object (for the details see Working with Objects).
In the Desktop object tree disabled object will be marked in the same way as in the SecurOS Object
Tree (see Figure 119);

www.issivs.com
SecurOS 172 Administration Guide
Interface Subsystem

Figure 119. Disabled Object

· Renaming object — allows rename an object (for the details see Working with Objects);
· Deleting object — allows delete an object from the SecurOS Object Tree (for the details see Working
with Objecs).

Note. To move and delete objects one can also use the appropriate buttons located in the Visual settings area.

Features of working with multi-window objects


Besides pointed above operations, when working with multi-window interface objects one can control
window displaying mode on the operator monitor directly from the Desktop object settings window.
This operation is similar to the enabling/disabling window displaying mode in the object own settings
(for example, LPR: GUI, see SecurOS Auto User Guide). When working with windows of such objects
in the Information about configured window block select checkbox to the right of the objects name to
display window (see Figure 120) or deselect checkbox to hide the window.

www.issivs.com
SecurOS 173 Administration Guide
Interface Subsystem

Figure 120. Window displaying mode control checkbox

When working with the SecurOS POS Module windows (see SecurOS POS User Guide) the
Information panel window will always be displayed on the same display where the Events log
window is placed, independently of its position in the Desktop object settings window.

8.1.2 Map

This object represents a multi-layered graphical map of the territory under surveillance.

Parent object — Security Zone\Maps group.

www.issivs.com
SecurOS 174 Administration Guide
Interface Subsystem

Figure 121. Map object settings window

Note. Current dimensions of the Levels, Devices and Map image blocks can be changed using the mouse.

Table 18. Map object settings

Parameter Description

Levels

Name Map level tree and name.

Text color Color of the object caption on the image of the map level.

Size of objects icons on the Map and in the Map: GUI window.
Possible values:

· S — small;

· L — large.
Icons
Note. When the current scale is from 25% to 200% then the icons of the
specified size are displayed. When the scale of the map level is less than
25%, the size of the icons will be automatically changed to S and will be
changed to L when the scale is more than 200%.

www.issivs.com
SecurOS 175 Administration Guide
Interface Subsystem

Devices

Search Is used to search for devices (see Working with Map Objects).

This box displays an SecurOS Object tree, that contains all system
Device tree
devices, that can be placed on the map.

Map image

Current scale of the map level. Default value is 100%. To change the
scale, select the required value from the list or move the mouse
cursor over the image and use the mouse scroll wheel.
Scale Warning! The field can be moved anywhere in the Map display area. To
move the field, place the mouse pointer over the field name, press the left
mouse button and, without releasing it, move the field to the required
position.

Map display area Image of the current map level.

Buttons

Click the button to create a new map level (see Working with Map
Create new level
Layers).

8.1.2.1 Maps Working Principles

To make monitoring a Security Zone more convenient it is recommended to use a Map — an image of the
protected territory and security devices located on it. A Map can include a number of levels, that
correspond for example, to parts of the protected territory, levels of the controlled building or separate
rooms on each level. Each Level of the Map is represented by a map image of the protected area with
icons of the security equipment, such as cameras, alarm sensors etc., placed on it in accordance with the
area's physical locations.

To enable use of Maps in SecurOS one should perform the following operations:
1. Create a Map object;
2. On the Operator Workstation create a Map: GUI object;
3. Assign operator access rights to this object.

Note. The same Map object can be used in the Map: GUI window on the several Operator Workstations.

The operator can use maps to monitor the entire territory, and also use the icons allocated on a map for
fast control of the corresponding object. If an intrusion alarm has been detected, an operator can
immediately see the physical location of the target area, switch to the video cameras that are located
close to this area by double-clicking on icons on map, switch the lights on within that area, lock certain
doors, etc...

www.issivs.com
SecurOS 176 Administration Guide
Interface Subsystem

8.1.2.2 Drawing Map Layers

Use of map layers is convenient for large territory separation into several independent parts. Map layers
are images in BMP, JPEG, JPG or PNG format. To draw your map images from scratch, one can use any
graphical drawing software that allows you to save the images in the formats listed above. You can also
export the images directly from CAD software where you or the owner of the building develops source
documentation on the building or territory, or you can scan the previously printed plans of your
territory.

The resulting image or images can have any colors and style, but you should consider the following:

1. All plans of your territory should be done in the same graphical style for better visual perception.
2. Keep the image dimensions in pixels comparable to dimensions of the target maps on the screen of
the operator workstation to avoid redundant scrolling.
3. Colors should not distract operator from objects placed on map. Do not use gaudy colors; avoid
using red and orange colors. The more neutral the background is, the better.
4. Provide descriptive captions for all territories. Text should be clearly visible and readable.
5. Give images meaningful names (i.e. map_floor1.png, map_floor2.png, map_room123.png
etc.).

Warning! It is not recommended to use map image files greater than 4 MB.

8.1.2.3 Working with Map Layers

To add a new map layer:


1. Click the Create new level button in the object settings window. The level settings window will
appear (see Figure 122).

www.issivs.com
SecurOS 177 Administration Guide
Interface Subsystem

Figure 122. Level settings window

2. Type in a new layer name in the Name field.


3. Select the size of the object icons:
· S — small;
· L — large.

4. Click the button on the right of the Text color field and select a color of the object caption for the
current map level in the standard window.
5. There are two ways to select a level image:
- specify file URL. In the text box of this option enter the URL where the image is located (the
address must start with http or https). To preview the requested image, click the button to the
right of the file URL input field.
- Select file to upload. Click the button to the right of this option and use the file manager to
select the image file of the new map level.
6. Click the OK button.

Note. The created level is placed into the Name list (Level Tree) in alphabetical order.

To switch between levels one can use a link, represented with a special icon (see Figure 123).

www.issivs.com
SecurOS 178 Administration Guide
Interface Subsystem

Figure 123. Map object link icon

To create a level link:


1. In the Level Tree select a level, where the link to the other level must be placed. The image of this
level will be displayed in the Map display area of the Map.
2. Select a level that must be referenced, then click it in the Name list (Level Tree) and, holding the
mouse button, move the mouse cursor to the first level image.
3. Release the mouse button.

Once created, a link icon will appear on the map (see figure 123). The link icon can be moved across the
map by clicking the left mouse button on the icon, dragging the mouse pointer to the new location, and
then releasing the left mouse button.
Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation, we
recommend to create another link on the target layer that points back to the source one. Thus, it will be
possible to switch between layers in both directions smoothly.

A link icon must be placed on a map level image in accordance to the structure of the protected area.
For example, if each map level represents a separate floor of the protected building, a link icon is
reasonable to be placed on the stairs to the next floors, etc.

Additional operations on a Map's level are performed with the help of a context menu, opened by right-
clicking on the level name in the Name list (Level Tree). The context menu contains the following
options (see Figure 124):

Figure 124. Map level context


menu

· Edit level — edit current level;


· Create child level — create a child level to the current level in the Name list (Level Tree);
· Delete — delete current level.

A child level can also be created by drag-and-drop. Click a level, that is supposed to be a child, then
drag it on the level, that is supposed to be a parent (see Figure 125).

www.issivs.com
SecurOS 179 Administration Guide
Interface Subsystem

Figure 125. Creating child level by drag-and-drop

8.1.2.4 Working with Objects


One can perform the following operations with an objects on the Map:
· Searching Object in the Device Tree.
· Placing Object on the Map Layer.
· Changing Object Position on the Map Layer.
· Aligning camera FOV.
· Moving Object Caption.
· Changing Object Caption Appearance.
· Removing Object from the Map Layer.

To find an object in the Device Tree, enter any character (or set of characters), that are part of the
object name or object ID into the Search text box. All devices, whose names comply with the specified
set of characters, will be displayed in the Device Tree. Later, one can place the found object on the Map.

To place an object on the Map level do the following:


1. In the Levels block select a level, to which an object must be placed. Level base image will be
displayed on the right of the settings window.
2. In the Devices block select an object that must be placed on the selected level.
3. Click selected object and, holding mouse button pressed, move an object from the list to the required
position on the level base image.

To change current object position on the Map layer do the following:


1. In the Levels block select a level, on which an object must be relocated.
2. Click object's icon and, holding mouse button pressed, move an object to the new position on the
level.

To rotate Camera icon to align it with actual camera's FOV do the following:
1. Click the Camera icon. Double-sided arrow will be displayed on the right of the icon, see Figure 126.

www.issivs.com
SecurOS 180 Administration Guide
Interface Subsystem

Figure 126. Rotating Camera Icon on Map

2. Place mouse pointer over this arrow and click the mouse button. Holding mouse button pressed
rotate camera icon about its axis to align icon in accordance with actual camera FOV.

To move an object caption do the following:


1. Place mouse pointer over the object caption and press left mouse button. Pointer will be changed as
it represented in Figure 127.

Figure 127. Moving Object Caption

2. Holding mouse button pressed move caption string in any place around the icon.

To change object caption appearance do the following:


1. Click the icon on the right of the caption (see Figure 128).

Figure 128. Changing Object Caption

2. Object caption will be displayed on the Map in the short form (see Figure 129).

Figure 129. Short Object Caption

To display full object caption click the icon on the right of the caption (see Figure 129).

To delete an object on the Map level do the following:


1. In the Levels block select a level, from which an object must be deleted.

www.issivs.com
SecurOS 181 Administration Guide
Interface Subsystem

2. Click an object and press the Delete button. Also one can use Remove context menu command to
delete an object.

8.1.3 Map: GUI

This object provides a GUI to display a Map.

Parent object— Desktop.

Figure 130. Map: GUI object settings window

Table 19. Map: GUI object settings window

Parameter Description

Specify the top left corner coordinates relative to the top left corner
of the display (X, Y) as well as width and height (W, H) of the Map:
X, Y, W, H
GUI window (as percentages of the display's horizontal and vertical
size).

Display Choose the ID of the physical display this object belongs to.

Select one of the previously created maps (see Map), that should be
Map
displayed in this window.

If selected, the Map: GUI will display the Levels tab. The tab
contains the level list of the Map, that allows switching between
levels.

Show level tree By default it is selected.

Note. If not selected, then switching between levels in the Map: GUI is
possible only with the help of level link icons (see Working with Map
Layers).

www.issivs.com
SecurOS 182 Administration Guide
Interface Subsystem

Parameter Description

If selected, the Map: GUI will display the Alarms tab. The tab
contains the alarmed level list of the Map, that allows quick
switching between alarmed levels.

Show alarmed levels Note. A level is considered alarmed if at least one of the objects placed
on this level is alarmed.

By default it is selected. Unavailable if Show level tree is not


selected.

Choose Media Client that will be used to watch video when jumping
from Map: GUI window. To jump to the Media Client to watch video
click the icon of one of the objects located in the Map: GUI window:

· Camera — when jumping the cell of the corresponding Camera


Work with Media Client
will be displayed in the 1x1 layout in live video mode;

· Sensor — when jumping the cells of all Cameras specified in the


selected Sensor object settings will be displayed in the most
appropriate layout in live video mode.

Select to display all Cameras of the level when switching to this Map
Level. Other Cameras associated with the objects of this level will be
Show Cameras in Media also displayed. The Cameras will be displayed on the Media Client in
Client and filter objects in the most appropriate layout. If number of such Cameras exceeds the
ACS: GUI on Level number of cells in the maximum possible layout, the remaining
activation Cameras will be placed on the next Media Client pages.
Warning! Select the Media Client in the Work with Media Client parameter
to provide display of required Cameras.

Select the ACS: GUI object, for which the filter of ACS objects
Filter objects in ACS: GUI
belonging to activated Map Level will be applied.

8.1.4 Event Viewer

Object represents a visual log of the events that occur within the entire system.

Parent object — Desktop.

www.issivs.com
SecurOS 183 Administration Guide
Interface Subsystem

Figure 131. Event Viewer object settings window

Table 20. Event Viewer object settings

Parameter Description

Specify the object window's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.

Display Choose the ID of the physical display this Event Viewer belongs to.

The Event Filter is used to control what events are displayed in the
Event Viewer interface window. Optional parameter. If Don't use
Use Event Filter value is selected then all system events will be displayed. If filter is
selected, only events allowed by selected filter (see Event Filter
section) will be displayed.

Choose Media Client that will be used to watch video appropriate


of event listed in the protocol.
Work with Media Client
Warning! If Media Client is not selected, then you will not be able to jump
from the Event Viewer to the Media Client to watch video.

Select this parameter to give the operator an access to the Event


Work with events of
Viewer tools designed to make it easier to view and search for events
different timezones
from different time zones.

Choose from the list an Emergency service object that will be used to
Send Ticket to Emergency
create and send Emergency ticket (see Emergency service and
Service
Interaction with External Emergency Service).

Operator reaction on alarm Check this option to enable operator reaction on alarm events.
event

www.issivs.com
SecurOS 184 Administration Guide
Interface Subsystem

Parameter Description

Time of acknowledgment of Define the time for alarm event acknowledgement by the operator,
alarm event by the operator in seconds.

8.1.5 External Window


In Linux OS the functionality is not supported.

Object is used to automatically launch an external application and position its window on the screen.

Parent object — Desktop.

Figure 132. External Window object settings window

Table 21. External Window object settings

Parameter Description

Specify the object window's top left corner coordinates (X, Y), as
well as its width and height (W, H), as percentages of the display's
horizontal and vertical size. Window size may not be set for all
applications when they are called by an external program.

X, Y, W, H The range of possible values of the coordinates (X, Y) and the


window sizes (W, H) — [0; 999]. For example, if X=150, Y=0,
W=150 and H=100 values are specified, then the window of the
external application will be located on the second and third displays
(horizontally). Window vertical size will be equal to vertical size of
the second display.

Display Choose the ID of the physical display this object belongs to.

Specify path to executable file. You can omit the exact path to the file
Application if it is located in the directory specified in the Path environment
variable.

Click on this button and use file manager to browse executable of an


Select (button)
application to be started.

www.issivs.com
SecurOS 185 Administration Guide
Interface Subsystem

Parameter Description

Application window For the multi-window applications specify the name of the window
(optional) that the operator needs to work with.

8.1.6 HTML5 FrontEnd


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

The object is intended for creation the window on the SecurOS Desktop to display external HTML
application that include SecurOS control interface. This application window is loaded when the
corresponding Desktop is activated.

Using the object, one can integrate any external applications that support HTML5 into SecurOS.

Object allows:
· To specify size and arrangement of the external HTML application window on the SecurOS Desktop.
· To select the Media Client and the Map: GUI window for operating with external HTML application;
· To transmit additional parameters from SecurOS to the external HTML application.

Parent object — Desktop.

Figure 133. HTML5 FrontEnd object settings window

Table 22. HTML5 FrontEnd object settings

Parameter Description

Window position

www.issivs.com
SecurOS 186 Administration Guide
Interface Subsystem

Parameter Description

Specify the object window's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.

Choose the ID of the physical display where the window of the


Display
external HTML application will be displayed.

Specify URL of the HTML page of the external application or specify


URL
the path to the index file.

In the drop-down list select the Media Client that will be used to
work with the HTML application. Working with Media Client means
sending it Events or Commands in the SecurOS format.
Work with Media Client
Note. Media Client control Events and Commands are described in the
SecurOS Programming Guide.

In the drop-down list select the required Map: GUI window for
operating with HTML application. Operating with the Map: GUI
window means sending it Events or Commands in the SecurOS
Work with Map: GUI format.

Note. Events and Commands of the Map: GUI window control are
described in the SecurOS Programming Guide.

If it necessary to pass additional parameters from SecurOS to the


external HTML application specify these parameter within this field.
Advanced Specified parameters will be passed to the external application
inside the SETUP message together with selected Media Client's and
Map: GUI window's IDs.

www.issivs.com
SecurOS 187 Administration Guide
Video Subsystem

9 Video Subsystem
The video subsystem is used to operate and configure the video devices within the SecurOS network. In
addition, it is responsible for transmitting video streams between servers and workstations as well as
working with live and archived video from within workstations.

When transferring video streams between devices and services, encoding (compression) of video into
certain standard formats is usually used. This is used to provide video compatibility with a wide range
of devices, as well as to reduce file size and save traffic. When a video stream is received on the client
side, decoding (decompression) is first performed, and then the video is displayed. Examples of services
that use own SecurOS decompression feature are the following: Media Client, motion and defocus
detectors, analytics modules and others. Such services as SecurOS WebConnect and SecurOS Mobile use
third-party tools to decode live and archived video streams.

The encoding process is a change in image format. In this case, there is a decrease in the amount of
video information with a loss in image quality. The more an image is compressed, the less space it takes
up and the greater the loss in quality. An encoded image cannot be displayed on the screen; it must first
be decoded. Accordingly, decoding is the reverse process of restoring the original image from a
compressed format. The higher the compression ratio, the more different the original image and the one
obtained after the compression-decompression cycle.

SecurOS implements two types of image processing (compression/decompression): software and


hardware.
· In the case of software video processing, all calculations take place on the computer's central
processor.
· Hardware processing is carried out using an integrated or a discrete video adapter. This can
significantly reduce the CPU load, speed up video processing, and also reduce system power
consumption. This makes it possible to process more video streams in the system or use higher
resolution video streams without dropping frames (decrease in FPS).

9.1 Hardware Decoding


SecurOS supports hardware decompression of H.264/H.265 video streams.

The hardware decompression mechanism is implemented differently depending on the operating


system:
· The operating systems of the Microsoft Windows family use DXVA 2.0, a DirectX component
developed by Microsoft and designed to process (primarily, to decode) video bitstreams using
graphics processors. For a more detailed description, see Setting up Hardware Decompression in
Windows OS.
· On Linux-based operating systems, the interface used for hardware decompression depends on the
vendor of the computer's video adapter and is configured additionally. For a more detailed
description, see Setting up Hardware Decompression in Linux OS.

Warning! Clients displaying video from SecurOS outside of the SecurOS operator interface may use native
hardware decompression. For example, SecurOS WebConnect uses browser decompression facilities.

www.issivs.com
SecurOS 188 Administration Guide
Video Subsystem

Different manufacturers use independent trademarks to designate hardware decoding technology: Intel
Quick Sync Video, NVIDIA PureVideo HD, AMD VCN. SecurOS supports all of the listed technologies.
In the Windows family of operating systems, if there are several video adapters, decoding tasks are
evenly distributed among all the video cores of the system, including discrete and integrated ones,
regardless of vendor. In the Linux OS, hardware decompression uses only those video adapters that
support the API package installed in the OS (for more details, see Setting up Hardware Decompression
in Linux OS).

Intel Quick Sync Video is recommended to work with SecurOS. This technology demonstrates the best
decompression speed among competitors (NVIDIA, AMD). SecurOS supports this technology when
using the Intel HD Graphics 2500, HD4xxx, HD5xxx (based on the GT3 cores) graphic adapters and
above.

All of these video adapters implement Intel Quick Sync Video 2.0 technology, which redirects decoding
operations to a special hardware module of the Intel HD Graphics - Multi-Format Codec Engine (MFX).

All listed video processors are CPU integrated and support hardware decoding independently of
central processor model (i3, i5, i7, etc.):
· For H.264 – on Intel Core 3xxx and above.
· For H.265 – on Intel Core 5xxx and above.

Not all processor models have such an integrated video adapter (for example, F-series and Xeon
processors).

Warning! Currently SecurOS does not support Intel Quick Sync Video 1.0 technology for the mobile and
desktop Intel HD Graphics 2000 graphics adapters. Thus, hardware decoding is not performed for Sandy
Bridge architecture based CPUs.

The key metric of the MFX block efficiency is its bandwidth (in Gbit/sec of the compressed video),
that is limited not only by the number of video streams decoded at the same time, but the total number
and size of these streams. For example, Intel Quick Sync 2.0 decoder can process about 40 —50 streams
of 2 Mbit/sec each.

RAM efficiency can be a limiting factor. In other words, the RAM should have time to process a
specified number of the decoded streams The data level directly depends on the used resolution. So to
get maximal efficiency, dual-channel RAM should be used with a recommended frequency of
1600 Mhz and above.

9.1.1 Setting up Hardware Decompression in Windows OS

Hardware decompression is automatically executed in the system.

· If only the integrated video adapter is installed and used in the computer, then no further action
required.
· If the computer has one or more discrete video adapters installed and no integrated video adapters,
then all discrete video adapters are used. No action required.
· If one or more discrete video adapters are used and an integrated video adapter is present in the
processor, the system board driver automatically disables the integrated video adapter.
Decompression is performed only on discrete video adapters.

To enable hardware decompression on the integrated GPU, follow these steps:

www.issivs.com
SecurOS 189 Administration Guide
Video Subsystem

1. Enable integrated graphics adapter in the BIOS (location of the command in the BIOS menu depends
on BIOS manufacturer and version). After this operation is complete, integrated graphics adapter is
detected by the Windows Device Manager.
2. Install the latest compatible integrated video adapter driver.

9.1.2 Setting up Hardware Decompression in Linux OS

This section contains information about configuring the decompression mode in SecurOS, which is
selected based on additionally installed Linux packages (see Configuring Hardware Acceleration in
Linux OS. If you plan to use software decompression, then you do not need to install additional Linux
packages. In this case SecurOS configuring is also not required, since the software decompression mode
is selected by default.

To configure the decompression mode in Linux OS, do the following:


1. Stop the vms_server daemon using the sudo service vms_server stop command.
2. Open the /etc/xdg/iss/securos.conf file for editing and add the
Video\H264Decompressor=X line, where X is a value that determines the mode and method of
decompression:
· ffmpeg_sw (default value) — software decompression that uses ffmpeg library.
· ipp — software decompression that uses Intel IPP library.
· ffmpeg_vaapi — hardware decompression that uses VA-API and the ffmpeg library.
· ffmpeg_vdpau — hardware decompression that uses VDPAU and the ffmpeg library.
· ffmpeg — is similar to ffmpeg_vaapi.
3. Start the vms_server daemon using the sudo service vms_server start command.

9.2 Hardware compression


SecurOS supports hardware compression of H.264 video streams.

The hardware decompression is implemented differently depending on the operating system:


· The Microsoft Windows OS family uses the Intel Media SDK library that allows to encode video
to H.264 format using Intel graphics adapters. Hardware encoding is supported automatically (no
additional SecurOS settings are required).
· On Linux-based operating systems, hardware compression is supported using the VA-API, but this
requires additional Linux packages to be installed (see Configuring Hardware Acceleration in
Linux OS).

9.3 Configuring Hardware Acceleration in Linux OS


Warning! By default, Linux OS uses software decompression.

In contrast to Windows, to provide hardware decompression in Linux you need to install additional
API packages depending on the origin of the video adapter used:
· Video Acceleration API (VA-API) supports Intel, AMD, and NVIDIA (open source Nouveau drivers
only).

www.issivs.com
SecurOS 190 Administration Guide
Video Subsystem

· Video Decode and Presentation API for Unix (VDPAU) support AMD, NVIDIA (proprietary drivers
and Nouveau). This works only in interface applications. For the server modules (Auto, TK3, etc.)
this technology is not available.

Warning! NVIDIA adapters do not support simultaneous use of SecurOS neural network algorithms and
decompression. Therefore, to utilize a neural network algorithms that work on an NVIDIA video adapter, you
need to configure a different video adapter for hardware decompression.

9.3.1 Installing Additional Packages on Linux OS

This section provides information on installing additional Linux packages to use hardware acceleration.
This manual is suitable for most Linux operating systems except Debian. Instructions for installing
Debian packages can be found in Installing Additional Packages on Debian OS.

INTEL
Free Intel graphics drivers support VA-API:
· The HD Graphics series starting from Broadwell and higher are supported by the intel-media-
driver.
· GMA 4500 series and newer GPUs up to Coffee Lake are supported by libva-intel-driver.
· H.264 decoding on the GMA 4500 is supported by libva-intel-driver-g45-h264.
· VP9 hybrid decoding on Broadwell to Skylake processors, as well as VP8 hybrid decoding on
Haswell to Skylake processors, is supported by the intel-hybrid-codec-driver.
· Skylake and newer generations also require the linux-firmware package.

NVIDIA
The free Nouveau driver supports both VA-API and VDPAU:
· GeForce 8 series and newer (up to GeForce GTX 750) are supported by libva-mesa-driver and
mesa-vdpau.
· The nouveau-fw firmware package currently extracted from the NVIDIA binary driver is required.

The NVIDIA proprietary driver supports the following technologies through the nvidia-utils
package:
· VDPAU on GeForce 8 series and later.
· NVDECODE on Fermi and later.
· NVDECODE on Kepler and later.

ATI/ AMD
Free ATI and AMDGPU drivers support both VA-API and VDPAU:
· VA-API on Radeon HD 2000 and newer is supported by libva-mesa-driver.
· VDPAU on Radeon R300 and newer is supported by mesa-vdpau.

The proprietary AMDGPU PRO driver builds on the AMDGPU driver and supports both VA-API and
VDPAU.

www.issivs.com
SecurOS 191 Administration Guide
Video Subsystem

9.3.2 Installing Additional Packages on Debian OS

VA-API
· To use NVIDIA Nouveau and various AMD drivers, just install the mesa-va-drivers package.
· Driver packages for Intel hardware depend on the generation of graphics adapters, and are also
divided into f ree and proprietary. Proprietary drivers support video encoding/decoding, while f ree
drivers only support video decoding. For Intel generation 8+ hardware, a free driver can be
installed using the intel-media-va-driver package. The proprietary driver is included in the
intel-media-va-driver-non-free package.
· If you are going to use older Intel hardware, a free driver can be installed using the i965-va-
driver package. The proprietary driver is included in the i965-va-driver-shaders package.

VDPAU
· To enable VDPAU support for AMD drivers (radeon and amdgpu), as well as open source
Nouveau for NVIDIA cards, install the vdpau-driver-all package.
· To enable VDPAU support for NVIDIA proprietary drivers, you must select the package that
matches your driver version. If you installed the latest drivers using the nvidia-driver package,
then just install the nvidia-vdpau-driver package.
If you are using an outdated driver, select the appropriate package from the following:
- nvidia-legacy-304xx-vdpau-driver.
- nvidia-legacy-340xx-vdpau-driver.
- nvidia-legacy-390xx-vdpau-driver.

9.3.3 Checking Hardware Acceleration Work

In most cases, hardware acceleration will work correctly by default. You can check this in the ways
described below:
· Checking VA-API.
· Checking VDPAU.

Checking VA-API
Check your VA-API settings by running vainfo (provided by the libva-utils package):

libva info: VA-API version 0.39.4


libva info: va_getDriverName() returns 0
libva info: Trying to open /usr/lib/dri/i965_drv_video.so
libva info: Found init function __vaDriverInit_0_39
libva info: va_openDriver() returns 0
vainfo: VA-API version: 0.39 (libva 1.7.3)
vainfo: Driver version: Intel i965 driver for Intel(R) Skylake - 1.7.3
vainfo: Supported profile and entrypoints
VAProfileMPEG2Simple : VAEntrypointVLD
VAProfileMPEG2Simple : VAEntrypointEncSlice
VAProfileMPEG2Main : VAEntrypointVLD
VAProfileMPEG2Main : VAEntrypointEncSlice
VAProfileH264ConstrainedBaseline:
VAEntrypointVLD
VAProfileH264ConstrainedBaseline: VAEntrypointEncSlice
VAProfileH264ConstrainedBaseline: VAEntrypointEncSliceLP
VAProfileH264Main : VAEntrypointVLD
VAProfileH264Main : VAEntrypointEncSlice
VAProfileH264Main : VAEntrypointEncSliceLP

www.issivs.com
SecurOS 192 Administration Guide
Video Subsystem

VAProfileH264High : VAEntrypointVLD
VAProfileH264High : VAEntrypointEncSlice
VAProfileH264High : VAEntrypointEncSliceLP
VAProfileH264MultiviewHigh : VAEntrypointVLD
VAProfileH264MultiviewHigh : VAEntrypointEncSlice
VAProfileH264StereoHigh : VAEntrypointVLD
VAProfileH264StereoHigh : VAEntrypointEncSlice
VAProfileVC1Simple : VAEntrypointVLD
VAProfileVC1Main : VAEntrypointVLD
VAProfileVC1Advanced : VAEntrypointVLD
VAProfileNone : VAEntrypointVideoProc
VAProfileJPEGBaseline : VAEntrypointVLD
VAProfileJPEGBaseline : VAEntrypointEncPicture
VAProfileVP8Version0_3 : VAEntrypointVLD
VAProfileVP8Version0_3 : VAEntrypointEncSlice
VAProfileHEVCMain : VAEntrypointVLD
VAProfileHEVCMain : VAEntrypointEncSlice

VAEntrypointVLD means that the video adapter is capable of decompressing this format, and
VAEntrypointEncSlice means that this format can be compressed.

This example uses the i965 driver:

libva info: Trying to open /usr/lib/dri/i965_drv_video.so

If the following error is displayed when executing vainfo:

libva info: va_openDriver() returns -1


vaInitialize failed with error code -1 (unknown libva error),exit

You must set the correct driver, see Setting Up VA-API.

Checking VDPAU
Install the vdpauinfo package to get a full VDPAU driver configuration report and make sure it is
loaded correctly:

$ vdpauinfo
display: :0 screen: 0
API version: 1
Information string: G3DVL VDPAU Driver Shared Library version 1.0

Video surface:

name width height types

420 16384 16384 NV12 YV12


422 16384 16384 UYVY YUYV
444 16384 16384 Y8U8V8A8 V8U8Y8A8

Decoder capabilities:

name level macbs width height

MPEG1 --- not supported ---


MPEG2_SIMPLE 3 9216 2048 1152
MPEG2_MAIN 3 9216 2048 1152
H264_BASELINE 41 9216 2048 1152
H264_MAIN 41 9216 2048 1152
H264_HIGH 41 9216 2048 1152

www.issivs.com
SecurOS 193 Administration Guide
Video Subsystem

VC1_SIMPLE 1 9216 2048 1152


VC1_MAIN 2 9216 2048 1152
VC1_ADVANCED 4 9216 2048 1152

..

9.3.4 Solving Common Hardware Acceleration Problems

Although the video driver should automatically enable support for video hardware acceleration using
VA-API and VDPAU, in some cases you may need to configure VA-API/VDPAU manually. Before
continue reading this section, review the Testing Hardware Acceleration section.

The default driver names are determined automatically by the system if there are no other settings.
However, they often do not match and do not work. One can view estimated values by running the
following command:

$ grep -iE 'vdpau | dri driver' /var/log/Xorg.0.log

Result of command execution:

(II) RADEON(0): [DRI2] DRI driver: radeonsi


(II) RADEON(0): [DRI2] VDPAU driver: radeonsi

In this case, the radeonsi driver for VA-API and VDPAU is used by default.

Warning! If you are using GDM, run journalctl -b | grep -iE 'vdpau | dri driver’.

Setting Up VA-API
The VA-API driver can be redefined using the LIBVA_DRIVER_NAME environment variable:
· Intel graphics:
- Specify i965 if using libva-intel-driver (i965-va-driver for Debian).
- Specify iHD if using intel-media-driver (intel-media-va-driver for Debian).
· NVIDIA:
- Specify nouveau if using Nouveau.
- Specify vdpau if using NVIDIA.
· ATI/AMD:
- Specify radeonsi if using AMDGPU.

Please note that:


· The installed drivers are located in /usr/lib/dri/ and are used
as /usr/lib/dri/${LIBVA_DRIVER_NAME}_drv_video.so.
· To provide compatibility some drivers are installed multiple times under different names. You can
see a list of them by running sha1sum /usr/lib/dri/* |sort command.
· LIBVA_DRIVERS_PATH can be used to redefine the location of VA-API drivers.
· Since version 12.0.1, libva-mesa-driver provides radeonsi instead of gallium.

Setting Up VDPAU
The VDPAU driver can be redefined using the VDPAU_DRIVER environment variable.

The correct driver name depends on the configuration:

www.issivs.com
SecurOS 194 Administration Guide
Video Subsystem

· If you are using Intel Graphics or AMD Catalyst, you must set the value to va_gl.
· If you are using a free AMD/ATI driver, specify the appropriate driver version depending on your
graphics card (see Checking VDPAU in the Checking Hardware Acceleration Work).
· If you are using the free Nouveau driver, specify nouveau.
· If you are using proprietary NVIDIA driver, specify nvidia.

Please note that:


· The installed drivers are located in /usr/lib/vdpau/ and are used
as /usr/lib/vdpau/libvdpau_${VDPAU_DRIVER}.so.
· To provide compatibility some drivers are installed multiple times under different names. You can
see a list of them by running sha1sum /usr/lib/vdpau/* command.
· In the case of a hybrid graphics configuration (both NVIDIA and AMD), it may be necessary to set
the DRI_PRIME=1 environment variable.

9.4 Multi-streaming
The most modern video cameras support multi-streaming - a feature, that allows a camera to generate
several independent video streams. Streams can have different parameter sets (i. e. resolution, fps,
compression, etc.) and can serve different purposes. These sets of parameters may be predefined and
identified by the stream name, or can be specified in the camera's Prof ile, which is created by an
administrator via the Camera's web interface.

A larger size stream (having high resolution, fps, etc.) is used when it is necessary to output the
Camera's video in a large cell of a Media Client, use digital zoom, or record video archive. Smaller size
streams (having low bitrate) are used to transmit video over channels with low bandwidth (for
example, when transmitting video via 3g to mobile devices), to record "light" archive (when it is
necessary to store archive in low capacity storage for a long time), to output video to the Media Client in
a high cell layout, or to low a resolution display.

Using cameras that support multi-streaming allows for a balanced system configuration and to solve
the following tasks:
1. To display video of different quality from the same camera on different Media Clients. For example,
in one Media Client, video is displayed in a small cell. In this case it is not necessary to increase
network load using a large size stream. At the same time one can watch the same video in the better
quality (for example, with more resolution or fps) on a different Media Client, where network
loading is not a critical parameter or where it is necessary to display high quality video.
2. Use different streams from the same Camera to display and record the same video in different
quality. If the communication link between the Video Server and Operator Workstations has low
bandwidth, it is possible to record high quality archive and transmit video with low bitrate to be
viewed by the operator in real time without overloading the network.
3. To use different quality streams for display and to be analyzed by different detectors.

The SecurOS multi-streaming feature allows the use of three different streams generated by the Camera
simultaneously. Each of them can be used as a stream for recording. The listed above tasks are solved
by assigning stream types in the Camera object settings.

www.issivs.com
SecurOS 195 Administration Guide
Video Subsystem

9.5 Frame Rate Reduction


Any value of FPS, specified in one of the Media Client, Camera, Zone (Zone settings tab) or Archiver
objects, will cause frame rate reduction of the original video stream by I-frames. Frame rate reduction is
a two-stage process:
· In the first stage, the video frame rate is reduced to the I-frame frequency, which is calculated as the
video stream frequency divided by the value of the GOP length(GOV length, Intra-Period or
Intra-Refresh Period) parameter, specified in the IP camera settings. For example, if the original
video stream frequency is 30 fps and the GOP length parameter value is set to 10, then the
reduced video stream frequency will be 3 fps.
· In the second stage, the frequency obtained in the first stage, is compared with the FPS value,
specified in the Media Client, Camera or Zone object settings:
- If the FPS value is greater than the frequency obtained by the initial reduction, then no further
frame rate reduction is performed;
- If the parameter value is less than the frequency obtained by the initial reduction, then further
frame rate reduction of I-frames is performed (frequency is reduced to parameter value). For
example, if the I-frame frequency is 16 fps and FPS is 8 fps, in the final video each second I-
frame will be reduced.

9.6 Working Principles of Motion Detection Zones

The SecurOS system provides a multi-zone motion detector to split the camera surveillance area into
several independent areas (zones), which may have different motion detection parameters.

A Zone object corresponds to each motion detection zone (see Zone section). Basically, all zones are
divided into two types:

· Alarming— designed to fire an alarm immediately upon motion detection.


· Inf ormational— designed to generate a "motion detected'' event, which can be used for scripting and
other purposes. This event would not fire an alarm on the camera, though.

Example. For instance, the user needs to control an area with a gate and several windows seen above the gate.
The task is to make alarm activation each time somebody appears at a window whereas to avoid generating
alarms each time the gate is used. In this particular case, it is recommended to set two different Zone objects:
the first for the gate and the second for the windows. The window zone should be configured as Alarming (to
generate an alarm upon any motion detection), while the gate zone should be configured as Informational (to
generate a motion detection event, but not to generate an alarm). Moreover, if different windows have
different types of illumination, you can configure multiple Zones with different contrast parameters for
reliable motion detection for each window.

Both alarming and informational zones should be armed by an administrator to detect motion. A zone
can be configured to be always armed, meaning an operator does not have to arm it manually (see Zone
section). All the other zones can be armed manually.

9.6.1 Creating Zones

Separate from the Main zone, you can create additional Zones for each secured area within the camera
view.

www.issivs.com
SecurOS 196 Administration Guide
Video Subsystem

9.7 SecurOS Archives


There are two types of video archives in SecurOS:
· Primary archive — an archive with a limited period of storage. This archive will be created
automatically, for example, when camera recording video. By default it is stored in a ISS_MEDIA
folder on the disk, specified in the Computer object settings.
· Long-term archive — archive with a long-term storage period, created by converting the files of the
primary archive. By default it is stored in a ARCHIVE\ISS_MEDIA folder on the disks, specified in
the Archiver object settings.

Functionality of creation and work with Long-term archive is available in the following editions:
SecurOS Monitoring & Control Center, SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality of creation and work with Long-term archive is not available.

Primary archive is available by default, ability to work with Long-term archive should be enabled with
additional settings (see below).

An Archiver object is used to copy a Primary archive to the Long-term archive. Procedure is started
automatically or with the help of Automation Subsystem objects (see Archiver).

To view both type of archives use a Media Client. A Primary archive is available for viewing by default.
To view Long-term archive one must additionally turn the Access to Long-term archive option on in the
Media Client object settings (see Export and Archive Tab).

Archive of any type can be exported from the SecurOS format to the file of the standard AVI/ASF
format or the file of the special Evidence format. In the last case file can be encrypted and protected
with the password (see Archive Converter). The Media Client is used for export. To provide export it is
necessary to select the Archive Converter or turn on the Archive export profiles option (see Export and
Archive Tab) in its settings. One can use digital signature when converting files (see Digital Signature).

Note. Alternatively, you can use the Media Export Utility (backup.exe) to convert archive to the file of
standard format.

See also:
· Disk Volume Settings;
· Video Recording Settings.

9.8 Camera Local Storage (Edge Storage)


In Linux OS the EdgeStorage Sync functionality is not supported.

Edge Storage is a technology that allows IP cameras to record and store video archive in their own
storage. Such storage may be a built-in memory module, a removable media (for example, SD card) or a
network folder.

There are two solutions for using this technology in SecurOS:


· EdgeStorage Sync, that provides continuous recording of the live archive even in cases of
temporary lack of connection between the Camera and the Video Server and is designed to fill gaps in

www.issivs.com
SecurOS 197 Administration Guide
Video Subsystem

the primary archives of the Video Servers with the corresponding fragments of the local archives of
the Cameras.
The main uses of the EdgeStorage Sync technology in SecurOS are the following:
- In cases of network failures and problems with equipment not related to the camera itself (for
example, with a memory card). In such cases video fragments absent on the Video Server will be
copied from the camera storage after the system recovery.
- In cases when the camera is located in moving objects (buses etc.) and continuous connection
with it is absent. In such cases the archive is copied from the camera local storage to the SecurOS
primary archive after the connection between the camera and the Video Server is restored.
· EdgeStorage Gate, designed for direct access to the archive stored in the camera's local storage. This
solution is used when it is not possible to store the archive on the hard drive. There are some
restrictions on exporting an archive viewed using EdgeStorage Gate from the local storage of a
Camera (see Restrictions on Export of Camera Archive Viewed Through EdgeStorage Gate).

If errors occur with the Edge Storage, they are reported in SecurOS with the help of Health Monitor
module (see Health Monitor self-diagnostic Module).

9.8.1 System Requirements to Provide Edge Storage Use

This section describes the following system requirements for working with the Edge Storage:
· Hardware Requirements;
· Time Synchronization;
· Requirements to the Camera Local Storage.

Hardware Requirements
SecurOS supports cameras local storages of the following brands:
· Axis;
· Bosch;
· Dahua;
· HikVision;
· Hanwha (Samsung);
· SecurOS Motus;
· Other cameras and devices that support ONVIF specification.

For some cameras Edge Storage feature is available in SecurOS via HTTPS.

Time Synchronization
To provide correct Edge Storage working it is necessary to use the NTP server to synchronize time on
the SecurOS Video Server and the camera. The following restrictions are applied to the NTP server:
· It is not allowed to manually change the time on the NTP server.
· Automatic Daylight Saving Time changes are not supported.

The same Time zone must be specified in the camera's and the computer's settings.

Requirements to the Camera Local Storage


Most of the cameras use removable media such as a SD and a microSD cards as a local storage. Use only
memory cards recommended by the camera manufacturer.

www.issivs.com
SecurOS 198 Administration Guide
Video Subsystem

9.8.2 Configuring System to Use Edge Storage

To prepare the system to apply the Edge Storage feature do the following:
· configure SecurOS;
· configure camera.

Setting up SecurOS
Do the following:
1. In the Object Tree create a Video Capture Device which Type and Model corresponds with the external
Edge device.
2. In the IP address field specify IP address of the external device where archive you want to work is
located.
3. Create the Camera object child to the created Video Capture Device.
4. In the Camera object settings on the Recording tab (see Figure 134) do the following:
· to use EdgeStorage Gate, select the Playback archive from the edge device (EdgeStorage Gate)
checkbox;
· to use EdgeStorage Sync, select the Recover archive from the local storage of Camera
(EdgeStorage Sync) checkbox.

Note. Parameters required to configure interaction with the Edge Storage more flexible, are described in
the Recording Tab subsection of the Camera section.

www.issivs.com
SecurOS 199 Administration Guide
Video Subsystem

Figure 134. Recording Tab (for the Axis camera settings example)

Setting Up Camera
Setting up recording to the local storage is performed via camera's web interface.

To set recording to the local camera storage do the following (the following is an example from the
AXIS Q7411 single channel video encoder):

Warning! Cameras of some brands may require additional steps to provide correct work of the SecurOS with
Edge Storage (see Features of configuration of some cameras).

1. Open a web browser and in the address field enter the IP address, assigned to the camera when
connecting to the network. To get access to the web interface enter the administrator login/password
in the authorization window. In the application window open the Setup group (see Figure 135).

www.issivs.com
SecurOS 200 Administration Guide
Video Subsystem

Figure 135. Setting up recording Tab

2. Select Recordings ® Continuous from the group of settings.


3. In the Continuous Recording tab do the following:
- activate Enable checkbox to specify the device channel transmitting video to record.
- select SD card in the Disk list.
- in the Stream profile list select profile to record.

Notes:
1. The list consists of a predefined number of stream profiles. Default profile settings can be changed
by the administrator in the Video & Audio tab.
2. To ensure smooth playback of the synchronized operative archive and provide correct working of
video analytical modules, it is recommended to use the same stream profile to record video both on
the camera and in SecurOS.

4. Click the Save button to save the changes.

Features of configuration of some cameras


Hanwha cameras (Samsung)
To provide EdgeStorage Sync correct work with the Hanwha cameras (Samsung) do the following:
1. Set recording type to SD Normal.
2. Disable recording by events (such as AlarmInput, MotionDetection, NetworkDisconnect and
others).

Warning! When configuring Hanwha (Samsung) cameras be careful when changing the codec for recording
video to the local storage. Video saved with another codec will not be restored to the SecurOS primary
archive.

www.issivs.com
SecurOS 201 Administration Guide
Video Subsystem

9.8.3 Restrictions on Export of Camera Archive Viewed Through EdgeStorage


Gate

When exporting a local archive of a Camera viewed with EdgeStorage Gate, there are the following
limitations:
· Export of the accompanying audio is not possible.
· The fact of exporting an archive from the local storage of the Camera will not be taken into account
for the subsequent audit of the SecurOS user actions.
· If the connection to the Camera is poor, the integrity of the exported archive is not guaranteed.
· Regardless of the source settings in the Archive Converter object settings, when exporting an archive
fragment from the local storage of the Camera, it is impossible to supplement the exported fragment
from other sources (Primary or Long-term archive).
· In the Privileged Access mode (see Privileged Access), exporting from the local storage of the Camera
using the Media Client is not possible.

9.9 Forensic Search


The functionality is available in the following editions: SecurOS Datacenter, SecurOS Enterprise,
SecurOS Premium.

Forensic (retrospective) search in the video archive is based on the use of metadata that accompanied
the video stream. Metadata means data that describes what is happening in the frame (for example,
information about moving objects and their tracks, speed, classification attributes, data on video stream
quality and camera malfunctions, etc.). Metadata is generated by video analytics detectors and recorded
and stored in SecurOS in its original form, i.e. before it has been processed by the algorithms of such
detectors. Any object's attribute stored in the database can be used as a parameter of the forensic search.

In SecurOS, metadata is generated and stored by server video analytics detectors (see Computer
Vision).

To use this functionality the following system objects must be configured:


· Enable metadata saving for the Camera in the Tracking Kit III Plugin settings (see Configuring
Tracking Kit III Plugin. Forensic Search Tab). If the metadata saving is not enabled, it is
impossible to perform forensic search even if metadata was saved earlier;
· Video analytics detector (see Configuring Video Analytics Detectors).

Warning!
1. Metadata is being saved only during a video recording.
2. If video recording is not constant (e.g. by alarm), proper forensic search operation requires to set
non-zero Duration of pre-recording value in settings of the Camera (see Recording Tab).

Forensic search is performed via Media Client (see SecurOS Quick User Guide).

9.10 Special Settings for Video Subsystem Components


This section describes specifics of the video subsystem objects configuration procedure.

www.issivs.com
SecurOS 202 Administration Guide
Video Subsystem

9.10.1 Camera Image Control

An administrator can configure the camera image in two different ways:


1. In the Camera object settings window (see Camera section);
2. Using operator workstation User Interface (see SecurOS Quick User Guide). Assuming that a Video
Capture Device and a Camera object have been created, an administrator has to create a Desktop and a
Media Client in order for the camera frame to appear.

9.10.2 Archive Recording

This section describes specifics of the archive recording operation and its configuration.

9.10.2.1 Disk Volume Settings


This section contains information about the following:
· Minimum free drive space.
· Granting the necessary rights to write an archive in Linux OS.

Minimum free drive space


To avoid situations when there is no free space on a disk in case of permanent video recording in
SecurOS format from the cameras (operative video archive), one should previously allocate mandatory
free disk space.

This value is specified in Computer object settings (see Archive) and, by default, is set to 10% of hard
drive volume.

If the free space threshold is reached then the archiver will try to record to other available disks. If there
is no free disks, then ring recording (FIFO) will be used (the oldest files will be deleted automatically).

Warning! Network folders mounted as a network drives can be used to save archives. In this case each
network folder must be used only by one network Video Server.

Granting the necessary rights to write an archive in Linux OS


Specify a directory to write an archive in Linux. It is recommended to use a hard disk different from
system disk or create a separate partition on the system disk. Provide rights to read and write for the
securos system user in the selected directory. To perform it, execute the following commands:

sudo chown securos -R <archive_write_directory>


sudo chmod 744 -R <archive_write_directory>

If necessary, a disk for recording the archive can be mounted to the selected directory. The process of
partitioning and mounting disks is described in details in the Partitioning and Mounting Discs in
Linux OS section.

9.10.2.1.1 Partitioning and Mounting Local Discs in Linux OS


Mounting drives in Linux OS is the process of attaching a drive to the root directory of the file system.
This allows the operating system to access files and folders stored on the disk, as well as read and write
data to it. Partitioning and formatting a disk, and then mounting it to a specific directory (with
required rights) allows SecurOS to use such a disk for storing video archives. This section describes
how to partition and mount disks using the GParted utility.

www.issivs.com
SecurOS 203 Administration Guide
Video Subsystem

All described commands, including launching the GParted utility, are executed by the superuser (root).

If the GParted utility is not installed, then to install it, just run the following command using the
terminal:

sudo apt install gparted

Once installed, the GParted icon will be displayed in the list of available applications.

Figure 136. GParted utility


icon

Partitioning and Formatting Disk


To partition a new drive, follow these steps:
1. Select the required device from the list — the disk that will be used to write the archive (in this
example, /dev/sdb is used).

Figure 137. Storage device selection menu

2. After selecting the desired device, in the Device menu item select the Create Partition Table
option.

www.issivs.com
SecurOS 204 Administration Guide
Video Subsystem

Figure 138. Create Partition Table option in the Device menu

3. Select gpt from the suggested partition table types and apply the changes.

Figure 139. Select Partition Table Type window

4. In the Partition menu item, select the New option.

www.issivs.com
SecurOS 205 Administration Guide
Video Subsystem

Figure 140. New option in the Partition menu item

5. Specify the size of the new partition (by default, all free disk space will be used) and click the Add
button.

Warning! The Linux OS supports the following file systems: ext3, ext4, cifs.

Figure 141. New partition creation window

www.issivs.com
SecurOS 206 Administration Guide
Video Subsystem

6. Click the Apply all operations button (green checkmark) to apply all previously performed
operations.

Figure 142. Apply all operations option

After all the selected operations have been completed, in case of success, a message on the successful
completion of these operations will be displayed (see Figure 143).

www.issivs.com
SecurOS 207 Administration Guide
Video Subsystem

Figure 143. Successful operation completion message

In the Application Scheduled Operations window, click the Close button and in the
Partition column remember the name with the number of the created partition. They will come in
handy during disk mounting (see Figure 144).

Figure 144. Name and number of the created partition

Mounting Disk
After successfully partitioning the disk, you need to mount the directory in which you are going to
write the archive to the created partition. If the directory has not been previously created, use the
mkdir command to add it. For example:

sudo mkdir /home/video/

To mount a disk to the selected directory, follow these steps:

www.issivs.com
SecurOS 208 Administration Guide
Video Subsystem

1. In a text editor, open the fstab file as superuser. For example, using the nano editor and the
following command:

sudo nano /etc/fstab

2. Add a new entry in the following format to the file:

/dev/<partition_name_and_number> /<path_to_folder_for_saving_video> ext4 defaults 0

For example:

/dev/sdb1 /home/video ext4 defaults 0 0

Figure 145. New record in the fstab file

3. Save the changes (in the nano editor press the Ctrl+O).
4. Run the following command:

mount /dev/<name_and_number_of_partition>

For example:

sudo mount /dev/sdb1

Granting Rights
Grant the securos system user read and write permissions for the selected directory (see Granting the
necessary rights to write an archive in Linux OS).

www.issivs.com
SecurOS 209 Administration Guide
Video Subsystem

If all the steps were completed successfully, then a new partition for writing will appear in SecurOS
(see Figure 146).

Figure 146. Adding new directory window in SecurOS

Note. After completing all the operations, it is recommended to close the GParted utility.

9.10.2.2 Video Recording Settings


Video recording procedure is controlled by the following parameters:
· MaxFrames — controls archive recording mode with frame number limitation in the file
(see Archive, Save space archive recording mode);
· MaxMemMb — controls the queue of frames when writing an archive.

Archive recording with the limitation of the frames number in the file
When performing constant video recording, video files will be created containing a fixed number of
frames. Once this number of frames is exceeded, the video-subsystem will start writing to a new file. If
recording on motion, each video file might contain a different number of recorded frames. When an
operator plays back the video recordings, the files will be scanned and played back sequentially. To
make the video archive search more efficient, an administrator can change the number of frames that
are recorded into one video file with the MaxFrames parameter. Parameter is available both in
Windows and Linux OS. The setup procedure for each OS is described below:

www.issivs.com
SecurOS 210 Administration Guide
Video Subsystem

· Setting up for Windows.


· Setting up for Linux.

Note. All operations described in the specified sections are performed on the computer, where the Primary
archive is stored.

Setting up for Windows


1. Stop Video Management System Server system service.
2. Open the \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video folder and specify maximum
number of frames for any new video record file in the MaxFrames key.

Note. When operating on 64-bit OS open the


\HKLM\SOFTWARE\Wow6432Node\ISS\SecurOS\NISS400\Video branch.

Warning! Default value is 500.

3. Start Video Management System Server system service.

Setting up for Linux


1. Stop the vms_server daemon using the sudo service vms_server stop command.
2. Open the /etc/xdg/iss/securos.conf file for editing and add the Video\MaxFrames=X line,
where X is the maximum number of frames allowed in the created archive record files.

Warning! Default value is 500.

3. Start the vms_server daemon using the sudo service vms_server start command.

Controlling the queue of frames when writing an archive


When recording video, the video frames queue may cause a computer RAM overflow. By default, the
RAM allocated for write queue is limited by 500 MB. Queue size can be corrected with the
MaxMemMb parameter. Parameter is available both in Windows and Linux OS.

Warning!
1. Possible values: [500, 2047]. Default value is 500.
2. Using a large value for the MaxMemMb parameter can lead to over consumption of the Windows
allocated memory for a single process, thus causing the process to crash.
3. Too small value will result in a false occurrence of the Insufficient write speed problem (see Health
Monitor self-diagnostic Module).

Note. In case for some reason the disk subsystem cannot properly handle the recording mechanism (e.g.
read/write speeds) and video frame loss occurs, the following warning message can be found in the
logs\video.log file: "WARN VideoFileRecorder Queue length has exceeded. Some frames were
dropped.''.

The setup procedure for each OS is described below:


· Setting up for Windows.
· Setting up for Linux.

www.issivs.com
SecurOS 211 Administration Guide
Video Subsystem

Setting up for Windows


1. Stop Video Management System Server system service.
2. Open the \HKLM\SOFTWARE\ISS\SecurOS\NISS400\Video folder and specify the MaxMemMb
key value.

Note. When operating on 64-bit OS open the


\HKLM\SOFTWARE\Wow6432Node\ISS\SecurOS\NISS400\Video branch.

3. Start Video Management System Server system service.

Setting up for Linux


1. Stop the vms_server daemon using the sudo service vms_server stop command.
2. Open the /etc/xdg/iss/securos.conf file for editing and add the Video\MaxMemMb=X line,
where X is the size of the recording queue.
3. Start the vms_server daemon using the sudo service vms_server start command.

9.11 Object Reference


The video subsystem includes the following object classes:
· System Objects.
· User Interface Objects.

9.11.1 System Objects

The following are the System objects:


· Video Capture Device.
· Camera.
· Defocus detector.
· Layout.
· View.
· Zone.
· Light Detector.
· Archive Converter.
· Archive Export Profile.
· Archiver.
· Image Processor.
· RTSP Server.
· ONVIF Server.

www.issivs.com
SecurOS 212 Administration Guide
Video Subsystem

9.11.1.1 Video Capture Device

Object represents IP camera connected to TCP/IP network.

Parent object — Computer\Devices (Cameras & Microphones) group.

Depending on camera's Type and Model, parameter settings window can include the following tabs:
· Connection Tab.
· Firmware Tab.

9.11.1.1.1 Connection Tab


Table 23 presents typical Video Capture Device settings.

Figure 147. Video Capture Device object settings window. Connection Tab

Note. Figure 147 represents the options available for Samsung SNB-C7478. Availability of such parameters
as Protocol, PCI channel and Format depends on integration of selected device Type and Model in SecurOS.

Table 23. Video Capture Device object settings. Connection Tab

Parameter Description

Select value that corresponds to device's brand.

Type Note. The Virtual type represents an option for video emulation and
is used to test system settings.

If enabled, select the model of the Video Capture Device for the given
Model
Type.

www.issivs.com
SecurOS 213 Administration Guide
Video Subsystem

Select version of data transmission protocol used by camera that is


being connected.
Protocol Note. Parameter is only shown if several version of integration software
for camera with specified Type and Model, that correspond to different
data protocols and APIs, are supported by SecurOS.

Select unique number of PCI channel for Virtual or Player AVI


PCI channel
device Type.

Choose video signal format from the list (depends on the device
Format
type): H.264, MPEG4, MJPEG, PAL, SECAM etc.

www.issivs.com
SecurOS 214 Administration Guide
Video Subsystem

Specify <host>[:<port>] component of the full device's URL.

One can specify the <host> value in the following form:

· as IP-address, for example, 172.16.1.12 — for devices of any


Type, except Virtual.

· full domain name of the device, for example,


axis.network.iss — for devices, which Type is Axis or
Generic RTSP.

· short domain name of the device, for example, axis — for


devices, which Type is Axis or Generic RTSP.

The [:<port>] component is optional and depends on used


camera connection protocol, that is specified in the own camera
settings via camera's web-interface.

If HTTP protocol is specified in the own camera settings, then port


number can be set in the following form:

[:<http_port>][:<rtsp_port>], where:

· [:<http_port>] — HTTP-port number;

· [:<rtsp_port>] — RTSP-port number to receive video


stream via RTSP.

For example:
IP address
· 127.0.0.1:8080:554 — the 8080 HTTP-port and the 554
RTSP-port are specified.

· 127.0.0.1::554 — HTTP-port is not specified, the 554 RTSP-


port is specified.

If RTSP protocol is specified in the own camera settings, then port


number can be set in the following form:

[:<rtsp_port>], where:

· [:<rtsp_port>] — RTSP-port number to receive video


stream via RTSP.

For example:

· 127.0.0.1:554 — the 554 RTSP-port is specified.

If device type is Generic RTSP in this field one can also specify the
following:

· full URL of the device — <host>[:<port>]/<URL path>[?


<parameters>].

www.issivs.com
SecurOS 215 Administration Guide
Video Subsystem

· only <host>[:<port>] component of the full device's URL. In


last case all other URL components (/<URL path>[?
<parameters>]) must be specified in the Camera object
settings (see Stream Tab, the Path parameter). Delimiter (/) can
be specified both in IP address parameter and Path parameter in
the Camera object settings.

Specify a user name for the IP device connection. Default value is


User
securos.

Specify individual device password or use default value.

Password Warning! The password is displayed while typing, but on the next opening
of the settings window "*" symbols are displayed in the field (the number
of symbols differs from actual password length).

The link on the right allows user to quickly open the web page of
the network camera settings in Internet Explorer web browser. If IP
address, User or Password parameter is not specified, the link is
disabled.
View
Note. Fields of the IE web browser's authorization window are filled
automatically with the User and Password values, specified in settings
of this Video Capture Device.

This parameter allows specify the type of connection with the


camera.

To use secure connection do the following:

· select this checkbox;

· use camera's web-interface to select HTTPS for user and to select


trusted certificate of encryption in own camera's settings.
Warning! If at least one of the listed conditions is not met, then secure
Use secure connection network connection with the camera will not be established.
(HTTPS)
Notes:
1. Parameter is available depending on selected device's
Type. For the list of the supported devices contact
Intelligent Security Systems Technical Support Team.
2. If selected, then to transmit a video stream it is necessary to
set the RTSP over HTTPS value for the Protocol
parameter in the Camera object settings (see Stream Tab).
3. If selected, then connection with the camera will always
use TCP protocol, regardless of the RTP over RTSP (TCP)
flag, see Stream Tab.

9.11.1.1.2 Firmware Tab


This tab allows (see Figure 148) you to update the device firmware.

Note. The ability to update the firmware using SecurOS is provided only for devices of the ONVIF type.

www.issivs.com
SecurOS 216 Administration Guide
Video Subsystem

Warning! Updating the firmware may cause the device malfunction. To get additional information contact
Intelligent Security Systems Technical Support Team (see Getting Technical Support section).

Figure 148. Video Capture Device object settings window. Firmware Tab

Table 24. Video Capture Device object settings. Firmware Tab

Parameter Description

Click the Get button to display information about the current


Firmware
firmware version in given field.

Firmware update

Specify the path to the firmware file. To launch the firmware update
process, click the Update button. It is recommended to wait for the
process to complete before closing this window to ensure that the
Firmware file firmware update was successful.

Firmware updating is available only if the system was able to obtain


information about its current version (see Firmware).

9.11.1.1.3 Active Camera Recorder (AC Recorder)


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

In Linux OS the functionality is not supported.

Video Capture Device with Active Camera Recorder type (hereinafter AC Recorder) is designed to
receive stream For video recording from active Camera located on one of the Computers within the
security network. Received video stream is displayed in the child Camera's standard cell in real-time
mode an can be recorded into the video archive.

www.issivs.com
SecurOS 217 Administration Guide
Video Subsystem

To configure AC Recorder do the following:


1. Enter the Administration Mode.
2. In the Object Tree select the Computer object to which the added device will be connected.
3. Create child Video Capture Device object in the Devices (Cameras & Microphones) group.
4. In the Parameters of created object window, select AC Recorder in the Type field.
5. In the created object settings window, in the Computer text box, specify the IP address or DNS-name
of the Computer from which it is necessary to receive the stream of the active camera.
6. Create the Camera object (child object of the Video Capture Device object).
7. If Media Client on the given Computer works in the Use only selected Cameras mode add created
Camera in the selected camera list. If Media Client works in the Use all Cameras mode, then created
Camera will be added automatically.

9.11.1.2 Camera

This object represents a physical video camera or other video source.

Parent object — Video Capture Device.

Depending on camera's Type and Model, parameter settings window can include the following tabs:
· General Tab.
· Stream Tab.
· Recording Tab.
· Audio Tab.
· Detectors Tab.
· PTZ Tab.
· Advanced Tab.

Common Camera parameters, independent of the device's Type and Model are described in appropriate
sections.

Besides settings, common for all integrated with SecurOS cameras, the last ones can have their own
specific settings. These settings depend on camera's Type and Model and are used to control additional
camera features. Description of such parameters one can find at the end of corresponding section.

Note. In this manual the most important additional parameters are described only. Description of other
additional parameters one can see in screen tips in the Camera object settings window.

www.issivs.com
SecurOS 218 Administration Guide
Video Subsystem

9.11.1.2.1 General Tab


Table 25 presents typical settings of the camera. Parameters, that depend on camera Type and Model,
are described in Table 26.

Figure 149. Camera object settings window. General Tab

Table 25. Camera object settings. General Tab

Parameter Description

Specify camera geographic coordinates (GPS, GLONASS, etc.) in any format.


For example, 55.792461, 37.637515.
Coordinates Note. Camera coordinates will be transmitted along with other object settings when
these settings will be queried from external system via REST API interface. Data will
be transferred in the same form, in which they are specified in the object settings.

Channel Select the camera's channel number from the list.

The parameter defines the ability to control the PTZ of this Camera (see Setting
up telemetry). Select one of the following values:

· Use — allows the operator to control PTZ in the Media Client window;
PTZ Device · Do not use — disables the ability to control PTZ. The parameter takes
this value by default;

· Zoom Control Only — used if the camera is equipped with a


motorized lens.

If the camera is equipped with the Wiper, select the object that can control it.

Note. For more details see Configuring System to Work with Wiper.

Wiper

www.issivs.com
SecurOS 219 Administration Guide
Video Subsystem

If camera is equipped with built-in wiper select the Built-in value. If this
value is selected then Pan/ tilt/ zoom parameter will be automatically set to Use,
which can not be changed.

Note. To use this feature operator must have access right level for this camera not
less than Control.

This parameter defines the video image display format in the Camera cell for all
Media Clients throughout the SecurOS security system. At the same time, for
each Media Client, the video image displaying format can be locally changed for
the selected Camera with the help of this Camera control (see SecurOS Quick
User Guide). Possible values:
Viewing · Keep aspect ratio — original format of the video frame will be used
when displaying video. Is the default value;

· Stretch to cell — the frame is stretched to full size of the Media


Client's cell;

· Force 4:3 — when displaying, video will be scaled to 4:3.

Specify the size of the video frame buffer when working in live video buffering
mode, in ms. The parameter allows to smooth out intermittents of video when
the transmission rate of live video frames over the network is insufficient.
However, with the buffering is enabled, the live video in the Media Client will
Buffer size be played with a time delay. Value of this delay will be not less than the
specified buffer size. Range of values: [0; 5000].
Warning! After parameter is specified, enable the video buffering mode in the settings
of the required Media Client (see Cameras Tab).

Table 26. Optional General tab parameters

Parameter Description

Use digest Tick this checkbox to encrypt credentials.


authentication only

If camera is equipped with washer set this parameter to Use.

Notes:
1. This option is available for several models of the Axis cameras. For
the list of the supported devices contact Intelligent Security Systems
Washing Kit Technical Support Team.
2. To use this feature operator must have access right level for this
camera not less than Control.
3. Washing procedure parameters are specified in the camera's own
settings accessible via web interface.

www.issivs.com
SecurOS 220 Administration Guide
Video Subsystem

If camera is equipped with built-in light, select the Built-in value from
the drop-down list to turn light control on. If this value is selected then
Pan/ tilt/ zoom parameter will be automatically set to Use, which can not be
changed.

Don't Use value disables illumination control. It is used by default.

Some cameras allow to set the illumination rate. To set the rate pick required
value from the list:

Light · Turn on LED group 1;

· Turn on LED group 2;

· Turn on all LED groups.

First, second or all LED groups will be used for illumination depending on
selected value.

Note. To use this feature operator must have access right level for this camera not
less than Control.

9.11.1.2.2 Stream Tab


Table 27 presents typical camera parameters. Parameters, that depend on camera Type and Model, are
described in Table 28.

Figure 150. Camera object settings window. Stream Tab

Warning!
1. The tab represents typical settings of the camera, which supports multi-streaming.

www.issivs.com
SecurOS 221 Administration Guide
Video Subsystem

2. For the cameras, which do not support multi-streaming, the set of parameters depends on the type
of the parent Video Capture Device or this tab is not displayed.

Table 27. Camera object settings. Stream Tab

Parameter Description

Stream 1 (activation of the Stream 1 configuration and use mode). By default it is active.

Note. Settings of the Stream 1, Stream 2 and Stream 3 are the same and depend on Video Capture Device
type and model.

Stream 2 (activation of the Stream 2 configuration and use mode). Tick this checkbox to make it
possible to select this stream in the Stream use block.

Stream 3 (activation of the Stream 3 configuration and use mode). Enabled only if Stream 2 is
selected. Tick this checkbox to make it possible to select this stream in the Stream use block.

Stream use

For video recording Select a stream for recording archive from the drop-down list.

For motion detection Select a stream which will be analyzed by motion detector.

For video display

Low resolution Select a low resolution stream from the drop-down list.

Base Select a base stream from the drop-down list.

High resolution Select a high resolution stream from the drop-down list.

Warning! It is not recommended to set GOP (GOV) parameter greater than 32 frames or 2 seconds for the
connected IP cameras and video servers. IP cameras can be configured through their web interface. For some
types of Video Capture Devices this setting is available in the Stream tab of the Camera object settings window.

Some stream selecting recommendations are listed below.

1. To assign a High resolution stream it is recommended to choose a stream with the highest
resolution, for example, to display video on the Media Client in large cells (for example, like in 1*1 or
2*2 layouts), or to display it on a Video Wall Monitor;
2. To assign a Low resolution stream it is recommended to choose stream with the lowest resolution,
which complies with requirements to the particular security system. Such stream can be displayed
on Media Client for 5*5 cell layouts and higher;
3. To assign a Base stream it is recommended to choose a stream, that has resolution sufficient to
display video in average size cells (for example, in 3*3, 4*4 layouts on the Media Clients of the
Operator Workstations, or in 4*4 and 5*5 layouts on Video Wall Monitors);
4. When assigning Stream for recording select a stream, which complies with requirements to the
archive video for the given security system. When choosing a stream it should be considered, that
the larger the stream, the larger the archive will be.

Warning! In current release all Program detectors and Intelligent Modules (SecurOS Auto, SecurOS Transit,
SecurOS FaceX) operate with Stream for recording. Thus, when assigning Stream for recording it is necessary
to consider Module's and Detectors' requirements and recommendations to the video settings of the Camera,
which will be used by these Modules and Detectors.

www.issivs.com
SecurOS 222 Administration Guide
Video Subsystem

In case if it is necessary to record high quality video, but communication link, connecting Video Server
and Operator Workstations has low capacity, do not use Stream for recording when assigning any
Stream for display. Under this condition high quality stream will not be transmitted outside the Video
Server in real time mode (only when playing archives) and the communication link load will be
significantly decreased.

Table 28. Optional Stream tab parameters

Parameter Description

Options to work with streams (see Figure 151).

If this option is enabled, Camera stream will match the stream that
Use camera settings corresponds to current camera settings in its web interface. By default it is
selected.

With this field one can match each Camera stream to one of the streams,
configured in camera's web interface. Pick from the list or type in manually
the profile name, that corresponds to a stream configured in camera's web
interface.

For Video Capture Device of the Thermal type (thermal imaging), the
parameter can take the following values:

· Thermometric — a stream of raw data received from the camera's


Profile
thermal imager. The thermogram of the object is displayed in the
camera cell. This stream is used for further processing by SecurOS
video analytics modules;

· Optical — optional (non-thermometric) video stream of the camera,


without thermal imager data;

· Visual-informational — the same as the thermometric stream,


but supplemented with auxiliary data.

Some camera models has Stream checkbox (see table 27) is complemented
by field named Stream. With this field one can match each Camera stream
to one of the following original streams, configured in camera's web
interface:

Stream · Stream (1) - Stream (4);

· MJPEG.

Warning! For cameras of Video Capture Device type Panasonic RTSP Stream
when one selects MJPEG value, Camera stream will be matched with first of JPEG
streams, configured in camera's web interface.

Specify the <URL path>[?<parameters>] components of the full


device's URL to receive video stream via RTSP. For example, if full URL is
Path
as follows:
172.16.16.250/axis-media/media.amp?camera=1

www.issivs.com
SecurOS 223 Administration Guide
Video Subsystem

Parameter Description

then specify the following string in the Path field:


/axis-media/media.amp?camera=1
Warning! Only for the devices, which Type is Generic RTSP.

See also Video Capture Device, the IP address parameter.

Specify identifier, assigned to the Camera in the external device. Is used to


Camera ID in the
view in SecurOS a video archive, stored in the external device via
edge device
EdgeStorage Gate.

This parameter specifies type of the connection with the camera. Possible
values:

· RTP/UDP — UDP protocol will be used for interaction with camera.

· RTP/TCP — TCP protocol will be used for interaction with camera.


Protocol · RTSP/HTTP/HTTPS — insecure/secure TCP connection with
tunneling will be used for interaction with camera.
Warning! To establish RTSP/HTTPS connection one should select trusted
encryption certificate and HTTPS connection for the user in camera's own settings
via camera's web interface. The Use secure connection (HTTPS) checkbox must be
selected in the Video Capture Device object settings.

Select this chekbox to transfer the live video stream to the system only if
there is a stream consumer in the system. The consumer of the stream
exists in the system when viewing live video, recording a video archive,
Use stream on request
during the operation of service analytics detectors (motion, defocus,
blinding, etc.) or video analytic detectors. The parameter is designed to
control the video stream when working in networks with low bandwidth.

Multicast, group of parameters (for the details see the Multicast section)

Enable multicast Select this checkbox to enable multicast translation from given camera.
mode

IP address to which video stream from given Camera will be translated


Address (IPv4) for
(multicast group). Value must belong to the range of the D class IP
Multicast group
addresses, reserved for multicast translation.

Port for Multicast Port number for multicast translation.


group

Select checkbox, if camera operates in a high-load network, network has


RTP over RTSP (TCP) low capacity, or within a network where RTP packets are filtered. Video
will be transmitted using the TCP protocol.

www.issivs.com
SecurOS 224 Administration Guide
Video Subsystem

Parameter Description

Time period allocated to receive a frame at the current network bandwidth


(in milliseconds). If actual network latency is known, it is recommended to
set appropriate value. Otherwise use the default value.
Network latency, ms
Note. This parameter is displayed only for several Video Capture Devices. If it
doesn't, then 0,5 s default value is used.

Figure 151. Stream Tab (for the multi-streaming Axis camera)

www.issivs.com
SecurOS 225 Administration Guide
Video Subsystem

9.11.1.2.3 Recording Tab


Table 29 presents typical camera settings. Parameters, that depend on camera Type and Model, are
described in Table 30.

Figure 152. Camera object settings window. Recording Tab

Table 29. Camera object settings. Recording Tab

Parameter Description

Select the mode from the following:

Manual — video recording will start either by an operator's


command or with the help of the Automation subsystem.

Manual and alarm — enable this option to allow to start


recording video automatically when a motion by this camera is
detected, and to stop it automatically when motion ends.
Recording mode
Continuous — video recording will be performed constantly.

Note. In this mode, recording can be stopped only by changing the


Camera settings.

www.issivs.com
SecurOS 226 Administration Guide
Video Subsystem

Parameter Description

Continuous with variable stream — the recording is


performed constantly. At the same time:

· By default Low resolution stream recording is performed.


(see Stream Tab).

· When the Motion detector is triggered, either at the


operator's command or at a command from the script, the
For video recording stream recording starts (see Stream
Tab). When stream is switched to For video recording, the
pre-recorded high-resolution video made according to the
Camera settings is added to the recording (see Duration of
pre-recording).

· At the end of alarm, either at the operator's command or at


a command from the script, camera returns to Low
resolution stream recording.

Do not record — in this mode no one of the methods, known


within SecurOS can be used to put camera to record mode (for
example, record can not be started from Media Client, by
program or Macro, from Map etc.).

Specify the duration of pre-recording phase, in seconds. The more


Duration of pre-recording the length of this phase, the more RAM is used to cache video.
Range of values: [0; 999]. If set to 0, pre-recording won't be used.

Specify the duration of post-recording phase, in seconds. Range of


Duration of post-recording
values: [0; 999]. If set to 0, post-recording won't be used.

Use this parameter if you reduce the recording FPS. Range of values:
Reduce max FPS to [1; 99]. The mechanism of frame rate deduction is described in
section Frame Rate Reduction.

The original frame rate of the camera is maintained for the recording
period during an alarm (motion detection). Available only for the
Manual and alarm recording mode when the parameter Reduce
max FPS to is selected.

If selected:
Full FPS on alarm
· original frame rate of the video stream is used to record video
during an alarm (motion detection).

· reduced frame rate of the video stream is used for pre- and
post recording.

Archive

www.issivs.com
SecurOS 227 Administration Guide
Video Subsystem

Parameter Description

Specify a minimum depth of video archive, in days.

Note. An hour of an archive creation is accepted as a beginning of a


storage period, for example, 15:00 01.07.2015.

Checking of that, if archive files should be deleted is performed at


system start and, further, at the end of each hour. An archive,
Store at least
storage period of which has not expired, will be automatically
removed if there is no free space on hard disks to store new archive
fragments. Removing starts with the oldest records; archive
recording is suspended until released free space is enough. When
such archive is removed the appropriate information message is
displayed (see Health Monitor self-diagnostic Module). Range of
values: [1; 9999].

Specify a maximum depth of video archive, in days. Checking of


that, if archive files should be deleted is performed at system start
and, further, at the end of each hour. When specified value is
reached, all archive records in an hour time interval are deleted
Remove after
depending on the Store at least parameter value (if specified). If you
keep this field blank, the archive will be kept as long as there is free
space on hard disk to store new archive fragments. Range of values:
[1; 9999].

Table 30. Optional Recording tab parameters

Parameter Description

Select this checkbox to work with archive, stored on the remote


Playback archive from the device (see Camera Local Storage (Edge Storage)).
edge device (EdgeStorage
Gate) Warning! In SecurOS it is impossible to record video from the Cameras
working with a remote archive.

Is used when viewing archive stored on the remote device with


Do not adjust frame increased playback speed. Select this checkbox if archive position
timestamp for fast forward pointer offset speed does not match the playback speed. Is enabled,
playback if Do not adjust frame timestamp for fast forward playback is
selected.

Recover archive from the Select this checkbox to recover the Video Server's archive from the
local storage of Camera local Camera's archive when using the Edge Storage (see Camera
(EdgeStorage Sync) Local Storage (Edge Storage)).

www.issivs.com
SecurOS 228 Administration Guide
Video Subsystem

Specify the time shift to record an archive. When restoring the Video
Server's archive from the local camera storage will be copied the
fragments up to the Tcur - N timestamp, where:

· Tcur — current time;

· N — specified parameter value.

The remaining part of the archive will be recorded with a time delay
equal to the specified value of the parameter.

This setting is recommended for use on the cameras that record


video to the local storage in the large fragments. Set the parameter
value that equal to or exceeds duration of the recording of the
Do not recover last, min largest video fragment in the camera local storage.

For example, specified parameter value is 10 minutes. Connection


with the camera is lost for 15 minutes, then restored. After the
connection is restored, the first 5 minutes of the archive starting
from the moment of connection lost will be loaded from the local
storage of the camera. The remaining 10 minutes of archive gap will
be restored part by part in the next 10 minutes.

This setting allows to avoid false error messages that appear due to
inability to download an archive from the camera before it is
actually stored in the local storage.

Range of values: [0; 60].

Default value is 10.

Specify speed of downloading archive from the local camera storage


relative to the FPS of the live video stream. High speed allows to
restore archive gaps faster, but increases network loading.
Download speed relative to
FPS Possible values: x1, x2, x4, x8, x16, x20.

Default value is x1. When using default value the time required to
restore archive gap is equal to gap duration.

Select stream profile ID specified in the camera own settings using


its web interface. This stream profile ID will be used for closing gaps
of the SecurOS camera archive (with EdgeStorage Sync), and also
for viewing the archive from the camera's local storage (with
Stream profile ID EdgeStorage Gate).

Note. Specifying the stream profile number may cause malfunction of


some devices. In this case, select Do not use.

www.issivs.com
SecurOS 229 Administration Guide
Video Subsystem

9.11.1.2.4 Audio Tab

Figure 153. Camera object settings window. Audio Tab

Table 31. Camera object settings. Audio Tab

Parameter Description

The parameter defines the possibility of audio playing in live and


archived video. Select the checkbox and select Built-in or external
Microphone to view video with sound, if available.

Microphone Notes:
1. Built-in microphone support is subject to camera
specifications.
2. If sound is required to be played in the Media Client, select
the Work with audio option (see Audio Tab).

Samplerate Specify samplerate of the built-in Microphone.

Information field: Read-only indicator of current volume level. Used


Level
to test microphone on-the-fly.

Gain Specify the gain of the built-in Microphone.

www.issivs.com
SecurOS 230 Administration Guide
Video Subsystem

Parameter Description

Select checkbox and choose type of the camera's speaker, to which


sound will be translated. Possible values:

Internal — use camera's built-in speaker. If camera is


equipped with built-in speaker, this value is used by default. If
this value is selected, then parameters below are disabled.

Speaker External — use separate external network speaker.

Notes:
1. Internal speaker is supported only by some Axis and
Beward B camera models.
2. External speaker with Axis type may be connected to
Camera with any Type and Model.

Type Select a type of the external speaker.

Model Select a model of the external speaker.

IP address Specify IP address of the external speaker.

User/ Password Specify user name and password to operate the external speaker.

9.11.1.2.5 Detectors Tab

Figure 154. Camera object settings window. Detectors Tab

Table 32. Camera object settings. Detectors Tab

Parameter Description

Select this checkbox to force the system to generate special events


Blinding detection each time camera blinding is detected. These events can be used in
macros or scripts.

www.issivs.com
SecurOS 231 Administration Guide
Video Subsystem

Parameter Description

Move slider to specify detection size sensitivity. Boundary values:

0%— camera is treated as always blinded.

Size 50%— blinding will be detected if 50% of the frame area has low
contrast.

100%— only full blinding (entire camera view has low contrast)
will be detected.

Move slider to specify detection contrast sensitivity. Boundary


values:

Min— only areas of minimal contrast are taken into


Contrast
consideration (e. g. evenly colored surfaces like sheet of paper).

Max— areas with higher contrast are also taken into


consideration.

Work according to selected Select the Schedule if the blinding detector should work in the
Schedule specific time range.

www.issivs.com
SecurOS 232 Administration Guide
Video Subsystem

9.11.1.2.6 PTZ Tab


Table 33 presents typical settings of the camera. Parameters, that depend on camera Type and Model,
are described in Table 34.

Figure 155. Camera object settings window. PTZ Tab

Table 33. Camera object settings. PTZ Tab

Parameter Description

Select from the drop-down list the PTZ Protocol supported by the
current Camera model.
PTZ protocol
Note. The parameter is available depending on the type of the parent
Video Capture Device object.

PTZ channel Select the PTZ channel number.

Select PTZ control mode (see Shared PTZ Control and Exclusive
Disable shared PTZ control
PTZ Control).

www.issivs.com
SecurOS 233 Administration Guide
Video Subsystem

Parameter Description

Presets (table of pre-installed settings)

Note. Obsolete block of settings. Is used only for cameras that do not support automatic update of their
own settings in SecurOS. For detail contact Technical Support Team.

Type ID of the preset, preliminary specified in the camera settings


Identifier
with the help of web interface.

Specify preset name. List of the specified presets will be displayed in


Title
the Media Client PTZ control panel.

Tours (table of tours)

Note. Obsolete block of settings. Is used only for cameras that do not support automatic update of their
own settings in SecurOS. For detail contact Technical Support Team.

Type ID of tour, preliminary specified in the camera settings with


Identifier
the help of web interface.

Specify tour name. List of the specified tours will be displayed in the
Title
Media Client PTZ control panel.

Table 34. Optional PTZ tab parameters

Parameter Description

Select the type of tours, that will be available for this Camera.
Possible values:

· By presets — tours, that are pre-defined in camera settings


Tour type
with the help of web interface.

· Recorded — tours, that are recorded on camera by user the


with the help of web interface.

Select serial port, that will be used to control camera PTZ. Range of
Serial port number
values: [1; 16]. Default value is 1.

www.issivs.com
SecurOS 234 Administration Guide
Video Subsystem

9.11.1.2.7 Advanced Tab

Figure 156. Camera object settings window. Advanced Tab

Note. The Axis M3204 parameter set is presented in figure 156.

Depending on the Camera model the list of available parameters may vary. This section describes the
following parameter sets:
· Additional parameters of the ONVIF Camera (Video Capture Device with the ONVIF Type);
· Additional parameters of the SecurOS Motus Camera (Video Capture Device with the SecurOS
Motus Type);
· Additional parameters of the Virtual Camera (Video Capture Device with the Virtual Type);
· Additional parameters of the Generic RTSP Camera (Video Capture Device with the Generic
RTSP Type);
· Other additional paramaters.

Table 35. Additional parameters of the ONVIF Camera (Video Capture Device with the ONVIF Type)

Parameter Description

Select the checkbox to enable transmission of all Camera events to


Enable raw event
the SecurOS core. It is used to transfer events of the built-in Camera
transmission
analytics to the recipient without their preliminary processing.

www.issivs.com
SecurOS 235 Administration Guide
Video Subsystem

Parameter Description

Select the checkbox to manually set camera's exposure.

Manual exposure control Note. If this option is enabled the exposure can not be controlled from
SecurOS operator interface.

Available only if the Manual exposure control is selected. Possible


Exposure Time
values: [0; 100]. Default value: 50.

Available only if the Manual exposure control is selected. Possible


Gain
values: [0; 100]. Default value: 50.

Available only if the Manual exposure control is selected. Possible


Iris
values: [0; 100]. Default value: 50.

Select this checkbox to manually set the image brightness. Possible


Brightness
values: [0; 100]. Default value: 50.

Select this checkbox to manually set the image saturation. Possible


Saturation
values: [0; 100]. Default value: 50.

Select this checkbox to manually set the image sharpness. Possible


Sharpness
values: [0; 100]. Default value: 50.

Select this checkbox to manually set the image contrast. Possible


Contrast
values: [0; 100]. Default value: 50.

White Balance Select the checkbox to manually set the white balance of the frame.

Available only if the White Balance is selected. Controls the amount


Rgain of red color in the image. The higher the value the more intensively
red color is displayed. Possible values: [0; 100]. Default value: 50.

Available only if the White Balance is selected. Controls the amount


of blue color in the image. The higher the value the more intensively
Bgain
blue color is displayed. Possible values: [0; 100]. Default
value: 50.

Select the checkbox to engage the backlight compensation


Backlight Compensation
algorithm.

Available only if the Backlight Compensation is selected. Defines


how strong the backlight compensation will be. Possible values: [0;
100]. Default value: 50.
Level
Note. In case the camera does not support level control the backlight
compensation will be controlled by rules defined by the manufacturer.

Select this checkbox to enable the WDR feature.

WDR mode Note. WDR feature (Wide Dynamic Range) allows to obtain the image of
high quality at scenes with significant illumination fluctuations.

www.issivs.com
SecurOS 236 Administration Guide
Video Subsystem

Parameter Description

Available only if the WDR mode is selected. Defines how strong the
WDR influence will be. Possible values: [0; 100]. Default
value: 50.
Level
Note. In case the camera does not support level control the WDR feature
will be controlled by rules defined by the manufacturer.

Select the checkbox to define the IR filter operation mode. Possible


values:
IR filter mode · auto on/off (default value);
· always on;
· always off.

Select the checkbox if the ONVIF device requires the use of non-
standard commands to control the wiper:

Start Wiper — enter the command to start the wiper;


Non-standard Wiper control
Stop Wiper — enter the command to stop the wiper.
commands
Note. If the parameter is activated but command is not set, the
corresponding command (including the standard command) will not be
sent to the ONVIF device.

Select the checkbox if the ONVIF device requires the use of non-
standard commands to control the washer:

Start Washer Kit — enter the command to start the washer;


Non-standard Washer Kit
Stop Washer Kit — enter the command to stop the washer.
control commands
Note. If the parameter is activated but command is not set, the
corresponding command (including the standard command) will not be
sent to the ONVIF device.

Positioning settings parameters

Activate this parameter to use the functionality of centering frame


Centering frame on the
on the selected point (see SecurOS Quick User Guide, the Mouse
selected point
Controls section).

Activate this parameter to use the functionality of scaling selected


Scaling selected frame area frame area (see SecurOS Quick User Guide, the Mouse Controls
section).

www.issivs.com
SecurOS 237 Administration Guide
Video Subsystem

Table 36. Additional parameters of the SecurOS Motus Camera (Video Capture Device with the
SecurOS Motus Type)

Parameter Description

Select this checkbox to control camera's light, zoom and focus.

Note. If not selected all of the following parameters are disabled.


Use SecurOS Motus built-in
controller Warning! To control a camera with the help of the Motus controller it is
necessary to set the Pan/ tilt/ zoom parameter of the Camera object settings to
Use (see General Tab). Otherwise it will be impossible to control the
camera.

Specify IP address of the Motus controller that will be used to


Device control IP address
control camera's illumination, zoom and focus.

Specify user name and password to get access to control camera's


User/ Password
illumination, zoom and focus.

Select the Illumination mode. Possible values:

· always on (default value) — when this value is selected all


zones are illuminated constantly with specified level;

· always off — when this value is selected the illumination of


all zones are constantly turned off;
Illumination mode
· auto on/off — when this value is selected, the illumination
turns on/off automatically depending on the actual light level in
the zone (determined by the camera sensor). If actual light level
is less than specified by the Day/ Night shift level parameter
illumination turns on for all zones with intensity specified for
each ones.

Specify illumination level for each zone (in %, in the range defined in
Short/ Middle/ Long range the controller). For example, if the [15; 75] range is set in the
illumination controller settings and parameter is set to 40 then actual
illumination level will be 39.

Specify the threshold for automatic on / off illumination for the


Day/ Night shift level
auto on/off mode.

Warning! Only for cameras with IR illumination.


Force camera night mode Camera's IR filter control. If selected (default value) then IR filter of
shift the camera will be switched off if illumination level is less or equal
to value specified in the Day/ Night shift level parameter.

Illumination control of SMT-LT357-IR Model (with IR lighting)

Select the checkbox to control camera's IR lightning. Provide access


Illumination control
to all parameters described below.

Defines the lightening source operation mode. Possible values:

Day/ Night mode · auto on/off (default value);


· day;

www.issivs.com
SecurOS 238 Administration Guide
Video Subsystem

Parameter Description
· night.

The option is available only when the Day/ Night mode is set to
Auto on/off. Defines the light sensitivity that controls switching
Sensitivity between day and night modes. The higher the value the earlier the
camera will switch to the night mode when it gets darker.

Possible values: [0; 9]. Default value: 7.

Select the mode by which the illumination level will be controlled.


Illumination level control Possible values:
mode · auto;
· manual.

The option is available only when the Illumination level control


mode is set to Manual. Defines the level of illumination at
Short/ Long range short/long range. Possible values: [0; 1000]. Default value: 500.
illumination
Note. Zones illumination level control may be partially or fully
unavailable for some camera models.

Illumination control of SMT-LT556-WL Model (with white lighting)

Select the checkbox to control camera's white lightening. Provide


Illumination control
access to all parameters described below.

Defines the lightening source operation mode. Possible values:


· auto on/off (default value);
Illumination mode
· always on;
· always off.

The option is available only when the Illumination mode is set to


Auto on/off. Defines the light sensitivity that controls switching
Sensitivity between illumination modes. The higher the value the earlier the
camera will turn the light on when it gets darker.

Possible values: [0; 9]. Default value: 7.

Defines the level of illumination at short/long range. Possible


values: [0; 1000]. Default value: 500.
Short/ Long range
illumination Note. Zones illumination level control may be partially or fully
unavailable for some camera models.

www.issivs.com
SecurOS 239 Administration Guide
Video Subsystem

Table 37. Additional parameters of the Virtual Camera (Video Capture Device with the Virtual type)

Parameter Description

Select this checkbox to synchronize all video streams from all


Cameras children to given Video Capture Device. After applying the
settings, all video streams are combined into a single
Enable stream
synchronization group. For this group a common time interval is
synchronization
searched and then the video from each Camera is played
synchronously in a circle within this interval. If the common interval
is not found the video is not synchronized.

Select this checkbox to play the video archive with the same
interframe intervals with which this archive was recorded. The
original interframe intervals will be exactly reproduced with each
random playback of the archive. This mode is used to demonstrate
Use interframe delays from changes in the operation of video analytics algorithms as they are
file improved.

If this checkbox is not selected then interframe intervals will be


calculated by the Video Capture Device automatically and will be
different for each separate playback of the archive.

Table 38. Additional parameters of the Generic RTSP Camera (Video Capture Device with the Generic
RTSP Type)

Parameter Description

Select this checkbox to send authorization data (user, password) in


Add authorization data to the URL line. This option provides a connection to cameras that do
URL not support connection with encrypted authorization data. By
default is not selected.

The parameter affects the low-level mechanisms of the


Use compatible URL
communication protocol with the camera. The parameter can be
formatting in SETUP
used only by the recommendations of the Intelligent Security
method
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


communication protocol with the camera. The parameter can be
Ignore RTP SSRC
used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


communication protocol with the camera. The parameter can be
Ignore RTP payload type
used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


Ignore sequence number in
communication protocol with the camera. The parameter can be
RTP header (for RTP/ TCP
used only by the recommendations of the Intelligent Security
only)
Systems Technical Support Team.

www.issivs.com
SecurOS 240 Administration Guide
Video Subsystem

Parameter Description

The parameter affects the low-level mechanisms of the


communication protocol with the camera. The parameter can be
Disable NAT hole punching
used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

Immediately restart stream Allows to increase connection stability for cameras with short
on disconnect connection issues caused by disconnect or an error.

The parameter affects the low-level mechanisms of the


communication protocol with the camera. The parameter can be
H263: Ignore UFEP
used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


H265: Ignore FU start bit in communication protocol with the camera. The parameter can be
header used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


H265: Ignore FU end bit in communication protocol with the camera. The parameter can be
header used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


H265: Ignore FU type in communication protocol with the camera. The parameter can be
header used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

The parameter affects the low-level mechanisms of the


H265: Ignore payload type communication protocol with the camera. The parameter can be
in FU header used only by the recommendations of the Intelligent Security
Systems Technical Support Team.

Table 39. Other additional parameters

Parameter Description

The option is used to set the protocol for interaction with the washer
Washer Kit / Wiper protocol or wiper for some Axis devices. Select the checkbox and choose the
required protocol from the list.

This checkbox affects the server response when digest


authentication is used:

· if selected, server response is calculated as follows: MD5(HA1 :


Ignore qop (Quality of nonce : HA2);
protection) parameter with
· if not selected and the qop="auth" is specified in the query,
auth value when using
then compute the response as follows: MD5(HA1 : nonce :
digest authentication
nonceCount : clientNonce : qop : HA2).

Note. Directive qop="auth" is specified automatically by the RTSP


server.

www.issivs.com
SecurOS 241 Administration Guide
Video Subsystem

Parameter Description

Select from the drop-down list pixel format of the uncompressed


video, which is supported by given model of the Camera. If selected
value is not supported, video stream from given Camera will not be
Pixel format received.
Warning! For a complete list of supported values, see the User's Guide for
the selected Camera model.

To receive in SecurOS video stream from required Camera, specify


Camera serial number its serial number. This parameter is used when several cameras are
connected to the Computer via USB 3.0.

Warning! Parameter is intended only for those Basler Pylon GigE


(Area Scan Camera) and Basler Pylon USB 3.0 camera
models, that have auto white balance option in their own settings.
Otherwise, using this parameter may cause Camera malfunction in SecurOS.

This option allows to compensate for differences in color, that


appear when camera operates in conditions of volatile illumination.
Select the checkbox and select one of white balance adjustment
mode:

· Off — auto white balance is turned off;

· Once — white balance adjusts automatically until the optimal


Auto white balance value for current illumination is reached. After reaching such
value the option will be automatically set to Off mode, and
obtained value will be permanently used for all frames in future;

· Continuous — while balance will be automatically corrected


for every frame until mode is changed to Off or Once.

· Preset 3200K;

· Preset 5000K;

· Preset 6500K;

· Preset 7500K.

Select the checkbox and choose one of the gain control modes:

· Off — automatic gain control is turned off. Move slider to set


the gain value manually;

· Once — when this value is selected the camera will


automatically adjust gain for only once. After that the option
Autogain will be automatically set to Off mode and obtained value will
be permanently used for all frames in the future;

· Continuous — when this value is selected the camera will


constantly auto-adjust gain. In this mode gain will be
automatically adjusted for every frame until mode is changed to
Off or Once.

Gain Set the gain of the camera output signal.

www.issivs.com
SecurOS 242 Administration Guide
Video Subsystem

Parameter Description

Set a minimum gain (see Autogain parameter).


Gain Min
Possible values: [100; 12599]. Default value: 100.

Set a maximum gain (see Autogain parameter).


Gain Max
Possible values: [100; 12600]. Default value: 100.

Set width of the frame (in pixels) if it is not required to use


Frame width, px
maximum possible matrix horizontal resolution.

Set height of the frame (in pixels) if it is not required to use


Frame height, px
maximum possible matrix vertical resolution.

Specify a maximum exposure time of the frame (in microseconds).


Exposure time, μs This parameter defines brightness of a frame: the more this value is,
the brighter will be the image.

Select this checkbox to automatically center the frame horizontally.


Automatic center align by X
By default is not selected.

Set horizontal offset for a frame (in pixels). This parameter sets
offset of top left corner of the frame regarding to top left corner of
X-offset, px
the matrix in case if horizontal frame size if smaller than maximum
acceptable (see Frame width parameter).

Select this checkbox to automatically center the frame vertically. By


Automatic center align by Y
default is not selected.

Set vertical offset for a frame (in pixels). This parameter sets offset of
top left corner of the frame regarding to top left corner of the matrix
Y-offset, px
in case if vertical frame size if smaller than maximum acceptable
(see Frame height parameter).

Codec Select codec, that corresponds to required camera video stream.

Codec for recording Select codec, that will be used when writing video to archive.

In some cases, HDR conversion makes the image more applicable


HDR processing for video analytics. The option requires additional computing
resources.

Select this checkbox to apply other camera exposure settings when


Standby mode
there is no vehicle over the UVSS platform.

9.11.1.2.8 Multicast
Video from surveillance camera can be transmitted to the operator's workstations in two modes:
®
· unicast-translation — frame is translated on the Camera Video Server ®
Operator Workstation
route. In this mode number of identical video streams transmitted from the Video Server to the
Operator Workstation is equal to number of operators, who watch the camera.
· multicast-translation — in this mode a single video stream is transmitted into network on route
from camera to operator workstation. Further this stream is translated via network hardware to the
Video Server and non-limited number of the Operator Workstations.

www.issivs.com
SecurOS 243 Administration Guide
Video Subsystem

Benefits of multicast-translation
Use of multicast-translation allows to get the following benefits when it applied in the network with
large number of operators:
· significantly reduce charges for purchasing and operating required network hardware;
· reduce video server work-loading.

For example, there are several Video Servers within SecurOS network and each server is connected with
100 Cameras. Each Camera translates the 5 Mbps video stream. There are 40 Operator Workstations
within the network and each operator watches 20 Cameras.

Let's analyze the worst case, when all 40 operators watch Cameras, connected to the same Video Server at
the same time. In this case we have the following result:
· Unicast Mode
- Total Video Server's input stream will be 100 x 5 = 500 Mbps. To work with such video stream
only one 1 GE network interface is enough.
- Total Video Server's output stream will be 20 x 5 = 4000 Mbps. To work with such video
stream one 10 GE interface on the video server and the same 10 GE interface on the network
hardware are required yet. For now, such equipment is significantly more expensive than
widespread 1 GE equipment.
- In addition, Video Server's CPU must have enough reserve of performance.
· Multicast Mode
- Total Video Server's input stream is the same (500 Mbps). To work with such video stream only
one 1 GE network interface is enough.
- There is no output video stream on the Video Server. Thus, 1 GE network interface on the video
server and the same 1 GE interface on the network hardware that are already available is enough.
- Extra performance of the Video Server's CPU to translate video stream into the network is not
required, too.

Conditions for use multicast-translation


Multicast-translation is expedient for using under the following conditions:
· network hardware support IGMP Version 3;
· network hardware is configured to use multicast and provides video delivery to any client,
connected to the SecurOS network;
· bandwidth of any network segment excludes losses of UDP packets when translating video.

Additional Information
The loss of UPD packets results in significant frame rate reduction, and it will looks like "jumps" and "jerks" during
video playback.

Otherwise use of multicast mode is not justified and will not provide an expected result.

Setting Up Camera

Warning! In current Release multicast mode is supported only for ONVIF protocol.

To enable multicast translation specify the following parameters on the Stream tab in the Camera object
settings window (see Figure 157):

www.issivs.com
SecurOS 244 Administration Guide
Video Subsystem

Figure 157. Setting up multicast translation mode

1. Enable multicast mode.


2. Address (IPv4) and Port for multicast group.

Warning! Each specified Address (IPv4)/Port pair of values must be unique. It is system administrator
responsibility to provide and control this uniqueness.

9.11.1.2.9 Configuring Panoramic Cameras


Initial image of the panoramic camera can be dewarped to a form suitable for the perception of the
operator. For such dewarping different algorithms appropriate to the Type and Model of the camera.
Configuring panoramic camera supposes a selection of the correct algorithm that allow to view
dewarped image obtained by cameras equipped with different types of lenses.

Configuring is performed in the Advanced tab (see Figure 158). Depending on camera's Type and
Model the following configuring options are possible:

· Configuring cameras equipped with panomorph lens supporting ImmerVision technology;


· Configuring other cameras equipped with panoramic lens.

Possibility to control supported panoramic cameras with the help of electronic PTZ is switched on
automatically after configuring is finished.

www.issivs.com
SecurOS 245 Administration Guide
Video Subsystem

Figure 158. Advanced tab for the cameras with panoramic lenses

Configuring cameras equipped with panomorph lens supporting ImmerVision technology

To configure camera do the following:


1. Select the Panomorph lens checkbox, select model of the used lens in the list on the right.
2. Choose camera position from the Camera position list.

Configuring other cameras equipped with panoramic lens

Choose camera position from the Camera position list.


9.11.1.3 Defocus detector
This object is designed to specify parameters, used by the Camera defocus determination algorithm.

Parent object — Camera.

www.issivs.com
SecurOS 246 Administration Guide
Video Subsystem

Figure 159. Defocus detector object settings window

Table 40. Defocus detector object settings

Parameter Description

An area, located in the left part of the object settings window. The
detection area is represented by a rectangular area, bounded by a
white dotted line, in which a video stream is displayed without
distortion. Sharpness of the image inside the detection area is
Detection area considered a reference quantity. To change the area size place the
mouse cursor over any side of the rectangle, then move the cursor in
the required direction holding the mouse button. To move the
detection area, click inside it and drag rectangle to the new location.
By default, the detection area is set to the whole frame size.

When detection parameters are specified, click this button to store


Camera is focused
reference image.

Deviation of the current image sharpness from the sharpness of the


Camera is defocused when
reference image, in percent. If exceeded, the camera is considered to
camera sharpness reduces
be defocused. When the specified value is exceeded, then
by
appropriate event is generated (see SecurOS Programming Guide).

Camera defocus checking period, in seconds. Range of values:


Checking period
[1;120].

www.issivs.com
SecurOS 247 Administration Guide
Video Subsystem

Parameter Description

Select the Schedule if the defocus detector should work in the


Work according to selected
specific time range. If option is not selected, defocus checking is
Schedule
always performed.

Recommendations for choosing the detection area and configuration of the other detector parameters
are shown below (see Fine Tuning Recommendations).

9.11.1.3.1 Fine Tuning Recommendations


When specifying a detection area it is recommended to comply with the following requirements:

1. Image inside detection area must be static as much as possible.


2. Image inside detection area must contain max possible number of small objects, having sharp
borders.
3. Shading of the image inside detection area must be minimized.

For the detection areas that will normally not be shaded, it is recommended to specify a short Checking
period. This allows to capture short-time shading caused by sabotage.

When specifying a Schedule it is recommended to use such a time period, when changing of lighting
conditions inside detection area is minimum.

If the detection area and other parameters are specified correctly, then the indicator of the detector's
current settings will look as follows (see Figure 160):

www.issivs.com
SecurOS 248 Administration Guide
Video Subsystem

Figure 160. Adjustment of the Defocus Detector

9.11.1.4 Layout

This object is used to create a custom layout of the Media Client's video page — a form, dimensions and
arrangement of cells to display video from the Cameras. To use created custom layouts, select the
required ones on the Layouts tab (see Media Client section). Similar to system layouts, using custom
layouts it is possible to move cameras around to the any cell of the layout.

Parent object — Security Zone\Layouts & Views group.

www.issivs.com
SecurOS 249 Administration Guide
Video Subsystem

Figure 161. Layout object settings window

Table 41. Layout object settings

Parameter Description

A grid defines the basic model of the Media Client's working area
(i.e. Layout), which contains a specified number of cells vertically
and horizontally, accordingly. When creating/editing a layout, any
Grid
number of adjacent cells can be merged into one cell of larger size.
This large cell can again be split to the appropriate number of basic
cells.

Information string. Displays the total number of cells currently


Cells displayed on the layout. Updates automatically when the layout's
grid numbers are changed. Max number of cells in a layout is 250.

Buttons

www.issivs.com
SecurOS 250 Administration Guide
Video Subsystem

Parameter Description

View buttons (Previous view, Next view) to look at the


intermediate versions of the layout's model.

, Note. Intermediate versions of the layout are stored in the SecurOS's


RAM and are accessible to the administrator during current session of
creating/editing the object.

Saving current layout and closing object settings window (Closing


OK (Cancel)
object settings window without saving changes).

9.11.1.5 View

View represents a combination of several Cameras, Microphones or Cameras and Microphones


simultaneously, grouped into a single object that is controlled by a Media Client. Visually View includes
Media Client's Working area, where Cameras are displayed, and Microphone Panel. Each View is a separate
object of a Media Client, that allows operator quick access to information of interest, which is provided
by preliminary specified group of video and audio sources.

Parent object — Security Zone\Layouts & Views group.

Object has no settings to configure.

Setting up Views to use them on the Operator Workstation is performed by system administrator with the
help of Media Client (see About Views).

Setting up Media Client to work with Views is performed in the its Views tab.

9.11.1.6 Zone

This object represents a single detection zone of the motion detector (see Working Principles of Motion
Detection Zones for detailed information). One default zone called Main is created automatically when
a Camera object is created and covers the whole visible area of the Camera cell.

When configuring a Zone object, take into account the following parameters:

· Contrast slider defines minimal moving object contrast. Top position of the slider means the zone
would detect motion only if a moving object differs greatly from the surroundings. Bottom position
of the slider means the zone would detect motion even if a moving object slightly differs from the
surroundings.
· Size slider defines minimal moving object size. Top position of the slider means the Zone would
detect motion of large objects only. Bottom position of the slider means the Zone would detect
motion of small objects.

Note. The values of the Contrast and Size sliders should be set by practical consideration.

· Alarming flag should be active to generate an alarm on the camera upon any motion detection
within the zone. If this flag is not checked, the zone is considered informational.

www.issivs.com
SecurOS 251 Administration Guide
Video Subsystem

· Armed always flag should be active to have the zone always armed, regardless of the
armed/disarmed state of other zones on the same camera.
· Save movement coordinates (enables Smart Search) checkbox should be activated if it is necessary
to save alarm object coordinates into the database.

Note. Several Zone objects within the same parent object are combined into the Motion Detector logic group
in the Object Tree.

Parent object — Camera\Image zones group.

Figure 162. Zone object settings window

Table 42. Zone object settings

Parameter Description

The Zone settings tab

Zones

www.issivs.com
SecurOS 252 Administration Guide
Video Subsystem

Parameter Description

A Zone can be represented with one of the following types:


· Detector zone — intended for motion detection in selected
area of the Camera image;
Zone types
· Privacy zone — is used to hide part of the Camera image area;
(drop-down list) · Generic zone — stores information about zone arrangement.
Warning! Alarming, Armed always, and Save movement coordinates
(enables Smart Search) parameters are available for editing only if the
Zone type parameter is set to Detector zone.

Enable this option to treat motion detection within this zone as an


alarm (camera will enter alarmed state, recording will be started
automatically, etc.).

If this option is selected then the Save movement coordinates


Alarming (enables Smart Search) option will be available. If you clear this
option, the zone will be treated as "informational": no predefined
actions will be performed, the Zone object will generate events
upon detection start and end, thus allowing you to program
custom reactions via macros or scripts.

Select this option to keep armed mode for camera. Operator won't
Armed always
be able to disarm this zone.

Select this checkbox if it is necessary to save alarm object


coordinates into the SecurOS database. If the checkbox is selected,
alarm data will be recorded to the fsindex database (detection of
Alarms starts after the camera is armed), which in turn, further
allows one to search for specific Alarm criteria.

Save movement coordinates Warning! All records that indicate Alarm start and stop (in microseconds)
(enables Smart Search) will be registered in the SecurOS database, assuming the default
PostgreSQL database is used. In case of other databases, records with
Alarm times will not be recorded and searching will be impossible.

Note. Alarm time intervals are registered regardless of archive


existence for that time. It is implied that the camera writes video
constantly or on motion detection.

Motion detection

Move slider to specify detected object contrast sensitivity.


Boundary values:
Contrast
10 — even low-contrast objects will be detected;

99 — only objects with high contrast will be detected.

Move slider to specify detected object size sensitivity. Boundary


values:
Size
10 — even smallest objects will be detected;

99 — only large objects will be detected.

www.issivs.com
SecurOS 253 Administration Guide
Video Subsystem

Parameter Description

Common values for Camera Zones

Select Analyze reduced FPS stream checkbox if it is allowed to


use stream with reduced FPS when detecting motion. Specify, if
necessary, maximum frames per second value sufficient to detect
motion (max FPS parameter).

Analyze reduced FPS stream, Note. The stream is reduced by I-frames. If the value specified in the
max FPS max FPS parameter is less than the result value of the initial frame rate
reduction then the I-frames themselves are further reduced.

By default the checkbox is not selected, and the max FPS


parameter is disabled. After the checkbox is activated, the range of
max FPS parameter values is [1; 30].

Set the number of last camera frames used for motion analysis. If
there is not enough frames then the motion detection procedure is
Memory frames
not started. Possible values from 4 to 128 (frames). Default value
— 8.

The Mask editor tab (see figure 163)

Video Area to display camera zones.

Fill all Click the button to fill the whole frame by a mask.

Clear all Click the button to clear the camera mask.

Show all zones Click the button to display all camera zones.

OK (Cancel) Exit settings with (without) saving.

www.issivs.com
SecurOS 254 Administration Guide
Video Subsystem

Figure 163. Zone object settings window. Mask editor

To edit zone mask:


1. Click the Mask editor tab on the Zone object property window.
2. Draw a rectangle inside the camera cell holding the right mouse button, then releasing it. This part of
the camera screen would be excluded from the zone.
3. Draw some rectangles inside the camera cell holding the left mouse button, then releasing it. This
part of the camera screen would be added to the zone.

9.11.1.7 Light Detector

This object represents the detector of contrast between inner and outer zones.

Parent object — Camera.

www.issivs.com
SecurOS 255 Administration Guide
Video Subsystem

Figure 164. Light Detector object settings window

Table 43. Light Detector object settings

Parameter Description

Inner zone Select from the list a Zone object corresponding to the inner zone.

Outer zone Select from the list a Zone object corresponding to the outer zone.

Select from the list a Zone object corresponding to the secondary


Outer zone (secondary) (additional) outer zone for checking light level by comparison with
two independent zones.

Move slider to specify detection light sensitivity. Boundary values:

Sensitivity min— even smallest light difference will be detected;

max— only high light difference will be detected.

9.11.1.8 Archive Converter

This object is used to get video/audio archives from all the video servers of the system and convert
them to ASF, AVI, MOV, Evidence and ISS (obsolete) formats.

Warning!
1. If the export start period does not fit within the i-frame time-stamp (accurate within milliseconds),
then the actual export start time will be shifted to the first i-frame time-stamp inside the export
period.
2. It is necessary to reserve enough free space on the hard dive of the computer where export will be
performed.

Note. To play quick converted video It is recommended to use VLC media player.

Parent object — Computer.

Settings window appearance may differ depending on selected format (see figure 165 and figure 166).

www.issivs.com
SecurOS 256 Administration Guide
Video Subsystem

Figure 165. Archive Converter object settings window. File type is Evidence

www.issivs.com
SecurOS 257 Administration Guide
Video Subsystem

Figure 166. Archive Converter object settings window. File type - AVI/ ASF/ MOV

Table 44. Archive Converter object settings

Parameter Description

Select format of converted file: ASF, AVI, MOV, Evidence or ISS


(obsolete). Default value is ASF.

Notes:
File type 1. The Evidence format is used to export files encoded
with ISS native codec. Converted video can be only
played with SecurOS Evidence Manager.
2. When exporting to Evidence format video from
multiple Cameras can be saved into one file.

Select this checkbox to attach SecurOS Evidence Manager


Add SecurOS Evidence
application to the archive that will be created (see SecurOS
Manager
Evidence Manager User Guide).

www.issivs.com
SecurOS 258 Administration Guide
Video Subsystem

Parameter Description

Max size of each file created after the export. Default value is 2000
MB. Max value is 10000 MB.
Warning! Some media players do not support AVI-files greater than 2 GB.

When exporting to the AVI and ASF file formats archive can be
split into several files regardless of the specified value of this
parameter. Archive is being split automatically in the following
cases:
Split into files up to · Video archive contains frames with different frame resolution.
When resolution is changed the new file will be created;

· Quick export of the video archive is performed (see Quick


video export) and video codec is changed;

· Export is performed both from the Primary and Long-term


archive. In this case two separate files will be created: one for all
records from the Primary archive and another one for all records
from the Long-term archive.

Specify directory to store converted files. Possible values: any


available directory on the hard drives of the local machine.
Optional parameter. If not specified, the file is saved into the c:
Export to \export directory.

Note. When setting the parameter values it is possible to use file name
macros (see Name pattern parameter description).

www.issivs.com
SecurOS 259 Administration Guide
Video Subsystem

Parameter Description

Template for the created file names. Can be formed by any


combination of valid characters and macro substitutions.

Optional parameter. Default value is {CAMID}


({EXPORT_START_TIME} - {EXPORT_STOP_TIME})

Any characters, that are permitted to be used in the file names by


used OS.

The following macro substitutions are available (curly brackets are


necessary):

· {SID} — export session number. Set to zero when the SecurOS


application is started;

· {CAMID} — camera identifier when exporting video or


microphone identifier when exporting audio file only;

· {CAMNAME} — camera name when exporting video or


microphone name when exporting audio file only;

· {COMPID} — computer (video server) identifier;

Warning! When converting archive of multiple Cameras to Evidence


format, macro substitutions CAMID, CAMNAME and COMPID are being
ingnored.

· {SOURCE_TYPE} — type of the object, with the help of which


Name pattern the initial archive file has been created. Possible values:

- video — archive has been created by a Camera object;

- audio — archive has been created by a Microphone object.

· {COMMENT} — export initiator comment, used when the


conversion is started from a program or a bookmark is
exported;

· {CUR_YEAR} — current year in "YYYY" format;

· {CUR_MONTH} — current month in "MM" format. Non-


significant zero is omitted when displaying in the file name;

· {CUR_DAY} — current day in "DD" format. Non-significant


zero is omitted when displaying in the file name;

· {CUR_HOUR} — current hour in "HH" format. Non-significant


zero is omitted when displaying in the file name;

· {CUR_MINUTE} — current minute in "MM" format. Non-


significant zero is omitted when displaying in the file name;

· {CUR_SEC} — current second in "SS" format. Non-significant


zero is omitted when displaying in the file name;

· {CUR_FRAC} — current millisecond in "SSS" format. Non-


significant zero is omitted when displaying in the file name;

www.issivs.com
SecurOS 260 Administration Guide
Video Subsystem

Parameter Description

· {CUR_DATE} — current date in "YYY-MM-DD" format (for


example, "2011-12-31");

· {CUR_TIME} — current time in "HH'MM'SS" format (for


example, "23'05'06");

· {EXPORT_START_TIME} — export period start time in "YYYY-


MM-DD HH'MM'SS" format (for example, "2011-12-31
23'02'06");

· {EXPORT_START_YEAR} — export period start year;

· {EXPORT_START_MONTH} — export period start month


number;

· {EXPORT_START_MONTH_STR} — export period start month


name;

· {EXPORT_START_DAY} — export period start day;

· {EXPORT_START_HOUR} — export period start hour;

· {EXPORT_START_MINUTE} — export period start minute;

· {EXPORT_START_SEC} — export period start second;

· {EXPORT_START_FRAC} — export period start millisecond;

· {EXPORT_STOP_TIME} — export period end time in "YYYY-


MM-DD HH'MM'SS" format (for example, "2011-12-31
23'02'06");

· {EXPORT_STOP_YEAR} — export period end year;

· {EXPORT_STOP_MONTH} — export period end month number;

· {EXPORT_STOP_MONTH_STR} — export period end month


name;

· {EXPORT_STOP_DAY} — export period end day;

· {EXPORT_STOP_HOUR} — export period end hour;

· {EXPORT_STOP_MINUTE} — export period end minute;

· {EXPORT_STOP_SEC} — export period end second;

· {EXPORT_STOP_FRAC} — export period end millisecond.

www.issivs.com
SecurOS 261 Administration Guide
Video Subsystem

Parameter Description

Select the sequence of viewing archives when exporting the


required fragments from them.

Possible values:

· Export from primary, fill spaces from long-


term. When exporting a fragment, the Primary archive will be
used as a source for export in first turn. If it does not contain
Archives priority the required fragment, the Long-term archive will be viewed and
used as a source for export;

· Export from long-term, fill spaces from


primary. When exporting a fragment, the Long-term archive
will be used as a source for export in first turn. If it does not
contain the required fragment, the Primary archive will be
viewed and used as a source for export.

Select encryption algorithm that will be used when converting


video to the Evidence format. Possible values:

· AES-128;

· AES-192;
Encryption algorithm
· AES-256.

Warning! File will be encrypted only if password is set in the export task
parameters to protect it from unauthorized access (see SecurOS Quick
User Guide, Archive Export section).

Video (video conversion parameters)

Use original video codec and video quality during conversion.


Makes it possible to increase conversion rate significantly and to
reduce CPU load. Saving original codec and quality can only be
applied to H.263, H.264, H.265, MJPEG and MPEG-4 formats.
Quick video export
Note. When normal export is performed (Quick video export checkbox
is not selected) video data is re-coded. Re-coding is performed on a
single logic CPU's core, which requires additional computing power
and can take a long time.

Conversion with available audio.

Export video with audio Note. Export video with audio is not supported for the ISS
(obsolete) format.

Select video codec to convert archive video. Possible values:

Codec · MJPEG;

· MPEG-4.

Quality Select the quality of the converted video.

www.issivs.com
SecurOS 262 Administration Guide
Video Subsystem

Parameter Description

Reduce frame rate (use frame rate reduction during conversion). Select this checkbox to set frame
rate reduction.

FPS divider Set the frame rate reduction factor. Range of values: [2; 100].

Reducing the frame rate of the original video stream only by I-


FPS reduction performed on
frames (see Frame Rate Reduction). Frame rate reduction of the
server
archived video will be done on the Video Server where it is stored.

Audio (audio conversion parameters)

Select audio codec to convert archive audio. Possible values:

· PCM;
Codec
· WMA (for ASF container);

· MP3 (for AVI container).

Logo Overlay (apply logo on the frame)


Warning! When quick export is used (see Quick video export) logo is not applied.

Click this button and use file manager to select logo file. Logo file
must meet the following requirements:

· file format — PNG;

· max image dimension — 500x500 pix;

· max file size — 500 KB.


Select (button)
If the logo file is loaded successfully the appearance of the Logo
Overlay block of parameters will be as shown in Figure 167.

To view the loaded logo click on the (Preview logo) button. To


change the logo scale use mouse wheel.

To remove the loaded logo click on the Delete button.

Position of the logo on the frame. Possible values:

· left top;

Position · right top;

· right bottom;

· left bottom.

www.issivs.com
SecurOS 263 Administration Guide
Video Subsystem

Figure 167. Appearance of the Logo Overlay block after logo is successfully loaded

9.11.1.8.1 Digital Signature


In Linux OS the functionality is not supported.

A digital signature with a certificate ensures that the signed file has not been replaced or edited after
creation. The PKCS#7 Signed data detached signature standard is used for digital signature within
SecurOS.

Possibility to sign files with the certificate is available on the Computers that have any Role
(see Computer).
· Digital signature on the Video Server is available in case, if the Archive Converter configured in any
Operator Workstation Profile is selected to perform export task;
· Digital signature on the Operator Workstation is available in case, if the Archive Converter configured
on this Operator Workstation or in any Operator Workstation Profile is selected to perform export
task.

After enabling the digital signature functionality, the Archive Converter will automatically sign audio
and video files using the selected certificate.

Functionality is enabled directly on the Operator Workstation or the Video Server. Certificate, that matches
the following requirements, must be installed in advance on operator's computer:
· The Digital Signature bit is asserted in the Key usage certificate's extension;
· The Code signing attribute is set in the Enhanced key certificate's extension.

Functionality enabling procedure and Digital signature verification utility are described in details in
SecurOS Quick User Guide.

Note. To check and demonstrate how the digital signature works one can use self-signed certificate created
with the help of Certificate Generator utility.

9.11.1.8.2 Displaying Subtitles in Exported Video


Subtitles can be added on a live video frame in the following ways:
· when using the SecurOS POS Module (see SecurOS POS User Guide);
· from the Node.js Script the with the help of the ADD_SUBTITLES command (see SecurOS
Programming Guide).

www.issivs.com
SecurOS 264 Administration Guide
Video Subsystem

Added subtitles are stored both in Primary and Long-term archives.

When exporting to the AVI/ASF/MOV or Evidence file formats added subtitles are stored in archive
only in case if initial video stream is being re-coded when export procedure is performed (the Quick
export option is not selected). If the Quick export option is selected subtitles are not saved in the
exported file. Subtitles themselves are the part of the exported video and cannot be hidden.

Additionally, the following data is always displayed on the frame:


· Camera ID — imposted in the left bottom corner of the frame;
· Frame Date and Time — imposted in the right bottom corner of the frame.

9.11.1.9 Archive Export Profile

Archive prof ile export is a special object designed for quick configuring the archive export feature on any
Operator Workstation within the SecurOS network. Settings of this object are the same as the Archive
Converter object excluding the Export to parameter.

When using Archive export prof ile then only Media Client is used to create an export task and execute an
export procedure.

Just as when using the Archive converter an archive file can also be signed with the help of the certificate
(see Digital Signature). In this case the file can be signed on any Computers without additional
limitations.

Parent object — Security Zone.

9.11.1.10 Archiver
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

This object is used to copy records of specified cameras from Primary archive to the Long-term archive in
SecurOS format (see SecurOS Archives) and also to view files of the long-term archive in Media Client.

Warning! Long-term archive does not support audio playback.

Parent object — Computer.

www.issivs.com
SecurOS 265 Administration Guide
Video Subsystem

Figure 168. Archiver object settings window

Table 45. Archiver object settings

Parameter Description

Archiving mode

www.issivs.com
SecurOS 266 Administration Guide
Video Subsystem

Parameter Description

Select from the list the mode, that will be used to copy files of the
Regular archive:

· By request — in this mode copying will started only when


Macro will be executed or method, specified in the Node.js Script
body will be called. Only those records that match the command
parameters will be copied (for the details see SecurOS
Programming Guide, ADD_TASK command);
Warning! When upgrading SecurOS version 9.5 (and earlier) to 9.6 (and
later) it is necessary to edit all used Macros and Node.js Scripts, that are
used for Long-term archive creation.
Archiving mode
· Continuous — in this mode all archives, existing at the
moment for all Cameras, selected in the object settings, are
copied continuously;

· Scheduled — like Continuous mode, but copying is


performed only during the validity of the selected time interval
(see Schedule parameter below).

Note. Copying by schedule allows to select such time period for


operation execution, when total load of the system is minimal. For
example, night.

Specifies schedule to perform copying of the regular archive. Is


Schedule
enabled, if the Archiving mode parameter is set to Scheduled.

Storage locations (table)

List of drives available for writing and/or reading archive by given


Archiver.
Directory
Note. This table is empty when starting archiver for the first time.

Capacity Contains information about free space on the hard drive.

Available mode of working with the specified directory. Possible


values:

Mode · Read only — directory is available only for reading.

· Read and Write — directory is available both for reading and


writing.

Buttons

Click on this button to add a new directory to store long-term


Add directory archive. Details are described in Adding a directory for writing
archive.

Click on this button to change parameters of the selected directory.


Edit
Details are described in Editing a directory for writing archive.

www.issivs.com
SecurOS 267 Administration Guide
Video Subsystem

Parameter Description

Click on this button to delete selected directory. Details are


Remove
described in Deleting a directory for writing archive.

Cameras

To search Camera by name (part of its name) or by ID, type required


characters in the field; only those Cameras, that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Camera list (table)

To add a camera to the Camera list, with which given Archiver will
work, tick appropriate checkbox on the left of the Camera object.

Notes:
1. Cameras, selected to work with another Archiver, can not
be added to the list of the given Archiver. Checkboxes of
Name such cameras are disabled. Place the mouse pointer over
such Camera and system will display a name of the
Archiver object, in the settings of which given Camera is
selected.
2. Cameras operating with remote archive via EdgeStorage
Gate are not displayed in the Camera list.

Specify max frame rate (from 1 to 60) to record Long-term archive


with (see Frame Rate Reduction). If value is not specified, video
Max. FPS
frame rate in the Long-term archive will be equal to frame rate of the
video of the Primary archive.

Specify max period for storing fragment in the Long-term archive (in
days).
Warning! Storage period is calculated not from the date when fragment has
been copied to the Long-term archive, but from the moment when this
fragment has been recorded to the Primary archive. For example: fragment
has been recorded in the Primary archive on April, 10, and has been
copied in the Long-term archive on April, 15. If Remove after parameter
Remove after is set to 15, then fragment will be removed from the Long-term archive on
April, 25 (i.e. in 10 days after it was copied).

Note. If there is not enough free disk space to write a long-term archive,
the archive will be deleted earlier than the specified storage period to
free space for new files.

If value is not specified, long-term archive wil be rewritten in "ring


mode" (old files are deleted, new ones are written in their place).

Adding a directory for writing archive


To add a directory to write a long-term archive follow these steps:
1. In the object settings window (see Figure 168) click on the Add directory button.
2. The Add new directory window will appear (see Figure 169).

www.issivs.com
SecurOS 268 Administration Guide
Video Subsystem

Figure 169. Add new directory window

3. Select option to record archive (Drive/Network path) and select hard drive or specify path to the
network folder (user name and password are specified optionally).

Notes:
1. The Drive list is automatically populated with all hard drives, available on given Video Server.
2. If Video Server is disconnected, then list will be populated with all drives from A to Z.

Warning! It is not recommended use the same Directory for recording Regular (see Archive in the Computer
object settings) and Long-term archives.

4. In Video field (section Set rights) set the rights of directory access. Possible values:
· Read — directory will be available only for reading.
· Read and Write — directory will be available both for reading and writing.
5. In Archive recording check and, if necessary, modify the Minimum free drive space value.

Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to record
archive as efficiently as possible.

6. Click on the OK button to save the changes.

www.issivs.com
SecurOS 269 Administration Guide
Video Subsystem

Editing a directory for writing archive


To edit parameters of a directory to write a Long-term archive follow these steps:
1. Select required entry in the Storage locations table (see Figure 168), click on the Edit button.
2. The Edit existing directory window will appear (see Figure 170).

Figure 170. Edit existing directory window

3. Change the current parameters of the directory.

Warning! It is not recommended use the same Directory for recording Regular (see Archive in the Computer
object settings) and Long-term archives.

4. In Video field (section Set rights) change the rights of directory access. Possible values:
· Read Only — archive is available only for reading.
· Read and Write — archive is available both for reading and writing.
5. In Archive recording check and, if necessary, modify the Minimum free drive space value.

Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to record
archive as efficiently as possible.

www.issivs.com
SecurOS 270 Administration Guide
Video Subsystem

6. Click on the Save button to save the changes.

Deleting a directory for writing archive


To delete a directory, select required entry in the Storage locations table (see Figure 168), click on the
Remove button.

9.11.1.11 Image Processor

This object is used for image (frame) processing and to subsequently export the image(s) to a file or
database.

Parent object — Computer.

This object has no settings to configure.

Processing of the images assumes the following operations:


· cropping initial image to the specified size and position relative to the source values;
· drawing unfilled rectangles with specified color, line width, and position.

When exporting an image to a file it is saved on the hard drive of the parent Computer or can be stored
in any Database configured in the SecurOS object tree when exporting to the database.

Frames are processed and exported using the EXPORT command, which is applied using the Node.js
Script object. For the complete export program syntax see SecurOS Programming Guide.

Additional parameters of the export procedure


In addition to the parameters specified directly in the command, the export procedure is controlled with
the following additional parameters:
· deltaArchive — time shift (in seconds), counted out of the export time value (T) specified in the
command string. Is used to specify frame search range in archive records which is calculated as
follows: [T - deltaArchive; T + deltaArchive]. Default value is 600;
· downloadTimeout — timeout to download frame to the archive, in seconds. Is used when
exporting frames in real-time. Default value is 20.

Additional parameters can be configured both in Windows and Linux OS. The setup procedure for each
OS is described below:
· Setting up for Windows.
· Setting up for Linux.

Setting up for Windows


1. Stop Video Management System Server system service.
2. Open the \HKLM\SOFTWARE\ISS\SecurOS\NISS400\ImageProcessor folder and specify the
required values of the deltaArchive and downloadTimeout keys.
3. Start Video Management System Server system service.

Setting up for Linux


1. Stop the vms_server daemon using the sudo service vms_server stop command.

www.issivs.com
SecurOS 271 Administration Guide
Video Subsystem

2. Open the /etc/xdg/iss/securos.conf file for editing and add the


ImageProcessor\deltaArchive=X and ImageProcessor\downloadTimeout=X lines, where
X are the required values.
3. Start the vms_server daemon using the sudo service vms_server start command.

9.11.1.12 RTSP Server

The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

This module is designed to transmit live or archive H.264 video from SecurOS's Video Servers to remote
external systems via RTSP/RTP. Video streams can be transmitted both via UDP, which is used by the
RTSP Server by default, and TCP. The type of transport protocol used is specified by the settings of the
external system.

There are the following restrictions when transmitting video from RTSP Server:
· total number of Cameras connected to a single RTSP Server object — not more than 1000;
· total number of clients to receive live or archive video from one Camera — not more than 800.

Warning!
1. Any stream of the multi-streaming camera can be transmitted.
2. Transmission of the synchronized audio is not supported.

Parent object — Computer\Integration and Automation group.

Figure 171. RTSP Server object settings window

www.issivs.com
SecurOS 272 Administration Guide
Video Subsystem

Table 46. RTSP Server object settings

Parameter Description

SecurOS's port for interaction with external system via RTSP. Is used to
RTSP port receive live and archive video with the help of an external application (e.g.
media player). Range of values: [1; 32768]. Default value is 554.

SecurOS's port for interaction with external system via HTTP. Is used to
receive a list of archive records via web-browser. Range of values: [1;
HTTP port 32768]. Default value is 81.
Warning! When changing the default port value it is recommended to use netstat
-aon|more query in the command prompt to determine the free port.

Select archive video transfer protocol. Possible values:

· RFC 2326 — default value. Is recommended for use in most cases;


RTSP Specification
· UDC — select this value, if reverse playback of the archive video
requested via RFC 2326 causes errors.

Select this checkbox so that only authorized SecurOS users will be able to
connect to the RTSP Server.
Warning! Working with Windows Active Directory domain users is not supported.

If selected, the access rights of the SecurOS User Account to the Cameras from
which the video is requested will be checked before connecting. To receive
Require video, the access level of an authorized user to Cameras must be no lower
authentication than (View).

If there are User Accounts in the system whose settings must be changed to
work with the RTSP Server after updating to version 10.8, the icon will be
displayed in the window. For more information about such User Accounts,
see Updating from version 10.7 and earlier. The settings of the User Accounts
created after updating to version 10.8 do not need to be changed.

Cameras

List of SecurOS's cameras, that can be used as a signal source to transmit live
and archive video to an external system via RTSP. Structure of the tree is
similar to SecurOS's Object Tree. To use a Camera, select appropriate checkbox
on the left of the object. To use all Cameras of the computer select checkbox on
the left of the appropriate Computer. To use all Cameras of all the Computers of
the system, select checkbox on the left of the System object.
Object tree
Note. Temporarily disabled Cameras (see Disabling Objects) are marked in the
Object Tree in gray (see Figure 171, Camera 1).

Warning! The number of cameras, which can be simultaneously used for video
transmission, is a licensed value. When the value, specified in the license key file is
exceeded, the OK button is disabled.

Buttons

Save specified values and close object settings window (Close object settings
OK (Cancel)
window without saving changes).

www.issivs.com
SecurOS 273 Administration Guide
Video Subsystem

For more information about using RTSP Server, please contact your regional Intelligent Security Systems
representative.
9.11.1.13 ONVIF Server

The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

This object is designed to transmit live H.264 video from the SecurOS Video Servers to external systems
via RTSP protocol and to control SecurOS PTZ cameras from external system via ONVIF protocol.

Parent object — Computer\Integration and Automation group.

To configure ONVIF Server do the following:


1. In the SecurOS Object Tree, in the Integration and Automation group, create an ONVIF Server object
that is a child of the Computer object (see Figure 172).

Figure 172. Creating ONVIF Server object

2. To use a secure https connection, select the HTTPS protocol in the object settings window
(see Figure 173).

www.issivs.com
SecurOS 274 Administration Guide
Video Subsystem

Figure 173. ONVIF Server object settings window

3. Add a private key certificate. To add a certificate, click the Select certificate button, use the file
manager to specify the location of the certificate file. If the certificate key is stored in a separate file,
click the Select key button and specify the path to the key file.
4. If the certificate is password protected, enter the password in the Certificate password field.
5. To complete configuration click OK.

Table 47. ONVIF Server object settings

Parameter Description

Select RTSP Server, parameters of which will be used for generating RTSP
RTSP Server
request for transmitting video from the SecurOS.

Select the protocol for communication with the ONVIF Server. Possible
values:
Protocol
· HTTP — for an insecure connection.
· HTTPS — for a secure connection using a certificate (recommended).

SecurOS's port for interaction with external system via ONVIF. Is used to
Port control SecurOS PTZ cameras from external system. Range of values: [1;
65535]. Default value is 8088.

The field displays information about the certificate and its key. The field is
Certificate and key
available if the HTTPS protocol is selected.

Select a trusted certificate that will be used to secure the connection. SecurOS
Select certificate
supports certificates in .pem format. The button is available if the HTTPS
(button)
protocol is selected.

www.issivs.com
SecurOS 275 Administration Guide
Video Subsystem

Parameter Description

Select the key file if it is stored separately from the certificate. The button is
Select key (button)
available if the HTTPS protocol is selected.

Certificate If the certificate is password protected, type the password in this field. The
password field is available if the HTTPS protocol is selected.

For more information about using ONVIF Server, please contact your regional Intelligent Security
Systems representative.

9.11.2 User Interface Objects

Media Client is the user interface object intended to work with Video Subsystem.

9.11.2.1 Media Client


In Linux OS the functionality is limited.

This object represents the operator GUI that allows to work with the system Cameras and Microphones.
Media Client provides the system with the ability to process each stream generated by a multi-streaming
camera in real-time (see Multi-streaming) and allows to assign a type of stream to display depending
on the camera cell size (see Figure 175 and Table 49).

When using the digital zoom feature in the Media Client, if it is possible, the stream with the better
quality is automatically switched to (for the multi-streaming cameras).

Media Client can operate in two modes: with selected Camera list or with all Cameras within the system.
By default the Media Client operates with all Cameras connected to the system, which are added to the
Camera list automatically when creating the Media Client object. When creating a new Camera object, it is
automatically added to the list (only when "working with all Cameras mode" is on).

Parent object— Desktop.

Parameter settings windows contains the following tabs:


· Display options Tab.
· Layouts Tab.
· Views Tab.
· Cameras Tab.
· Export and Archive Tab.
· Audio Tab.
· Advanced Tab.

www.issivs.com
SecurOS 276 Administration Guide
Video Subsystem

9.11.2.1.1 Display options Tab

Figure 174. Media Client object settings window. Display options Tab

Table 48. Media Client object settings. Display options Tab

Parameter Description

Working mode (select Media Client working mode)

www.issivs.com
SecurOS 277 Administration Guide
Video Subsystem

Parameter Description

Normal working mode. Availability of standard controls and


miscellaneous elements of the Media Client is defined by current
Normal settings. Camera cell controls and cell border are displayed.

This mode is specified by default.

Working only with live video or sound — operator can not switch
objects to the archive mode. In this mode all archive controls, that
Live only are normally available to the operator, are hidden (for example, the
Export panel, the Live/ Archive button in the Camera cell or in the
Microphone Panel, archive control commands of the context menu).

In this mode only alarmed cameras (i.e. where motion is detected)


are displayed.

In this mode a standard (Layout Bar, Camera Control Bar) and


additional (Device list, PTZ Control Panel etc.) Media Client's controls
are not available. Zoom and Export f rame buttons are available in the
Alarming
camera cell.

Camera is displayed in the Media Client working area only when


motion is detected in camera's Zone. When alarm ends, camera is
removed from working area in accordance with Time to display
Camera after alarm ends parameter (see below).

Working with active camera only in 1x1 layout. Standard Media


Active Client tools and Device list are hidden. Camera cell controls and cell
border are displayed.

In this mode, the standard Media Client's controls are not available to
the operator.

When turning this mode on, all additional Media Client controls (i.e.
Camera Panel, Layout Panel etc.), and also Camera cell controls and
Camera cell border, that are normally displayed, are hidden.

If this mode is applied to the existing Media Client object, then all
cameras are switched to the live video mode. Layout of the working
area and displayed video page are not changed.
View only
When view mode is on, Media Client is controlled only externally,
for example, with the help of Node.js Scripts. The following types
of commands are supported:

· layout switching;

· moving Camera to the specified cell;

· switching between live/archive modes;

· archive control commands.

Settings for alarm mode

Time to display Camera Specify time interval to display Camera on the Media Client after
after alarm ends alarm ends (in seconds).

www.issivs.com
SecurOS 278 Administration Guide
Video Subsystem

Parameter Description

Window position

Specify top-left coordinates (X, Y), relative to the top-left corner of


X, Y the computer's monitor. Possible values: [0; 70], in percent of
screen size.

Specify width and height (W, H) of the window. Possible values:


[30; 100], in percent of screen size.

Notes:
1. If the specified parameters result in (X+W)>100 or
(Y+H)>100 and the View mode option is disabled, then
W, H the system automatically reduces the specified values
down to (X+W)=100 or (Y+H)=100 respectively.
2. If the specified parameters result in (X+W)>100 or
(Y+H)>100 and the View mode option is enabled, then
the system displays Media Client window on several
physical monitors, considering their mutual alignment
(system setting).

Choose the number of the physical display this Media Client belongs
Display
to. Possible values: [1; 16]. Default value is 1.

Additional panels

Deselect checkbox to hide Device list for the given Media Client. By
Device list
default it is selected.

Select checkbox to enable Camera and Microphone grouping by name


if Camera's/ Microphone's Name contains ":" separator (-s). (see
Adding Camera to System). Separators can be used, for example, to
specify actual camera/microphone position within a segment of the
security network.

Example Camera's Name: Factory:Shop:Area:Camera1.

Up to 10 nesting levels for the device name are supported in the


Enable Cameras and
system.
Microphones grouping

Notes:
1. Groups (nested levels) are displayed in the Device list in
alphabetical order; Cameras/ Microphones are also sorted in
alphabetical order inside level.
2. Cameras/ Microphones that do not have a ":" separator in the
Name, do not belong to any level and are united under the
Ungrouped system group at the top of the list.

Deselect checkbox to hide the PTZ Control Panel. By default it is


PTZ Control
selected.

Camera controls

Deselect checkbox to forbid operator to control the recording mode.


Recording control
By default it is selected.

www.issivs.com
SecurOS 279 Administration Guide
Video Subsystem

Parameter Description

Deselect checkbox to forbid operator to control the alarm mode. By


Camera alarm mode control
default it is selected.

Deselect checkbox to forbid operator to use the digital zoom feature.


Digital Zoom
By default it is selected.

If this option is selected, then only one Camera can be in digital


zoom mode at the same time. When turning digital zoom mode on,
the system automatically switches camera to display the best quality
stream.
Single-cell zoom with
stream switching It is recommended to use this feature if cameras support multi-
streaming and are configured to be operated in such mode.

Option is enabled if Digital zoom parameter is selected and is the


default value.

If this option is selected, then several Cameras can be in digital zoom


Multi-cell zoom without mode at the same time. When turning digital zoom mode on, no
stream switching switching to the best quality stream occurs.

Option is available if the Digital zoom parameter is selected.

Deselect checkbox to disable PTZ control via mouse (see SecurOS


PTZ control via mouse
Quick User Guide). By default it is selected.

Deselect checkbox to forbid operator use of the frame export feature


Frame Export from the Media Client. By default it is selected. If this option is
selected, then a frame can be saved to the specified directory.

Tick this checkbox to place additional information on the saved


frame. This additional information will be displayed in the frame
Add footer footer in the following format:
<Frame date in OS format> <Frame time in OS format,
including milliseconds> | [< Camera ID>] <Camera Name>
Select this checkbox to allow operator to print frame from the Media
Frame Print
Client.

General settings

Select this checkbox to display the Media Client ID on the top panel
Show Media Client ID of the Media Client. By default is not selected. Parameter is available
in Normal and Live only modes.

Select checkbox to display Camera ID in the camera cell title. If


selected, Camera name in the cell title will be displayed in the
Show Camera ID
[<Camera ID>] <Camera Name> format. By default is not
selected.

Page dwell time when auto Video page dwell time in auto scrolling mode (in seconds).
scrolling

www.issivs.com
SecurOS 280 Administration Guide
Video Subsystem

9.11.2.1.2 Layouts Tab

Figure 175. Media Client object settings window. Layouts Tab

Table 49. Media Client object settings. Layouts Tab

Parameter Description

Number of cells to determine layouts

www.issivs.com
SecurOS 281 Administration Guide
Video Subsystem

Parameter Description

Warning! Parameters are displayed only when Alarming mode is selected.

Specify a Minimum and Maximum cells in the layout that can be


used for this mode. Only layouts that have predefined types
(see Layouts) and cells of which have the same size will be
automatically selected.

If maximal available number of cameras are displayed, then other


alarmed cameras are placed into the queue. Cameras from the queue
will be displayed in sequence, when an alarm ends in some
Minimum/ Maximum currently displayed camera. If alarm ends, camera is removed from
the queue.

Example. When working in the Alarming mode selected layouts are


changed automatically depending on number of alarmed cameras. For
example, the Minimum parameter is set to 4, and the
Maximum parameter — to 9. This means that the 2x2 and 3x3 layouts
can be used. If number of alarmed cameras is less or equal to 4, the 2x2
layout will be used, and if number of alarmed cameras is greater than 4,
then Media Client will automatically use the 3x3 layout. The 1x1 layout
is always available.

Layouts (to select/deactivate all layouts of the group select/deactivate appropriate checkbox on the
left of the group name)

Select checkbox of the appropriate standard layouts, which will be


enabled to the operator in the layout panel of the Media Client.
Standard layouts
Warning! 1*1 layout is mandatory. It is selected by default and cannot be
disabled.

Select checkbox of the appropriate wide layouts, which will be


Wide layouts
enabled to the operator in the layout panel of the Media Client.

Select checkbox of the appropriate User's custom layouts


User's Layouts (see Layout), which will be enabled to the operator in the layout
panel of the Media Client.

Display streams

Select appropriate checkbox to use the stream. Use the appropriate


slider to specify the size of the cell (in parts of Media Client's window
working area), where selected stream should be displayed. When
Low resolution, Base, High specifying cell size for several used streams, a stream/cell size
resolution relation will be represented in the tab (see Figure 175).
Warning! By default the Base stream, will be displayed in cells of size less
than 1/3 of the Media Client working area. The High resolution stream will
be displayed in cells of size 1/3 and greater.

For example, as it is illustrated in Figure 175, if all three camera streams are selected to be displayed,
then for the specified settings, the High resolution stream will be displayed in any cells whose size is
not less than 1/2 of the working area. The Low resolution stream will be displayed in any cells whose
size is not greater than 1/4 of the working area. At the same time, the Base stream will be displayed in
the cells of intermediate size.

www.issivs.com
SecurOS 282 Administration Guide
Video Subsystem

9.11.2.1.3 Views Tab

Figure 176. Media Client object settings window. Views Tab

www.issivs.com
SecurOS 283 Administration Guide
Video Subsystem

Table 50. Media Client object settings. Views Tab

Parameter Description

Select this checkbox to work with Views. By default is not selected.

Note. Listed below parameters are available only if this checkbox is


Work with Views selected.

Operations with Views are described in Working with Views


section.

Layouts panel Deselect checkbox to hide Layouts panel. By default it is selected.

Views list Deselect checkbox to hide Views list. By default it is selected.

Select checkbox to allow operator to edit shared Views. By default is


Enable shared Views setup
not selected.

Select checkbox to activate manual control mode of the Views list for
the given Media Client.

Use only selected shared If not selected, the Views list is populated automatically and contains
Views all Views created within system. By default is not selected.

Note. Listed below parameters are available only if this checkbox is


selected.

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Tree of the Security Zones within SecurOS network including all


children shared Views that are grouped by these Security Zones.

Object tree To add a View to the Media Client's Views list select appropriate
checkbox to the left of the View object.

Note. By default objects in the tree are sorted ascending by name and ID.

www.issivs.com
SecurOS 284 Administration Guide
Video Subsystem

9.11.2.1.4 Cameras Tab

Figure 177. Media Client object settings window. Cameras Tab

www.issivs.com
SecurOS 285 Administration Guide
Video Subsystem

Table 51. Media Client object settings. Cameras Tab

Parameter Description

Select this checkbox if it is necessary to limit live video FPS and


specify required value. If value is specified then algorithm described
in the Frame Rate Reduction will be used.

Notes:
Limit live video FPS 1. Specified value is applied to all Cameras selected to work
with the given Media Client.
2. If there are more than one Media Client created and
configured on one Desktop and each of them works with
the given Camera, then FPS of this Camera is equal to the
maximal value of the specified on all Media Clients.

Select this checkbox to enable live video buffering on each camera


that Media Client works with. Video buffering allows to eliminate
intermittent ("jagged") video. When the checkbox is enabled, the
own video frame buffer is activated for each Camera. The size of
such buffer (in ms) is defined in the settings of each Camera (see
General Tab).
Warning! When buffering mode is on:
Enable buffering 1. The video will be displayed with a delay, the minimum value
of which is equal to the specified buffer size.
2. The alarm and recording indicators will correspond to the real
time of the frame, i.e. will be out of sync with the displayed
frames.
3. In PTZ control mode, buffering will be disabled automatically
until PTZ control is released. Buffering mode will be turned on
automatically in 10 seconds after the last command is sent.
Video will be paused to fill the buffer.

Select checkbox to activate manual control mode of the Camera list


for the given Media Client.
Use only selected Cameras If not selected, the Camera list is populated automatically, cannot be
changed, and contains all Cameras connected to the system. By
default is not selected.

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Object Tree of the Computers having role Video Server existing within
the SecurOS network. When expanding the Video Server node all
Object tree Camera children objects are displayed.

To add a camera to the Media Client's Camera list select appropriate


checkbox to the left of the object.

www.issivs.com
SecurOS 286 Administration Guide
Video Subsystem

Parameter Description

Select the checkbox to visualize the events registered by the video


analytic detectors of the Tracking Kit III plugin (see Configuring
Built-in Video Analytics Detectors). Visualization of events is
possible when watching live video. For more information about
Visualize Computer Vision
events visualizing events on the Media Client, see the Representation of
video analytics detector operation results.

The checkbox is displayed if at least one Computer Vision object


exists in the Object Tree.

Show subtitles (select checkbox to display subtitles with specified parameters). If selected subtitles
will be displayed both in the Live and Archive mode. Subtitles are added externally, with the help
of the ADD_SUBTITLES command (see SecurOS Programming Guide).
Warning! If subtitle parameters are specified in the ADD_SUBTITLES command, the following values are
ignored.

Color Choose a subtitles color.

This parameter specifies minimal possible size of the subtitles font.


Range of values: [1; 50].

Actual font size is calculated automatically depending on the


Minimum font size current frame size and the Symbols per line parameter value.
Calculated font size Y will always obey Xmin ≤ Y ≤ 50, where
Xmin — specified parameter value. Calculated font size value is
changed proportionally to the frame size change.

This parameter specifies such minimal font size, which guaranteed


that specified above provide number of characters will be displayed
in one output line in the Camera cell without forced line breaking.
Range of values: [1; 200].

Number of characters in the line for the given frame size will be
kept constant until calculated font size value is greater than
specified Minimum font size. If calculated font size is less than
Symbols per line Minimum font size, then the size of the displayed characters will be
equal to Minimum font size. At the same time output line may
include less characters, than is specified by the Symbols per line
parameter.

If length of the subtitle text string exceeds frame horizontal size, it


wraps to the next line "by words".

For the details of how to control subtitles see SecurOS


Programming Guide, the Working with Subtitles section.

www.issivs.com
SecurOS 287 Administration Guide
Video Subsystem

9.11.2.1.5 Export and Archive Tab

Figure 178. Media Client object settings window. Export and Archive Tab

www.issivs.com
SecurOS 288 Administration Guide
Video Subsystem

Table 52. Media Client object settings. Export and Archive Tab

Parameter Description

Select this checkbox to allow transferring an archive from the Remote


System to the Monitoring Center (for details, see Transferring
Archive from Remote System to Monitoring Center).
Remote system’s archive
Note. The checkbox is displayed on the tab only if the Privileged access
transfer option to Remote systems checkbox is selected in the System object settings.

Warning! Option is available only in Normal and Active working


modes (see Working mode parameter description).

Select this checkbox to allow the operator to work both with Primary
and Long-term archive. If selected, then additional controls are
displayed in the Media Client's camera cell (see SecurOS Quick User
Access to Long-term archive Guide).
Warning! Option is available only in Normal and Active working
modes (see Working mode parameter description).

Select this checkbox to use Archive export prof iles when exporting
Use Archive export profiles archive with the help of the configured Media Client (for the details
see Export Using Archive Export Profile).

Use selected Archive Converters

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Tree of the Video Servers, Operator Workstations or Operator


Workstation Prof iles existing within the SecurOS network and having
the Archive Converters children objects. When expanding the node of
each object the list of Archive Converters children objects is displayed.

To choose an Archive Converter, which will be used by the given


Object tree Media Client, select the appropriate checkbox to the left of the
Archive Converter object (for the details see Export Using Archive
Export Profile).
Warning! Archive Converters created on the Video servers are available on
any Computer. Archive Converters created on the Operator Workstations or
Operator Workstation Prof iles are available only on these Computers.

Select this checkbox to add the Play the last N s/ min of record
command to the Camera cell context menu on the Media Client and
"Play the last N s/ min of specify the parameter value. To learn more about command usage
record" Command and playback features see SecurOS Quick User Guide.
Warning! Option is available only in Normal and Active working
modes (see Working mode parameter description).

www.issivs.com
SecurOS 289 Administration Guide
Video Subsystem

Warning! To perform export operations user access rights to the Archive export prof ile and Archive Converter
objects must be not less than (View), see User Rights. If operator has an access to the pointed objects, then
possibility of use these objects is being specified in this tab.

Export Using Archive Export Profile


When using Archive export prof ile:
· Export task is being created by Media Client;
· Export is being performed also by Media Client.

Export Using Archive Converter


When using Archive Converter:
· Export task is being created by Media Client;
· Export is being performed by Archive Converter.

www.issivs.com
SecurOS 290 Administration Guide
Video Subsystem

9.11.2.1.6 Audio Tab

Figure 179. Media Client object settings window. Audio Tab

www.issivs.com
SecurOS 291 Administration Guide
Video Subsystem

Table 53. Media Client object settings. Audio Tab

Parameter Description

Select the checkbox to allow listening to live and archived audio


when using this Media Client. This parameter affects the audio
playing from any Microphone.

Work with audio Notes:


1. This option does not affect the recording of the archive
audio.
2. Listed below parameters are available only if this checkbox
is selected.

Select checkbox to activate manual control mode of the Standalone


microphone list for the given Media Client.

Notes:
1. A Standalone microphone means one that is not associated
Use only selected with any Camera.
microphones 2. This option does not affect the operation with Microphones
associated to Cameras (see Audio Tab).

If not selected, the Standalone microphone list is populated


automatically, cannot be changed, and contains all standalone
Microphones of the SecurOS system.

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Object Tree of the standalone Microphones existing within the


SecurOS network. When expanding the Video Server node all
standalone Microphone children objects are displayed.
Microphone Tree
To add a standalone Microphone to the Media Client's Standalone
Microphone list, select the appropriate checkbox to the left of the
Microphone object.

www.issivs.com
SecurOS 292 Administration Guide
Video Subsystem

9.11.2.1.7 Advanced Tab

Figure 180. Media Client object settings window. Advanced Tab

www.issivs.com
SecurOS 293 Administration Guide
Video Subsystem

Table 54. Media Client object settings. Advanced Tab

Parameter Description

Select checkbox to use Direct3D for displaying video.

Note. If this checkbox is selected, operator will be able to adjust image


Hardware acceleration settings in the camera cell on the Media Client (see SecurOS Quick User
Guide).

If the checkbox is not selected, then software rendering is used.

This checkbox defines Media Client behavior when selecting Camera


in Device List with single/double click.

If not selected, single/double click on Camera in Device List results


in following:

· If selected Camera is present on current Layout this Camera


becomes active.

· If selected Camera is absent from current video page, Media


Client switches to the video page where required Camera is
present. Selected Camera becomes active. Layout keeps its size.

If selected, single click on the Camera in Device list places Cameras on


Place Camera on the current
current video page. It works according to the following rules:
layout/ view by single click
· If there is an active Camera on current Layout, it is replaced by
the one selected in Device list.

· If there is no active Camera on current Layout then each selected


Camera sequentially takes a cell starting from top left corner.

· In both cases Cameras that are present on the Layout stays on


their positions.

Double click works in the same way as when the option is not
selected.

Same rules are applied when working with Views.

Choose from the list an Emergency service object that will be used to
Send Ticket to Emergency
create and send Emergency ticket (see Emergency service and
Service
Interaction with External Emergency Service).

www.issivs.com
SecurOS 294 Administration Guide
Video Subsystem

Parameter Description

Select the checkbox to save the current user settings when Media
Client is restarted. User settings mean the current Media Client layout
and the order of the Cameras in it for each SecurOS operator or
Operator Workstation Prof ile.

If the Media Client is restarted when the checkbox is deselected:

· The last used layout is saved. If this layout is removed when


Media Client is restarted, 1x1 layout will be displayed.

· The last order of Cameras in the Media Client cells will be reset.
The default order (left to right and top to bottom in alphabetical
order) will be used.
Keep Camera positions after
restart If the Media Client is restarted when the checkbox is selected:

· The last used layout is saved. If this layout is removed when


Media Client is restarted, 1x1 layout will be displayed.

· The last order of the Cameras in the Layout cells will be saved.

· If the set of Layouts or Cameras is changed on the Media Client


restart, the restoration of the order of Cameras within the Layout
is not guaranteed.

Note. If the previously selected checkbox is deselected while the Media


Client is operating, all saved user settings will be reset.

Hide Macros in Camera Select this checkbox to prevent Macros from being displayed in the
menu context menu of the Cameras of given Media Client.

9.11.2.1.8 About Views


View is an object, that allows to group Cameras and Microphones and place them in Media Client as
required.
Figure 181 illustrates an example of View.

www.issivs.com
SecurOS 295 Administration Guide
Video Subsystem

Figure 181. Example of View

All Views, exclude View, name of which is All devices, are single-page, i.e. Cameras of these Views can
not be listed. The All devices multi-page View always exists and includes all available Cameras and
Microphones.
The following objects are shown on Figure 181:
· Layout bar — (is collapsed in Figure 181) contains all Layouts that can be used when working with
Views;
· Views quick access bar, where you can drag-and-drop frequently used Views. An active View is
highlighted on this bar in light-blue;
· Views Panel — contains Views List and View search field;
· Views List contains all available Views. An active View is highlighted in this list in light-blue frame.

Using the settings of the Views tab administrator can hide Views List, Layout bar and also select a Views,
that you can work with in the Media Client.

Note. If Views List is hidden, then Views are displayed in the Views quick access bar.

For the details of how to switch Views, work with Views quick access bar, temporarily change Views, refer
to the SecurOS Quick User Guide.
9.11.2.1.9 Working with Views
To get a possibility to create, edit and remove Views, tick the Enable shared Views setup checkbox in
the Views tab of the Media Client.
To open the Views Editor edit mode click on the button in upper left corner of the Media Client
(see Figure 182) and select the Enter Views Setup command.

www.issivs.com
SecurOS 296 Administration Guide
Video Subsystem

Figure 182. Switching to Views Editor

You can perform the following operations in the Views Editor:


· Creating View.
· Editing View.
· Renaming View.
· Deleting View.

These operations are performed with the help of buttons, located in the View Edit Bar (see Figure 183).

Figure 183. Views Editor

Note, that Device List is located under the Views List in the Views Editor. Views, that don't contain
devices, are presented in gray background in the Views List, for example, View 5 (see Figure 183).

www.issivs.com
SecurOS 297 Administration Guide
Video Subsystem

To close the Views Editor click on the button in upper left corner of the Media Client (see Figure 184)
and select the Exit Views Setup command.
9.11.2.1.9.1 Creating View

Note. This section provides information on creating a View with a Cameras. You can create a View, containing
Microphones, in the same way.

To create a View in View Editor do the following:

1. Click on the (Create new) button on the View Edit Bar. System will display the View creation
window (see figure 184).

Figure 184. View create window

2. Type new name of a View in the View name field and click on the OK button.
3. The 2x2 Layout is selected by default for the Media Client Working Area. To change layout choose
another one in the Layout bar.
4. To add a Camera choose it in the Device List and drag-and-drop it to the required cell of the Media
Client.
5. To delete a Camera choose it in the Media Client's cell and drag-and-drop it to the Device List.
6. To change Camera's position choose it and drag-and-drop it to the required cell of the Layout.

7. To save changes click on the (Save) button on the View Edit Bar. To discard changes click on

the (Discard current changes) button on the View Edit Bar.

Note. To mark Views with unsaved changes, an Italic font is used in the Views List.

9.11.2.1.9.2 Editing View

When editing a View, you can add or delete Cameras and/or Microphones, change Camera's and/or
Microphones position in the Media Client's cells, change Layout of the Media Client Working Area. How to
do this see Creating View section.

To save View with the same name, click on the (Save) button, with a new name — the
(Save as) button.

www.issivs.com
SecurOS 298 Administration Guide
Video Subsystem

Notes:
1. When saving View it's changes are applied for all Media Clients, that use this View.
2. View, that contains devices, access for which is denied (View that marked with an icon in the
Views List), can not be saved with previous name. If View is saved with a new name, then Media
Client's cells, that correspond to such devices, are empty.

9.11.2.1.9.3 Renaming View

To rename a View in View Editor do the following:


1. Choose required View in the Views List.

2. Click on the (Rename) button on the View Edit Bar. System will display the View renaming
window (see figure 185).

Figure 185. Renaming window

3. Type new name of a View in the View name field and click on the OK button.

Additional Information
View can also be renamed in SecurOS Object tree (see Working with Objects).

Note. View, that contains devices, access for which is denied (View that marked with an icon in the Views
List), can not be renamed.

9.11.2.1.9.4 Deleting View

To delete a View in View Editor do the following:


1. Choose required View in the Views List.

2. Click on the (Remove) button on the View Edit Bar.

Additional Information
View can also be deleted in SecurOS Object tree (see Working with Objects).

Note. View, that contains devices, access for which is denied (View that marked with an icon in the Views
List), can not be deleted.

www.issivs.com
SecurOS 299 Administration Guide
Video Subsystem

9.12 Configuration Examples

This section includes examples of how to setup typical configurations.

9.12.1 Standalone Configuration

Original objective: one computer and two cameras connected to local area network. Computer should
be used not only to capture and record video, but to monitor cameras also.

Figure 186. Object tree for standalone configuration

Solution: (see figure 186):


Go to administration mode (see SecurOS Administration Overview) and to the following:
1. Open Computer object settings window (see Editing Object Settings). In Archive section set Read
and Write value for Video paramter at least for one directory (for example drive C:\).
2. Go to Computer → Devices (Cameras & Microphones) branch in the object tree and create Video Capture
Device object.
Enter values for following parameters of the objects:
· Type: camera vendor;
· Model: model of the camera of selected vendor. In some cases parameter stands for the
communication protocol between server and camera;
· Protocol: version of communication protocol between server and camera. For some models this
parameter may not be available;
· IP address: address of the camera in the TCP/IP network;
· User and Password: login and password of the user that has an access to camera's video stream (can
be set in the camera's web interface).
3. Create the Camera object (child object of the Video Capture Device object).
4. Create second Video Capture Device and configure it the same way.
5. Create the Camera object (child object of the second Video Capture Device object).
6. Go to Computer → Desktops branch in the object tree and create Desktop object.
7. Create Media Client object child to recently created Desktop object.

www.issivs.com
SecurOS 300 Administration Guide
Video Subsystem

8. Exit administration mode.

Now you will see a full-screen Media Client with live video from two cameras.

9.12.2 Video Server and Operator Workstations

Original objective: video server and two cameras connected to local area network. Monitoring can be
performed from one or more Operator Workstations. For them the Operator Workstation Prof ile user
interface will be created (see Operator Workstation Profiles), that can be used on all computers.

Figure 187. Object tree for server-workstation configuration

Solution: (see figure 187):


Go to administration mode (see SecurOS Administration Overview) and to the following:
1. Find Computer object that corresponds to video server and open its settings window (see Editing
Object Settings). In Archive section set Read and Write value for Video paramter at least for one
directory (for example drive C:\).
2. Go to Computer → Devices (Cameras & Microphones) branch in the object tree and create Video Capture
Device object.
Enter values for following parameters of the objects:
· Type: camera vendor;
· Model: model of the camera of selected vendor. In some cases parameter stands for the
communication protocol between server and camera;
· Protocol: version of communication protocol between server and camera. For some models this
parameter may not be available;
· IP address: address of the camera in the TCP/IP network;
· User and Password: login and password of the user that has an access to camera's video stream (can
be set in the camera's web interface).

www.issivs.com
SecurOS 301 Administration Guide
Video Subsystem

3. Create the Camera object (child object of the Video Capture Device object).
4. Create second Video Capture Device and configure it the same way.
5. Create the Camera object (child object of the second Video Capture Device object).
6. Create Computer object with Operator Workstation role, which ID and Name corresponds to its
destination.
7. Tick the Use as Operator Workstation Profile checkbox in the created Computer object settings.
8. Create Desktop child object in the Desktops group of objects.
9. Create Media Client object child to recently created Desktop object.
10.Launch SecurOS operator interface on the computer, that will be used as Operator Workstation.
Specify IP address or DNS/WINS name of the Video Server.

Operator interface containing Operator Workspace that corresponds created profile, will be loaded. When
client has started, you will see on its display a full-screen Media Client with live video from two server-
side cameras.

9.12.3 Setting Up Camera

Setting up a camera includes the following operations:

1. Adding Video Capture Device.


2. Adding Camera to System.
3. Selecting Camera to Work with Media Client.
4. Adding User Rights.
5. Setting up PTZ Control.

9.12.3.1 Adding Video Capture Device


To add a Video Capture Device do the following:

1. Enter the Administration Mode.


2. In the Object Tree select the Computer object to which the added device will be connected.
3. Create child Video Capture Device object in the Devices (Cameras & Microphones) group.
4. In the Parameters of created object window set the required values.
5. In the object properties window (see Figure 188) set the required values.

www.issivs.com
SecurOS 302 Administration Guide
Video Subsystem

Figure 188. The Video Capture Device object properties window

6. Apply new settings.

9.12.3.2 Adding Camera to System


To add a Camera do the following:

1. Enter the Administration Mode.


2. In the Object Tree select the created Video Capture Device object.
3. Create a Camera child object.
4. In the Parameters of created object window set the required values.

Note. Use the ":" separators in object's Name, with purpose to determine the Camera nesting level in the Device
list (for example, Factory:Workshop:Region:Camera1). To display groups specified in this way
Enable Cameras and Microphones grouping parameter must be selected (see Display options Tab).

5. In the object properties window (see figure189) set the required values.

Note. At this step it is possible to set the PTZ-control. The configuration sequence is described in the Setting
up Telemetry section. This step can also be done later.

www.issivs.com
SecurOS 303 Administration Guide
Video Subsystem

Figure 189. The Camera object properties window

6. Apply new settings.

9.12.3.3 Selecting Camera to Work with Media Client


By default, video streams from all cameras connected to the system will be displayed on each newly
created Media Client.

To display video streams only from required Cameras on the Media Client do the following:
1. Enter the Administration Mode.
2. In the Object Tree select the Media Client on which it is necessary to configure the Camera list
(Security Zone ® Servers & Workstationsgroup ®
Computer ®
Desktops group Desktop ® ®
Media Client).
3. Enter Media Client object parameter settings mode. In the Cameras tab (see Figure 190) do the
following:

www.issivs.com
SecurOS 304 Administration Guide
Video Subsystem

Figure 190. Select Cameras to work with Media Client

· select the Use only selected Cameras checkbox.


· in the Object tree select checkboxes on the left of that Cameras, image from which must be displayed
on the Media Client.
4. Apply new settings.

9.12.3.4 Adding User Rights


For the users created by the system by default, the rights to child objects are inherited from the parent
objects. In case it is not enough rights inherited by default to control a recently created object, such
rights can be assigned manually. For adding user rights to control a recently created object, do the
following:

www.issivs.com
SecurOS 305 Administration Guide
Video Subsystem

1. Enter the Administration Mode.


2. In the SecurOS Object Tree select a User Rights object where user or user group, to which a right to
control created Camera must be granted, is defined.
3. In the User Rights settings window (see figure 191) select the Camera object you need, and set the
required access level (using the icon on the left side of the object name).

Figure 191. The User Rights object properties window

www.issivs.com
SecurOS 306 Administration Guide
Video Subsystem

Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.

4. PTZ control with automatic release is available by default. To permit the user to hold PTZ control for
unlimited time, tick the Allow to hold PTZ control checkbox (for more details about PTZ control
modes see Exclusive PTZ Control).
5. If it is necessary to restrict the order of user access to PTZ control (see Shared PTZ Control and
Exclusive PTZ Control) specify required value in the PTZ Control Priority field.

Note. Specified priority value is applied to all Cameras that can be controlled by the given user.

6. Apply new settings.

9.12.3.5 Setting up telemetry


PTZ control is configured in the Common and PTZ tabs of the Camera object settings.

After PTZ device configuration, at the activation of a cell of any camera placed on the Media Client, the
PTZ button will be displayed.

When controlled camera is activated, then the PTZ Control Panel will be activated on the Media Client.

9.12.3.5.1 Setting up PTZ Control for IP devices


To configure PTZ control for IP devices follow the next steps:

1. Enter the Administration Mode.


2. In the SecurOS Object Tree select the Camera object (see Setting Up Camera section) for which it is
necessary to configure PTZ control.
3. In the General tab, (see fig. 192) from the Pan/ tilt/ zoom drop-down menu select the Use option.

Figure 192. General tab of Camera object settings window

4. In the PTZ tab (see Figure 193) configure the corresponding parameters.

www.issivs.com
SecurOS 307 Administration Guide
Video Subsystem

Figure 193. PTZ tab of Camera object settings window

5. Select the PTZ control mode:


· Shared PTZ control — to activate this mode use default value (the Disable shared PTZ control
checkbox is not selected). Read more about shared PTZ control mode in the Shared PTZ Control;
· Exclusive PTZ control — select the Disable shared PTZ control to activate this mode. Read
more about exclusive PTZ control mode in the Exclusive PTZ Control.
6. If the Exclusive PTZ control mode is selected specify PTZ control priority for each system user
(see User Rights).
7. To activate for operator a possibility to hold PTZ control for a long time, tick the Allow to hold PTZ
control checkbox in the User Rights object settings.
8. To display PTZ Control Panel on the Media Client select the PTZ Control checkbox in the Display
options tab of the Media Client object settings window.
9. To display the PTZ button in the Camera cell select the PTZ control via mouse checkbox in the
Display options tab of the Media Client object settings window.
10.Apply new settings.

www.issivs.com
SecurOS 308 Administration Guide
Video Subsystem

9.12.3.5.1.1 Shared PTZ Control

In the shared PTZ control mode, all incoming commands are executed. The commands are executed in
order they were sent by the operators. Each new command starts executing immediately after it is
received. For example, the first operator started patrolling, and the second, after a short period of time,
began to rotate the camera with the joystick. In this case, the patrol will be interrupted, the camera will
turn.

When working in shared PTZ control mode, then:


· priority of the command sender is not analyzed;
· PTZ control is not blocked;
· commands initiated by Macros or Node.js Scripts are executed in common turn.

9.12.3.5.1.2 Exclusive PTZ Control

Warning! Exclusive PTZ control mode is available only for cameras equipped with built-in PTZ device.

When working in exclusive PTZ control mode, there are two options of the operator work:
1. Capture of PTZ control with automatic control release.
2. Capture of PTZ control for a long time with release by operator's command (long-term PTZ hold).

Capture of PTZ control with automatic release mode is available by default. Option to capture and long-
term PTZ hold is configured by system administrator additionally (see User Rights, the Allow to hold
PTZ control parameter). If this option is adjusted, then operator will be able to choose one of two way
of work.

For each PTZ control options:


· system analyses priority of the command sender;
· if PTZ control is captured by user, then access to PTZ control is locked for all user with the same or
lower PTZ control priority;
· commands initiated by Macros or Node.js Scripts are executed depending on their priority.

Capture of PTZ control with automatic control release


In this PTZ control mode system works in the following way:
1. Operator sends a PTZ control command.
2. System transfers PTZ control to this operator and analyses all other incoming commands. At the
same time:
· if command was sent by user, whose PTZ control priority is equal to PTZ control priority of the
current user or lower, then command is ignored.
· if command was sent by user, whose PTZ control priority is higher than PTZ control priority of the
current operator, then execution of current command is terminated, and new command is started.
3. After command execution is finished, system awaits new command from the same operator during 5
seconds.
4. If such a command was not sent, then system automatically releases PTZ control for any operator
within network.

www.issivs.com
SecurOS 309 Administration Guide
Video Subsystem

Capture of PTZ control for a long time with release by operator's command (long-term PTZ
hold)
In this PTZ control mode system works in the following way:

Note. If possibility to long-term PTZ hold is configured by system administrator, then additional controls are
displayed in the camera cell (see SecurOS Quick User Guide).

1. Operator turns on long-term PTZ hold mode and sends a PTZ control command.
2. System transfers PTZ control to that operator for unlimited period of time and analyses all other
incoming commands. At the same time:
· if command was sent by user, whose PTZ control priority is equal to PTZ control priority of the
current user or lower, then command is ignored.
· if command was sent by user, whose PTZ control priority is higher than PTZ control priority of the
current operator, then PTZ control is transferred to this user. In this case system can operate in one
of two ways:
- command was sent in "capture control with automatic release" mode (long-term PTZ hold mode
is not turned on) — after executing the command, the system expects a new command from the
same operator within 5 seconds. If such a command was not sent, then system automatically
releases PTZ control for any operator within network.
- command was sent after long-term PTZ hold mode was turned on — see paragraph 2. When
work is finished, PTZ control is released by operator in manual mode or can be released by
operator, that has a higher PTZ control priority. The superuser (see SecurOS Users) can release
blocking of any other user, including his own blocking on the different Computer.

At the same time, the own priority can be assigned to the PTZ control commands sent by Macros and
Node.js Scripts (priority parameter, see SecurOS Programming Guide). If this priority value is higher
than priority of the User that captured PTZ control, then PTZ will be controlled by the command sent
from Macro or Node.js Script.

When working in the exclusive control mode, the PTZ control panel of the Media Client and PTZ control
button in the Camera cell are disabled for all users except for the user who captured the control and
users with higher priority (refer to SecurOS Quick User Guide for the details).

9.12.4 Joystick Configuration

To use a joystick for control PTZ Cameras with the help of the Media Client (see SecurOS Quick User
Guide) it is necessary to install and configure it first.

To install and configure a joystick do the following:


1. Connect the joystick to an operator workstation. The device will be detected automatically or drivers
should be installed.
2. Find the installed joystick in the devices list (Control Panel ® Game Controllers) and write down
its name exactly as in the list (for example, Joystick_Name).
3. Locate the joystick configuration file called default.xml in the \Joy_config subfolder of the
SecurOS root directory. Save this file as the Joystick_Name.xml file, into the same subfolder (or
alternatively make a copy of the default.xml file and rename it accordingly).
4. Click the Properties button in the game controllers list, then the Calibration tab in the appeared
window. Calibrate installed joystick buttons and controls.

www.issivs.com
SecurOS 310 Administration Guide
Video Subsystem

Warning! The calibration procedure is absolutely necessary, otherwise the joystick will not function in
SecurOS!

www.issivs.com
SecurOS 311 Administration Guide
Audio Subsystem

10 Audio Subsystem
The audio subsystem is used to operate and configure the audio devices (audio capture cards,
microphones) within the SecurOS security network, transmit audio streams between servers and
workstations and also work with live and archived audio from within workstations.

10.1 Operation Modes


Working with an audio stream can be carried out in one of the following modes:
1. Synchronized Audio/ Video Recording and Playback;
2. Separate Audio Recording and Playback.

Possibilities to use system objects to record and playback audio streams are different for each mode and
depend on their settings. Features of each mode are described in detail below.

10.1.1 Synchronized Audio/Video Recording and Playback

In this mode, the video stream is recorded synchronously with the audio stream, which allows to
analyze not only video, but also audio information when playing back records.

Synchronized audio/video recording is performed by using the microphone associated with the
camera. If the Camera uses the Built-in microphone, no additional objects are required to be created.
If the Camera uses an external Microphone, it must be created in the Object Tree (see Microphone). You
can specify the built-in or external microphone in the Camera object settings (see Camera).

Synchronized audio/video recording and playback is performed by using controls of the Media Client's
cell (see Media Client), that displays live video from Camera, with which the appropriate Microphone is
associated.

Warning! A Microphone linked to a Camera can never be used separately from the Camera to record arbitrary
audio.

For the detailed description of the system configuration operations required to provide synchronized
audio recording mode see Example of System Configuration for Synchronized Audio/ Video
Recording and Playback section.

10.1.2 Separate Audio Recording and Playback

Separate recording of the arbitrary audio stream is done with the help of Microphone, that is not linked
to the Camera object.

To control separate recording and playback mode the Media Client system object is typically used.

www.issivs.com
SecurOS 312 Administration Guide
Audio Subsystem

10.2 Object Reference


The audio subsystem involves the following classes of objects:
· Audio Capture Device.
· Microphone.

10.2.1 Audio Capture Device

The object is designed to configure and initialize within SecurOS network the following typical audio
sources:
· IP-devices;
· physical audio capture devices installed on the computer, including the following:
- sound cards;
- microphones connected to the computer's audio inputs.

Parent object — Computer\Devices (Cameras & Microphones) group.

Figure 194. Audio Capture Device object settings window

Note. The appearance of this window depends on device's Type and Model.

www.issivs.com
SecurOS 313 Administration Guide
Audio Subsystem

Table 55. Audio Capture Device object settings

Parameter Description

General

Type Select audio source type. Mandatory parameter.

Select audio source model. Mandatory parameter.


Model Warning! If SecurOS supports only one model of the device for the selected
Type, then parameter is disabled.

Select protocol to work with audio source.


Protocol Warning! If device of the selected Model supports only one protocol, then
parameter is disabled.

Select audio source frequency (Hz). Mandatory parameter.

Note. The higher the samplerate the better the audio record quality, but
Samplerate more disk space will be required.

Warning! This field can be changed only when SoundBlaster device Type is
selected.

Additional

IP address IP address of the device.

User name to access IP device. Value is set with the help of device's
Login
configuration interfaces (see original device' User Manual).

User password to access IP device. Value is set with the help of


Password
device's configuration interfaces (see original device' User Manual).

This parameter allows specify the type of connection with the device.

To use secure connection do the following:

· tick this checkbox;

Use secure connection · use device's web-interface to select HTTPS for user and to select
(HTTPS) trusted certificate of encryption in own device's settings.
Warning! If at least one of the listed conditions is not met, then secure network
connection with device will not be established.

Note. The ability to use secure connection depends on device's Type and
Model.

Set the number of PCI channel to connect audio and video capture
devices. Mandatory parameter. Range of values: [1; 64]. Parameter
value is unique for each Audio Capture Device child to Computer system
object. Default value — min from range of available, excluding already
PCI channel assigned values to other Audio Capture Devices.

Note. In case of some microphones are connected to the audio card only
one of them can be used.

www.issivs.com
SecurOS 314 Administration Guide
Audio Subsystem

10.2.2 Microphone

This object represents a single mono channel to connect a microphone.

Parent object— Audio Capture Device.

Figure 195. Microphone object settings window

Table 56. Microphone object settings

Parameter Description

Select a channel from the list of available channels of the parent


Channel
Audio Capture Device object.

Information field: Read-only indicator of current volume level. Used


Level
to test microphone on-the-fly.

Move the slider to change the signal gain level (from -12 dB up to
Gain 12 dB). Increase gain if your audio source is weak. Use Level
indicator above to visually control volume level.

If Microphone linked to the Camera (see Audio Tab) the Name and
Linked to Camera ID of the corresponding Camera are displayed in this field.
Otherwise (free Microphone) no is displayed in this field.

Voice Operated Control (feature of automatic sound recording upon reaching threshold volume).

Note. This set of parameters is valid only for separate audio recording mode (see Separate Audio
Recording and Playing Back section).

Warning! In order to trigger Voice Operated Control, Microphone must be armed using Macro or Node.js
Script, or must be set to recording mode with the help of Media Client.

Move slider to specify threshold level (from -60 to 0 dB). When


volume reaches this level, automatic sound recording starts. Use
Bound
Level indicator above to visually estimate current volume level. If
set to Off, Voice Operated Control feature is disabled.

www.issivs.com
SecurOS 315 Administration Guide
Audio Subsystem

Parameter Description

Specify the pot-recording time (sec) in case recording is activated


Delay
through the Voice Operated Control mode.

10.3 Example of System Configuration for Synchronized Audio/Video


Recording and Playback
To configure synchronized Audio/Video Recording and Playback Mode do the following:
If the built-in microphone will be used
1. To use a built-in microphone, select the Built-in value in the Microphone parameter drop-down
list of the Camera object settings (see Camera). After that it will be possible to watch the live video
with audio. Audio/video will also be recorded synchronously.
2. Choose the Desktops group of the corresponding Computer object and create a Desktop child object.
3. For the created Desktop create a Media Client child object where place the Camera with Built-in
Microphone.

If the external microphone will be used

Figure 196. Object Tree for Workstation Configured for Synchronized Audio/ Video Recording

1. In the Object tree (see Figure 196) choose the Computer object which represents the physical computer
with the installed or connected appropriate hardware, then create a Audio Capture Device child object

www.issivs.com
SecurOS 316 Administration Guide
Audio Subsystem

in the Devices (Cameras & Microphones) group (see Audio Capture Device). Set up its specific
parameters depending on device type.
2. For the created Audio Capture Device create a Microphone child object (see Microphone). Default
parameter values are normally sufficient for audio recording.
3. To link a created microphone to a certain camera, select appropriate microphone in the Camera
object's Microphone parameter drop-down list (see Camera). After that it will be possible to watch
the live video with audio. Audio/video will also be recorded synchronously.
4. Choose the Desktops group of the corresponding Computer object and create a Desktop child object.
5. For the created Desktop create a Media Client child object where place the Camera with linked
Microphone.

www.issivs.com
SecurOS 317 Administration Guide
I/O Subsystem

11 I/O Subsystem
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

The I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays)
within the SecurOS network.

Note. Universal I/O devices are connected to supported IP devices.

11.1 Object Reference


The I/O subsystem includes the following objects:
· Sensor.
· Relay.
· CCTV Keyboard or joystick.

11.1.1 Sensor

This object represents a physical sensor device or a daisy chain of sensors (security loop).

When Sensor is triggered, this event is added to the Event Viewer, from which one can jump to the Media
Client to view corresponding video. If Sensor linked with several Cameras, all these Cameras will be
displayed on the Media Client. This functionality allows you to synchronously view video,
corresponding to the moment the sensor is triggered, from various monitored zones.

Parent object — Video Capture Device.

www.issivs.com
SecurOS 318 Administration Guide
I/O Subsystem

Figure 197. Sensor object settings window

Table 57. Sensor object settings

Parameter Description

Channel Select channel number the sensor is connected to.

Select the type of alarm condition. Possible values:

· Alarm when switch on — check this option to trigger alarm


Alarm condition state when contacts are short circuited;

· Alarm when switch off — check this option to trigger


alarm state when contacts are open.

Select the most appropriate sensor type (this only changes device's
Hardware
icon on Map, not its behavior).

The object is in scope of Camera(s):

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Object Tree of the Computers having role Video Server existing within
the SecurOS network. When expanding the Video Server node all
Object tree Camera children objects are displayed.

Tick the checkboxes for the Cameras that you want to watch video
from when the Sensor is triggered.

www.issivs.com
SecurOS 319 Administration Guide
I/O Subsystem

11.1.2 Relay

This object represents an electrically operated switch (e. g. relay) that controls some device.

Parent object — Video Capture Device.

Figure 198. Relay object settings window

Table 58. Relay object settings

Parameter Description

Relay number Select the channel number the relay is connected to.

Select the most appropriate device type controlled by this relay (this
Hardware parameter changes device's icon on map). Possible values: Lock,
Woofer, Light, Wiper.

External device

Select the protocol to connect to the control device (the parameter is


Protocol
used to control a Wiper).

Select the channel to connect to the control device (the parameter is


Channel
used to control a Wiper).

11.1.3 CCTV Keyboard or joystick

CCTV keyboards are designed to control user interface objects (for example, Media Client), cameras and
their modes, to execute operations with layouts, record operations, etc.

Note. When working with the keyboard, user rights to control cameras are taken into account in the same way
as when working with the Media Client (see User Rights).

SecurOS supports the following types of keyboards:


· Keyboards that must be configured by CCTV Keyboard or joystick object;
· Plug and Play keyboards that do not require any additional configuration.

Parent object — Computer.

www.issivs.com
SecurOS 320 Administration Guide
I/O Subsystem

Within the object settings the following keyboards can be configured:


· Bosch Intuikey;
· Hikvision DS-1100KI;
· Hikvision DS-1600KI(B);
· Panasonic WV-CU950;
· Pelco KBD300A.

The following keyboards do not require any configuration:


· AXIS T8311;
· Bosch KBD-Universal-XF;
· Hanwha SPC-7000.

Note. See SecurOS Quick User Guide to learn how to operate keyboards described above.

Device type is selected in the object settings window.

Warning! Please view DevicesIntegrationList for additionally supported USB joysticks.

11.1.3.1 Bosch Intuikey

Warning! The PL-2303 chipset of the COM port must be supported by used operation system to use the
keyboard properly. It can be checked on the manufacturer
http://www.prolific.com.tw/US/ShowProduct.aspx?p_id=225&pcid=41 web page.

www.issivs.com
SecurOS 321 Administration Guide
I/O Subsystem

Figure 199. Bosch Intuikey object settings window

Warning! Code page that is used when transferring text data from SecurOS to the keyboard, is specified by
® ®
Format parameter (Control panel Clock, Language and Region Region and Language ®
Format).

www.issivs.com
SecurOS 322 Administration Guide
I/O Subsystem

Table 59. Bosch Intuikey object settings

Parameter Description

Serial port Serial port to connect device.

Is used to check if device is available when specified COM port is


Test (button)
used for connection (see Checking Keyboard Connection).

Programmable buttons and assigned actions. List is populated with


SecurOS commands that are supported by the device.
Main Menu
Note. The Other commands is used for all other commands that are not
specified in the Main Menu.

Invert camera's tilt Select this checkbox to invert vertical camera movement when
(up/ down) movement moving joystick's shaft up and down.
direction

Checking Keyboard Connection

To check keyboard connection do the following:


1. Select appropriate Serial port, click the Test button. System will display the Check the keyboard
connection window (see figure 200).

Figure 200. Check the keyboard connection window

2. Perform operations (step by step), listed in the window. Click the Next button.
3. Follow the instructions displayed in the window.

www.issivs.com
SecurOS 323 Administration Guide
I/O Subsystem

Figure 201. Device settings window. Media Clients tab

Media Clients tab is used to create a list of Media Clients, that can be controlled with the configured
device.

Note. At the moment only one Media Client can be controlled with the CCTV Keyboard or joystick.

Table 60. Media Clients tab

Parameter Description

List of all Media Clients that are children of the same Computer, as an
Available Media Clients object is being configured. To define Media Client that can be
controlled, select required one and click the > button.

List of the Media Clients that can be controlled with the given CCTV
Selected Media Clients
Keyboard or joystick object.

www.issivs.com
SecurOS 324 Administration Guide
I/O Subsystem

Parameter Description

Media Client, which will be selected for control with the CCTV
Keyboard by default after SecurOS startup. Possible values: any
Media Client from the list of Selected Media Clients.
Default active Media
Clients Note. In order to change controlled Media Client when working with the
system use the device interface to enter it's ID or select Media Client's
name from the list (see User Manual for the appropriate CCTV keyboard).

11.1.3.2 Hikvision DS-1100KI

Figure 202. Hikvision DS-1100KI object settings window

Table 61. Hikvision DS-1100KI object settings

Parameter Description

IP address IP address of the device.

Port Network port that is used to communicate with the keyboard.

www.issivs.com
SecurOS 325 Administration Guide
I/O Subsystem

Parameter Description

Invert camera's tilt Select this checkbox to invert vertical camera movement when
(up/ down) movement moving joystick's shaft up and down.
direction

Media Clients tab and its actions are described in the Bosch IntuiKey section.

11.1.3.3 Hikvision DS-1600KI(B)

Figure 203. Hikvision DS-1600KI(B) object settings window

Table 62. Hikvision DS-1600KI(B) object settings

Parameter Description

IP address to connect to the device.


IP address
Note. It is necessary to consider the network routing settings.

Port Network port that is used to communicate with the keyboard.

www.issivs.com
SecurOS 326 Administration Guide
I/O Subsystem

Parameter Description

Invert camera's tilt Select this checkbox to invert vertical camera movement when
(up/ down) movement moving joystick's shaft up and down.
direction

Media Clients tab and its actions are described in the Bosch IntuiKey section.

11.1.3.4 Panasonic WV-CU950

Figure 204. Panasonic WV-CU950 object settings window

Table 63. Panasonic WV-CU950 object settings

Parameter Description

IP address IP address of the device.

Programmable buttons and assigned actions. List is populated with


Functional buttons
SecurOS commands that are supported by the device.

www.issivs.com
SecurOS 327 Administration Guide
I/O Subsystem

Parameter Description

Joystick's programmable buttons and assigned actions. List is


Joystick buttons populated with SecurOS commands that are supported by the
device.

Invert camera's tilt Select this checkbox to invert vertical camera movement when
(up/ down) movement moving joystick's shaft up and down.
direction

Media Clients tab and its actions are described in the Bosch IntuiKey section.

11.1.3.5 Pelco KBD300A

Figure 205. Pelco KBD300A object settings window

www.issivs.com
SecurOS 328 Administration Guide
I/O Subsystem

Table 64. KBD300A object settings

Parameter Description

Serial port Serial port to connect device.

Press to check if device is available when connecting using the


Test
specified port number.

Programmable buttons and assigned actions. List is populated with


Button programming
SecurOS commands that are supported by the device.

Invert camera's tilt Select this checkbox to invert vertical camera movement when
(up/ down) movement moving joystick's shaft up and down.
direction

Media Clients tab and its actions are described in the Bosch IntuiKey section.

11.2 Configuring System to Work with Wiper


The wiper is an optional component of the PTZ device designed to be mounted on the video camera
and used to clean the lens remotely.

The ability to support wiper and wiper configuration parameters are normally specified in the camera
specification.

Wiper configuration and control are performed with the help of the following SecurOS objects:
· Relay — is used to configure Wiper control parameters. Not required for cameras with built-in
wiper;
· Camera — object settings define the Relay object, that is used to control the Wiper for the given
camera.

To configure the Wiper for a just installed camera, do the following:


1. In the SecurOS object tree create the Video capture device object with child Camera object
appropriate to the camera mounted;
2. Create Relay child object for the created Video capture device;
3. In the Relay object settings window select the appropriate Hardware (Wiper). Define its Protocol
and Channel control parameters if necessary;
4. In the created Camera object settings jump to the General tab and select the created Relay object or
the Built-in value in the Wiper drop-down list;
5. If Media Client works with the list of cameras add created Camera to the Use only selected Cameras
list. To display Wiper control option ( ) in the Camera cell in the Media Client operator must have
not less than Control access level for this camera.

www.issivs.com
SecurOS 329 Administration Guide
Notification Subsystem

12 Notification Subsystem
The notification subsystem allows to inform personnel of events within the security network by the
means of e-mail, voice phone calls, SMS messaging and audible notifications. Notifications for object
events can be configured using Macros or Node.js Scripts (see SecurOS Programming Guide).

12.1 Object Reference


The notification subsystem includes the following objects:
· HTML5 Pop-up.
· E-mail Message Service.
· E-mail Message.
· Short Message Service.
· Short Message.
· Audible Notification Service.
· Emergency service.
· Integration with SIP Devices.

12.1.1 HTML5 Pop-up


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

This object is used to call HTML5 pop-ups, that are displayed dynamically as a response to the external
event or system behavior. For example, dialog can be activated with the help of a Node.js Script when
processing events. Pop-ups can be closed manually or automatically by the system (and also by scripts).
For example, HTML5 pop-up may represent control interface or simple message.

For more details about HTML5 pop-ups see the SecurOS Programming Guide.

Object allows:
· To specify size and arrangement of the external HTML application window on the desktop.
· To transmit additional parameters from SecurOS to the external HTML application.

Warning! The HTML5 pop-up is always displayed on top of all other windows on the Windows desktop.

Parent object — Computer\Notif ications group.

www.issivs.com
SecurOS 330 Administration Guide
Notification Subsystem

Figure 206. HTML5 Pop-up object settings window

Table 65. HTML5 Pop-up object settings

Parameter Description

Window position

Specify the HTML5 pop-up's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.

Display Select the physical display ID to display the HTML5 pop-up.

Specify the URL of the HTML page of the external application.

Notes:
URL 1. To specify the path with help of file manager click the
button.
2. It is unable to specify path with file manager when
configuring remotely.

If it necessary to pass additional parameters from SecurOS to the


external HTML5 application, specify them within this field. The
Advanced
specified parameters will be sent to the external application in the
SETUP message.

www.issivs.com
SecurOS 331 Administration Guide
Notification Subsystem

12.1.2 E-mail Message Service

This object represents an SMTP service which will be used to send E-mail notifications.

Parent object — Computer\Notif ications group.

Figure 207. E-mail Message Service object settings window

Warning! Valid object parameter values depend on the settings of the used SMTP server.

Table 66. E-mail Message Service object settings

Parameter Description

Specify IP address or DNS/WINS name of the SMTP server. You


can either use local or external SMTP servers, or install SMTP
SMTP Server
service on the local computer (see SMTP Mail Server Installation
and Configuration). Required parameter.

Port Specify SMTP server port. Default value is 25.

Select this checkbox if your SMTP server requires authentication.


Requires authentication Warning! If this field is checked, then the checkboxes of the next two
parameters will be activated.

User name, Password Specify user name and password for SMTP authentication.

Choose an encryption protocol from the list. Possible values:

Off — encryption is not used (default value).


Encryption
SSL/TLS — use the SSL/TLS protocol.

STARTTLS — use the STARTTLS protocol.

www.issivs.com
SecurOS 332 Administration Guide
Notification Subsystem

Parameter Description

Select the checkbox to use the mail service in the two-factor


authentication procedure (see Two-factor authentication in
SecurOS). By default is not selected.

Use the service for two- Note. If selected, this E-mail Message Service will be available for selection
factor authentication in the list of services for sending one-time access codes in User Rights
object settings.

If selected, messages with an one-time access code will be sent from


the email address specified in the Sender parameter.

Specify the sender's e-mail address on whose behalf e-mail messages


with one-time access codes will be sent.
Warning! The sender is specified in the format
<username>@<domain>. For example, [email protected].
Otherwise, the setting will not be applied.

The specified address will only be used to send messages with one-
time access codes. For all other messages, the addresses specified in
Sender
the E-mail Message's own settings will be used.

The field is not available if the Use the service for two-factor
authentication checkbox is not selected. If the checkbox is selected,
the field is required.

Note. Messages will be sent to the email address specified in the settings
of the current SecurOS User Account.

12.1.3 E-mail Message

Object represents an individual e-mail message (or a message template). E-mail messages are sent using
Macros and Node.js Scripts.

Parent object— E-mail Message Service.

www.issivs.com
SecurOS 333 Administration Guide
Notification Subsystem

Figure 208. E-mail Message object settings window

Table 67. E-mail Message object settings

Parameter Description

Specify e-mail address of a recipient. You can specify several


To addresses separated by a semicolon. For example:
[email protected]; [email protected].

Specify e-mail address of a sender. You can specify several


From
addresses separated by a semicolon.

Specify e-mail address to which you want to send copy of the


CC message. You can specify several addresses separated by a
semicolon.

Specify subject of the message. You can specify variable parameters


here in #param_name\# format. The real parameters are
Subject
substituted automatically when the message is sent. Parameters are
useful when sending e-mail messages from scripts.

Type in the message body. You can specify variable parameters


Message field
here.

Select the files that should be attached to the message. Format: a


string, max length— 250 symbols. You can define the absolute path
to the file or just a file name. In the latter case the system will search
Attachments for the specified file in the product installation folder. You can select
the file using the button. If you need to specify more than one
file, type their names, separated by commas (for example, C:
\temp\image.jpg, C:\temp\log.txt).

www.issivs.com
SecurOS 334 Administration Guide
Notification Subsystem

Parameter Description

Optional: select archiver to compress the selected file(s). Each of the


Pack attached files will be compressed into separate archives. Possible
values: no compress, 7Z, GZIP, ZIP.

12.1.4 Short Message Service

Object represents a mobile phone or other similar device connected to the computer via a serial (COM)
port or via a USB port.

Parent object — Computer\Notif ications group.

Figure 209. Short Message Service object settings


window

Table 68. Short Message Service object settings

Parameter Description

Select the device that will be used for SMS. To display a device in
the list, you must have an installed driver from the device
manufacturer. All devices that are capable to work as GSM modem
in PDU mode are compatible. The device lock screen must be turned
off. On devices that use Android operation system starting from
Device Android 10, AT commands must be enabled (see device manual).

Note. If the device does not support PDU mode, an alternative method
of sending short messages will be used. In this case, the message should
only consist of Latin letters and be no more than 70 characters long.

12.1.5 Short Message

This object represents an individual SMS message. Short messages are sent using Macros and Node.js
Scripts.

Parent object— Short Message Service.

www.issivs.com
SecurOS 335 Administration Guide
Notification Subsystem

Figure 210. Short Message object settings window

Table 69. Short Message object settings

Parameter Description

Specify a number of the target mobile phone to send message to.


Phone Phone number may be set in accordance with E.163 or E.164
international standards.

Type in the message body. Both Latin and Cyrillic characters


Message
(ASCII) can be used. Max message length is 70 symbols.

12.1.6 Audible Notification Service

This object represents a sound card that should be used to playback event-specific audio recordings.
The correspondence between individual audio files and object events can be viewed and altered via the
Registration Files Editor (DDI) utility. All audio files should be located in the \wav folder of the
SecurOS root directory.

Parent object — Computer\Notif ications group.

Figure 211. Audible Notification Service object settings


window

www.issivs.com
SecurOS 336 Administration Guide
Notification Subsystem

Table 70. Audible Notification Service object settings

Parameter Description

Sound card Select an audio output line to play the audio files through.

Volume Specify volume of the audible notifications by moving slider.

Select this checkbox to disable audible notifications if a Event Viewer


Disable if Event Viewer object exists. To use this option it is necessary to enable the Event
exists Viewer object on the computer where the Audible notif ication service is
configured.

12.1.7 Emergency service

The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

This object is intended to send to emergency service an emergency ticket that contains information
about incident. Details of the SecurOS settings and principles of interaction with the Emergency service
are described in the Interaction with External Emergency Service.

Parent object — Computer.

www.issivs.com
SecurOS 337 Administration Guide
Notification Subsystem

Figure 212. Emergency service object settings window

Table 71. Emergency service object settings

Parameter Description

HTTP address of Specify http address to which Emergency ticket and link to the
Emergency Service related video will be sent.

Connection settings (parameters of this block are used to create links to the video related to the
incident)

www.issivs.com
SecurOS 338 Administration Guide
Notification Subsystem

Parameter Description

Select this checkbox to create a link to the video that can be loaded
WebView
with the help of the WebView module via http protocol.

Specify IP address and port number of the WebView sever that will
Host/ Port
be used to provide interaction with external system.

Specify login and password of the user registered within SecurOS


User/ Password
that has access rights to work with the SecurOS's WebView module.

Select from the list the WebView Monitor object that will be used to
WebView Monitor
display video from Cameras.

Select this checkbox to create a link to the video that can be loaded
RTSP Server
with the help of the RTSP server module via rtsp protocol.

Specify IP address and port number of the RTSP server module that
Host/ Port
will be used to provide interaction with external system.

Cameras

Select Cameras for which an Emergency ticket can be created and sent
to the Emergency service. To choose a Camera select checkbox on the
left of the required one.

Cameras tree When working in the Monitoring Center configuration


(see Monitoring & Control Center) the Cameras of the Remote
systems, which are selected in the settings of the Emergency service
objects in the Remote systems, are additionally displayed in the
Cameras tree.

Camera location information

To specify camera location select checkbox on the left of the required


camera. Fill in required fields. This address will be transferred
within the body of Emergency ticket.
City, District, Street, Street
type, House number, Porch, Note. Physical addresses of camera locations of the Remote System are
Road, Distance displayed if they are specified in the settings of the Emergency service
object in the Remote system. Such addresses cannot be changed from the
Monitoring Center.

Incident Types

This field displays Incident Types List that is used when creating
and sending Emergency ticket.
Incident Types List
Warning! If Incident Types List is not loaded, the Emergency ticket can not
be sent to the external Emergency service.

Click this button to download Incident Types List from file.


Load from file (button) Depending on operation result system will display corresponding
message (for example, see Figure 213).

www.issivs.com
SecurOS 339 Administration Guide
Notification Subsystem

Parameter Description

Click this button to save Incident Types List to file. Depending on


Save to file (button) operation result system will display corresponding message (for
example, see Figure 214).

Figure 213. Successful file downloading message

Figure 214. Cannot save to file message

12.1.7.1 Incident Types List. File Format


When creating Emergency ticket it is necessary in accordance to the requirements of the Emergency
services to use code and description of the incident in standard format. Incident Types List file is used
to load these data into SecurOS.

Note. When installing SecurOS these files are automatically created in \IncidentTypes folder of the
product root folder.

Custom list of incident types can be created and loaded into the system in any local character encoding
or UTF-16 LE with BOM encoding. File format is represented in Listing 2:

Listing 2. Incident Types List File Format

[section1]
Name=<Incident Type Category Name>
<Incident Code>=<Incident Type Name>
<Incident Code>=<Incident Type Name>
...
[section2]
Name=<Incident Type Category Name>
<Incident Code>=<Incident Type Name>
<Incident Code>=<Incident Type Name>
...

where:

www.issivs.com
SecurOS 340 Administration Guide
Notification Subsystem

· [sectionN] — unique section name. Section name can consist only of the latin characters and/or
digits.
· Name=<Incident Type Category Name> — unique incident type category name. It is allowed to use
characters in any character encoding in incident type category name. String length: [1; 255]
characters.

Warning! Hyphenation of the string that contains incident type category name is prohibited.

· <Incident Code> — unique incident code. Section name can consist only of the latin characters
and/or digits in incident code. String length: [1; 16] characters.
· <Incident Type Name> — incident type name. It is allowed to use characters in any character
encoding in incident type name. String length: [1; 255] characters.

Warning! Hyphenation of the string that contains incident type name is prohibited.

Example of the Incident Types List file 3.

Listing 3. Incident Types List File Example

[S1]
Name=Man-made fires
S101=fires in buildings, communications and technological equipment
S102=fires in transport
S103=fires in the metro
S104=fires in buildings housing, welfare, cultural
S100=other man-made fires

[S2]
Name=Wildfires
S200=other wildfires
S201=forest fires
S202=steppe and grain fields firesS100=other man-made fires

[S3]
Name=Traffic accidents
S300=other traffic accident
S301=vehicle collision
S302=vehicle rollover
S303=hit on stationary vehicles
S304=hit a pedestrian
S305=hit a cyclist
S306=hitting an obstacle
S307=impact on animals

. . .

[S7]
Name=Geological / hydrological hazards
S700=other geological / hydrological hazards
S701=landslides, debris
S702=a hole in the earth's surface, roads
S703=high water levels / floods

[S8]
Name=Other incidents
S800=other incidents
S801=crowds

www.issivs.com
SecurOS 341 Administration Guide
Notification Subsystem

S802=loitering
S803=vandalism
S804=fight, attack
S805=entrance into the forbidden zone / perimeter intersection
S806=abandoned things
S807=vehicle detection from the black list or a wanted
S808=person detection from the black list or a wanted
S809=need medical help

12.1.8 Integration with SIP Devices


In Linux OS the functionality is not supported.

SecurOS allows to integrate devices that use the Session Initiation Protocol (SIP) such as emergency call
towers and so on into its configuration. SecurOS operators have two-way communication with those
devices. They also have means to monitor locations of the devices so they can expeditiously react to the
incidents.

To allow SecurOS to work with SIP Devices create and configure the following objects:
· SIP Subsystem;
· SIP Device;
· SIP: GUI.

12.1.8.1 SIP Subsystem


Object allows to define the contact for incoming calls, configure connection with the Private Branch
Exchange (PBX) and network parameters. SIP Subsystem is also a parent object for all SIP Devices
(see SIP Device) connected to the server where it is created.

Parent object — Computer.

Figure 215. SIP Subsystem object settings window

www.issivs.com
SecurOS 342 Administration Guide
Notification Subsystem

Table 72. SIP Subsystem object settings

Parameter Description

The contact that child SIP Devices use to connect to operators.


Depending on the configuration, the contact can be represented by
an IP address of the SecurOS server, on which the object was
created, or a unique identifier determined by the PBX settings. You
Contact can enter up to 256 symbols.

Note. When using a PBX, the contact format is determined by its settings
and other requirements of the current configuration.

Select this option if your configuration uses the PBX to provide SIP
Work with PBX Devices communication. If the option is selected the PBX settings
become available.

IP address of the PBX or the server where the software PBX is


IP address
running.

Port Network port of the PBX connection. Default value: 5060.

User by name of which the parent Computer of current SIP Subsystem


User
connects to the PBX.

Password User password.

Network ports

TCP port Network port for TCP connections. Default value: 5060.

Network port for UDP connections. Default value: 5060.

Note. Every active call requires to open two UPD ports starting from the
UDP port given value. Consider this when configure firewall. For example, to
maintain 10 simultaneous calls the UDP ports from 5060 to 5079 are
required to be opened.

12.1.8.2 SIP Device


Warning! This section describes only SecurOS object configuration. For hardware configuration guide you
may contact its manufacturer.

Object represents the device that runs over a protocol called SIP. Operators will be able to take and
make calls using this device. Created SIP Devices will be displayed in the SIP: GUI window. Interaction
possibilities for those devices are defined by user rights (see Access to SIP Devices). In addition, the SIP
Device can be controlled from the Map: GUI (if the SIP Device is located on the Map and the SIP: GUI is
configured), or via Media Client Camera context menu (if at least one Camera is linked with the SIP
Device).

Parent object — SIP Subsystem.

www.issivs.com
SecurOS 343 Administration Guide
Notification Subsystem

Figure 216. SIP Device object settings window

Table 73. SIP Device object settings

Parameter Description

The contact that will be used to connect to this SIP Device.


Depending on the configuration, the contact can be represented by
an IP address of the SIP Device or a unique identifier determined by
Contact the PBX settings. You can enter up to 256 symbols.

Note. When using a PBX, the contact format is determined by its settings
and other requirements of the current configuration.

Cameras

To search Camera by name (part of its name) or by ID, type required


characters in the field; only those Cameras, that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Camera list (table)

Select checkbox to the left from the Camera to link it with the SIP
Device. This allows to quickly show required cameras in Media Client
Name
during the conversation and to make calls on this device from the
Camera cell.

Enter ID of the preset at which this SIP Device is in the view of the
PTZ Camera.

Note. ID of the preset can be found at the PTZ panel of Media Client by
Preset selecting required Camera (see SecurOS Quick User Guide). Camera will
move to defined preset on incoming calls from this SIP Device, outgoing
calls to it or manually with the help of Show cameras button in the SIP:
GUI window.

www.issivs.com
SecurOS 344 Administration Guide
Notification Subsystem

Parameter Description

The Camera that has the best view of this SIP Device. Primary Camera
Primary camera always shows up in the top left corner of the Media Client when
operator is on the call.

Short description of the SIP Device (for example, location). The


Description description is displayed in the SIP: GUI window when this device is
selected in the list.

Access to SIP Devices


Access to SIP Devices is controlled by User Rights (see User Rights). The following access levels are
possible:
· No access ( ). Operator can't see the device in the SIP: GUI window and does not receive calls from
it.
· View ( ). Operator can see the device in the SIP: GUI window and receive calls from it. Outgoing
calls are not available.
· Control ( ) and above. Operator can see the device in the SIP: GUI window and receive calls from
it. He can also make outgoing calls.

12.1.8.3 SIP: GUI


Object represents the graphical interface to receive calls from SIP Devices and to make calls on them.

Parent object — Desktop.

Figure 217. SIP: GUI object settings window GUI

Table 74. SIP: GUI object settings GUI

Parameter Description

Specify the top left corner coordinates relative to the top left corner
of the display (X, Y) as well as width and height (W, H) of the SIP:
X, Y, W, H
GUI window (as percentages of the display's horizontal and vertical
size).

www.issivs.com
SecurOS 345 Administration Guide
Notification Subsystem

Parameter Description

Display Choose the ID of the physical display this object belongs to.

Select the Media Client that the SIP: GUI window will work with.
Media Client This Media Client will be used to display Camera linked with the SIP
Device of interest.

Select the Map: GUI that the SIP: GUI window will interact with.
Warning! The selected Map: GUI must be on the same Desktop as the SIP:
GUI window.

If the Map: GUI is selected, then:

· SecurOS operator will be able to call SIP Device from the Map:
GUI;
Map: GUI
· SecurOS operator will be able to jump from the Map: GUI to the
Media Client to view the video from the Cameras linked to the
SIP Device;

· for any interaction with a SIP Device from the SIP: GUI window,
the map will be automatically centered relative to the given SIP
Device (if possible). For more information, see the SecurOS
Quick User Guide.

Ringtone Select this checkbox to enable audio notification for incoming calls.

Custom ringtone Select this checkbox to set your own ringtone.

Browse button allows to select audio file that will be used as a


ringtone for incoming calls. There are following limitations:

· Supported file extensions: mp3, wav.


File name and Browse
button · Maximum file size: 1 MB.

After the file is selected, its name will be displayed in the field to the
left from the button.

Play button Allows to listen to selected ringtone.

www.issivs.com
SecurOS 346 Administration Guide
Automation Subsystem

13 Automation Subsystem
The automation subsystem provides the means to configure custom reactions to specific events within
the SecurOS network, thus building custom logic within the entire security network.

13.1 Object Reference


Automation subsystem includes the following objects:
· Schedule.
· Macro.
· Node.js Script.
· IIDK Interface.
· HTTP Event Gate.
· REST API.

13.1.1 Schedule

Schedule object represents a time schedule and is used to define activity time for Macros and Node.js
Scripts. For each Schedule specify time intervals, days of week, single dates and periods at which certain
actions of macros and scripts will be executed. Schedule rules will be active for the specified days.

Example. If in the Schedule you select time interval from 8:00:00 AM to 10:00:00 PM and specify Monday and
Wednesday, the event handling rules will be applied from 8:00:00 AM to 10:00:00 PM on Mondays and
Wednesdays.

Parent object — Security Zone\Schedules group.

www.issivs.com
SecurOS 347 Administration Guide
Automation Subsystem

Figure 218. Schedule object settings window

Table 75. Schedule object settings

Parameter Description

List of Time intervals (located on the left part of the window)

Numbered list of specified time intervals and their activity periods.


Time intervals To edit parameters of the specified Time interval, click it and specify
new parameter values.

Add (button) Click this button to add new Time interval to the list.

Remove (button) Click this button to remove selected Time interval from the list.

Time interval setup block (located on the right part of the window)

www.issivs.com
SecurOS 348 Administration Guide
Automation Subsystem

Parameter Description

Specify interval start and end time in the From and To fields.

When specifying time interval the From value can be greater than
the To. In this case two intervals, that are valid for one day, are
actually created within system:

· from 00:00:00 AM till To;

· from From till 11:59:59 PM.

Note. Valid days or periods for this interval are set by the general rules
(see below).

For example, if interval is set as 3:00:00 PM - 11:00:00 AM


and day of the week is set as Monday, then this interval is valid from
From, To 12:00:00 AM till 11:00:00 AM and from 3:00:00 PM till
11:59:59 PM each Monday.

If you want to set a continuous time period, which begins on one


day and ends on the next, then in this case it is necessary to set 2
Time intervals, the first of which ends and the second starts at
midnight. For example, it is required to specify continuous Time
interval that starts on Monday 6:00:00 PM and ends on Tuesday
02:00:00 AM. In this case one should specify the following time
intervals:

· from 6:00:00 PM to 11:59:59 PM with a Mo period of


activity;

· from 00:00:00 AM to 2:00:00 AM with a Tu period of


activity.

Time interval activity

Select this option to specify Time interval activity as the days of


week and/or holidays:

· Select checkboxes for that Days of week on which specified


Time intervals will be active;
On following week days
· If it is necessary to activate Time interval in holidays, select the
Holidays checkbox.

Note. List of Holidays is specified in the Security Zone object settings.

Select this option to specify Time interval activity at the calendar


dates:

· In the Date field select the calendar date of the Time interval
Specific date activity.

· If it is necessary to provide Time interval re-triggering, select the


Repeat every checkbox. Specify re-triggering period (in days)
beginning from the specified date.

www.issivs.com
SecurOS 349 Administration Guide
Automation Subsystem

13.1.2 Macro

Used to define SecurOS system behavior by catching specific system events and generating custom
reactions for those events.

Parent object — Security Zone\Macros group.

Figure 219. Macro object settings window

www.issivs.com
SecurOS 350 Administration Guide
Automation Subsystem

Table 76. Macro object settings

Parameter Description

Enable this option to prevent the event MACRO(X)RUN from being


processed on any other computer located on the same network. If
the macro is executed manually then it can not affect the other
computers in the same security network. If the macro command is
triggered by some event, then the macro command will be executed
Execute locally
locally on all network computers that received this event. If the
macro is executed at system startup then it is executed similarly to a
manually executed macro, i.e. Locally, on that computer, that was
started. If this parameter is left unchecked then macro will be
executed on all computers of the network.

Actions (actions to be performed when an event occurs or at the operator's command)

Type Choose target object type.

Select ID of an object. You can select the All value to refer to any
ID
objects of the specified type within the security network.

Inf ormation f ield: name of the object (appears automatically after you
Name
select object type and specific ID).

Choose an command that object must perform. The list of


commands depends on the type of the object.

React Warning! For the same object it is not possible to select two identical React
even if these Reacts have a different set of Parameters. If it is necessary to
transmit several identical commands to the same object, create several
Macro objects.

Parameters of the selected react. Parameters are set as a string,


maximum length is 255 symbols. String format:
Params
param1<value1>,param2<value2>. For example,
file<\wav\sound1.wav>, color<green>.

Automatic start of actions based on events (the macro is executed when any of the listed events
occur)

Type Choose source object type.

ID Choose source object ID. You can select the All value to refer to any
objects of the specified type within the security network.

Name Inf ormation f ield: name of the object (appears automatically after you
select object type and specific ID).

Choose source object event. List of the events depends on the object
Event
type.

Manual start of actions (allows the operator to execute macro commands from the Media Client)

Hide Macro button from Select this checkbox to hide the Macro run button from the Control
Control Panel Panel.

www.issivs.com
SecurOS 351 Administration Guide
Automation Subsystem

Parameter Description

Select Cameras, through the context menu of which you can call the
Show Macro in Media Macro in the Media Client. If you want the Macro to be available only
Client in the menu of in some Media Clients, hide the Macro using the Hide Macro in
selected Cameras Camera menu option on the Advanced tab in the specific Media
Client settings (see Advanced Tab).

Select an icon for the Macro from the dropdown list. In addition to
standard icons, custom icons can be added to the list. Custom icons
must be placed on the Conf iguration Server, after which they will be
automatically transferred to all computers in the configuration (see
SecurOS Files Synchronization). To do this, create a custom folder
in the folder with standard icons <SecurOS root directory
>\skins\macro_icons and save the icon in it. Custom icon must
meet the following requirements:

· image format: PNG;


Icon
· icon size: 16x16 px;

· filename ends with:

- _dark_0.png (dark icon for the Icon parameter in the Macro


object settings window. 2 px padding from each edge of the
image is recommended);
- _light_0.png (light icon for the Media Client context menu);
- _dark_1.png (dark icon for the Control Panel).

Select position that the Macro will occupy in the Camera's context
Position in menu
menu.

13.1.3 Node.js Script

This object is an environment for developing and debugging Node.js scripts in Windows and Linux OS.
Allows to process Events, manage SecurOS Objects, write a script execution log, etc. For more details on
working with the Module, see the SecurOS Programming Guide.

Parent object — Computer\Integration and Automation\Node.js Scripts group.

Appearance of the window is represented in Figure 220.

www.issivs.com
SecurOS 352 Administration Guide
Automation Subsystem

Figure 220. Node.js Script object settings window

To create and configure a Node.js Script object do the following:


1. In the SecurOS Object Tree select or create the Node.js Scripts object, for which create a Node.js Script
child object.
2. Set the required values in the Parameters of created object window (hereinafter is not shown).
3. In the object settings window set the required object parameters (see below).

Table 77. Node.js Script object settings

Parameter Description

Stop execution (editor The flag for enabling the script editing mode. In this mode, the
mode) script will not be executed. By default is not selected.

An optional external debugger connectivity flag. By default is not


selected. Parameter is disabled in the following cases:

Remote debugger attaching · the Stop execution (edition mode) checkbox is selected;

· failed to get a list of IP addresses to connect (see the description


of the Network interface for connection parameter).

Contains a list of external IP addresses of the server, where the


examined script is located (the Node.js Script object). To connect with
an external debugger, it is possible to use any of the IP addresses in
Network interface for the list. If any value is selected in the list, the same value must be
connection specified in the debugger settings when it starts.

Note. If the localhost value is selected, the connection of an external


debugger is possible only from Computer where the script is created.

www.issivs.com
SecurOS 353 Administration Guide
Automation Subsystem

Parameter Description

Parameter is disabled, if at least one of the following conditions is


true:

· the Stop execution (edition mode) checkbox is selected;

· the Remote debugger attaching chackbox is not selected;

· failed to get a list of IP addresses to connect (for example, if


there is no connection).

The flag that means the system is waiting for a connection of the
Breakpoint on first
external debugger. Available if the Remote debugger attaching
instruction
checkbox is selected. If deselected, the script will run continuously.

Fill in the text area with the script body itself. For more information,
Script window
see the SecurOS Programming Guide.

Contains data of the stdout and stderr standard streams


Script execution result corresponding to the applied, not edited script. The result of the
window (Console) script or a detailed error message will be displayed in the window
when the script is running.

4. Create script.
5. Check syntax of the created script.
6. To save and test the created script, click the Apply button.

13.1.4 IIDK Interface


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

SecurOS provides the capability to exchange data with external / 3rd party systems. Data exchange is
implemented by the means of a special IIDK (ISS Integration Development Kit) protocol. Using this
data exchange protocol, an external computer/system can be connected to the SecurOS network to
transmit events to the security network and to control the SecurOS.

IIDK Interf ace is a service for external connection to SecurOS via IIDK protocol. Create this object on one
or more computers that will act as IIDK servers (see IIDK Manual for more information).

Note. IIDK Manual is not included into common documentation package and is provided by request.

When connecting to SecurOS via IIDK interface, user rights are ignored.

Parent object — Computer\Integration and Automation group.

www.issivs.com
SecurOS 354 Administration Guide
Automation Subsystem

Figure 221. IIDK Interface object settings window

Table 78. IIDK Interface object settings

Parameter Description

Choose one of the options that determines which computers can


connect to this IIDK server:
Computers that are
allowed to connect to the · Local computer. Only local connection is possible.
network · Computer with the following addresses. Computers with
addresses specified in the list below can connect to this IIDK server.

Specify IP addresses of the computers that can connect to this IIDK


server. IPv4 and IPv6 addresses can be specified. It is possible to
List of IP addresses
specify address ranges with a dash (for example, 172.16.1.110-
172.16.1.150).

13.1.5 HTTP Event Gate


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

This object is used for transmitting data from an external system to SecurOS. Data is transmitted via
HTTP GET/POST requests.

Parent object — Computer\Integration and Automation group.

www.issivs.com
SecurOS 355 Administration Guide
Automation Subsystem

Figure 222. HTTP Event Gate object settings window

Table 79. HTTP Event Gate object settings

Parameter Description

Port number of the SecurOS HTTP server, which receives requests


Port
from the external system.

To transmit data to SecurOS, an external system should send a request to the specified port number of
the HTTP server.

For more information about using HTTP Event Gate, please contact your regional Intelligent Security
Systems representative.

13.1.6 REST API


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

This object implements a program interface for interaction of the SecurOS with an external systems via
HTTP/HTTPS or WebSocket protocols. Using this interface one can do the following:
1. Configure SecurOS partially.
2. Receive information about SecurOS and SecurOS FaceX objects and their states.
3. Subscribe for notification about SecurOS objects events and state changes.
4. Filter events transmitted from the SecurOS to the external system.
5. Control Camera recording.
6. Receive fragments of video archive and separate frames.
7. Receive a list of registered events of the Camera object from the Event Viewer.
8. Create, edit and delete SecurOS User Accounts.
9. Control PTZ.
10.Receive Maps, configured in SecurOS.
11.Run Macros.

Parent object — Computer\Integration and Automation group.

www.issivs.com
SecurOS 356 Administration Guide
Automation Subsystem

Figure 223. REST API object settings window

Table 80. REST API object settings

Parameter Description

SecurOS's port for interaction with external system via HTTP/HTTPS. Range
Port
of values: [1; 65535]. Default value is 8888.

SecurOS's port for interaction with external system via WebSocket. Range of
WebSocket port
values: [1; 65535]. Default value is 8080.

Use HTTPS Select this checkbox if it is necessary interact with SecurOS via HTTPS.

Select one of the Event Filters existing in the system to filter events
Use Event filter
transmitted from the SecurOS to the external system.

Refer to REST API Programming Guide for a detailed explanation of how to configure system and use
the REST API object.

Note. REST API Programming Guide is not included into common documentation package and is provided
by request.

13.2 Setting up Macros and Scripts


This section describes specifics of configuring and using the Macros and Node.js Scripts.

13.2.1 Macros

Macros are used to define the links between the events and system actions. On occurrence of the event
described in the macro command, the predetermined actions are executed automatically. The macro
command can also be launched by an operator manually. Most of the system objects have a list of
corresponding events and reactions.

Note. A detailed description of macros can be found in the SecurOS Programming Guide.

To configure Macros perform the following steps:


1. In the SecurOS Object Tree within the Macros group child to Security Zone object create a Macro object.
2. In the Parameters of created object window set the required values.
3. In the object properties window (see figure 224) create the macro command description.

www.issivs.com
SecurOS 357 Administration Guide
Automation Subsystem

Figure 224. The object settings window

4. Apply new settings.

Buttons to execute the created Macros are displayed on the system Control Panel (see figure 225).

Figure 225. Control panel. Available Macros

13.2.2 Node.js Scripts

Node.js scripts are used to describe the event handling logic and the corresponding system response in a
more flexible way than Macros.

Note. A detailed description of the Node.js scripts can be found in the SecurOS Programming Guide.

To create a Node.js Script do the following:

www.issivs.com
SecurOS 358 Administration Guide
Automation Subsystem

1. In the SecurOS Object tree select Computer object. In its child Integration & Automation group create
the child Node.js Scripts.
2. In the Node.js Scripts group create the Node.js Script object.
3. In the Parameters of created object window specify the required values.
4. In the Node.js Script object settings window, create the program code.
5. Check code syntax, correct found errors.
6. Apply new settings.

www.issivs.com
SecurOS 359 Administration Guide
Computer Vision

14 Computer Vision
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

The Computer Vision subsystem of SecurOS makes the security system operator aware of potentially
dangerous situations that are, for example, a person or vehicle intersecting a perimeter of a restricted
area; a suspicious behavior of a person near a parked car; a crowd of people near a secure area or office
buildings, etc.

In SecurOS, this subsystem is represented by the Computer Vision object which consists both of plugins,
that include built-in detectors, and independent detectors.

Parent object — Computer.

Note. Creating several objects of the Computer Vision type with a different set of video-analytical detectors
may be appropriate if it is necessary to optimize the performance of multiprocessor systems with NUMA
architecture (see Optimizing NUMA Systems Performance).

Appearance of the window is represented in Figure 226.

Figure 226. Computer Vision object settings window

www.issivs.com
SecurOS 360 Administration Guide
Computer Vision

Table 81. Computer Vision object settings

Parameter Description

Port number for interaction with SecurOS components. Range of possible


values: [930; 939]. Default value is 930.
Port
Note. When creating each new Computer Vision object, the system automatically
sets a unique value for the Port parameter.

The specific parameters of the video analytical detectors are described in detail in the relevant sections
(see System Setup).

14.1 General Recommendations on Camera Configuration and


Location
Below are the general requirements for the scene, cameras, and light source locations that must be
followed to solve video analytics tasks based on the moving objects tracking algorithms. If these
requirements are not met, this may result in false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 320x240 pixels. Maximum resolution is not limited, because
the initial frame is reduced to one of the following sizes: CIF or D1 (is specified in the tracker
common settings).
2. Minimum FPS value: 15 frames per second. FPS of the video stream must be stable, otherwise
correct working of the detectors is not guaranteed.
3. Linear sizes of the detected and tracked object should not be less than 5-10% of the frame size. For
example, if frame size is 640x480 then person sizes should be ~24x32 pixels.
4. Maximum linear sizes of the detected objects should not be greater than 40% of frame size.
5. For best performance of the detector, the illumination in the scene should be sufficient and even. In
other words, the constellation of the parameters of the camera sensitivity, light sources, reflective
ability of the background surfaces and also camera position relative to the natural or artificial
sources of light and shadow-forming obstacles must provide uniform illumination of the entire
observed scene with minimum noise in the video image. If the video analytics detector is required to
operate in the dark, it is necessary to provide an adequate level of artificial lighting, and avoid such
angles and/or areas of video analysis, where significant glare from vehicle headlights, illuminated
advertising boards, etc., are possible.
6. When mounting cameras it is necessary to avoid camera view angles, which cause overlapping of
some moving objects (people, vehicles, etc.) by other moving or static ones (trees, architectural
objects, etc.).
7. Also you should avoid placing cameras in front of light sources (avoid backlight). If these
requirements are not met, the images provided by the camera are not applicable both for visual
analysis by the operator and for processing by the video analytics detectors.
8. It is necessary to avoid strong shadows. Otherwise the influence of the shadows must be minimized
by installing additional source of light.
9. If possible, you should avoid the appearance of trees and other verdure, as well as water surfaces in
a frame, or to ensure that such zones of the video frame can be masked out to ignore them by the
video analytics system.
10.The camera must be firmly and rigidly fastened. One should avoid the presence of oscillations and
vibrations or minimize their amplitude.

www.issivs.com
SecurOS 361 Administration Guide
Computer Vision

11.The video analytics algorithms are usually designed to work with fixed cameras. Working with PTZ
cameras is possible only using one concrete preset for which a video analytics detector has been
configured. False positives are possible if the camera moves from this preset to another position (for
example, when rotating/scaling image by operator or when moving to another preset).
12.It is recommended to switch off the automatic white balance, auto iris and auto gain functions in the
camera settings, especially for complex and unstable scenes. Otherwise, hard changes of the image
which will cause false positives detector triggering may occur when fine tuning camera for the
current scene is performed.

14.2 System Setup


SecurOS computer vision subsystem uses both built-in detectors that are part of the Tracking Kit III
plugin, and detectors independent of it, for which the plugin is not required. Both built-in and
independent detectors use the same video stream configured for these detectors on the parent Camera
object.

Select the Camera to analyze the corresponding video stream (see Selecting a Video Stream for
Analytics), and then configure the required detector:
· Configuring Plugin and Built-in Video Analytics Detectors.
· Configuring Independent Video Analytics Detectors.

To provide correct operation of some detectors, you will need to install software that uses neural
network algorithms (see Installing Software to Provide Neural Network Algorithms Operation).

The following detectors necessarily use neural network algorithms in their operation:
· People with no Helmet Detector.
· NN Fight Detector.
· NN Loitering Detector.
· NN Fare Evasion Detector.
· NN Fallen Person Detector.
· NN Occupancy Counter.

The following detectors optionally use neural network algorithms in their operation (only when special
options of these detectors are enabled):
· Running Detector.
· Wrong Direction Detector.
· Line Crossing Detector.
· Loitering Detector.
· Intrusion Detector.

14.2.1 Selecting a Video Stream for Analytics

All detectors (built-in and independent), child to any Camera from the Camera Tree, will use the same
video stream incoming from this Camera for analysis. If the Camera is multi-threaded, the stream for
analysis can be selected in its settings (see Figure 227).

www.issivs.com
SecurOS 362 Administration Guide
Computer Vision

Figure 227. Selecting analytics video stream

To select a video stream:


1. In the Camera tree double click the Camera for which it is necessary to specify common settings of the
image analysis. An image from the selected camera, it's identifier and name will be displayed in the
top left corner of the window.

Note. If there are a lot of Cameras in the tree, specify a part of camera name or ID in the Search by Camera
name and ID field to find a required Camera. Only Cameras which names or identifiers comply with specified
search conditions will be displayed in the tree.

2. In the lower right corner of the window, in the Cameras settings block, set the value of the Analytics
video stream parameter.

The Analytics video stream parameter of each Camera contains the following values:

www.issivs.com
SecurOS 363 Administration Guide
Computer Vision

· For video recording;


· For motion detector;
· Low resolution;
· Base;
· High resolution.

Each of the available video streams can be selected if it is defined in the Camera object settings
(see Stream Tab). With multiple streams available it is possible to select the one that is most suitable for
analytics tasks of this Camera.

Note. If the camera does not support multi-streaming, the plug-in detectors will use the only available video
stream regardless of the value selected in the Analytics video stream parameter.

14.2.2 Configuring Plugin and Built-in Video Analytics Detectors

The Tracking Kit III plugin represents a container integrated into SecurOS, consisting of the following
video analytics detectors:
· Running detector — is designed to detect people moving at a speed exceeding a predefined value.
· Wrong direction detector — is designed to detect movement in the forbidden direction.
· Left behind and Removed object detector — is designed to detect left behind and removed objects.
· Line crossing detector — is designed to detect objects that intersect a control line.
· Loitering detector — is designed to detect people moving within a controlled area during a long
time period.
· Dwell time detector — is designed to provide statistical data on the long/short-term stay of people
in a particular place.
· Intrusion detector — is designed to detect objects that intersect the perimeter of a restricted area.
· Crowd detector — is designed to detect potentially dangerous groups of people.
· Object counter — is designed to detect objects that intersect a control line in opposite directions.

The settings of the plugin and built-in detectors are described in the following sections:
· Configuring Tracking Kit III Plugin.
· Configuring Built-in Video Analytics Detectors.

14.2.2.1 Configuring Tracking Kit III Plugin

Within SecurOS a separate instance of the Tracking Kit III plugin, that configured independently,
corresponds to each Camera. When configuring plugin the parameters, influencing the work of each
video analytics detector that is a part of the plugin, are specified.

To configure plugin do the following:


1. Click the Tracking Kit III object child to the selected Camera. In the bottom right of the window, the
plugin settings block will be displayed (see Figure 228).

www.issivs.com
SecurOS 364 Administration Guide
Computer Vision

Figure 228. Plugin settings window. Tracking Kit III block

2. Specify required parameters in the Scene, Tracker, Classification and Forensic search tabs.
3. To apply new settings click the Apply button or the OK button.

Note. Event table, located on the bottom left of the window, is informational only. Data is displayed in the
table only in case one or several detectors are selected to work with Camera (see Configuring Built-in Video
Analytics Detectors).

14.2.2.1.1 Scene Tab

This tab is used to configure the parameters of the frame that will be analyzed.

Appearance of the tab is represented in figure 229.

www.issivs.com
SecurOS 365 Administration Guide
Computer Vision

Figure 229. Tracking Kit III Plugin. Scene Tab

To adjust a scene, specify the following parameters:


· Camera field of view, Camera view, Indoor scene — these parameters affect the performance of
the detection algorithm and accuracy of the detected objects classification.

Warning! When using PTZ camera, an algorithm performance will be correct only if that camera preset is
used, for which the detector settings will be performed.

· Object size limits — this parameter is used to specify the range of sizes of objects moving within
the scene to be detected and tracked. The more precise set values correspond to real objects size, the
higher will be the tracking quality. To set objects sizes click the Edit button and specify required
sizes with the help of mouse (see Figure 230).

Figure 230. Configuring objects sizes

www.issivs.com
SecurOS 366 Administration Guide
Computer Vision

· Enable Perspective — this parameter allows to simulate 3D scene on the base of 2D frame and sizes
of objects near the Camera and in perspective. To enable perspective select checkbox, then click the
Edit button and specify sizes of an object near and far from Camera with the help of mouse
(see Figure 232).

Warning! It is necessary to enable Perspective when using the Running Detector and Crowd Detector. In
other cases perspective setup can improve tracking quality.

Figure 231. Configuring perspective

Limit tracking area — this parameter allows to limit tracking area for the objects in the scene. Limiting
tracking area may significantly reduce CPU consumption, but one should be particularly attentive and
responsible when decreasing area size. To limit tracking area select the checkbox and set the tracking
area using mouse (see Figure 232). After accepting settings controlled area will be decreased. In settings
window the ignore area (within this area object tracking is not performed) will be shaded (see
Figure 233).

www.issivs.com
SecurOS 367 Administration Guide
Computer Vision

Figure 232. Limiting controlled area in plugin settings

Figure 233. Display of limited controlled area in detector settings

www.issivs.com
SecurOS 368 Administration Guide
Computer Vision

14.2.2.1.2 Tracker Tab

This tab is used to configure the parameters of the tracker used for the analysis of the frame.

Appearance of the tab is represented in figure 234.

Figure 234. Tracking Kit III Plugin. Tracker Tab

To configure tracker specify the following parameters:


· Sensitivity — this parameter sets the sensitivity of the motion detection algorithm. If sensitivity is
increased then minimum size of the detected object is decreased and number of detected objects is
increased. If sensitivity is decreased then minimum size of the detected object is increased and
number of detected objects is decreased.

Note. For most cases it is recommended to use default value.

· Video resolution — this parameter sets the resolution of the frame to be analyzed, to which the
initial resolution of the video stream will be reduced to. In general, the greater the resolution, the
more objects of smaller sizes can be detected. However, the increase in resolution can decrease
overall system performance. Recommended value is 320x240 which is minimally sufficient for use
of detection algorithms. If this resolution is selected to use then it is also recommended to enable
advanced algorithms for foreground extraction and object tracking (the Algorithm for foreground
extraction and Use advanced algorithm for object tracking parameters). The 320x240 resolution is
also optimal if requirements described in the General Recommendations on Camera
Configuration and Location are complied.

Additional Info
For example, the 640x480 resolution (with no advanced algorithms usage) can be used if it necessary to detect
small objects. By performance this settings configuration can be compared with configuration that uses the
320x240 resolution and advanced algorithms for foreground extraction and object tracking.

· Algorithm for foreground extraction — select algorithm for foreground extraction to detect a
moving object:

www.issivs.com
SecurOS 369 Administration Guide
Computer Vision

– Standard — the fastest mode. Recommended to use for stable scenes with minimal light
fluctuations and no glare.
– Advanced — optimal mode for detecting a moving object in conditions of light and visual
interferences.
– Ultimate — the most precise mode. This mode allows to process complicated scenes by using
automatic Sensitivity adjusting. It is only recommended to use this algorithm if the computer
(CPU) has a high processing power.
· Use advanced algorithm for object tracking — select this checkbox to use advanced algorithm for
object tracking. Use of advanced algorithm of object tracking allows to increase the accuracy of the
separation of the moving objects and reduce possibility of the tracking error when objects'
trajectories are crossing or objects are overlapped by each other. This parameter is recommended to
use if specified Resolution is 320x240.
· Stop tracking stationary objects after — select this checkbox to avoid processing of the objects
motionless during specified time period. When specified time period is expired, all entities, earlier
detected as an objects, will be considered as a background and will not be processed by detection
and tracking algorithms.
· Stop tracking false positives after — select this checkbox to exclude an imaginary objects from
processing. Imaginary object refers to an entity, that can not be classified both object and
background. For example, stopped car, earlier detected as an object, leave parking in a few minute's
time. As a result, there will be an "empty" area on the frame, that will be considered as an imaginary
object.

14.2.2.1.3 Classification Tab

This tab is used to configure general parameters of the classification algorithm, that will be applied to
all classes of the objects to be detected. Class of object is determined by a combination of its specific
characteristics, that are defined within classification algorithm. SecurOS detector can work with the
following classes of objects or their combinations:
· Vehicle;
· Animal;
· Person;
· Vehicle and person.

One can enable the classification mode and select the object class for each detector individually in its
settings. If an object class is selected, then detector will only track objects of this class, which reduces the
detector loading and improves the detection quality.

Warning! Minimum and maximum sizes of the object should be within the range of the detected object sizes,
specified in the Scene tab.

Appearance of the tab is represented on Figure 235.

www.issivs.com
SecurOS 370 Administration Guide
Computer Vision

Figure 235. Tracking Kit III Plugin. Classification Tab

Specify the parameters of the object classification procedure:


· Decision confidence — threshold of class identification probability, from which the class is
presumed to be reliably identified. Range of values: [0.01; 0.99]. The lower set value is, the
higher will be class identification speed and, simultaneously, the chance of classification mistake,
and vice versa.
· Classification timeout — the maximum waiting time of the object class determination to generate
an event after a detector is triggered. If an object class is not determined within a specified time
after the detector is triggered, an event is not generated. If an object class is determined, an event is
generated with the timestamp of the detector triggering. Range of values (in milliseconds): [0;
10000].
· Continuous classification — select the checkbox if it is necessary to periodically identify class of
the object again (Person, Vehicle, Animal) during all time of its presence in the field of view.
Algorithm allow to rise tracking quality through lowering number of class identification mistakes,
but it increases CPU load.
· Reclassification period — select this checkbox if it is necessary to forcibly reset the previously
defined class of the object, if the algorithm fails to reliably confirm this class within the specified
time. Range of values (in milliseconds): [1000; 60000].
· Classification mode — mode that determines the quality and speed of object classification. Default
value is Balanced. If the default value does not provide the required operating speed and the
classification accuracy requirements are not high, select the High speed value. If the classification
accuracy is insufficient, but the complex computing resources are high enough, select the High
quality value.

Note. It is not recommended to change the default value.

Information about using classification algorithms by different detectors is represented in the tab below,
see Figure 235.

www.issivs.com
SecurOS 371 Administration Guide
Computer Vision

14.2.2.1.4 Forensic Search Tab

This tab is intended for managing the recording of metadata in the SecurOS video archive database
(fsindex). For more information about searching in a video archive using metadata see Forensic
Search.

Appearance of the tab is represented on Figure 236.

Figure 236. Tracking Kit III Plugin. Forensic Search Tab

To save matadata to the database select the Save matadata for forensic search checkbox (deselected by
default).

Note. The checkbox is available if at least one detector has been selected to work with the Camera.

14.2.2.2 Configuring Built-in Video Analytics Detectors


This section describes the settings and features of the configuration procedure of the video analytics
detectors, that are built-in into the Tracking Kit III plugin:

To configure a detector in the Cameras tree select a Camera and select checkbox on the left of the required
detector. Image from the given Camera and selected detector settings will be displayed in the object
settings window (see Figure 237).

www.issivs.com
SecurOS 372 Administration Guide
Computer Vision

Figure 237. Detector settings window

Note. Cameras for which at least one detector is selected are highlighted in the Cameras tree in bold.

Correctness of the specified settings can be checked immediately after they are applied. To do this use
the Event table located in the lower left corner of the settings window (see Figure 237). To check the
correctness of the detector settings do the following:
1. Specify and apply all required detector's parameters, controlled zones and detection lines.

Note. It is more convenient to use static frame to draw controlled zones and detection lines. To pause video,

click the button then specify required zones and detection lines. Click the button to play video.

2. Viewing video from the Camera, the operator visually detects a situation which in accordance with
the settings needs to be processed by the detector (e.g., the object crossed the border of the forbidden
zone).
3. If a new entry is added into the Event table each time when such an event occurs, then detectors
settings are considered correct. Otherwise detector settings are considered incorrect and must be
changed.

www.issivs.com
SecurOS 373 Administration Guide
Computer Vision

Warning! Detector operation is affected both by the detector's own settings and the plugin common settings
(see Configuring Tracking Kit III Plugin). If detector's own settings do not allow to achieve the correct
results, then common plugin settings must be changed.

14.2.2.2.1 Configuring Controlled Zone


When video analytics detector operates, observation objects and detector activation conditions are being
controlled within some zone, that set in the frame. Such a zone represents "transparent" frame area for
detector.

To provide detector operation in system the following controlled zones are used:
· Object tracking zone (further Tracking zone) — within this zone only tracking of an object is being
performed. Given zone is shared between all video analytics detectors and can be set in Tracking
Kit III plugin settings on Scene tab.
· Event detection zone (further Detection zone) — within this zone analysis of detector activation
conditions is being performed. Given zone is set independently for each detector in its own settings.

Controlled zone may be formed using rectangles or polygons. In a frame one can define one united
zone composed from number of rectangles and/or their combinations, and not more than 9
independent zones, formed with polygons.

Way of zone definition are described in following sections:


· Defining rectangular zone.
· Defining polygonal zone.

Notes:
1. In plugin settings not more than 9 polygonal zones can be defined.
2. In detector settings not more than 9 polygonal zones or 1 rectangular zone can be defined.
3. When switching mode in detector settings, prior created zones are being deleted.

Defining rectangular zone


By default when configuring the system for the first time the area of controlled zone match the area of
whole frame (see figure 238).

www.issivs.com
SecurOS 374 Administration Guide
Computer Vision

Figure 238. Default size of the zone

To decrease zone size press and hold left mouse button and draw one or several rectangles (or their
combinations) within the frame (see figure 239).

www.issivs.com
SecurOS 375 Administration Guide
Computer Vision

Figure 239. Rectangular zone, formed from several figures

Rectangles may overlap each other or stay separated. Number of simple and complex figures is not
limited.

Warning! All rectangles defined in the frame work as a single controlled zone, regardless of their number and
combination.

Defining polygonal zone


Similarly to rectangular zone, the polygonal zone matches full frame are by default (see figure 238). To
decrease size of the zone select polygonal mode in frame context menu (see figure 240).

Figure 240. Selecting polygonal mode

www.issivs.com
SecurOS 376 Administration Guide
Computer Vision

Notes:

1. In detector settings one can switch drawing mode (Rectangle/Polygon) using the options

(Rectangle) and (Polygon).


2. By default when configuring for the first time the Stretching mode is set for polygons drawing.

In Stretching polygon creating mode place the mouse pointer over any side or node of the original
rectangle (see figure 241).

Figure 241. Point of zone stretching

Move the point to required direction. Form the required shape of the figure, consistently picking points
at figure nodes or sides (ie, see figure 242).

Figure 242. Polygonal zone (stretching)

In By clicking point polygon creating mode mouse pointer takes shape like it is shown on figure 243.

www.issivs.com
SecurOS 377 Administration Guide
Computer Vision

Figure 243. Dot by dot polygon creating mode

Move mouse pointer to required direction and press left mouse button. The first polygon node will be
marked on the frame. To create zone of required shape, consistently repeat mentioned operation several
times (see figure 244).

www.issivs.com
SecurOS 378 Administration Guide
Computer Vision

Figure 244. Polygonal zone (by clicking point creation)

To finish working with zone double click left mouse button at last created node.

Warning! In a frame up to 9 polygons can be created, and every of them will be counted as individual zone.
Zones will be numbered automatically for more convenience.

Using the context menu, each polygonal zone can be assigned a priority (see Figure 245). Specified
priority will be added to the event comment (see Representation of video analytics detector operation
results). Further event processing can be performed in accordance with event priority and/or zone
priority. A zone with priority 1 is highlighted in green. A zone with priority 10 is highlighted in red.
Other zones are highlighted in intermediate colors according to their priority.

www.issivs.com
SecurOS 379 Administration Guide
Computer Vision

Figure 245. Setting up zone priority

14.2.2.2.2 Running Detector

If a person moves in a controlled area with a speed, that exceeds a specified threshold, they are
considered running. The current speed is calculated using the average size of a person in a given point
of a frame, taking into account perspective. The controlled area and speed threshold are the
configurable parameters of the detector.

It is necessary to specify the boundary sizes of objects. To reach the best detector operation quality it is
recommended to use "angle view" camera setting. To minimize false positives, the visual separability of
the moving objects within the frame is required (persons should not overlap each other or move in
heavy traffic).

This detector works only with Person class of objects, that is specified automatically and cannot be
disabled.

Running detector settings window is represented in Figure 246.

www.issivs.com
SecurOS 380 Administration Guide
Computer Vision

Figure 246. Running detector settings window

Table 82. Running detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer if a person's speed within the controlled area exceeds
specified value.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Specify speed (in relative units) above which a person will be


considered running.

Note. Speed is specified on the base of the person's width calculated at


Speed (person width per the moment when a person is captured by detector (below an
second) reference width). If length of trajectory, that a person passes per 1
second is Speed time greater than the reference width, then a person is
considered running. Thus, depending on the trajectory, the reference
width changes with the perspective.

www.issivs.com
SecurOS 381 Administration Guide
Computer Vision

Parameter Description

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Additional neural filter of
people Note. To provide filter working it is necessary to install the
OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Warning! The Perspective must be configured to use this detector (see Scene Tab).

14.2.2.2.3 Wrong Direction Detector

This detector is designed to detect a movement in the wrong direction.

For successful detector triggering, an accurate determination of the object's trajectory is necessary. The
object must be continuously recognized over a certain time period.

The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.

Wrong direction detector settings window is shown in Figure 247.

www.issivs.com
SecurOS 382 Administration Guide
Computer Vision

Figure 247. Wrong direction detector settings window

Table 83. Wrong direction detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer when an object moving in the wrong direction will be
detected.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Specify the deviation sector (in degrees) from the specified vector of
Allowed direction deviation the wrong direction, within which it will be assumed that the object
also moves in the wrong direction.

www.issivs.com
SecurOS 383 Administration Guide
Computer Vision

Parameter Description

Select required detection algorithm depending on the controlled


scene. Possible values:

· Standard (few objects) — the number of objects in the


Algorithm
frame is small. Objects can be visually separated;

· Advanced (crowd) — the number of objects in the frame is


large. Objects cannot be visually separated.

Choose from the list a class of the detected object. Possible values:

· Don't use classification — all objects will be analyzed;

· Vehicle — only objects classified as "vehicle" will be analyzed;


Object class
· Human — only objects classified as "human" will be analyzed;

· Vehicle and human — only objects classified as "vehicle" or


"human" will be analyzed.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Person or Vehicle
people and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Vehicle or Vehicle
vehicle and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Parameters below are enabled only when the Advanced (crowd) Algorithm is used

www.issivs.com
SecurOS 384 Administration Guide
Computer Vision

Parameter Description

Specify sensitivity of the detection algorithm. Moreover, if the


specified value of the parameter:

· Is placed in the low area of the range — number


of false positive detections is minimal but it increases the
probability of missing detection events;
Sensitivity · Is placed in the middle area of the range (default
value is 50) — optimal mode that provides a balance between
false alarms and missed events;

· Is placed in the high area of the range — number


of the missing detection events is minimal, but it increases the
probability of false positives.

In the frame draw a Control zone within which the Advanced


Select zone (crowd) algorithm will be applied. Procedure for detection area
configuration is described in Configuring Controlled Zone.

When configuring the detector it is necessary to set the vector of the wrong direction of movement and
the angle of deviation within which the direction of movement will also be considered wrong. This
angle deviation is displayed automatically depending on specified value of the Allowed direction
deviation parameter (see Figure 247).

To draw a vector of wrong direction move mouse pointer to the required point on the frame and click
the left mouse button. Holding mouse button pressed, draw a line in the required direction. The line
with arrow, indication the wrong direction, and the deviation sector will be drawn on the frame.
Information about objects moving in wrong direction will be displayed in the Comment field of the
Event Viewer.

14.2.2.2.4 Left Behind and Removed Object Detector

The detector is intended to identify object left in camera's field of view or removed from it. An item is
considered left behind if it has been separated from another tracked moving object and stayed
motionless within the controlled zone. A removed object is an object that has disappeared from the
camera's field of view. At the same time, to be detected as removed this subject must be considered the
background of the controlled area until the moment of disappearance. Controlled area and operation
mode are configurable parameters of the detector.

Note. An object is considered to be within the controlled zone if the area of the object and controlled zone
crossing is not less than 50% of calculated area of detected object.

Linear sizes of the left behind/removed object should not be less than 5% of frame size. For best
performance of the detector, the overlapping of the objects should be minimal (moving objects should
not overlap object left behind). Thus, the "top view" camera angle is optimal. Perspective view (angle
view) is allowed only when the camera mounting height is sufficient and the camera's optical axis is
directed down with sufficiently sharp angle. At the same time, detection of the left behind/removed
objects is most reliable if the detected object is located near the camera. Objects located far from the
camera can significantly overlap each other.

www.issivs.com
SecurOS 385 Administration Guide
Computer Vision

An essential condition for the reliable operation of the detector is stable and good lighting, which can be
reached, if the camera is installed indoors. If the camera is installed in the street, the number of false
positives can increase.

Lef t behind and Removed object detector settings window is represented in Figure 248.

Figure 248. Left behind and Removed object detector settings window

Table 84. Left behind and Removed object detector settings

Parameter Description

Select this checkbox to detect objects left behind in the controlled


Object left behind detector
area.

Specify a name of the event that will be registered in the Event


Event name Viewer if an object remains in the controlled area longer then the
time period specified below.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Select this checkbox to detect objects removed from the controlled


Removed object detector
area. By default it is deselected.

www.issivs.com
SecurOS 386 Administration Guide
Computer Vision

Parameter Description

Specify a name of the event that will be registered in the Event


Event name
Viewer if an object disappeared from the camera's field of view.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Select required detector mode:

· Optimal — optimal mode that provides a balance between


false alarms and missed events;

· Minimize false alarms — number of false positive


Mode detections is minimal, but it increases the probability of missing
detection events;

· Maximize true detections — number of the missing


detection events is minimal, but it increases the probability of
false positives.

Specify duration of the period (in seconds). An object will be


considered left behind/removed when specified value will
exceeded:

· for the left behind objects — the time the object was in the
controlled area from the moment it appeared. In this case, the
object must remain motionless during specified time period;
Minimum object detection
time · for the removed objects — the time elapsed after the
disappearance of the object from the controlled area. At the
same time, it is believed that until the moment of disappearance,
the object was a part of the controlled area background.
Warning! If specified parameter value exceeds specified value of the Stop
tracking stationary objects after (see Tracker Tab) an object will not be
detected as left behind.

14.2.2.2.5 Line Crossing Detector

This detector is designed to count objects that cross the control line. The total number of line crossings is
calculated regardless of the direction of the object movement. Working with several control lines is
supported. In this case, the counting is performed both separately, for each control line, and in total, for
all detector's control lines.

The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.

Line crossing detector settings window is represented in Figure 249.

www.issivs.com
SecurOS 387 Administration Guide
Computer Vision

Figure 249. Line crossing detector settings window

Table 85. Line crossing detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name
Viewer if an object has crossed the control line.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Choose from the list a class of the detected object. Possible values:

· Don't use classification — all objects will be analyzed;

· Vehicle — only objects classified as "vehicle" will be analyzed;


Object class
· Human — only objects classified as "human" will be analyzed;

· Vehicle and human — only objects classified as "vehicle" or


"human" will be analyzed.

www.issivs.com
SecurOS 388 Administration Guide
Computer Vision

Parameter Description

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Person or Vehicle
people and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Vehicle or Vehicle
vehicle and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

When configuring object counter it is necessary to draw one or several Control lines. All objects of the
specified class, that cross a specified Control line, which sizes are within range specified in the global
plugin (see Scene Tab) settings will be detected and counted.

Warning! The maximum number of the Control lines is limited.

To draw a Control line on the frame image, move mouse pointer to the required point on the frame and
click the left mouse button. Holding mouse button pressed, draw a line in the required direction. A line
will be added onto the frame. The total number of objects will be displayed in the Comment field of the
Event Viewer.

To remove a line right click it and select the Remove line command in the context menu.

Note. The last line remaining in the frame can not be deleted.

14.2.2.2.6 Loitering Detector

Loitering is when an object stays within a controlled area for a specified time period. Controlled area
and duration are configurable parameters of the detector. Objects that meet the detection conditions
will be marked with a red frame.

It is also necessary to set the object's minimum and maximum sizes and ensure that there are no objects
in the control zone that can obscure the detected objects. For the best detector performance especially in
complex scenes where the simultaneous presence of a large number of objects is expected it is necessary
to use "top view" camera position. If the number of objects within the scene is known to be not great, it
is also allowable to use perspective camera view (angle view), but only when camera mounting height
is sufficient and camera's optical axis is directed down with sufficiently sharp angle.

www.issivs.com
SecurOS 389 Administration Guide
Computer Vision

Loitering detector settings window is represented in Figure 250.

Figure 250. Loitering detector settings window

Table 86. Loitering detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer if a person stays in the controlled area for a specified time
period.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Choose from the list a class of the detected object. Possible values:

· Don't use classification — all objects will be analyzed;

· Vehicle — only objects classified as "vehicle" will be analyzed;


Object class
· Human — only objects classified as "human" will be analyzed;

· Vehicle and human — only objects classified as "vehicle" or


"human" will be analyzed.

www.issivs.com
SecurOS 390 Administration Guide
Computer Vision

Parameter Description

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Person or Vehicle
people and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Vehicle or Vehicle
vehicle and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Specify intersection of the detected object and controlled zone (in


Intersection of object and percents of the calculated area of the detected object). If this value is
zone exceeded, the object is considered as entered into the controlled
area.

Specify the time of a person staying in a controlled area (in seconds),


Duration
that if exceeded will be considered loitering.

14.2.2.2.7 Dwell Time Detector

This detector is designed to collect statistics about long/short-term stay of people in a particular place.
Controlled area and threshold of the long/short term staying in the zone are configurable parameters of
the detector. Working with one rectangular or several polygonal zones is supported (for the details see
Configuring Controlled Zone).

The object must be continuously recognized throughout its stay in the zone.

Also the object's minimum and maximum sizes must be specified or it is necessary to ensure that there
are no stopped vehicles within the controlled area. For best detector performance especially in complex
scenes where the simultaneous presence of a large number of people are expected it is necessary to use
"top view" camera position. The number of false positives can be high when there are strong (and,
especially, lengthy) shadows as well as a presence of light reflections (e.g. from car headlights) in the
dark.

The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.

Dwell time detector settings window is shown in Figure 251.

www.issivs.com
SecurOS 391 Administration Guide
Computer Vision

Figure 251. Dwell time detector settings window

www.issivs.com
SecurOS 392 Administration Guide
Computer Vision

Table 87. Dwell time detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name
Viewer if thresholds of staying in the zone are exceeded.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Specify intersection of the detected object and controlled zone (in


Intersection of object and percents of the calculated area of the detected object). If this value
zone will be exceeded, the object will be considered as entered into the
controlled area.

Set the duration of the object's stay in the zone (in seconds). If this
Short Dwell Duration value is exceeded the object's stay in the zone will be considered
Short-term.

Set the duration of the object's stay in the zone (in seconds). If this
Long Dwell Duration value is exceeded the object's stay in the zone will be considered
Long-term.

When configuring the detector it is necessary to draw one or several Control zones. It is not
recommended to choose large areas. If there are several zones specified then object counting will be
performed independently for each zone.

The following information is displayed in the protocol as a result of detector working:


· The number of objects short-term staying in the zone at the moment of the event generation.
· The number of objects short-term staying in the zone from the beginning of the detector working.
· The number of objects long-term staying in the zone at the moment of the event generation.
· The number of objects long-term staying in the zone from the beginning of the detector working.

14.2.2.2.8 Intrusion Detector

Intrusion into an controlled area is considered as a movement (traveling or passing) of a tracked object
from outside into the controlled area. The controlled area and type of the object that cause an alarm
(person, vehicle or animal) are adjustable parameters of the detector.

The best performance of the detector is reached if the camera is installed above the controlled area
(camera's angle is "top view") or at an angle to the controlled area ("angle view"). An angle view is
allowed only when the camera mounting height is sufficient and camera's optical axis is directed down
with sufficiently sharp angle. In other words, the camera angle view has to be such that the foreground
objects will not obscure the controlled area.

The number of false positives can be high when there are strong (and, especially, lengthy) shadows as
well as a presence of light reflections (e.g. from car headlights) in the dark.

Intrusion detector settings window is shown in Figure 252.

www.issivs.com
SecurOS 393 Administration Guide
Computer Vision

Figure 252. Intrusion detector settings window

Table 88. Intrusion detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer if object of the selected class crossed the border of the
controlled area.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

www.issivs.com
SecurOS 394 Administration Guide
Computer Vision

Parameter Description

Choose from the list a class of the detected object. Possible values:

· Don't use classification — all objects will be analyzed;

· Vehicle — only objects classified as "vehicle" will be analyzed;


Object class · Human — only objects classified as "human" will be analyzed;

· Vehicle and human — only objects classified as "vehicle" or


"human" will be analyzed;

· Animal — only objects classified as "animal" will be analyzed.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Person or Vehicle
people and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.

Additional neural filter of Parameter is available, if Object class is set to Vehicle or Vehicle
vehicle and person.

Note. To provide filter working it is necessary to install the


OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.

Specify intersection of the detected object and controlled zone (in


Intersection of object and percents of the calculated area of the detected object). If this value is
zone exceeded, the object is considered as entered into the controlled
area.

Select required detector mode:

· Optimal — optimal mode that provides a balance between


false alarms and missed events;

· Minimize false alarms — number of false positive


Mode detections is minimal, but it increases the probability of missing
detection events;

· Maximize true detections — number of the missing


detection events is minimal, but it increases the probability of
false positives.

www.issivs.com
SecurOS 395 Administration Guide
Computer Vision

14.2.2.2.9 Crowd Detector

In video analytics, a crowd refers to a number of people that are simultaneously located in a controlled
area during a specified time interval. The shape of the controlled area, the number of people and the
time interval are configurable parameters of the detector.

Vehicle traffic within the controlled area is highly undesirable. For best performance of the detector, the
camera should be installed above the controlled area (camera's angle is "top view"). A perspective view
(angle view) is allowed only when the camera install height is sufficient and the camera's optical axis is
directed down with sufficiently sharp angle.

Crowd detector settings window is shown in Figure 253.

Figure 253. Crowd detector settings window

Table 89. Crowd detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer if a crowd is detected in the controlled area and it's duration
in the controlled area exceeds the specified value.

www.issivs.com
SecurOS 396 Administration Guide
Computer Vision

Parameter Description

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Specify crowd duration in the controlled area (in seconds) which


Duration
will cause detector triggering if exceeded.

Specify minimum number of people which will cause detector


Minimum count
triggering if exceeded.

Warning! The Perspective must be configured to use this detector (see Scene Tab).

14.2.2.2.10 Object Counter

This detector is designed to count objects that cross the control line. Counting is performed separately
for the objects that cross the control line in opposite directions. Working with several control lines is
supported. In this case, the counting is performed both separately, for each control line, and in total, for
all detector's control lines.

The best detection quality is reached when using "top view" camera angle. Perspective view (angle
view) is allowed only when camera mounting height is sufficient and camera's optical axis is directed
down with sufficiently sharp angle. The number of objects will be counted correctly only if moving
objects can be visually separated within the frame. In other words, objects should not overlap each
other or be moving in heavy traffic.

Object counter settings window is represented in Figure 254.

www.issivs.com
SecurOS 397 Administration Guide
Computer Vision

Figure 254. Object counter object settings window

Table 90. Object counter settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name
Viewer if an object has crossed the control line.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Choose from the list a class of the detected object. Possible values:

· Don't use classification — all objects will be analyzed;

· Vehicle — only objects classified as "vehicle" will be analyzed;

Object class · Person — only objects classified as "person" will be analyzed;

· Vehicle and person — only objects classified as "vehicle" or


"person" will be analyzed.
Warning! If the Treat a large object as a group of objects check box is
selected (see below) this parameter is not displayed.

www.issivs.com
SecurOS 398 Administration Guide
Computer Vision

Parameter Description

Select this check box if the objects in the frame cannot be visually
Treat a large object as a separated. If this check box is selected, the algorithm for dividing a
group of objects large object into the separate objects will be applied when
calculating the number of objects.

Parameters described below are enabled if the Treat a large object as a group of objects check box
is selected.

Click the button to specify character sizes of the object on the frame.
Character sizes allow to separate "large" objects and all other
detected objects within the frame. If the size of the object in the
frame exceeds the upper limit of the specified range of sizes, such an
Set typical size of the object object will be considered “large”. Character sizes of the object are
specified in the same way as the sizes of the detected object in the
frame are specified (see Scene Tab, the Object size limits
parameter). The range of character sizes of an object should lie
within the range of sizes of detected objects.

Camera elevation Specify Camera elevation under the controlled scene.

When configuring object counter it is necessary to draw one or several Control lines. All objects of the
specified class, that cross a specified Control line, which sizes are within range specified in the global
plugin (see Scene Tab) settings will be detected and counted.

Warning! The maximum number of the Control lines is limited.

To draw a Control line on the frame image, move mouse pointer to the required point on the frame and
click the left mouse button. Holding mouse button pressed, draw a line in the required direction. A line
will be added onto the frame. Incoming direction will be labeled with directed arrows. Objects that
cross the line in the given direction will be considered "incoming" and "outgoing” in reverse direction.
"Incoming" and "outgoing" objects are counted separately. Number of counted objects of each type will
be displayed in the Comment field of the Event Viewer.

Note. Direction of arrows on the control line depends on how the line is drawn (left-to-right or right-to-left).

To remove a line right click it and select the Remove line command in the context menu.

Note. The last line remaining in the frame can not be deleted.

14.2.3 Configuring Independent Video Analytics Detectors

This section describes the settings and features of the configuration procedure of independent video
analytics detectors.

14.2.3.1 Smoke Detector

This detector is designed to detect smoke. Controlled area and sensitivity are configurable parameters
of the detector.

www.issivs.com
SecurOS 399 Administration Guide
Computer Vision

In SecurOS a separate instance of Smoke detector corresponds to each Camera. Each detector is configured
independently of the Tracking Kit III plugin and its detectors. To configure detector select the Smoke
detector checkbox in the list of the child objects of the camera is being configured. System will display
detector settings window (see Figure 255).

Figure 255. Smoke detector settings window

Table 91. Smoke detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name
Viewer if a smoke is detected within the controlled area.

Specify the event priority of this detector. Priority determines the


importance of the event registered by the detector and can be used
Event priority
in further processing of the VCA_EVENT event (see SecurOS
Programming Guide) with the help of an external application.

Specify detector's sensitivity (in relative units). Sensitivity affects the


speed of the detector triggering when the detection event occurs. A
Sensitivity
detailed description of the detector's working algorithm depending
on the specified value is provided on the parameter settings tab.

Detection area can be limited. Procedure for detection area configuration is described in Configuring
Controlled Zone.

www.issivs.com
SecurOS 400 Administration Guide
Computer Vision

14.2.3.1.1 Recommendations on Camera Configuration for Smoke Detector


Below are the additional requirements for the scene, cameras, and light source locations that must be
followed to solve smoke detection video analytics task. If these requirements are not met this may result
in false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 640x480 pixels. Maximum resolution is not limited in a
whole.
2. Minimum FPS value: 5 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Linear sizes of the smoked area should not be less than 10% of frame size.

For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.

14.2.3.2 People with no Helmet Detector

This detector is designed to detect people with no helmets.

Working with one rectangular zone is supported (for the details see Configuring Controlled Zone). For
successful detector triggering an object must be continuously recognized throughout its stay in the
Detection zone.

Warning! The detector requires a discrete NVIDIA graphics card. Otherwise, the detector will not work.

In SecurOS a separate instance of People with no helmet detector corresponds to each Camera. Each
detector is configured independently of the Tracking Kit III plugin and its detectors. To configure
detector select the People with no helmet detector checkbox in the list of the child objects of the camera
is being configured. System will display detector settings window (see Figure 256).

www.issivs.com
SecurOS 401 Administration Guide
Computer Vision

Figure 256. People with no helmet detector settings window

Table 92. People with no helmet detector settings

Parameter Description

Specify a name of the event that will be registered in the Event


Event name Viewer if a person with no helmet is detected within the
controlled area.

Select from the list the GPU that will be used to determine the
Use GPU
absence of helmets using neural network algorithms.

Select helmets detection mode. Possible values:

Mode · High quality;

· High speed.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
Event priority be used in further processing of the VCA_EVENT event
(see SecurOS Programming Guide) with the help of an
external application.

www.issivs.com
SecurOS 402 Administration Guide
Computer Vision

Parameter Description

Specify the minimum coefficient of confidence that an object


detected in the frame is classified as a Person. If the actual
Person detection threshold confidence exceeds the specified value, it will be reliably
considered that the object detected in the frame is a Person.

Range of values (in percents): [1; 100]. Default value is 70.

Set the minimum confidence coefficient that the person


detected in the frame is wearing a helmet. If the actual
confidence exceeds the specified value, it will be reliably
Helmets detection threshold considered that the Person detected in the frame is wearing a
helmet.

Range of values (in percents): [1; 100]. Default value is 70.

Specify the duration of the period for the helmet presence /


absence analysis. Based on the result of the analysis of this
period, an alarm decision will be made (see the description of
the Alarm threshold parameter).
Detection period
Note. In fact, the algorithm will consider that number of frames
that correspond to a given time interval.

Range of values (in seconds): [1; 100]. Default value is 10.

Frames share in the analyzed period (see the description of the


Detection period parameter), on which a person should be
Alarm threshold wearing a helmet. If the actual value is lower than the specified
value, the detector generates an alarm message.

Range of values (in percents): [1; 100]. Default value is 50.

Click the button and set one or several zones in which the
filtering of false positives triggering of the detector will be
performed.

False positives filtering (button) Note. The zones for filtering false positives must be set if there are
many static objects in the area of helmets detection that may cause
the detector triggering (for example, fire extinguishers or boxes
with sand). A separate filtration zone should be set for each of these
items.

Detection area can be limited. Procedure for detection area configuration is described in Configuring
Controlled Zone. It is also necessary to set the Minimum and Maximum sizes of people in the Detection
zone. The larger the range of values, and the smaller the Minimum size, the more computational
resources are required for the detector.

The following information is displayed in the protocol as a result of detector working:


· Violation type.
· Violation date and time.

www.issivs.com
SecurOS 403 Administration Guide
Computer Vision

14.2.3.2.1 Recommendations on Camera Configuration for People with no Helmet


Detector

Below are the additional requirements for the scene, cameras, and light source locations that must be
followed to solve detection people with no helmet task. If these requirements are not met this may
result in false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 1920x1080 pixels. Maximum resolution is not limited.
2. Minimum FPS value: 12 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Camera inclination angle: 30 — 70°.
4. The minimum size of a person must be at least 10% in height from the frame size.

For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.

14.2.3.3 NN Fight Detector

This detector is designed to detect fights.

Warning! This detector can be used only if OpenVINOServer is installed. For more information contact
Intelligent Security Systems Technical Support Team.

To configure the detector, select the NN fight detector checkbox in the Camera child object list
(see Figure 257). The control area is marked for the entire frame.

Figure 257. NN fight detector settings window

www.issivs.com
SecurOS 404 Administration Guide
Computer Vision

Table 93. NN fight detector settings

Parameter Description

Specify the name of the corresponding events for the Event


Event name Viewer. The name will be used for both the beginning and the
end of the fight. By default: NN fight detector.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
be used in further processing of the VCA_EVENT event
Event priority
(see SecurOS Programming Guide) with the help of an
external application. Range of values: [1; 10]. Default value is
1.

Specify the minimum coefficient of confidence that an object


detected in the frame is classified as a fighting person. Range of
Decision confidence values: [1; 100]. Default value is 75. The lower the specified
value, the higher the detection performance will be and the
higher the error probability in detecting fights, and vice versa.

If participants do not act aggressively within a specified period


of time after the start of the fight, the fight will be considered
Duration of inactivity before the
over. Resumption of aggressive acting out behavior will cause a
end of the fight
new event to be created. Range of values: [1; 300]. Default
value is 10 s.

14.2.3.4 NN Loitering Detector

NN loitering detector is designed to detect people moving within a controlled area during a long time
period. When a loitering person is detected, the corresponding event is sent to the Event Viewer.

Warning! This detector can be used only if OpenVINOServer is installed. For more information contact
Intelligent Security Systems Technical Support Team.

To configure the detector, select the NN loitering detector checkbox in the Camera child object list
(see Figure 258). By default the controlled area is set for the whole frame, but it is also possible to work
with several areas on the frame (see Configuring Controlled Zone).

www.issivs.com
SecurOS 405 Administration Guide
Computer Vision

Figure 258. NN loitering detector settings window

Table 94. NN loitering detector settings

Parameter Description

Specify the name of the corresponding events for the Event


Event name
Viewer.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
Event priority be used in further processing of the VCA_EVENT event
(see SecurOS Programming Guide) with the help of an
external application.

Select from the list the GPU that will be used to determine the
Use device
number of people using neural network algorithms.

Specify intersection of the detected object and controlled zone


(in percents of the calculated area of the detected object). If this
Intersection of object and zone
value is exceeded, the object is considered as entered into the
controlled area.

Set the time of the object staying in the controlled area (in
Time in zone threshold seconds). If the set value is exceeded, the detector will be
triggered.

www.issivs.com
SecurOS 406 Administration Guide
Computer Vision

Parameter Description

Click the button and set the minimum and maximum sizes of
Adjust the size of the person the person in the video playback area. If the size of the object is
not within this range, it will not be classified as a person.

Click the button and set one or several zones in which the
False positives filtering filtering of false positives triggering of the detector will be
performed.

14.2.3.4.1 Recommendations on Camera Configuration for NN Loitering Detector


Below are the additional requirements for the scene, cameras, and light source locations that must be
followed to solve the task of detecting loitering people. If these requirements are not met this may result
in false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 640x480 pixels. Maximum resolution is not limited.
2. Minimum FPS value: 10 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Camera inclination angle: 30 — 70°.
4. The minimum size of a person must be at least 40 pixels.

For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.

14.2.3.5 NN Fare Evasion Detector

NN f are evasion detector is designed to detect the facts of trespassing into the space behind the turnstile.
Such facts include: crawling under the barrier element (turnstile bars), stepping over and around its
edge. If violations are detected, the corresponding events are sent to the Event Viewer.

For the proper operation of the detector, the camera must face the flow of people paying for the passage
through the turnstile. The behavior of people passing through the turnstile from the camera side is not
analyzed.

Warning! This detector can be used only if OpenVINOServer is installed. For more information contact
Intelligent Security Systems Technical Support Team.

To configure the detector, select the NN fare evasion detector checkbox in the Camera child object list
(see Figure 259). When marking the controlled area it is necessary to mark a separate polygonal zone for
each turnstile.

To adjust the polygonal zone, perform the following steps:


1. Click the right mouse button on the video playback area and select Add polygon.
2. Move the created polygon to the turnstile area and resize it so that it covers the passage area through
the turnstile.
3. Adjust the position and height of the middle blue polygon borders so that it coincides with the
position of the turnstile bar.
4. Reduce the size of the top and bottom yellow polygons so that there is free space between them and
the blue polygon. It is advisable that people crawling under the turnstile bar do not touch the lower
yellow polygon.

www.issivs.com
SecurOS 407 Administration Guide
Computer Vision

Figure 259. NN fare evasion detector settings window

Table 95. NN fare evasion detector settings

Parameter Description

Specify the name of the corresponding events for the Event


Event name
Viewer.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
Event priority be used in further processing of the VCA_EVENT event
(see SecurOS Programming Guide) with the help of an
external application.

Select from the list the GPU that will be used to determine the
Use device
fare evasion using neural network algorithms.

Specify the minimum coefficient of confidence that an object


detected in the frame is classified as a person. If the actual
Decision confidence confidence exceeds the specified value, it will be reliably
considered that the object detected in the frame is a person.

Range of values: [1; 100]. Default value is 50.

www.issivs.com
SecurOS 408 Administration Guide
Computer Vision

Parameter Description

Select this checkbox if the turnstile is partially hidden from the


Turnstile is partially hidden camera. If the parameter is active, an alternative algorithm will
from the camera be used to detect violations, reducing the number of false
triggers when working in such conditions.

14.2.3.5.1 Recommendations on Camera Configuration for NN Fare Evasion Detector


Below are the additional requirements for the scene, cameras, and light source locations that must be
followed to solve the task of detecting the fare evasion. If these requirements are not met this may result
in false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 640x480 pixels. Maximum resolution is not limited.
2. Minimum FPS value: 15 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Camera inclination angle: 80 — 90°.
4. The minimum size of a person must be at least 100 pixels.

For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.

14.2.3.6 NN Fallen Person Detector

NN f allen person detector is designed to detect people who are lying down for a specified period of time.
The detector is intended to be used in rooms with low (up to 3 meters) ceiling, such as corridors,
stations, etc. Some scenarios where the detector can be used are listed below:
· monitoring the movement of persons on gurneys in healthcare facilities;
· assistance to persons who have passed out, fallen due to impact, injury or impaired motor function;
· detecting people who intentionally take a lying posture in places where it is prohibited.

Warning! This detector can be used only if OpenVINOServer is installed. For more information contact
Intelligent Security Systems Technical Support Team.

To configure the detector, select the NN fallen person detector checkbox in the Camera child object list
(see Figure 260). By default the controlled area is set for the whole frame, but it is also possible to work
with several areas on the frame (see Configuring Controlled Zone).

www.issivs.com
SecurOS 409 Administration Guide
Computer Vision

Figure 260. NN fallen person detector settings window

Table 96. NN fallen person detector

Parameter Description

Specify the name of the corresponding event for the Event


Event name
Viewer. By default: NN fallen person detector.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
Event priority be used in further processing of the VCA_EVENT event
(see SecurOS Programming Guide) with the help of an
external application. Range of values: [1; 10].

Select from the list the processing device that will be used to
Use device
determine the fallen person using neural network algorithms.

Specify the minimum coefficient of confidence that an object


detected in the frame is classified as a fallen person. Range of
values: [1; 100]. Default value is 75. The lower the specified
Decision confidence
value, the higher the detection performance will be and the
higher the error probability in fallen person detecting, and vice
versa.

Specify the amount of time the person must be in the lying


Detection delay posture before the alarm event will be generated. Range of
values: [1; 99]. Default value is 1 s.

www.issivs.com
SecurOS 410 Administration Guide
Computer Vision

14.2.3.6.1 Recommendations on Camera Configuration for NN Fallen Person Detector


Below are the additional requirements for the scene, cameras, and light source locations that must be
followed to solve the task of detecting fallen people. If these requirements are not met this may result in
false positive or false negative detector triggering.

1. Minimum allowed frame resolution is 544x320 pixels. Maximum resolution is not limited.
2. Minimum FPS value: 1 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Camera elevation: 2–3 m.
4. Camera inclination angle: 30-80°.
5. The minimum standing / lying person size needs to be at least 18x36 / 38x18 pixels at a
544x320 pixel resolution.

For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.

14.2.3.7 NN Occupancy Counter

The NN occupancy counter is designed for use in places with large crowds of people, such as subway
stations. It provides the ability to determine the number of people gathering in the controlled area at the
same time and display the corresponding information in the Event Viewer. The events are generated
with the set frequency. If the determined number of people exceeds the limit, the events are marked as
alarm events.

Warning! This detector can be used only if OpenVINOServer is installed. For more information contact
Intelligent Security Systems Technical Support Team.

To configure the detector, select the NN occupancy counter checkbox in the Camera child object list
(see Figure 261). By default the controlled area is set for the whole frame, but it is also possible to work
with several areas on the frame (see Configuring Controlled Zone).

www.issivs.com
SecurOS 411 Administration Guide
Computer Vision

Figure 261. NN occupancy counter settings window

Table 97. NN occupancy counter settings

Parameter Description

Specify the name of the corresponding events for the Event


Event name
Viewer.

Specify the event priority of this detector. Priority determines


the importance of the event registered by the detector and can
Event priority be used in further processing of the VCA_EVENT event
(see SecurOS Programming Guide) with the help of an
external application.

Select from the list the GPU that will be used to determine the
Use device
number of people using neural network algorithms.

Specify the minimum coefficient of confidence that an object


detected in the frame is classified as a person. If the actual
Decision confidence confidence exceeds the specified value, it will be reliably
considered that the object detected in the frame is a person.

Range of values: [1; 100]. Default value is 50.

www.issivs.com
SecurOS 412 Administration Guide
Computer Vision

Set the maximum number of people who can stay in the


Alarm threshold controlled area at the same time. If the set value is reached or
exceeded, an alarm event will be generated in the Event Viewer.

Frequency of notification of Set the time interval (in seconds) for generating events in the
number of people Event Viewer.

14.2.4 Optimizing NUMA Systems Performance


In Linux OS the functionality is not supported.

In order to improve performance for solving video analytics tasks on servers, multiprocessor systems
with NUMA architecture can be used. However, the operating system does not always distribute
processes across multiple physical processors efficiently enough, which can result in poor performance.
To optimize the performance of NUMA systems, SecurOS provides the ability to manually distribute
processes between NUMA nodes.

Manual distribution of processes between NUMA nodes


To perform manual configuration, follow these steps:
1. In the SecurOS root folder open the numa_settings.sample file.
2. Edit the file so that its contents are a set of strings in the following format:

[path/]trackingkit3,object_id,numa_node

Where:

· [path/]trackingkit3 — the path to the executable file and the name of the executable file that
starts the process (is specified without the .exe extension).
· object_id — identifier of the Computer Vision object in the SecurOS Object Tree.
· numa_node — the number of the preferred NUMA node on which the process should run.

For example:

modules/trackingkit3/trackingkit3,1,0
modules/trackingkit3/trackingkit3,2,1

In the example above, the Computer Vision object with ID 1 is configured to run on NUMA node 0 (i.e.,
on the first physical processor) and the Computer Vision object with ID 2 on NUMA node with index 1
(i.e., on the second physical processor).

Note. Each process corresponding to the Computer Vision object must be represented as a separate string in the
file.

3. Change file extension to .txt.

Warning! After editing the file, restart the Video Management System Server service (see Server
Control Agent Utility).

www.issivs.com
SecurOS 413 Administration Guide
Computer Vision

14.3 Representation of video analytics detector operation results


When SecurOS video analytics detector is triggered, the system forms an event, that may be processed
by Node.js Script taking into account its priority (see SecurOS Programming Guide) or tracked by
operator on the Event viewer. Event is being formed by Camera object, for which the video analytics
detector is created, and has Video analytics event title (VCA_EVENT) irrespective to detector type.
Meanwhile on the Event viewer will be displayed name, that is set in the detector settings (Event name
parameter). When displayed in the Event Viewer, events can be filtered by detector type.

Note. If not set, then default value that matches the detector name is used.

If necessary, operator can react to detection event. For example, one can switch from Event Viewer
window to Media Client or send an Emergency ticket to Emergency service (see SecurOS Quick User
Guide).

In the Media Client, it is possible to visualize the events of the detectors of the Tracking Kit III plugin.
When visualizing in the Camera cell, each event will be highlighted graphically. For example, when
working with the Running detector, running objects and their tracks will be highlighted. At the same
time when working with the Lef t Behind and Removed Object Detector, all left behind or removed objects
or places where the removed objects were located will be highlighted, etc.

Warning! Visualization of events in the Media Client is possible only for Tracking Kit III plugin detectors
(see Configuring Plugin and and Built-in Video Analytics Detectors) in live video mode only.

To visualize events, select the Visualize Computer Vision events checkbox in the Media Client object
settings (see Cameras Tab).

www.issivs.com
SecurOS 414 Administration Guide
Monitoring & Control Center

15 Monitoring & Control Center


This functionality is available in the SecurOS Monitoring & Control Center only.

In Linux OS the functionality is limited.

SecurOS Monitoring & Control Center edition allows to organize a unified regional Monitoring and Control
Center of multiple geographically separated security systems.

Note. Hereinafter the SecurOS Monitoring & Control Center will be referred as a Monitoring Center or
SecurOS MCC.

In SecurOS there are two types of Monitoring Center that have different functionalities:
· SecurOS MCC DC (Direct Connect) — direct connection. This is the main type of Monitoring Center
and it is used to operate with Remote systems in most cases. For more information about this type,
see Direct Connection.
· SecurOS MCC PA (Privileged Access) — direct connection that supports privileged access. This type
of Monitoring Center is used to conduct special operations with Remote systems. For more
information about this type, see Privileged Access.

Warning! Correct work of the SecurOS MCC is guaranteed if version number of SecurOS, installed in the
Remote system, is equal or less than SecurOS MCC version number. At the same time, version compatibility is
limited. For more information contact Intelligent Security Systems Technical Support Team.

Working with remote objects is only possible when the Remote system configurations are downloaded
into the SecurOS MCC. Configuration loading features for any type of Monitoring Center are described
in the Direct Connection section.

15.1 Direct Connection


With a direct connection, the Monitoring Center center can be configured to work with:
· the archives are stored within the Remote system (Primary and Long-term), if there is connection with
the Remote system;
· the Primary archive of the Remote system that has been previously converted into the Long-term
archive using Archiver object and is stored outside the Remote system, if there is no connection with
the Remote system.

15.1.1 Limitations

There are a few limitations that ensure correct operation of the Monitoring Center when direct
connection is used:
1. Versions of the SecurOS MCC and SecurOS installed in the Remote systems should not be lower, than
9.1.

www.issivs.com
SecurOS 415 Administration Guide
Monitoring & Control Center

2. Regional settings, specified in the operation system parameters, should be the same on the
SecurOS MCC's servers and Remote systems SecurOS's servers.
3. Intelligent Modules installed in the Remote system must also be installed in the SecurOS MCC.

15.1.2 Setting Up Direct Connection

To set up direct connection of the Monitoring Center do the following:

Note. Setting up procedure can be performed on any computer where SecurOS MCC is installed.

1. In the configuration of the Remote system open the System object settings window. Select the Allow
access checkbox and specify access password to this Remote system from the Monitoring Center.
2. In the configuration of the SecurOS MCC in the Object Tree create and configure the Remote system
object, including access password to connect to the Remote system.
3. In the User Rights object settings specify the required access rights to the Cameras of the Remote
system for the operators of the Monitoring Center.

Note. By default, after downloading the configuration to the Monitoring Center, operator does not have access
to the Remote system object and all children objects.

When configuration is downloaded, the separate Objects Visibility Tree for each connected Remote system
is created in the Monitoring Center's server. This tree is located on the same hierarchy level as the
Monitoring Center's System object (see Figure 262). Only the following objects of the Remote system are
displayed in the Objects Visibility Tree:
1. Databases;
2. Computers;
3. Cameras;
4. Microphones;
5. Zones;
6. Sensors;
7. Relays;
8. Archivers;
9. Emergency services;
10.SIP Devices;
11.Computer Visions;
12.ACS objects.

Note. "Visibility" of the Remote system's objects in the SecurOS MCC means the possibility of direct interaction
with these objects. In this case, the operator's access to the settings and other operations with these objects in
the Object Tree (Disable/Rename/Delete) is prohibited.

www.issivs.com
SecurOS 416 Administration Guide
Monitoring & Control Center

Figure 262. Configuration of the Remote system displayed in the Monitoring Center's Object Tree

The location and names of the Remote system's objects


Remote system object is created in the Object Tree on the same hierarchy level, as the System object of the
Monitoring Center. Name and ID, which are assigned to the remote system when you create it, bring, as
a rule, useful information. For example, where this Remote system is located. After the configuration is
downloaded, the Names and IDs of the following format are assigned to the objects of the Remote
system:

· Object Name: <Remote system Name>:<space><Remote system object Name>


· Object ID: <Remote system ID>#<Remote system object ID>

www.issivs.com
SecurOS 417 Administration Guide
Monitoring & Control Center

15.1.2.1 MCC DC Gateway

The object is used to assign multiple SecurOS Video Servers as gateways of the Remote system. These
gateways can only be used for live video transmission. When using the video gate feature only one
video stream will be requested from the Remote system regardless of the number of the consumers of this
stream in the SecurOS MCC. Thus, the use of the video gate feature allows significantly reduce the
network traffic. Use of several Video Servers as gateways allows to dynamically distribute the load
between dedicated servers when transmitting data sent by the remote system to SecurOS.

Parent object — Computer.

Figure 263. MCC DC Gateway object settings window

Table 98. MCC DC Gateway object settings

Parameter Description

To search object by name (part of its name) or by ID, type required


characters in the field; only those objects that meet the search
Filter
condition will automatically be displayed in the tree. To clear the
field click the Reset filter button.

Tree of Computers with the Video Server role that exist within the
SecurOS network. All Video Servers existing in the system are
grouped in relation to the Security Zones.

To add a Video Server into the list of the gateways select the
Object Tree appropriate checkbox to the left of the Video Server object.

Note. The Video Server that is the parent of the configured MCC DC
Gateway object is marked in the list in gray. Such Video Server cannot be
deleted from the gateways list.

To distribute the load, the module requests the current load from each of the specified Video Servers.
Then, based on the information received, it connects the client that requests the video to the least loaded
Video Server.

www.issivs.com
SecurOS 418 Administration Guide
Monitoring & Control Center

15.1.2.2 MCC DC HTTP Proxy


The object provides the usage of the SecurOS Video Server in the capacity of a proxy server for data
exchange between the Remote system and the Monitoring Center Operator Workstation when direct
connection is unstable or not possible. The MCC DC HTTP Proxy object must be selected in the Remote
system object settings.

Note. Operating with SecurOS FaceX Module via proxy server requires to select the corresponding MCC DC
HTTP Proxy object in the System object settings.

Parent object — Computer.

Figure 264. MCC DC HTTP Proxy object settings


window

Table 99. MCC DC HTTP Proxy object settings

Parameter Description

Specify the TCP port to provide network interaction with the proxy
Port
server. Default value is 8010.

15.1.2.3 Remote System

The object is used to provide connection between the Monitoring Center and the Remote system. The
object is also used to provide the video gate feature, data access via proxy server and address mapping
of the Remote system objects.

Warning! Creating and configuring the Remote system object can only be performed by the SecurOS MCC's
superuser (see SecurOS Users).

Parameter settings windows contains the following tabs:


· General Tab.
· Gateway and Proxy Tab.

Connecting to the Remote system


To connect to the Remote System, do the following:
1. To create this object select the System object in the SecurOS MCC’s Object Tree, then click the Create
button and select the Remote System item.
2. Open the Remote system settings window (see General Tab).
3. In the Configuration Server address field specify the IP address of the Configuration Server of the
Remote system.

www.issivs.com
SecurOS 419 Administration Guide
Monitoring & Control Center

4. In the Access password field specify password to provide access to the Remote system from the
Monitoring Center. The password must match the one specified in the setting of the System object of
Remote system configuration.
5. If necessary, fill in the Address mapping table.

Live Video Gateway


SecurOS MCC provides the video gate feature when receiving video from the Remote System.

To use the video gate feature do the following:


1. In the SecurOS MCC Object Tree select arbitrary Computer with the Video Server role.
2. For the selected Video Server create and configure the MCC DC Gateway child object.
3. Choose created gateway in the Remote System object settings (see Gateway and Proxy Tab).

Access to archive video and other data via proxy server


SecurOS MCC provides the access to archive video and other data of Remote system via proxy server.

To get access via proxy server, do the following:


1. In the SecurOS MCC Object Tree select arbitrary Computer with the Video Server role.
2. For the selected Video Server create and configure the MCC DC HTTP Proxy child object.
3. Select created proxy server in the Remote system object settings (see Gateway and Proxy Tab).

15.1.2.3.1 General Tab

Figure 265. Remote system object settings window General Tab

www.issivs.com
SecurOS 420 Administration Guide
Monitoring & Control Center

Table 100. Remote system object settings General Tab

Parameter Description

Configuration Server Specify the IP address of the SecurOS Remote system's Conf iguration
address Server.

Specify password to access the Remote system from the Monitoring


Center. Specified password must match the password specified in
the System object settings in the Remote system configuration.
Access password
Note. If access to the Remote system is granted without password,
parameter is not an obligatory.

Table of correspondence between the names of the Computers and


the Database of the Remote system and their public IP addresses. This
parameter is specified if necessary, for example, if Monitoring Center
and Remote system are connected via VPN, or they are located in
different provider's networks, etc.

Computer accessibility check is automatically performed when


Address mapping
specifying IP address.

Notes:
1. If connection with Remote system is not established,
accessibility check will not be performed.
2. Accessibility check is available only for Computers.

Specify one of the Event filters created and configured within


Monitoring Center to limit number of messages that are being sent
from the Remote system to the Monitoring Center.
Event Filter Warning! If such a filter does not exist or is not configured, then all
messages generated within Remote system will be transmitted to the
Monitoring Center. This can cause overloading of the communication
channel and unstable work of the monitoring center.

www.issivs.com
SecurOS 421 Administration Guide
Monitoring & Control Center

15.1.2.3.2 Gateway and Proxy Tab

Figure 266. Remote system object settings window Gateway and Proxy Tab

Table 101. Remote system object settings. Gateway and Proxy Tab

Parameter Description

Select from the list the EdgeStorage Gate that will be used to view
the archives of Remote Systems stored on external devices.
EdgeStorage Gate to work EdgeStorage Gate is used in cases when there is no direct access from
with archives from external the SecurOS Operator Workstations to those Video Servers of the
systems Remote Systems whose archives are stored on external devices.
In Linux OS the functionality is not supported.

Select from the drop-down list one of the MCC DC Gateways


created in the Monitoring Center if it is necessary to reduce the load
of the communication channel between the Remote System and the
Gateway for video Monitoring Center. The load reduction is provided by distributing
live video streams.
Warning! When using the video gateway feature, working with the Camera
speaker in the Monitoring Center is not supported.

www.issivs.com
SecurOS 422 Administration Guide
Monitoring & Control Center

Parameter Description

Select MCC DC HTTP Proxy to transmit data between the Remote


system and the Monitoring Center Operator Workstation via proxy
server, if direct connection is unstable or not possible.
Proxy server
Note. SecurOS FaceX Module data transmission via proxy server
requires to select the corresponding MCC DC HTTP Proxy object in the
System object settings.

Define the list of subnets that are not intended to use proxy server.
Computers of listed subnets establish direct connection to the Remote
Do not use proxy server for
system. Input format: [subnet_address_(IPv4)]/
[prefix_bit_length]. For example: 172.16.1.0/24.

15.1.3 Setting Up to Work with SecurOS Auto

When working with SecurOS Auto operator of the Monitoring Center can get access to the results of the
license plate recognition, that is performed in the Remote system. For this, configure Monitoring Center as
follows (see Figure 267):

Note. On the figure in the SecurOS MCC Object Tree some Object groups are removed.

www.issivs.com
SecurOS 423 Administration Guide
Monitoring & Control Center

Figure 267. Monitoring Center Object Tree to work with remote SecurOS Auto

1. Create LPR: operator GUI object.


2. In the LPR: operator GUI settings select the LPR: logic module 1 that belongs to Remote system
(see Figure 268).

www.issivs.com
SecurOS 424 Administration Guide
Monitoring & Control Center

Figure 268. LPR: operator GUI object settings in SecurOS MCC

3. Check a possibility to connect to the SecurOS Auto database in the Remote system: network routing
rules and PostgreSQL RDBMS configuration files postgresql.conf and pg_hba.conf
(see SecurOS Auto User Guide).
4. In case, if local IP address of the SecurOS Auto remote database server differs from the public one,
specify public IP address of the server in the Remote system object settings (see Figure 269). In
example below this is the REMOTEAUTO: auto and REMOTEAUTO: ext databases.

Figure 269. Remote system object settings in SecurOS MCC

www.issivs.com
SecurOS 425 Administration Guide
Monitoring & Control Center

15.2 Privileged Access


SecurOS MCC PA type allows the Monitoring Center operator to perform regular monitoring of Remote
system and conduct special operations within this Remote system.

Special operations within the Remote system are conducted by the competent authorities:
· State security forces and agencies when controlling any objects of the "Safe City" APC.
· Private internal security services of an enterprise or organization when controlling critical
infrastructure facilities that are not part of the "Safe City" APC (e.g. banks, retailers, etc).

Monitoring Center operator can get privileged access to the Cameras of the Remote system when
conducting a special operation. Monitoring Center operator must take control of the Remote system
Cameras to get privileged access (see Functionality). After the Cameras are taken control of, they can
only be accessed by the Monitoring Center operator of SecurOS MCC PA (for live video or control).
Access to controlled Cameras will be prohibited for other SecurOS MCC Monitoring Centers and Remote
system operators. Operator of the SecurOS MCC PA Monitoring Center will release controlled Cameras
after special operation is finished. Access to controlled Cameras will be restored for other Monitoring
Centers and Remote system operators immediately after these Cameras are released.

Due to license and functional restrictions, the SecurOS MCC PA type is an extension of the
SecurOS MCC DC type and is installed only in the network where special operations are planned to be
conducted.

Monitoring Center with SecurOS MCC PA type uses a single gateway to provide privileged access to
Remote system. This gateway is used both to view video from the Cameras of the Remote system and to
record a confidential archive. Using one gateway only completely separates the monitored Remote
system from the rest security network in case of special operations. System functionality is described in
detail in the Functionality section.

Functional restrictions of the SecurOS MCC PA type are described in the Restrictions section.

Required for special operation conduction, settings of system objects are described in the System
Configuration section.

15.2.1 Functionality

If the Privileged access possibility is not activated (see System Configuration), SecurOS MCC PA
Monitoring Center operates similarly to the SecurOS MCC DC Monitoring Center. So Monitoring Center
operator of the SecurOS MCC PA is able to view live/archive video from cameras of the Remote system.
Cameras are also available for shared PTZ control mode.

When the Privileged access possibility is activated, SecurOS MCC PA operator can to take control of the
Remote system cameras and release them. Hidden controls of the Media Client camera cell become
available for SecurOS MCC PA operator to perform said operations.

When camera has been taken control of by SecurOS MCC PA operator:


· The Remote system operator loses an ability to view live/archive video from this camera and control
it.
· PTZ control hold of Remote system Cameras is released regardless of the PTZ control mode and the
operator who was controlling the camera.

www.issivs.com
SecurOS 426 Administration Guide
Monitoring & Control Center

· If the camera of the Remote system was recording primary archive, the recording will be
automatically stopped.
· Recording of confidential archive automatically starts on the Video Server of the SecurOS MCC PA
Monitoring Center, that was selected as a gateway (see System Configuration). This archive is
available only for operator of the SecurOS MCC PA Monitoring Center.
· Detectors used by the Remote system Cameras (such as Motion Detector) pause their operation.

Note. When the Remote system Cameras are taken control of, any actions of the SecurOS MCC PA operator will
be hidden from regular Monitoring Center SecurOS MCC DC operators and Remote systems operators. Audit of
these actions will not be performed.

When camera is released by SecurOS MCC PA operator:


· Ability of Camera control and live video viewing is restored for the Remote system operator.
· Recording of confidential archive in the SecurOS MCC PA Monitoring Center automatically stops.
This archive remains unavailable for operator of the Remote system.
· PTZ control mode is not changed (corresponds to the state at the moment of Camera release).

· State of Camera is the same as it was when the Camera was released (if it does not conflict with its
settings). Camera will not be restored to the state it was before taken control of.
· Detectors used by Remote system Cameras resume their operation.

15.2.2 Limitations

The SecurOS MCC PA with selected Privileged access to Remote systems parameter, compared to the
SecurOS MCC DC, operates with Remote systems with the following restrictions:
· In the Remote system monitoring network the only one SecurOS MCC PA Monitoring Center with
privileged access to Remote system can exist;
· Confidential archive of the controlled Remote system camera will be recorded only on the Video
Server of SecurOS MCC PA Monitoring Center that was selected as a gateway (see System
configuration);
· Recorded in the Monitoring Center of SecurOS MCC PA, confidential archive of the controlled Remote
system camera can not be converted into the long-term;
· The Archives priority parameter of the Archive Converter belonging to the SecurOS MCC PA
Monitoring Center must take the Export from primary, fill spaces from long-term value for proper
export of Remote system's archive. Otherwise the export will fail;
· The search for Bookmarks or Alarms as well as Bookmarks setting are unavailable when viewing the
archive of Remote system camera;
· Bookmark setting is unavailable when viewing a special archive recorded in the SecurOS MCC PA
Monitoring Center;
· Long-term archive of Remote system camera that is also stored in the Remote system is unavailable for
viewing;
· Audio stream of the controlled Remote system camera is unavailable when live video is being viewed
in the SecurOS MCC PA Monitoring Center;
· Confidential archive of the controlled Remote system camera is recorded in the SecurOS MCC PA
Monitoring Center without an audio stream;
· Audit of Monitoring Center SecurOS MCC PA operator actions will not be performed.

www.issivs.com
SecurOS 427 Administration Guide
Monitoring & Control Center

Notes:
1. Audit of SecurOS MCC PA operator actions is performed in normal mode when operating with the
SecurOS Auto Module cameras of the Remote system;
2. Audit of user actions is performed in normal mode when operating with cameras of the Remote
system using the SecurOS ActiveMedia Kit.

15.2.3 System Setup

To provide an ability of special operation conduction it is necessary to:


· Configure the objects of the SecurOS MCC PA Monitoring Center.
· Configure the objects of the Remote system.

Warning! The ability of special operation conduction by the Monitoring Center can be prohibited on the Remote
system side (see below).

Configuring the SecurOS MCC PA Monitoring Center


To configure the Monitoring Center, do the following in SecurOS MCC PA configuration:
1. Select the Privileged access to Remote systems checkbox of the Monitoring Center section in the
System object settings.

Warning! It is not necessary to select this checkbox for regular monitoring of the Remote system (without ability
to conduct special operations).

2. Select the Video Server in the Object Tree, then create and configure the MCC DC Gateway child
object.

Warning! Connection of each Remote system requires individual MCC DC Gateway object in the
SecurOS MCC PA configuration. The only Video Server must be selected in the settings of this gateway.

3. Select storages for archive recording in the settings of selected Video Server where the
MCC DC Gateway object is created (see Archive). Selected storages will be used for the Remote system
confidential archive recording in the Monitoring Center, therefore they must have enough capacity.
4. Create and configure the Remote system object in the Object Tree, including the password to the
Remote system. Select created gateway in the Gateway for video parameter.

If privileged access from the Monitoring Center is prohibited by the Remote system settings (see System
Configuration), in relation to this Remote system, the SecurOS MCC PA Monitoring Center will operate as
the SecurOS MCC DC Monitoring Center.

When access is prohibited in the Remote system settings:


· connection to the Remote system will be established;
· warning will be displayed in the Remote system settings window of the Monitoring Center (see 270):

www.issivs.com
SecurOS 428 Administration Guide
Monitoring & Control Center

Figure 270. Privileged access is prohibited by Remote system

Configuring the Remote system


When Remote system has default settings, Monitoring Center always has an access to this Remote system.

If it is necessary to prohibit the privileged access to the Remote system from the Monitoring Center,
select the Prohibit privileged access checkbox in the System object of the Remote system configuration.

15.2.4 Transferring Archive from Remote System to Monitoring Center

Transferring archive means complete deletion of the Primary archive from the Video Server of the Remote
system and saving it on the Video Server of the Monitoring Center. The archive transfer operation can be
considered as a delayed writing of a secret archive in the Monitoring Center when a Camera is captured
(is taken control of) (see Privileged Access). At the same time, the archive recorded in the Remote system
without capturing the Camera remains available for viewing by the operators of the Remote system until
transfer operation starts. As the task completes, the transferred archive fragments become inaccessible
to the operators of the Remote system. Such fragments are completely removed from the archive timeline
in the Remote system, and are marked as a secret archive in the Monitoring Center.

Any interval of the archive, created by any Cameras of the Remote system that can be captured, is suitable
for transfer (i.e. there is a take control/release camera control button in the Camera cells).

Functionality, archive transfer procedure, its features and limitations, as well as system configuration
are described in the following subsections:
· The functioning of the system when transferring archive.
· Restrictions when transferring archive.
· Configuring archive transfer feature.

www.issivs.com
SecurOS 429 Administration Guide
Monitoring & Control Center

The functioning of the system when transferring archive


The archive transfer is carried out by the operator using the Media Client configured in the Monitoring
Center (see Configuring archive transfer feature).

The operations performed by the Monitoring Center operator using the Media Client and the details of the
archive transfer are described in the SecurOS Quick User Guide.

Note. Transferring an archive is also possible using scripts. For a description of the archive transfer
commands, see SecurOS Programming Guide.

Restrictions when transferring archive


The following restrictions are applied when transferring an archive:
· archive transfer is possible only for those Cameras that can be captured (i.e. there is a take
control/release control button in the Camera cells).
· one can transfer an archive recorded on a Remote system where SecurOS version 11.4 and higher is
installed.
· if the Remote system is organized as a cluster of servers, it is not possible to transfer the archive from
the local disks of redundant Hosts. You can only transfer the archive that is stored on the cluster
Nodes.
· audio accompanying the video archive, Alarms, Bookmarks and forensic search metadata are not
transferable.
· Long-term archive is not transferable.
· it is not possible to add new fragments to a transferred archive (for example, when creating an
archive formed using the EdgeStorage Sync technology).

Configuring archive transfer feature


System configuration for archive transfer is performed only in the Monitoring Center configured to work
in Privileged Access mode (see System Setup). To be able to transfer the archive, additionally perform
the following steps:
1. In the Monitoring Center Object Tree select the Media Client that will be used to transfer the archive
from the Remote system. In the settings of the selected Media Client, on the Export and Archive Tab,
select the Remote system’s archive transfer option checkbox.
2. After applying the new setting, an additional Archive transfer panel will be displayed in the
window of the selected Media Client.

www.issivs.com
SecurOS 430 Administration Guide
Redundancy

16 Redundancy
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

This sections describes methods to provide SecurOS servers redundancy. There are two such methods:
· Failover Cluster.
· Redundant Servers Cluster.

16.1 Failover Cluster


In order to provide additional reliability of SecurOS security network and to simplify hardware
upgrade process, Video Servers could be integrated into failover cluster. Failover cluster represents the
group of computers that is able to sustain servers malfunction with help of backup servers.

16.1.1 Cluster Structure

Cluster represents a logic structure that consists of following elements:


· Host — any physical computer with SecurOS Video Server software installed. Such computer only
counts in cluster configuration that is independent from SecurOS configuration. It is not displayed
in SecurOS Object Tree;
· Node — abstract entity that is represented in SecurOS Object Tree by Computer object with Video
Server role. Unlike independent Video Servers Node is not bound to specific physical computer and
may be run by and Host in cluster. To create a Node, you must select the Enable failover of the
Video server and add to the cluster checkbox in the settings of the Computer object as well as
specify a free virtual IP address in the Server IP address field. This IP address remains the same
regardless of which Host the Node is running on.

Note. Independent Video Server represents physical computer with fixed IP address and SecurOS software
installed but it is not a member of cluster and can be found in Object Tree. SecurOS configuration may include
both independent Video Servers and Nodes at the same time.

Warning! When cluster is implemented SecurOS Conf iguration Server role is assigned to one of cluster Hosts.

Schematic view of cluster structure is provided on Figure 271.

www.issivs.com
SecurOS 431 Administration Guide
Redundancy

Figure 271. Cluster structure

16.1.1.1 Cluster Configuration


Information about Hosts and Nodes (their names, parameters and state) represents cluster configuration.
It exists independently from SecurOS configuration and controlled by stand-alone utility
(see Configuring Cluster).

16.1.1.2 Cluster Operation. Quorum


In order cluster could provide backup function, number of Hosts must be greater than number of Nodes.
Hosts could be in two different states:
· Operating host — on such Hosts there are Nodes running. Running the Node means starting all
processes that are required for SecurOS to operate. One Host can run only one Node at the same
time.
· Backup host — such Hosts are in standby state. When operating Host fails the Node that was
running on it starts running on a backup Host. Backup Host is being selected automatically.

If the failed Host restores at the moment when all Nodes are already allocated, it switches itself to
backup state. Conf iguration Server role can also be automatically assigned to other Host if needed. Such
behavior can be changed with help of service mode (see Service mode).

Conf iguration Server role can be assigned both the active and backup hosts.

Cluster keeps working while its Hosts (both operating and backup ones) maintain the quorum state.
Quorum state exists while more than the half of all Hosts are online.

Quorum loss
The loss of the quorum within the cluster causes the following consequences:
· All Hosts, including those that have remained operational, will not be able to function. Whole
cluster will stop operating and will be waiting for quorum state restoration (see Resolving
Common Issues). This situation will not affect those Video Servers in SecurOS configuration that are
not members of the cluster.

Note. Such behavior is typical for most cluster structures and is not a feature of SecurOS.

www.issivs.com
SecurOS 432 Administration Guide
Redundancy

· Most of the cluster configuration commands can not be executed.

Example
In following configurations the quorum state loss will happen if:
· Cluster of 2 Hosts. Quorum will be lost, if one Host will failed (see Redundant Servers Cluster
section that describes how to create effective cluster consisting of two Hosts).
· Cluster of 3 Hosts. Quorum state will be lost if 2 Hosts fail.
· Cluster of 4 Hosts. Quorum state will be lost if 2 Hosts fail.
· Cluster of 5 Hosts. Quorum state will be lost if 3 Hosts fail.

Behavior of the system in states of quorum loss and restoration is provided on figure 272.

Fig. 272. Quorum loss and restoration for configuration of three Hosts

16.1.1.3 Recommendations
It is recommended to use isolated network interface for server communication (see Changing Network
Interface for Virtual IP Addresses).

It is recommended to use centralized data storage. To store video data one may use shared folders
(access by CIFS (SMB) protocol) or iSCSI drive. For other data one may use iSCSI storage (see iSCSI
Drive).

Warning! To provide interaction of the Host within cluster it is necessary to ensure the availability of the
network ports (see Appendix E. Network Ports Used in SecurOS).

16.1.2 Configuring Cluster

For working with cluster it is recommended to use the Server Manager utility. It has a user-friendly
graphical interface that allows to perform all necessary operations with the cluster and monitor its work
in real time.

To configure and control the cluster alternatively one can use clustercli.exe console utility, that is
located in SecurOS root directory.

Warning! To execute commands using the utility in Windows OS, administrator rights are required.

www.issivs.com
SecurOS 433 Administration Guide
Redundancy

Operations of creating and configuring cluster from the command prompt are described in following
sections:
· Creating Cluster;
- Creating Cluster in Existing SecurOS Configuration;
- Creating Cluster and SecurOS Configuration From the Scratch;
· Getting Current Cluster Configuration;
· Creating Security Zone;
· Adding Host;
· Adding Computer to the Redundant Servers Cluster;
· Removing Host;
· Switching to Video Server Mode;
· Adding Node;
· Removing Node;
· Getting Node List;
· Setting Preferred Host for the Node;
· Moving Node to the Host Manually;
· Recreating Cluster;
· Restoring SecurOS Configuration from File;
· Setting Configuration Server;
· Converting Independent Video Server to Cluster Node;
· Service Mode;
· Changing Network Interface for Virtual IP Addresses;
· Setting Up Time Intervals.

16.1.2.1 Creating Cluster


Warning! Before starting create cluster it is recommended to save current SecurOS configuration (see System).

To create a cluster execute the following command on one of the Hosts:

Clustercli.exe create <heartbeat_nic> <virtual_ip_nic> <config_server_virt_ip>

where:
· heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
· virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;

Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).

www.issivs.com
SecurOS 434 Administration Guide
Redundancy

· config_server_virt_ip – virtual IP address, which the Conf iguration Server will be available at.
This address must be unique in local area network and will be assigned to the network interface on
a Host that will play role of Conf iguration Server. In case of such Host failure this IP address may
migrate to other Hosts.

After successful command execution the cluster will be ready to start operation. It will consist from one
Host, that is also a Conf iguration Server.

Warning! If the command was executed not on current SecurOS Conf iguration Server, then at this moment
there are two competing configurations. The elimination of this problem is described in details in the Creating
Cluster in Existing SecurOS Configuration. Example.

Depending on whether there is an existed SecurOS configuration on computers being added to cluster,
next steps differ. See details in following section:
· Creating Cluster in Existing SecurOS Configuration;
· Creating Cluster and SecurOS Configuration From the Scratch.

16.1.2.1.1 Creating Cluster in Existing SecurOS Configuration


Execute create command on a computer that is already a part of SecurOS security network with
existed configuration. After that to start configuring system do the following:
1. If some Video Servers, including previous Conf iguration Server, must stay independent (namely they
should not be added to cluster), configure them to work with new Conf iguration Server. To do this use
Server Role Manager utility (see ISS Server Role Manager utility) and specify IP address of the new
Conf iguration Server – config_server_virt_ip parameter, that was used in cluster creation
command.
2. Create at least one Node, which the Operator Workstation will be able to connect to (see Adding
Node). If it is required, one can convert one of Video Servers existed in current configuration to a Node
(see Converting independent Video Server to cluster Node).

16.1.2.1.2 Creating Cluster and SecurOS Configuration From the Scratch


If it is required to create cluster and SecurOS network with new configuration simultaneously, execute
create command at any computer with SecurOS software installed. Now, to start configuring system,
do the following:
1. Create Security Zone (see Creating Security Zone).
2. Create at least one Node, which the Operator Workstation will be able to connect to (see Adding
Node).

Detailed process of how to create cluster when there is no configuration yet is described in section
Creating and setting up cluster example.

16.1.2.2 Getting Current Cluster Configuration


To check current cluster configuration execute the following command on any Host:

Clustercli.exe state

Console will display the following information:


1. Conf iguration Server virtual IP address.

www.issivs.com
SecurOS 435 Administration Guide
Redundancy

2. List of Nodes with following description:


· SecurOS configuration revision for the moment of Node creation.

Note. Configuration revision is a number that matches the count of changes made in this configuration.

· Virtual IP address of the Node.


· Preferred Host for that Node (if set).
3. Name of the Host, that serve as Conf iguration Server.
4. List of couples of Nodes and Hosts, which these Nodes running on.
5. List of Hosts with their IP addresses and current configuration revision.
6. List of the servers connected to the cluster (see Redundant Servers Cluster) indicating the current
revision of the configuration.
7. List of the local drives added on this Host (see Storing Video Archive on the Host's Local Drives).
8. The current values of the cluster fine tuning parameters (see Setting Up Time Intervals).

Warning! In case of quorum loss state (see Cluster Operation. Quorum) it is unable to check cluster state.

Command execution result in provided on figure 273:

Figure 273. Cluster state

www.issivs.com
SecurOS 436 Administration Guide
Redundancy

16.1.2.3 Creating Security Zone


If cluster is being configured in system without any SecurOS configuration, one must create Security
Zone first. To do this execute the following command on any host:

Clustercli.exe node createzone <zone_id>

where:
· zone_id – Security Zone ID.

The System object will be created if there was none.

16.1.2.4 Adding Host


To set up computer as cluster Host, execute the following command on it:

Clustercli.exe join <heartbeat_nic> <virtual_ip_nic> <other_host_ip>

where:
· heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
· virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;

Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).

· other_host_ip – IP address of one of cluster Hosts.

Warning! Entering wrong or not available IP address as this_real_ip parameter may cause quorum loss
(see Resolving Common Issues).

After executing command SecurOS service will restart and after that it will be working in cluster Host
mode.

Warning! If the computer that is being added to the cluster stores any SecurOS configuration it will be
overwritten.

16.1.2.5 Adding Computer to the Redundant Servers Cluster


To add computer to the redundant servers cluster execute the following command on this computer:

Clustercli.exe attach <virtual_ip_nic> <hosts_list>

where:
· ip_address_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;
· hosts_list – list of the IP addresses of the Hosts of the redundant servers cluster, separated by
space. It is recommended to specify IP addresses of all Hosts.

www.issivs.com
SecurOS 437 Administration Guide
Redundancy

After executing the command, SecurOS service will restart.

Warning! If the computer that is being added to the cluster stores any SecurOS configuration it will be
overwritten.

Immediately after adding computer to the cluster it must be set as preferred for one of the Nodes (see
Setting Preferred Host for the Node).

Such a server cannot be disconnected from the cluster using the remove command. Execute leave
command (see Switching to Video Server Mode) on this computer to stop cluster from taking it into
account when distributing Nodes.

16.1.2.6 Removing Host


To remove Host from cluster configuration execute the following command on any Host:

Clustercli.exe remove <host_to_remove_ip> <other_host_ip>

where:
· host_to_remove_ip – IP address of the Host, that must be removed from cluster;
· other_host_ip – IP address of one of cluster Hosts.

Note. To return computer to regular mode it is not enough only to remove it from cluster. It must be also
switched to Video Server mode (see Switching to Video Server mode).

16.1.2.7 Switching to Video Server Mode


To completely switch computer to independent Video Server mode, one must to execute the following
command on this computer:

Clustercli.exe leave [-f]

where:
· [-f] – optional parameter for forced execution.

This command works in two steps:


1. It sends command to remove Host from cluster (see Removing Host).
2. Switches computer to independent Video Server mode.

In case if first step can not be executed, for example, due to quorum loss (see Cluster Operation.
Quorum), the second step will not be executed. If it is needed to switch computer to Video Server mode
anyway, skip the first step. To do this use -f parameter, that allows to perform forced command
execution.

www.issivs.com
SecurOS 438 Administration Guide
Redundancy

16.1.2.8 Adding Node


To add a Node to cluster configuration execute the following command on any Host:

Clustercli.exe node create <node_name> <node_virt_ip> <zone_id>

where:
· node_name – name and ID of the Node to be created;
· node_virt_ip – virtual IP address, which the Node will be available at. This address must be
vacant in local area network and unique;
· zone_id – ID of Security Zone, which is parent to the Node.

Note. Unlike independent Video Servers, ID of a Node does not have to match computer's domain name, that it
will be running on.

A new Nodes also can be added via SecurOS Object Tree. To do this perform the following steps:
1. Connect to the working Node using client application (see Connecting Operator Workstations to the
Cluster Servers).
2. In the configuration create Computer object that has Video Server role.
3. In settings of this Computer object tick the Enable failover of the Video server and add to the cluster
checkbox.
4. Enter virtual IP address of the Node into the IP address field.
Virtual IP address is now assigned to the Node and it will be available at this address despite of what
Host it is running on.

16.1.2.9 Removing Node


To remove Host from cluster configuration execute the following command on any Host:

Clustercli.exe node remove <node_name>

where:
· node_name – ID of the Node to be deleted.

Warning! Removing the Node results into deleting all Cameras and other child objects as well.

16.1.2.10 Getting Node List


To get list of all Nodes in the configuration execute the following command:

Clustercli.exe node list

List of all Nodes with ID and virtual IP address for each will be displayed.

Command execution result in provided on figure 274:

www.issivs.com
SecurOS 439 Administration Guide
Redundancy

Figure 274. Node List

16.1.2.11 Setting Preferred Host for the Node


If it required to make specific Node always run on a specific Host (due to its higher performance, for
example), execute the following command:

Clustercli.exe node set <node_name> pref_host=<host_name>

where:
· node_name – name of the Node, which the preferred Host is being set for;
· host_name – name of the Host, that will become preferred for specified Node.

Note. To cancel Host's priority for the Node, execute command with empty pref_host parameter value. For
example, Clustercli.exe node set Node_1 pref_host=.

Nodes that have preferred Hosts fall under the following rules:
1. Node will be trying to take its preferred Host at the earliest opportunity.
2. If any Host is set to be preferred for several Nodes at one moment, the one that will take it will be
selected automatically. Thus it can not be displaced from this Host automatically.
3. When setting up preferred Host for a Node it will immediately replace the Node currently running on
the Host (if current Node is not running on preferred Host). The displaced Node will take first vacant
Host if there are any.

16.1.2.12 Moving Node to the Host Manually


To manually move Node to required Host execute the following command:

Clustercli.exe node move <node_name> <host_name>

where:
· node_name – ID of the Node to be moved;
· host_name – name of the Host that will run specified Node;

Process of manual moving the Node to a Host falls under the following rules:
1. If there is another Node running on specified Host already, it will be displaced.
2. If the displaced Node was the one, for which that Host is set to be preferred, further behavior will be
determined by rules for Nodes with preferences.

Note. It is not recommended to use manual Node transfering to configure cluster. Proper setup of Nodes
preferences allow to achieve better results (see Setting Preferred Host for the Node).

www.issivs.com
SecurOS 440 Administration Guide
Redundancy

16.1.2.13 Recreating Cluster


In case when one needs to reassemble the cluster without losing its configuration (see Cluster
Configuration) except for list of Hosts, execute the following command on any Host:

Clustercli.exe recreate <heartbeat_nic> <virtual_ip_nic>


<config_server_virt_ip>

where:
· heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
· virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;

Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).

· config_server_virt_ip – virtual IP address, which the Conf iguration Server will be available at.
This address must be unique in local area network and will be assigned to the network interface on
a Host that will play role of Conf iguration Server. In case of such Host failure this IP address may
migrate to other Hosts.

After executing this command cluster will contain only one Host. Other hosts must be added to cluster
again (see Adding Host).

Note. Recreating cluster is a way to solve the quorum loss problem (see Resolving Common Issues).

16.1.2.14 Restoring SecurOS Configuration from File


If SecurOS configuration was initially saved into a file, it can be used to restore one. To do this execute
the following command on any Host:

Clustercli.exe config-restore <path_to_file>

where:
· path_to_file – absolute or relative path to file with saved configuration.

Note. When executing this command cluster Hosts list is not restored. If necessary, hosts must be added to the
cluster manually (see Adding Host).

Before executing command, current SecurOS configuration is being saved to


ISS\Sys_config\cluster_backup.json, path to which is defined by %ProgramData% variable.

www.issivs.com
SecurOS 441 Administration Guide
Redundancy

Warning!
1. For restoring it is recommended to use the copy of the configuration file that corresponds to the
currently installed version of SecurOS. When restoring configuration from files of other versions,
correct operation of SecurOS is not guaranteed.
2. Configuration backup file is stored on the Host that was in Conf iguration Server role at the moment of
command execution.
3. The current password of the superuser (see SecurOS Users) will not be changed after restoring the
configuration.

16.1.2.15 Setting Configuration Server


If it is required to set Conf iguration Server role to a specific Host in cluster, execute the following
command on any Host:

Clustercli.exe set cs=<new_cs_host>

where:
· new_cs_host – name of the Host that will be set as new Conf iguration Server.

Notes:
1. In case when Host set to be a Conf iguration Server fails, new Conf iguration Server will be assigned
automatically. Such behavior can be changed with help of service mode (see Service Mode).
2. Conf iguration Server role can be assigned only to cluster member.

16.1.2.16 Converting Independent Video Server to Cluster Node


If cluster is being created based on existed SecurOS configuration, one must convert regular Video
Servers into Nodes after. To do this execute the following command on any Host:

Clustercli.exe node update <videoserver_id> <node_virt_ip>

where:
· videoserver_id – ID of the Video Server in SecurOS Object tree that required to be converted into
a Node;
· node_virt_ip – virtual IP address, which the Node will be available at.

Note. Same command may be used for changing virtual IP address of existed Node.

16.1.2.17 Service mode

Service mode allows to perform hardware and software upgrade without losing cluster configuration
(see Cluster configuration). There are types of service mode:
· Fixed Conf iguration Server — in this variation Conf iguration Server role can not be assigned to other
Host automatically.
· Full fixation — in this variation not only the Conf iguration Server role but also Nodes are not
changing Hosts automatically.

To enter service mode execute the following command on any Host:

www.issivs.com
SecurOS 442 Administration Guide
Redundancy

Clustercli.exe set service_mode=<service_mode_name>

where:
· service_mode_name – type of service mode:
- fixed_cs – fixed Conf iguration Server;
- fixed_all – full fixation.

To exit service mode execute the following command on any Host:

Clustercli.exe set service_mode=

This command removes current service mode value so Nodes and Conf iguration Server role will start to
transfer automatically again.

16.1.2.18 Changing Network Interface for Virtual IP Addresses


Operator Workstations connect to security network via virtual IP addresses of Nodes. Network load
depends on Host's network interface, which virtual IP addresses are assigned to. It is recommended to
assign virtual IP addresses to a network interface that differs from the one that is used by Hosts to
communicate with each other.

To change network interface, to which you want to assign virtual IP addresses, execute the following
command:

Clustercli.exe set virtual_ip_nic=<ip_address>

where:
· ip_address – IP address of network interface on this computer, which virtual IP addresses will be
assigned to.

16.1.2.19 Setting Up Time Intervals

Warning!
1. The following fine tuning commands can be performed only after agreement with the Intelligent
Security Systems Technical Support Team. Otherwise, Intelligent Security Systems is not responsible
for the correct functioning of the cluster.
2. It is strongly not recommended to use these commands if cluster operates normally.

This section describes the following commands for fine tuning the cluster:
· set quorum_timeout — setting the interval for pinging with other Hosts in the cluster.
· set heartbeat_interval election_timeout — setting the interval for checking the heartbit of the
cluster leader and the period for electing a new cluster leader if the current one is unavailable.

Note. The current values of all of the following parameters can be obtained using the state command.

set quorum_timeout
The check of the connection between the Host of the cluster and other Hosts within the cluster is
performed automatically at a specified interval. By default, this interval is 5 seconds.

To change the ping time interval, run the following command:

www.issivs.com
SecurOS 443 Administration Guide
Redundancy

Clustercli.exe set quorum_timeout=<time>

where:
· <time> – required ping interval (in seconds). Range of values: [5; 300].

set heartbeat_interval election_timeout


The availability of the cluster leader is determined periodically by sending him broadcast messages
(heartbits). If the leader does not send an availability message to the cluster members within the
specified timeout, the election of a new cluster leader is initiated.

To change the specified intervals, run the following command:

Clustercli.exe set heartbeat_interval=<time1> election_timeout=<time2>

where:
· <time1> – required heartbit period (in milliseconds). Range of values: [10; 100]. The default
value is 50 ms.
· <time2> – heartbit timeout (in milliseconds). Also sets the time allotted for one round of election of
a new cluster leader. Range of values: [100; 1000]. The default value is 500 ms.

Warning! Executing this command will restart SecurOS on all Hosts of the cluster! This command should only
be run when all the Hosts of the cluster are online. Otherwise, problems may arise in the functioning of the
cluster.

16.1.3 Connecting Operator Workstations to the Cluster Servers

Operator Workstations can connect to the SecurOS servers, that work within cluster. To connect to such
server specify virtual IP address of one of the Nodes in authorization window. If Host fails, the client
application will automatically reconnect to the same Node after it is launched on the new Host.

Note. If there is no Node in cluster yet, use IP address of one of the Hosts to configure SecurOS.

Limiting connection of client applications running on cluster Hosts


Security Zone object settings allows to limit connections of the client aplications to the SecurOS servers
(see Connection Restrictions Tab). If cluster Host is used as Operator Workstation at the same time, not
only IP address of this computer must be added to the white list of the IP addresses, but also virtual IP
addresses of all cluster Nodes and virtual IP address of the Conf iguration Server.

16.1.4 Storing Data in Cluster

While working with cluster, special attention should be given to video archive and databases storage
organization.

Following types of storage can be used for storing video archive:


· Shared folder (CIFS) — the most safe type of centralized storage.
· iSCSI drive — the most fast type of centralized storage (see iSCSI Drive).

Warning! In Linux OS, the ability to use iSCSI disks is not supported.

www.issivs.com
SecurOS 444 Administration Guide
Redundancy

Besides storing video archive iSCSI drives may be used for storing databases. For example,
databases of Event viewer, recognition modules, etc (see Movable PostgreSQL).

· Local drives allow to store video archive directly on the cluster's Hosts. Records stored on all Hosts
are available to operator as transparent archive. In case of Host failure, the corresponding part of the
archive will be temporarily unavailable.

Note. Local drives for archive recording can be set on the Host where the Node works (see Advanced Cluster
Host Settings). In this case the archive will be first written on these drives, even if there are other directories
for archive recording specified in the Node own settings.

This type of storage is recommended to use in Redundant Servers Cluster due to its restrictions.
Details of the configuration procedure are described in the Storing Video Archive on the Host's
Local Drives.

16.1.4.1 iSCSI Drive

Warning!
1. In Linux OS, the ability to use iSCSI disks is not supported.
2. Versions of Windows OS installed on all Hosts that use iSCSI drives must match.
3. For proper iSCSI drive connection on Windows 10, update your operation system to build 1709 or
above.
4. Each iSCSI drive must contain one partition formatted in NTFS.
5. Before using iSCSI drive in Windows OS, make sure that all Hosts in the cluster are running
Windows service named Microsoft iSCSI Initiator Service and type of run is set to
Automatically.
6. Simultaneous recording on iSCSI drive may lead to data corruption. To provide additional data
safety it is recommended to use storages with support of iSCSI target connection exclusivity control.

This object is a mediator between SecurOS and Windows iSCSI initiator, that provides credentials to
establish connection. To add iSCSI drive to SecurOS configuration create iSCSI drive object, child to the
Computer object (Node).

Note. To record video archive on the Node one can use only those iSCSI drives, that are child to this Node.

Parent object — Computer.

www.issivs.com
SecurOS 445 Administration Guide
Redundancy

Figure 275. iSCSI drive object settings window

Table 102. iSCSI drive object settings

Parameter Description

Contains the table of IP addresses and ports. Click the add/remove


button to add/remove a portal.

In the IP address column set IP address of the server where the disk
Portal table
is located.

In the Port column set the network port of the connection. Default
value: 3260.

Get IQN list (button) Press the button to get list of IQN available on listed portal.

List of IQNs, to which the connection can be established. Select


IQN
desired value.

Select this checkbox if there is authentication required on listed


Use authentication
portal.

User and Password Enter credentials for authentication.

Get LUN list (button) Press the button to get list of LUN available for selected IQN.

LUN LUN list of selected IQN.

Get volume list (button) Press the button to get list of volumes available for selected LUN.

Volume Volume list of selected LUN.

www.issivs.com
SecurOS 446 Administration Guide
Redundancy

Parameter Description

Test connection (button) Press the button to make sure that connection works properly.

16.1.4.2 Using iSCSI Drive for Storing Video Archive

Warning! Using Save space mode when archive recording can negatively affect the data safety on the iSCSI
storage. It is recommended to use Optimal performance mode (see Select archive recording mode).

To record archive on iSCSI drive, one must set it up first (see iSCSI Drive). After that it can be selected
in settings of Computer object. To perform that do the following:
1. Open Computer object settings.
2. Press the Add directory button at the Archive section.
3. Select iSCSI drive option and find required iSCSI drive in the drop-down list.
4. Click the Add button.

Note. Setting up Archiver for storing long-term archive on iSCSI drive can be performed in the same way (see
Archiver).

16.1.4.3 Movable PostgreSQL


In order to increase fault tolerance of databases, they can be located on iSCSI drives. It will make
databases available at fixed IP address in case of Host failure.

Parent object — iSCSI Drive.

Figure 276. Movable PostgreSQL object settings


window

Table 103. Movable PostgreSQL object settings

Parameter Description

Enter network port at which movable DBMS will be available.


Port
Default value: 5433.

To create such fail safe database, do the following:


1. Create Movable PostgreSQL object child to iSCSI drive object.
2. At object settings enter the port at which the database will be available.

One must configure access from outer IP addresses on selected PostgreSQL server.

www.issivs.com
SecurOS 447 Administration Guide
Redundancy

To do this edit postgresql.conf and pg_hba.conf configuration files. In postgresql.conf there


must be listen_addresses = ’*’ option, and pg_hba.conf must include permissions for
Operator Workstations or Video Servers.

Generally the line must look like this:

host all all 0.0.0.0/0 md5

Notes:
1. postgresql.conf and pg_hba.conf files can be found in %ProgramData
%/ISS/iscsi_drives/[iscsi_drive_id]/pg_data directory.
2. To check remote DB accessibility at Operator Workstation one can use the Test connection button in
the Database object settings window or pgAdmin utility.

3. Connect to the movable database using PGAdmin utility. For connection specify virtual IP address of
the Node, which are parent for the Movable PostgreSQL.
4. Use PGAdmin to create new database.
5. Markup created database with the help of Database Update Utility.
6. Create Database object child to Security Zone object (see Database).
7. Configure the Database object. To do this enter iSCSI drive's parent Node virtual IP address as Host,
and Movable PostgreSQL port value as Port.

Now this Database can be selected in settings of the object it is intended for.

16.1.4.4 Storing Video Archive on the Host's Local Drives


Local hard drives of the cluster's Hosts can be used to store video archive. Each Host is configured
separately.

Warning! It is strongly recommended to configure the cluster in that way, so that the preferred Host is selected
for each Node (see Setting Preferred Host for the Node).

To configure Host's local drive to store video archive use the clustercli.exe utility (see Configuring
Cluster). This utility provides the following commands to work with the drives:
· Adding Drive;
· Removing Drive;
· Getting Drive List.

Adding Drive

Note. Writing to the drives that have been added in such way is performed with higher priority than to the
iSCSI drive/network folder specified in the Computer object settings.

To add a Host's drive as a video archive storage execute the following command on the appropriate
Host:

Clustercli.exe drive add <drive_letter> <min_free_space> <read_write>

www.issivs.com
SecurOS 448 Administration Guide
Redundancy

where:
· drive_letter – drive letter. The following formats are allowed: C:, D:\, E:/.
· min_free_space – minimum allowable amount of free disk space in percent. When the amount of
free space is reduced to the specified value, the recording in the "ring" mode will start. Possible
values: [1; 20].
· read_write – drive access level. Possible values:
- rw – read and write;
- r – read only. In the last case one can view an archive existed on this drive, but a new files will
not be recorded.

Note. If the drive marked with specified letter has been already added its settings will be re-written.

As a result of the command execution will be a message about successful or failure drive adding.

Removing Drive
To remove previously added Host's drive execute the following command on the appropriate Host:

Clustercli.exe drive remove <drive_letter>

where:
· drive_letter – drive letter. The following formats are allowed: C:, D:\, E:/.

As a result of the command execution will be a message about successful or failure drive removing.

Getting Drive List


To get list of all drives added on this Host execute on it the following command:

Clustercli.exe drive list

As a result of the command execution will be a list of drives and their settings.

16.1.5 Cluster Creating and Setting Up Examples

This section describes main operations for cluster creating and configuring:
· Creating Cluster and SecurOS Configuration From the Scratch. Example.
· Creating Cluster in Existing SecurOS Configuration. Example.

16.1.5.1 Creating Cluster and SecurOS Configuration From the Scratch. Example
This section describes steps required to create new SecurOS configuration based on cluster.

16.1.5.1.1 Task

The task is to create a new SecurOS configuration and cluster. Cluster would consist of three Hosts and
one Operator Workstation for monitoring needs (see Cluster structure). Two Hosts will run Nodes and one
Host would serve as backup one.

www.issivs.com
SecurOS 449 Administration Guide
Redundancy

16.1.5.1.2 Requirements
To create cluster described above one will need 3 computers with SecurOS installed with Video Server
role, and 1 computer to be an Operator Workstation.

As recommended (see Recommendations), computers that considered to be Hosts must have two
different network interfaces for Hosts communication (connection name, for example, NIC_CLUSTER)
and for Operator Workstation connection (connection name, for example, NIC_VIDEO). Connection
names may differ from specified ones.

For computer that is selected to be an Operator Workstation, one network interface will be enough.

Note. All commands described below must be executed from the command line with Windows administrator
rights.

16.1.5.1.3 Computers Parameters


In this example computers have following parameters:
· Computer 1
- Domain name: Host1.
- Network interface NIC_CLUSTER: 192.168.0.101.
- Network interface NIC_VIDEO: 172.16.1.101.
· Computer 2
- Domain name: Host2.
- Network interface NIC_CLUSTER: 192.168.0.102.
- Network interface NIC_VIDEO: 172.16.1.102.
· Computer 3
- Domain name: Host3.
- Network interface NIC_CLUSTER: 192.168.0.103.
- Network interface NIC_VIDEO: 172.16.1.103.
· Computer 4
- Domain name: Operator.
- Network interface NIC_VIDEO: 172.16.1.104.

16.1.5.1.4 Steps
Cluster creation procedure consists of the following steps:
1. Creating cluster, Security Zone and Nodes.
2. Adding the second Host.
3. Adding the third Host.
4. Connecting Operator Workstation and further configuration of the SecurOS.

www.issivs.com
SecurOS 450 Administration Guide
Redundancy

To create cluster do the following with the help of clustercli.exe utility (see Configuring Cluster):
1. Switch to Computer 1 (first Host).
1.1. Create Cluster by executing following command
clustercli.exe create 192.168.0.101 172.16.1.101 172.16.20.1
Cluster will be created. There will be one Host in cluster configuration, that also will be Conf iguration
Server which virtual IP will be 172.16.20.1.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.101) network
interface. Operator Workstations will receive video through that interface.
1.2. Create Security Zone by executing command
clustercli.exe node createzone 1
This Security Zone will have ID 1.
1.3. Create Node by executing following command
clustercli.exe node create node1 172.16.20.101 1
It will start running on the recently created Host. Node will look like Computer object with Video
Server role and ID node1, child to Security Zone with ID 1. Now Computer 1 is a Conf iguration Server
with virtual IP address 172.16.20.1, and it has Node with virtual IP address 172.16.20.101
running on it.
1.4. Create second Node by executing following command
clustercli.exe node create node2 172.16.20.102 1
Second Node is not running right now and is waiting for new Hosts.
2. Switch to Computer 2 (second Host).
2.1. Add Computer 2 to the cluster by executing following command
clustercli.exe join 192.168.0.102 172.16.1.102 192.168.0.101
Now Hosts are connected through NIC_CLUSTER network interface. As soon as this Host added to
the cluster the Node with ID node2 will start running on it.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.102) network
interface.
3. Switch to Computer 3 (third, backup Host).
3.1. Add Computer 3 to the cluster by executing following command
clustercli.exe join 192.168.0.103 172.16.1.103 192.168.0.101
Last Host has joined the cluster. It will serve as backup Host.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.103) network
interface.
3.2. Check cluster state by executing following command on any of cluster members
clustercli.exe state
Cluster state will show that there are three Hosts with two running Nodes.
4. Switch to Computer 4 (Operator Workstation).
4.1. Start operator interface and specify 172.16.20.101 (one of Nodes virtual IP address) as IP
address to connect.
4.2. Log on as superuser (see SecurOS Users).

www.issivs.com
SecurOS 451 Administration Guide
Redundancy

16.1.5.2 Creating Cluster in Existing SecurOS Configuration. Example


This section describes steps required to reconfigure SecurOS so that independent Video Servers may
work in cluster.

16.1.5.2.1 Task
Transform an existed SecurOS configuration to work in cluster. Current configurations contains two
Video Servers and one Operator Workstation that is used for monitoring. It is planned to use an additional
computer that will be a backup server.

16.1.5.2.2 Requirements
In accordance to recommendations (see Recommendations), each of Video Servers and proposed backup
server must be provided with two network interfaces. One of them will be used to provide interaction
with cluster Hosts (connection name, for example, NIC_CLUSTER), the second one will be used to
connect Operator Workstations (connection name, for example, NIC_VIDEO). Connection names may
differ from specified ones.

For computer that is selected to be an Operator Workstation, one network interface will be enough.

Note. All commands described below must be executed from the command line with Windows administrator
rights.

16.1.5.2.3 Computers Parameters


Security Zone which ID is 1 already exist within SecurOS configuration.

Computers that belong to existed configuration have the following parameters:


· Video Server 1
- Domain name: Server1.
- Role: Configuration Server.
- Network interface NIC_CLUSTER: 192.168.0.101.
- Network interface NIC_VIDEO: 172.16.1.101.
· Video Server 2
- Domain name: Server2.
- Role: Peripheral Server.
- Network interface NIC_CLUSTER: 192.168.0.102.
- Network interface NIC_VIDEO: 172.16.1.102.
· Operator Workstation
- Domain name: Operator.
- Network interface NIC_VIDEO: 172.16.1.104.

Computer, that will be used as a backup server:


- Domain name: Backup.

www.issivs.com
SecurOS 452 Administration Guide
Redundancy

- Network interface NIC_CLUSTER: 192.168.0.103.


- Network interface NIC_VIDEO: 172.16.1.103.

16.1.5.2.4 Steps
Updating SecurOS configuration to work in cluster consists of the following steps:
1. Creating cluster on the Conf iguration Server.
2. Adding the second Video Server to the cluster.
3. Updating old configuration to work in cluster.
4. Adding backup server to the cluster.
5. Connecting Operator Workstation and confirmation of the operation ability.
6. Switch to the use of centralized storage.

Do the following with the help of clustercli.exe utility (see Configuring Cluster):
1. Switch to the Video Server 1 (Configuration Server).
1.1. Create Cluster by executing following command
clustercli.exe create 192.168.0.101 172.16.1.101 172.16.20.1
Cluster will be created. There will be one Host within cluster configuration, that will continue to be
Conf iguration Server. 172.16.20.1 virtual IP address will be used as IP address of this
Conf iguration Server. SecurOS configuration is saved unchanged.
At this stage the peripheral server will continue to work, having lost the connection with its old
Conf iguration Server. Actually, it will work with its current SecurOS configuration until it is added to
the cluster.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.101) network
interface. Operator Workstations will receive video through that interface.
2. Switch to the Video Server 2 (old Peripheral Server).
2.1. Add Video Server 2 to the cluster by executing following command
clustercli.exe join 192.168.0.102 172.16.1.102 192.168.0.101
This Video Server also became cluster Host. Now Hosts are connected through NIC_CLUSTER
network interface. SecurOS configuration is synchronized.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.102) network
interface.
3. Transform Computer objects to cluster Nodes by executing the following commands:
clustercli.exe node update Server1 172.16.20.101
clustercli.exe node update Server2 172.16.20.102
If commands terminates successfully, then Computer objects are the cluster Nodes for now. Each of
commands cab be executed on any of two Hosts. Nodes will have the 172.16.20.101 and
172.16.20.102 virtual IP addresses, respectively.
4. Switch to Computer 3 (third, backup server).
4.1. Add Computer 3 to the cluster by executing following command
clustercli.exe join 192.168.0.103 172.16.1.103 192.168.0.101
Last Host has joined the cluster. It will serve as backup Host.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.103) network
interface.
4.2. Check cluster state by executing following command on any of cluster members

www.issivs.com
SecurOS 453 Administration Guide
Redundancy

clustercli.exe state
Cluster state will show that there are three Hosts with two running Nodes.
5. Switch to Operator Workstation.
5.1 Start operator interface and specify 172.16.20.101 (one of Nodes virtual IP address) as IP
address to connect.
5.2 Authorize.
6. Configure Computer objects that correspond to cluster Nodes, so that the archive recording is kept on
a centralized storage (see Storing Data in Cluster).

16.1.6 Resolving Common Issues

This section describes following problems:


· Quorum Loss.
· Restoring Operating System from Backup.
· Unable to Connect Operator Workstation.

16.1.6.1 Quorum Loss


Quorum loss (see Cluster Operation. Quorum) may happen due to following reasons:
· Half or more Hosts in cluster fails;
· There was a mistake while adding Host to cluster.

As far as cluster configuration cannot be changed without quorum, adding new Hosts is impossible and
will not solve the problem. There are two ways to restore quorum state:
1. Restore failed Hosts.
2. Recreate cluster with only working Hosts in it (see Recreating Cluster).

Second way allows to partially restore system's functionality and also opens ability to add new Hosts.

16.1.6.2 Restoring Operating System from Backup


Restoring Host's operating system from backup may cause negative impact on cluster state. In this
regard, dependently on current cluster state, the procedure can be performed in different ways:
· In quorum state — in this case cluster functionality will not be interrupted. One can restore from
backup without any concerns.
· Quorum state lost — in this case Hosts that were restored from backup may damage cluster
configuration after returning to quorum state. It is recommended to perform cluster recreation
procedure (see Recreating Cluster) before restoring from backup. Follow these steps:
1. Execute cluster recreation command on one of live Hosts.
2. Restore failed Hosts operating systems from backup.
3. Add all Hosts back to cluster.

www.issivs.com
SecurOS 454 Administration Guide
Redundancy

16.1.6.3 Unable to Connect Operator Workstation


Operator Workstations may lose ability to connect to Video Servers due to following reasons:
· Situation 1: Security settings do not allow servers to accept connection from Operator Workstations.
In this case the solution will be to connect as superuser (see SecurOS Users) and change
settings.
· Situation 2: There no running Nodes or working Video Servers that Operator Workstation can connect
to.
If the license key allows, one can create one more Node (see Adding Node) and connect to it. If it
is not possible then one can convert failed Video Server to Node (see Converting Video Server to
Cluster Node). If converting to a Node is not a suitable solution, one can delete this Video Server
and create a Node instead.

16.1.6.4 Updating Software and Hardware within Cluster System


To update software/hardware in cluster configuration do the following:

1. Update procedure must be started on computers that are the members of cluster. Switch cluster to
the fixed_cs service mode (see Service mode). This mode will not allow other Host to get the
Conf iguration Server role during system updating procedure. Otherwise system configuration can be
corrupted.
2. Find out which of the cluster Hosts is the Conf iguration Server (see Getting Current Cluster
Configuration). If it is necessary, assign the Conf iguration Server role to the Host that is more
convenient for updating (see Setting Configuration Server).
3. Execute all required software/hardware update operations on the Conf iguration Server.
4. Update backup Hosts on which no Nodes are currently running.
5. Consistently update the Hosts on which the Nodes are currently running. To upgrade software on the
Hosts do the following:
· Stop the Video Management System Server system service and disable its automatic start on
the Host being updated.
· Make sure the Node has started running on the backup Host.
· Update software.
· Start the Video Management System Server and enable its automatic start.
6. Turn service mode off.
7. Update computers that are not members of the cluster.

16.1.7 Limitations

Using cluster in SecurOS configuration has following limitations:


· Cluster can only be deployed under 64 bit OS.
· Only one cluster in configuration.
· By default, cluster operation is only possible if all the IP addresses used by the cluster are in the
same subnet. To provide cluster operation in case the IP addresses are in a different subnets, it is
necessary to ensure the availability of cluster IP addresses from the other subnets, that may require
additional configuration of the network equipment.
· Conf iguration Server role can be assigned only to cluster member.

www.issivs.com
SecurOS 455 Administration Guide
Redundancy

· One Host can run only one Node at the same time.
· System time on all Hosts must be synchronized;
· The following Modules will not work on the cluster's Hosts:
- POS;
- WebView;
- SNMP;
- SecurOS UVSS.
· Use of Archiver on cluster Hosts in Continuous and Scheduled modes (see Archiver) is not
supported. To provide continuous access to the created Long-term archive it is recommended to use
Network f olders or iSCSI drive.
· Detailed Mobile Server configuration is described in SecurOS Mobile Quick Start Guide.
· Detailed ActiveMedia Kit configuration is described in SecurOS ActiveMedia Kit Guide.
· SecurOS objects, concerning with computer settings or files, located on this computer, must be
duplicated on all Hosts of the cluster.

16.2 Redundant Servers Cluster


In some cases hardware requirements to the configuration do not allow to use classic cluster to provide
redundancy. In these cases a Redundant servers cluster can be created.

This approach is based on the ability of the cluster to act as a redundant group for non-cluster servers.
Number of such servers can significantly exceed the number of cluster members. Thus, most of the time
Nodes are working outside the cluster. The most common scenarios for using a redundant servers
cluster are the following:
1. A distributed configuration where SecurOS runs on computers that do not have a stable connection
to the cluster (see the example in Creating Configuration on the Base of Redundant Servers
Cluster.
2. The configuration consists of two computers (1+1) and one of them is redundant (see example in the
Creating "1+1" Cluster from Existing SecurOS Configuration. Example).

Warning! Redundant servers cluster does not support working with the centralized data storage. Use
computer's local hard drives to store archive and databases.

16.2.1 Creating Configuration on the Base of Redundant Servers Cluster

This section describes steps required to create new SecurOS configuration based on redundant servers
cluster.

16.2.1.1 Task
Create a new SecurOS configuration based on the Redundant Servers Cluster. In this configuration, a
small group of clustered servers will provide redundancy to the servers connected to the cluster as
auxiliary.

www.issivs.com
SecurOS 456 Administration Guide
Redundancy

16.2.1.2 Steps
To organize redundancy based on a redundant servers cluster perform the following steps:
1. Install SecurOS on all computers.
2. Run the Server Manager utility on any server.
3. Add all servers to the Host list (see Working with Host List).
4. Determine which of the servers will be redundant.
5. Create a cluster based on one of the redundant servers (see Managing Cluster, Creating Cluster).
6. Add other redundant servers to the created cluster (see Managing Cluster, Adding host to the
cluster).
7. Connect to any Host using the Server Manager utility (see Connecting to Host for Configuring).
8. Using the operator interface, create the required number of Nodes. To do this, go to the settings of
each created Computer object and select the Enable failover of the Video server and add to the
cluster checkbox, and also set virtual IP addresses of the Nodes in the Server IP address field.
Number of Nodes must match the number of computers that you plan to connect to the redundant
servers cluster as Non-cluster hosts.
9. Connect computers that will run SecurOS most of the time to the cluster (see Managing Cluster,
Adding host th the cluster). When adding these Hosts to the cluster, select the Non-cluster host
type.
10.For each Node, define a priority Host from the list of Non-cluster hosts (see Managing Nodes,
Choosing / Viewing preferred host).

After completing these steps, the system is operational, and the cluster provides redundancy.

16.2.2 Creating "1+1" Cluster from Existing SecurOS Configuration. Example

This section describes the steps required to organize redundancy using only one redundant server.

16.2.2.1 Task
Transform an existed SecurOS configuration to work in "1+1" cluster. Current configuration includes
one Video Server. It is planned to use additional computer to provide redundancy.

16.2.2.2 Computers Parameters


The cluster will be created on the basis of the following equipment:
· Server1 is the computer that initially runs SecurOS.
· Server2 is the computer that is planned to be added to the cluster as a redundant Host.

16.2.2.3 Steps

To reconfigure the SecurOS configuration to work with a "1+1" cluster, follow these steps:
1. Save the SecurOS configuration of the Server1 computer (see System, Saving and restoring
configuration block).
2. Install SecurOS on the Server2 computer.
3. Run the Server Manager utility on Server2 computer.

www.issivs.com
SecurOS 457 Administration Guide
Redundancy

4. Add computers Server1 and Server2 to the Host list (see Working with Host List).
5. Create a new cluster based on the Server2 computer (see Managing Cluster, Creating Cluster).
6. Using the Server Manager utility, restore the configuration on the Server2 computer using the json
file obtained in the first step (see Restoring SecurOS Configuration).
7. Connect the Server1 computer to the cluster as a Non-cluster host host (see Managing
Cluster, Adding host to the cluster).
8. Connect to the Server2 computer (see Connecting to Host for Configuring).
9. In the SecurOS Object Tree, open the Server1 computer object settings window (see Computer).
Select the Enable failover of the Video server and add to the cluster checkbox, and also set virtual
IP addresses of the Node in the Server IP address field. After saving the settings, a Node with the
Server1 name will appear in the list of the Server Manager utility (in addition to the Host of the
same name).
10.Select Server1 Host as a preferred for Server1 Node (see Managing Nodes, Choosing / Viewing
preferred host).

www.issivs.com
SecurOS 458 Administration Guide
Interaction with External Emergency Service

17 Interaction with External Emergency


Service
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

Using SecurOS security system one can inform external Emergency service about incident or emergency
situation. Message is sent as Emergency ticket that contains detailed information about event. Further
message processing is performed by Emergency service operator.

Emergency ticket can be created with the help of Event Viewer or Media Client.

The following object must be configured in SecurOS to create and send the Emergency ticket:
· Emergency service — this object prepare data that can be transferred in Emergency ticket:
- HTTP address of Emergency service.
- list of cameras for which it is possible to create Emergency ticket and addresses of their physical
location.
- parameters for creation links to the video related to the incident. Using created link an Emergency
service can download video. Both live and archive video can be downloaded. RTSP Server or
WebView module are used to download video (see SecurOS WebView User Guide).
- incident types list. Create and download to the SecurOS incident types list, that is required to
send Emergency ticket (see Incident Types List. File Format).

Note. Emergency ticket can be sent both from the local system and from the Monitoring Center (see Monitoring
& Control Center) when processing events of the Remote system. In the latter case, the physical address of the
Camera location specified in the settings of the Emergency service object of the Remote system is transmitted in
the emergency ticket. All other incident parameters and links to access the incident video are set in the settings
of the Emergency service object of the Monitoring Center.

· Event Viewer — possibility to create and send the Emergency ticket (Send Ticket to Emergency
Service parameter) is configured. Using protocol entries relevant to the Camera object operator can
watch live or archive video of the event in the Media Client and/or create and send Emergency ticket.
· Media Client — possibility to create and send the Emergency ticket (Send Ticket to Emergency
Service parameter) is configured.

After system is configured it operates as follows:


1. Using an Event Viewer or a Media Client operator controls beginnings of the incidents or
emergency situations.
2. If appropriate entry is added to the Event Viewer operator watches the video and makes a decision if
a message must be sent to external Emergency service. When working with video using a Media
Client operator controls the situation visually.

www.issivs.com
SecurOS 459 Administration Guide
Interaction with External Emergency Service

3. If decision is made operator creates and sends Emergency ticket. Emergency ticket can be created and
sent both with the help of Event Viewer and Media Client (see SecurOS Quick User Guide).

Emergency ticket contains two part of data: the first part is displayed in the interface window and is
visible to the operator (see Table 104), and the second part is not (see Table 105). Data are sent to the
Emergency service in JSON format.

Table 104. Parameters of the message that are displayed in the Emergency ticket

Parameter Description

Incident Time. When sending an Emergency ticket from the Event


Incident Time Viewer is filled with event time. When sending an Emergency ticket
from the Media Client is filled with frame time.

Address of the incident place. In the Emergency ticket interface


window is displayed as a Camera's ID and name. At the same time in
Incident Place the transferred message body these data are replaced by physical
address of the camera location specified in the Emergency service
settings.

Coordinates of the camera, that recorded the incident video


Incident coordinates
(see General Tab).

Incident Type Choose incident type from the list.

People in danger Select this checkbox if an incident poses a threat to people.

Textual comment on the incident. Is filled automatically by system


Additional Info (if the Comment field of the Event Viewer table contains entry) or
can be filled manually by operator.

Table 105. Parameters of the message that are not displayed in the emergency ticket

Parameter Description

Personal data of the operator (Name and Phone number) who


create and sent an Emergency ticket, where:

· Name — Name of the User account from the Object tree;

Note. Data are sent as the <Last name><First name><Middle


name> structure that are created from the Name string as follows: the
<Last name> field is filled in by the first part (substring) of the
object's Name. the <First name> field is filled in by the second part
(substring) of the Name string, that is separated from the first part by
Source of information space. the <Middle name> field is filled in by the third part
(substring) of the object's Name, that is separated from the second part
by space, too. If there are no parts (substrings) separated by space in the
object's Name, then whole sting is substituted for the <Last name>
field. Other fields remain empty. For example, the Name of the object is
specified by the following string: Jameson John. In this case the
Jameson value will be substituted for the <Last name> field and
the John value — for the <First name> field. The <Middle
name> will be empty.

www.issivs.com
SecurOS 460 Administration Guide
Interaction with External Emergency Service

Parameter Description

· Phone number — is the Phone parameter value from the User


account object.

Links to connect to the RTSP or WebView servers to watch video.


Links to watch video Note. To create these links the parameters specified in the Emergency
service object settings are used.

www.issivs.com
SecurOS 461 Administration Guide
Special Purpose Modules

18 Special Purpose Modules


This section describes modules that measure some characteristics of tracked object. Usually, such
modules work in conjunction with the SecurOS intelligent modules. The section provides a description
of the following special purpose modules:
· Thermometer.

18.1 Thermometer
The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

Warning! Module operation requires the special equipment. Contact Intelligent Security Systems Technical
Support Team for a list of compatible hardware.

The object is designed to measure the body temperature of the person in the frame. Face detection and
recognition in the frame is performed using the SecurOS FaceX intelligent module (see SecurOS FaceX
User Guide). When the maximum allowed body temperature of a person is exceeded, an alarm event is
generated in the system.

Parent object — Computer.

Warning! Only one Thermometer object can be created on each Video Server.

Figure 277. Thermometer object settings window

www.issivs.com
SecurOS 462 Administration Guide
Special Purpose Modules

Table 106. Thermometer object settings

Parameter Description

Common settings

Select the thermal camera. The list displays only those Cameras that
Thermal camera belong to the same Security Zone object as the Thermometer object
that is being configured.

Select FaceX: Server object that will be used to identify the person.
The list displays only those objects that belong to the same Security
Zone object as the Thermometer object that is being configured.
FaceX: Server
Note. In the FaceX: Server object settings, it is necessary to enable the
Face position event on each frame option on the Common settings tab.

Select the Camera configured in the FaceX module to detect and


recognize faces in the frame.
Warning! To ensure the coordinated operation of the complex, the selected
FaceX Camera FaceX Camera must be set to the same scene as the Thermal camera.

When comparing a face detected in the frame with the measured


temperature of this person, the MEASURE_RESULT event is
generated (for more details, see SecurOS Programming Guide).

Specify the maximum allowed body temperature of a person. If this


temperature is exceeded, an alarm event will be generated in the
Maximum allowed system. If the temperature passed with the MEASURE_RESULT event
temperature exceeds the specified value, then the TEMP_EXCEEDED event is
generated in the system (for the details see SecurOS Programming
Guide). Range of values: [0.0 - 200.0]. Default value is 37.0.

Fine tuning

Specify the maximum discrepancy (in milliseconds) between the


timestamp of the frame from which the body temperature was
determined and the timestamp of the frame in which the face was
Measurements alignment identified with maximum confidence. The lower the specified value,
delay the more accurate the measurement results will be. Low values can
significantly increase the time that a person must remain in the
camera field of view. Range of values: [10 - 100]. Default value is
25.

www.issivs.com
SecurOS 463 Administration Guide
Light Integration

19 Light Integration
This section describes light integration of SecurOS with the external FAAC (Fire Alarm/Access Control)
and radiation monitoring systems.

19.1 General Description


SecurOS provides integration with external ACS and radiation monitoring systems. The interaction
model presumes that the external module transfers some events to SecurOS where these events can be
processed.

Note. The list of event supported by SecurOS for the external system is defined in the internal integration
module of the external system.

Processing of the events generated by the external system can result in the changing state of the external
system object placed on the Map, displaying SecurOS™ form that requires an operator's action (for
example, displaying short message window to call police). It is also possible to send a control action to
the external system modules (supported only by those modules that has this possibility specified in
external system).

Program interface with the external system is provided by SecurOS internal executor, that corresponds
to external system integration.

The root <integration_name> integration object is used to describe and control the external system from
inside SecurOS. The integration object tree (external system modules tree) is built automatically on the
base of the file, that describes external system configuration (see Integration Point).

After object tree is built any of its entries can be placed on Map. Further operation with objects of the
external system placed on Map is similar to operations with typical SecurOS objects placed on the Map.

One of the following methods can be used to transfer control actions to the external module:
· using Macro (see Macro);
· when running a Node.js Script (see Node.js Script);
· as a result of operation executed with the object placed on Map (see Map).

Logging of interactions between SecurOS and the external system and operations with the integration
object tree is performed separately — events generated by the external system are stored in the SecurOS
log, while operations with the external system object tree are stored in an independent log-file.

19.2 Integration Point


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

In Linux OS the functionality is not supported.

www.issivs.com
SecurOS 464 Administration Guide
Light Integration

This object is designed to integrate external custom application into SecurOS. This is an API that
implements the description of an external system in SecurOS and interacts with it using messages that
use SecurOS Events and Commands.

Using this interface one can do the following:


1. Connect external system and SecurOS and control connection state;
2. Represent the configuration of the external system in the SecurOS Object Tree as a hierarchical
structure;
3. Represent and control external system objects with the help of SecurOS user interfaces (Map: GUI,
Macroses);
4. Display events of the external system in the Event Viewer and states of external system objects on
the Map.

Parent object — Computer\Integration and Automation group.

Figure 278. Integration point object settings window

Table 107. Integration point object settings

Parameter Description

Update configuration Click this button to build configuration of the external system in the
(button) SecurOS Object Tree as hierarchical structure of objects.

Refer to UinP User Guide for a detailed explanation of how to configure system and use the Integration
point object.

Note. UinP User Guide is not included into common documentation package and is provided by request.

www.issivs.com
SecurOS 465 Administration Guide
Keyboard Shortcuts

20 Keyboard Shortcuts
This section describes shortcuts used to perform actions on different SecurOS objects.

20.1 Administration Toolbar


Table 108. Shortcuts for working with SecurOS objects

Shortcut Description

Esc Close object settings window or SecurOS Object Tree window

In the Administration mode:

· if object settings window is opened it calls the help topic


F1 associated with this object;

· if object settings window is closed it calls the help topic


associated with the Administration Center.

F2 Rename the selected object

Open all children branches for the selected object (plus additional
*
level on each key button pressed)

- (Num Pad) Close a child branch for the selected object

+ (Num Pad) Open a child branch for the selected object (one level)

Enter Open the selected object properties window

Delete Delete the selected object

Space Disable/enable selected object or all Group children objects

Ctrl+B Add object to Favorites. Remove object from Favorites

Ctrl+F Open/close Object search panel

Displaying the menu for objects creation or for all Group children
Ctrl+N
objects creation

www.issivs.com
SecurOS 466 Administration Guide
Appendixes

21 Appendixes
This section contains a description of system utilities and other additional information useful to
configure and operate the system.

21.1 Appendix A. Upgrading/Uninstalling Software


This section describes SecurOS upgrading and uninstalling specifics.

21.1.1 Upgrading Software

To upgrade software do the following:


1. Start the installation program by launching the setup file of the new software version.
2. Further installation steps are similar to ones for the first installation (see SecurOS Installation and
Update on Windows).

21.1.2 Uninstalling Software

· Uninstalling SecurOS in Windows.


· Uninstalling SecurOS in Linux.

Uninstalling SecurOS in Windows


Uninstalling SecurOS is done in two steps:
· uninstalling software;
· removing video/audio archives and configuration database (optional).

To uninstall SecurOS software do one of the following:


· Launch the setup file of the currently installed software version. The system will display the
Program Maintenance window (see figure 279)

www.issivs.com
SecurOS 467 Administration Guide
Appendixes

Figure 279. Program Maintenance Window

Select Remove option to uninstall the software, click Next button to continue.
· In the Start Windows menu choose the following menu options All Programs ® SecurOS ®
Uninstall SecurOS.
SecurOS software will be uninstalled automatically.

Aside from uninstalling the software, you may want to delete all video and audio archives as well as
the configuration database, all of which are not deleted automatically by the InstallShield Wizard.

Thus, this step should be done manually: to remove primary and long-term archives, delete
\ISS_MEDIA and \ARCHIVE\ISS_MEDIA directories (usually located on one or more hard drives in
the root directory, for example C:\ISS_MEDIA, D:\ARCHIVE\ISS_MEDIA).

To delete configuration database (PostreSQL) launch uninstall-postgresql.exe file from the C:


\Program Files\PostgreSQL\X.Y directory, or use Add or Remove Programs option.

Unistalling SecurOS in Linux


To delete SecurOS in Linux run one of the following commands:
· sudo apt-get remove securos, that will start the standard deletion;
· sudo dpkg -P securos, that will start the complete deletion (including databases cleaning).

After uninstalling the software, delete the archives and/or database manually, if necessary.

21.1.3 SecurOS Version Upgrade Features

This section describes upgrade features of the SecurOS from earlier versions.

www.issivs.com
SecurOS 468 Administration Guide
Appendixes

21.1.3.1 Release 9.3 and Earlier Updating Procedure


Some changes, which should be noted during the update, have been made in SecurOS 9.4:
· Running SecurOS server part as OS service.
· Administrating SecurOS from Operator Workstation.
· Archive recording.

Running SecurOS server part as OS service


Starting from Release 9.4 Server part runs only as OS service. Client part implements operator GUI and
runs as stand-alone application.

If you previously ran the Server part as an application, pay special attention to the following:
1. By default, Server part is running as Local System system user. This can cause the network folders
mounted as network drives and previously selected for archive recording in the Computer object
settings will be unavailable. To record an archive to shared network resource use network folders
instead of mounted drives in the Computer object settings.
2. Notification about Server part crashes with the help of OS information messages displayed in
separate windows is discontinued. Information about such crashes one can find in the OS log (Event
Viewer ® Applications and Services Logs ®
SecurOS). Information about Server part starting
failures is saved into the securos_svc.log file, located in the %ProgramData%\ISS\logs folder.

Administrating SecurOS from Operator Workstation


Support of the Computers, role of which is Administrator Workstation has been discontinued. SecurOS
administration features have been moved to the Operator Workstations.

When updating pay special attention to the following:


1. All Administrator Workstations are transformed into Operator Workstations.

Note. Servers to connect list for each transformed Operator Workstation will be empty. This means that
Operator Workstation can connect to any Video Server within network. For the connection details refer to Servers
to Connect Tab section.

2. Components of all SecurOS Intelligent Modules that are used within the system must be installed on
each Video Server and Operator Workstation (see User Guide for the corresponding Module for the
details).
3. Versions of the SecurOS and SecurOS Intelligent Modules must be the same on all Computers within
network (see SecurOS Updade Order).

Archive recording
The archive is recorded into files of specified size, which allows to reduce their fragmentation and, as a
consequence, to increase the disk writing speed. Efficiency of this mechanism depends of free disk
space.

Note. Intelligent Security Systems recommends to use 10%. This value is also recommended by Microsoft
Corporation for NTFS partitions. One can change this value in the Computer object settings.

When working with SecurOS 9.4 pay special attention to the following:

www.issivs.com
SecurOS 469 Administration Guide
Appendixes

1. When updating to version 9.4 free disk space will be automatically recalculated for each disk.
Calculated value will be offered by default. This value can be changed with Archive recording slider
(see Archive).
2. After updating the Save space mode is set automatically (see Archive).

21.1.3.2 Release 9.6 and Earlier Updating Procedure


Some changes, which should be noted during the update, have been made in SecurOS 10.0:
· Connecting Operator's Workstations to Video Servers without additional settings. Access
limitation.
· Operator Workstation Profiles.
· Using additional network ports.

Connecting Operator Workstations to Video Servers without additional settings. Access limitation
Starting from Release 10.0 Client part can be launched on any computer, even it is not represented in the
SecurOS Object Tree.

Settings for limit access of Operator Workstation to the Video Servers are located in the Security Zone object
settings window now. Servers to Connect Tab allows to limit connections to specific servers
(see Servers to Connect Tab) to provide automatic load balancing and automatic reconnection.
Connection Restrictions Tab allows to create white list of the computers, that can connect to the Video
Servers within the system (see Connection Restrictions Tab).

Operator Workstation Profiles


A new feature – Operator Workstation Prof iles has been designed for making unified operator interfaces,
that may be used on many computers simultaneously. Details and restrictions of working with profiles
are described in the Operator Workstation Profiles.

Using additional network ports


To provide SecurOS working it is necessary to open 21112 network port, that provides communication
between Client and Server parts.

21.1.3.3 Release 10.0 and Earlier Updating Procedure


Starting from Release 10.0 the SecurOS configuration may include a cluster (see Failover Cluster).
Sequence of steps to update such a configuration is described in the Updating Software and Hardware
within Cluster System.

21.1.3.4 Release 10.1 and Earlier Updating Procedure


In Release 10.2 the cluster was powered with the extended capability for storing video archive on the
local drives of the Hosts. At the same time, the procedure for configuring disks has been changed. If
local drives have been used to store video archive in cluster they must be reconfigured (see Storing
Video Archive on the Host's Local Drives).

21.1.3.5 Release 10.2 and Earlier Updating Procedure


In Release 10.3 user access to the camera's wiper and camera's illumination is controlled via User Rights
object settings. Operator must have Control or above access level to the Camera object to control its
wiper or illumination.

www.issivs.com
SecurOS 470 Administration Guide
Appendixes

Events redirection functionality has been updated. When updating SecurOS up to the version 10.3 it is
necessary to redefine rules for events redirection between the computers that have been set for the
version 10.2 or below (see Servers to Connect Tab).
21.1.3.6 Release 10.3 and Earlier Updating Procedure
In the Release 10.4 there are some differences in the operation of the Core, Audio and Video Subsystems
objects described in the following subsections:
· Core Subsystem Operation Features.
· Video Subsystem Operation Features.
· Audio Subsystem Operation Features.

Core Subsystem Operation Features


When using SecurOS some service files on the Peripheral Servers and Operator Workstations can be edited
locally and differ from the same files on the Conf iguration Server. After upgrading software to the
version 10.4 all such files on all Peripheral Servers and Operator Workstations within SecurOS network
will be automatically replaced by files from the Conf iguration Server. For the list of files to be updated
see SecurOS Files Synchronization.

Video Subsystem Operation Features


Automatic rearrangement of the date and time of the beginning and end of the fragment when playing
the archive in the opposite direction is not supported anymore. In the version 10.4 the order of the
date setting during reverse playback is defined by the system settings (for more details see the RTSP
Server section).

Audio Subsystem Operation Features


In the version 10.4 the new format of the audio files for the archive records is supported. As a result of
this, after upgrading to version 10.4 it is necessary to take into account the following features of
SecurOS operation:
· Video archive recorded in the SecurOS version 10.3 and below, will be played back by default
without audio in the version 10.4. To provide playing back the video archive together with the
recorded sound, one must convert the accompanying audio file to a new format (see Outdated
Audio Archive Updater Utility).

Note. To playing back in SecurOS MCC the archive with soundtrack recorded in the Remote systems no
conversion of such archives in the Remote Systems is required.

· When playing back an archive recorded with the soundtrack the case when frames are played back
with no sound is possible. When deleting files “in a ring” mode in case of expiration of their storage
period, the lower time boundary of the oldest remaining files may differ. This feature is specific
only for the first hour of the entire time period of the archive.
· New format of the audio files is not supported by the Media Export Utility.
· SoundMixer Audio Capture Device is no longer supported. When upgrading to the version 10.4 the
Type field in the settings of all existing devices of such type will be cleared.

www.issivs.com
SecurOS 471 Administration Guide
Appendixes

21.1.3.7 Release 10.6 and Earlier Updating Procedure


In Release 10.7 access restriction to the Remote system implemented for SecurOS MCC Direct Connect .
Access is granted only if the password transmitted by the Monitoring Center when connecting to the
Remote system corresponds to its settings.

For this reason, immediately after updating the Remote System SecurOS software to the version 10.7,
access to it from the SecurOS MCC will be temporarily blocked. To restore an access do the following:
1. In the configuration of the Remote system open the System object settings window. Select the Allow
access checkbox and specify access password.
2. In the configuration of the SecurOS MCC specify correspondent access passwords to the Remote
systems in the Remote System objects settings.

21.1.3.8 Release 10.7 and Earlier Updating Procedure


Starting with the Release 10.8, SecurOS implements a new, more secure standard for user authorization
to work with the SecurOS modules. In this regard, after updating to version 10.8, it is necessary to
update the settings of some modules (in particular, the passwords of all SecurOS users that were created
in earlier versions). This will ensure a reliable user work with all SecurOS modules available in the
configuration. When updating passwords, you can use the old (current) values, but you just need to
enter and save them again.

Note. User passwords do not need to be updated, but in this case work with some modules (for example,
RTSP Server) is not guaranteed.

Objects whose settings require updating are called "problem". To indicate and search for such objects,
the Health Monitor module (see the System section) and the SecurOS Administration Center (see the
Objects Requiring Configuration section) have been improved.

A direct description of the object settings problem and recommendations for the administrator are given
in the problem object settings window (see the Objects Requiring Configuration section).

21.1.3.9 Release 10.9 and Earlier Updating Procedure


Starting from SecurOS version 10.10 name of the system service that corresponds to the Server part is
changed to Video Management System Server, and the name of executive file is changed from
securos_svc.exe to vms_server.exe. By default server part is started by Local System user. If
there was different user specified for previous version of SecurOS, the credentials must be updated in
the system service settings (user name, password).

21.1.3.10 Release 10.10 and Earlier Updating Procedure


The following objects were removed In the SecurOS Release 11.0:
· HTML Form.
· HTML Dialog.

In SecurOS Xpress (abolished) editions of the Release 11.0. Before updating the specified editions to
version 11.0, these objects must be removed from the SecurOS Object Tree.

www.issivs.com
SecurOS 472 Administration Guide
Appendixes

21.1.3.11 Release 11.2 and Earlier Updating Procedure


Starting with release 11.3 some SecurOS components use the universal network port 21111
(see Appendix E. Network Ports Used in SecurOS). Using the universal port simplifies the
configuration of the firewall.

Warning! For correct operation, the Video Server SecurOS version must match or be higher than the version of
the connected Operator workstations

21.1.3.12 Release 11.3 and Earlier Updating Procedure


Starting with release 11.4, the SecurOS installer on Windows has become the same for all editions. The
edition is determined by the SecurOS license key.

21.1.3.13 Release 11.4 and Earlier Updating Procedure


Since release 11.5, on Linux OS the SecurOS kernel daemon securosd has been renamed to
vms_server.

Since version 11.5, Node.js scripts are located in the <SecurOS root directory
>\bin64\node.js\node_modules folder.

21.1.3.14 Release 11.5 and Earlier Updating Procedure


Starting with release 11.6, you do not need to create EdgeStorage Gate and EdgeStorage Sync objects to
work with Cameras that support Edge Storage technology. To use Edge Storage, it is enough to select
the Playback archive from the edge device (EdgeStorage Gate) or Recover archive from the local
storage of Camera (EdgeStorage Sync) checkboxes in the Camera object settings (see Recording Tab).

21.2 Appendix B. Updating PostgreSQL


Starting from version 10.7 SecurOS supports work with PostgreSQL versions 12.0, 12.1 and 12.3
(hereinafter PostgreSQL 12).

There are following possible PostgreSQL installation options:


· When installing SecurOS for the first time — PostgreSQL 12.3 is installed. In this case SecurOS is
ready to run right after the installation is finished. No additional actions required.
· When updating SecurOS — PostgreSQL is not installed, SecurOS keeps working with current
PostgreSQL version. To update it download one of supported PostgreSQL versions and move data
from the old database to a new one using one of the following approaches.
· If there is PostgreSQL 9.X or PostgreSQL 12 already installed on the server, but SecurOS installation
is running for the first time — PostgreSQL is not being installed. To work with PostgreSQL 12 make
sure that currently installed version of PostgreSQL 12 is supported to work with SecurOS.
Otherwise you can download and install one of supported versions. After that move the data from
the old PostgreSQL 9.X database to the new one using one of the following methods or reconfigure
SecurOS to work with currently installed and supported version of PostgreSQL 12.

If it required to save data of current PostgreSQL version (e.g. 9.1) when moving to the newer version,
the migration procedure must be executed. Migration procedure may be executed with one of the
following methods:

www.issivs.com
SecurOS 473 Administration Guide
Appendixes

· Using physical data copy — this method is simple to use, but requires a significant time to
physically copy the data and to stop SecurOS servers for the whole copying period. SecurOS servers
become unavailable until data coping is finished.
· Using logical data replication — this is the preferred method due to short (a few minutes) SecurOS
server stops for executing some brief operations. Compared to the first method this one requires
more detailed configuration.

Warning!
1. Save current SecurOS configuration (see System) in case of unexpected errors during the data
migration procedure.
2. Before using any method make sure that user that executes the migration procedure has read and
write rights for the directories where all involved PostgreSQL versions are installed.
3. Configuration files of an old PostgreSQL version is not copied during the migration.

Using physical data copy


When using this method the migration is provided by pgupgrade.bat script, that represents default
PostgreSQL migration tools.

Note. By default the script is copied to the <installation_path_SecurOS\pgupgrade> folder after


installing SecurOS.

To move data using default PostgreSQL 12.X tools:


1. Download and install the last stable PostgreSQL 12.X version, if it is necessary.
2. Make sure that user has read and write rights for the
<installation_path_SecurOS\pgupgrade> folder, where the pgupgrade.bat file is located
and where the migration procedure log will be saved to. If required create a new folder on the file
system of the server where the migration procedure is being executed. Grant user read/right
permissions on created folder. Copy the pgupgrade.bat file to the created folder. Migration
procedure log files will be saved to the same folder.
3. Open pgupgrade.bat to edit it.

Warning! If paths to the old and to the new versions of PostgreSQL do not differ from default values (C:
\Program Files (x86)\PostgreSQL\9.1 and C:\Program Files\PostgreSQL\12), there
is no need to edit pgupgrade.bat file.

4. Replace the following lines with paths to the old and the new versions of PostgreSQL:

@rem set "PGOLD_BIN=c:\Program Files (x86)\PostgreSQL\9.1\bin"


@rem set "PGOLD_DATA=c:\Program Files (x86)\PostgreSQL\9.1\data"
@rem set "PGNEW_BIN=c:\Program Files\PostgreSQL\12\bin"
@rem set "PGNEW_DATA=c:\Program Files\PostgreSQL\12\data", where:

· PG_OLD — variables with paths to folders that correspond to the old PostgreSQLversion;
· PG_NEW — variables with paths to folders that correspond to the new PostgreSQLversion.

Warning! During the update process all data from the PGNEW_DATA folder will be deleted. PostgreSQL
user rights will be moved from PGOLD_DATA folder to PGNEW_DATA folder.

5. Stop SecurOS server.


6. Stop all working PostgreSQL Services.

www.issivs.com
SecurOS 474 Administration Guide
Appendixes

7. Run the cmd command line as administrator.


8. From the command line run the pgupgrade.bat file with one of the following parameters:
· copy — migration of the old database by copying (slow). It is possible to move data to other drive.
In case of errors old database stays capable;
· link — migration of the old database by hard links (fast). It is possible to move data only on the
same logical drive. In case of an error both databases, the old one and the new one, become broken.

Warning! Before starting the pgupgrade.bat with this parameter it is recommended to create Windows
restore point.

For example:

> cd c:\upgrade
> pgupgrade.bat link

9. If there are no error messages in the cmd console the migration is considered to be successfully
finished.
10.Start SecurOS server and PostgreSQL 12.3 service.

Migration by logical replication


With this method database replication is being done without stopping SecurOS server. The replication
procedure is executed by pgtool.exe utility that represents default PostgreSQL migration tools.

Note. By default the script is located in the <SecurOS_root_folder> after installing SecurOS.

To move data by logical replication:


1. Download and install the last stable PostgreSQL 12.X version, if it has not been installed yet.

Warning! For proper data replication the server that is being updated must have Microsoft Visual Studio C++
2010 Redistributable package installed.

2. Create the SLONY_SHARE_DIR environment variable. Set the path to the share folder located in the
PostgreSQL 12 folder (e.g. D:\PostgreSQL12\share) as its value.
3. To start and work the pgtool.exe migration utility correctly the user must have a read/write
rights to the utility installation folder (<SecurOS_root_folder>).
4. Run the cmd command line as administrator. To start and work the pgtool.exe migration utility
correctly, in the cmd console specify full path to the folder where the utility is installed.
5. Create the script set to prepare new database of 12.X version. In the script parameters define the
following:
· full paths to the old and to the new versions of PostgreSQL (by default C:\Program Files
(x86)\PostgreSQL\9.1 and C:\Program Files\PostgreSQL\12). Full read/write rights
must also be set for the specified folders.
· hosts and ports numbers for connection (by default 5432).
· user name and password (by default postgres/postgres).

Note. If the current values of all parameters mentioned above do not differ from the default values used by
SecurOS, it is not required to define them.

www.issivs.com
SecurOS 475 Administration Guide
Appendixes

For example:

> set "pgold=c:\Program Files (x86)\PostgreSQL\9.1"


> set "pgnew=c:\Program Files\PostgreSQL\12"
> pgtool --port 5432 --path "%pgold%" --slony clean -o replica_clean.sql
> pgtool --user replica
> pgtool -k create --port 5432 -o pks_create.sql
> pgtool -k create --port 5432 -o pks_create.sql

Note. If the database is being replicated for the first time, the > pgtool --port 5432 --path "%
pgold%" --slony clean -o replica_clean.sql command is optional.

At the same time:


· Port number may be set in following formats: --port <value> or -p <value>.
· Password may be set in the following formats: --user <value> or -U <value>.

6. Make sure that all tables of the database that is going to be replicated have the primary key. Copy
the database scheme. For these operation the default PostgreSQL tools psql and pg_dump_all are
used.

> "%pgold%\bin\psql" -p 5432 -U postgres -f pks_create.sql > pks_create.log


2>&1
> "%pgold%\bin\pg_dumpall.exe" -U postgres -p 5432 -sc > cluster_schema.sql
> "%pgnew%\bin\psql" -p 5433 -U postgres -f cluster_schema.sql

7. After that the old database will become prepared for data replication. Start the replication procedure:

> pgtool --path "%pgold%" --slony install


> pgtool --path "%pgnew%" --slony install
> pgtool --path "%pgold%" --port 5432 --port 5433 --slony master
> pgtool --path "%pgnew%" --port 5432 --port 5433 --slony slave
> pgtool --path "%pgold%" --slony start
> pgtool --path "%pgnew%" --slony start
> pgtool --path "%pgold%" --port 5432 --port 5433 --slony subscribe

8. In system services the slony-VVV_XXX services will start running, where VVV — PostgreSQL
version for the old and for the new databases, and XXX — PostgreSQL build type (x64 or x86).
Services write log files of the replication procedure to the C:\ProgramData\ISS\logs folder. If all
logs contain records with SYNC prefix it means that both databases have the same data. For the new
database it is required to change the number of port that will be used for connection. To do this do
the following:
· manually edit the %pgnew%\data\postgresql.conf file.
· run the command
> pgtool --path "%pgnew%\data\postgresql.conf" --set port=5432.
9. Stop SecurOS server.
10.Clean temporary copy of the database that was used during the replication:

> pgtool --port 5432 --path "%pgnew%" --slony clean -o replica_clean.sql


> pgtool --user replica

11.Stop the postgresql-9.1 system service (if you updating from this specific version) and forbid its
autostart.

www.issivs.com
SecurOS 476 Administration Guide
Appendixes

12.Restart the postgresql-x64-12 system service.


13.Start the SecurOS server.

For some of commands mentioned above it is required to be connected to both databases at the same
time (e.g. for data replication). To redefine the second database connection parameter it is required to
define both parameters (even if for the first database it matches the default value):

> pgtool --port 5432 --port 50001 --host localhost --host 192.168.235.209 ...

To make sure that the data replication is done properly run the databases scheme comparison
(connection to both databases is required). For example:

> pgtool --port 50001 --port 50002 -c

Executing this command starts the comparison of two databases starting from names of databases,
schemes, tables, columns and ending with checking the primary keys and table restrictions. If there are
no differences, there will be no respond.

21.3 Appendix C. Quick Video Subsystem Configuration

By default, the system object tree consists of the following objects after SecurOS installation and starting
with empty database: System, SecurOS, Computer, Desktop, Media Client.

To create and configure a basic object of the video subsystem:


1. Configure Computer object parameters:
· IP address — click [<] button near the field (127.0.0.1 value is set when there is no network
connection).
· Disk — choose Read/Write from the list in Video and Audio column of the table in Archive tab.
Then video and audio archive will be recorded on to selected drives.

Note. It is not recommended to select system drive with Operating System installed for read/write settings.

2. Create the Video Capture Device object(s). This object represents the device the video signal is coming
from (IP camera, IP encoder, etc.). Configure the Video Capture Device parameters:
· Type — select device type corresponding to the device where video is coming from:
- If video is coming from an IP camera/encoder, select the corresponding manufacturer of the IP
camera/encoder.
- For use of IP devices using standards protocols, the ONVIF, or Generic RTSP options can be
used. The Device must support these Protocols.
- To play pre-recorded videos (for demo or testing purposes) the Virtual or Player AVI options
can be used.
· IP Address, User, Password — if using IP devices set these parameters accordingly.
3. Create the Camera object (child object of the Video Capture Device object). This object represents a
single video stream. Specify the camera identifier in the ID field (you can begin with 1 and keep
incrementing by 1), then specify its Name (e. g. Office, Street, Home etc.). You may also use
default ID/Name.

www.issivs.com
SecurOS 477 Administration Guide
Appendixes

Notes:
1. For single lens IP cameras, one Video Capture Device object will have one Camera child object.
2. For cameras with more than one lens, one Camera object will be created for each lens. The Camera
objects will be child objects of the same Video Capture Device.
3. For cameras connected to IP encoders, one Video Capture Device object will have as many Camera
child objects as cameras connected to the encoder.

Configure the Camera object parameters:


· Channel number — select from spin box:
- If this camera is a single lens IP camera, then default value of 1 can be used.
- If camera with more than 1 lens is being used, then one Camera object will be created for each lens.
The Camera objects will have different channel numbers, incrementing from 1.
- If this camera is connected to an IP encoder, then the number should correspond to the port the
camera is connected to.
· Pan/ Tilt/ Zoom — select Use for IP cameras with built-in PTZ device.
· Image Settings — specify parameters on the Advanced tab.
4. Select the mode of the Media Client operation with Cameras:
· Work with all cameras —default mode. Image from all system Cameras will be displayed on
the Media Client (checkbox Use only selected Cameras is not selected).
· Use only selected Cameras — configurable mode. Image from selected Cameras only will be
displayed on the Media Client. To activate this mode select the Use only selected Cameras checkbox,
then in the Object tree select checkboxes on the left of that Cameras which will be used.

21.4 Appendix D. System Utilities


SecurOS software comes with several helper utilities. You can find them in the \Tools sub-folder of
SecurOS installation folder or in SecurOS installation folder itself:
· Server Manager utility (ServerManager.exe) allows to monitor Conf iguration Servers states, to
create and control cluster (see Server Manager Utility).
· Hardware Report Utility (HardwareReportUtility.exe) reports all installed Guardant keys
(see Hardware Report Utility).
· SystemInfo (SystemInfo.exe utility) collects system and network information required by
Intelligent Security Systems Technical Support (see System Report Utility).
· Media Export Utility (Backup.exe) plays archived video/audio, exports selected parts of archive
to AVI, ASF and BMP files (see Media Export Utility).
· DSAdmin utility (dsadmin.exe) creates and stores database connection parameters
(see DSAdmin Utility).
· Database Update Utility (idb.exe) is used to access the database (see Database Update Utility).
· Registration Files Editor utility (ddi.exe) edits SecurOS object types database (not the actual
database itself) (see Registration Files Editor Utility).
· ISS Server Role Manager utility (ServerRoleManager.exe) is intended to reassign one of the
SecurOS Peripheral Servers as Conf iguration Server when current Conf iguration Server can not be used
anymore (see ISS Server Role Manager Utility).
· Server Control Agent utility (ServerControlAgent.exe) is intended for working with the
SecurOS Server and Client parts, SecurOS VMSS (Video Management System Server) service,

www.issivs.com
SecurOS 478 Administration Guide
Appendixes

and also for getting general information about the current state of the SecurOS software and
hardware (see Server Control Agent Utility).
· Media archive index repair utility (MediaIndexRepairer.exe/mediaindex_repairer) is used
to work with the SecurOS video and / or audio archive index files (see Media Archive Index
Repair Utility).
· Audio archive converter utility (AudioArchiveConverter.exe) is used to convert SecurOS
audio archive of an outdated format to the new one (see Outdated Audio Archive Updater Utility).
· Certificate Generator utility (CertificateGenerator.exe) is intended for creating trial SSL
certificates (see Certificate Generator Utility).
· AuditClient utility (audit_client.exe) is intended for obtaining SecurOS audit data
(see AuditClient Utility).

21.4.1 Server Manager Utility


In Linux OS the functionality is not supported.

This utility is intended for centralized monitoring and controlling SecurOS server (hosts) states. Using it
one can perform all operations for cluster creating and configuring (see Redundancy). One can manage
multiple configurations at once.

Warning!
1. The utility interacts with the Video Management System Server on the remote hosts. If service on the
host is stopped it won't be available for management.
2. To provide module working it is necessary to open TCP ports in the firewall settings (see Appendix
E. Network Ports Used in SecurOS).
3. The utility supports working with servers that running Microsoft Windows operating system only.

Main purposes of the utility are the following:


· Monitoring the host's states;
· Creating a failover cluster;
· Clear visual representation of the cluster state;
· Configuring cluster.

Warning! To create cluster nodes and change their parameters one should use SecurOS Object Tree
(see Adding Node).

Location:
<SecurOS root folder>\ServerManager.exe

Launching from the Start menu:


® ® ®
Start Programs SecurOS Server Manager

Appearance of the main window is represented on Figure 280.

www.issivs.com
SecurOS 479 Administration Guide
Appendixes

Figure 280. Server Manager Utility window

At the top of the utility window a control panel consisting of buttons and a search bar is located
(see Control Toolbar).

Below the toolbar the hosts table is located. This table displays states of all hosts added to the utility list
and grouped by Conf iguration Server (see Hosts Table).

21.4.1.1 Control Toolbar


Appearance of the Server Manager control toolbar is represented on Figure 281.

Figure 281. Control toolbar

The control panel provides the following features:


· Working with Host List;
· Managing Cluster;
· Managing Video Server State;
· Connecting to Host for Configuring;
· Restoring SecurOS Configuration;
· Managing Nodes;
· Advanced Cluster Host Settings;
· Search String.

21.4.1.1.1 Working with Host List


Working with the hosts list includes the following operations:
· Adding host to the list;
· Removing host from the list;

www.issivs.com
SecurOS 480 Administration Guide
Appendixes

· Editing host settings;

Adding host to the list


Click the Add host button or Insert key and fill in the fields displayed in the window that appears.

Figure 282. Add host to the cluster window

In the Administrator field must be specified user of the operation system, which has an administrator
rights on the computer to be added.

Removing host from the list


Select the host and click the Remove host button or Delete key.

Editing host settings


Select the host and click the Host options button or Enter key. Authorization parameters and user
comment options are available to change.

21.4.1.1.2 Managing Cluster


Cluster control includes the following operations:
· Creating Cluster;
· Adding host to the cluster;
· Removing host from the cluster;

Creating Cluster
Select in the list the host on which the cluster must be created and click the Create new cluster button.
Fill in the fields of the window that appears.

Figure 283. Create new cluster window

Specify available and not used IP address in the Configuration Server virtual IP address field.

www.issivs.com
SecurOS 481 Administration Guide
Appendixes

Note. If the host that already is a member of the cluster is selected, then existing cluster will be recreated.

Adding host to the cluster


Select in the list working host that is not a cluster member and click the Add to cluster button. Fill in the
fields of the window that appears.

Figure 284. Add host to the cluster window

To connect selected host to the redundant servers cluster (see Redundant Servers Cluster) select the
Non-cluster host in the Host type field.

Removing host from the cluster


Select in the list working host that is a cluster member and click the Remove from cluster button.

Removing host from the cluster is performed in two steps:


1. Removing host from the list of cluster members.
2. Switching host to the Video Server working mode.

Therefore, when removing host from the cluster, three scenario are possible:
1. Host that is being removed is available and there is a quorum within the cluster. In this case both
steps will be executed successfully and host will be completely removed from the cluster.
2. Host that is being removed is available and there is no quorum within the cluster. In this case cluster
will not be able to remove the host from its members list. Herewith the host itself will switch to the
Video Server working mode. Further it is necessary to execute the host removing procedure again
after quorum is restored.
3. Host that is being removed is unavailable and there is a quorum within the cluster. In this case
cluster will remove the host from its members list. Herewith the host will not be able to switch to the
Video Server working mode. Further it is necessary to execute the host removing procedure again
after connection is restored.

21.4.1.1.3 Managing Video Server State


Use the Start Video Server and Stop Video Server to control SecurOS Video Server state on the
selected host.

www.issivs.com
SecurOS 482 Administration Guide
Appendixes

21.4.1.1.4 Connecting to Host for Configuring


Select host and click the Connect button or double-click the host to start the SecurOS client part.

21.4.1.1.5 Restoring SecurOS Configuration


Select host and click the Restore configuration button to open window to select configuration file. To
restore configuration follow the instruction displayed in the window.

Figure 285. Restoring configuration from backup window

Note. The current password of the superuser (see SecurOS Users) will not be changed after restoring the
configuration.

21.4.1.1.6 Managing Nodes


Node control includes the following operations:
· Moving Node;
· Choosing / Viewing preferred host;

Moving Node
Select from the list the host on which the node that must be moved is working. Click the Node transfer
button and select the Move node. In the window that appears select the cluster host to which the node
has to be moved.

Figure 286. Move node window

Choosing / Viewing preferred host

www.issivs.com
SecurOS 483 Administration Guide
Appendixes

Select from the list the host on which the node for which the preferred host must be assigned is
working. Click the Node transfer button and select the Set preferred host command. In the window
that appears choose cluster host that must be preferred for the node. If Preferred host parameter is set
this means that selected host already is a preferred for this node.

Figure 287. Set preferred host window

For more information about preferred hosts see Setting Preferred Host for the Node.

21.4.1.1.7 Advanced Cluster Host Settings


Advanced cluster host settings includes the following operations:
· Changing / viewing network interface for virtual IP addresses;
· Turning service mode on/ off;
· Moving Configuration Server role;
· Setting up / viewing local drives for storing archive.

Changing / viewing network interface for virtual IP addresses


Choose cluster host in the list then click the Advanced options button and select the IP settings. In the
Virtual IP network interface field will be displayed IP address that corresponds with network adapter
used to support virtual IP addresses. Change it if necessary.

Figure 288. IP settings window

Turning service mode on/ off


Choose any cluster host in the list then click the Advanced options button and select the Service mode.
Current value of the Service mode parameter corresponds with the type of the current cluster service
mode.

www.issivs.com
SecurOS 484 Administration Guide
Appendixes

Figure 289. Service mode window

For the details on service mode see Service mode.

Moving Configuration Server role


Choose cluster host in the list than click the Advanced options button and select the Turn into
Configuration Server.

Setting up / viewing local drives for storing archive


Choose cluster host in the list then click the Advanced options button and select the Local drives
settings. Marked drives are currently used for archive storing on the selected host.

Figure 290. Store archive on local drives window

Note. Writing to the drives selected in this window is performed with higher priority than to the iSCSI
drive/network folder specified in the Computer object settings.

21.4.1.1.8 Search String


Fill in the search string the part of the host/node name or user comment to find required host within
the table.

Warning! Do not leave search string filled for a long time, otherwise one can miss failures in other hosts
working.

21.4.1.2 Hosts Table


Hosts table consists all hosts added to the utility and displays them as a tree. It includes the following
columns:
· Host. Contains host name, its IP address and configuration structure.
· Video Server status. If the connection with the server is established then one can control Video
Server state with the help of the Start Video Server/ Stop Video Server buttons (see Managing
Video Server State).

www.issivs.com
SecurOS 485 Administration Guide
Appendixes

· Node. Contains node name and its IP address when host is a member of the cluster.
· CS connection. Contains state of the connection between host and its Conf iguration Server.
· Comment. Contains additional information about host provided by the administrator.

Tree structure is represented on Figure 291.

Figure 291. Hosts tree structure

Tree in the Host column has the following structure:


1. Configuration server level. At this level the Conf iguration Servers are located (names or IP
addresses).

Note. This string is a grouping. To execute operations with the Conf iguration Server add it to the utility and
select string corresponding to it at the second level of the table.

2. Configuration members level. At this level the hosts involved into configuration are located.
Including the Conf iguration Server.
3. Cluster members level. At this level the members of the cluster created in the given configuration
are located. For the cluster hosts the table displays the nodes that currently correspond to these
hosts.
4. Host with issues. Hosts that failed to connect. They are listed at the end of the list with a problem
description.
5. Unconfirmed hosts (semi-transparent elements in the hosts table). Cluster hosts and Video Servers
that were not added to the utility, information about which was received from the Conf iguration
Server or from the cluster. Unconfirmed also can be computers whose status or role can not be
determined for some reasons.

Sources and reasons for unconfirmed hosts appearance:


· Cluster
- There is no connection with the cluster host added to the utility.
- The host is presented in the list of cluster members, but it has not been added to the utility.

www.issivs.com
SecurOS 486 Administration Guide
Appendixes

· Configuration Server
- The Video Server from the Object Tree has not been added to the utility.
- A Computer was added to the utility and it is the cluster host but at the same time there is another
Computer in the Object Tree with the same name and with selected Enable failover of the Video
server and add to the cluster parameter (see the Computer section).

Next actions are possible for unconfirmed hosts:


- Removing host from the cluster (see the Managing Cluster section).
- Moving node and choosing preferred host (see the Managing Nodes section).
- Adding utility computers to the list (see the Working with Host List section).

To mark roles and states the following icons are used in the table:
· — root item of the configuration.

· — root item of the cluster within the configuration.

· — Conf iguration Server in the given configuration.

· — operable host in the given configuration.

· — operable auxiliary host in the given configuration.

· — host is connected, but SecurOS Server part is stopped.

· — host state is unknown. For example, this icon is assigned when SecurOS Server part is being
started or stopped.

· — host that is not connected. In this case the reason for the lack of communication is added to
the host name.
· — crash host. Place mouse pointer over the Emergency stop string to display the crash reason.

21.4.2 Hardware Report Utility

Utility is used to detect all Guardant keys installed on given computer, as well as a unique hardware
code. The report is used to generate the system license key file key.iss by the Intelligent Security
Systems. This utility can also be used to check the correct installation of the above hardware devices
and associated drivers: if hardware identifier is missing, this means that drivers were not installed
properly.

· Working with the utility in Windows OS.


· Working with the utility in Linux OS.

Working with the utility in Windows OS

Location:
<SecurOS root folder>\Tools\HardwareReportUtility.exe

Launching from the Start menu:


® ® ®
Start Programs SecurOS Hardware Report Utility

www.issivs.com
SecurOS 487 Administration Guide
Appendixes

Appearance of the window is represented in Figure 292.

Figure 292. Hardware Report Utility window

To save the utility report into a file:


1. Click Copy Report to Clipboard button in the utility window.
2. Create empty text file in any word processing program (Notepad, Microsoft Word etc.).
3. Paste clipboard content and save the report file.

Working with the utility in Linux OS

Location:
<SecurOS root folder>/hru

To get the data provided by the utility, follow these steps:


1. Launch the Terminal console application.
2. Go to the SecurOS root directory (default is opt/iss/securos). To perform that do the following:

cd <SecurOS_root_directory>

3. Run the executable file of the utility. To perform that do the following:

./hru

The result of the command is represented in Figure 293.

www.issivs.com
SecurOS 488 Administration Guide
Appendixes

Figure 293. The result after executing the command ./ hru in the console

To save the report, copy the data and paste the contents of the clipboard to a text file of any format.

21.4.3 SystemInfo Utility

This utility is intended for collecting technical information about the SecurOS installation, your
computer and network (see figure 294). This information is necessary to resolve problems and will
always be requested by the Technical Support Team. Collected information will be saved in the
SystemInfo report.

Figure 294. SystemInfo Utility window in Windows OS

· Working with the utility in Windows OS.


· Working with the utility in Linux OS.
· Report structure.

Working with the utility in Windows OS

Location:
<SecurOS root folder>\Tools\SystemInfo.exe

www.issivs.com
SecurOS 489 Administration Guide
Appendixes

To create a report
1. Select file name.
2. Specify collection procedure parameters (see Utility Parameters below).
3. Click the Go button.

SystemInfo report (see Report structure) will be saved as 7z file.

Utility Parameters
· Include full crash dumps — select this checkbox if SecurOS Server or Client crash information,
including children processes, must be included in the report. To free up space on your hard drive
after you exit the utility, select the Remove crash dumps when the information collection is
complete checkbox.

Note. In case of SecurOS Client application or its child process crash, the appropriate OS informational message
is displayed (for example, see Figure 295). In case of SecurOS Server part or its child process crash, Health
Monitor self-diagnostic module's message is displayed. Full dumps are required only to analyze such system
crashes and not required for all any problems.

Figure 295. Informational message about system crash

· Collect additional databases — select this checkbox to collect additional information about
SecurOS and installed intelligent Modules. All additional databases that are being used on this
computer will be collected (see DSAdmin Utility).

Note. Additional information must be collected only by request of the Intelligent Security Systems Technical
Support Team. In all other cases it is not required.

Working with the utility in Linux OS

Location:
<SecurOS root folder>/systeminfo

To get the data provided by the utility, follow these steps:


1. Launch the Terminal console application.
2. Go to the SecurOS root directory (default is opt/iss/securos). To do this, run the following
command:

cd <SecurOS_root_directory>

www.issivs.com
SecurOS 490 Administration Guide
Appendixes

3. Run utility executable as superuser. To do this, run the following command:

sudo ./systeminfo

The result of the sudo ./systeminfo command is represented in Figure 296.

Figure 296. The result after executing the sudo ./ systeminfo command in the console

By default, the generated report is stored in archive format in the /home/<username>/ user's root
directory. You can specify your custom directory for saving the report at the end of the utility launch
command:

./systeminfo <path_to_the_directory>

If you want to delete dumps, add the -d attribute to the main command:

./systeminfo -d

To collect additional databases, add the -a attribute:

./systeminfo -a

Using the -v attribute in a command allows you to determine the version of the SystemInfo utility:

./systeminfo -v

To get complete help on the utility, use the -h attribute:

./systeminfo -h

Report structure
The report contains the following folders and files:
· crashlogs folder — contains log files of the crashes of the SecurOS and/or it components;
· cur folder — contains files with settings of the modules logging, program and scripts, xml files of
the integrated Cameras and Video Servers libraries etc. The files are placed in subfolders
corresponding to the file type.
Additionally, the cur folder contains the following files:
- key.iss — current SecurOS key file;
- licenced_objects.txt — information on the number of licensed objects in the system
((allowed): current);

www.issivs.com
SecurOS 491 Administration Guide
Appendixes

- securos.sqlite — contains the copy of the SecurOS configuration, used by client.


· devices folder — contains binary log file for the found problems of interaction with cameras;
· dumps folder — contains full or minimal dumps of the crashes of the SecurOS and/or its
components;
· installer folder — contains SecurOS installer log files;
· logs folder — contains SecurOS log files;

Note. Log files of the SecurOS modules are stored in the %ProgramData%\ISS\Logs folder (in Windows
OS) or in the /var/opt/securos/logs folder (in Linux OS).

· logs\tomcat folder — contains Apache TomCat server log files (WebConnect);


· logs\nginx folder — contains nginx server log files (WebConnect);
· syslogs folder — contains system log files (only in Linux OS);
· PostgresLogs folder — contains PostgreSQL log files;
· TomCat folder — contains Apache TomCat server log files (WebView);
· WindowsEventLogs folder — contains the Application and System Windows Logs (the
Application.evtx and System.evtx files, respectively);
· DallasCodes.txt file — contains information about codes of the installed hardware devices
(Guardant);
· data.sql, videoi.sql and protocol.sql files — contain information from securos,
fsindex and protocol databases, accordingly. In case the additional databases are collected
(see DSAdmin Utility) other sql files with appropriate names are included in the report;
· DxDiagInfo.txt file — contains information about system devices of the computer, where
SecurOS is installed and utility was started;
· cluster.json file — contains information about configuration of the cluster, which given
computer belongs to;
· integrators.txt file — contains a list of installed integrators with their version from the C:
\Program Files (x86)\ISS\Integrators folder (in Windows OS) or
the /opt/iss/integrators folder (in Linux OS);
· integrators_x64.txt file — contains a list of installed integrators with their version from the
C:\Program Files\ISS\Integrators folder (in Windows OS);
· ISS_Config.reg file — contains information about the HKLM\SOFTWARE\ISS registry key (only
in Windows OS);
· securos.conf file — contains information about the SecurOS configuration (only in Linux OS);
· modules.txt file — contains list of the dll and exe files with their versions from the SecurOS
folder;
· system32.txt file — contains list of the dll and exe files with their versions from the C:
\Windows\System32 folder;
· netstat.txt file — contains information about active connections of this computer at the moment
you run the utility;
· SystemInfo.nfo file — contains general system information about computer where SecurOS is
installed and given utility was started;
· core_rt.conf file — contains the SecurOS server status parameters at the time of the last
shutdown (only in Linux OS).

www.issivs.com
SecurOS 492 Administration Guide
Appendixes

21.4.4 Media Export Utility


In Linux OS the functionality is not supported.

Location:
<SecurOS root folder>\Backup.exe

Launching from the Start menu:


® ® ®
Start Programs SecurOS Media Export Utility

This utility (see figure 297) is used to playback and also export video and audio archives from ISS
Native to AVI/ASF format, export a frame to BMP format and also export separate audio files, recorded
with the help of a standalone (not linked to a camera) microphone.

Warning! This utility can only be used to export video/audio archives locally from video servers.

Figure 297. Media Export Utility window

To export video:
1. Select the Camera in the archive source list and specify the ID of the Camera object.
2. Define the Search start and Search end for the archive search.
3. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
4. Click the Rescan archive button to scan for media that fits the specified time range for the specified
Camera.

www.issivs.com
SecurOS 493 Administration Guide
Appendixes

5. When it is necessary to view archive, use the Play/Stop buttons to start and stop playback. Use the
slider or the Rewind/Forward buttons to navigate through the selected time range.
6. If needed, change your selection by repeating steps 1— 5.
7. Define export settings (video/audio codec, output directory etc.) in the Export Settings dialog.
8. Click the Export button to start the procedure. The process may take some time depending on the
length of the archive and export settings.
9. While exporting is in progress, you can click the Stop button to stop the export at this point. The part
that has already been exported will be saved as an AVI or ASF file.

Note. While playing or navigating through the archive, click the Save frame to BMP button to export a single
video frame in BMP format. Files will be saved to the directory specified in the Export Settings dialog.

Warning! To playback “quick converted” video it is recommended to use VLC media player.

To export audio, recorded with the help of standalone microphone:


1. Select the Microphone in the archive source list and specify ID of the Microphone object.
2. Define the Search start and Search end for the archive search.
3. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
4. Click the Rescan archive button to scan for media that fits the specified time range for the specified
Microphone.
5. Define export settings (audio codec, output directory, password etc.) in the Export Settings dialog.
6. Click the Export button to start the procedure. The process may take some time depending on the
length of the archive and export settings.
7. While exporting is in progress, you can click the Stop button to stop the export at this point. The part
that has already been exported will be saved as an AVI or ASF file.

Note. This utility is not intended to playback audio files.

www.issivs.com
SecurOS 494 Administration Guide
Appendixes

21.4.4.1 Export Settings dialog

Figure 298. Export settings dialog window

Table 109. Export settings

Parameter Description

Common

Path to a directory where output files will be saved. Type it


Target folder manually or use the button on the right to open the Choose folder
dialog.

Use this option to split large output files to several smaller ones with
Max. file size, MB the specified size in megabytes. Default value is 650 MB.
Warning! Some media players do not support AVI-files greater than 2 GB.

File type Select option corresponding to output file format (AVI or ASF).

Export

Video only Select the checkbox to export video only (without audio).

Video codec Select video codec.

www.issivs.com
SecurOS 495 Administration Guide
Appendixes

Parameter Description

Select the checkbox to perform a quick video export. Quick video


export can be performed only for archives created with H.263,
H.264, MPEG-4 or MJPEG codecs.

Notes:
Quick video export 1. Video codec, Video quality, FPS Divider, File and
Position parameters will be ignored in the Quick video
export mode.
2. If Quick video export is selected, but the conversion is not
possible for some reason, then the parameters specified
above will be used.

Video quality Select required quality of the output video file.

Audio codec Select audio codec.

Select the checkbox to perform a quick audio export. Quick audio


export can be performed only for archives created with GSM, PCM or
ADPCM codecs.

Quick audio export Notes:


1. Audio Codec parameter will be ignored in the Quick audio
export mode.
2. If conversion is not possible in the specified mode, the
above parameter will be used.

Set FPS divider parameter.

FPS divider Warning! Option works correctly only for video produced with no delta-
frame algorithm. For example, MJPEG for IP cameras. In other cases, using
this option can cause frame twitching and skipping.

Logo

File Select logo file name (PNG file format).

Position Select logo position on the frame.

21.4.4.2 Command-line parameters


You can use media export utility (see Media Export Utility) from command-line and from batch files to
automate the exporting process. When executed from command line, currently defined export settings
will be used. To change current settings, initiate the Media Export Utility in normal (window) mode
and specify new export parameters, then close this utility. Required parameters can also be set when
launching utility from command line.

Media Export Utility command-line syntax (example contains only frequently used parameters):

backup --out <out_file> --cam <camera_number> --from "<start_date_time>"


--to "<end_date_time>" --span <span_size> --silent

www.issivs.com
SecurOS 496 Administration Guide
Appendixes

Table 110. Command-line parameters

Parameter Type Description

Search parameters

--cam <number> ID of the camera from which video will be converted.

<date> Start date/time of the archive to export. Example: 19-


--from
02-05 00:00:00.

<date> End date/time of the archive to export. For example:


--to
20-02-05 11:59:59 PM.

Used to export frame defined with --cam and --from


--frame
parameters to .BMP image.

Search directory
Warning! If --archive-folder or --archive-path parameters are not set then only the primary
archive will be searched.

--archive- Long-term archive will be searched.


folder
--archive- <absolute path> Archive will be searched only in the specified directory.
path

Export parameters

--out <full filename> Output filename include absolute path. For example, C:
\export\out.avi.

--video-only Export video without audio.

--container <file type> File type. Possible values: AVI or ASF.

<number>/<string> Span to fragments up to. Specify a number (value in MB)


--span or reserved variables: DVD (4.7 GB for using DVD disk),
or CD (650 MB for using CD disk).

<string> Codec used to export video. Possible values: MJPEG,


--video-codec
MPEG4.

<string> Codec used to export audio. Possible values: PCM, WMA,


--audio-codec
MP3.
--video- <number> Video quality. Number in range of [0; 100].
quality

--raw-video Quick video export.

--raw-audio Quick audio export.

--fps-divider <number> FPS divider. Number in range of [1; 100].

Set --silent parameter to start utility in silent mode.


Set --help parameter to display list of parameters.

Example 1:

www.issivs.com
SecurOS 497 Administration Guide
Appendixes

backup --cam 1 --from "27-12-06 18:36:42 --to "28-12-06 22:43:12" --span 2

Description: export video archive of camera 1 for the defined period spanning to fragments up to 2 Mb.

Example 2:

backup --out "C:\custom path\pwnage.avi"


--from "27-12-06 18:36:42" --to "28-12-06 22:43:12" --span cd

Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).

Note. Camera number and other settings are taken from the utility configuration.

21.4.5 DSAdmin Utility

This utility is intended to store/change database connection strings for the following databases:
· Settings database. This database stores system object settings. Database name is specified when
installing database. By default the securos name is used.
· Events database. This database stores information about events, that occurred within system. This
database is created automatically when system installing with the name of protocol.
· Audit DB. This database stores audit data of the SecurOS user actions. By default, the protocol
database is used.
· Video archive database. This database stores information about registered alarms and specified
archive bookmarks. This database is created automatically when system installing with the name of
fsindex.
· Any other additionally installed database.

Location:
<SecurOS root folder>\dsadmin.exe

Appearance of the main window is represented on figure 299.

www.issivs.com
SecurOS 498 Administration Guide
Appendixes

Figure 299. DSAdmin Utility window

Table 111. DSAdmin Utility parameters

Parameter Description

Databases

This list always contains the following databases:

· Settings database — mandatory database, is used always.

· Events database — mandatory database, but can not be used


depending on utility settings. By default it is used.
Databases list · Audit DB — optional database. By default it is used.

· Video archive database — mandatory database, but can not be


used depending on utility settings. By default it is used.

Besides mentioned above, this list can contain any number of


additionally installed databases.

Connection settings

This flag indicates if database is used. It is displayed only for several


main databases. Otherwise is not displayed. If not selected, then
connection parameters are disabled, connection between SecurOS
and database is broken. If these settings are saved, then all
connection parameters are set to null.

Notes:
Connection settings
1. This flag is taken into account when the SystemInfo is
executed. If Collect additional databases option is
selected, data for only databases that are used will be
collected.
2. If additional databases are installed, then SystemInfo
utility will collect similar data for those ones that are
included in the Databases list (see above).

www.issivs.com
SecurOS 499 Administration Guide
Appendixes

Parameter Description

Database type. Required parameter. Possible values:

Type · PostgreSQL (is the default value);

· SQL Server.

Name or IP address of the server where database is installed.


Host
Required parameter.

Port number for database connection. Optional parameter. If


Port selected, this port is used when connecting. If not selected, the 5432
port is used for connection (default value).

Name of the database specified when installing. Required


Database name
parameter.

Name of the database's administrator account specified when


User
installing database. Required parameter.

Password of the database's administrator account specified when


Password
installing database. Required parameter.

Click the button to check database connection with specified


connection parameters. If connection established, then the Success
Test (button) result is displayed to the right of the button. Otherwise the Failed
result is displayed. In this case check specified connection
parameters and repeat test.

Common parameters

Check connection settings Deselect this option if checking connection with all specified
before update databases before update is not required.

Update settings (button) Click this button to apply all changes and exit.

Cancel (button) Click this button to discard all changes and exit.

To add connection to the additional database to the list do the following:


1. Click the button above the Databases block.
2. A new entry will appear in the Databases list (see Figure 300).

www.issivs.com
SecurOS 500 Administration Guide
Appendixes

Figure 300. Adding new database

3. Specify name of the new database. Press the Enter key.


4. Specify required parameters in the Connection settings block, then click the Test button to check the
connection.
5. If checking result is successful, then click the Update settings button to save the changes and exit.

To delete connection to the additional database to the list do the following:


1. In the Databases block click the additional database entry that should be deleted from the list.
2. Click the button above the Databases block. Connection to the selected database will be deleted
from the list. At the same time:
· physical database is not removed;
· software product that uses removed database keeps working correctly.

Note. Only user created connection to an additional database can be deleted.

21.4.6 Database Update Utility

This utility is intended for setting up and updating the SecurOS database, where SecurOS object settings
are stored (securos database). Modification is performed with the help of the securos.dbi file,
where description of the actual database structure is stored.

Location:
<SecurOS root folder>\idb.exe

Appearance of the main window is represented on figure 301.

www.issivs.com
SecurOS 501 Administration Guide
Appendixes

Figure 301. ISS Database Update Utility window

Table 112. Database Update Utility parameters

Parameter Description

Connection settings

Database type. Required parameter. Possible values:

· PostgreSQL (is the default value);

· SQL Server;

Type · SQLite.

Note. SQLite value is used when SecurOS Client application starts on


separate Computer in order to provide creation and updating local
SecurOS database, that must be implemented on this Computer as
.sqlite file.

Name or IP address of the server where database is installed.


Host
Required parameter.

Port number for database connection. Optional parameter. If


Port selected, this port is used when connecting. If not selected, the 5432
port is used for connection (default value).

Name of the database specified when installing. Required


Database name
parameter.

Name of the database's administrator account specified when


User
installing database. Required parameter.

www.issivs.com
SecurOS 502 Administration Guide
Appendixes

Parameter Description

Password of the database's administrator account specified when


Password
installing database. Required parameter.

Click the button to check database connection with specified


connection parameters. If connection established, then the Success
Test (button) result is displayed to the right of the button. Otherwise the Failed
result is displayed. In this case check specified connection
parameters and repeat test.

Path to the securos.dbi file. Default value is


<SecurOS_root_director>\securos.dbi. It is possible to
Database descriptor path
specify path manually or with the help of the Select button (see
below).

Click the button to choose folder, where custom .dbi file is located.
Select (button)
Specify path to the file in the standard file manager window.

Select this checkbox to perform standard PostgreSQL's VACUUM


Compact database
operation.

Struct update (drop Select this checkbox to delete obsolete database tables completely.
redundant tables)

Click this button to update database in accordance with the


Update database (button)
specified parameters and to exit.

Cancel Click this button to discard the changes and exit.

21.4.7 Registration Files Editor (DDI) Utility

This utility is used to describe SecurOS object types — their properties, characteristics and behavior
within the system.

Additional Information
Type of the object within SecurOS means unique char identifier of the object class that is used within program code.
SecurOS object type can not be changed.

Each property, characteristic or object type behavior rule within SecurOS is specified with the help of
appropriate component of the object type description. Components of the object type description are
used to represent object within appropriate interfaces, for example, within operator's interface of the
Media Client, in the Event Viewer's log-files, on the Map, etc.

By default, descriptions of the object types existing within SecurOS are created in accordance to the
rules defined by software developer. When adding a new object types, for example, during SecurOS
integration with the third-party systems or equipment, their own object type descriptions can be created
for newly added objects with the help of this utility.

Location:
<SecurOS root folder>\ddi.exe

www.issivs.com
SecurOS 503 Administration Guide
Appendixes

To start working with object type descriptions one should load and open appropriate
securos_XX.ddi file, located in the SecurOS root folder, where XX — ID of the description language,
for example, fr (french).

Appearance of the main utility window when description file is opened is represented on figure 302.

Figure 302. Main Window of Registration Files Editor Utility

List of registered object types is displayed on the right area of the window as a table:
· Type name — name of the object type (char). This name is used to represent object in the Object
Tree, on the Map, in the Media Client and Event Viewer user interfaces, etc. Variable parameter;
· Object type — unique type of the object. Is used to represent object class instance. Variable
parameter;

Note. It is necessary to change object type only if it changed inside software source code. Otherwise changes
will not be applied to the system, but at the same time will be saved in the description file.

www.issivs.com
SecurOS 504 Administration Guide
Appendixes

· Group name — name of the grouping object in the SecurOS Object Tree. Variable parameter.

To view description click required object in the list.

In the left area of the main window the following information concerning selected object type will be
displayed (by default all available information is displayed):
· Events window — contains a table of system events that can be generated by selected object type;
· Commands window — contains a table of commands that can be used to control selected object
type;
· Markers window — contains a table that is intended for object icon file name definition. Object
icons, displayed in the Map: GUI, is predefined in the object code. Appropriate .png graphic files
are located in the skins\_common folder of the SecurOS root directory;
· States window — contains a table of all possible states for selected object type.;
· State transition rules — contains a table of transmission rules from one state of the object to
another. Transmission rules control initial and final states that selected object has upon certain
event coming. Initial event, initial state and final state are in the table;
· Phrases — contains names that are used as object captions displayed in all interfaces (in the Object
Tree, in the Map: GUI, in the Media Client and Event Viewer interfaces, etc.). Also contains phrases
used in information messages displayed in the own interface windows of the objects (for example,
in the Archiver window).

Mentioned above windows can be displayed or hidden with the help of Windows menu in the main
utility window.

To change field value within any window double-click this field, then select required value or type it
manually.

Other components of the Menu bar and Toolbar in the main utility window are intuitively
understandable and not considered within this manual.

Events Window

Figure 303. Events window

In this window the following parameters of the object type Events are specified:
· Name — name of the event that will be displayed in the Event Viewer interface;
· Type — unique event ID.

Note. It is necessary to change object type only if it changed inside software source code. Otherwise changes
will not be applied to the system, but at the same time will be saved in the description file.

www.issivs.com
SecurOS 505 Administration Guide
Appendixes

· Severity — severity of the event. Defines how this event will affect the system and need of operator
intervention when it occurs. Possible values:
- normal — event that does not require operator attention. Such event is highlighted in Event
Viewer in blue;
- informational — event that requires additional operator attention. Such event is highlighted
in Event Viewer in white;
- alarm — event that requires intervention of operator or technical support expert. Such event is
highlighted in Event Viewer in red.
· Has sound — event attribute that indicates necessity to play sound when events occurs. It makes
sense only if sound is defined in the source code of the object;
· Loggable — indicates necessity to save record relevant to occurred event into the protocol
database (system events protocol). Possible values:
- yes — message about local events will be saved into the database;
- no — message about local events will not be saved into the database.
· Blocking — indicates necessity to transfer message about local event to all computers within
network. Possible values:
- yes — message about local events will be transferred into the network;
- no — message about local events will not be transferred into the network.

Commands Window

Figure 304. Commands window


In this window the following parameters of the object type Commands are specified:
· Name — command name;
· Type — unique command ID that is defined inside object source code;
· Arm Region — this parameter is not used in current version of the utility.

Markers Window

Figure 305. Markers window

In this window setup the following parameters of the Icons object that are displayed in the Map: GUI are
specified:

www.issivs.com
SecurOS 506 Administration Guide
Appendixes

Warning! Parameters of the icons make sense only for Sensor and Relay objects.

· File name — value that is used within script to create the final name of the image file;
· Name — possible value from the list of values of appropriate parameter in the Sensor or Relay object
settings window.

States Window

Figure 306. States window

In this window the following parameters of the object type States are specified:
· Name — name of the state. This name is displayed, for example, in the Map: GUI window;
· State — unique state ID;
· Description — state text description;
· Short name — value that is used within script to create the final name of the image file. This image
will be used in the Map: GUI window to indicate appropriate object state;
· Blink — additional mark of the state. It controls the blinking of the object icon in the Map: GUI
when this state occurs. Possible values:
- yes — icon is blinking;
- no — icon is not blinking.

State transition rules Window

Figure 307. State transition rules window

The following parameters of the rules are specified in this window:


· Triggering event — ID of the event that initiates transition;
· From state — ID of initial state for transition upon Triggering event;

Warning! If leave blank then transition will be done from any state.

· To state — ID of the final object state.

www.issivs.com
SecurOS 507 Administration Guide
Appendixes

Phrases Window

Figure 308. Phrases window

In this window are specified the Phrases that are used as an object captions and used in information
messages displayed in the own object interface windows. Contains the following fields:
· Phrase — phrase used for object description in the SecurOS main interface elements (Object Tree,
Map: GUI, Event Viewer etc.) or the message phrase in the object own window;
· Context — phrase usage context;
· Origin — source of the phrase (i.e. Object type).

Note. Changing the Phrase will cause automatic changing of the Origin field and the Object type field in the
right window.

Warning! Once file was changed one should save the chages and restart SecurOS, otherwise changes will not
be applied.

21.4.8 ISS Server Role Manager Utility

The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.

The utility is intended to reassign one of the SecurOS Peripheral Servers as Conf iguration Server when
current Conf iguration Server can not be used anymore.

Location:
<SecurOS root folder>\ServerRoleManager.exe

To reassign current Conf iguration Server do the following:

Warning! The Guardant hardware key must be moved from current Conf iguration Server to that Peripheral
Server, which will serve as a new Conf iguration Server (see Guardant Key Installation). Otherwise, system can't
be started on the new Conf iguration Server.

1. Launch utility on that Peripheral Server, which will serve as Conf iguration Server.
2. In the utility window select the Configure the computer as a Configuration Server (see Figure 309).

www.issivs.com
SecurOS 508 Administration Guide
Appendixes

Figure 309. Specifying new Configuration Server

Note. The current Configuration server string displays name of the computer, which is being reassigned.

3. Click the Apply button.


4. Restart SecurOS.
5. Sequentially launch utility on each of the Peripheral Servers and do the following:
· In the utility window select the Connect to Configuration Server (see Figure 310).

Figure 310. Connect to Configuration Server option

Note. The current configuration string displays name of the computer, which is being reassigned.

· In the text box fill in the name of the computer, which is assigned a new Conf iguration Server.

Note. If the name of new Conf iguration Server is specified correctly and computer is available within SecurOS
network, the mark will be displayed on the right of the text box. Otherwise the mark will be displayed.

· Click the Apply button.


· Restart SecurOS.

21.4.9 Server Control Agent Utility

Using this utility, one can perform the following operations:


· Start/Stop SecurOS Server part;
· Obtain additional information about SecurOS Server part launching error;
· Start/Stop SecurOS Client part;

www.issivs.com
SecurOS 509 Administration Guide
Appendixes

· Control Video Management System Server system service.


· Launch SystemInfo utility.

Location:
<SecurOS root folder>\ServerControlAgent.exe

Utility is launched automatically when OS is started. After utility is started its icon is displayed in the
system tray (see Figure 311).

Figure 311. Server Control Agent icon in system tray

Note. If utility has been shut down one can launch it from Start menu (Programs ® SecurOS ® Server
Control Agent).

Application icon displays current server state:

— server is started;

— server is stopped;

— server is crashed.

When mouse pointer is placed over the icon, then the hint that shows server current state, SecurOS
edition and version number is displayed.

Control is performed with the help of utility context menu (see Figure 312), that contains the following
commands:

www.issivs.com
SecurOS 510 Administration Guide
Appendixes

Figure 312. Utility context menu

· Launch the operator interface — launch SecurOS Client part on given computer;
· Start Server — start SecurOS Server part;
· Stop Server — stop SecurOS Server part;
· Error. Read more... — display detailed information about Server part launching error;
· Manage service — change the state of the Video Management System Server system service:
- Start service;
- Stop service.
· Launch the SystemInfo — launch SystemInfo utility;
· Exit Server Control Agent — shut down utility.

21.4.10 Media Archive Index Repair Utility

This utility is designed to recover damaged or create missing index files of the SecurOS video and / or
audio archive including the archive from cameras with an associated microphone.

Location:
· in Windows OS —<SecurOS root directory>\MediaIndexRepairer.exe;
· in Linux OS — <SecurOS root directory>/mediaindex_repairer (see Working with the
utility in Linux OS).

Utility is implemented as console application, to call which the following syntax of command prompt is
used (below is an example for Windows OS):

MediaIndexRepairer.exe [--path <arg>] [--camId <arg>] [--type <arg>]


[--user <arg>] [--pass <arg>] or
MediaIndexRepairer.exe [--help], where:

· --path <arg> — recreate index files located in the specified folder. Required parameter. Possible
arguments:
—<Full_path_to_the_archive_root_folder> — recreate index files for the whole archive,
or

www.issivs.com
SecurOS 511 Administration Guide
Appendixes

—<"Full_path_to_the_archive_folder_for_an_hour"> — recreate index file for the


archive created for an one hour;

Warning!
1. Folder name in the command prompt is case sensitive.
2. When specifying path to the folder that contains archive for an one hour, it is necessary to use the
"" characters to screen space included in the file name (see example below).
3. A network folder can be specified. To provide an access to the network folder it is necessary to
specify the user name and password (see below).

· --camID <arg> — recreate all index files for the archive that was created by camera with
specified ID. Optional parameter. If not specified, then index files for archives created by cameras
with any ID will be recreated.
This parameter is not used without --path <arg>;
· --type <arg> — type of the files for index repair. Possible values:
—all — re-indexing video- and audio archives. Default value;
—video — re-indexing video archive only;
—audio — re-indexing audio archive only;
· --user <arg> — user and domain name (if exists) to provide an access to the network folder.
Optional parameter;
· --pass <arg> — user password to provide access to the network folder. Optional parameter;
· --help — display help information for the command.

Working with the utility in Linux OS


When working with the utility in Linux OS:
· the utility should be run as the securos user. For example:

cd /opt/iss/securos
sudo -u securos ./mediaindex_repairer --path /mnt/disk1/ISS_MEDIA

· only forward slashes "/" should be used when specifying folder paths;
· network folders cannot be used. That is, using the --user <arg> and --pass <arg> parameters
will not produce a result.

Examples:

· MediaIndexRepairer.exe --path D:\ISS_MEDIA — recreate all index files of the video and
audio archive that was created by all cameras and saved in the D:\ISS_MEDIA folder;
· MediaIndexRepairer.exe --path "D:\ISS_MEDIA\CAM_15\2022-07-01T20+0300" --
camId 15 --type video — recreate index file of the archive that was created on July 1 2022
from 08:00 p.m. till 09:00 p.m. time interval by camera with ID 15 and saved in the D:
\ISS_MEDIA\CAM_15\2022-07-01T20+0300 folder;
· MediaIndexRepairer.exe --path \\server\ISS_MEDIA --type audio --user
OFFICE\admin --pass password — convert all audio files of the archive created by all cameras
and saved in the \\server\ISS_MEDIA network folder.

www.issivs.com
SecurOS 512 Administration Guide
Appendixes

To simultaneously process archive with different parameters use several instances of the application. In
this case archives specified in the parameters of each instance will not intersect by date/time and/or
camera ID.

Warning!
1. Re-indexing of the large volume archives can take considerable time (hours).
2. To work with appropriate archives it is necessary to restart SecurOS once index files are recreated.

21.4.11 Outdated Audio Archive Updater Utility


In Linux OS the functionality is not supported.

This utility is designed to do the following:


· To convert SecurOS audio archive of an old format to the new one for cameras with an associated
microphone;
· To automatically delete old SecurOS audio archive and create the index file when the conversion
process is finished.

Warning!
1. Conversion of the large volume archives may take considerable time (hours).
2. It is required to restart SecurOS to work with the new audio archive.

Location:
<SecurOS root folder>\AudioArchiveConverter.exe

Utility is implemented as console application, to call which the following syntax of command prompt is
used:
AudioArchiveConverter.exe [--path <arg>] [--user <arg>] [--pass <arg>] or
AudioArchiveConverter.exe [--help], where:

· --path <arg> — convert the audio archive located in the specified folder. Required parameter.
Possible arguments:
- <Full_path_to_the_archive_root_folder> — convert audio files for the whole archive, or
- <Full_path_to_the_archive_folder_for_an_hour> — convert audio files for the archive created for
one hour, or
- <Full_path_to_the_archive_file> — convert only the specified file.

Warning!
1. Folder name in the command prompt is case sensitive.
2. When specifying path to the folder that contains archive for an one hour, it is necessary to use the
"" characters to screen space included in the file name (see example below).
3. A network folder can be specified. To provide an access to the network folder it is necessary to
specify the user name and password (see below).

· --user <arg> — user and domain name (if exists) to provide an access to the network folder.
Optional parameter;
· --pass <arg> — user password to provide access to the network folder. Optional parameter;
· --help — display help information for the command.

www.issivs.com
SecurOS 513 Administration Guide
Appendixes

Examples:
· AudioArchiveConverter.exe --path D:\VIDEO — convert all audio files of archive that was
created by all cameras and saved in the D:\VIDEO folder;
· AudioArchiveConverter.exe --path \\server\VIDEO --user OFFICE\admin --pass
password — convert all audio files of the archive created by all cameras and saved in the \
\server\VIDEO network folder.
· AudioArchiveConverter.exe --path "D:\VIDEO\12-03-19 10" — convert all audio files
of the archive that was created on March 12 2019 in 12:00 a.m. till 1:00 p.m. time interval by all
cameras and saved in the D:\VIDEO\12-03-19 12 folder;
· AudioArchiveConverter.exe --path "D:\VIDEO\12-03-19 12\4009641.w05" —
convert the audio file of the archive that was created on March 12 2019 at 12:40:09.641 p.m. by
camera with ID 5 and saved in the D:\VIDEO\12-03-19 12 folder;

To simultaneously process audio archive with different parameters use several instances of the
application. In this case audio files specified in the parameters of each instance will not intersect by
date/time and/or camera ID.

Conversion results:
· When converting a folder, all the old audio files are removed. They will replaced with audio files of
a new format, and the index file will be created.
· When converting a single file, the audio file of a new format will be created. The original file will
not be removed. The index file for the new audio archive will not be created.

21.4.12 Certificate Generator Utility


In Linux OS the functionality is not supported.

The utility is intended for creation trial self-signed SSL certificates. Such certificates can be used to
check and demonstrate capabilities of the digital signature (see Digital Signature) and to work via
secured HTTPS protocol for such modules as Mobile Application Server (see SecurOS Mobile Quick
Start Guide), AutoMobile Server (see SecurOS AutoMobile User Guide), Rest API, etc.

Warning! Certificates created with the help of the utility are intended solely for demonstration and
commissioning purposes.

Location:
<SecurOS root folder>\CertificateGenerator.exe

Appearance of the main window is represented on Figure 313.

www.issivs.com
SecurOS 514 Administration Guide
Appendixes

Figure 313. Certificate Generator Utility window

To create certificate do the following:


1. Fill in the window fields:
· Issued: this value will be displayed in the Issued by and Issued to properties of the certificate;
· Organization: this value will be displayed in the Organization property of the certificate;
· Certificate name: this value will be displayed as the name of the certificate;
· Subject alternative name: enter the IP addresses or DNS names of the subjects that will also be
covered by this certificate. Subjects can be added or removed using the Add/Remove buttons.

Note. Subject alternative names should only be added if the computer on which the certificate is stored has
multiple network interfaces.

· Validity period: certificate validity period.


2. Choose certificate purpose:
· Digital signature: certificate will be used for digital signature.

www.issivs.com
SecurOS 515 Administration Guide
Appendixes

· HTTPS: certificate will be used to provide secured connection. This option is enabled only when
utility is run as administrator.
3. Choose where to install or save the certificate:
· To make the certificate trusted on the given computer select the Add to Local Machine Store
checkbox (default value).
· To work correctly with websocket in Windows OS, check the Exportable private key box.

Notes:
1. This option is enabled only when utility is run as administrator.
2. When you select the checkbox, the Add to Local Machine Store checkbox is automatically selected.

Warning! When working with GIS maps via HTTPS protocol, the checkbox must be selected.

· To save the certificate to the specified directory select the Save to directory checkbox. To specify the
path enter it manually or use file manager. When saving the created certificate it also will be
installed to the local machine storage. Saving the certificate to a separate directory allows further to
install and use it on different computers within the SecurOS network. For example, it is necessary to
install such certificate on each computer of the cluster to provide working of the pointed above
modules when using SecurOS in the cluster configuration.

Note. When the Save to directory checkbox is selected, the Add to Local Machine Store and Exportable
private key checkboxes are automatically selected.

· In the Save in format field choose from the list the format of the certificate to save. Possible values:
- PFX — the certificate will be saved in a PFX format file with the .pfx extension. This is the
default value.
- PEM — the certificate will be saved in a PEM format file with the .pem extension.

Warning! The options for choosing a place to install or save a certificate are available only when running the
utility as administrator.

4. Select the Show log checkbox to view detailed information about certificate creation process.
5. Click Create certificate button to create certificate with specified parameters.

21.4.13 AuditClient Utility


The functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Datacenter, SecurOS Enterprise, SecurOS Premium.

The utility is intended to obtain the SecurOS user actions audit data. This data is stored in special audit
databases located on each SecurOS Video Server and complement each other. Queries are addressed only
to the database of the currently connected Video Server. Audit data from several Video Servers can be
obtained when connecting to each of them sequentially. If the system is configured with the help of the
dsAdmin utility (see DSAdmin Utility) so the audit data from all Video Servers of the network is saved
into the single database, then aggregated audit data can be obtained in one utility session.

Warning! By default audit data is not being recorded. To start recording audit data to the database select the
Record system audit data checkbox in the System object settings.

www.issivs.com
SecurOS 516 Administration Guide
Appendixes

Audit data is retrieved accordingly to the query parameters specified by the user in the utility settings.
Query can be executed both with the standard and custom parameters. In the latter case the query can
be saved as a search template.

Location:
<SecurOS root folder>\audit_client.exe

To connect to the audit server when starting the utility, one must log in to SecurOS (see Figure 314).

Warning! Only SecurOS User with the Allow to audit system checkbox selected in the User Rights object
settings can authorize and connect to the audit server (see User Rights). Otherwise, connection to the audit
server is not possible.

Figure 314. AuditClient Utility. Authorization Window

The window contains the following fields:


· User/Password — name and password of the SecurOS User or OS user (see Active Directory /
LDAP) who is allowed to audit the system.
· Server — IP address or DNS name of the SecurOS Video Server where the audit database is located.
When connecting locally one can use 127.0.0.1 or localhost values.

In case of successful authorization and connection to the audit server, the main utility window will be
available (see Figure 315).

www.issivs.com
SecurOS 517 Administration Guide
Appendixes

Figure 315. AuditClient Utility Main Window

At the top of the window the Search parameter setting form is located. It contains the following
controls:
· Connection established with Server — information field where IP address or DNS name of the
connected audit server is displayed;
· Connect to other Server (button) — click this button to connect to other audit server;
· Search mode— select search mode:
- User activity — is used to request all user actions, for which an audit is provided;
- Configuration & object's mode changes — is used to request user actions related to
changing object settings, changing the object’s operating mode and archive recording mode;
- Access to video — is used to request user actions related to viewing live or archive video;
- PTZ Control — is used to request user actions related to PTZ control;
- Video export — is used to request user actions related to video export;
- Work with Auto Module — is used to request user actions performed when working with
SecurOS Auto;
- Advanced search — is used to create complex queries if none of the above query modes is
suitable for obtaining the required data;
- Search mode template — this mode is available if at least one search template is saved in the
system. In this case, the name of the saved search template is displayed in the list of search
modes. For the details see Working with Search Templates.
· Search parameters (block of parameters depending on selected search mode):
- From — date and time of the beginning of the search period, in date and time format of the OS;
- To — date and time of the end of the search period, in date and time format of the OS;
- User — select SecurOS User to analyze his actions in the system. This list contains only those
users whose actions are saved in the audit database at the moment of connection to the audit
server;

www.issivs.com
SecurOS 518 Administration Guide
Appendixes

- Actions — select user actions that must be analyzed;


- Object Type — select type of the object under which an actions have been performed;
- ID — identifier of the object of selected type;
- Camera ID — Camera's identifier;
- LP number — license plate number with which any operations have been performed when
working with SecurOS Auto Module;
- Users — select users whose actions must be analyzed;
- Object Type — select type of the object under which an actions have been performed;
- Advanced — select this checkbox to set search parameters manually. For more information about
creating custom queries, see the Advanced search section;
· Export (button) — click this button to export search results. For the details see the Exporting
Results section below;
· Search (button) — click this button to start searching with specified parameters;
· Buttons (available only in Advanced search mode or when working with the previously created
search templates. For the details see the Working with Search Templates section):
- Remove Template — remove current template from the search modes list;
- Save as Template — save specified set of parameters as search template for further use.

At the bottom of the window the search results table is located (see Figure 316). Structure of this table
also depends on the selected search mode.

Warning! Data in the search results table is not dynamically updated. That means only audit data that
matches the specified query time interval is displayed, even if new user actions are being registered in the
system. To update displayed data one must execute a new request taking into account the changed time
interval.

Figure 316. Search results table

Depending on the selected Search mode the result table may contain the following columns:

www.issivs.com
SecurOS 519 Administration Guide
Appendixes

· Time — action time, in OS date and time format, including milliseconds;


· User — name of the SecurOS user who performed an action;
· Computer — name of the Computer within SecurOS network where an action has been performed;
· Action — performed action;
· Object — object under which an action has been performed, in <Object_name> <Object_ID>
format;
· Interval — interval that matches specified Audit interval (see System), in OS date and time format,
including milliseconds. Is used to register the prolonged actions (viewing live/archive video, PTZ
control). For the details of intervals see the User Actions Analysis Example section;
· Name — name and identifier of the Tour, Preset or name of the Watchlist that have been changed by
the user;
· LP number — license plate number with which any operations have been performed when working
with SecurOS Auto Module or search string value;
· old LP number — previous license plate number with which any operations have been performed
when working with SecurOS Auto Module;
· Comment — comment created automatically by the system for some events.

Advanced search
If the Advanced checkbox is selected user can create his own search template (filter) of any complexity,
not provided by one of the specified standard search modes. This query can also be saved for future use
(see below). The following entities can be used as the query parameters:
1. events.id — event ID in the audit database;
2. events.server_host — name of the Computer on which the audit server works;
3. events.server_node — name of the Node on which the audit server works (when working in
cluster). When working not in cluster configuration coincides with the events.server_host
value;
4. events.event_time — event time, in YYYY-MM-DD HH:MM:SS.FFF format;
5. events.event_action — performed action ID;
6. events.user_domain — domain where the User which actions must be analyzed is registered;
7. events.user_host — name of the Computer on which the actions have been performed;
8. events.user_name — name of the User which actions must be analyzed;
9. events.comment — system comment to the event;
10.intervals.event_id — event ID;
11.intervals.time_from — the beginning of the interval (for prolonged actions), in YYYY-MM-DD
HH:MM:SS.FFF format;
12.intervals.time_to — the end of the interval (for prolonged actions), in YYYY-MM-DD
HH:MM:SS.FFF format;
13.objects.event_id — event ID;
14.objects.obj_type — type of the object under which an actions have been performed;
15.objects.obj_id — ID of the object under which an actions have been performed;
16.objects.obj_name — name of the object under which an actions have been performed;
17.params.param_type — type of the parameter under which an actions have been performed (when
configuring PTZ or working with SecurOS Auto);
18.params.param_value — parameter value (when configuring PTZ or working with SecurOS Auto).

www.issivs.com
SecurOS 520 Administration Guide
Appendixes

The following keywords and operators can be used in the query:

Table 113. Keywords and Operators

Keyword/ Operator Description


(,) Parentheses. Maximum nesting is 10.
"" Double quotes. Strings and regular expressions must be
enclosed in double quotes.
and, & Logical AND
or, | Logical OR
match Matching specified regular expression
nomatch Not matching specified regular expression
== Equal to
!= Not equal to
>, <, >=, <= Comparison operators

Below are the examples of custom queries.


· events.comment != NULL and objects.obj_type MATCH "CAM" — requesting all actions
with all Camera objects for which the Comment column is not empty.
· events.comment MATCH "prima." AND objects.obj_type MATCH "CAM" AND
objects.obj_id MATCH "^(8)$" — requesting all access actions to the Primary archive of the
Camera 8.
· events.user_name MATCH "^(User 2)$" AND objects.obj_type MATCH "CAM" AND
objects.obj_id MATCH "^(1|4|7|.7)$" — requesting actions of the User 2 that have been
performed under Camera objects, which identifiers are 1, 4 and 7 or ends with 7.
· events.comment MATCH "prima." AND intervals.time_from >= "2019-12-03
09:00" AND intervals.time_to < "2019-12-03 09:30" AND events.event_time >
"2019-12-07 14:00" AND events.event_time <= "2019-12-07 14:45" — requesting
actions with the 2019-12-03 09:00 - 2019-12-03 09:30 archive interval, that have been
performed by user from 2019-12-07 14:00 to 2019-12-07 14:45.

Working with Search Templates


Any set of parameters specified in the form's fields in the Advanced search mode can be saved as
search template for further use. Query defined in the Advanced field also can be saved as a search
template.

To save search template set required values in the form's fields and click the Save as Template button.
In the Creating template window (see Figure 317) specify template name and click the OK button.

www.issivs.com
SecurOS 521 Administration Guide
Appendixes

Figure 317. Creating template Window

Search template will be saved in the Search mode list. To apply saved search template select it in the list
and click the Search button.

Exporting Results
Audit data can be exported to the .CSV format file into the user specified directory. To export data click
the Export button, then in the Create report window (see Figure 318) set the directory and the file name.
Click the Create report button.

Figure 318. Create report Window

Warning! The ";" character (semicolon) is used as a data fields separator in the created .csv file.

21.4.13.1 Configuring Result Table

Each operator can customize the Result table appearance. The following components can be adjusted in
the window:
· Number of the displayed table columns;
· Order of the table columns;
· Width of the table columns.

To change the number of the displayed columns right click table header, then in the list of columns
deselect those columns that must not be displayed in the table (see Figure 319). To display hidden
columns click the ones that are not selected.

www.issivs.com
SecurOS 522 Administration Guide
Appendixes

Figure 319. Display/ Hide table


columns

To change the columns order click the required column and holding mouse button down move it to the
required position.

To change the columns width place mouse pointer over the columns separator. Mouse pointer will be
as presented in Figure 320.

Figure 320. Changing table column width

Press the mouse button, and while holding it down, move the cursor in the required direction.

21.4.13.2 User Actions Analysis Example


User action analysis example is based on the archive viewing operations data. Analysis of live video
viewing and PTZ control actions is carried out in the same way.

The data of the request for user actions when working with archived video is shown in Figure
321. Audit interval (see System) is set to 5 minutes.

www.issivs.com
SecurOS 523 Administration Guide
Appendixes

Figure 321. Audit of the user actions when viewing archive video

In this example User 2 performed the following actions in SecurOS:


· At 14:08:08 switched Camera 5 to archive mode.
· From 14:08:08 to 14:41:12 performed some operations with the archive.
· At 14:41:12 switched to the live video mode.

In the audit Result table the following entries correspond to these actions (in order of listing):
1. At 14:08:08.144 user switched camera to view the Primary archive (type of operated archive is
displayed in the Comment column). When switching to the archive mode archive pointer has been
set to the last frame of the archive. In archive used for example the time stamp of the last archive
frame is 11:18:32. For the given Audit interval (5 minutes) this position of the archive pointer
corresponds to the 11:15:00.000 - 11:19:59.999 Interval that is displayed in the table. After
that during 18 minutes, from 14:08:08.144 to 14:26:53.042, user did not access another
fragment of the archive. User actions are not analyzed in more detail (for example, he could view
fragments continuously or frame by frame within the current Interval that matches Audit interval).
2. At 14:26:53.042 user set the archive pointer to the 09:11:17 time stamp that is beyond the
boundaries of the previous Audit interval and corresponds to the 09:10:00.000 -
09:14:59.999 Interval (by archive time) and began viewing the archive.
3. At 14:30:35 user accessed archive fragment in the 09:15:00.000 - 09:19:59.999 Interval
(by archive time).
4. At 14:35:34 user accessed archive fragment in the 09:20:00.000 - 09:24:59.999 Interval
(by archive time).
5. At 14:40:34 user accessed archive fragment in the 09:25:00.000 - 09:29:59.999 Interval
(by archive time). By the condition of the example, the user finished viewing the archive at
14:41:12 and switched to live video mode. At this moment the archive pointer has been set at the
09:25:34 time stamp that does not cross the boundaries of the current 09:25:00.000 -
09:29:59.999 Interval.

21.5 Appendix E. Network Ports Used in SecurOS


SecurOS and its modules use a list of TCP and UDP ports for interaction.

Warning! Third-party applications should not use the ports that are used in the SecurOS software.

www.issivs.com
SecurOS 524 Administration Guide
Appendixes

You should check your firewall settings and open the following ports in both directions for SecurOS
executable files *.exe located in SecurOS program directory.
· TCP ports.
· UDP ports.

Table 114. TCP Ports

Service Port numbers

Core

SecurOS Base components 20950, 21111

Databases 5432

Health Monitor 23322

MCC DC Gateway 20904

Cluster 2379, 2380, 2381

Server Manager 20941

Audit API 40943

Video and Audio Subsystems

Video stream 20900

Archiver 20901

EdgeStorage Gate 20903

20905
ONVIF Tool Note. ONVIF Tool is used to get additional information
about ONVIF devices.

Audio stream 20910

ONVIF protocol operations 50000

Base Interface Subsystem

Operator's Interface (all components) 38880

Event Viewer 20944

Auxiliary components

3D Map 26889

Integrations

www.issivs.com
SecurOS 525 Administration Guide
Appendixes

Service Port numbers

21030

Note. Opening this port may be required not for all


IIDK integrations. To get additional information contact Intelligent
Security Systems Technical Support Team (see Getting
Technical Support section).

ActiveMedia Kit 23100

Integration Point 23000

SIP 20913

ASC (any integration) 20911

Intelligent Modules

SecurOS Mobile 7779

SecurOS System Dashboard 945

Table 115. UDP Ports

Service Port numbers

Core

SecurOS Base components 20950

21.6 Appendix F. Additional Windows Settings


Additional Windows settings provide correct SecurOS operation and are needed in order to use some of
the system functionalities, as well as to allow optimized system operation.

21.6.1 Installing Media Foundation under MS Windows Server 2012 R2

Windows Server 2012 is completely a server operating system. There are no multimedia components
and services installed when you perform initial OS install. However, these system components are
necessary for proper SecurOS operation including, particularly, Video Capture Device with Player AVI
type, and must be installed manually. To install the Media Foundation component do the following:

1. Open the Server manager console application.


2. In the Manage menu select Add roles and features option.
3. On the Select installation page select Role-based or feature-based installation option.
4. Click Next to select features. Select the Media Foundation feature.
5. On the Confirm installation selections page review your role, feature, and server selections. If you
are ready to install, click Install.
6. Restart server if needed.

www.issivs.com
SecurOS 526 Administration Guide
Appendixes

21.6.2 SMTP Mail Server Installation and Configuration

Note. All actions must be performed under local or domain administrator account.

On the computer with Mail service installed open Control Panel and choose Add or Remove Programs,
then Add/ Remove Windows Components.

Choose Internet Information Services (IIS) from the list and click the Details button (see figure 322).

Figure 322. Windows Components Wizard

Enable SMTP Service in the list (see figure 323). Click OK and Next buttons.

www.issivs.com
SecurOS 527 Administration Guide
Appendixes

Figure 323. Internet Information Services Components

To configure SMTP server for message delivery, after SMTP service installation:
® ®
1. Open Control Panel Administrative Tools Internet Information Services.
2. On the left side of the new window (see figure 324) right-click Default SMTP Virtual server (or
another name, given by default) and choose Properties.

Figure 324. IIS Services tree

3. Choose Access tab and click the Relay button.


4. Choose All in new Relay Restrictions window to allow delivery from all computers sending mail
through this server, and click OK (see figure 325).

www.issivs.com
SecurOS 528 Administration Guide
Appendixes

Figure 325. SMTP server relay restrictions settings

5. Choose Delivery tab and click the Advanced button.


6. In new Advanced Delivery window (see figure 326) specify remote server to route all sending mail
in Smart Host field and click OK.

Figure 326. Mail routing remote server settings

7. Click OK to close SMTP server properties window and save all changes.

www.issivs.com
SecurOS 529 Administration Guide
Appendixes

8. Choose Action ® Run to run SMTP server service.


21.6.3 Disabling Disk Cleanup Master

It is recommended to disable system warnings on full disk for operator workstations / video servers.

To disable the disk cleanup master:


®
1. Open registry editor (Start Run ® regedit).
2. Choose
\HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer section and
create DWORD parameter with name NoLowDiskSpaceChecks.
3. Assign 0 value to created parameter to disable full disks check (1 — to enable this check again).
4. Close registry editor and reboot the computer.

21.7 Appendix G. Additional SecurOS Settings


Additional SecurOS settings provide a properly system functioning with the current Windows OS
settings.

21.7.1 Adjusting SecurOS when scaling Windows

If SecurOS is running on large-diagonal monitors with a high current resolution, Windows scaling
(Start® Settings ® Parameters ®
System ®
Display ®
Scale and layout) may distort graphical user
interface elements of SecurOS.

To automatically adjust the SecurOS interface elements, when the scale or resolution of Windows is
changed, do the following:
1. Find the qt.conf_ file located in the ./bin64 folder of <SecurOS_root_directory> and
change name to qt.conf.
2. Restart the Video Management System Server service (see Server Control Agent Utility).

21.8 Appendix H. Error Messages When Launching System


When launching, SecurOS system can report some problems. List of such problems and their
descriptions is represented in Table 116.

Table 116. Possible error messages on system startup

Message Recommendations

Check that there is a file called key.iss in the SecurOS program


folder. If there is no such file, you should copy it manually to the
"Key file not found"
SecurOS root folder on the Conf iguration Server (file is located on
installation CD or, you also can received it by e-mail).

www.issivs.com
SecurOS 530 Administration Guide
Appendixes

Message Recommendations

Unexpected program error has occurred during system startup.


Generate system report using the SystemInfo utility (see
"Starting failed" SystemInfo Utility for more information) and contact the local ISS
Technical Support Team providing this report to analyze it and
solve the problem (see Getting Technical Support).

Your key.iss file has expired. Contact Technical Support Team for
"Key file expired"
a new key (see Getting Technical Support).

Perform the following steps:


· Check the database connection parameters using the DSAdmin
Utility.
· Check the database connection using the PgAdmin III utility
included in the PostgreSQL Kit.
· Make sure the Windows service PostgreSQL Database
"DB Connection Error" Server 9.x exists and is running.
· Make sure that the user who launches the system has rights for
reading the HKLM/Software/ISS/SecurOS/NISS400/DB key.
· Reinstall SecurOS. Pay special attention to PostgreSQL installation
procedure steps.
· If these recommendations did not solve the problem, please
contact the local ISS Technical Support Team. Attach the system
information obtained from the SystemInfo utility.
During the SecurOS installation you specified interface language
that is not allowed in your license key. You should either re-install
"Language is not supported" SecurOS software on this machine and choose valid interface
language in Setup Wizard, or provide new key.iss file that
permits using this language.

Country settings (Start ®


Control Panel ®
Regional and Language
Options) differ from those allowed in your license key. Check these
“Country is not supported"
settings to see if country is specified properly or provide a new
key.iss file that permits using current country settings.

Generate system report using the SystemInfo utility (see


“Failed to load one of the SystemInfo Utility for more information) and contact the local ISS
integration libraries" Technical Support Team providing this report to analyze it and
solve the problem (see Getting Technical Support).

21.9 Appendix I. Technical Support Information

Current section contains service information that is necessary on addressing to Intelligent Security
Systems Technical Support.

Note. Collected data have to be send to the Intelligent Security Systems Technical Support Team (see Getting
Technical Support).

www.issivs.com
SecurOS 531 Administration Guide
Appendixes

To ensure quick technical support, prepare the following technical information:

Warning! Data in items marked by "*'' are necessary to report.

1. (*) User (customer) name to address to.


2. (*) Organization name.
3. (*) User (or organization) contacts: phone, e-mail.
4. Name of a personal Intelligent Security Systems manager (on Intelligent Security Systems authorized
partner case). Otherwise, give the following data:
· Company where the hardware and software components were purchased.
· Actions proposed to solve the problems announced by a partner from whom the product was
purchased.
5. (*) Problem description.
6. (*) Actions results in the problem.
7. List of changes which result to the problem in case of applying after some changes in system
settings/configuration.
8. System and diagnostic information on computer and SecurOS system configuration obtained from
the SystemInfo utility (see SystemInfo Utility for detailed information about utility).
If it is impossible to run the utility provide the following information:
· (*) Guardant keys identifiers and Dallas code;

Note. Equipment Dallas code can be found by the Hardware Report Utility (see Hardware Report Utility for
detailed information about utility).

· (*) name and version of the installed Intelligent Security Systems company software.
· total number of video servers and monitoring (operator) workstations in the system;
· operating system (name and service pack version).
9. Another useful information, if possible. For example:
· computer equipment configuration.
· central processors load.
· main and virtual memory used volumes.
· network load.
· network and network neighborhood configuration.

www.issivs.com
SecurOS 532 Administration Guide
Index

Loitering detector, 390


Wrong direction detector, 383
Address (IPv4) for Multicast group, parameter,
Camera, 223
Index Address mapping, parameter,
Remote System, 420
Administration mode, 68
" Administrator Toolbar, 73
Advanced, parameter,
"Play the last N s/min of record" Command, parameter,
HTML5 FrontEnd, 186
Media Client, 288
HTML5 Pop-up, 330

A Alarm condition, parameter,


Sensor, 318
Accept insecure connections, parameter, Alarm threshold, parameter,
System, 131 People with no helmet detector, 402
Accept TLS connections only, parameter, Alarming, property, 252
System, 131 Algorithm, parameter,
access level, Wrong direction detector, 383
Configure, 146 Allow access, parameter,
Control, 146 System, 128
Full access, 146 Allow auto logon for User(s), parameter,
Inherited rights, 146 Computer, 152
No access, 145 Allow to audit system, parameter, 144
View, 146 Allow to configure system, property, 144
Access password, parameter, Allow to edit FaceX watchlists, parameter, 144
Remote System, 420 Allow to hold PTZ control, parameter, 144
Access to Long-term archive, parameter, Allow to request PTZ control, parameter, 144
Media Client, 288 Allowed direction deviation, parameter,
account, Wrong direction detector, 382
postgres, 65 Analyze reduced FPS stream, max FPS parameter, 253
ACS and Fire Alarm System Database, parameter, Application window (optional), parameter,
Computer, 153 External Window, 185
Activate Desktop, parameter, 152 Application, parameter,
Active Directory / LDAP object description, 140 External application, 164
Add authorization data to URL, parameter, External Window, 184
Generic RTSP Video Capture Device, 239 Archive Converter object description, 255
Add directory, button, Archive export profile object description, 264
Archiver, 266 Archive recording, 202
Add footer, parameter, archive recording to the files of specified length,
Media Client, 279 154
Add SecurOS Evidence Manager, parameter, frames number, 209
Archive Converter, 257 frames queue, 210
Additional information, parameter, 140 free disk space, 202
Additional neural filter of people, parameter, threshold, 202
Intrusion detector, 394 archive recording rights,
Line crossing detector, 388 granting rights to user, 202
Loitering detector, 390 Archive, tab,
Running detector, 381 Computer, 152
Wrong direction detector, 383 Archiver object description, 264
Additional neural filter of vehicle, parameter, Archives priority, parameter, 261
Intrusion detector, 394 Archiving mode, parameter,
Line crossing detector, 388 Archiver, 266

www.issivs.com
SecurOS 533 Administration Guide
Index

Arguments, parameter, Camera is defocused when camera sharpness reduces


External application, 164 by, parameter,
Armed always, property, 252 Defocus detector, 246
Attachments, parameter, Camera is focused, button,
E-mail Message, 333 Defocus detector, 246
Audible Notification Service object description, 335 Camera name, parameter,
Audio Capture Device object description, 312 SIP Device, 343
Audit interval, parameter, Camera object description, 217
System, 131 Camera preset, parameter,
AuditClient Utility, SIP Device, 343
configuring GUI, 521 Camera serial number parameter,
AuditClient, utility, 516 Camera, 241
Auto user logging off after lock screen, parameter, Camera, setting up, 301
Computer, 152 Cameras, parameter,
Auto white balance, parameter, RTSP Server, 272
Camera, 241 Capacity, parameter,
Autogain, parameter, 241 Archiver, 266
Automatic backup, parameter, CC, parameter, 333
System, 130 CCTV keyboard or joystick object description, 319
Automatic center align by X, parameter, 242 Cells, parameter,
Automatic center align by Y, parameter, 242 Layout, 249
Centering frame on the selected point, parameter,
B ONVIF type, 236
Certificate and key, parameter,
Backlight Compensation level, parameter,
ONVIF Server, 274
ONVIF type, 235
Certificate password, parameter,
Backlight Compensation, parameter,
ONVIF Server, 275
ONVIF type, 235
Channel, parameter,
Base, parameter,
Camera, 218
Camera, 221
Microphone, 314
Media Client, 281
Relay, 319
Bgain, parameter,
Sensor, 318
ONVIF type, 235
Checking period, parameter,
Blinding detection property,
Defocus detector, 246
Camera, 230
Classification Tab,
Bound, parameter, 314
Tracking Kit III plugin, 369
Breakpoint on first instruction, parameter,
Clear all, property (Zone), 253
Node.js Script, 353
Codec for recording, parameter,
Brightness, parameter,
Camera, 242
ONVIF type, 235
Codec of camera video stream, parameter,
Buffer size, parameter,
Camera, 242
Camera, 219
Codec, parameter,

C Archive Converter (Audio), 262


Archive Converter (Video), 261
Camera, Computer object description, 149
Image settings, 202 Computer's role, parameter, 151
Camera alarm mode control, parameter, Computers that are allowed to connect to the network,
Media Client, 279 parameter,
Camera elevation, parameter, IIDK Interface, 354
Object counter, 398 configuration,
Camera ID in the edge device, parameter, quick steps, 476
Camera, 223 configuration examples, 299

www.issivs.com
SecurOS 534 Administration Guide
Index

configuration examples, 299 Detection delay, parameter,


domain for LDAP provider, 103 Fallen person detector, 409
domain for Windows NT provider, 103 Detection period, parameter,
standalone configuration, 299 People with no helmet detector, 402
Video Server and Operator Workstation, 300 Device control IP address, parameter,
Configuration Server address, parameter, Camera, 237
Remote System, 420 Device list, parameter,
Confirm new password, parameter, Media Client, 278
System, 128 Device tree,
Connect, radio-button, Map, 175
Database, 136 Device, parameter, 334
Contact, parameter, Digital zoom, parameter,
SIP Device, 343 Media Client, 279
SIP Subsystem, 342 Directory, parameter,
Contrast property, Archiver, 266
Camera, 231 Disable if Event Viewer exists, parameter, 336
Contrast, property, Disable NAT hole punching, parameter,
Zone, Motion detection, 252 Generic RTSP Video Capture Device, 240
Coordinates, parameter, Disable saving data into local Protocol DB, parameter,
Camera, 218 152
Create DB and User, button, Disable shared PTZ control property,
Database, 138 Camera, 232
Create new level, button, Display area,
Map, 175 Map, 175
Create new, radio-button, Display, parameter,
Database, 136 External Window, 184
Crowd detector object description, 395 HTML5 FrontEnd, 186
Custom ringtone, parameter, HTML5 Pop-up, 330
SIP: GUI, 345 Map: GUI, 181
Media Client, 278
D SIP: GUI, 345
Display, property,
Database connection settings Utility (dsadmin.exe), 497
Event Viewer, 183
Database name/User/Password, parameters,
Do not adjust frame timestamp for fast forward
Database, 137 playback, parameter,
Database object description, 136
Camera, 227
Database Partitioner object description, 164
Do not recover last, min, parameter,
Database Update Utility (idb.exe), 500
Camera, 228
Databases, parameter, Do not show the notification window when there are
Databases Replicator, 166 new problems, parameter,
Day/Night shift level, parameter, Health Monitor, 107
Camera, 237 Do not use proxy server for, parameter,
Decision confidence, parameter, Remote system, 422
Fallen person detector, 409 Download speed relative to FPS, parameter,
Fight detector, 404 Camera, 228
Defocus detector, 247 Duration of inactivity before the end of the fight,
Delete with primary archive, parameter, 153 parameter,
Department object description, 138 Fight detector, 404
Description, parameter, Duration of post-recording, parameter,
SIP Device, 344 Camera, 226
Desktop object description, 167 Duration of pre-recording, parameter,
Detection area, parameter, Camera, 226
Defocus detector, 246 Duration, parameter,

www.issivs.com
SecurOS 535 Administration Guide
Index

Duration, parameter, Dwell time detector, 392


Crowd detector, 396 Fallen person detector, 409
Loitering detector, 390 Fight detector, 404
Dwell time detector object description, 390 Intrusion detector, 393
Line crossing detector, 387
E Loitering detector, 389
Edge Storage, Object counter, 397
People with no helmet detector, 401
Hardware requirements, 197
Running detector, 380
Requirements to the camera local storage, 197
Smoke detector, 399
Time synchronization, 197
EdgeStorage Gate to work with archives from external Wrong direction detector, 382
systems, parameter, Event priority (Object left behind detector detector),
parameter,
Remote System, 421
Edit, button, Left behind and Removed object detector, 385
Event priority (Removed object detector), parameter,
Archiver, 266
E-mail Message object description, 332 Left behind and Removed object detector, 386
Event priority, parameter,
E-mail Message Service for sending one-time access
code, parameter, 144 Crowd detector, 396
E-mail Message Service object description, 331 Dwell time detector, 392
E-mail, parameter, 140 Fallen person detector, 409
Emergency service object description, 336 Fight detector, 404
Enable buffering, parameter, Intrusion detector, 393
Media Client, 285 Line crossing detector, 387
Enable Cameras and Microphones grouping, parameter, Loitering detector, 389
Media Client, 278 Object counter, 397
Enable failover of the Video server and add to the People with no helmet detector, 401
cluster, parameter, Running detector, 380
Computer, 151 Smoke detector, 399
Enable multicast mode, parameter, Wrong direction detector, 382
Camera, 223 Event Viewer object description, 182
Enable raw event transmission, parameter, Event, parameter,
ONVIF type, 234 Macro, 350
Enable shared Views setup, parameter, Remote System, 420
Media Client, 283 Execute locally, parameter, 350
Enable stream synchronization parameter, Export,
Virtual Video Capture Device, 239 Audio, 493
Encryption algorithm, parameter, 261 Video, 492
Encryption, parameter, Export to, parameter, 258
E-mail Message Service, 331 Export video with audio, parameter, 261
Erase images of vehicles older than, parameter, Exposure Time, parameter,
Database Partitioner, 165 ONVIF type, 235
Erase recognition results older than, parameter, Exposure time, μs, parameter,
Database Partitioner, 165 Camera, 242
Erase records older than, parameter, External Window object description, 184
Database, 137
Event name (Object left behind detector detector),
parameter,
F
FaceX Camera, parameter,
Left behind and Removed object detector, 385
Thermometer, 462
Event name (Removed object detector), parameter,
FaceX proxy server, parameter,
Left behind and Removed object detector, 386
System, 129
Event name, parameter,
FaceX: Server, parameter,
Crowd detector, 395
Thermometer, 462

www.issivs.com
SecurOS 536 Administration Guide
Index

False positives filtering, button, Layout, 249


People with no helmet detector, 402 Guardant key, 486
File name and Browse button, parameter, installation, 23
SIP: GUI, 345
File type property, 257 H
Fill all, property, 253
H263: Ignore UFEP, parameter,
Filter objects in ACS: GUI, parameter,
Generic RTSP Video Capture Device, 240
Map: GUI, 182 H265: Ignore FU end bit in header, parameter,
Filter, parameter,
Generic RTSP Video Capture Device, 240
SIP Device, 343 H265: Ignore FU start bit in header, parameter,
Firmware file, parameter,
Generic RTSP Video Capture Device, 240
Video Capture Device, 216 H265: Ignore FU type in header, parameter,
Firmware, parameter,
Generic RTSP Video Capture Device, 240
Video Capture Device, 216 H265: Ignore payload type in FU header, parameter,
For motion detection, parameter,
Generic RTSP Video Capture Device, 240
Camera, 221 Hardware acceleration, parameter,
For video recording, parameter,
Media Client, 293
Camera, 221 Hardware property, 319
Forbid to hide interface, property, 144
Hardware Report Utility, utility, 486
Force camera night mode shift, parameter,
Hardware, parameter,
Camera, 237
Sensor, 318
Forensic search Tab,
HDR processing, parameter,
Tracking Kit III plugin, 371
Camera, 242
Format, property,
Health Monitor object description, 106
Video Capture Device, 213 Helmets detection threshold, parameter,
FPS divider, parameter, 262
People with no helmet detector, 402
FPS reduction performed on server, parameter, 262
Hide Macro button from Control Panel, parameter,
Frame Export, parameter,
Macro, 350
Media Client, 279 Hide Macros in Camera menu, parameter,
Frame height, px, parameter,
Media Client, 294
Camera, 242 High resolution, parameter,
Frame Print, parameter,
Camera, 221
Media Client, 279
Media Client, 281
Frame width, px, parameter,
Holidays, parameter,
Camera, 242
Schedule, 348
From, parameter, 333
Holidays, property,
From, To, parameters,
Security Zone, 133
Schedule, 348 Host, parameter,
Full FPS on alarm, parameter,
Database, 137
Camera, 226 Host/Port, parameters,

G Emergency service (RTSP server), 338


Emergency service (WebView), 338
Gain Max, parameter, 242 HTML5 FrontEnd object description, 185
Gain Min, parameter, 242 HTML5 Pop-up, object, description, 329
Gain, parameter, 241, 314 HTTP address of Emergency Service, parameter, 337
Camera, 229 HTTP Event Gate object description, 354
ONVIF type, 235 HTTP port, parameter,
Gateway for video, parameter, RTSP Server, 272
Remote System, 421
Get IQN list, button, I
iSCSI drive, 445 Icon, parameter,
Grid, parameter,

www.issivs.com
SecurOS 537 Administration Guide
Index

Icon, parameter,
Macro, 351 J
Icons, parameter,
joystick,
Map, 174
configuring, 309
ID, 75
ID, parameter,
Macro (Actions), 350
K
Macro (Event), 350 Keep Camera positions after restart, parameter,
Identifier (Presets) property, Media Client, 294
Camera, 233 keyboard shortcuts, 465
Identifier (Tours), parameter,
Camera, 233 L
Ignore qop (Quality of protection) parameter with auth Layout object description, 248
value when using digest authentication parameter, Layouts panel, parameter,
Camera, 240 Media Client, 283
Ignore RTP payload type, parameter, Left Behind and Removed Object Detector object
Generic RTSP Video Capture Device, 239 description, 384
Ignore RTP SSRC, parameter, Level, parameter,
Generic RTSP Video Capture Device, 239 Camera, 229
Ignore sequence number in RTP header (for RTP/TCP Microphone, 314
only), parameter, License key, 24, 54
Generic RTSP Video Capture Device, 239 expiration date remainder, 105
IIDK Interface object description, 353 expiration date remainder setup, 105
Illumination mode, parameter, updating, 105
Camera, 237 License key for Linux OS,
Image Processor object description, 270 request, 54
Immediately restart stream on disconnect, parameter, License key for Windows OS,
Generic RTSP Video Capture Device, 240 request, 25
Incident Types List parameter, Light Detector object description, 254
Emergency service, 338 Light, parameter,
Information about configured window block, Camera, 220
Desktop, 168 Limit live video FPS, parameter,
Inner zone property, 255 Media Client, 285
Integration point object description, 464 Line crossing detector object description, 386
Integration with 3rd Party Systems, 353 Linked to Camera, parameter,
Intersection of object and zone, parameter, Microphone, 314
Dwell time detector, 392 List of the IP addresses, parameter,
Intrusion detector, 394 IIDK Interface, 354
Loitering detector, 390 Load from file, button,
Intrusion detector object description, 392 Emergency service, 338
IP address, parameter, Login, property,
Audio Capture Device, 313 Audio Capture Device, 313
SIP Subsystem, 342 Logo Overlay, parameter,
IP address, property, 214 Archive Converter, 262
IP-Device Manager object description, 86 Loitering detector object description, 388
IQN, parameter, Long Dwell Duration, parameter,
iSCSI drive, 445 Dwell time detector, 392
IR filter mode, parameter, Low resolution, parameter,
ONVIF type, 236 Camera, 221
Iris, parameter, Media Client, 281
ONVIF type, 235

www.issivs.com
SecurOS 538 Administration Guide
Index

Left behind and Removed object detector, 386


M Minimum/Maximum, parameters,
Macro object description, 349 Media Client, 281
Mode, parameter,
Manual exposure control, parameter,
Archiver, 266
ONVIF type, 235
Map, Intrusion detector, 394
Left behind and Removed object detector, 386
Adding level, 176
People with no helmet detector, 401
Child level, create, 178
Model, parameter,
Display collapsed object caption, 180
Video Capture Device, 212
layers image, 176
Model, parameter,
Level link, 178
Audio Capture Device, 313
Level, delete, 178
Multi-cell zoom without stream switching, parameter,
Level, edit, 178
Media Client, 279
Objects, deleting, 180
Objects, moving, 179
Objects, moving object name, 180 N
Objects, positioning, 179 Name, 75
Objects, rotating, 179 Name pattern, parameter, 259
Searching by name, 179 Name, parameter,
working principles, 175 Archiver, 267
Map object description, 173 Macro (Actions), 350
Map, parameter, Macro (Event), 350
Map: GUI, 181 Map, 174
Map: GUI object description, 181 Network interface for connection, parameter,
Map: GUI, parameter, Node.js Script, 352
SIP: GUI, 345 Network latency, ms, parameter,
Max. FPS, parameter, Camera, 224
Archiver, 267 New password, parameter,
Maximum allowed temperature, parameter, System, 128
Thermometer, 462 NN fallen person detector, object, description, 408
Maximum backup number, parameter, NN Fare Evasion Detector, object, description, 406
System, 130 NN Fight Detector, object, description, 403
Maximum Protocol DB size, parameter, 153 NN loitering detector, object, description, 404
MCC DC Gateway object description, 417 NN occupancy counter, object, description, 410
Measurements alignment delay, parameter, Node.js Script object description, 351
Thermometer, 462 Non-standard Washer Kit control commands,
Media Client, parameter, parameter,
SIP: GUI, 345 ONVIF type, 236
Media Export Utility, 492 Non-standard Wiper control commands, parameter,
Memory frames, property, 253 ONVIF type, 236
Message field, parameter, Number of records in partition, parameter,
E-mail Message, 333 Database Partitioner, 165
Message, parameter,
Short Message, 335 O
Microphone object description, 314 Object class, parameter,
Microphone tree, parameter, Intrusion detector, 394
Media Client, 291 Line crossing detector, 387
Microphone, parameter, Loitering detector, 389
Camera, 229 Object counter, 397
Minimum count, parameter, Wrong direction detector, 383
Crowd detector, 396 Object counter object description, 396
Minimum object detection time, parameter, Object left behind detector, parameter,

www.issivs.com
SecurOS 539 Administration Guide
Index

Object left behind detector, parameter, Playback archive from the edge device, parameter,
Left behind and Removed object detector, 385 Camera, 227
Object Tree, 73 Port for Multicast group, parameter,
Child object, 73 Camera, 223
Desktop, 168 Port, parameter,
Parent object, 73 Active Directory / LDAP, 141
Object tree parameter, Computer Vision, 360
Sensor, 318 Database, 137
Object Tree, parameter, E-mail Message Service, 331
MCC DC Gateway, 417 MCC DC HTTP Proxy, 418
Media Client, 285 Movable PostgreSQL, 446
OK/Cancel, property (buttons), 253 ONVIF Server, 274
On following week days, parameter, REST API, 356
Schedule, 348 SIP Subsystem, 342
ONVIF Server object description, 273 Position, parameter,
Operator reaction on alarm event, property, 183 Archive Converter, 262
Outer zone (secondary) property, 255 Primary camera, parameter,
Outer zone property, 255 SIP Device, 344
Privileged access to Remote systems, parameter,
P System, 129
Profile, parameter,
Pack, parameter,
Camera, 222
E-mail Message, 334
Prohibit privileged access, parameter,
Page dwell time when auto scrolling, parameter,
System, 129
Media Client, 279
Protocol database length, property, 133
Pan/Tilt/Zoom, parameter,
Protocol property,
Camera, 218
Params, parameter, 350 Relay, 319
Protocol, parameter,
Partition tables of database, parameter,
Audio Capture Device, 313
Database Partitioner, 165
Password, parameter, Camera, 223
ONVIF Server, 274
SIP Subsystem, 342
Video Capture Device, 213
User account, 139
Provider, parameter, 141
Password, property,
Providers, parameter, 145
Audio Capture Device, 313
Proxy server, parameter,
Video Capture Device, 215
Path parameter, Remote system, 422
PTZ channel property,
Camera, 222
PCI channel, parameter, 213 Camera, 232
PTZ control priority, parameter, 144
Audio Capture Device, 313
PTZ control via mouse, parameter,
People with no helmet detector object description, 400
Person detection threshold, parameter, Media Client, 279
PTZ Control, parameter,
People with no helmet detector, 402
Phone, parameter, Media Client, 278
PTZ protocol property,
Short Message, 335
Camera, 232
User Account, 139
Pixel format parameter,
Camera, 241 Q
Place Camera on the current layout/view by single click, Quality, parameter,
parameter, Archive Converter (Video), 261
Media Client, 293 Quick video export, parameter, 261
Play button, button,
SIP: GUI, 345

www.issivs.com
SecurOS 540 Administration Guide
Index

Emergency service, 338


R ONVIF Server, 274
RTSP Specification, parameter,
React, parameter, 350
Record system audit data, parameter, RTSP Server, 272
Run Macro at start, parameter, 133
System, 130
Running detector object description, 379
Recording control, parameter,
Media Client, 278
Recording mode, parameter, S
Camera, 225 Samplerate, parameter,
Recover archive from the local storage of Camera (Edge Audio Capture Device, 313
Storage), parameter, Camera, 229
Camera, 227 Saturation, parameter,
Reduce frame rate, parameter, 262 ONVIF type, 235
Reduce max FPS to, parameter, Save button,
Camera, 226 System, 129
Registration Files Editor (ddi.exe), utility, 502 Save movement coordinates (enables Smart Search),
Relay number, parameter, 319 property, 252
Relay, object, description, 319 Save to file, button,
Remote debugger attaching, parameter, Emergency service, 339
Node.js Script, 352 Scale, parameter,
Remote system object description, 418 Map, 175
Remote system’s archive transfer option, parameter, Scaling selected frame area, parameter,
Media Client, 288 ONVIF type, 236
Remove after property, Scene Tab,
Camera, 227 Tracking Kit III plugin, 364
Remove after, parameter, Schedule property,
Archiver, 267 Archiver, 266
Remove, button, Schedule, object, description, 346
Archiver, 267 Script execution result window (Console), parameter,
Removed object detector, parameter, Node.js Script, 353
Left behind and Removed object detector, 385 Script window, parameter,
Replicate to database, parameter, Node.js Script, 353
Databases Replicator, 166 Search, box,
Require authentication, parameter, Map, 175
RTSP Server, 272 Security Zone object description, 131
Requires authentication, parameter, 331 SecurOS Logging, 104
REST API object description, 355 Select certificate, button,
Restore button, ONVIF Server, 274
System, 129 Select key, button,
Reveal user name when holding PTZ control, parameter, ONVIF Server, 275
144 Select zone, parameter,
Rgain, parameter, Wrong direction detector, 384
ONVIF type, 235 Select, button,
Rights, property, 143 Archive Converter, 262
Ringtone, parameter, External Window, 184
SIP: GUI, 345 Send Ticket to Emergency Service, parameter,
RTP over RTSP (TCP), parameter, Event Viewer, 183
Camera, 223 Media Client, 293
RTSP port, parameter, Sender, parameter,
RTSP Server, 272 E-mail Message Service, 332
RTSP Server object description, 271 Sensitivity property,
RTSP server, parameter, Light Detector, 255

www.issivs.com
SecurOS 541 Administration Guide
Index

Sensitivity, parameter, Running detector, 380


Smoke detector, 399 Split into files up to, parameter, 258
Wrong direction detector, 384 Standard layouts, parameter,
Sensor, object, description, 317 Media Client, 281
Serial port number parameter, Standby mode, property,
Camera, 233 Camera, 242
Server IP address, parameter, Stop execution (editor mode), parameter,
Computer, 151 Node.js Script, 352
Server Manager utility, 478 Store at least, parameter,
Server, parameter, Camera, 227
Active Directory / LDAP, 141 Store, parameter, 153
Set typical size of the object, button, Stream 1, parameter,
Object counter, 398 Camera, 221
Sharpness, parameter, Stream 2, parameter,
ONVIF type, 235 Camera, 221
Short Dwell Duration, parameter, Stream 3, parameter,
Dwell time detector, 392 Camera, 221
Short Message object description, 334 Stream profile ID, parameter,
Short Message Service object description, 334 Camera, 228
Short/Middle/Long range illumination, parameter, Subject, parameter, 333
Camera, 237 superuser, 96
Show alarmed levels, parameter, System object description, 127
Map: GUI, 182 SystemInfo, utility, 488
Show all zones, property, 253
Show Camera ID, parameter, T
Media Client, 279 TCP port, parameter,
Show Cameras in Media Client and filter objects in ACS:
SIP Subsystem, 342
GUI on Level activation, parameter,
technical support,
Map: GUI, 182
gathering system information utility, 477
Show level tree, parameter,
how to get, 12
Map: GUI, 181
how to prepare service information, 530
Show Macro in Media Client in the menu of selected
Test connection (button),
Cameras, parameter,
iSCSI drive, 446
Macro, 351
Show Media Client ID, parameter, Test connection, button,
Media Client, 279 Database, 137
Single-cell zoom with stream switching, parameter, Microphone, 315
Text color,
Media Client, 279
Size property, Map, 174
Thermal camera, parameter,
Camera, 231
Size, property, Thermometer, 462
Thermometer object description, 461
Zone, 252
Smoke detector object description, 398 Time of acknowledgment of alarm event by the
operator, property, 184
SMTP Server, parameter, 331
Time to display Camera after alarm ends, parameter,
SNMP agent object description, 161
Media Client, 277
Sound card, parameter,
Title (Presets) property,
Audible Notification Service, 336
Camera, 233
Speaker, parameter,
Title (Tours), parameter,
Camera, 230
Camera, 233
Specific date, parameter,
To, parameter, 333
Schedule, 348
Tour type, parameter,
Speed (person width per second), parameter,
Camera, 233

www.issivs.com
SecurOS 542 Administration Guide
Index

Tracker Tab, Media Client, 283


Tracking Kit III plugin, 368 Use primary domain controller, parameter, 141
Tracking Kit III object description, 363 Use secure connection (HTTPS), parameter,
Treat a large object as a group of objects, parameter, Audio Capture Device, 313
Object counter, 398 Video Capture Device, 215
Type, parameter, Use secure connections, parameter,
Audio Capture Device, 313 System, 131
Database, 137 Use SecurOS Motus built-in controller, parameter,
Macro (Actions), 350 Camera, 237
Macro (Event), 350 Use stream on request, parameter,
Video Capture Device, 212 Camera, 223
Use the service for two-factor authentication, parameter,
U E-mail Message Service, 332
Use two-factor authentication by e-mail, parameter, 144
UDP port, parameter,
User Account object description, 139
SIP Subsystem, 342
User and Password, parameter,
Update configuration, button,
iSCSI drive, 445
Integration point, 464
User Name, Password, parameter, 142, 331
URL, parameter,
User Rights object,
HTML5 FrontEnd, 186
settings for LDAP provider, 104
HTML5 Pop-up, 330
User rights object,
Use Archive export profiles, parameter,
settings for Windows NT provider, 103
Media Client, 288
User Rights object description, 142
Use as Operator Workstation Profile, parameter,
User, parameter,
Computer, 151
Use authentication, parameter, SIP Subsystem, 342
User, property,
iSCSI drive, 445
Use camera settings, parameter, Video Capture Device, 215
User/Password, parameters,
Camera, 222
Use compatible URL formatting in SETUP method, Emergency service, 338
parameter, Users and Groups having these rights, parameter, 144
Generic RTSP Video Capture Device, 239 User's Layouts, parameter,
Use credentials provided at system login, parameter, Media Client, 281
142
Use device, parameter, V
Fallen person detector, 409 Video Capture Device object description, 212
Use digest authentication only, parameter, Video, property,
Camera, 219 Zone, 253
Use encryption, parameter, 141 View object,
Use Event Filter, parameter, 153 Create, 297
REST API, 356 Delete, 298
Use Event Filter, property, 183 Edit, 297
Use GPU, parameter, Rename, 298
People with no helmet detector, 401 View object description, 250
Use HTTPS, parameter, View, parameter,
REST API, 356 Video Capture Device, 215
Use interframe delays from file parameter, Viewing, parameter,
Virtual Video Capture Device, 239 Camera, 219
Use only selected Cameras, parameter, Views list, parameter,
Media Client, 285 Media Client, 283
Use only selected microphones, parameter, Visual settings area,
Media Client, 291 Desktop, 168
Use only selected shared Views, parameter, Visualize Computer Vision events, parameter,

www.issivs.com
SecurOS 543 Administration Guide
Index

Visualize Computer Vision events, parameter,


Media Client, 286 X
Volume, parameter,
X, Y, parameters,
Audible Notification Service, 336
Media Client, 278
X, Y, W, H, parameter,
W External Window, 184
W, H, parameters, HTML5 FrontEnd, 186
Media Client, 278 HTML5 Pop-up, 330
Washer Kit / Wiper protocol, parameter, SIP: GUI, 344
Camera, 240 X, Y, W, H, property,
Washing Kit, parameter, Event Viewer, 183
Camera, 219 Map: GUI, 181
WDR level, parameter, X-offset, px, parameter,
ONVIF type, 236 Camera, 242
WDR mode, parameter,
ONVIF type, 235 Y
WebSocket port, parameter,
Y-offset, px, parameter,
REST API, 356
Camera, 242
WebView Monitor, parameter,
Emergency service, 338
WebView, parameter,
Z
Emergency service, 338 Zone,
White Balance, parameter, working principles, 195
ONVIF type, 235 Zone object description, 250
Wide layouts, parameter, Zone types, property, 252
Media Client, 281
Wiper, parameter,
Camera, 218
Work in accordance with selected Schedule, parameter,
247
Camera, 231
Work with audio, parameter,
Media Client, 291
Work with events of different timezones, parameter,
Event Viewer, 183
Work with Map: GUI, parameter,
HTML5 FrontEnd, 186
Work with Media Client, parameter,
Event Viewer, 183
HTML5 FrontEnd, 186
Map: GUI, 182
Work with PBX, parameter,
SIP Subsystem, 342
Work with Views, parameter,
Media Client, 283
Working directory, parameter,
External application, 164
Working mode, parameter,
Media Client, 276
Write secondary event parameters into Protocol DB,
parameter, 153
Wrong direction detector object description, 381

www.issivs.com

You might also like