SecurOS Administration Guide
SecurOS Administration Guide
SecurOS Administration Guide
Administration Guide
SecurOS Administration Guide (AG - EN, build 64 on 26.04.2021).
Printed in US.
Intelligent Security Systems reserves the right to make changes to both this Manual and to the products it describes. System
specifications are subject to change without notice. Nothing contained within this Manual is intended as any offer, warranty, promise
or contractual condition, and must not be taken as such.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any human or
computer language in any form by any means without the express written permission of the copyright holder. Unauthorized copying
of this publication may not only infringe copyright but also reduce the ability of Intelligent Security Systems to provide accurate and
up-to-date information to both users and operators.
SecurOS 3 Administration Guide
Contents
Contents
1 Preface 12
1.1 Scope
........................................................................... 12
1.2 Target
. . . . Audience
....................................................................... 12
1.3 Using
. . . .This
. . . .Manual
................................................................... 12
1.4 Getting
. . . . .Technical
. . . . . . . . .Support
............................................................. 12
1.5 SecurOS
. . . . . . Editions
. . . . . . . .Naming
. . . . . . .Convention
...................................................... 14
1.6 Design
. . . . .Convention
...................................................................... 14
1.7 Design
. . . . .Elements
...................................................................... 15
www.issivs.com
SecurOS 4 Administration Guide
Contents
3.2 Installing,
. . . . . . .Configuring
. . . . . . . . . . .And
. . . .Launching
. . . . . . . . . .Peripheral
. . . . . . . . .Servers
.................................. 44
3.2.1 Adding. .To
. .The
. . . .Network
. . . . . . . And
. . . .Configuring
. . . . . . . . . . .Peripheral
. . . . . . . . .Servers
.............................................. 45
3.2.2 SecurOS
. . .Installation
. . . . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
............................................................ 46
3.2.3 Launching
. . . . And
. . . . Configuring
. . . . . . . . . . .SecurOS
. . . . . . . .On
. . .Peripheral
. . . . . . . . .Servers
.............................................. 47
3.3 Installing,
. . . . . . .Configuring
. . . . . . . . . . .and
. . . .Launching
. . . . . . . . . Operator
. . . . . . . . Workstations
.................................... 48
3.3.1 SecurOS. . .Installation
. . . . . . . . . .On
. . .Operator
. . . . . . . .Workstation
............................................................. 49
3.3.2 Operator
. . .Workstation
. . . . . . . . . . .Profiles
....................................................................... 50
3.3.2.1 Use Restrictions .......................................................................... 50
3.3.2.2 Creating Operator . . . Workstation
. . . . . . . . . . Profile
............................................................. 50
3.3.3 Fixed Operator
. . . . . . . .Workstations
............................................................................. 51
3.3.3.1 Adding To The.Network
. . . . . . .And
. . . Configuring
. . . . . . . . . .Fixed
. . . . .Operator
. . . . . . .Workstations
......................................... 51
3.3.4 Launching
. . . . SecurOS
. . . . . . . . On
. . . Operator
. . . . . . . . Workstation
.............................................................. 52
3.4 SecurOS
. . . . . . Update
. . . . . . .Order
.............................................................. 53
www.issivs.com
SecurOS 5 Administration Guide
Contents
www.issivs.com
SecurOS 6 Administration Guide
Contents
www.issivs.com
SecurOS 7 Administration Guide
Contents
www.issivs.com
SecurOS 8 Administration Guide
Contents
15 Redundancy 389
www.issivs.com
SecurOS 9 Administration Guide
Contents
15.1 Failover
. . . . . . . .Cluster
................................................................... 389
15.1.1 Cluster
. . . .Structure
................................................................................. 389
15.1.1.1 Cluster Configuration
.......................................................................... 390
15.1.1.2 Cluster Operation.
. . . . . .Quorum
.................................................................... 390
15.1.1.3 Recommendations .......................................................................... 391
15.1.2 Configuring
. . . . . . . Cluster
.............................................................................. 391
15.1.2.1 Creating Cluster .......................................................................... 392
15.1.2.1.1 Creating . .Cluster
. . . . . . in
. .Existing
. . . . . . .SecurOS
. . . . . . . Configuration
.................................................. 393
15.1.2.1.2 Creating . .Cluster
. . . . . . and
. . . .SecurOS
. . . . . . . Configuration
. . . . . . . . . . . From
. . . . .the
. . .Scratch
.................................... 393
15.1.2.2 Getting Current . . . Cluster
. . . . . . Configuration
................................................................. 393
15.1.2.3 Creating Security. . . . .Zone
..................................................................... 395
15.1.2.4 Adding Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
15.1.2.5 Removing Host .......................................................................... 395
15.1.2.6 Switching to .Video. . . . .Server
. . . . . Mode
............................................................... 396
15.1.2.7 Adding Node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
15.1.2.8 Removing Node .......................................................................... 397
15.1.2.9 Getting Node. .List ........................................................................ 397
15.1.2.10 Setting Preferred
. . . . . .Host
. . . .for
. . the
. . . Node
........................................................... 397
15.1.2.11 Moving Node . . .to. .the
. . .Host
. . . .Manually
.............................................................. 398
15.1.2.12 Recreating .Cluster
......................................................................... 398
15.1.2.13 Restoring SecurOS
. . . . . . . Configuration
. . . . . . . . . . . from
. . . . File
.................................................... 399
15.1.2.14 Setting Configuration
. . . . . . . . .Server
................................................................. 399
15.1.2.15 Converting .Independent
. . . . . . . . . .Video
. . . . .Server
. . . . . .to. .Cluster
. . . . . .Node
............................................ 399
15.1.2.16 Service mode .......................................................................... 400
15.1.2.17 Changing Network. . . . . . .Interface
. . . . . . .for. . .Virtual
. . . . .IP. . Addresses
.................................................. 400
15.1.2.18 Setting Up .Time . . . .Intervals
..................................................................... 401
15.1.3 Connecting
. . . . . . .Operator
. . . . . . . .Workstations
. . . . . . . . . . . .to
. .the
. . .Cluster
. . . . . . .Servers
.............................................. 402
15.1.4 Storing
. . . .Data
. . . .in
. .Cluster
........................................................................... 402
15.1.4.1 iSCSI Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
15.1.4.2 Using iSCSI.Drive . . . . for
. . .Storing
. . . . . .Video
. . . . .Archive
....................................................... 404
15.1.4.3 Movable PostgreSQL .......................................................................... 404
15.1.4.4 Storing Video . .Archive
. . . . . . on
. . .the
. . .Host's
. . . . .Local
. . . . .Drives
.................................................. 405
15.1.5 Cluster
. . . .Creating
. . . . . . .and
. . . .Setting
. . . . . . Up
. . .Examples
............................................................. 406
15.1.5.1 Creating Cluster . . . .and
. . . SecurOS
. . . . . . . .Configuration
. . . . . . . . . . .From
. . . . .the
. . .Scratch.
. . . . . . .Example
................................. 406
15.1.5.1.1 Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
15.1.5.1.2 Requirements .......................................................................... 407
15.1.5.1.3 Computers . . . .Parameters
...................................................................... 407
15.1.5.1.4 Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
15.1.5.2 Creating Cluster . . . .in
. .Existing
. . . . . . .SecurOS
. . . . . . . Configuration.
. . . . . . . . . . . .Example
.......................................... 409
15.1.5.2.1 Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
15.1.5.2.2 Requirements .......................................................................... 409
15.1.5.2.3 Computers . . . .Parameters
...................................................................... 409
15.1.5.2.4 Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
15.1.6 Resolving
. . . . . .Common
. . . . . . . .Issues
....................................................................... 411
15.1.6.1 Quorum Loss .......................................................................... 411
15.1.6.2 Restoring Operating . . . . . . .System
. . . . . . from
. . . . .Backup
........................................................ 411
15.1.6.3 Unable to Connect . . . . . .Operator
. . . . . . . Workstation
............................................................. 412
15.1.6.4 Updating Software . . . . . .and
. . .Hardware
. . . . . . . . within
. . . . . Cluster
. . . . . . System
.............................................. 412
15.1.7 Limitations
..................................................................................... 412
15.2 Redundant
. . . . . . . . . .Servers
. . . . . . . Cluster
.......................................................... 413
15.2.1 Creating
. . . . .Configuration
. . . . . . . . . . . .on
. . the
. . . Base
. . . . .of
. . Redundant
. . . . . . . . . .Servers
. . . . . . .Cluster
....................................... 414
15.2.2 Adding
. . . Computer
. . . . . . . . . to
. . the
. . . .Redundant
. . . . . . . . . Servers
. . . . . . . Cluster
................................................... 414
15.2.3 Creating
. . . . ."1+1"
. . . . .Cluster
. . . . . . from
. . . . .Existing
. . . . . . .SecurOS
. . . . . . . .Configuration.
. . . . . . . . . . . . .Example
.................................... 414
15.2.3.1 Task .......................................................................... 415
15.2.3.2 Computers Parameters .......................................................................... 415
15.2.3.3 Steps .......................................................................... 415
www.issivs.com
SecurOS 10 Administration Guide
Contents
16.1 Interaction
. . . . . . . . . .with
. . . .External
. . . . . . . .Emergency
. . . . . . . . . .Service
........................................... 417
19 Appendixes 426
19.1 Appendix
. . . . . . . . .A.
. .Upgrading/Uninstalling
. . . . . . . . . . . . . . . . . . . . .Software
........................................... 426
19.1.1 Upgrading
. . . . . . Software
............................................................................... 426
19.1.2 Uninstalling
. . . . . . . .Software
............................................................................. 426
19.1.3 SecurOS
. . . . .Version
. . . . . . .Upgrade
. . . . . . . .Features
................................................................. 427
19.1.3.1 Release 9.3 .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
......................................................... 428
19.1.3.2 Release 9.6 .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
......................................................... 429
19.1.3.3 Release 10.0. .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 429
19.1.3.4 Release 10.1 . .and
. . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 429
19.1.3.5 Release 10.2. .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 430
19.1.3.6 Release 10.3. .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 430
19.1.3.7 Release 10.6. .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 431
19.1.3.8 Release 10.7. .and . . .Earlier
. . . . . .Updating
. . . . . . . Procedure
........................................................ 431
19.2 Appendix
. . . . . . . . .B.
. . Updating
. . . . . . . . .PostgreSQL
....................................................... 431
19.3 Appendix
. . . . . . . . .C.
. . Quick
. . . . . .Video
. . . . .Subsystem
. . . . . . . . . . Configuration
........................................... 435
19.4 Appendix
. . . . . . . . .D.
. . System
. . . . . . .Utilities
......................................................... 436
19.4.1 Server
. . .Manager
. . . . . . . .Utility
.......................................................................... 437
19.4.1.1 Control Toolbar .......................................................................... 438
19.4.1.1.1 Working . .with
. . . .Host
. . . .List
................................................................ 438
19.4.1.1.2 Managing . . . Cluster
....................................................................... 439
19.4.1.1.3 Managing . . . Video
. . . . . Server
. . . . . .State
............................................................ 440
19.4.1.1.4 Connecting . . . . to
. . Host
. . . . .for
. .Configuring
............................................................. 441
19.4.1.1.5 Restoring . . .SecurOS
. . . . . . . .Configuration
............................................................... 441
19.4.1.1.6 Managing . . . Nodes
....................................................................... 441
19.4.1.1.7 Advanced . . . Cluster
. . . . . . Host
. . . . .Settings
............................................................ 442
19.4.1.1.8 Search.String ......................................................................... 443
19.4.1.2 Hosts Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
19.4.2 Hardware
. . . . . Report
. . . . . . .Utility
......................................................................... 445
19.4.3 SystemInfo
. . . . . . .Utility
.............................................................................. 446
19.4.4 Media
. . .Export
. . . . . .Utility
............................................................................ 448
19.4.4.1 Export Settings . . . dialog
....................................................................... 450
19.4.4.2 Command-line . . .parameters
....................................................................... 452
19.4.5 DSAdmin
. . . . . Utility
................................................................................ 453
19.4.6 Database
. . . . . Update
. . . . . . .Utility
......................................................................... 456
19.4.7 ISS SecurOS
. . . . . . . . Registration
. . . . . . . . . . .Files
. . . . .Editor
............................................................. 458
19.4.8 ISS Server
. . . . . . Role
. . . . .Manager
. . . . . . . Utility
................................................................... 463
19.4.9 Server
. . .Control
. . . . . . .Agent
. . . . .Utility
...................................................................... 464
19.4.10 Video
. . . Archive
. . . . . . .Index
. . . . . Repair
. . . . . . Utility
................................................................ 466
19.4.11 Outdated
. . . . . .Audio
. . . . . .Archive
. . . . . . Updater
. . . . . . . .Utility
........................................................... 467
19.4.12 Certificate
. . . . . . .Generator
. . . . . . . . .Utility
..................................................................... 469
19.4.13 AuditClient
. . . . . . . .Utility
............................................................................. 470
19.4.13.1 Configuring. Result . . . . . .Table
................................................................... 476
19.4.13.2 User Actions . . Analysis
. . . . . . . Example
................................................................. 477
www.issivs.com
SecurOS 11 Administration Guide
Contents
19.5 Appendix
. . . . . . . . .E.
. .Network
. . . . . . . .Ports
. . . . .Used
. . . . .in
. .SecurOS
............................................ 478
19.6 Appendix
. . . . . . . . .F.
. .Additional
. . . . . . . . . Windows
. . . . . . . . .Settings
.............................................. 480
19.6.1 Installing
. . . . . Media
. . . . . .Foundation
. . . . . . . . . .under
. . . . . MS
. . . Windows
. . . . . . . . .Server
. . . . . .2012
. . . .R2
..................................... 481
19.6.2 SMTP. . Mail
. . . . Server
. . . . . . Installation
. . . . . . . . . .and
. . . .Configuration
........................................................... 481
19.6.3 Disabling
. . . . . Disk
. . . . .Cleanup
. . . . . . .Master
.................................................................... 484
19.7 Appendix
. . . . . . . . .G.
. . Error
. . . . . Messages
. . . . . . . . . When
. . . . . .Launching
. . . . . . . . . System
................................... 484
19.8 Appendix
. . . . . . . . .H.
. . Technical
. . . . . . . . .Support
. . . . . . . Information
................................................ 485
Index 487
www.issivs.com
SecurOS 12 Administration Guide
Preface
1 Preface
This section contains general information about this document, the means of its design and use, as well
as how to get additional technical support for the product.
1.1 Scope
This manual provides general information about the SecurOS architecture, describes the process of
configuring a security network and system objects, and gives some troubleshooting tips and
recommendations.
It is assumed that the user has already physically deployed the security network and installed the
SecurOS software on all computers of this network.
To get online help (Microsoft HTML Help) just press the F1 key when running SecurOS in
administrative mode. You can get context help for a given object by pressing the F1 key when its
settings window is open.
If you have any questions after reading this manual, please address them to your system administrator
or supervisor.
For any further information you can contact the Intelligent Security Systems Technical Support Team:
Note. To get a quick response to a request use the Technical Support Portal, which www address is listed
below.
www.issivs.com
SecurOS 13 Administration Guide
Preface
in USA:
phone: +1 732 855 1111 (Monday to Friday, 8:30am - 6pm EST);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Russia:
phone: +7 (495) 645 21 21 (Monday to Thursday, 9am - 6pm MST; Friday 9am - 5pm MST);
www: https:/ / help.iss.ru
Note. See the https:/ / help.iss.ru/ user/ manual for the Portal User Guide.
in Brazil:
phone: +55 11 2262 2894 (Monday to Friday, 9am - 6pm BRT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Mexico:
phone: +52 1 551330 0181 (Monday to Friday, 9am - 6pm CDT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Colombia/ Ecuador:
phone: +57 300 442 2808 (Monday to Friday, 9am - 6pm COT/ECT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Chile:
phone: +56 9 6573 2993 (Monday to Friday, 9am - 6pm CLT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Ukraine:
phone: +380 (44) 299 08 10 (Monday to Friday, 9am - 6pm EET);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Peru/ Bolivia:
phone: +51 997 111 678 (Monday to Friday, 9am - 6pm PET/BOT);
e-mail: [email protected]
www: https:/ / support.issivs.com
in Argentina:
phone: +54 91152528779 (Monday to Friday, 9am - 6pm ART);
e-mail: [email protected]
www: https:/ / support.issivs.com
To solve problems faster, we recommend preparing the service information described in the Technical
Support Information Section before addressing the Technical Support Team.
www.issivs.com
SecurOS 14 Administration Guide
Preface
Edition Supported OS
SecurOS Premium
SecurOS Lite
For product designation regardless of its edition the SecurOS general term is used in the framework of
the given document.
Sections that describe the functionality available for some editions are marked by a special footnote as
in the example below:
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional, SecurOS Xpress, SecurOS Lite.
Sections that describe the functionalities not available or partially available for Linux OS are marked
with the following footnote:
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported / limited.
Font Description
bold italic type Used to mark out the elements of homogeneous lists.
Used to mark out macro text and programming code, file names and
monospace their paths. Also it is used to specify the necessary options, to mark
out values specified by the user from the keyboard (manually).
www.issivs.com
SecurOS 15 Administration Guide
Preface
Font Description
Additional Information
Used to display additional information. These type of elements contain, for example, the description of options for
executing a task or reference to additional literature.
www.issivs.com
SecurOS 16 Administration Guide
Purpose, Implementation And Operation Principles
Computers of the SecurOS network are distinguished by their functionality and have specific roles in
the network configuration management procedure.
This section contains general information on the types of SecurOS servers and workstations, their
intended purposes, basic capabilities, and operational specifics.
Video Server.
Operator Workstation.
The system administrator defines the installation type while planning the system architecture and sets
it during the installation procedure. On each computer on the network only one installation type is
allowed. A brief description of the installation types can be seen below.
www.issivs.com
SecurOS 17 Administration Guide
Purpose, Implementation And Operation Principles
If privileges to configure system were granted to the operator, Administration Center is available to
him.
The procedure to update and synchronize the system configuration on all the servers in the system
network is performed by the Conf iguration Server. The Conf iguration Server is a dedicated network server
which in addition to standard features, has some advanced functionality as well.
Conf iguration Server is assigned during system software installation among from Video Servers of the
SecurOS network.
Warning! System allows only one Conf iguration Server, which must be available for all Video Servers and
Operator Workstations, from which it is intended to configure the system.
The actual system configuration is stored on the Conf iguration Server. Each of Peripheral Servers stores
the current copy of the system configuration.
In case the Conf iguration Server fails, you can restore it from a backup after carrying out the necessary
steps (see Restoring Configuration from Backup Copy) or reassign one of the Peripheral servers (see ISS
Server Role Manager Utility).
Warning! The operating period for Peripheral Servers not connected to the Conf iguration Server is restricted. If
connection with the Conf iguration Server is not restored within 90 days, the system will automatically
shutdown on the given Peripheral Server and all Operator Workstations connected to it.
At the initial system setup, the Conf iguration Server must be installed and configured first (see Installing
And Configuring The Configuration Server section).
www.issivs.com
SecurOS 18 Administration Guide
Purpose, Implementation And Operation Principles
Note. The described set of rules is applicable to any type of operations with the objects from the Object Tree,
including object creation, editing and deletion.
1. Using any of the Operator Workstation, the administrator (or operator) makes changes to the Object
Tree for that Computer (or Computers).
2. If a Operator Workstation is used to modify the configuration, then it generates an appropriate request
to the Conf iguration Server.
Notes:
1. If the Conf iguration Server is used to modify the configuration, the changes are applied on the
Conf iguration Server directly, with no request.
2. When the Conf iguration Server is unavailable it's not possible to modify the system configuration
using a Operator Workstation.
3. The Conf iguration Server processes the request(s). It applies changes by first renewing it's own Object
Tree and object settings, then generates and sends to each of the Peripheral Servers a command to
update the state of their appropriate objects and their settings. If a Peripheral Server is switched off
when changes must be applied, the command will be sent when connection with the Conf iguration
Server will be restored.
4. Having received the command to update its current configuration, each of the Peripheral Servers
applies the changes by updating its own Object Tree and/or settings of the appropriate objects.
Note. The update requests are processed by the Conf iguration Server consistently in order of creation. Only one
request is processed by the Conf iguration Server at the same time. The processing of the next request is locked
until the current request is finished and changes are applied on the Conf iguration Server.
The configuration can be restored from the backup copy. A backup copy can be created by any of the
network servers, but the restore procedure can be executed only on the Conf iguration Server.
Warning! Only a backup copy of the currently installed SecurOS version is applicable. Backup copy creation
procedure is described in the System section.
SecurOS software consists of two components — Server part (further will be referred as Server) and
Client application (further as Client).
Server receives and processes video, allows to connect different security devices and intelligent
program Modules. This component starts automatically on each Video Server after software installation
is finished.
www.issivs.com
SecurOS 19 Administration Guide
Purpose, Implementation And Operation Principles
Client is installed both on Video Server and Operator Workstation. When installing SecurOS software on
Video Server, Client is installed automatically. Installation of Client on Operator Workstation is a separate
procedure. Using Client one can work with SecurOS objects — Cameras, Maps etc. with the help of
SecurOS interface objects (Media Client, Map Window etc.). Using Client one can also administrate the
system, if user has required rights.
Server part is implemented as OS service, namely as SecurOS Control Service. This service is
started and stopped with the help of Server Control Agent utility or by means of OS tools (see System
Shutdown).
Client part is implemented as client.exe application. This application is located in the \SecurOS
folder of the product installation root directory.
Warning! It is recommended to use the same character encoding for all Users on all Computers within SecurOS
network. Otherwise some character may be displayed incorrectly on some Computers (namely in object or
event names etc.).
Parameter Description
Windows 8.1 — all editions;
Windows Server 2012 R2 — all editions;
Windows 10 — Home, Pro, Enterprise, Education;
Windows Server 2016 — Standard, Datacenter;
OS Windows Server 2019 — Standard, Datacenter;
Astra Linux — Special Edition (Release Smolensk),
Common Edition (Release Orel).
Warning! Only 64-bit versions of operation systems listed above
are supported.
www.issivs.com
SecurOS 20 Administration Guide
Purpose, Implementation And Operation Principles
Parameter Description
TCP/ IP network speed Not less than 100 Mbps. 1000 Mbps is recommended
Parameter Description
Windows 8.1 — all editions;
Windows Server 2012 R2 — all editions;
Windows 10 — Home, Pro, Enterprise, Education;
OS Windows Server 2016 — Standard, Datacenter;
Windows Server 2019 — Standard, Datacenter;
Astra Linux — Special Edition (Release Smolensk),
Common Edition (Release Orel).
Intel Core i3-4130/AMD FX-4350 or above (for example, Intel
CPU
Core i5-4xxx).
www.issivs.com
SecurOS 21 Administration Guide
Purpose, Implementation And Operation Principles
To capture and playback audio the Video Server should have either integrated audio on-board (check
the motherboard documentation) or any additional PCI or PCI-E sound card.
Note. Integrated or additional sound card provides audio capture only from one microphone.
To use the Audible Notification Service (playing audio upon system events) to work on a particular
computer, it should have either integrated audio on-board or any additional PCI or PCI-E sound card.
The video server should have the required number of free (not used) serial (COM) ports to connect the
ACS/alarm/fire alarm controllers.
The sections below contain information about the system and requirements for setting up, starting, and
correctly using SecurOS.
Note. Refer to this section for any questions/concerns regarding the reading/editing/checking of the
computer_name value.
www.issivs.com
SecurOS 22 Administration Guide
Purpose, Implementation And Operation Principles
windows, maps, HTML forms and dialogs, system event viewer, etc. (see Interface Subsystem).
Video subsystem - contains components which are responsible for main video stream control, video
camera displaying and recording process, video playback and live video monitoring, video motion
detectors and video archives (see Video Subsystem).
Audio subsystem - contains control facilities of audio recording and playback devices (see Audio
Subsystem).
I/O subsystem - contains objects responsible for input/output peripheral devices (fire alarm
controllers, relays and various detectors) (see I/ O Subsystem).
Notification subsystem - contains objects for notification of users about system events by media
messages (see Notification Subsystem).
Automation subsystem - contains tools for device integration, compilation and interpretation of the
system scripts and macros (see Automation Subsystem).
Computer vision subsystem - represents integrated environment that allows to connect and use
within the SecurOS system the wide range of various analytics detectors (see Computer Vision).
Monitoring and Control subsystem, that allows to deploy a common Monitoring & Control Center to
supervise a lot of the remote security systems (see Monitoring & Control Center).
Note. Each section contains a description of the basic operation principles and configuration specifics of the
selected subsystem.
www.issivs.com
SecurOS 23 Administration Guide
SecurOS Installation and Update on Windows
Warning! Make sure that all required port are opened in the firewall settings (see Appendix E. Network
Ports Used in SecurOS).
First of all it is necessary to prepare Video Servers (see Types Of Servers And Workstations). Order of
SecurOS installation on Video Servers is described in the following sections:
Installing, Configuring and Launching Configuration Server;
Installing, Configuring And Launching Peripheral Servers.
Then, it is necessary to prepare Operator Workstations. SecurOS installation order onto Operator
Workstations is described in corresponding section:
Installing, Configuring and Launching Operator Workstations.
Warning!
1. All components of all SecurOS Intelligent Modules that are used within the system must be installed
on each Video Server and Operator Workstation.
2. The software language must be the same for all network computers.
3. System time must be synchronized for all Video Servers within configuration.
4. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.
The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys.
The Guardant key is the electronic device constantly connected to the computer through a USB port.
The SecurOS software addresses to a key for check the license information.
www.issivs.com
SecurOS 24 Administration Guide
SecurOS Installation and Update on Windows
The key is necessary to place before the beginning of the SecurOS software installation. To install
Guardant key, plug the key into any free (not used) USB port.
The Guardant key driver is installed automatically when the corresponding option from the SecurOS
InstallShield Wizard (see Software Installation) is selected.
The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.
The license key is created on the basis of the SecurOS hardware unique codes (Guardant) or
combinations of unique codes of the computer hardware on which SecurOS is installed.
License keys are checked according to the priority descending in the following order:
1. Guardant key;
2. key on the basis of the combinations of unique codes of the computer hardware (hardware code).
In addition to the unique hardware codes, the following data is also taken into account during license
key generation:
www.issivs.com
SecurOS 25 Administration Guide
SecurOS Installation and Update on Windows
In case the license key isn't included in the SecurOS delivery set it is necessary contact Intelligent
Security Systems to request it from.
4. Click Copy Report to Clipboard button in the utility window. The utility will copy the report to
clipboard.
5. Create and open a new text file of any format. Paste the clipboard content to the file. Additionally
insert the following data into the file:
program language selected on the SecurOS installation;
SecurOS release number;
www.issivs.com
SecurOS 26 Administration Guide
SecurOS Installation and Update on Windows
SecurOS edition.
6. Save the file.
7. Send the file to the Intelligent Security Systems Technical Support Team (see Getting Technical
Support section).
On receiving the license key file copy it to the SecurOS root folder.
This section covers a specifics of the SecurOS installation or upgrading, that make it possible to reuse
previously created objects.
Warning! To install the software, you must have administrator rights for Windows OS. Proceed to software
installation only when you finish hardware installation and network configuration for any computer.
3.1.3.1 Using Current Parameters of the Windows User Account needed for PostgreSQL
During first SecurOS installation Windows user account needed for PostgreSQL operation is created
with the name postgres and the same password.
Note. If current system security policy does not allow to create user account with default login and password,
specify password that meets the requirements of the active system security policy.
If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 2) enter currently used password of the
PostgreSQL user account.
www.issivs.com
SecurOS 27 Administration Guide
SecurOS Installation and Update on Windows
2. Click Next to continue. System will recreate Windows user account with name postgres and old
password.
Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.
3.1.3.2 Using Current Parameters of the Database and Administrator User Account
During first SecurOS software installation default PostgreSQL administrator’s user account is created
with the name postgres and the same password, database is created with the name securos.
If default values were changed, but are supposed to be used further, do the following on the certain
step of the software installation:
1. In the Database update and formatting window (see figure 3) enter currently used database name
and database administrator’s credentials.
2. Click Next to continue. The database will be updated and reformatted with the old name and
administrator’s credentials.
Note. This step can be skipped, but in this case current database version will not be updated and reformatted,
that makes its further use impossible.
1. To start the SecurOS software installation run the product setup file. System will display the Choose
www.issivs.com
SecurOS 28 Administration Guide
SecurOS Installation and Update on Windows
From the drop-down list select the SecurOS InstallShield Wizard required language. Click the OK
button.
Additional Information
The Choose Setup Language information messages depends on the OS default language (the Language parameter
value (local ID)).
2. The Preparing To Install window will appear, in which the steps of the installation preparation will
be displayed.
After the end of procedure of preparation the system will automatically display the Welcome to the
InstallShield Wizard window (see figure 5).
Click the Next button in the Welcome to the InstallShield Wizard window to continue.
3. The License Agreement window will appear (see figure 6).
www.issivs.com
SecurOS 29 Administration Guide
SecurOS Installation and Update on Windows
Read the license agreement carefully. Select I accept the terms in the license agreement option if you
agree. Click the Next button.
4. The Install Type window will appear (see figure 7).
By default the typical installation mode allowing to install Video Server software with default settings
is selected. Click the Next button.
5. The Server Type window will appear (see figure 8).
www.issivs.com
SecurOS 30 Administration Guide
SecurOS Installation and Update on Windows
The item is excluded from the installation procedure in the SecurOS Xpress, SecurOS Lite editions.
To install Conf iguration Server software select appropriate value from the drop-down list. Click the Next
button.
6. The Installation of the license key file window will appear (see figure 9).
This step is excluded from the installation procedure for the SecurOS Lite edition.
www.issivs.com
SecurOS 31 Administration Guide
SecurOS Installation and Update on Windows
Additional Information
Copy the license key file from the setup directory option is displayed in the Installation of the license key file
window only when SecurOS setup directory contains the license key file.
if the key is not available — select the Do not copy the license key file option. The key file can be
copied in the SecurOS installation directory after installation is complete. For more information
about getting license key file see License Key section.
Click the Next button.
7. The Software language selection window will appear (see figure 10).
www.issivs.com
SecurOS 32 Administration Guide
SecurOS Installation and Update on Windows
To define SecurOS program language select the required one rfom the drop-down list.
Warning! You should specify only the language, which is permitted by your license key file. For more
information about license key see License Key section.
The item is excluded from the installation procedure in the SecurOS Lite edition.
www.issivs.com
SecurOS 33 Administration Guide
SecurOS Installation and Update on Windows
Leave the Install Integrated Devices Pack checkbox selected if you suppose to connect an additional
hardware: for example, cameras. Tick the Install Guardant driver checkbox if Guardant USB-key is
used. Click the Next button to continue.
9. The Ready to Install SecurOS window will appear (see figure 12).
www.issivs.com
SecurOS 34 Administration Guide
SecurOS Installation and Update on Windows
If it is not necessary to start SecurOS Control Service immediately after installation has finished
deselect the Start Service after installation has finished checkbox selected by default. To start the
installation procedure click the Install button. The system will unpack required archives and then will
begin the installation and will display SecurOS Installation window, in which the indicator of the
process will be shown. After the installation process has successfully completed the InstallShield
Wizard Completed window will appear (see figure 13).
Initial SecurOS configuration is carried out on the Conf iguration Server with the help of the System
Conf iguration Wizard, which offers various options of configurations. Base configuration at which the
configuration data is entered by the administrator, is carried out by means of the First Start
Conf iguration Wizard. Upon the configuration finish, the system will be completely ready for use.
www.issivs.com
SecurOS 35 Administration Guide
SecurOS Installation and Update on Windows
2. When Client starts on Conf iguration Server for the first time, system will open the System Conf iguration
Wizard window which will provide options for system configuration (see figure 15). For basic
configuration select the Configure using Wizard option that is active by default.
www.issivs.com
SecurOS 36 Administration Guide
SecurOS Installation and Update on Windows
Note. Import configuration file and Start with empty database scenarios are described
below.
www.issivs.com
SecurOS 37 Administration Guide
SecurOS Installation and Update on Windows
The system will display window to enter new parameter values (see figure 18).
Set and confirm new superuser's password, or click the Change to default button to use default value.
Click the Next button to continue.
www.issivs.com
SecurOS 38 Administration Guide
SecurOS Installation and Update on Windows
To add a new users enter required values into the appropriate fields.
New users can be created with the following user account rights:
Power user;
Simple user.
Power user can do the following:
View objects using the user interface;
Control video cameras, for example, arm camera, start and stop recording;
Control PTZ devices;
Hide user interface;
Log off current SecurOS user and close SecurOS Client application;
Simple user can do the following:
View objects using the user interface;
Log off current SecurOS user and close SecurOS Client application;
Click the Next button.
6. The Video Server settings window will appear (see figure 20).
www.issivs.com
SecurOS 39 Administration Guide
SecurOS Installation and Update on Windows
Do the following:
If necessary edit the Computer object name in the Enter the 'Computer' object name field. By
default the computer name is set by system in the following way: Computer <computer_name>
(see Computer Name Restrictions section).
Choose Drives to store recorded video by selecting the corresponding drive from the Select
available logical drivers for video archive recording table. SecurOS will store the recorded video
on the drives specified in this window.
If the local export of video records isn't required, clear the The ability to export archive locally on
the Video Server check-box that was set by default.
Additional information
The given parameter regulates the possibility to create the additional objects (allowing to save video records on a
hard disk of the given computer) on the Video Server.
If self-diagnostic with the built-in tool on the Video Server is not required, clear the The ability of
self-diagnostic with Health Monitor Module checkbox that was set by default.
If it is necessary to operate with network IP-devices (for example, IP cameras), click the Add button.
System will add a new line in the List of IP-devices block. Set IP device parameters by clicking the
necessary field. Repeat the operation for all required IP devices.
www.issivs.com
SecurOS 40 Administration Guide
SecurOS Installation and Update on Windows
www.issivs.com
SecurOS 41 Administration Guide
SecurOS Installation and Update on Windows
Information about server configuration parameters specified with the help of the System Conf iguration
Wizard will be displayed in the table. In addition to the parameters above server will be configured so
that any Operator Workstation located on any Computer within the SecurOS network can connect to it.
The following operations will be available on each of these Operator Workstations:
Export of the archive to the AVI and Evidence file formats;
Self-diagnostic of the system with the help of the Health Monitor module (see Health Monitor self-
diagnostic Module).
Review the selected system parameters. If it is necessary to change anything click the Back button. Set a
new value. Click the Next button to return to the Summary information window. To create and save
the configuration click the Finish button.
After the procedure of data creation and saving has completed successfully the corresponding message
will be displayed (see figure 23).
As a result of the described actions the system will be ready for operation.
3.1.4.2 Restoring Configuration
The backup copy allows to quickly and easily restore system configuration.
Warning!
1. Version of the backup copy should comply with the version of the currently installed SecurOS,
otherwise it is not applicable. Backup copy creation procedure is described in the System section.
2. Restoring configuration is feasible only on the Conf iguration Server (see Managing Network
Configuration by Configuration Server).
To restore system configuration from backup select Import configuration file scenario in the Wizard
scenario window (see figure 24).
www.issivs.com
SecurOS 42 Administration Guide
SecurOS Installation and Update on Windows
By default, the Server part of the SecurOS is launched automatically on the Conf iguration Server after
SecurOS installation is finished and each time when OS starts.
1. In the Start Windows menu consistently choose the following menu options: Programs SecurOS
SecurOS (see Figure 25).
www.issivs.com
SecurOS 43 Administration Guide
SecurOS Installation and Update on Windows
Additional Information
Client can also be launched with the help of the Server Control Agent utility, by means of the SecurOS shortcuts
in the Start menu, on the Desktop or in the Windows taskbar.
The Authorization window is used to log in. It is displayed after the system has successfully started
and loaded all configurations (see Figure 26).
www.issivs.com
SecurOS 44 Administration Guide
SecurOS Installation and Update on Windows
Specified user — when selecting this option specify User and Password, corresponding to the
personal credentials of the SecurOS User.
Warning! At the first start select this option and use credentials of the superuser (see SecurOS Users) or other
users, if they have been created with the help of the System Configuration Wizard.
1. Add computers to the network for that create and configure the corresponding objects in the Object
Tree of the certain Security Zone object on the Conf iguration Server.
www.issivs.com
SecurOS 45 Administration Guide
SecurOS Installation and Update on Windows
2. On the added computers install the SecurOS software, that corresponds to the Peripheral server role
(see Types Of Servers And Workstations section).
3. Launch SecurOS and configure the system with the Wizard.
Warning! The possibility to add the given amount of the certain typed computers to the network is regulated
by the license restrictions.
1. Enter the Administration Mode on the Conf iguration Server (see SecurOS Administration Overview).
2. In the Object Tree select the Servers & Workstations group, create a Computer child object and specify
for it the Video Server role.
3. In the Parameters of created object window set the required values:
In the ID field set the computer name (see Computer Name Restrictions). It should correspond to
the value defined in the OS settings (see My Computer Properties Computer Name).
In the Name field define the Computer object name as it will be displayed in the SecurOS Object
Tree.
4. In the object settings window (see Figure 27) set the following obligatory parameters:
Note. Parameter is a mandatory one only if the network computers are registered in the different
subnetworks.
www.issivs.com
SecurOS 46 Administration Guide
SecurOS Installation and Update on Windows
Note. Without the parameter definition the video records saving will be impossible.
To install SecurOS software on peripheral servers (other Video servers that are not Conf iguration Server)
do the following:
1. To start SecurOS software installation on additional servers setting launch the product installation
file on the corresponding computer.
2. Up to the server type selection step in the Server type window steps of the procedure are similar to
software setting on the Conf iguration server (see Software Installation section).
3. In the Server type window (see figure 28) set the Peripheral Server.
4. The further steps are similar to the software installation on the Conf iguration Server (see Software
Installation On The Configuration Server section). When setting parameters It is recommended to
use default values.
www.issivs.com
SecurOS 47 Administration Guide
SecurOS Installation and Update on Windows
By default, the Server part of the SecurOS is launched automatically on the Peripheral Server after
SecurOS installation is finished and each time when OS starts.
Initial configuration of the SecurOS on Peripheral Server is performed with the help of System
Conf iguration Wizard. To configure SecurOS for the first time by means of the Wizard, perform the
following steps:
1. Start SecurOS Client application by selecting Programs SecurOS SecurOS from Start Windows
menu. When Client is started for the first time, then System Conf iguration Wizard will appear.
Note. Client can also be launched with the help of Server Control Agent utility.
2. In the Join existing security network window (see figure 29) do one of the following to choose the
Conf iguration Server with the current network configuration:
Set Conf iguration Server name or IP address in the Configuration server name or IP address field.
For automatic search for Video Server in the network click Find servers in the local network
button. The searching procedure will be started and Conf iguration Server will be displayed in the
Servers found box. Click found Conf iguration Server to select it.
Warning!
1. During the configuration procedure the Conf iguration Server must be active and the SecurOS should
be launched on it.
2. To provide execution of the SecurOS servers search function in the local network it is necessary do
the following:
launch the Computer browser system service on the DC;
launch the Server system service on the server;
turn on the SMB protocol on the server (Turn Windows features on → SMB 1.0/ CIFS File
Sharing Support).
www.issivs.com
SecurOS 48 Administration Guide
SecurOS Installation and Update on Windows
Click the Join button. The Loading configuration window will appear that indicates the loading
process.
3. After the configuration loading finished successfully the corresponding system message will be
displayed. Click on OK button. In the Loading configuration window click the Finish button.
Launching operator interface on the Operator Workstation is possible immediately after installation
(see Launching SecurOS On Operator Workstation). To connect to the Video Server it is enough to
know its IP address or DNS/WINS name. When system starts for the first time operator can operate
only with such SecurOS administrative tools, as Control Panel and Object Tree.
Note. Administrative tools are available only if SecurOS user has a rights to configure the system (see User
Rights).
www.issivs.com
SecurOS 49 Administration Guide
SecurOS Installation and Update on Windows
For further work it is necessary to create Operator Workspace, which is a collection of interface elements
for monitoring and other features.
Notes:
1. Operator Workstation Prof iles can be used even on the Fixed Operator Workstations.
2. By default, local workspace is available on those Video Servers where operator interface is being
launched.
www.issivs.com
SecurOS 50 Administration Guide
SecurOS Installation and Update on Windows
Operator Workstation Prof iles specify appearance of the operator interface and list of available modules.
Each Profile can be used by unlimited number of Operator Workstations. This ensures unification of user
interface and simplifies applying of changes. Any change of Profile will automatically applied for all
Operator Workstations that use this Profile.
To use profile it is necessary to create and configure it first (see Creating Operator Workstation
Profile), and then select it on the Operator Workstation as Operator Workspace (see Changing Operator
Workspace).
Note. Availability of the Operator Workspace to specific operator is defined by system settings. User access to
the profiles can be restricted via User Rights. Profile is accessible, if operator has the (View) access right to
this Profile or above.
When using Operator Workspace the limitations for work with VB/ JScript programs (scripts) and SecurOS
messages are applied:
To execute the VB/ JScript program on the Operator Workstation it is necessary to create it as a child
object to the same Computer, profile of which is used by the Operator Workstation as Operator
Workspace. If the Operator Workstation uses Local Environment then the VB/ JScript program must be
created as a child object to the current Computer.
SecurOS messages (events and reacts) received by the Operator Workstation that uses Operator
Workspace, are not further transferred to the SecurOS network.
www.issivs.com
SecurOS 51 Administration Guide
SecurOS Installation and Update on Windows
5. For given Computer create all children interface objects, required for the operator (for example, Media
Client, Event Viewer). Configure these interface objects in accordance with your requirements to this
Profile (for example, specify Media Client window size and working modes, specify list of available
Cameras).
After that Profile can be used by operator as Operator Workspace (see Changing Operator Workspace).
In some cases, it may be necessary for a certain features to be available to operators only on specific
computers. To solve this task one can use the Fixed Operator Workstations.
For such Fixed Operator Workstations the Local Workspace is used as Operator Workspace.
www.issivs.com
SecurOS 52 Administration Guide
SecurOS Installation and Update on Windows
Tree.
In the Computer's role drop-down list choose the Operator Workstation.
4. If necessary, specify other parameters (see Figure 32). Apply new settings.
5. For the created Computer create all necessary children objects. Set of such children object is defined
by tasks, that will be performed on this Operator Workstation.
6. Repeat the steps for all Operator Workstations added to the network.
Warning! Auto login is possible if this procedure is configured by the administrator (see Auto login).
Specified user — when selecting this option specify User and Password that match credentials of
the User earlier created by administrator or use superuser account credentials (see SecurOS Users).
4. Click the Login button.
www.issivs.com
SecurOS 53 Administration Guide
SecurOS Installation and Update on Windows
For more information about the authorization see SecurOS Quick User Guide.
5. After successful authorization, the operator interface will be displayed on the screen. When
connecting for the first time Operator Workspace will be selected automatically. If there is a local
workspace for this computer, then it will be used. Otherwise one of the available profile workspaces
will be used randomly. Later operator can change Operator Workspace (see Changing Operator
Workspace).
Notes:
1. Possibility to connect to the server is controlled by the Security Zone object settings (see Security
Zone) and User Rights (see User Rights). List of available Operator Workspaces is also defined by User
Rights.
2. For the Fixed Operator Workstations automatic authorization is possible for the user for which such
possibility is specified by the administrator. To apply automatic authorization choose the Auto login
option. Details of the automatic authorization procedure are described below (see Computer
parameters description and Auto login section).
Usually, updates are applied to all computers of any system at the same time. If it is not possible to stop
SecurOS on all computers within network at the same time, software upgrade procedure must be
performed in the following order:
www.issivs.com
SecurOS 54 Administration Guide
SecurOS Installation and Update on Windows
When upgrading one must also consider the features specific to some SecurOS versions (see SecurOS
Version Upgrade Features in the Appendix A).
www.issivs.com
SecurOS 55 Administration Guide
SecurOS Installation and Update on Linux
This section describes in details the sequence of steps, that must be done in order to create and start
operation of the SecurOS security network on Linux platform.
Warning! Make sure that all required port are opened in the firewall settings (see Appendix E. Network
Ports Used in SecurOS).
First of all it is necessary to prepare Video Servers (see Types Of Servers And Workstations). Order of
SecurOS installation on Video Servers is described in the following sections:
Installing, Configuring and Launching Configuration Server;
Installing, Configuring And Launching Peripheral Servers.
Then, it is necessary to prepare Operator Workstations. SecurOS installation order onto Operator
Workstations is described in corresponding section:
Installing, Configuring and Launching Operator Workstations.
Warning!
1. All components of all SecurOS Intelligent Modules that are used within the system must be installed
on each Video Server and Operator Workstation.
2. The software language must be the same for all network computers.
3. System time must be synchronized for all Video Servers within configuration.
4. SecurOS software installation is possible only on those computers which names correspond to the
requirements stated in Computer Name Restrictions section.
The section provides short information on an additional hardware that can be included in the product
delivery set. These are the Guardant keys.
On Linux platform the Guardant Sign dongles are applied. To prepare Guardant Sing dongles for
operation, follow the steps described in the Installing a dongle on a Linux system article.
www.issivs.com
SecurOS 56 Administration Guide
SecurOS Installation and Update on Linux
Warning!
1. Installation of the Guardant Sign must be done before initial configuration of the installed SecurOS
(see Initial Configuration).
2. Before executing the install.sh file it must be granted the execution permission using the sudo
chmod +x install.sh command.
The license key defines allowed configuration of the security network and is necessary to launch the
SecurOS.
The license key is created on the basis of the SecurOS hardware unique codes (Guardant) or
combinations of unique codes of the computer hardware on which SecurOS is installed.
License keys are checked according to the priority descending in the following order:
1. Guardant key;
2. key on the basis of the combinations of unique codes of the computer hardware (hardware code).
In addition to the unique hardware codes, the following data is also taken into account during license
key generation:
Warning!
1. Before starting the installation, insert the disk with the Astra Linux distributive into the CD ROM or
mount the network disk with the images of the Astra Linux installation disks.
2. Create a directory on your hard drive and copy the SecurOS software distribution package there.
3. Copy the SecurOS license key file key.iss into the same directory.
Depending on the SecurOS software distribution package, one of the following methods is used for
installation:
Installation using .run-file.
Installation using .deb-file.
www.issivs.com
SecurOS 57 Administration Guide
SecurOS Installation and Update on Linux
cd <SecurOS_distributive_directory>
3. To start the installation of the SecurOS software, run the product installation file (for example,
securos_10.8.126-astra2_amd64.run) with the following command:
sudo ./securos_10.8.126-astra2_amd64.run
4. The system will unpack the archive and display the SecurOS language selection window
(see Figure 34):
Note. All windows described below are displayed in the specified sequence only when initial SecurOS
installation is performed. When updating already installed version only one window (see Figure 37) is
displayed.
Choose required language from the list. Click the OK button or press the Enter key to proceed with the
installation.
5. The system will display a window for selecting the installation type (see Figure 35):
www.issivs.com
SecurOS 58 Administration Guide
SecurOS Installation and Update on Linux
To install Video Server software select appropriate value from the drop-down list. Click the OK button
or press the Enter key to proceed with the installation.
6. The system will display a window for selecting the type of Video Server (see Figure 36):
To install Conf iguration Server software select appropriate value from the drop-down list. Click the OK
button or press the Enter key to proceed with the installation.
7. The system will display the PostgreSQL administrator password window (see Figure 37):
Type the current password of the database Administrator. Click the OK button or press the Enter key
to proceed with the installation.
8. If an incorrect password has been entered, the system will display a connection error window (see
Figure 38):
www.issivs.com
SecurOS 59 Administration Guide
SecurOS Installation and Update on Linux
Type the correct password or set the new one. When setting a new password, the system will display
the password setup window (see Figure 39):
Click the OK button or press the Enter key to proceed with the installation.
9. The system will display a new password confirmation window (see Figure 40):
Re-enter the new password. Click the OK button or press the Enter key to proceed with the installation.
10.System will display the user selection window (see Figure 41):
www.issivs.com
SecurOS 60 Administration Guide
SecurOS Installation and Update on Linux
In the list of users, select those Linux users who will be allowed to run SecurOS on this computer. Use
the arrow keys to navigate through the list. To select a user, highlight it in the list, then press the Space
key. The ‘*’ (asterisk) character will be placed to the left of the username. Click the OK button or press
the Enter key to proceed with the installation.
11.The system will execute required operations and will display the Installation complete window
(see Figure 42):
Click the OK button or press the Enter key to finish the installation.
Warning! To change the parameters, specified during the SecurOS installation in the described above
windows, use the sudo dpkg-reconfigure securos command. Without using this command,
changing parameters will be possible only after completely removing and reinstalling SecurOS.
12.To start SecurOS for the first time, one need to start a new Linux session for the current user.
13.Copy the license key file from the previously created directory where it is located (for example,
<SecurOS_distributive_directory>) to the SecurOS root directory (/opt/iss/securos).
To do this run the following commands:
cd <SecurOS_distributive_directory>
sudo cp key.iss /opt/iss/securos
14.Change file owner and his rights for the key file:
cd /opt/iss/securos/
sudo chown root:securos key.iss
sudo chmod 640 key.iss
www.issivs.com
SecurOS 61 Administration Guide
SecurOS Installation and Update on Linux
cd <SecurOS_distributive_directory>
3. To start the installation of the SecurOS software, run the product installation file (for example,
securos_10.8.126-astra2_amd64.deb) with the following command:
4. If some required packages are missing, the system will display a corresponding message. Install
these packages using the following command:
5. Further installation steps are completely similar to those described above (see Installation using
.run-file).
Initial SecurOS configuration is carried out on the Conf iguration Server with the help of the System
Conf iguration Wizard, which offers various options of configurations. Base configuration at which the
configuration data is entered by the administrator, is carried out by means of the First Start
Conf iguration Wizard. Upon the configuration finish, the system will be completely ready for use.
Warning!
1. The initial configuration procedure for SecurOS on Linux is exactly the same as for Windows
(see Initial Configuration).
2. Before launching initial configuration procedure install Guardant Sign dongle (see Guardant Key
Installation).
Launching SecurOS on the Conf iguration Server on Linux is similar to launching it on Windows
(see Launching SecurOS On The Configuration Server).
www.issivs.com
SecurOS 62 Administration Guide
SecurOS Installation and Update on Linux
To install SecurOS software on peripheral servers (other Video Servers that are not a Conf iguration
Server), select the Peripheral server type in the Server type window (see Figure 43). Follow the further
instructions of the Installation Wizard. After the installation is complete, start a new user session and
assign the necessary rights to the license key file (see Software Installation On The Configuration
Server).
The procedure for starting and configuring SecurOS on the Peripheral Server on Linux platform is
similar to the procedure for setting up on the Windows platform (see Installing, Configuring And
Launching Peripheral Servers).
To install SecurOS software on the Operator Workstation, select the Operator Workstation type in the
Installation type window (see Figure 44). Follow the further instructions of the Installation Wizard.
After the installation is complete, start a new user session and assign the necessary rights to the license
key file (see Software Installation On The Configuration Server).
www.issivs.com
SecurOS 63 Administration Guide
SecurOS Installation and Update on Linux
The procedure for starting and configuring the Operator Workstation on Linux platform is similar to the
procedure for setting up on the Windows platform (see Installing, Configuring and Launching
Operator Workstations).
www.issivs.com
SecurOS 64 Administration Guide
SecurOS Administration Overview
Warning! After SecurOS and PostgreSQL software installation Windows OS creates the postgres account.
To configure SecurOS system use an Windows administrator account but not the postgres one.
Active Desktops and Macros control buttons (see Disabling/ Enabling Objects) are placed in the panel.
Number of these buttons is specified by system settings. If this number is exceeded, extra buttons are
minimized and the corresponding menu for calling these objects is displayed on the panel:
— for Desktops;
— for Macros.
An active Desktop button is displayed in light blue (see Figure 45). If Administration Center is opened,
then the Configure the system button is displayed in the same color.
See also:
Control Panel Activation, Configuring and Hiding;
Opening and Closing Administration Center;
Changing Operator Workspace;
User Session Administration and Client Shutdown;
Getting Help;
System Shutdown.
www.issivs.com
SecurOS 65 Administration Guide
SecurOS Administration Overview
If Control Panel is not displayed on the Windows desktop, press and hold the Ctrl key, then move
mouse pointer so it touches the top of the screen.
Note. Depending on operation mode, you can use different methods to activate the Control Panel
(see SecurOS Quick User Guide).
Additional Information
The Control Panel also can be activated by clicking on the application icon in the Windows taskbar (system tray), or
using the Show Control Panel command in the application icon context menu.
To set Control Panel call/hide method click on the (Change user/ Shutdown system) button,
then select the Configure Control Panel command. In the Control Panel settings window
(see figure 46) set the required parameters.
www.issivs.com
SecurOS 66 Administration Guide
SecurOS Administration Overview
In the Minimize panel automatically mode panel is hiding itself, if the mouse pointer is no longer
above the panel.
To hide panel in the Minimize panel manually mode, click on the (Minimize the Control
Panel) button.
Note. The Control Panel can also be minimized by clicking it's icon in the Windows Taskbar notification area
(system tray), on the Windows Taskbar or with the help of application icon context menu in the system tray.
To open Administration Center click on the (Configure the system) button in the Control Panel.
Main window of the Administration Center will appear (see Figure 47).
www.issivs.com
SecurOS 67 Administration Guide
SecurOS Administration Overview
See also:
Administration Center.
www.issivs.com
SecurOS 68 Administration Guide
SecurOS Administration Overview
Created Operator Workstation Prof iles (see Operator Workstation Profiles) are available for the operator
as Operator Workspaces. Operator Workspace specify appearance of the operator interface and list of
available modules. Each Operator Workspace can be used by unlimited number of Operator Workstations.
Current Operator Workspace can be changed in Control Panel. To do this click on the Change user/
Shutdown system ( ), select Change Operator Workspace, then click on the required item
(see Figure 48).
Current Operator Workspace will be marked with the sign. Operator Workspace configured on the
fixed Operator Workstation (see Fixed Operator Workstations) is called Local.
Warning! Last time used Opertator Workspace is remembered only for Windows user.
For more information about how to use Operator Workspace see SecurOS Quick User Guide.
Using Control Panel one can change user or close Client. Click the Change user/ Shutdown system
button ( ) and from the drop-down list select a necessary command (see figure 49).
www.issivs.com
SecurOS 69 Administration Guide
SecurOS Administration Overview
One can to shut down the system (Server part of the SecurOS) using one of the following ways:
Stop the Server part of the SecurOS with the help of the Server Control Agent utility.
Stop the SecurOS Control Service. When stopping the service, the Server part of the SecurOS
will be stopped automatically. The service also can be stopped with the help of the Server Control
Agent utility or, when running Windows OS, with the help of the Computer management console
(Computer Manage Services and Applications Services).
To open list of all available SecurOS Manuals and Guides you can use one of the following ways:
1. Click on the (Change user/ System shutdown) in the SecurOS Control Panel (see Figure 50):
www.issivs.com
SecurOS 70 Administration Guide
SecurOS Administration Overview
2. From the Windows task bar (system tray), by right clicking on the SecurOS icon (see figure 51):
To open description of the Administration Center, press the F1 key or click on the button in the
Administration Center.
www.issivs.com
SecurOS 71 Administration Guide
SecurOS Administration Overview
To open description of the object settings, open object settings window from the Object Tree and,
further, press the F1 key or click on the button in the Administration Center.
To open Administration Center click on the (Configure the system) button in the Control Panel.
Administration Center contains Administration Toolbar and Object Tree (see Figure 52):
www.issivs.com
SecurOS 72 Administration Guide
SecurOS Administration Overview
Administrator Toolbar
The Administrator Toolbar contains the controls (buttons) allowing one to make typical operations of
the system administrator (see Working with Objects).
Administration operations are done with the SecurOS object selected in the Object Tree. The list of
operations which can be done with an object (i.e. availability of each of the Toolbar buttons) depends
on the selected object.
Object tree
The security system elements are displayed in the form of a object tree — the hierarchical structure
reflecting correlations between them. The System object is the root element of the tree. All other
SecurOS objects are its children.
Additional information
Objects which are one level down the hierarchy are called child objects to the object one level above them. The parent
objects contain child objects.
There are two object classes in the SecurOS network: system objects and user interface objects. System
objects reflect the network functionality, user interface objects are intended for security network
monitoring and management.
Administration toolbar contains the following buttons to work with objects (see Figure 53):
www.issivs.com
SecurOS 73 Administration Guide
SecurOS Administration Overview
Warning! Object with the same hierarchy level can be created only from context menu of parent object/group.
Disable/ Enable — disable/enable object. When executing an operation, this button changes its
appearance and reverts an action;
Setup — open/close object's settings window;
Rename — rename object;
Delete — delete object;
Help — call help (context dependent on the currently selected object in the Object Tree);
IP-Device Manager — open the IP-Device Manger utility to search for IP devices within the
SecurOS security network and add them to the system configuration.
Administration Toolbar's buttons are duplicated by commands of the object's context menu (for example,
see Figure 54):
To call context menu right click on the required object. Context menu allows the following additional
operations with objects: Find by name and Find by ID (see Searching objects).
www.issivs.com
SecurOS 74 Administration Guide
SecurOS Administration Overview
2. In the Administration toolbar or to the right from the object click on the (Create) button and
choose the necessary object type from the drop-down list.
3. In the Parameters of created object window set the ID and Name of the object. Click on the OK
button.
4. In the object's settings window specify the required values. Apply changes.
Warning! If maximum number of objects is exceeded when copying objects with the help of IP-Device
Manager, the system will display the appropriate message. Only permitted number of object copies will be
created.
1. Select an object in the Object Tree, then click on the (Setup) button on the Administrator
Toolbar or on the right of the object.
2. Change the current parameters of the object.
Notes:
1. Parameters in the object settings window are described in the section corresponding to the given
object for each subsystem (see Software Implementation. SecurOS Subsystems).
2. If you selected an objects, that have no editable parameters or operation is restricted by User Rights,
then the Setup button is disabled.
3. Apply changes.
1. Select an object in the Object Tree, then click on the ( Delete) button in the Administration
Toolbar.
2. To confirm operation click on the Yes button.
Warning! This operation cannot be undone, so use it carefully. If you delete an object, it's child objects will be
deleted as well. When you delete a group object, all objects within this group are deleted.
www.issivs.com
SecurOS 75 Administration Guide
SecurOS Administration Overview
To disable an object select it in the Object Tree, then click on the (Disable) button. Disabled
objects are marked with "turquoise cross" icon (see Figure 55).
To enable a disabled object select it in the Object Tree, then click on the (Enable) button.
Additional Information
You can disable/enable all objects in the group. To do this, disable/enable Group or Parent object. When doing so
name of the object\group will be marked with grey color.
To rename object:
1. Select an object in the Object Tree, then click on the (Rename) button.
2. In the pop-up dialog window specify a new object name.
3. Click the OK button to save the changes.
www.issivs.com
SecurOS 76 Administration Guide
SecurOS Administration Overview
3. To continue search press the Enter key (or the Previous and Next in the search window).
4. To stop search and close the window, press the Esc key.
3. To stop search and close the window, press the Esc key.
If there are problem objects in the system (objects whose settings require changes for the correct
functioning of the given or related objects), the Administration Center looks as follows (see Figure 58):
www.issivs.com
SecurOS 77 Administration Guide
SecurOS Administration Overview
Figure 58. Administration Center appearance if there are problem objects within the system
The red banner is displayed between the Toolbar and the Object Tree. The banner displays the Objects
requiring configuration: string and number of such objects in the Tree. Problem objects are marked
with the icon. To search for problem objects in the Objects Tree use the buttons located on the right
side of the banner. The search will be performed in the selected direction, starting from the currently
active object.
Note. The banner can be hidden by clicking the button on the left. Working with the Object Tree will
continue as usual. In this case, the hidden banner will be displayed automatically with each next call of the
Administration Center.
The description of the problem is displayed directly in the settings window for the problem object, for
example, see Figure 59.
www.issivs.com
SecurOS 78 Administration Guide
SecurOS Administration Overview
Object setting window can include both single parameter text boxes and tables. Example of the table
parameter (Holidays) is shown on figure 60.
When working with table parameters the following methods are used:
To add several entries into the table, use key on the keyboard or click mouse below the last entry
in the list.
To delete an entry from the table, select the required row and press the Delete keyboard key.
www.issivs.com
SecurOS 79 Administration Guide
SecurOS Administration Overview
The IP-Device Manager is designed to search for IP devices within the SecurOS security network and to
add them to the system configuration.
The search is performed with the help of standard network technologies (see Searching Devices in the
Network section) within the local network of the Computer, which is running the Manager. All found
devices are assumed un-tuned; you can perform the following operations with such devices:
Adding IP Device;
Editing IP Device Parameters.
With devices that are already registered in the network (with the help of the Manager or by standard
tools) you can perform the following operations:
Editing IP Device Parameters;
Deleting IP Device.
www.issivs.com
SecurOS 80 Administration Guide
SecurOS Administration Overview
5.2.3.1 Specification
The main application window is shown on figure 61.
Parameter Description
System IP-devices
www.issivs.com
SecurOS 81 Administration Guide
SecurOS Administration Overview
Parameter Description
The Object Tree consists of Computers having the Video Server role
that exist within the SecurOS network. When expanding the Video
Server node all Video Capture Device child objects including their
Camera child objects are displayed. If a device has integrated audio
or it is configured to operate in the synchronized recording mode
(see Synchronized Audio/ Video Recording and Playback section), all
Object Tree appropriate Microphone objects are also displayed in the tree.
Notes:
1. Objects which settings are currently being edited are displayed
in the Object Tree in italic.
2. Objects that are disabled in SecurOS, are displayed in the Object
Tree in grey (shaded out), similarly to inactive Windows objects.
Object Settings
Type and model of the device, selected in the Object Tree. The
Type, Model
Information field is not editable by the user.
Multichannel device
Limitations. To use this functionality the system must meet the
following conditions:
1. The device should support several independent video streams.
2. The device integration should support multichannel systems.
www.issivs.com
SecurOS 82 Administration Guide
SecurOS Administration Overview
Parameter Description
Check the box, if you want to use the device's audio inputs (or
integrated microphone). Max number of audio channels depends on
the device Type and Model and are defined in the device
integration. In general, the number of audio channels ≤
number of the video channels.
Use audio inputs
Limitations. To use this functionality the system must meet the
following conditions:
1. Device must be equipped with audio inputs.
2. Device integration in SecurOS should support audio.
Buttons
Delete Delete a Video Capture Device, selected in the Manager's Object Tree.
Notes:
Apply (Cancel) 1. The buttons are enabled only if settings were assigned / edited
in the Settings and/or Usage tabs.
2. If the current settings were edited and the Close button was
clicked before these new settings were saved or canceled, the
system will display a message to save the changes.
New IP-devices
Select the Video Server in the Object Tree for which a new Video
Capture Device, associated with the network IP device selected below
Add devices to video server (see Table of IP-devices below) will be created and where the video
archive of this device will be created and stored. The Computer that's
running the IP-Device Manager is selected by default.
www.issivs.com
SecurOS 83 Administration Guide
SecurOS Administration Overview
Parameter Description
Once all required tasks are completed, the IP-Device Manager window can be closed by clicking the
Close button.
Warning! If the connection with the Configuration Server is lost, all operations are blocked until the
connection is restored.
2. On the Administrator Toolbar (see Figure 62) click on the (IP-Device Manager) button.
www.issivs.com
SecurOS 84 Administration Guide
SecurOS Administration Overview
Warning! When the IP-Device Manager window is active, the SecurOS object settings mode is blocked ( i.e. it
is impossible to open a object settings window from the SecurOS Object Tree).
www.issivs.com
SecurOS 85 Administration Guide
SecurOS Administration Overview
Additional Information
When placing the mouse cursor over the IP address field an informational message containing the device info will
be displayed. Typically, the message's string consists of three fields in the following format: <Device
Manufacturer> <Device Model> (<Device Name>). For example, Beward BD2570
(H.264 5M box camera).
Warning! The Table of IP-devices displays all found network devices, including printers, scanners, etc.
www.issivs.com
SecurOS 86 Administration Guide
SecurOS Administration Overview
Click the Model cell, and in the drop-down list select the model of the device. Select default if
there is no required model in the list. System will activate the Add button.
For a recognized device (IP address, Type and Model parameters are determined):
Select the device from the Table of IP-devices.
For the arbitrary device (there is no device information in the table):
Click the Type cell in the last (empty) table row, and in the drop-down list select the device type.
Click the Model cell, and in the drop-down list select the model of the device.
5. Click the Add button.
Note. If the device can't be added due to license restrictions or if the connection with the Conf iguration Server
is lost, the system will display a corresponding informational message.
The system will create a new Video Capture Device with specified parameters and add it to the Manager's
Object Tree to the selected Computer, the added device will be currently selected in the device tree. A
Camera child object will be created for the added Video Capture Device automatically. You can edit it's
parameters in the Administration Mode from the SecurOS Object Tree.
Note. The default name for each added device is Video Capture Device N, where N — next sequential
digital identifier of the given type of object.
www.issivs.com
SecurOS 87 Administration Guide
SecurOS Administration Overview
The following main parameters and child objects of the selected source object will remain intact for
each copy:
1. device Type;
2. device Model;
3. other parameters, that are specified by device Type and Model;
4. child Cameras. Number of the child Cameras of the each copy will correspond to the number of
Cameras child to the source device.
www.issivs.com
SecurOS 88 Administration Guide
SecurOS Administration Overview
Warning! You cannot copy device, which settings are not saved with the IP-Device Manager.
2. Click the Copy button. Depending of the type of the selected Video Capture Device system will
display one of the following Copying window (see Figure 66.
3. Select a Video Server, where new devices will be added to, specify a Number of copies or range of
IP addresses, that will be assigned to the created devices. Click the OK button.
Note. If a Port was specified in the IP address parameter of the device is being copied, then this port will be
set for each device copy with no changes.
4. System will create required number of copies of the initial device on the specified Video Server.
5. If necessary, configure each created device copy on the Settings tab. Click the Apply button.
www.issivs.com
SecurOS 89 Administration Guide
SecurOS Administration Overview
The following SecurOS objects are used to control users and their rights:
Department — is used to group Users, for example, depending on user's role within the system.
User Account — serves for the creation of the SecurOS's user personal account (contains login and
password that are used for authorization in the system).
Active Directory / LDAP — this object provides authorization in SecurOS for the Windows users
registered in the Windows Active Directory domain.
User Rights — is used to assign users (both native SecurOS Users and OS users) Access rights to
SecurOS objects and operations with them. For the details see User Registration and Configuring
User Rights.
Detailed information about users, their rights, SecurOS objects used for configuration is given in the
following sections:
SecurOS Users;
User Registration and Configuring User Rights;
Configuration of Network Domain User Rights.
SecurOS Superuser
Superuser account is created during initial system configuration via System Configuration Wizard and
has the root (user name) and password specified by the administrator (securos by default)
credentials. The set of the rights of such account gives user the full access to all system objects and the
right to execute any actions in the network. Objects of the superuser account aren't displayed in the
SecurOS Object Tree; to change the name and the set of the superuser rights is impossible.
Warning! Superuser password can be changed with the help of Wizard (see 4 in the Initial Configuration
Using The System Configuration Wizard) or further at system operation (see Changing Superuser
Password).
www.issivs.com
SecurOS 90 Administration Guide
SecurOS Administration Overview
3. Use text boxes of the Superuser password block to type and confirm new password. Click OK
button to save the changes.
Warning! Minimum superuser password length is 7 characters. After changing the password, keep it a secret.
www.issivs.com
SecurOS 91 Administration Guide
SecurOS Administration Overview
Warning! If there are no other Users in the system except the Superuser (see SecurOS Users, access to the
system will be granted without taking into account the user name and password.
To create and configure new user accounts the following system objects are used:
Department object (Security Zone Users & Permissions group Department) — contains a list
of the User object. The name of each User object is used at authorization as the User parameter.
User's Password is specified in the appropriate User Account object settings. New users can be
registered both in the given Department object, and in any other Department object created by the
system administrator.
Note. Department object is created in the object tree only if Power user or Simple user were added during system
configuration with the help of System Configuration Wizard.
Users & Permissions group (Security Zone Users & Permissions group) — contains the User
Rights objects. Each of the existing User Rights objects can be used repeatedly (i. e. can be assigned
to any user). This group contains two predefined set of user rights (Rights f or Power User and Rights
f or Simple User) which differ in the level of access to objects and operations with them.
User registration and user rights configuration procedures are described in the following sections
below:
New user registration;
Assigning rights to a user/ user group;
Checking the possibility of authorization of the specified user of the OS network domain.
Note. The procedure for registering in SecurOS an OS user registered in an Active Directory domain is
described in the Configuration of Network Domain User Rights.
Warning! If system contains more than one Security Zone it is necessary to define user and his rights for each
of these zones. Users registered in the separate Security Zone can log on only the Computers that are children to
the given Security Zone. Superuser (see SecurOS Users) can log on any computer that belongs to any Security
Zone.
1. In the Users and Permission group create a new Department object or use existent.
2. Create an User object children to the selected Department.
3. In the Parameters of created object window in the Name field specify user name that will be used
for the authorization (see Figure 68).
www.issivs.com
SecurOS 92 Administration Guide
SecurOS Administration Overview
4. In the object settings window (see Figure 69) specify required Password that will be used for the
authorization. Specify other parameters, if necessary (for the details see User Account).
5. Save changes.
Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.
www.issivs.com
SecurOS 93 Administration Guide
SecurOS Administration Overview
for the Windows users registered in the Active Directory network domain — configuring rights
www.issivs.com
SecurOS 94 Administration Guide
SecurOS Administration Overview
for the OS user group are described in the Configuration of Network Domain User Rights.
5. Repeat steps 2 - 4 for each Security Zone within your network. For each Security Zone SecurOS Object
Tree will contain elements shown in figure 71.
Figure 71. Objects Tree with Department, User Accounts and User Rights objects
Checking the possibility of authorization of the specified user of the OS network domain
One can test the possibility of the authorization of the specified user of the OS network domain in the
User Rights object settings window. To perform the test do the following:
1. Configure the OS user rights (see Configuration of Network Domain User Rights).
2. In the Access testing block (see Figure 72):
Enter the User name of the OS user for which it is necessary to check the possibility of the
authorization in SecurOS;
Click the Test button.
www.issivs.com
SecurOS 95 Administration Guide
SecurOS Administration Overview
Warning! Access level to the Computer object specified the in the configured User Rights is not taken into
account when checking.
Access denied — settings are incorrect or specified user is not registered in OS domain;
Check failed — domain controller request timeout exceeded.
The ability to authorize the specified native SecurOS user can be checked in a similar way.
In this section the Active Directory / LDAP (see Active Directory / LDAP) and User Rights object
configuration procedure is described for the domain provider (Windows NT or LDAP) that receives the
SecurOS user authorization request. Contains the following parts:
Settings for Windows NT Provider;
Settings for LDAP Provider.
To set user rights for a single user, specify the user system name (for example, j-smith) in the the
Users and Groups field of the User Rights object settings window (see User Rights section).
To set user rights for a user group, fill the Users and Groups field in the User Rights object settings
window with a network domain users group login and ,group postfix without spaces (e. g.
Users,group). The ,group postfix is required.
www.issivs.com
SecurOS 96 Administration Guide
SecurOS Administration Overview
4. Select Use credentials provided at system login checkbox to connect domain controller using
current MS Windows login and password, or fill in the User name and Password fields (specified
user must be defined for domain controller, see item 3).
To set user rights for a single user, fill the Users and Groups field in the User Rights object settings
window (see User Rights) with the following string: &(objectClass=user)(sAMAccountName=j-
smith), where the user name (for example, j-smith) is specified.
To set user rights for a user group, fill the Users and Groups field in the User Rights object settings
window with the following string:
&(objectClass=user)(memberOf=cn=Users,cn=Builtin,dc=test-dev,dc=test)
In operation, SecurOS provides continuous system logging. Data recording is done separately by each
of the servers in their own, local database. By default, each server stores information about all the
events occurring within the system. Database retention period, that is common for all servers within the
system, is specified in the Security Zone object settings.
Additionally, specific rules of data recording and storage can be specified for each of the system servers
in the Local database parameter block of the Computer object settings:
List of events allowed to be recorded into the database — only events specified in the Event Filter
object settings will be recorded into the local database. Use Event filter parameter is used to specify if
event filter should be applied while recording;
Database size — restriction on the local database size. Is specified in the Maximum Protocol DB size
parameter. If specified value is reached then information is re-recorded in ring mode — the oldest
protocol records are deleted first. If maximum is not reached, then common for all system servers
database retention period value is considered;
Disable recording into the database — if this mode is on, then no information is recorded into the
local protocol database. Is specified in the Disable saving data into local Protocol DB parameter.
To view protocol database records the Event Viewer interface object is used. Event Viewer interface
object window displays information from database of the server to which you are connected. For the
Video Server this is it's own, local protocol database of the corresponding computer, and for the Operator
Workstation — database of that Video Server, to which operator's computer is connected. Thus if Operator
Workstation is connected to the servers where different rules of the database information recording and
storage are specified, then different information can be displayed in the Event Viewer interface object
window.
Database access control is ensured by the PostgreSQL DBMS access control system, eliminating the
possibility of unauthorized modification or deletion of records by a simple user. Event Viewer interface
object cannot be used for unauthorized data modification or deletion.
www.issivs.com
SecurOS 97 Administration Guide
SecurOS Administration Overview
Additional information
Outdated license key is stored in the SecurOS installation root directory in the key.iss.bak file.
Warning! After license key was updated on the Peripheral Server SecurOS program may automatically reboot.
All workstations can be configured to notify simultaneously about license key file expiration date.
If less than certain days remain before license expiration then an information window will appear on
each workstation during operator working (see figure 73). Operator may close the window and
continue working.
Notification window appears with a certain periodicity (e. g. three times a day, with three hours
between messages).
To setup notification parameters, do these steps on each computer where reminder window should
appear:
www.issivs.com
SecurOS 98 Administration Guide
SecurOS Administration Overview
Warning! Zero value of this parameter results in that the reminder window will be never displayed!
MinRemaindPeriod — specify a minimal time interval (in minutes) between two notifications
(must be no less than 30).
3. Save the changes and close the file.
The Health Monitor self-diagnostic Module is designed for system monitoring to identify different
issues.
www.issivs.com
SecurOS 99 Administration Guide
SecurOS Administration Overview
Parameter Description
The Health Monitor can be located on any Computer within the network (Video Server or Operator
Workstation) and, regardless of location, allows you to monitor the state of the whole system.
After application is started its icon is displayed in system tray. Icon appearance indicates current
system state:
— there are no issues;
— there are issues;
— a new issues were discovered (is used only for Silent inf orming mode). Displays the total
number of problems that occurred after the previous Health Monitor window session was closed.
Operation Modes
Depending on object settings (see Configuring and Launching) one of two modes is used to notify
operator about new issues:
Autoinforming mode (pop-up informer window is used for informing) — when a new problem
occurs, the informer window that contains the list of problem objects and a brief description of the
problem is automatically displayed (see Figure 75). If there are no new problems, the informer
window will automatically hidden in 10 seconds. If informer window is hidden, one can call it by
clicking application icon in system tray;
Silent informing mode (application icon in system tray is used for informing) — when total
number of problems changes, the system automatically updates the problem counter ( ) on the
application icon (see Figure 76). To view list of current issues call informer window by clicking
application icon.
www.issivs.com
SecurOS 100 Administration Guide
SecurOS Administration Overview
To view issue details description call Health Monitor window by clicking required one in the informer
window list. Informer window can also be called from the context menu of SecurOS icon in system tray
(see Figure 77).
www.issivs.com
SecurOS 101 Administration Guide
SecurOS Administration Overview
Note. When window is opened for the first time, then Table view is used.
Table view
Appearance of the Health Monitor window when table view for data representation is used is shown
in Figure 78. Data is located in the following columns:
Object type — type of the problem object;
Object name — id and name of the problem object;
Server — id and IP address of the Video Server where problem appears. If IP address is not specified
in the Computer object settings, then the "IP address is not set" string is displayed in the
cell;
www.issivs.com
SecurOS 102 Administration Guide
SecurOS Administration Overview
Problem type — name of the problem that occurred on the specified object;
Date and Time — problem date and time in OS format. Problems of the current day is marked with
the "Today" word.
One can change table columns width. To do this place mouse pointer over columns separator. Pointer
will be changed as it represented in Figure 79.
Press the mouse button, and while holding it down, move the cursor in the required direction.
Note. Width of the last column in the table can not be changed.
Table data can be sorted by ascending/descending by column value. To sort table entries by any field,
click required column in the table head, then click the "up arrow/down arrow" icon (see Figure 80).
Table entries will be sorted by ascending/descending order in selected column.
Tree view
Appearance of the Health Monitor window when tree view for data representation is used is shown in
Figure 81.
www.issivs.com
SecurOS 103 Administration Guide
SecurOS Administration Overview
SecurOS objects with current problems are represented as a tree and grouped in eight main nodes,
representing the object type or SecurOS Intelligent Module: Systems, Video Servers, Concentrators,
Cameras, Microphones, Sensors, Remote systems, SecurOS Auto and SecurOS Cargo. The number of objects
of the given type is displayed to the right of the node name. The total amount of objects of the given
type within the SecurOS network is additionally displayed for the Video Servers node. Within the node
problem objects are grouped by video server name. The total number of problem objects of given type
is displayed to the right of the video server name.
One can use address bar of the Problem detailed description block to quickly navigate through the
branches of the Problem objects tree. To jump to the required level, simply click it (see Figure 82).
Figure 82. Navigation through Problem objects Tree from address bar
After such a jump is finished, all problem objects located on the selected level (for example, Cameras,
see Figure 83) will be displayed in the Problem detailed description block. To jump to detailed
description of the problem for any Camera, simply click this camera. Using this method one can move
through any branches within selected node of the Problem objects Tree.
www.issivs.com
SecurOS 104 Administration Guide
SecurOS Administration Overview
Diagnosed issues
Module can identify problems with different level of importance. List of issues to be detect and detailed
problem description is presented in the following sections corresponding to the nodes of the Problem
Objects Tree):
System;
Video Server;
Camera;
Microphone;
Sensor;
Remote system;
Concentrator;
SecurOS Auto (see SecurOS Auto User Guide);
SecurOS Cargo (see SecurOS Cargo User Guide);
SecurOS EDBE (see SecurOS EDBE User Guide).
5.6.1 System
Unconfigured objects
The message appears if some configuration objects' settings must be updated. Go to the object tree
to see the objects with problems.
The message disappears if all settings are updated.
One can find unconfigured objects using SecurOS Object tree (see Objects Requiring Configuration).
The following problems are diagnosed for the Video Server object:
Image Processor: task queue overloaded;
MCC DC Gateway: Gateway Video Server for live video is unavailable;
REST API: image export queue overloaded;
REST API: event queue for subscribers overloaded;
Archive was deleted because of insufficient drive space;
www.issivs.com
SecurOS 105 Administration Guide
SecurOS Administration Overview
www.issivs.com
SecurOS 106 Administration Guide
SecurOS Administration Overview
www.issivs.com
SecurOS 107 Administration Guide
SecurOS Administration Overview
The message disappears if the error does not repeat within 3 minutes.
Product version on Server does not match the one on the Configuration Server
The message appears if the version of the product installed on the Peripheral Server does not match
the version of the product installed on the Conf iguration Server. System administration is limited.
The message disappears immediately after the required version of the product is installed on the
Peripheral Server.
www.issivs.com
SecurOS 108 Administration Guide
SecurOS Administration Overview
the number and/or values of the parameters of the Give way to pedestrian detector and the License
plate recognizer are different. For example, there are 3 lines specified in the detector parameters and
only 2 lines in the License plate recognizer object settings.
The message disappears if the error does not repeat within 30 minutes.
www.issivs.com
SecurOS 109 Administration Guide
SecurOS Administration Overview
Warning! To resolve this problem it is recommended to create an SystemInfo report via the SystemInf o Utility
(SystemInf o.exe) and send it to the Technical Support Team.
The message disappears in 7 seconds after the connection with the ACS server is restored.
Disconnected
The message appears if the connection with the server is lost.
The message disappears in 7 seconds after the connection with the server is restored.
Warning! This message is also displayed if an invalid or incorrect IP address is specified in the IP address
parameter in the Computer settings.
www.issivs.com
SecurOS 110 Administration Guide
SecurOS Administration Overview
The message disappears if the error does not repeat within 3 minutes.
www.issivs.com
SecurOS 111 Administration Guide
SecurOS Administration Overview
5.6.3 Camera
Microphone is detached
The message appears when there is no signal from the Microphone linked to the Camera.
The message disappears in 7 seconds after the connection with the Microphone is established.
Warning! The archive file can be deleted when the drives don't have enough free space or when it's retention
period is expired. In this case it is not considered a problem.
www.issivs.com
SecurOS 112 Administration Guide
SecurOS Administration Overview
The message disappears if the error does not repeat within 1 hour.
Camera is detached
The message appears when the system fails to receive the video stream selected as the Stream for
recording in the Camera object settings. If the Stream for recording is unavailable then all other
streams are disabled.
The message disappears if the specified video stream is received from the Camera during 7 seconds
and the content of this stream is correct.
Note. This problem is not diagnosed for Cameras, if their parent Video Capture Device has a ISS Video
Concentrator type.
Frame corrupted
The message appears if the frame couldn't be recorded or read when performing playback in the
Media Client from primary or long-term archive.
The message disappears if the error does not repeat within 1 hour.
Stream N is disconnected
The message appears if it is impossible to receive the specified video stream from the Camera or the
content of the video stream is incorrect.
The message disappears if the specified video stream is received from the Camera during 7 seconds
and the content of this stream is correct.
Problems when working with EdgeStorage Sync (see Camera Local Storage (Edge
Storage))
www.issivs.com
SecurOS 113 Administration Guide
SecurOS Administration Overview
Note. In many cases this problem raises due to overlapping records by time caused by moving camera's
system time backward.
5.6.4 Microphone
Microphone is detached
The message appears when there is no signal from the Microphone.
The message disappears in 7 seconds after the connection with the Microphone is established.
5.6.5 Sensor
Sensor is sabotaged
The message appears when the Sensor produces a SABOTAGE event (see SecurOS Programming
Guide).
The message disappears in 7 seconds after receiving an event other than SABOTAGE.
www.issivs.com
SecurOS 114 Administration Guide
SecurOS Administration Overview
The following problems are diagnosed for the Remote System object:
Configuration update failed: some objects are not supported by SecurOS MCC;
Disconnected.
Warning! These problems are diagnosed for the Remote System object only for Direct Connect type of the
Monitoring Center connection.
Configuration update failed: some objects are not supported by SecurOS MCC
The message appears if the set of Modules installed on SecurOS MCC and the Remote System does
not match. Interaction with the Remote System will be limited. The current configuration is out of
date. It will be updated automatically when the required Modules are installed on SecurOS MCC.
The message disappears immediately after the configuration is updated.
Disconnected
The message appears if the connection with the Conf iguration Server of the remote system is lost or
the server specified in the system settings is not a Conf iguration Server. Interaction with the Remote
System will be limited.
The message disappears in 7 seconds after the connection with the Conf iguration Server is
established.
Note. This problem also raises if incorrect address is specified in the Configuration Server address parameter
of the Remote System object settings.
5.6.7 Concentrator
Warning! This problems is diagnosed for the Concentrator object only for VC/ VR Connect type of the
Monitoring Center connection.
Disconnected
The message appears if the ISSVideoConcentrator cannot receive a video stream from the remote
system.
The message disappears in 7 seconds after the connection with the remote server is established.
www.issivs.com
SecurOS 115 Administration Guide
SecurOS Administration Overview
Warning! In case of cluster the files on the Conf iguration Server must be changed only in the service mode
(see Configuring Cluster).
www.issivs.com
SecurOS 116 Administration Guide
Core Subsystem
6 Core Subsystem
The core subsystem communicates with the computers in the SecurOS distributed network, with
installed intelligent modules (such as license plate recognition module), and with other subsystems
(such as the video or audio subsystem, or the telemetry subsystem).
Status data and information about all on-stream events are sent from each SecurOS object to the core
subsystem which establishes managing of the whole security network.
The computers interconnected by means of the core subsystem are nodes of the SecurOS distributed
network. Every node connection or disconnection is registered in the SecurOS security network log file
in real time.
The SecurOS core subsystem allows connection and disconnection of the security network nodes,
configuration and synchronization of information between the security network nodes, as well as
monitoring any changes in modules and objects status.
If any single node or a certain network segment is disconnected, it is assigned the disconnected status
and it becomes inaccessible for administration until it is connected again. When the previously
disconnected node is connected again, the updated network configuration data is loaded on it, and the
events log on this node is synchronized with the up-to-date SecurOS security network log file.
Permanent updating of the security network configuration data allows the configuring of the security
network from any computer running the necessary administration software, watching video form
connected video cameras, listening to audio, sending commands to hardware, and monitoring and
controlling alarm and fire alarm systems from every operator's workstation within the SecurOS
network.
Data exchange mode within SecurOS network is specified in the System object settings. The following
connection options are possible:
connections without using the TLS protocol;
using the TLS protocol in connections for those modules that support encryption of the data
transmission channel. The connections between the other modules use the regular communication
protocols;
connections that use only TLS data transmission protocol.
www.issivs.com
SecurOS 117 Administration Guide
Core Subsystem
6.3.1 System
This is the root object of the entire Object Tree and provides system-wide settings. This object cannot be
deleted, moved, or disabled. Operations of viewing and editing object parameters are available only to
the superuser (see SecurOS Users).
www.issivs.com
SecurOS 118 Administration Guide
Core Subsystem
Parameter Description
Superuser password (To display entered characters click the button. To hide them click the
button.)
Flag that allows access from the Monitoring & Control Center to the
system that is being configured and access password. If not selected,
an access from the Monitoring & Control Center to this system will be
Allow access
denied. If selected, an access from the Monitoring & Control Center to
this system will be granted if the specified password matches the
password, specified in the Remote System object settings.
www.issivs.com
SecurOS 119 Administration Guide
Core Subsystem
Parameter Description
Click this button to save the current configuration (Object Tree and
all object settings) to a JSON-file. Use Windows file manager to
specify folder and file name. By default, file will be saved as
default.json in the following folders:
Click this button to restore system configuration from the file. The
configuration file is selected by the administrator from the list of
previously saved ones. Configuration restoring procedure contains
the following steps:
www.issivs.com
SecurOS 120 Administration Guide
Core Subsystem
Parameter Description
Audit
Select this checkbox to audit the system and record obtained data.
Data will be recorded to the special audit database that will be
Record system audit data
automatically created after applying new settings (for the details
see SecurOS AuditTrail User Guide).
www.issivs.com
SecurOS 121 Administration Guide
Core Subsystem
Parameter Description
Select the audit interval from the list. Audit interval means the time
period that is used to trace the prolonged user actions within the
system. The following user actions are called prolonged:
controlling PTZ.
Audit interval
Warning! Each astronomical hour contains several audit intervals. The
beginning of the first audit interval in an hour coincides with the beginning
of each astronomical hour.
Security
Accept insecure connections Note. Modules that do not support data encryption protocols will
operate in normal mode.
This object is used to divide the entire security network into separate security zones. Security Zones are
commonly used when the SecurOS system ranges over a large territory where independent centralized
monitoring and supervision is needed for certain physically separated zones.
Additionally, one can organize events filtering between system's Video Servers. Using filter it is possible
to permit or to forbid transmission of all system events to selected Video Server (see Servers to Connect
Tab).
System users can be also granted with different access rights to implement multi-level access control for
the security objects (see User Registration and Configuring User Rights). For example, in a security
center the operators can observe the territory by watching the signals from the cameras. The supervisor
can be granted the rules to control the monitoring modes, enable or disable cameras, control the PTZ
cameras, and the head of the security center can generate reports.
Object settings allows to distribute loading from Operator Workstations between Video Servers
(see Servers to Connect Tab). The white list of IP addresses, from which one can connect to the Video
Servers, can be created as additional protection feature (see Connection Restrictions Tab).
www.issivs.com
SecurOS 122 Administration Guide
Core Subsystem
Using security zones and user rights, administrative status can be assigned specifically to distribute
control of secured territory between independent companies. In this case, SecurOS network is separated
into several segments and each administrator may monitor and configure only one of those segments.
www.issivs.com
SecurOS 123 Administration Guide
Core Subsystem
Parameter Description
Define the events storage period in the Event Viewer database (in
days, max). Event database stores events from objects that belong to
this security zone only. Possible values: [1; 9999]. Default value:
Protocol database length
7. Messages will be deleted automatically when the retention period
has expired. Removal is performed when SecurOS starts or once a
day at 2:45:00 AM (hh:mm:ss).
Select from the list of accessible macros (Macro objects, see Macro)
Run Macro at start the one which will be activated on Video Server on system startup, if
necessary (see Macro running conditions).
Fill in the table containing a list of dates (in DD.MM.YY format) that
Holidays will be used by a access control subsystem as holidays. Those days
are also used in Schedule.
Macro will be started if all executors that implement the SecurOS features are successfully launched. If
SecurOS' Intelligent Modules (for example, SecurOS Auto) are installed, all executors of these Modules
must be started, too. If at least one of the executors has not started, the Macro will not be started.
6.3.2.2 Servers to Connect Tab
Operator Workstation is a client application and must be connected to the SecurOS server to work. For
the first time connection is performed manually. Operator specifies server to connect in the
Authorization window (see Launching SecurOS On Operator Workstation). Further automatic
authorization can be adjusted (see Auto login).
Tab allows to specify to which servers Operator Workstations can connect, to which can not, and also
divide these servers into groups. Dividing servers into groups allows to balance servers loading. So, if
some server fails, system will attempt to reconnect Operator Workstation to other server of the same
group.
Note. To change server group to connect it is necessary logoff user and reconnect to the server from other
group.
www.issivs.com
SecurOS 124 Administration Guide
Core Subsystem
Figure 86. Security Zone object settings window. Servers to Connect Tab
By default, server list contains two groups — Allow connection and Don't allow connection. By
default all servers, existed in the SecurOS, are located in the Allow connection group. All newly
created Video Servers also are added to this group.
For the Video Server, depending on whether it belongs to a group, one can either allow or prohibit
receiving and processing events from other Video Servers of the system. This setting applies to all
events. Forbiddance to process an event reduces network loading associated with events transmission.
If Video Server is included in the group:
1. Allow connection — the Process events checkbox is selected by default and can't be deselected.
Such servers will always receive and process all events from other Video Servers of the system.
2. Don't allow connection — the Process events checkbox is selected by default and can be
deselected. Thus, receiving and processing events from other Video Servers of the system can be
prohibited for the Video Servers of this group.
Warning! When connecting to the servers from the Don't allow connection group logon can be performed
only by superuser (see SecurOS Users). Other users can logon only when client application is connected to
this server locally. Thus, if the Process events checkbox is not selected for such servers, then object's states on
these servers will be irrelevant, because events from other servers of the system are not received and
processed.
The following operations are available when working with the list:
1. Creating group — to create a new server group click on the (Create group) button. Group will
be created with the N: Allow connection name, where N — serial number of the group with this
default name (if server list contains such groups).
2. Renaming group — to rename group, click it and specify new name in the text field.
3. Deleting group — to delete group, select it in the list and click on the (Delete group) button.
www.issivs.com
SecurOS 125 Administration Guide
Core Subsystem
Warning! Group that contains servers can not be deleted. To delete such group, move all servers to other
group first. System groups Allow connection and Don't allow connection can not be also
deleted.
4. Moving server to other group — to move one or several servers select them, click on the Move to group
button and select required group from the list. Also, the server can be moved to the required group
using drag-and-drop.
Figure 87. Security Zone object settings window. Connection Restrictions Tab
Any computer mode is set by default and means that any computer where SecurOS software is
installed can connect to any system server taking into account Servers to Connect tab settings. It is
enough to operator to know SecurOS user's login and password.
As an additional security option, you can restrict the list of computers from which the servers will
accept the connection. To set such restriction do the following:
Set the Computers that are allowed to connect as Operator Workstations parameter to
Computers with following addresses.
Add IP addresses of computers to the list below, using button. If there are many such
computers and they have serial IP addresses, it is convenient to specify the range of IP addresses.
For example, 172.16.1.110-172.16.1.150.
Note. When working in cluster configuration (see Failover cluster) and operator interface is planned to be
used on cluster Hosts, all Hosts IP addresses, virtual IP addresses of the Nodes and virtual IP address of the
Conf iguration Server must be added to the list.
www.issivs.com
SecurOS 126 Administration Guide
Core Subsystem
6.3.3 Database
Within SecurOS this object represents the databases of the SecurOS security system, databases of the
SecurOS' Modules and external databases.
Parameter Description
Database
www.issivs.com
SecurOS 127 Administration Guide
Core Subsystem
Parameter Description
Database name, user name and password are as defined during the
Database name, Login, database installation.
Password Warning! Use Latin characters only when specifying a Password. Latin-
1 code page (Western European character set) is acceptable.
Options
Retention period for records (in days). If set to 0, the records are not
deleted.
Erase records older than
Note. When working with some of the SecurOS intelligent Modules
parameter is ignored.
www.issivs.com
SecurOS 128 Administration Guide
Core Subsystem
Parameter Description
Database
Note. Other parameters of the created Database are similar to described above.
6.3.4 Department
This object is used to organize system users into groups. Primarily it is used in conjunction with an
access control subsystem to define users to manage their user right policies within the SecurOS network
itself (see User Registration and Configuring User Rights).
Note. Department object is automatically created in the objects tree only if users with the Power user or Simple
user rights were added during system configuration with the help of System Configuration Wizard.
This object represents a single person (either a person registered in an access control system or a user
within the SecurOS network).
Warning! Name of the User account object, specified in the Parameters of created object window, will further
used as username when logging on the system. At the same time, the authorization is possible only on that
Computers, which belong to the same Security Zone, as a created User account.
www.issivs.com
SecurOS 129 Administration Guide
Core Subsystem
Parameter Description
Insert person's phone number. Not used by the system itself. You
Phone can use this field when writing SecurOS scripts to send voice or
SMS notifications.
Insert person's e-mail address. Not used by the system itself. You
E-mail can use this field when writing SecurOS scripts to send email
notifications.
Insert any text in this field, for example, person's passport number,
Additional Information position or any other description you need. Not used by the system
itself.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
This object is used to configure settings of the network domain to provide authorization in the SecurOS
network. For further information see Configuration of Network Domain User Rights.
www.issivs.com
SecurOS 130 Administration Guide
Core Subsystem
Parameter Description
Common
Select the type of protocol from the drop-down list. Possible values:
Use primary domain Select this checkbox to use the primary domain controller.
controller Warning! If selected, then the two next parameters are disabled.
www.issivs.com
SecurOS 131 Administration Guide
Core Subsystem
Parameter Description
Credentials
User name, Password Specify user name and password for authentication on server.
This object is used for defining user rights within the system (see User Registration and Configuring
User Rights for detailed description).
Note. All users in the User Rights object settings have the same level of access. To assign another set of rights
to another user or user group, create a different User Rights object.
www.issivs.com
SecurOS 132 Administration Guide
Core Subsystem
Parameter Description
Object Tree with icons that depict user rights of each object. To
define a user access to any object, click the icon to the left of the
Rights
object or group (Objects like...) consecutively, until the required icon
is displayed. Icons are described below.
Forbid to hide interface Select this field if user is not allowed to hide user interface objects.
www.issivs.com
SecurOS 133 Administration Guide
Core Subsystem
Parameter Description
This parameters defines user access to the SecurOS Object Tree with
the help of the Configure the system button (see Administration
Center).
If this field is selected, then user has access to the Object Tree to view
Allow to configure system and change system parameters (Administrator mode, see icons
description below).
If this field is not selected, then user has no access to the Object Tree
to view and change system parameters (Operator mode, see icons
description below).
Tick this checkbox to allow operator to hold PTZ control for a long
Allow to hold PTZ control
time (see Holding PTZ Control for a Long Time).
Allow to edit FaceX Select the checkbox to allow user to edit SecurOS FaceX watchlists
watchlists (see SecurOS FaceX User Guide).
Select the checkbox to allow user to audit the system (for the details
Allow to audit system see SecurOS AuditTrail User Guide).
www.issivs.com
SecurOS 134 Administration Guide
Core Subsystem
Parameter Description
Note. The same user (User Account object) cannot be added to 2 or more
different User Rights objects.
Warning! When User account is logging on into the SecurOS, then the
password specified in the settings of the appropriate object (see User
account) will be used.
Access testing
Enter the name of the OS user or typical SecurOS user for which it is
User name
necessary to check possibility of authorization in SecurOS.
Click this button to start testing. For the detailed description of the
Test (button) testing procedure see User Registration and Configuring User
Rights.
Access level of the user/user group to the object/object group (the Rights block) is marked with
appropriate icon. Icon can be changed by clicking on it.
— No access. This access level defines the following rules of the object behavior:
In the Administrator mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are not allowed (all buttons on the Administration toolbar
are disabled);
in the Operator mode — object/group is not displayed in the SecurOS operator's interface.
Warning!
1. If this access level is set for the Security Zone, then this object and all children objects are not
displayed in the SecurOS Object Tree.
2. If this access level to the Computer object is set for the user/user group, then no one of these users
can log on into system on this computer.
— View. This access level defines the following rules of the object/group behavior:
In the Administrator mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are not allowed (all buttons on the Administration toolbar
are disabled);
www.issivs.com
SecurOS 135 Administration Guide
Core Subsystem
in the Operator mode — object/group is displayed in the SecurOS operator's interface. Object
management is disabled. For example, Camera is displayed in the Media Client interface, but user
can not start record.
— Control. This access level defines the following rules of the object/group behavior:
in the Administrator mode — similar to the View access level.
in the Operator mode — object/group is displayed in the SecurOS operator's interface. Object
management is enabled. For example, Camera is displayed in the Media Client interface, user can
start record, control PTZ, etc.
— Configure. This access level defines the following rules of the object/group behavior:
In the Administration mode — object/group is displayed in the SecurOS Object Tree. Object
configuring is allowed (the Setup button on the Administration toolbar is enabled). All other
operations with object/group not allowed (all other buttons on the Administration toolbar are
disabled);
in the Operator mode — similar to the Control access level.
— Full access. This access level defines the following rules of the object behavior:
In the Administration mode — object/group is displayed in the SecurOS Object Tree. Configuring
and other operations with object/group are allowed (all buttons on the Administration toolbar are
enabled);
in the Operator mode — similar to the Control access level.
— Inherited rights — rights for this object/group are inherited from parent object. This
access level is used by default when creating a new object.
6.3.8 Computer
This object represents an individual computer within SecurOS network (Video Server or Operator
workstation).
Video Servers and Operator Workstations within SecurOS network are registered and represented as
Computer objects in the system Object Tree. Server part of the SecurOS is started on Video Servers, and
client part is started on Operator Workstations. Client part can also be started on Video Server.
SecurOS' Video Servers can send and receive events from other Video Servers. To reduce the network load
associated with the events transmission one can exclude selected network servers from the event
distribution list (see Servers to Connect Tab).
To denote role and state of the Computer within SecurOS network the following icons of the Object Tree
are used (see Figure 93):
— Conf iguration Server (computer role is Video Server);
— any Operator Workstation or Operator Workstation Prof ile (connection to SecurOS is not
indicated).
www.issivs.com
SecurOS 136 Administration Guide
Core Subsystem
Figure 93. Computers and their states in the SecurOS Object Tree
www.issivs.com
SecurOS 137 Administration Guide
Core Subsystem
Parameter Description
Use as Operator Tick this checkbox to use object as Operator Workstation Prof ile
Workstation Profile (see Operator Workstation Profiles).
Archive Block (is enabled only for Computer object, role of which is Video Server, see the Archive
section).
Select this option to choose the default Desktop object from the drop-
down list that will be shown on SecurOS startup on this computer.
Activate Desktop If the Auto value is set then the first desktop will be displayed (with
minimal ID). If this option is not activated, no desktop will be
displayed at startup.
Note. For detailed information about setting order and rules of the
procedure see the Auto login section.
Local database
Warning! If Computer's role is Operator Workstation the following parameters will be unavailable.
www.issivs.com
SecurOS 138 Administration Guide
Core Subsystem
Parameter Description
Select this checkbox to disable saving the local copy of the event log
to the database. Since the event log is synchronized between
Disable saving data into
computers and each computer saves its copy in the local database
local Protocol DB
by default, you can turn on the event log saving on several
machines without risk of loosing events.
Name of the filter, which will be used when saving events into the
database. The list of values consists of names of all the Event filter
objects, that are child objects to the current Security Zone. Optional
Use Event filter parameter. If not set, all system events will be saved into the
database. Otherwise, only the events allowed by the given filter will
be saved.
Warning! Using filters can reduce system performance.
Parameters for storing Bookmarks, Alarms and Metadata (see Forensic Search) in the video
subsystem's database are specified in this block.
ACS and Fire Alarm System Select from list the Database, created earlier for working with ACS
Database Module (for details refer to the SecurOS ACS User Guide).
www.issivs.com
SecurOS 139 Administration Guide
Core Subsystem
6.3.8.1 Archive
This block is designed to create a directories (information carriers) that allow to work with the SecurOS'
archives. For each directory a list of available operations is specified.
Note. Intelligent Security Systems recommends to use 10%. This value is also recommended by Microsoft
Corporation for NTFS partitions. One can change this value in the Computer object settings.
This mode is recommended to use in case of long-time fragments recording (for example, for
continuous archive recording). If archive is recorded in short-time fragments, then using this mode
www.issivs.com
SecurOS 140 Administration Guide
Core Subsystem
will shorten archive storage time and require more disk space.
Save space — allow to use disk space more efficiently, but may decrease disk write speed. This
mode is recommended to use in case of short-time fragments recording (for example, by commands
of intelligent Modules). For the details refer to Video Recording Settings, description of
MaxFrames parameter.
Add directory
The directory to work with archive can be represented by one of the following objects:
local hard drive;
removable storage;
network drive;
network folder.
www.issivs.com
SecurOS 141 Administration Guide
Core Subsystem
Notes:
1. How to add local hard drives on the cluster's Hosts is described in the Storing Video Archive on the
Host's Local Drives.
2. To mount a network drive in Linux OS use the sudo mount -v -t cifs command with the
actimeo=0 parameter and the nobr option.
Warning! It is not recommended to use the same Directory to record Primary and Long-term archives
(see Archiver).
If necessary, specify user name and password to get access to this network folder.
Note. If local computer is being configured the Drive list consists only of available drive letters. If a remote
computer is being configured the list consists of all letters from A to Z. In this case select required letter.
In the Video and Audio select from the list the operations, that can be performed with the archive
on this directory:
Disable — the Video Server is not allowed to read and write an archive;
Read Only — the Video Server is allowed only to read an archive;
Read and Write — the Video Server is allowed both to read and write an archive.
Notes:
1. Operations with audio archives are disabled for network drives.
2. In the Video block the rights to perform operations with the video recorded with the accompanying
sound are specified and in the Audio block rights only for audio files.
In Archive recording check and, if necessary, modify the Minimum free drive space value.
Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to write archive
in Optimal performance mode as efficiently, as possible (see Select archive recording mode).
3. Click the Add button. Selected carrier will be added to the list of directories. Operations, enabled for
this directory, will be marked with the symbol.
Warning! Scheduled defragmentation (for example, in Windows 10, Control Panel Administrative Tools,
Defragment and Optimize Drives subsection) must be turned off for all hard drives selected to work with
archive.
Edit directory
To change a list of operation applicable to a directory do the following:
1. Select required directory and click the Edit button.
2. In the Edit existing directory (see Figure 97) select new values for the Video and Audio.
www.issivs.com
SecurOS 142 Administration Guide
Core Subsystem
Remove directory
To remove a directory from the list select connected one in the list, then click the Remove button. To
confirm removing click the Yes button in the informational panel (see Figure 98).
www.issivs.com
SecurOS 143 Administration Guide
Core Subsystem
Allow auto logon for User(s) parameters can take the following values:
Name of any user, registered in the current Security Zone object within the SecurOS network
(Object tree Users & Permissions group Department User Account), excluding the
superuser (see SecurOS Users).
Name of any Active Directory Group. For the given value, auto login may be performed for any
member of the selected Group.
Name of any Active Directory User. For the given value, auto login may be performed for the
specified user only.
Warning! Active Directory domain of the Windows network can be used for the authentication only if there is
an Active Directory Storage object registered in SecurOS and it is selected as a provider for the User rights object
(see Active Directory / LDAP).
"Not set" (default value). For the given value, auto login may be performed for any Active Directory
User or member of any Active Directory Group, granted with the access rights defined in the User
rights object.
This object is designed to set the rules used to filter events that must be either displayed in the Event
Viewer window or saved into the database.
Parameter Description
Rules list
Type of the system object (that is the event source). Select the All option
Type
to address all possible objects.
www.issivs.com
SecurOS 144 Administration Guide
Core Subsystem
Parameter Description
ID of the system object (that is the event source). Leave the list empty to
Id
address all the objects of selected type.
Inf ormation f ield: name of the selected source object (the Id and Name
parameters correspond to each other — if one is selected then the other is
Name
filled automatically). Leave the list empty to address all the objects of
selected type.
To create a filter rule for one of the predefined event groups, select
that group (in the top of the list).
Select the All option to address all possible objects of selected type.
Buttons
Click to display Events to test block that allows to check the rule. Rule
Test filter
checking procedure is described below.
Button is used to sort rules manually. Click to move the rule one position
Up
up.
Button is used to sort rules manually. Click to move the rule one position
Down
down.
www.issivs.com
SecurOS 145 Administration Guide
Core Subsystem
To check the rule (i.e. to make sure what kind of action for the event this rule results in) do the
following:
1. In the object settings block (see Figure 100) click the Test filter button.
2. System will display Events to test section (see fig. 101).
3. In the Events to test section click the Add event button. Set the event needed to be tested.
Note. Rule parameters of the Events to test section are the same as described above in Rule list.
4. Click the Run test button. System will execute test and display result in the Rule field:
No filter rules — list of rules contains no rules for the defined event.
www.issivs.com
SecurOS 146 Administration Guide
Core Subsystem
Event is allowed by rule N — list of rules contains rule N that allows defined event.
Event is forbidden by rule N — list of rules contains rule N that forbids defined event.
Note. "N" stands for the sequence number of the rule in the rule list.
5. To clear Events from test list, click the Remove event or the Remove all button. To hide the Events to
test section click the Hide test filter button.
6. To save/discard changes and leave the administration mode click the OK/Cancel button.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
This object is designed both to send events generated by the system's cameras and to transmit cameras'
states to the specified computers as SNMP traps. Traps for the following events are transmitted
automatically as soon as they arise in the system:
Camera: changed state;
Camera: focused;
Camera: defocused;
Camera: unblinding;
Camera: blinding;
Camera: attached;
Camera: detached.
When changing cameras' states the current states are transmitted. Received traps are processed with the
help of a SNMP Manager.
To get Cameras table and their states load into SNMP Manager the SecurOS MIB-file ISS-SECUROS-
MIB, that is located in <SecurOS_root_directory>\MIB.
This object can only be used if the Management and Monitoring Tools component is installed on the
computer (see Setting up Windows Managing and Monitoring Tools section).
www.issivs.com
SecurOS 147 Administration Guide
Core Subsystem
Note. Only one SNMP agent object is allowed in the object tree of the local computer. If the object is already
created then the Create SNMP agent command is unavailable.
www.issivs.com
SecurOS 148 Administration Guide
Core Subsystem
Note. In general, one can use arbitrary community name, including public default value.
Rights — assign computers of the added community any rights, including ability to read MIB file
from the local computer, for example, READ ONLY.
If the Accept SNMP packets from these hosts is selected, specify IP addresses of the computers within
the SecurOS network, where SNMP manager is installed.
6. Apply new settings.
7. Create the SNMP agent object in the SecurOS Object Tree.
After the steps described above are performed, SecurOS will automatically send traps to the specified
IP addresses in real-time.
The object is used to automatically start an external application from SecurOS. Application is started
when SecurOS Video Server starts, and also after an object is created or enabled on the Video Server.
www.issivs.com
SecurOS 149 Administration Guide
Core Subsystem
Parameter Description
External application launched from the SecurOS, has the following properties:
External application that involves GUI, is started without loading this GUI.
External application itself and all its children processes are terminated when deleting/disabling an
External application object from the Object Tree.
When closing an external application (due to failure or manually by user), it restarts automatically.
Object allows automatically copy content of the SecurOS Auto database into the common database.
Such common database can be used for searching and viewing all the events of the SecurOS Auto (see
SecurOS Auto User Guide).
Copying of the selected databases will start after object creating and configuring. Entries will be copied,
starting with the oldest ones. After all entries are copied, replication is started in real time mode. All
subsequent changes of the source database will also be taken into account in the replicated database.
www.issivs.com
SecurOS 150 Administration Guide
Core Subsystem
Parameter Description
Replicate to database Select target database where source databases will be copied to.
www.issivs.com
SecurOS 151 Administration Guide
Interface Subsystem
7 Interface Subsystem
The Interface subsystem, contains objects responsible for visual representation of the system objects and
is actually used by operators working with the system.
7.1.1 Desktop
This is a base user interface object that acts as a container to other user interface objects. It is used for
placement of one or more user interface components.
Warning! All visual components of the user interface are displayed only by the means of SecurOS Desktops.
Example. There are two rooms in a secured area. There is a PTZ dome camera and a microphone in the
first room and two cameras in the second room. The system administrator can configure two Desktop
objects. On the first Desktop there could be a Media Client to control PTZ, view video and listen the sound. On
the second Desktop there could be a second Media Client to watch cameras from the second room, and a Map
Window displaying the map of the whole territory to provide visual access to all the security devices and to
control their states. If several displays connected to the operator's computer one can create create the one
Desktop instead of several ones and place all required interface object on these available displays.
www.issivs.com
SecurOS 152 Administration Guide
Interface Subsystem
Parameter Description
Located on the left part of the window. Object tree displays all
interface objects children to the Desktop that is being configured. If
operator's computer has several displays, these objects will be
grouped relative to the Display on which they are located. States of
the objects in the object tree are displayed similar to the object states
Object Tree in the SecurOS Object Tree (see Disabling/ Enabling Objects). Below
the tree the New Display field is located, that is used to create a
new display and place an object window on it.
Located below the Visual settings area. In this block the name of
Information about
the selected window, relative coordinates of its position and sizes
configured window block
are displayed.
www.issivs.com
SecurOS 153 Administration Guide
Interface Subsystem
Note. These parameters can also may be specified in the each SecurOS object settings.
Details of operations with the multi-window objects (for example, SecurOS Auto operator GUI) are
described in the Features of working with multi-window objects.
www.issivs.com
SecurOS 154 Administration Guide
Interface Subsystem
4. Specify required parameters and click OK. An object will be created in the SecurOS Object Tree and
added to the selected display.
Note. This operation can also may be performed via Display object's context menu in the Desktop object tree.
Selected window can also be moved using the Move button located in the Desktop visual settings
area:
www.issivs.com
SecurOS 155 Administration Guide
Interface Subsystem
1. In the Desktop object tree select an object which window must be placed on a new display. In
the Visual settings area window of this object will be highlighted with a dotted line.
2. In the Visual settings area click the Move button.
3. In the drop-down list select the New Display.
Warning! Number of displays connected to the operator's computer is not detected automatically and must be
controlled by the administrator.
Note. Selected window can also be moved with the help of the methods described above, see Creating new
display.
Deleting display
To delete display from the Desktop object tree it is enough to move all object windows located on it to
another display. Display will be automatically deleted when selecting another display in the Desktop
object tree or after applying object settings if there is only one display in the tree.
www.issivs.com
SecurOS 156 Administration Guide
Interface Subsystem
Renaming object — allows rename an object (for the details see Working with Objects);
Deleting object — allows delete an object from the SecurOS Object Tree (for the details see Working
with Objecs).
Note. To move and delete objects one can also use the appropriate buttons located in the Visual settings area.
www.issivs.com
SecurOS 157 Administration Guide
Interface Subsystem
When working with the SecurOS POS Module windows (see SecurOS POS User Guide) the
Information panel window will always be displayed on the same display where the Events log
window is placed, independently of its position in the Desktop object settings window.
7.1.2 Map
This object represents a multi-layered graphical map of the territory under surveillance.
www.issivs.com
SecurOS 158 Administration Guide
Interface Subsystem
Note. Current dimensions of the Levels, Devices and Map image blocks can be changed using the mouse.
Parameter Description
Levels
Text color Color of the object caption on the image of the map level.
Size of objects icons on the Map and in the Map Window. Possible
values:
S — small;
Icons L — large.
Note. When the current scale is from 25% to 200% then the icons of the
specified size are displayed. When the scale of the map level is less than
25%, the size of the icons will be automatically changed to S and will be
changed to L when the scale is more than 200%.
www.issivs.com
SecurOS 159 Administration Guide
Interface Subsystem
Devices
Search Is used to search for devices (see Working with Map Objects).
This box displays an SecurOS Object tree, that contains all system
Device tree
devices, that can be placed on the map.
Map image
Current scale of the map level. Default value is 100%. To change the
scale, select the required value from the list or move the mouse
cursor over the image and use the mouse scroll wheel.
Scale
Warning! The field can be moved anywhere in the Map display area. To
move the field, place the mouse pointer over the field name, press the left
mouse button and, without releasing it, move the field to the required
position.
Buttons
Click the button to create a new map level (see Working with Map
Create new level
Layers).
To make monitoring a Security Zone more convenient it is recommended to use a Map — an image of
the protected territory and security devices located on it. A Map can include a number of levels, that
correspond for example, to parts of the protected territory, levels of the controlled building or separate
rooms on each level. Each Level of the Map is represented by a map image of the protected area with
icons of the security equipment, such as cameras, alarm sensors etc., placed on it in accordance with the
area's physical locations.
To enable use of Maps in SecurOS one should perform the following operations:
1. Create a Map object;
2. Create a Map Window object on the Operator / Administrator Workstation;
3. Assign operator access rights to this object.
Note. The same Map object can be loaded into the Map Window on any number of Operator Workstations.
The operator can use maps to monitor the entire territory, and also use the icons allocated on a map for
fast control of the corresponding object. If an intrusion alarm has been detected, an operator can
immediately see the physical location of the target area, switch to the video cameras that are located
close to this area by double-clicking on icons on map, switch the lights on within that area, lock certain
doors, etc...
www.issivs.com
SecurOS 160 Administration Guide
Interface Subsystem
Use of map layers is convenient for large territory separation into several independent parts. Map
layers are images in BMP, JPEG, JPG or PNG format. To draw your map images from scratch, one can
use any graphical drawing software that allows you to save the images in the formats listed above. You
can also export the images directly from CAD software where you or the owner of the building
develops source documentation on the building or territory, or you can scan the previously printed
plans of your territory.
The resulting image or images can have any colors and style, but you should consider the following:
1. All plans of your territory should be done in the same graphical style for better visual perception.
2. Keep the image dimensions in pixels comparable to dimensions of the target maps on the screen of
the operator workstation to avoid redundant scrolling.
3. Colors should not distract operator from objects placed on map. Do not use gaudy colors; avoid
using red and orange colors. The more neutral the background is, the better.
4. Provide descriptive captions for all territories. Text should be clearly visible and readable.
5. Give images meaningful names (i.e. map_floor1.png, map_floor2.png, map_room123.png
etc.).
Warning! It is not recommended to use map image files greater than 4 MB.
www.issivs.com
SecurOS 161 Administration Guide
Interface Subsystem
L — large.
4. Click the button on the right of the Text color field and select a color of the object caption for the
current map level in the standard window.
5. To select a level image click the button on the right of the Base image field, then use the file
manager to select an image, that will be used as the main image for the new level (BMP, PNG, JPG and
JPEG file formats are supported).
6. Click the OK button.
Note. The created level is placed into the Name list (Level Tree) in alphabetical order.
To switch between levels one can use a link, represented with a special icon (see Figure 113).
Once created, a link icon will appear on the map (see figure 113). The link icon can be moved across the
map by clicking the left mouse button on the icon, dragging the mouse pointer to the new location, and
then releasing the left mouse button.
Now test this link by double-clicking on it: map will switch to the target layer. For easier navigation, we
recommend to create another link on the target layer that points back to the source one. Thus, it will be
possible to switch between layers in both directions smoothly.
A link icon must be placed on a map level image in accordance to the structure of the protected area.
For example, if each map level represents a separate floor of the protected building, a link icon is
reasonable to be placed on the stairs to the next floors, etc.
Additional operations on a Map's level are performed with the help of a context menu, opened by right-
clicking on the level name in the Name list (Level Tree). The context menu contains the following
options (see Figure 114):
www.issivs.com
SecurOS 162 Administration Guide
Interface Subsystem
Create child level — create a child level to the current level in the Name list (Level Tree);
Rename — rename current level;
Change text color — change object caption color;
Change base image — change level image;
Delete — delete current level.
A child level can also be created by drag-and-drop. Click a level, that is supposed to be a child, then
drag it on the level, that is supposed to be a parent (see Figure 115).
To find an object in the Device Tree, enter any character (or set of characters), that are part of the object
name or object ID into the Search text box. All devices, whose names comply with the specified set of
characters, will be displayed in the Device Tree. Later, one can place the found object on the Map.
www.issivs.com
SecurOS 163 Administration Guide
Interface Subsystem
2. In the Devices block select an object that must be placed on the selected level.
3. Click selected object and, holding mouse button pressed, move an object from the list to the required
position on the level base image.
To rotate Camera icon to align it with actual camera's FOV do the following:
1. Place mouse pointer over the icon of the Camera to be rotated. Double-sided arrow will be displayed
on the right of the icon, see Figure 116.
2. Place mouse pointer over this arrow and click the mouse button. Holding mouse button pressed
rotate camera icon about its axis to align icon in accordance with actual camera FOV.
2. Holding mouse button pressed move caption string in any place around the icon.
www.issivs.com
SecurOS 164 Administration Guide
Interface Subsystem
2. Object caption will be displayed on the Map in the short form (see Figure 119).
To display full object caption click the icon on the right of the caption (see Figure 119).
Parameter Description
Specify the object window's top left corner coordinates (X, Y) as well
X, Y, W, H as its width and height (W, H), as percentages of the display's
horizontal and vertical size.
Display Choose the ID of the physical display this object belongs to.
www.issivs.com
SecurOS 165 Administration Guide
Interface Subsystem
Parameter Description
Select one of the previously created maps (see Map), that should be
Map
displayed in this map window.
Select option to display the Levels tab in the Map Window. The tab
contains the levels list of the Map, that allows switching between
levels.
Note. If not selected, then switching between levels in the Map Window
is possible only with the help of level link icons (see Working with Map
Layers).
Select option to display the Alarms tab in the Map Window. The tab
contains the alarmed levels list of the Map, that allows quick
switching between alarmed levels.
Show alarmed levels Note. A level is considered alarmed if at least one of the objects placed
on this level is alarmed.
Choose Media Client that will be used to watch video when jumping
from Map Window. To jump to the Media Client to watch video click
the icon of one of the objects located in the Map Window:
Object represents a visual log of the events that occur within the entire system.
www.issivs.com
SecurOS 166 Administration Guide
Interface Subsystem
Parameter Description
Specify the object window's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.
Display Choose the ID of the physical display this Event Viewer belongs to.
The Event Filter is used to control what events are displayed in the
Event Viewer interface window. Optional parameter. If Don't use
Use Event Filter value is selected then all system events will be displayed. If filter is
selected, only events allowed by selected filter (see Event Filter
section) will be displayed.
Choose from the list an Emergency service object that will be used to
Send Ticket to Emergency
create and send Emergency ticket (see Emergency service and
Service
Interaction with External Emergency Service).
Operator reaction on alarm Check this option to enable operator reaction on alarm events.
event
Time of acknowledgment of Define the time for alarm event acknowledgement by the operator,
alarm event by the operator in seconds.
www.issivs.com
SecurOS 167 Administration Guide
Interface Subsystem
Object is used to automatically launch an external application and position its window on the screen.
Parameter Description
Display Choose the ID of the physical display this object belongs to.
Specify the object window's top left corner coordinates (X, Y), as
well as its width and height (W, H), as percentages of the display's
horizontal and vertical size. Window size may not be set for all
applications when they are called by an external program.
Specify path to executable file. You can omit the exact path to the
Application file if it is located in the directory specified in the Path environment
variable.
Application window For the multi-window applications specify the name of the window
(optional) that the operator needs to work with.
www.issivs.com
SecurOS 168 Administration Guide
Interface Subsystem
Object defines position and type of HTML forms permanently displayed on the screen of a parent
Desktop object.
This object is intended for integration of any HTML form based user interface into SecurOS. Interface is
being loaded when corresponding Desktop is activated.
Note. SecurOS includes several default HTML f orms that can serve as a base for custom forms. Files have
.html extension and can be found in <SecurOS_Folder>\Dialogscript\ directory. Content of this
folder must be the same for all Operator workstation where HTML f orms are going to be run.
More details on operations with HTML form are given in SecurOS Programming Guide.
Parameter Description
Window position
Specify the object window's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.
Display Choose the ID of the physical display this object belongs to.
Scripting
www.issivs.com
SecurOS 169 Administration Guide
Interface Subsystem
Parameter Description
Select this option to use custom HTML form created by user. Enter
the following into the field:
Notes:
1. To specify the path with help of file manager click the
button.
2. It is unable to specify path with file manager when configuring
remotely.
The object is intended for creation the window on the SecurOS Desktop to display external HTML
application that include SecurOS control interface. This application window is loaded when the
corresponding Desktop is activated.
Using the object, one can integrate any external applications that support HTML5 into SecurOS.
Object allows:
To specify size and arrangement of the external HTML application window on the SecurOS Desktop.
To select Media Client and Map Window with which external HTML application can work;
To transmit additional parameters from SecurOS to the external HTML application.
www.issivs.com
SecurOS 170 Administration Guide
Interface Subsystem
Parameter Description
Window position
Specify the object window's top left corner coordinates (X, Y), as
X, Y, W, H well as its width and height (W, H), as percentages of the display's
horizontal and vertical size.
In the drop-down list select the Media Client that will be used to
work with the HTML application. Working with Media Client means
sending it Events or Commands in the SecurOS format.
Work with Media Client
Note. Media Client control Events and Commands are described in the
SecurOS Programming Guide.
www.issivs.com
SecurOS 171 Administration Guide
Interface Subsystem
Parameter Description
In the drop-down list select the Map Window that will be used to
work with the HTML application. Working with Map Window
means sending it Events or Commands in the SecurOS format.
Work with Map Window
Note. Map Window control Events and Commands are described in the
SecurOS Programming Guide.
www.issivs.com
SecurOS 172 Administration Guide
Video Subsystem
8 Video Subsystem
The video subsystem is used to operate and configure the video devices within the SecurOS network. In
addition, it is responsible for transmitting video streams between servers and workstations as well as
working with live and archived video from within workstations.
Different manufacturers use independent trademarks to designate hardware decoding technology: Intel
Quick Sync Video, NVIDIA PureVideo HD, ATI Avivo. Currently, the most commonly used is the Intel
Quick Sync Video technology, which is several times superior to all competitive solutions in regards to
decoding speed. SecurOS supports this technology when using the Intel HD Graphics 2500, HD4xxx,
HD5xxx (based on the GT3 cores) graphic adapters and above.
All listed graphics adapters use Intel Quick Sync Video 2.0 technology.
All listed video processors are CPU integrated and support hardware decoding independently of central
processor model (i3, i5, i7):
For H.264 – on Intel Core 3xxx and above.
For H.265 – on Intel Core 5xxx and above.
It should be noted, that not all CPU models have integrated graphics adapters (for example, some
models of Intel Core i7 and Xeon).
Warning! Currently SecurOS does not support Intel Quick Sync Video 1.0 technology for the mobile and
desktop Intel HD Graphics 2000 graphics adapters. Thus, hardware decoding is not performed for Sandy
Bridge architecture based CPUs.
The key metric of the MFX block efficiency is its bandwidth (in Gbit/sec of the compressed video),
that is limited not only by the number of video streams decoded at the same time, but the total number
and size of these streams. For example, Intel Quick Sync 2.0 decoder can process about 40 —50 streams
of 2 Mbit/sec each.
RAM efficiency can be a limiting factor. In other words, the RAM should have time to process a
specified number of the decoded streams The data level directly depends on the used resolution. So to
get maximal efficiency, dual-channel RAM should be used with a recommended frequency of
1600 Mhz and above.
If only the Intel HD Graphics integrated graphics adapter is installed and used, then hardware
decoding mode is installed and used by default.
www.issivs.com
SecurOS 173 Administration Guide
Video Subsystem
If a discrete graphics adapter is installed and used, then integrated one is automatically disabled by
Motherboard's driver. To turn on the hardware decoding mode for such a computer configuration, do
the following:
1. Enable integrated graphics adapter in the BIOS (location of the command in the BIOS menu depends
on BIOS manufacturer and version). After this operation is complete, integrated graphics adapter is
detected by the Windows Device Manager.
2. If monitor is plugged in the discrete graphics adapter connector, expand Windows' desktop to the
dummy monitor of the Intel HD Graphics adapter:
Open screen resolution settings (Control Panel Appearance and
Personalization Display Screen Resolution):
Click the Detect button (see figure 125).
Click detected dummy display to select it. From the Multiple displays drop-down list choose Try
to connect anyway to: VGA. Click the Apply button (see figure 126).
www.issivs.com
SecurOS 174 Administration Guide
Video Subsystem
Click dummy display to select it. From the Multiple displays drop-down list choose Extend
desktop to this display (see figure 127). Click the Apply button.
www.issivs.com
SecurOS 175 Administration Guide
Video Subsystem
Note. If single monitor, plugged in discrete adapter connector is used, choose Extend these displays.
Note. All hardware decompression on / off operations are performed on the Computers with the Media Client
(Video Server or Operator Workstation).
www.issivs.com
SecurOS 176 Administration Guide
Video Subsystem
Note. By default, the parameter is set to ffmpeg (decompression is on with the ffmpeg library).
3. Start the securosd daemon using the sudo service securosd start command.
8.2 Multi-streaming
The most modern video cameras support multi-streaming - a feature, that allows a camera to generate
several independent video streams. Streams can have different parameter sets (i. e. resolution, fps,
compression, etc.) and can serve different purposes. These sets of parameters may be predefined and
identified by the stream name, or can be specified in the camera's Prof ile, which is created by an
administrator via the Camera's web interface.
A larger size stream (having high resolution, fps, etc.) is used when it is necessary to output the
Camera's video in a large cell of a Media Client, use digital zoom, or record video archive. Smaller size
streams (having low bitrate) are used to transmit video over channels with low bandwidth (for
example, when transmitting video via 3g to mobile devices), to record "light" archive (when it is
necessary to store archive in low capacity storage for a long time), to output video to the Media Client in
a high cell layout, or to low a resolution display.
Using cameras that support multi-streaming allows for a balanced system configuration and to solve
the following tasks:
1. To display video of different quality from the same camera on different Media Clients. For example, in
one Media Client, video is displayed in a small cell. In this case it is not necessary to increase network
load using a large size stream. At the same time one can watch the same video in the better quality
(for example, with more resolution or fps) on a different Media Client, where network loading is not
www.issivs.com
SecurOS 177 Administration Guide
Video Subsystem
The SecurOS multi-streaming feature allows the use of three different streams generated by the Camera
simultaneously. Each of them can be used as a stream for recording. The listed above tasks are solved
by assigning stream types in the Camera object settings.
The SecurOS system provides a multi-zone motion detector to split the camera surveillance area into
several independent areas (zones), which may have different motion detection parameters.
A Zone object corresponds to each motion detection zone (see Zone section). Basically, all zones are
divided into two types:
www.issivs.com
SecurOS 178 Administration Guide
Video Subsystem
Example. For instance, the user needs to control an area with a gate and several windows seen above the gate.
The task is to make alarm activation each time somebody appears at a window whereas to avoid generating
alarms each time the gate is used. In this particular case, it is recommended to set two different Zone objects:
the first for the gate and the second for the windows. The window zone should be configured as Alarming (to
generate an alarm upon any motion detection), while the gate zone should be configured as Informational (to
generate a motion detection event, but not to generate an alarm). Moreover, if different windows have
different types of illumination, you can configure multiple Zones with different contrast parameters for
reliable motion detection for each window.
Both alarming and informational zones should be armed by an administrator to detect motion. A zone
can be configured to be always armed, meaning an operator does not have to arm it manually (see Zone
section). All the other zones can be armed manually.
Separate from the Main zone, you can create additional Zones for each secured area within the camera
view.
For Windows OS the functionality to create and work with the Long-term archive is available in the
SecurOS Monitoring & Control Center, SecurOS Enterprise, SecurOS Premium editions.
For Linux OS the functionality to create and work with Long-term archive is not available.
Primary archive is available by default, ability to work with Long-term archive should be enabled with
additional settings (see below).
An Archiver object is used to copy a Primary archive to the Long-term archive. Procedure is started
automatically or with the help of Automation Subsystem objects (see Archiver).
To view both type of archives use a Media Client. A Primary archive is available for viewing by default.
To view Long-term archive one must additionally turn the Access to Long-term archive option on in the
Media Client object settings (see Display options Tab).
Archive of any type can be exported from the SecurOS format to the file of the standard AVI/ASF
format or the file of the special Evidence format. In the last case file can be encrypted and protected
with the password (see Archive Converter). The Media Client is used for export. To provide export it
is necessary to select the Archive Converter or turn on the Archive export profiles option (see Archive
export Tab) in its settings. One can use digital signature when converting files (see Digital Signature).
Note. Alternatively, you can use the Media Export Utility (backup.exe) to convert archive to the file of
standard format.
www.issivs.com
SecurOS 179 Administration Guide
Video Subsystem
See also:
Disk Volume Settings;
Video Recording Settings.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
Edge Storage is a technology that allows IP cameras to record and store video archive in their own
storage. Such storage may be a built-in memory module, a removable media (for example, SD card) or a
network folder. To use these technology within SecurOS the own EdgeStorage Sync technology has
been developed, which provides continuous recording of the operational archive even in cases of
temporary lack of communication between the camera and the Video Server.
The main uses of the EdgeStorage Sync technology in SecurOS are the following:
1. In cases of network failures and problems with equipment not related to the camera itself (for
example, with a memory card). In such cases video fragments absent on the Video Server will be
copied from the camera storage after the system recovery.
2. In cases when the camera is located in moving objects (buses etc.) and continuous connection with it
is absent. In such cases the archive is copied from the camera local storage to the SecurOS primary
archive after the connection between the camera and the Video Server is restored.
If errors occur with the EdgeStorage Sync, they are reported in SecurOS with the help of Health Monitor
module (see Health Monitor self-diagnostic Module).
This section describes the following system requirements for working with the EdgeStorage Sync:
Hardware Requirements;
Time Synchronization;
Requirements to the Camera Local Storage.
Hardware Requirements
SecurOS supports cameras local storages of the following brands:
Axis;
Bosch;
Dahua;
HikVision;
Hanwha (Samsung);
SecurOS Motus;
Other cameras and devices that support ONVIF specification.
For some cameras EdgeStorage Sync feature is available in SecurOS via HTTPS.
www.issivs.com
SecurOS 180 Administration Guide
Video Subsystem
Time Synchronization
To provide correct EdgeStorage Sync working it is necessary to use the NTP server to synchronize time
on the SecurOS Video Server and the camera. The following restrictions are applied to the NTP server:
It is not allowed to manually change the time on the NTP server.
Automatic Daylight Saving Time changes are not supported.
The same Time zone must be specified in the camera's and the computer's settings.
To prepare the system to apply the Edge Storage feature do the following:
configure SecurOS;
configure camera.
Setting up SecurOS
Do the following:
1. On each Video Server where you going to use an EdgeStorage Sync technology for compatible
Cameras create an EdgeStorage Sync object (see EdgeStorage Sync).
2. For cameras, archive of which must be synchronized with the local storage, select the Recover
archive from the local storage of Camera (Edge Storage) checkbox on the Recording tab in the
Camera object settings window (see Figure 128).
Note. Parameters required to configure interaction with the Edge Storage more flexible, are described in
the Recording Tab subsection of the Camera section.
www.issivs.com
SecurOS 181 Administration Guide
Video Subsystem
Figure 128. Recording Tab (for the Axis camera settings example)
Setting Up Camera
Setting up recording to the local storage is performed via camera's web interface.
To set recording to the local camera storage do the following (the following is an example from the
AXIS Q7411 single channel video encoder):
Warning! Cameras of some brands may require additional steps to provide correct work of the SecurOS with
Edge Storage (see Features of configuration of some cameras).
1. Open a web browser and in the address field enter the IP address, assigned to the camera when
connecting to the network. To get access to the web interface enter the administrator login/password
in the authorization window. In the application window open the Setup group (see Figure 129).
www.issivs.com
SecurOS 182 Administration Guide
Video Subsystem
Notes:
1. The list consists of a predefined number of stream profiles. Default profile settings can be changed
by the administrator in the Video & Audio tab.
2. To ensure smooth playback of the synchronized operative archive and provide correct working of
video analytical modules, it is recommended to use the same stream profile to record video both on
the camera and in SecurOS.
Warning! When configuring Hanwha (Samsung) cameras be careful when changing the codec for recording
video to the local storage. Video saved with another codec will not be restored to the SecurOS primary
archive.
www.issivs.com
SecurOS 183 Administration Guide
Video Subsystem
Forensic (retrospective) search in the video archive is based on the use of metadata that accompanied
the video stream. Metadata means data that describes what is happening in the frame (for example,
information about moving objects and their tracks, speed, classification attributes, data on video stream
quality and camera malfunctions, etc.). Metadata is generated by video analytics detectors and recorded
and stored in SecurOS in its original form, i.e. before it has been processed by the algorithms of such
detectors. Any object's attribute stored in the database can be used as a parameter of the forensic search.
In SecurOS, metadata is generated and stored by server video analytics detectors (see Computer
Vision).
Warning!
1. Metadata is being saved only during a video recording.
2. If video recording is not constant (e.g. by alarm), proper forensic search operation requires to set
non-zero Duration of pre-recording value in settings of the Camera (see Recording Tab).
Forensic search is performed via Media Client (see SecurOS Quick User Guide).
This section describes specifics of the archive recording operation and its configuration.
www.issivs.com
SecurOS 184 Administration Guide
Video Subsystem
To avoid situations when there is no free space on a disk in case of permanent video recording in
SecurOS format from the cameras (primary video archive), one should previously allocate mandatory
free disk space.
This value is specified in Computer object settings (see Archive) and, by default, is set to 10% of hard
drive volume.
If the free space threshold is reached then the archiver will try to record to other available disks. If there
is no free disks then ring recording (FIFO) will be used (old files will be deleted automatically).
Warning! Network folders mounted as a network drives can be used to save archives. In this case each
network folder must be used only by one network Video Server.
Archive recording with the limitation of the frames number in the file
When performing constant video recording, video files will be created containing a fixed number of
frames. Once this number of frames is exceeded, the video-subsystem will start writing to a new file. If
recording on motion, each video file might contain a different number of recorded frames. When an
operator plays back the video recordings, the files will be scanned and played back sequentially. To
make the video archive search more efficient, an administrator can change the number of frames that
are recorded into one video file with the MaxFrames parameter. Parameter is available both in
Windows and Linux OS. The setup procedure for each OS is described below:
Setting up for Windows.
Setting up for Linux.
Note. All operations described in the specified sections are performed on the computer, where the Primary
archive is stored.
www.issivs.com
SecurOS 185 Administration Guide
Video Subsystem
3. Start the securosd daemon using the sudo service securosd start command.
Warning!
1. Possible values: [500, 2047]. Default value is 500.
2. Using a large value for the MaxMemMb parameter can lead to over consumption of the Windows
allocated memory for a single process, thus causing the process to crash.
3. Too small value will result in a false occurrence of the Insufficient write speed problem (see Health
Monitor self-diagnosis Module).
Note. In case for some reason the disk subsystem cannot properly handle the recording mechanism (e.g.
read/write speeds) and video frame loss occurs, the following warning message can be found in the logs
\video.log file: "WARN VideoFileRecorder Queue length has exceeded. Some frames were dropped.''.
www.issivs.com
SecurOS 186 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 187 Administration Guide
Video Subsystem
Parameter Description
If enabled, select the model of the Video Capture Device for the given
Model
Type.
www.issivs.com
SecurOS 188 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 189 Administration Guide
Video Subsystem
[:<http_port>][:<rtsp_port>], where:
For example:
IP address
127.0.0.1:8080:554 — the 8080 HTTP-port and the 554
RTSP-port are specified.
[:<rtsp_port>], where:
For example:
If device type is Generic RTSP in this field one can also specify
the following:
www.issivs.com
SecurOS 190 Administration Guide
Video Subsystem
Password Warning! The password is displayed while typing, but on the next opening
of the settings window "*" symbols are displayed in the field (the number
of symbols differs from actual password length).
The link on the right allows user to quickly open the web page of
the network camera settings in Internet Explorer web browser. If IP
address, User or Password parameter is not specified, the link is
disabled.
View
Note. Fields of the IE web browser's authorization window are filled
automatically with the User and Password values, specified in settings
of this Video Capture Device.
8.9.1.1.1 AC Recorder
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
www.issivs.com
SecurOS 191 Administration Guide
Video Subsystem
Video Capture Device with AC Recorder type is designed to receive Stream for recording from active
Camera located on one of the Computers within the security network. Received video stream is displayed
in the child Camera's standard cell in real-time mode an can be recorded into the video archive.
8.9.1.2 Camera
Depending on camera's Type and Model, parameter settings window can include the following tabs:
General Tab.
Stream Tab.
Recording Tab.
Audio Tab.
Detectors Tab.
PTZ Tab.
Advanced Tab.
Common Camera parameters, independent of the device's Type and Model are described in appropriate
sections.
Besides settings, common for all integrated with SecurOS cameras, the last ones can have their own
specific settings. These settings depend on camera's Type and Model and are used to control additional
camera features. Description of such parameters one can find at the end of corresponding section.
Note. In this manual the most important additional parameters are described only. Description of other
additional parameters one can see in screen tips in the Camera object settings window.
www.issivs.com
SecurOS 192 Administration Guide
Video Subsystem
Parameter Description
To switch IP device native telemetry control on select Use value from drop-
down list (see Setting up telemetry). By default the Don't Use option is
selected.
PTZ Device
Note. PTZ control panel becomes active when operator selects this camera on a
Media Client.
If the camera is equipped with the Wiper, select the object that can control it.
Note. For more details see Configuring System to Work with Wiper.
If camera is equipped with built-in wiper select the Built-in value. If this
Wiper value is selected then Pan/ tilt/ zoom parameter will be automatically set to Use,
which can not be changed.
Note. To use this feature operator must have access right level for this camera not
less than Control.
www.issivs.com
SecurOS 193 Administration Guide
Video Subsystem
This parameter defines the video image display format in the Camera cell for all
Media Clients throughout the SecurOS security system. At the same time, for
each Media Client, the video image displaying format can be locally changed for
the selected Camera with the help of this Camera control (see SecurOS Quick
User Guide). Possible values:
Viewing Keep aspect ratio — original format of the video frame will be used
when displaying video. Is the default value;
Specify the size of the video frame buffer when working in live video buffering
mode, in ms. The parameter allows to smooth out intermittents of video when
the transmission rate of live video frames over the network is insufficient.
However, with the buffering is enabled, the live video in the Media Client will
Buffer size be played with a time delay. Value of this delay will be not less than the
specified buffer size. Range of values: [0; 5000].
Warning! After parameter is specified, enable the video buffering mode in the settings
of the required Media Client (see Cameras Tab).
Parameter Description
Notes:
1. This option is available for several models of the Axis cameras. For the
list of the supported devices contact Intelligent Security Systems
Washing Kit Technical Support Team.
2. To use this feature operator must have access right level for this camera
not less than Control.
3. Washing procedure parameters are specified in the camera's own settings
accessible via web interface.
www.issivs.com
SecurOS 194 Administration Guide
Video Subsystem
If camera is equipped with built-in light, select the Built-in value from
the drop-down list to turn light control on. If this value is selected then Pan/
tilt/ zoom parameter will be automatically set to Use, which can not be
changed.
Some cameras allow to set the illumination rate. To set the rate pick
required value from the list:
First, second or all LED groups will be used for illumination depending on
selected value.
Note. To use this feature operator must have access right level for this camera
not less than Control.
Warning!
1. The tab represents typical settings of the camera, which supports multi-streaming.
www.issivs.com
SecurOS 195 Administration Guide
Video Subsystem
2. For the cameras, which do not support multi-streaming, the set of parameters depends on the type
of the parent Video Capture Device or this tab is not displayed.
Parameter Description
Stream 1 (activation of the Stream 1 configuration and use mode). By default it is active.
Note. Settings of the Stream 1, Stream 2 and Stream 3 are the same and depend on Video Capture Device
type and model.
Stream 2 (activation of the Stream 2 configuration and use mode). Tick this checkbox to make it
possible to select this stream in the Stream use block.
Stream 3 (activation of the Stream 3 configuration and use mode). Enabled only if Stream 2 is
selected. Tick this checkbox to make it possible to select this stream in the Stream use block.
Stream use
For video recording Select a stream for recording archive from the drop-down list.
For motion detection Select a stream which will be analyzed by motion detector.
Low resolution Select a low resolution stream from the drop-down list.
High resolution Select a high resolution stream from the drop-down list.
Warning! It is not recommended to set GOP (GOV) parameter greater than 32 frames or 2 seconds for the
connected IP cameras and video servers. IP cameras can be configured through their web interface. For some
types of Video Capture Devices this setting is available in the Stream tab of the Camera object settings window.
1. To assign a High resolution stream it is recommended to choose a stream with the highest
resolution, for example, to display video on the Media Client in large cells (for example, like in 1*1 or
2*2 layouts), or to display it on a Video Wall Monitor;
2. To assign a Low resolution stream it is recommended to choose stream with the lowest resolution,
which complies with requirements to the particular security system. Such stream can be displayed
on Media Client for 5*5 cell layouts and higher;
3. To assign a Base stream it is recommended to choose a stream, that has resolution sufficient to
display video in average size cells (for example, in 3*3, 4*4 layouts on the Media Clients of the
Operator Workstations, or in 4*4 and 5*5 layouts on Video Wall Monitors);
4. When assigning Stream for recording select a stream, which complies with requirements to the
archive video for the given security system. When choosing a stream it should be considered, that the
larger the stream, the larger the archive will be.
www.issivs.com
SecurOS 196 Administration Guide
Video Subsystem
Warning! In current release all Program detectors and Intelligent Modules (SecurOS Auto, SecurOS Transit,
SecurOS FaceX) operate with Stream for recording. Thus, when assigning Stream for recording it is
necessary to consider Module's and Detectors' requirements and recommendations to the video settings of
the Camera, which will be used by these Modules and Detectors.
In case if it is necessary to record high quality video, but communication link, connecting Video Server
and Operator Workstations has low capacity, do not use Stream for recording when assigning any
Stream for display. Under this condition high quality stream will not be transmitted outside the Video
Server in real time mode (only when playing archives) and the communication link load will be
significantly decreased.
Parameter Description
If this option is enabled, Camera stream will match the stream that
Use camera settings corresponds to current camera settings in its web interface. By default it is
selected.
With this field one can match each Camera stream to one of the streams,
configured in camera's web interface. Pick from the list or type in
Profile
manually the profile name, that corresponds to a stream configured in
camera's web interface.
Some camera models has Stream checkbox (see table 26) is complemented
by field named Stream. With this field one can match each Camera stream
to one of the following original streams, configured in camera's web
interface:
MJPEG.
Warning! For cameras of Video Capture Device type Panasonic RTSP Stream
when one selects MJPEG value, Camera stream will be matched with first of JPEG
streams, configured in camera's web interface.
www.issivs.com
SecurOS 197 Administration Guide
Video Subsystem
Parameter Description
This parameter specifies type of the connection with the camera. Possible
values:
Select this chekbox to transfer the live video stream to the system only if
there is a stream consumer in the system. The consumer of the stream
Use stream on exists in the system when viewing live video, recording a video archive,
request during the operation of service analytics detectors (motion, defocus,
blinding, etc.) or video analytic detectors. The parameter is designed to
control the video stream when working in networks with low bandwidth.
Multicast, group of parameters (for the details see the Multicast section)
Enable multicast Select this checkbox to enable multicast translation from given camera.
mode
www.issivs.com
SecurOS 198 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 199 Administration Guide
Video Subsystem
Parameter Description
The original frame rate from the camera is maintained for the
recording period during an alarm (motion detection). Only available
if the Reduce max FPS to parameter is selected.
reduced frame rate of the video stream is used for pre- and
post recording.
www.issivs.com
SecurOS 200 Administration Guide
Video Subsystem
Parameter Description
Parameter Description
Recover archive from the Select this checkbox to recover the Video Server's archive from the
local storage of Camera local Camera's archive when using the Edge Storage (see Camera
(Edge Storage) Local Storage (Edge Storage)).
www.issivs.com
SecurOS 201 Administration Guide
Video Subsystem
Specify the time shift to record an archive. When restoring the Video
Server's archive from the local camera storage will be copied the
fragments up to the Tcur - N timestamp, where:
The remaining part of the archive will be recorded with a time delay
equal to the specified value of the parameter.
This setting allows to avoid false error messages that appear due to
inability to download an archive from the camera before it is
actually stored in the local storage.
Default value is x1. When using default value the time required to
restore archive gap is equal to gap duration.
www.issivs.com
SecurOS 202 Administration Guide
Video Subsystem
Parameter Description
Notes:
1. Internal speaker is supported only by some Axis and Beward B
camera models.
2. External speaker with Axis type may be connected to Camera
with any Type and Model.
User/ Password Specify user name and password to operate the external speaker.
www.issivs.com
SecurOS 203 Administration Guide
Video Subsystem
Parameter Description
Size 50%— blinding will be detected if 50% of the frame area has low
contrast.
100%— only full blinding (entire camera view has low contrast)
will be detected.
Work according to selected Select the Schedule if the blinding detector should work in the
Schedule specific time range.
www.issivs.com
SecurOS 204 Administration Guide
Video Subsystem
Parameter Description
Select from the drop-down list the PTZ Protocol supported by the
current Camera model.
PTZ protocol
Note. The parameter is available depending on the type of the parent
Video Capture Device object.
www.issivs.com
SecurOS 205 Administration Guide
Video Subsystem
Parameter Description
Note. Obsolete block of settings. Is used only for cameras that do not support automatic update of their
own settings in SecurOS. For detail contact Technical Support Team.
Note. Obsolete block of settings. Is used only for cameras that do not support automatic update of their
own settings in SecurOS. For detail contact Technical Support Team.
Parameter Description
Select the type of tours, that will be available for this Camera.
Possible values:
Select serial port, that will be used to control camera PTZ. Range of
Serial port number
values: [1; 16]. Default value is 1.
www.issivs.com
SecurOS 206 Administration Guide
Video Subsystem
Depending on the Camera model the list of available parameters may vary. This section describes the
following parameter sets:
Additional parameters of the ONVIF Camera (Video Capture Device with the ONVIF Type);
Additional parameters of the SecurOS Motus Camera (Video Capture Device with the SecurOS
Motus Type);
Additional parameters of the Virtual Camera (Video Capture Device with the Virtual Type);
Additional parameters of the Generic RTSP Camera (Video Capture Device with the Generic
RTSP Type);
Other additional paramaters.
Table 34. Additional parameters of the ONVIF Camera (Video Capture Device with the ONVIF Type)
Parameter Description
Manual exposure control Note. If this option is enabled the exposure can not be controlled from
SecurOS operator interface.
www.issivs.com
SecurOS 207 Administration Guide
Video Subsystem
Parameter Description
White Balance Select the checkbox to manually set the white balance of the frame.
WDR mode Note. WDR feature (Wide Dynamic Range) allows to obtain the image of
high quality at scenes with significant illumination fluctuations.
Available only if the WDR mode is selected. Defines how strong the
WDR influence will be. Possible values: [0; 100]. Default
value: 50.
Level
Note. In case the camera does not support level control the WDR feature
will be controlled by rules defined by the manufacturer.
www.issivs.com
SecurOS 208 Administration Guide
Video Subsystem
Parameter Description
Table 35. Additional parameters of the SecurOS Motus Camera (Video Capture Device with the
SecurOS Motus Type)
Parameter Description
Specify illumination level for each zone (in %, in the range defined
Short/ Middle/ Long range in the controller). For example, if the [15; 75] range is set in the
illumination controller settings and parameter is set to 40 then actual
illumination level will be 39.
www.issivs.com
SecurOS 209 Administration Guide
Video Subsystem
Parameter Description
www.issivs.com
SecurOS 210 Administration Guide
Video Subsystem
Parameter Description
Table 36. Additional parameters of the Virtual Camera (Video Capture Device with the Virtual type)
Parameter Description
Select this checkbox to play the video archive with the same
interframe intervals with which this archive was recorded. The
original interframe intervals will be exactly reproduced with each
random playback of the archive. This mode is used to demonstrate
Use interframe delays from changes in the operation of video analytics algorithms as they are
file improved.
Table 37. Additional parameters of the Generic RTSP Camera (Video Capture Device with the Generic
RTSP Type)
Parameter Description
www.issivs.com
SecurOS 211 Administration Guide
Video Subsystem
Parameter Description
www.issivs.com
SecurOS 212 Administration Guide
Video Subsystem
Parameter Description
Set horizontal offset for a frame (in pixels). This parameter sets
offset of top left corner of the frame regarding to top left corner of
X-offset, px
the matrix in case if horizontal frame size if smaller than maximum
acceptable (see Frame width parameter).
Set vertical offset for a frame (in pixels). This parameter sets offset of
top left corner of the frame regarding to top left corner of the matrix
Y-offset, px
in case if vertical frame size if smaller than maximum acceptable
(see Frame height parameter).
Codec for recording Select codec, that will be used when writing video to archive.
8.9.1.2.8 Multicast
Video from surveillance camera can be transmitted to the operator's workstations in two modes:
unicast-translation — frame is translated on the Camera Video Server Operator Workstation
route. In this mode number of identical video streams transmitted from the Video Server to the
Operator Workstation is equal to number of operators, who watch the camera.
multicast-translation — in this mode a single video stream is transmitted into network on route
from camera to operator workstation. Further this stream is translated via network hardware to the
Video Server and non-limited number of the Operator Workstations.
Benefits of multicast-translation
Use of multicast-translation allows to get the following benefits when it applied in the network with
large number of operators:
significantly reduce charges for purchasing and operating required network hardware;
reduce video server work-loading.
www.issivs.com
SecurOS 213 Administration Guide
Video Subsystem
For example, there are several Video Servers within SecurOS network and each server is connected with
100 Cameras. Each Camera translates the 5 Mbps video stream. There are 40 Operator Workstations
within the network and each operator watches 20 Cameras.
Let's analyze the worst case, when all 40 operators watch Cameras, connected to the same Video Server
at the same time. In this case we have the following result:
Unicast Mode
Total Video Server's input stream will be 100 x 5 = 500 Mbps. To work with such video
stream only one 1 GE network interface is enough.
Total Video Server's output stream will be 20 x 5 = 4000 Mbps. To work with such video
stream one 10 GE interface on the video server and the same 10 GE interface on the network
hardware are required yet. For now, such equipment is significantly more expensive than
widespread 1 GE equipment.
In addition, Video Server's CPU must have enough reserve of performance.
Multicast Mode
Total Video Server's input stream is the same (500 Mbps). To work with such video stream only
one 1 GE network interface is enough.
There is no output video stream on the Video Server. Thus, 1 GE network interface on the video
server and the same 1 GE interface on the network hardware that are already available is
enough.
Extra performance of the Video Server's CPU to translate video stream into the network is not
required, too.
Additional Information
The loss of UPD packets results in significant frame rate reduction, and it will looks like "jumps" and "jerks" during
video playback.
Otherwise use of multicast mode is not justified and will not provide an expected result.
Setting Up Camera
Warning! In current Release multicast mode is supported only for ONVIF protocol.
To enable multicast translation specify the following parameters on the Stream tab in the Camera object
settings window (see Figure 139):
www.issivs.com
SecurOS 214 Administration Guide
Video Subsystem
Warning! Each specified Address (IPv4)/Port pair of values must be unique. It is system administrator
responsibility to provide and control this uniqueness.
Configuring is performed in the Advanced tab (see Figure 140). Depending on camera's Type and
Model the following configuring options are possible:
Possibility to control supported panoramic cameras with the help of electronic PTZ is switched on
automatically after configuring is finished.
www.issivs.com
SecurOS 215 Administration Guide
Video Subsystem
Figure 140. Advanced tab for the cameras with panoramic lenses
www.issivs.com
SecurOS 216 Administration Guide
Video Subsystem
Parameter Description
An area, located in the left part of the object settings window. The
detection area is represented by a rectangular area, bounded by a
white dotted line, in which a video stream is displayed without
distortion. Sharpness of the image inside the detection area is
Detection area considered a reference quantity. To change the area size place the
mouse cursor over any side of the rectangle, then move the cursor in
the required direction holding the mouse button. To move the
detection area, click inside it and drag rectangle to the new location.
By default, the detection area is set to the whole frame size.
www.issivs.com
SecurOS 217 Administration Guide
Video Subsystem
Parameter Description
Recommendations for choosing the detection area and configuration of the other detector parameters
are shown below (see Fine Tuning Recommendations).
For the detection areas that will normally not be shaded, it is recommended to specify a short Checking
period. This allows to capture short-time shading caused by sabotage.
When specifying a Schedule it is recommended to use such a time period, when changing of lighting
conditions inside detection area is minimum.
If the detection area and other parameters are specified correctly, then the indicator of the detector's
current settings will look as follows (see Figure 142):
www.issivs.com
SecurOS 218 Administration Guide
Video Subsystem
8.9.1.4 Layout
This object is used to create a custom layout of the Media Client's video page — a form, dimensions and
arrangement of cells to display video from the Cameras. To use created custom layouts, select the
required ones on the Layouts tab (see Media Client section). Similar to system layouts, using custom
layouts it is possible to move cameras around to the any cell of the layout.
www.issivs.com
SecurOS 219 Administration Guide
Video Subsystem
Parameter Description
A grid defines the basic model of the Media Client's working area
(i.e. Layout), which contains a specified number of cells vertically
and horizontally, accordingly. When creating/editing a layout, any
Grid
number of adjacent cells can be merged into one cell of larger size.
This large cell can again be split to the appropriate number of basic
cells.
Buttons
www.issivs.com
SecurOS 220 Administration Guide
Video Subsystem
Parameter Description
8.9.1.5 View
Setting up Views to use them on the Operator Workstation is performed by system administrator with the
help of Media Client (see About Views).
Setting up Media Client to work with Views is performed in the its Views tab.
8.9.1.6 Zone
This object represents a single detection zone of the motion detector (see Working Principles of Motion
Detection Zones for detailed information). One default zone called Main is created automatically when
a Camera object is created and covers the whole visible area of the Camera cell.
When configuring a Zone object, take into account the following parameters:
Contrast slider defines minimal moving object contrast. Top position of the slider means the zone
would detect motion only if a moving object differs greatly from the surroundings. Bottom position
of the slider means the zone would detect motion even if a moving object slightly differs from the
surroundings.
Size slider defines minimal moving object size. Top position of the slider means the Zone would
detect motion of large objects only. Bottom position of the slider means the Zone would detect
motion of small objects.
Note. The values of the Contrast and Size sliders should be set by practical consideration.
Alarming flag should be active to generate an alarm on the camera upon any motion detection
within the zone. If this flag is not checked, the zone is considered informational.
www.issivs.com
SecurOS 221 Administration Guide
Video Subsystem
Armed always flag should be active to have the zone always armed, regardless of the armed/
disarmed state of other zones on the same camera.
Save movement coordinates (enables Smart Search) checkbox should be activated if it is necessary
to save alarm object coordinates into the database.
Note. Several Zone objects within the same parent object are combined into the Motion Detector logic group
in the Object Tree.
Parameter Description
Zones
www.issivs.com
SecurOS 222 Administration Guide
Video Subsystem
Parameter Description
Select this option to keep armed mode for camera. Operator won't
Armed always
be able to disarm this zone.
Save movement coordinates Warning! All records that indicate Alarm start and stop (in microseconds)
(enables Smart Search) will be registered in the SecurOS database, assuming the default
PostgreSQL database is used. In case of other databases, records with
Alarm times will not be recorded and searching will be impossible.
Motion detection
www.issivs.com
SecurOS 223 Administration Guide
Video Subsystem
Parameter Description
Analyze reduced FPS stream, Note. The stream is reduced by I-frames. If the value specified in the
max FPS max FPS parameter is less than the result value of the initial frame
rate reduction then the I-frames themselves are further reduced.
Set the number of last camera frames used for motion analysis. If
there is not enough frames then the motion detection procedure is
Memory frames
not started. Possible values from 4 to 128 (frames). Default value
— 8.
Fill all Click the button to fill the whole frame by a mask.
Show all zones Click the button to display all camera zones.
www.issivs.com
SecurOS 224 Administration Guide
Video Subsystem
This object represents the detector of contrast between inner and outer zones.
www.issivs.com
SecurOS 225 Administration Guide
Video Subsystem
Parameter Description
Inner zone Select from the list a Zone object corresponding to the inner zone.
Outer zone Select from the list a Zone object corresponding to the outer zone.
This object is used to get video/audio archives from all the video servers of the system and convert
them to ASF, AVI, Evidence and ISS (obsolete) formats.
Warning!
1. If the export start period does not fit within the i-frame time-stamp (accurate within milliseconds),
then the actual export start time will be shifted to the first i-frame time-stamp inside the export
period.
2. It is necessary to reserve enough free space on the hard dive of the computer where export will be
performed.
Note. To play quick converted video It is recommended to use VLC media player.
Settings window appearance may differ depending on selected format (see figure 147 and figure 148).
www.issivs.com
SecurOS 226 Administration Guide
Video Subsystem
Figure 147. Archive Converter object settings window. File type is Evidence
Note. For the ISS (obsolete) format parameter settings window appearance is like for Evidence format.
www.issivs.com
SecurOS 227 Administration Guide
Video Subsystem
Figure 148. Archive Converter object settings window. File type is AVI (ASF)
www.issivs.com
SecurOS 228 Administration Guide
Video Subsystem
Parameter Description
If the original video archive was recorded with sound track, then
when exporting to a file of any format, except the ISS
(obsolete), this sound track file will be written to the resulting
file by default.
File type
Notes:
1. The Evidence format is used to export files encoded with ISS
native codec. Converted video can be only played with SecurOS
Evidence Manager.
2. When exporting to Evidence format video from multiple
Cameras can be saved into one file.
Max size of each file created after the export. Default value is
2000 MB. Max value is 10000 MB.
Warning! Some media players do not support AVI-files greater than 2 GB.
When exporting to the AVI and ASF file formats archive can be split
into several files regardless of the specified value of this parameter.
Archive is being split automatically in the following cases:
Split into files up to Video archive contains frames with different frame resolution.
When resolution is changed the new file will be created;
Note. When setting the parameter values it is possible to use file name
macros (see Name pattern parameter description).
www.issivs.com
SecurOS 229 Administration Guide
Video Subsystem
Parameter Description
www.issivs.com
SecurOS 230 Administration Guide
Video Subsystem
Parameter Description
www.issivs.com
SecurOS 231 Administration Guide
Video Subsystem
Parameter Description
Possible values:
AES-128;
AES-256.
Warning! File will be encrypted only if password is set in the export task
parameters to protect it from unauthorized access (see SecurOS Quick
User Guide, Archive Export section).
Codec MJPEG;
MPEG-4.
Reduce frame rate (use frame rate reduction during conversion). Select this checkbox to set frame
rate reduction.
FPS divider Set the frame rate reduction factor. Range of values: [2; 100].
www.issivs.com
SecurOS 232 Administration Guide
Video Subsystem
Parameter Description
Use original audio codec during conversion. Can only be used for
Quick audio export GSM, PCM and ADPCM formats. ADPCM format will be converted to
the PCM format.
PCM;
Codec
WMA (for ASF container);
Click this button and use file manager to select logo file. Logo file
must meet the following requirements:
left top;
right bottom;
left bottom.
www.issivs.com
SecurOS 233 Administration Guide
Video Subsystem
Figure 149. Appearance of the Logo Overlay block after logo is successfully loaded
A digital signature with a certificate ensures that the signed file has not been replaced or edited after
creation. The PKCS#7 Signed data detached signature standard is used for digital signature within
SecurOS.
Possibility to sign files with the certificate is available on the Computers that have any Role
(see Computer).
Digital signature on the Video Server is available in case, if the Archive Converter configured in any
Operator Workstation Profile is selected to perform export task;
Digital signature on the Operator Workstation is available in case, if the Archive Converter configured
on this Operator Workstation or in any Operator Workstation Profile is selected to perform export
task.
After enabling the digital signature functionality, the Archive Converter will automatically sign audio
and video files using the selected certificate.
Functionality is enabled directly on the Operator Workstation or the Video Server. Certificate, that
matches the following requirements, must be installed in advance on operator's computer:
The Digital Signature bit is asserted in the Key usage certificate's extension;
The Code signing attribute is set in the Enhanced key certificate's extension.
Functionality enabling procedure and Digital signature verification utility are described in details in
SecurOS Quick User Guide.
Note. To check and demonstrate how the digital signature works one can use self-signed certificate created
with the help of Certificate Generator utility.
www.issivs.com
SecurOS 234 Administration Guide
Video Subsystem
When exporting to the AVI/ASF or Evidence file formats added subtitles are stored in archive only in
case if initial video stream is being re-coded when export procedure is performed (the Quick export
option is not selected). If the Quick export option is selected subtitles are not saved in the exported file.
Subtitles themselves are the part of the exported video and cannot be hidden.
Archive prof ile export is a special object designed for quick configuring the archive export feature on any
Operator Workstation within the SecurOS network. Settings of this object are the same as the Archive
Converter object excluding the Export to parameter.
When using Archive export prof ile then only Media Client is used to create an export task and execute an
export procedure.
Just as when using the Archive converter an archive file can also be signed with the help of the certificate
(see Digital Signature). In this case the file can be signed on any Computers without additional
limitations.
8.9.1.10 Archiver
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
This object is used to copy records of specified cameras from Primary archive to the Long-term archive in
SecurOS format (see SecurOS Archives) and also to view files of the long-term archive in Media Client.
www.issivs.com
SecurOS 235 Administration Guide
Video Subsystem
Parameter Description
Archiving mode
www.issivs.com
SecurOS 236 Administration Guide
Video Subsystem
Parameter Description
Select from the list the mode, that will be used to copy files of the
Regular archive:
Storages (table)
Buttons
www.issivs.com
SecurOS 237 Administration Guide
Video Subsystem
Parameter Description
Cameras
To add a camera to the Camera list, with which given Archiver will
work, tick appropriate checkbox on the left of the Camera object.
Notes:
1. Cameras, selected to work with another Archiver, can not be
added to the list of the given Archiver. Checkboxes of such
Name cameras are disabled. Place the mouse pointer over such Camera
and system will display a name of the Archiver object, in the
settings of which given Camera is selected.
2. Cameras, children to the Video Capture Device that having ISS
Video Concentrator type and cameras, that work with
remote archives with the help of EdgeStorage Gate object, are not
displayed in the list of the Cameras.
Specify max period for storing fragment in the Long-term archive (in
days).
Warning! Storage period is calculated not from the date when fragment has
been copied to the Long-term archive, but from the moment when this
fragment has been recorded to the Primary archive. For example: fragment
has been recorded in the Primary archive on April, 10, and has been
copied in the Long-term archive on April, 15. If Remove after parameter
Remove after is set to 15, then fragment will be removed from the Long-term archive on
April, 25 (i.e. in 10 days after it was copied).
Note. If there is not enough free disk space to write a long-term archive,
the archive will be deleted earlier than the specified storage period to
free space for new files.
www.issivs.com
SecurOS 238 Administration Guide
Video Subsystem
3. Select option to record archive (Drive/Network path) and select hard drive or specify path to the
network folder (user name and password are specified optionally).
Notes:
1. The Drive list is automatically populated with all hard drives, available on given Video Server.
2. If Video Server is disconnected, then list will be populated with all drives from A to Z.
Warning! It is not recommended use the same Directory for recording Regular (see Archive in the Computer
object settings) and Long-term archives.
4. In Video field (section Set rights) set the rights of directory access. Possible values:
Read — directory will be available only for reading.
Read and Write — directory will be available both for reading and writing.
5. In Archive recording check and, if necessary, modify the Minimum free drive space value.
Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to record
archive as efficiently as possible.
www.issivs.com
SecurOS 239 Administration Guide
Video Subsystem
Warning! It is not recommended use the same Directory for recording Regular (see Archive in the Computer
object settings) and Long-term archives.
4. In Video field (section Set rights) change the rights of directory access. Possible values:
Read Only — archive is available only for reading.
Read and Write — archive is available both for reading and writing.
5. In Archive recording check and, if necessary, modify the Minimum free drive space value.
Notes:
1. Parameter value is calculated and applied automatically when adding new directory.
2. It is recommended to allocate not less than 10% of full drive space. This value allows to record
archive as efficiently as possible.
www.issivs.com
SecurOS 240 Administration Guide
Video Subsystem
This object is used for image (frame) processing and to subsequently export the image(s) to a file or
database.
When exporting an image to a file it is saved on the hard drive of the parent Computer or can be stored
in any Database configured in the SecurOS object tree when exporting to the database.
To process and export processed frames the VB/ JScript program object can be used with the help of
the EXPORT command. For the complete export program syntax see SecurOS Programming Guide.
Additional parameters can be configured both in Windows and Linux OS. The setup procedure for each
OS is described below:
Setting up for Windows.
Setting up for Linux.
www.issivs.com
SecurOS 241 Administration Guide
Video Subsystem
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium.
This module is designed to transmit live or archive H.264 video from SecurOS's Video Servers to remote
external systems via RTSP/RTP. Video streams can be transmitted both via UDP, which is used by the
RTSP Server by default, and TCP. The type of transport protocol used is specified by the settings of the
external system.
There are the following restrictions when transmitting video from RTSP Server:
total number of Cameras connected to a single RTSP Server object — not more than 1000;
total number of clients to receive live or archive video from one Camera — not more than 800.
Warning!
1. Any stream of the multi-streaming camera can be transmitted.
2. Transmission of the synchronized audio is not supported.
www.issivs.com
SecurOS 242 Administration Guide
Video Subsystem
Parameter Description
SecurOS's port for interaction with external system via RTSP. Is used to
RTSP port receive live and archive video with the help of an external application (e.g.
media player). Range of values: [1; 32768]. Default value is 554.
SecurOS's port for interaction with external system via HTTP. Is used to
receive a list of archive records via web-browser. Range of values: [1;
HTTP port 32768]. Default value is 81.
Warning! When changing the default port value it is recommended to use netstat
-aon|more query in the command prompt to determine the free port.
Select this checkbox so that only authorized SecurOS users will be able to
connect to the RTSP Server.
Warning! Working with Windows Active Directory domain users is not supported.
If selected, the access rights of the SecurOS User Account to the Cameras from
which the video is requested will be checked before connecting. To receive
Require video, the access level of an authorized user to Cameras must be no lower
authentication than (View).
If there are User Accounts in the system whose settings must be changed to
work with the RTSP Server after updating to version 10.8, the icon will be
displayed in the window. For more information about such User Accounts,
see Updating from version 10.7 and earlier. The settings of the User Accounts
created after updating to version 10.8 do not need to be changed.
Cameras
To search object by name (part of its name) or by ID, type required characters
in the field; only those objects that meet the search condition will
Filter
automatically be displayed in the tree. To clear the field click the Reset filter
button.
List of SecurOS's cameras, that can be used as a signal source to transmit live
and archive video to an external system via RTSP. Structure of the tree is
similar to SecurOS's Object Tree. To use a Camera, select appropriate checkbox
on the left of the object. To use all Cameras of the computer select checkbox on
the left of the appropriate Computer. To use all Cameras of all the Computers of
the system, select checkbox on the left of the System object.
Object tree
Note. Temporarily disabled Cameras (see Disabling Objects) are marked in the
Object Tree in gray (see Figure 153, Camera 1).
Warning! The number of cameras, which can be simultaneously used for video
transmission, is a licensed value. When the value, specified in the license key file is
exceeded, the OK button is disabled.
www.issivs.com
SecurOS 243 Administration Guide
Video Subsystem
Parameter Description
Buttons
Save specified values and close object settings window (Close object settings
OK (Cancel)
window without saving changes).
For more information about using RTSP Server, please contact your regional Intelligent Security
Systems representative.
8.9.1.13 ONVIF Server
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium.
This object is designed to transmit live H.264 video from the SecurOS Video Servers to external systems
via RTSP protocol and to control SecurOS PTZ cameras from external system via ONVIF protocol.
Parameter Description
SecurOS's port for interaction with external system via ONVIF. Is used to
ONVIF port control SecurOS PTZ cameras from external system. Range of values: [1;
65535]. Default value is 8088.
Select RTSP Server, parameters of which will be used for generating request
RTSP Server
for transmit video from the SecurOS.
For more information about using ONVIF Server, please contact your regional Intelligent Security
Systems representative.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
www.issivs.com
SecurOS 244 Administration Guide
Video Subsystem
This object is designed to fill the gaps in the operational archives of the Video Servers with the
corresponding fragments of the local archives of the Cameras (see Camera Local Storage (Edge
Storage)).
This object is designed for working with video archive stored on the external device. One can playback
such archive in the Media Client window with different playback speed.
Parameter Description
Edge device Set timeout for receiving frame from Edge device. Range of values: [1; 60].
response timeout Default value is 10.
To configure SecurOS for working with the external archive do the following:
1. In the Object Tree create a Video Capture Device which Type and Model corresponds with the Edge
device.
2. In the IP address field specify IP address of the external device where archive you want to work is
located.
3. Create the Camera object child to the created Video Capture Device.
4. In the Camera object settings window select the Playback archive from the edge device checkbox
(see Recording Tab).
5. Create the EdgeStorage Gate object on each Video Server, where such Camera is created.
Media Client is the user interface object intended to work with Video Subsystem.
www.issivs.com
SecurOS 245 Administration Guide
Video Subsystem
This object represents the operator GUI that allows to work with the system Cameras and Microphones.
Media Client provides the system with the ability to process each stream generated by a multi-streaming
camera in real-time (see Multi-streaming) and allows to assign a type of stream to display depending
on the camera cell size (see Figure 157 and Table 49).
When using the digital zoom feature in the Media Client, if it is possible, the stream with the better
quality is automatically switched to (for the multi-streaming cameras).
Media Client can operate in two modes: with selected Camera list or with all Cameras within the system.
By default the Media Client operates with all Cameras connected to the system, which are added to the
Camera list automatically when creating the Media Client object. When creating a new Camera object, it is
automatically added to the list (only when "working with all Cameras mode" is on).
www.issivs.com
SecurOS 246 Administration Guide
Video Subsystem
Figure 156. Media Client object settings window. Display options Tab
Parameter Description
www.issivs.com
SecurOS 247 Administration Guide
Video Subsystem
Parameter Description
Working only with live video or sound — operator can not switch
objects to the archive mode. In this mode all archive controls, that
Live only are normally available to the operator, are hidden (for example, the
Export panel, the Live/ Archive button in the Camera cell or in the
Microphone Panel, archive control commands of the context menu).
In this mode, the standard Media Client's controls are not available
to the operator.
When turning this mode on, all additional Media Client controls (i.e.
Camera Panel, Layout Panel etc.), and also Camera cell controls and
Camera cell border, that are normally displayed, are hidden.
If this mode is applied to the existing Media Client object, then all
cameras are switched to the live video mode. Layout of the working
area and displayed video page are not changed.
View only
When view mode is on, the Media Client is controlled only
externally, for example, with the help of VB/ JScript programs. The
following types of commands are supported:
layout switching;
Time to display Camera Specify time interval to display Camera on the Media Client after
after alarm ends alarm ends (in seconds).
www.issivs.com
SecurOS 248 Administration Guide
Video Subsystem
Parameter Description
Window position
Choose the number of the physical display this Media Client belongs
Display
to. Possible values: [1; 16]. Default value is 1.
Notes:
1. If the specified parameters result in (X+W)>100 or (Y+H)
>100 and the View mode option is disabled, then the system
W, H automatically reduces the specified values down to (X+W)
=100 or (Y+H)=100 respectively.
2. If the specified parameters result in (X+W)>100 or (Y+H)
>100 and the View mode option is enabled, then the system
displays Media Client window on several physical monitors,
considering their mutual alignment (system setting).
Additional panels
Cameras and Microphones Deselect checkbox to hide Camera list and Microphone list for the
list given Media Client. By default it is selected.
Camera controls
www.issivs.com
SecurOS 249 Administration Guide
Video Subsystem
Parameter Description
General settings
www.issivs.com
SecurOS 250 Administration Guide
Video Subsystem
Parameter Description
Select this checkbox to allow the operator to work both with Primary
and Long-term archive. If selected, then additional controls are
displayed in the Media Client's camera cell (see SecurOS Quick User
Access to Long-term archive Guide).
Select this checkbox to add the Play the last N s/ min of record
command to the Camera cell context menu on the Media Client and
"Play the last N s/ min of specify the parameter value. To learn more about command usage
record" Command and playback features see SecurOS Quick User Guide.
Warning! Option is available only in Normal and Active working
modes (see Working mode parameter description).
Page dwell time when auto Video page dwell time in auto scrolling mode (in seconds).
scrolling
Choose from the list an Emergency service object that will be used to
Send Ticket to Emergency
create and send Emergency ticket (see Emergency service and
Service
Interaction with External Emergency Service).
www.issivs.com
SecurOS 251 Administration Guide
Video Subsystem
Parameter Description
www.issivs.com
SecurOS 252 Administration Guide
Video Subsystem
Parameter Description
Layouts (to select/deactivate all layouts of the group select/deactivate appropriate checkbox on the
left of the group name)
Display streams
For example, as it is illustrated in Figure 157, if all three camera streams are selected to be displayed,
then for the specified settings, the High resolution stream will be displayed in any cells whose size is
not less than 1/2 of the working area. The Low resolution stream will be displayed in any cells whose
size is not greater than 1/4 of the working area. At the same time, the Base stream will be displayed in
the cells of intermediate size.
www.issivs.com
SecurOS 253 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 254 Administration Guide
Video Subsystem
Parameter Description
Select checkbox to activate manual control mode of the Views list for
the given Media Client.
Use only selected shared If not selected, the Views list is populated automatically and
Views contains all Views created within system. By default is not selected.
Note. By default objects in the tree are sorted ascending by name and
ID.
www.issivs.com
SecurOS 255 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 256 Administration Guide
Video Subsystem
Parameter Description
Notes:
Limit live video FPS 1. Specified value is applied to all Cameras selected to work with
the given Media Client.
2. If there are more than one Media Client created and configured
on one Desktop and each of them works with the given Camera,
then FPS of this Camera is equal to the maximal value of the
specified on all Media Clients.
Object Tree of the Computers having role Video Server existing within
the SecurOS network. When expanding the Video Server node all
Object tree Camera children objects are displayed.
www.issivs.com
SecurOS 257 Administration Guide
Video Subsystem
Parameter Description
Show subtitles (select checkbox to display subtitles with specified parameters). If selected subtitles
will be displayed both in the Live and Archive mode. Subtitles are added externally, with the help
of the ADD_SUBTITLES command (see SecurOS Programming Guide)).
Warning! If subtitle parameters are specified in the ADD_SUBTITLES command, the following values are
ignored.
Number of characters in the line for the given frame size will be
kept constant until calculated font size value is greater than
specified Minimum font size. If calculated font size is less than
Symbols per line Minimum font size, then the size of the displayed characters will be
equal to Minimum font size. At the same time output line may
include less characters, than is specified by the Symbols per line
parameter.
www.issivs.com
SecurOS 258 Administration Guide
Video Subsystem
Figure 160. Media Client object settings window. Archive export Tab
www.issivs.com
SecurOS 259 Administration Guide
Video Subsystem
Parameter Description
Select this checkbox to use Archive export prof iles when exporting
Use Archive export profiles archive with the help of the configured Media Client (for the details
see Export Using Archive Export Profile).
Object tree To choose an Archive Converter, which will be used by the given
Media Client, select the appropriate checkbox to the left of the
Archive Converter object (for the details see Export Using Archive
Export Profile).
Warning! Archive Converters created on the Video servers are available on
any Computer. Archive Converters created on the Operator Workstations or
Operator Workstation Prof iles are available only on these Computers.
Warning! To perform export operations user access rights to the Archive export prof ile and Archive Converter
objects must be not less than (View), see User Rights. If operator has an access to the pointed objects, then
possibility of use these objects is being specified in this tab.
www.issivs.com
SecurOS 260 Administration Guide
Video Subsystem
Parameter Description
Work with audio Select checkbox to listen to the live or archived audio.
www.issivs.com
SecurOS 261 Administration Guide
Video Subsystem
Parameter Description
Notes:
1. A Standalone microphone means one that is not associated with
any Camera.
Use only selected 2. This option does not affect operation with the Microphones
microphones associated to Cameras.
www.issivs.com
SecurOS 262 Administration Guide
Video Subsystem
All Views, exclude View, name of which is All devices, are single-page, i.e. Cameras of these Views can
not be listed. The All devices multi-page View always exists and includes all available Cameras and
Microphones.
The following objects are shown on Figure 162:
Layout bar — (is collapsed in Figure 162) contains all Layouts that can be used when working with
Views;
Views quick access bar, where you can drag-and-drop frequently used Views. An active View is
highlighted on this bar in light-blue;
Views Panel — contains Views List and View search field;
Views List contains all available Views. An active View is highlighted in this list in light-blue frame.
Using the settings of the Views tab administrator can hide Views List, Layout bar and also select a Views,
that you can work with in the Media Client.
Note. If Views List is hidden, then Views are displayed in the Views quick access bar.
For the details of how to switch Views, work with Views quick access bar, temporarily change Views, refer
to the SecurOS Quick User Guide.
8.9.2.1.8 Working with Views
To get a possibility to create, edit and remove Views, tick the Enable shared Views setup checkbox in
the Views tab of the Media Client.
To open the Views Editor edit mode click on the button in upper left corner of the Media Client
(see Figure 163) and select the Enter Views Setup command.
www.issivs.com
SecurOS 263 Administration Guide
Video Subsystem
These operations are performed with the help of buttons, located in the View Edit Bar (see Figure 164).
Note, that Device List is located under the Views List in the Views Editor. Views, that don't contain
devices, are presented in gray background in the Views List, for example, View 5 (see Figure 164).
www.issivs.com
SecurOS 264 Administration Guide
Video Subsystem
To close the Views Editor click on the button in upper left corner of the Media Client (see Figure 165)
and select the Exit Views Setup command.
8.9.2.1.8.1 Creating View
Note. This section provides information on creating a View with a Cameras. You can create a View, containing
Microphones, in the same way.
1. Click on the (Create new) button on the View Edit Bar. System will display the View creation
window (see figure 165).
2. Type new name of a View in the View name field and click on the OK button.
3. The 2x2 Layout is selected by default for the Media Client Working Area. To change layout choose
another one in the Layout bar.
4. To add a Camera choose it in the Device List and drag-and-drop it to the required cell of the Media
Client.
5. To delete a Camera choose it in the Media Client's cell and drag-and-drop it to the Device List.
6. To change Camera's position choose it and drag-and-drop it to the required cell of the Layout.
7. To save changes click on the (Save) button on the View Edit Bar. To discard changes click on
Note. To mark Views with unsaved changes, an Italic font is used in the Views List.
When editing a View, you can add or delete Cameras and/or Microphones, change Camera's and/or
Microphones position in the Media Client's cells, change Layout of the Media Client Working Area. How to
do this see Creating View section.
To save View with the same name, click on the (Save) button, with a new name — the
(Save as) button.
www.issivs.com
SecurOS 265 Administration Guide
Video Subsystem
Notes:
1. When saving View it's changes are applied for all Media Clients, that use this View.
2. View, that contains devices, access for which is denied (View that marked with an icon in the
Views List), can not be saved with previous name. If View is saved with a new name, then Media
Client's cells, that correspond to such devices, are empty.
2. Click on the (Rename) button on the View Edit Bar. System will display the View renaming
window (see figure 166).
3. Type new name of a View in the View name field and click on the OK button.
Additional Information
View can also be renamed in SecurOS Object tree (see Working with Objects).
Note. View, that contains devices, access for which is denied (View that marked with an icon in the Views
List), can not be renamed.
Additional Information
View can also be deleted in SecurOS Object tree (see Working with Objects).
Note. View, that contains devices, access for which is denied (View that marked with an icon in the Views
List), can not be deleted.
www.issivs.com
SecurOS 266 Administration Guide
Video Subsystem
Original objective: one computer and two cameras connected to local area network. Computer should
be used not only to capture and record video, but to monitor cameras also.
www.issivs.com
SecurOS 267 Administration Guide
Video Subsystem
Now you will see a full-screen Media Client with live video from two cameras.
Original objective: video server and two cameras connected to local area network. Monitoring can be
performed from one or more Operator Workstations. For them the Operator Workstation Prof ile user
interface will be created (see Operator Workstation Profiles), that can be used on all computers.
www.issivs.com
SecurOS 268 Administration Guide
Video Subsystem
3. Create the Camera object (child object of the Video Capture Device object).
4. Create second Video Capture Device and configure it the same way.
5. Create the Camera object (child object of the second Video Capture Device object).
6. Create Computer object with Operator Workstation role, which ID and Name corresponds to its
destination.
7. Tick the Use as Operator Workstation Profile checkbox in the created Computer object settings.
8. Create Desktop child object in the Desktops group of objects.
9. Create Media Client object child to recently created Desktop object.
10.Launch SecurOS operator interface on the computer, that will be used as Operator Workstation.
Specify IP address or DNS/WINS name of the Video Server.
Operator interface containing Operator Workspace that corresponds created profile, will be loaded. When
client has started, you will see on its display a full-screen Media Client with live video from two server-
side cameras.
www.issivs.com
SecurOS 269 Administration Guide
Video Subsystem
Note. At this step it is possible to set the PTZ-control. The configuration sequence is described in the Setting
up Telemetry section. This step can also be done later.
www.issivs.com
SecurOS 270 Administration Guide
Video Subsystem
To display video streams only from required Cameras on the Media Client do the following:
1. Enter the Administration Mode.
2. In the Object Tree select the Media Client on which it is necessary to configure the Camera list (Security
Zone Servers & Workstationsgroup Computer Desktops group Desktop Media
Client).
3. Enter Media Client object parameter settings mode. In the Cameras tab (see Figure 171) do the
following:
www.issivs.com
SecurOS 271 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 272 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 273 Administration Guide
Video Subsystem
Note. Detailed information about access levels and its corresponding icons is available in the User Rights
section.
4. If you want to provide an operator with a possibility to hold PTZ control for an unlimited time, tick
the Allow to hold PTZ control checkbox (see Holding PTZ Control for a Long Time).
5. If it is necessary to restrict the order of user access to PTZ control (see Shared Telemetry Control and
Exclusive Telemetry Control) specify required value in the PTZ Control Priority field.
Note. Specified priority value is applied to all Cameras that can be controlled by the given user.
www.issivs.com
SecurOS 274 Administration Guide
Video Subsystem
After PTZ Device configuration, at the activation of a cell of any camera placed on the Media Client, the
PTZ button will be displayed.
When controlled camera is activated, then the PTZ Control Panel will be activated on the Media Client.
4. In the PTZ tab (see Figure 174) configure the corresponding parameters.
www.issivs.com
SecurOS 275 Administration Guide
Video Subsystem
www.issivs.com
SecurOS 276 Administration Guide
Video Subsystem
In the shared telemetry control mode, all incoming commands are executed. The commands are
executed in order they were sent by the operators. Each new command starts executing immediately
after it is received. For example, the first operator started patrolling, and the second, after a short period
of time, began to rotate the camera with the joystick. In this case, the patrol will be interrupted, the
camera will turn.
Warning! Exclusive telemetry control mode is available only for cameras equipped with built-in PTZ device.
When working in exclusive telemetry control mode, there are two options of the operator work:
1. Capture of PTZ control with automatic control release.
2. Capture of PTZ control for a long time with release by operator's command (long-term PTZ hold).
Capture of PTZ control with automatic release mode is available by default. Option to capture and
long-term PTZ hold is configured by system administrator additionally (see User Rights, the Allow to
hold PTZ control parameter). If this option is adjusted, then operator will be able to choose one of two
way of work.
www.issivs.com
SecurOS 277 Administration Guide
Video Subsystem
Capture of PTZ control for a long time with release by operator's command (long-term PTZ
hold)
In this PTZ control mode system works in the following way:
Note. If possibility to long-term PTZ hold is configured by system administrator, then additional controls are
displayed in the camera cell (see SecurOS Quick User Guide).
1. Operator turns on long-term PTZ hold mode and sends a PTZ control command.
2. System transfers PTZ control to that operator for unlimited period of time and analyses all other
incoming commands. At the same time:
if command was sent by user, whose PTZ control priority is equal to PTZ control priority of the
current user or lower, then command is ignored.
if command was sent by user, whose PTZ control priority is higher than PTZ control priority of the
current operator, then PTZ control is transferred to this user. In this case system can operate in one
of two ways:
command was sent in "capture control with automatic release" mode (long-term PTZ hold mode
is not turned on) — after executing the command, the system expects a new command from the
same operator within 5 seconds. If such a command was not sent, then system automatically
releases PTZ control for any operator within network.
command was sent after long-term PTZ hold mode was turned on — see paragraph 2. When
work is finished, PTZ control is released by operator in manual mode or can be released by
operator, that has a higher PTZ control priority. The superuser (see SecurOS Users) can release
blocking of any other user, including his own blocking on the different Computer.
At the same time, the own priority can be assigned to the telemetry control commands sent by Macro
and VB/ JScript programs (priority parameter, see SecurOS Programming Guide). If this priority
value is higher than priority of the User that captured telemetry control, then PTZ will be controlled by
the command sent from Macro or VB/ JScript program.
When working in the exclusive control mode, the PTZ control panel of the Media Client and PTZ control
button in the Camera cell are disabled for all users except for the user who captured the control and
users with higher priority (refer to SecurOS Quick User Guide for the details).
To use a joystick for control PTZ Cameras with the help of the Media Client (see SecurOS Quick User
Guide) it is necessary to install and configure it first.
www.issivs.com
SecurOS 278 Administration Guide
Video Subsystem
Warning! The calibration procedure is absolutely necessary, otherwise the joystick will not function in
SecurOS!
www.issivs.com
SecurOS 279 Administration Guide
Audio Subsystem
9 Audio Subsystem
The audio subsystem is used to operate and configure the audio devices (audio capture cards,
microphones) within the SecurOS security network, transmit audio streams between servers and
workstations and also work with live and archived audio from within workstations.
Possibilities to use system objects to record and playback audio streams are different for each mode and
depend on their settings. Features of each mode are described in detail below.
In this mode, the video stream is recorded synchronously with the audio stream, which allows to
analyze not only video, but also audio information when playing back records.
Synchronized audio/video recording is configured by making a logical link between the Camera and
the Microphone object. Physical devices are linked during the Camera object configuration (see Camera
section).
Synchronized audio/video recording and playback is performed by using controls of the Media Client's
cell (see Media Client), that displays live video from Camera, to which the appropriate Microphone is
linked to.
Warning! A Microphone linked to a Camera can never be used separately from the Camera to record arbitrary
audio.
For the detailed description of the system configuration operations required to provide synchronized
audio recording mode see Example of System Configuration for Synchronized Audio/ Video
Recording and Playback section.
Separate recording of the arbitrary audio stream is done with the help of Microphone, that is not linked
to the Camera object.
To control separate recording and playback mode the Media Client system object is typically used.
www.issivs.com
SecurOS 280 Administration Guide
Audio Subsystem
The object is designed to configure and initialize within SecurOS network the following typical audio
sources:
IP-devices;
physical audio capture devices installed on the computer, including the following:
sound cards;
microphones connected to the computer's audio inputs.
Parameter Description
www.issivs.com
SecurOS 281 Administration Guide
Audio Subsystem
Parameter Description
Note. The higher the samplerate the better the audio record quality, but
more disk space will be required.
Samplerate
Warning! This parameter is enabled only for devices, which Type is
SoundBlaster. For all other Audio Capture Devices this parameter is
disabled.
Login — user name to access device. Value is set with the help of
For IP-device device's configuration interfaces (see original device' User Manual);
This parameter allows specify the type of connection with the device.
Use secure connection use device's web-interface to select HTTPS for user and to select
(HTTPS) trusted certificate of encryption in own device's settings.
Warning! If at least one of the listed conditions is not met, then secure network
connection with device will not be established.
Note. This parameter is available for Axis and Bosch Audio Capture
Devices.
www.issivs.com
SecurOS 282 Administration Guide
Audio Subsystem
Parameter Description
Note. In case of some microphones are connected to the audio card only
one of them can be used.
9.2.2 Microphone
www.issivs.com
SecurOS 283 Administration Guide
Audio Subsystem
Parameter Description
If Microphone linked to the Camera (see Audio Tab) the Name and
Linked to Camera ID of the corresponding Camera are displayed in this field.
Otherwise (free Microphone) no is displayed in this field.
Voice Operated Control (feature of automatic sound recording upon reaching threshold volume).
Note. This set of parameters is valid only for separate audio recording mode (see Separate Audio
Recording and Playing Back section).
Warning! In order to trigger Voice Operated Control, Microphone must be armed using Macro or VB/ JScript
program, or must be set to recording mode with the help of Media Client.
www.issivs.com
SecurOS 284 Administration Guide
Audio Subsystem
Figure 178. Object Tree for Workstation Configured for Synchronized Audio/ Video Recording
www.issivs.com
SecurOS 285 Administration Guide
I/O Subsystem
10 I/O Subsystem
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional, SecurOS Xpress.
The I/O subsystem is used to control and configure general purpose I/O devices (sensors and relays)
within the SecurOS network.
10.1.1 Sensor
This object represents a physical sensor device or a daisy chain of sensors (security loop).
When Sensor is triggered, this event is added to the Event Viewer, from which one can jump to the Media
Client to view corresponding video. If Sensor linked with several Cameras, all these Cameras will be
displayed on the Media Client. This functionality allows you to synchronously view video,
corresponding to the moment the sensor is triggered, from various monitored zones.
www.issivs.com
SecurOS 286 Administration Guide
I/O Subsystem
Parameter Description
Select the most appropriate sensor type (this only changes device's
Hardware
icon on Map, not its behavior).
Object Tree of the Computers having role Video Server existing within
the SecurOS network. When expanding the Video Server node all
Object tree Camera children objects are displayed.
Tick the checkboxes for the Cameras that you want to watch video
from when the Sensor is triggered.
www.issivs.com
SecurOS 287 Administration Guide
I/O Subsystem
10.1.2 Relay
This object represents an electrically operated switch (e. g. relay) that controls some device.
Parameter Description
Relay number Select the channel number the relay is connected to.
Select the most appropriate device type controlled by this relay (this
Hardware parameter changes device's icon on map). Possible values: Lock,
Woofer, Light, Wiper.
External device
CCTV keyboards are designed to control user interface objects (for example, Media Client), cameras and
their modes, to execute operations with layouts, record operations, etc.
Note. When working with the keyboard, user rights to control cameras are taken into account in the same
way as when working with the Media Client (see User Rights).
www.issivs.com
SecurOS 288 Administration Guide
I/O Subsystem
Note. See SecurOS Quick User Guide to learn how to operate keyboards described above.
Warning! The PL-2303 chipset of the COM port must be supported by used operation system to use the
keyboard properly. It can be checked on the manufacturer http://www.prolific.com.tw/US/
ShowProduct.aspx?p_id=225&pcid=41 web-page.
www.issivs.com
SecurOS 289 Administration Guide
I/O Subsystem
Warning! Code page that is used when transferring text data from SecurOS to the keyboard, is specified by
Format parameter (Control panel Clock, Language and Region Region and Language Format).
Parameter Description
Invert camera's tilt (up/ Select this checkbox to invert vertical camera movement when
down) movement direction moving joystick's shaft up and down.
www.issivs.com
SecurOS 290 Administration Guide
I/O Subsystem
2. Perform operations (step by step), listed in the window. Click the Next button.
3. Follow the instructions displayed in the window.
www.issivs.com
SecurOS 291 Administration Guide
I/O Subsystem
Media Clients tab is used to create a list of Media Clients, that can be controlled with the configured
device.
Note. At the moment only one Media Client can be controlled with the CCTV Keyboard or joystick.
Parameter Description
List of all Media Clients that are children of the same Computer, as an
Available Media Clients object is being configured. To define Media Client that can be
controlled, select required one and click the > button.
List of the Media Clients that can be controlled with the given CCTV
Selected Media Clients
Keyboard or joystick object.
www.issivs.com
SecurOS 292 Administration Guide
I/O Subsystem
Parameter Description
Media Client, which will be selected for control with the CCTV
Keyboard by default after SecurOS startup. Possible values: any
Media Client from the list of Selected Media Clients.
Default active Media
Clients Note. In order to change controlled Media Client when working with the
system use the device interface to enter it's ID or select Media Client's
name from the list (see User Manual for the appropriate CCTV keyboard).
Parameter Description
www.issivs.com
SecurOS 293 Administration Guide
I/O Subsystem
Parameter Description
Invert camera's tilt (up/ Select this checkbox to invert vertical camera movement when
down) movement direction moving joystick's shaft up and down.
Media Clients tab and its actions are described in the Bosch IntuiKey section.
Parameter Description
www.issivs.com
SecurOS 294 Administration Guide
I/O Subsystem
Parameter Description
Invert camera's tilt (up/ Select this checkbox to invert vertical camera movement when
down) movement direction moving joystick's shaft up and down.
Media Clients tab and its actions are described in the Bosch IntuiKey section.
Parameter Description
www.issivs.com
SecurOS 295 Administration Guide
I/O Subsystem
Parameter Description
Invert camera's tilt (up/ Select this checkbox to invert vertical camera movement when
down) movement direction moving joystick's shaft up and down.
Media Clients tab and its actions are described in the Bosch IntuiKey section.
The ability to support wiper and wiper configuration parameters are normally specified in the camera
specification.
Wiper configuration and control are performed with the help of the following SecurOS objects:
Relay — is used to configure Wiper control parameters. Not required for cameras with built-in
wiper;
Camera — object settings define the Relay object, that is used to control the Wiper for the given
camera.
www.issivs.com
SecurOS 296 Administration Guide
Notification Subsystem
11 Notification Subsystem
The notification subsystem allows to inform personnel of events within the security network by the
means of e-mail, voice phone calls, SMS messaging and audible notifications. Notifications for object
events can be configured using Macros or Scripts (see SecurOS Programming Guide).
This object is used to call pop-up HTML windows, that are displayed on the Monitor dynamically as a
response to the external event or system behavior. For example, an HTML Dialog can be activated with
the help of a VB/ jScript Program when processing events. Objects of this type can be closed manually or
automatically by the system (and also by scripts). For example, pop-up HTML window may represent
control interface or simple message.
More details on operations with HTML dialogs are given in SecurOS Programming Guide.
www.issivs.com
SecurOS 297 Administration Guide
Notification Subsystem
Parameter Description
Window position
Scripting
www.issivs.com
SecurOS 298 Administration Guide
Notification Subsystem
Parameter Description
Select this option to use custom HTML form created by user. Enter
the following into the field:
Notes:
1. To specify the path with help of file manager click the
button.
2. It is unable to specify path with file manager when configuring
remotely.
Events
In the table specify events for which the HTML form must be
displayed (see Scripts parameter). Table contains following fields:
This object represents an SMTP service which will be used to send E-mail notifications.
www.issivs.com
SecurOS 299 Administration Guide
Notification Subsystem
Parameter Description
User Name, Password Specify user name and password for SMTP authentication.
Object represents an individual e-mail message (or a message template). Use Macros and VB/ JScript
Programs to send e-mail messages.
www.issivs.com
SecurOS 300 Administration Guide
Notification Subsystem
Parameter Description
www.issivs.com
SecurOS 301 Administration Guide
Notification Subsystem
Parameter Description
Represents a mobile phone or other similar device connected to the computer via a serial (COM) port or
via a USB port.
Parameter Description
Select device from the list. Any phone models that can be connected
Device
as an Android modem are compatible.
This object represents an individual SMS message. Use Macros and VB/ JScript Programs to send SMS
messages.
www.issivs.com
SecurOS 302 Administration Guide
Notification Subsystem
Parameter Description
This object represents a sound card that should be used to playback event-specific audio recordings.
The correspondence between individual audio files and object events can be viewed and altered via the
DDI utility (see ISS SecurOS Registration Files Editor). All audio files should be placed in the \wav
subdirectory of the SecurOS program folder.
www.issivs.com
SecurOS 303 Administration Guide
Notification Subsystem
Parameter Description
Sound card Select an audio output line to play the audio files through.
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
This object is intended to send to emergency service an emergency ticket that contains information
about incident. Details of the SecurOS settings and principles of interaction with the Emergency service
are described in the Interaction with External Emergency Service.
www.issivs.com
SecurOS 304 Administration Guide
Notification Subsystem
Parameter Description
HTTP address of Specify http address to which Emergency ticket and link to the
Emergency Service related video will be sent.
Connection settings (parameters of this block are used to create links to the video related to the
incident)
www.issivs.com
SecurOS 305 Administration Guide
Notification Subsystem
Parameter Description
Select this checkbox to create a link to the video that can be loaded
WebView
with the help of the WebView module via http protocol.
Specify IP address and port number of the WebView sever that will
Host/ Port
be used to provide interaction with external system.
Select from the list the WebView Monitor object that will be used to
WebView Monitor
display video from Cameras.
Select this checkbox to create a link to the video that can be loaded
RTSP Server
with the help of the RTSP server module via rtsp protocol.
Specify IP address and port number of the RTSP server module that
Host/ Port
will be used to provide interaction with external system.
Cameras
Select Cameras for which an Emergency ticket can be created and sent
to the Emergency service. To choose a Camera select checkbox on the
left of the required one.
Incident Types
This field displays Incident Types List that is used when creating
and sending Emergency ticket.
Incident Types List
Warning! If Incident Types List is not loaded, the Emergency ticket can not
be sent to the external Emergency service.
www.issivs.com
SecurOS 306 Administration Guide
Notification Subsystem
Parameter Description
Note. When installing SecurOS these files are automatically created in \IncidentTypes folder of the
product root folder.
Custom list of incident types can be created and loaded into the system in any local character encoding
or UTF-16 LE with BOM encoding. File format is represented in Listing 2:
[section1]
Name=<Incident Type Category Name>
<Incident Code>=<Incident Type Name>
<Incident Code>=<Incident Type Name>
...
[section2]
Name=<Incident Type Category Name>
<Incident Code>=<Incident Type Name>
<Incident Code>=<Incident Type Name>
...
where:
www.issivs.com
SecurOS 307 Administration Guide
Notification Subsystem
[sectionN] — unique section name. Section name can consist only of the latin characters and/or
digits.
Name=<Incident Type Category Name> — unique incident type category name. It is allowed to use
characters in any character encoding in incident type category name. String length: [1; 255]
characters.
Warning! Hyphenation of the string that contains incident type category name is prohibited.
<Incident Code> — unique incident code. Section name can consist only of the latin characters and/
or digits in incident code. String length: [1; 16] characters.
<Incident Type Name> — incident type name. It is allowed to use characters in any character
encoding in incident type name. String length: [1; 255] characters.
Warning! Hyphenation of the string that contains incident type name is prohibited.
[S1]
Name=Man-made fires
S101=fires in buildings, communications and technological equipment
S102=fires in transport
S103=fires in the metro
S104=fires in buildings housing, welfare, cultural
S100=other man-made fires
[S2]
Name=Wildfires
S200=other wildfires
S201=forest fires
S202=steppe and grain fields firesS100=other man-made fires
[S3]
Name=Traffic accidents
S300=other traffic accident
S301=vehicle collision
S302=vehicle rollover
S303=hit on stationary vehicles
S304=hit a pedestrian
S305=hit a cyclist
S306=hitting an obstacle
S307=impact on animals
. . .
[S7]
Name=Geological / hydrological hazards
S700=other geological / hydrological hazards
S701=landslides, debris
S702=a hole in the earth's surface, roads
S703=high water levels / floods
[S8]
Name=Other incidents
S800=other incidents
S801=crowds
www.issivs.com
SecurOS 308 Administration Guide
Notification Subsystem
S802=loitering
S803=vandalism
S804=fight, attack
S805=entrance into the forbidden zone / perimeter intersection
S806=abandoned things
S807=vehicle detection from the black list or a wanted
S808=human detection from the black list or a wanted
S809=need medical help
SecurOS allows to integrate devices that use the Session Initiation Protocol (SIP) such as emergency call
towers and so on into its configuration. SecurOS operators have two-way communication with those
devices. They also have means to monitor locations of the devices so they can expeditiously react to the
incidents.
To allow SecurOS to work with SIP Devices create and configure the following objects:
SIP Subsystem;
SIP Device;
SIP: GUI.
www.issivs.com
SecurOS 309 Administration Guide
Notification Subsystem
Parameter Description
Note. When using a PBX, the contact format is determined by its settings
and other requirements of the current configuration.
Select this option if your configuration uses the PBX to provide SIP
Work with PBX Devices communication. If the option is selected the PBX settings
become available.
Network ports
TCP port Network port for TCP connections. Default value: 5060.
Note. Every active call requires to open two UPD ports starting from the
UDP port given value. Consider this when configure firewall. For example, to
maintain 10 simultaneous calls the UDP ports from 5060 to 5079 are
required to be opened.
Object represents the device that runs over a protocol called SIP. Operators will be able to take and
make calls using this device. Created SIP Devices will be displayed in the SIP: GUI window. Interaction
possibilities for those devices are defined by user rights (see Access to SIP Devices). In addition, the
SIP Device can be controlled from the Map Window (if the SIP Device is located on the Map and the
SIP: GUI is configured), or via Media Client Camera context menu (if at least one Camera is linked with
the SIP Device).
www.issivs.com
SecurOS 310 Administration Guide
Notification Subsystem
Parameter Description
Note. When using a PBX, the contact format is determined by its settings
and other requirements of the current configuration.
Cameras
Select checkbox to the left from the Camera to link it with the SIP
Device. This allows to quickly show required cameras in Media Client
Name
during the conversation and to make calls on this device from the
Camera cell.
Enter ID of the preset at which this SIP Device is in the view of the
PTZ Camera.
Note. ID of the preset can be found at the PTZ panel of Media Client by
Preset selecting required Camera (see SecurOS Quick User Guide). Camera will
move to defined preset on incoming calls from this SIP Device, outgoing
calls to it or manually with the help of Show cameras button in the SIP:
GUI window.
www.issivs.com
SecurOS 311 Administration Guide
Notification Subsystem
Parameter Description
The Camera that has the best view of this SIP Device. Primary Camera
Primary camera always shows up in the top left corner of the Media Client when
operator is on the call.
Parameter Description
Specify the object window's top left corner coordinates (X, Y) as well
X, Y, W, H as its width and height (W, H), as percentages of the display's
horizontal and vertical size.
Display Choose the ID of the physical display this object belongs to.
www.issivs.com
SecurOS 312 Administration Guide
Notification Subsystem
Parameter Description
Select the Media Client that the SIP: GUI window will work with.
Media Client This Media Client will be used to display Camera linked with the SIP
Device of interest.
Select the Map Window that the SIP: GUI window will interact with.
Warning! The selected Map Window must be on the same Desktop as the SIP:
GUI window.
SecurOS operator will be able to call SIP Device from the Map
Window;
Map window
SecurOS operator will be able to jump from the Map Window to
the Media Client to view the video from the Cameras linked to the
the SIP Device;
for any interaction with a SIP Device from the SIP: GUI window,
the map will be automatically centered relative to the given SIP
Device (if possible). For more information, see the SecurOS
Quick User Guide.
Ringtone Select this checkbox to enable audio notification for incoming calls.
After the file is selected, its name will be displayed in the field to the
left from the button.
www.issivs.com
SecurOS 313 Administration Guide
Automation Subsystem
12 Automation Subsystem
The automation subsystem provides the means to configure custom reactions to specific events within
the SecurOS network, thus building custom logic within the entire security network.
12.1.1 Schedule
Schedule object represents a time schedule and is used to define activity time for Macros and VB/ JScript
programs (scripts). For each Schedule specify time intervals, days of week, single dates and periods at
which certain actions of macros and scripts will be executed. Schedule rules will be active for the
specified days.
Example. If in the Schedule you select time interval from 8:00:00 AM to 10:00:00 PM and specify Monday and
Wednesday, the event handling rules will be applied from 8:00:00 AM to 10:00:00 PM on Mondays and
Wednesdays.
www.issivs.com
SecurOS 314 Administration Guide
Automation Subsystem
Parameter Description
Add (button) Click this button to add new Time interval to the list.
Remove (button) Click this button to remove selected Time interval from the list.
Time interval setup block (located on the right part of the window)
www.issivs.com
SecurOS 315 Administration Guide
Automation Subsystem
Parameter Description
Specify interval start and end time in the From and To fields.
When specifying time interval the From value can be greater than
the To. In this case two intervals, that are valid for one day, are
actually created within system:
Note. Valid days or periods for this interval are set by the general rules
(see below).
In the Date field select the calendar date of the Time interval
Specific date activity.
www.issivs.com
SecurOS 316 Administration Guide
Automation Subsystem
12.1.2 Macro
Used to define SecurOS system behavior by catching specific system events and generating custom
reactions for those events.
Parameter Description
Tick this checkbox to hide the macro on the Control panel of all
computers in the security network. By default, all macros can be
Hidden
executed manually on Video Servers or Operator Workstations which
belong to the same security zone as the Macro object itself.
www.issivs.com
SecurOS 317 Administration Guide
Automation Subsystem
Parameter Description
Event (table of source events that trigger macro execution, all events are equal in rights and any
single event can trigger the macro).
Choose source object ID. You can select the All value to refer to any
ID
objects of the specified type within the security network.
Inf ormation f ield: name of the object (appears automatically after you
Name
select object type and specific ID).
Actions (table of target objects and actions to perform on them on macro execution; actions are
executed in the order they appear in the table).
Select ID of an object. You can select the All value to refer to any
ID
objects of the specified type within the security network.
Inf ormation f ield: name of the object (appears automatically after you
Name
select object type and specific ID).
Action Warning! For the same object it is not possible to select two identical
Actions even if these Actions have a different set of Parameters. If it is
necessary to transmit several identical commands to the same object, create
several Macro objects.
This object contains the script settings interface as well as the programmer developing interface for
scripting in SecurOS (see SecurOS Programming Guide).
Warning! To control objects located on the Operator Workstation with the help of VB/ JScript program it is
necessary to create it on the Computer, profile of which is used by this Operator Workstation as Operator
Workspace. If Local Environment is used then the VB/ JScript program must be created on the current Computer.
For details see Operator Workstation Profiles.
www.issivs.com
SecurOS 318 Administration Guide
Automation Subsystem
Parameter Description
JScript.
www.issivs.com
SecurOS 319 Administration Guide
Automation Subsystem
Parameter Description
Select schedule from the list (see Schedule section) for scenario
execution (if selected schedule is disabled the program will not be
executed).
Buttons
4. Create script.
5. Check syntax of the created script.
6. Click the OK button to save the created script and close the editor window.
This object is an environment for developing and debugging Node.js scripts for Windows and Linux.
Allows to process Events, manage SecurOS Objects, write a script execution log, etc. For more details on
working with the Module, see the SecurOS Programming Guide.
www.issivs.com
SecurOS 320 Administration Guide
Automation Subsystem
Parameter Description
The flag for enabling the script editing mode. In this mode, the
Stop execution (editor
script will not be executed. To execute the script apply the object
mode)
settings. By default is not selected.
Remote debugger attaching the Stop execution (edition mode) checkbox is selected;
www.issivs.com
SecurOS 321 Administration Guide
Automation Subsystem
Parameter Description
The flag that means the system is waiting for a connection of the
Breakpoint on first
external debugger. Available if the Remote debugger attaching
instruction
checkbox is selected. If deselected, the script will run continuously.
Fill in the text area with the script body itself. For more information,
Script window
see the SecurOS Programming Guide.
4. Create script.
5. Check syntax of the created script.
6. To save and test the created script, click the Apply button.
SecurOS provides the capability to exchange data with external / 3rd party systems. Data exchange is
implemented by the means of a special IIDK (ISS Integration Development Kit) protocol. Using this
data exchange protocol, an external computer/system can be connected to the SecurOS network to
transmit events to the security network and to control the SecurOS.
IIDK Interf ace is a service for external connection to SecurOS via IIDK protocol. Create this object on one
or more computers that will act as IIDK servers (see IIDK Manual for more information).
Note. IIDK Manual is not included into common documentation package and is provided by request.
www.issivs.com
SecurOS 322 Administration Guide
Automation Subsystem
When connecting to SecurOS via IIDK interface, user rights are ignored.
Parameter Description
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
This object is used for transmitting data from an external system to SecurOS. Data is transmitted via
HTTP GET/POST requests.
www.issivs.com
SecurOS 323 Administration Guide
Automation Subsystem
Parameter Description
To transmit data to SecurOS, an external system should send a request to the specified port number of
the HTTP server.
For more information about using HTTP Event Gate, please contact your regional Intelligent Security
Systems representative.
This object implements a program interface for interaction of the SecurOS with an external systems via
HTTP/HTTPS or WebSocket protocols. Using this interface one can do the following:
1. Configure SecurOS partially.
2. Receive information about SecurOS and SecurOS FaceX objects and their states.
3. Subscribe for notification about SecurOS objects events and state changes.
4. Filter events transmitted from the SecurOS to the external system.
5. Control Camera recording.
6. Receive fragments of video archive and separate frames.
7. Receive a list of registered events of the Camera object from the Event Viewer.
8. Create, edit and delete SecurOS User Accounts.
9. Control PTZ.
10.Receive Maps, configured in SecurOS.
11.Run Macros.
www.issivs.com
SecurOS 324 Administration Guide
Automation Subsystem
Parameter Description
SecurOS's port for interaction with external system via HTTP/HTTPS. Range
Port
of values: [1; 65535]. Default value is 8888.
SecurOS's port for interaction with external system via WebSocket. Range of
WebSocket port
values: [1; 65535]. Default value is 8080.
Use HTTPS Select this checkbox if it is necessary interact with SecurOS via HTTPS.
Select one of the Event Filters existing in the system to filter events
Use Event filter
transmitted from the SecurOS to the external system.
Refer to REST API Programming Guide for a detailed explanation of how to configure system and use
the REST API object.
Note. REST API Programming Guide is not included into common documentation package and is provided
by request.
12.2.1 Macros
Macros are used to define the links between the events and system actions. On occurrence of the event
described in the macro command, the predetermined actions are executed automatically. The macro
command can also be launched by an operator manually. Most of the system objects have a list of
corresponding events and reactions.
Note. A detailed description of macros can be found in the SecurOS Programming Guide.
www.issivs.com
SecurOS 325 Administration Guide
Automation Subsystem
Buttons to execute the created Macros are displayed on the system Control Panel (see figure 207).
VB/ JScript programs are a more advanced and versatile (in comparison with macros) way to handle
event/reaction logic in the system.
Note. A detailed description of VB/JScript programs can be found in the SecurOS Programming Guide.
www.issivs.com
SecurOS 326 Administration Guide
Computer Vision
13 Computer Vision
For Windows OS the functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium.
The Computer Vision subsystem of SecurOS makes the security system operator aware of potentially
dangerous situations that are, for example, a person or vehicle intersecting a perimeter of a restricted
area; a suspicious behavior of a person near a parked car; a crowd of people near a secure area or office
buildings, etc.
In SecurOS, this subsystem is represented by the Computer Vision object which consists both of plugins,
that include built-in detectors, and independent detectors.
1. Minimum allowed frame resolution is 320x240 pixels. Maximum resolution is not limited, because
the initial frame is reduced to one of the following sizes: CIF or D1 (is specified in the tracker
common settings).
2. Minimum FPS value: 15 frames per second. FPS of the video stream must be stable, otherwise
correct working of the detectors is not guaranteed.
3. Linear sizes of the detected and tracked object should not be less than 5-10% of the frame size. For
example, if frame size is 640x480 then human sizes should be ~24x32 pixels.
4. Maximum linear sizes of the detected objects should not be greater than 40% of frame size.
5. For best performance of the detector, the illumination in the scene should be sufficient and even. In
other words, the constellation of the parameters of the camera sensitivity, light sources, reflective
ability of the background surfaces and also camera position relative to the natural or artificial sources
of light and shadow-forming obstacles must provide uniform illumination of the entire observed
scene with minimum noise in the video image. If the video analytics detector is required to operate in
the dark, it is necessary to provide an adequate level of artificial lighting, and avoid such angles
and/or areas of video analysis, where significant glare from vehicle headlights, illuminated
advertising boards, etc., are possible.
6. When mounting cameras it is necessary to avoid camera view angles, which cause overlapping of
some moving objects (people, vehicles, etc.) by other moving or static ones (trees, architectural
objects, etc.).
7. Also you should avoid placing cameras in front of light sources (avoid backlight). If these
requirements are not met, the images provided by the camera are not applicable both for visual
www.issivs.com
SecurOS 327 Administration Guide
Computer Vision
analysis by the operator and for processing by the video analytics detectors.
8. It is necessary to avoid strong shadows. Otherwise the influence of the shadows must be minimized
by installing additional source of light.
9. If possible, you should avoid the appearance of trees and other verdure, as well as water surfaces in a
frame, or to ensure that such zones of the video frame can be masked out to ignore them by the video
analytics system.
10.The camera must be firmly and rigidly fastened. One should avoid the presence of oscillations and
vibrations or minimize their amplitude.
11.The video analytics algorithms are usually designed to work with fixed cameras. Working with PTZ
cameras is possible only using one concrete preset for which a video analytics detector has been
configured. False positives are possible if the camera moves from this preset to another position (for
example, when rotating/scaling image by operator or when moving to another preset).
12.It is recommended to switch off the automatic white balance, auto iris and auto gain functions in the
camera settings, especially for complex and unstable scenes. Otherwise, hard changes of the image
which will cause false positives detector triggering may occur when fine tuning camera for the
current scene is performed.
To prepare the built-in detectors for operation, follow the steps described in the sections:
1. Selecting a Video Stream for Analytics.
2. Configuring Tracking Kit III Plugin.
3. Configuring Built-in Video Analytics Detectors.
To prepare the independent detectors for operation, follow the steps described in the sections:
1. Selecting a Video Stream for Analytics.
2. Configuring Independent Video Analytics Detectors.
All detectors (built-in and independent), child to any Camera from the Camera Tree, will use the same
video stream incoming from this Camera for analysis. If the Camera is multi-threaded, the stream for
analysis can be selected in its settings (see Figure 208).
www.issivs.com
SecurOS 328 Administration Guide
Computer Vision
Note. If there are a lot of Cameras in the tree, specify a part of camera name or ID in the Search by Camera
name and ID field to find a required Camera. Only Cameras which names or identifiers comply with specified
search conditions will be displayed in the tree.
2. In the lower right corner of the window, in the Cameras settings block, set the value of the Analytics
video stream parameter.
The Analytics video stream parameter of each Camera contains the following values:
www.issivs.com
SecurOS 329 Administration Guide
Computer Vision
Each of the available video streams can be selected if it is defined in the Camera object settings
(see Recording Tab). With multiple streams available it is possible to select the one that is most suitable
for analytics tasks of this Camera.
Note. If the camera does not support multi-streaming, the plug-in detectors will use the only available video
stream regardless of the value selected in the Analytics video stream parameter.
The Tracking Kit III plugin represents a container integrated into SecurOS, consisting of the following
video analytics detectors:
Running detector — is designed to detect people moving at a speed exceeding a predefined value.
Left behind and Removed object detector — is designed to detect left behind and removed objects.
Loitering detector — is designed to detect people moving within a controlled area during a long
time period.
Crowd detector — is designed to detect potentially dangerous groups of people.
Intrusion detector — is designed to detect objects that intersect the perimeter of a restricted area.
Object counter — is designed to detect objects that intersect a control line in opposite directions.
Line crossing detector — is designed to detect objects that intersect a control line.
Dwell time detector — is designed to provide statistical data on the long/short-term stay of people
in a particular place.
Wrong direction detector — is designed to detect movement in the forbidden direction.
The settings of the plugin and built-in detectors are described in the following sections:
Configuring Tracking Kit III Plugin.
Configuring Built-in Video Analytics Detectors.
Within SecurOS a separate instance of the Tracking Kit III plugin, that configured independently,
corresponds to each Camera. When configuring plugin the parameters, influencing the work of each
video analytics detector that is a part of the plugin, are specified.
www.issivs.com
SecurOS 330 Administration Guide
Computer Vision
2. Specify required parameters in the Scene, Tracker, Classification and Forensic search tabs.
3. To apply new settings click the Apply button or the OK button.
Note. Event table, located on the bottom left of the window, is informational only. Data is displayed in the
table only in case one or several detectors are selected to work with Camera (see Configuring Built-in Video
Analytics Detectors).
This tab is used to configure the parameters of the frame that will be analyzed.
www.issivs.com
SecurOS 331 Administration Guide
Computer Vision
Warning! When using PTZ camera, an algorithm performance will be correct only if that camera preset is
used, for which the detector settings will be performed.
Object size limits — this parameter is used to specify the range of sizes of objects moving within
the scene to be detected and tracked. The more precise set values correspond to real objects size, the
higher will be the tracking quality. To set objects sizes click the Edit button and specify required
sizes with the help of mouse (see Figure 211).
www.issivs.com
SecurOS 332 Administration Guide
Computer Vision
Enable Perspective — this parameter allows to simulate 3D scene on the base of 2D frame and sizes
of objects near the Camera and in perspective. To enable perspective select checkbox, then click the
Edit button and specify sizes of an object near and far from Camera with the help of mouse
(see Figure 213).
Warning! It is necessary to enable Perspective when using the Running Detector and Crowd Detector. In
other cases perspective setup can improve tracking quality.
Limit tracking area — this parameter allows to limit tracking area for the objects in the scene. Limiting
tracking area may significantly reduce CPU consumption, but one should be particularly attentive and
responsible when decreasing area size. To limit tracking area select the checkbox and set the tracking
area using mouse (see Figure 213). After accepting settings controlled area will be decreased. In settings
window the ignore area (within this area object tracking is not performed) will be shaded (see
Figure 214).
www.issivs.com
SecurOS 333 Administration Guide
Computer Vision
www.issivs.com
SecurOS 334 Administration Guide
Computer Vision
This tab is used to configure the parameters of the tracker used for the analysis of the frame.
Video resolution — this parameter sets the resolution of the frame to be analyzed, to which the
initial resolution of the video stream will be reduced to. In general, the greater the resolution, the
more objects of smaller sizes can be detected. However, the increase in resolution can decrease
overall system performance. Recommended value is 320x240 which is minimally sufficient for use
of detection algorithms. If this resolution is selected to use then it is also recommended to enable
advanced algorithms for foreground extraction and object tracking (the Use advanced algorithm
for foreground extraction and Use advanced algorithm for object tracking parameters). The
320x240 resolution is also optimal if requirements described in the General Recommendations on
Camera Configuration and Location are complied.
Additional Info
For example, the 640x480 resolution (with no advanced algorithms usage) can be used if it necessary to detect
small objects. By performance this settings configuration can be compared with configuration that uses the
320x240 resolution and advanced algorithms for foreground extraction and object tracking.
www.issivs.com
SecurOS 335 Administration Guide
Computer Vision
Use advanced algorithm for foreground extraction — select this checkbox to use advanced
algorithm for foreground extraction. Use of advanced algorithm for foreground extraction allows to
increase the accuracy of the detection of the moving object, but, at the same time, decreases general
system performance. This parameter is recommended to use if specified Resolution is 320x240.
Use advanced algorithm for object tracking — select this checkbox to use advanced algorithm for
object tracking. Use of advanced algorithm of object tracking allows to increase the accuracy of the
separation of the moving objects and reduce possibility of the tracking error when objects'
trajectories are crossing or objects are overlapped by each other. This parameter is recommended to
use if specified Resolution is 320x240.
Stop tracking stationary objects after — select this checkbox to avoid processing of the objects
motionless during specified time period. When specified time period is expired, all entities, earlier
detected as an objects, will be considered as a background and will not be processed by detection
and tracking algorithms.
Stop tracking false positives after — select this checkbox to exclude an imaginary objects from
processing. Imaginary object refers to an entity, that can not be classified both object and
background. For example, stopped car, earlier detected as an object, leave parking in a few minute's
time. As a result, there will be an "empty" area on the frame, that will be considered as an
imaginary object.
This tab is used to configure general parameters of the classification algorithm, that will be applied to
all classes of the objects to be detected. Class of object is determined by a combination of its specific
characteristics, that are defined within classification algorithm. SecurOS detector can work with the
following classes of objects or their combinations:
Vehicle;
Animal;
Human;
Vehicle and human.
One can enable the classification mode and select the object class for each detector individually in its
settings. If an object class is selected, then detector will only track objects of this class, which reduces
the detector loading and improves the detection quality.
Warning! Minimum and maximum sizes of the object should be within the range of the detected object sizes,
specified in the Scene tab.
www.issivs.com
SecurOS 336 Administration Guide
Computer Vision
www.issivs.com
SecurOS 337 Administration Guide
Computer Vision
Information about using classification algorithms by different detectors is represented in the tab below,
see Figure 216.
This tab is intended for managing the recording of metadata in the SecurOS video archive database
(fsindex). For more information about searching in a video archive using metadata see Forensic
Search.
To save matadata to the database select the Save matadata for forensic search checkbox (deselected by
default).
Note. The checkbox is available if at least one detector has been selected to work with the Camera.
To configure a detector in the Cameras tree select a Camera and select checkbox on the left of the required
detector. Image from the given Camera and selected detector settings will be displayed in the object
settings window (see Figure 218).
www.issivs.com
SecurOS 338 Administration Guide
Computer Vision
Note. Cameras for which at least one detector is selected are highlighted in the Cameras tree in bold.
Correctness of the specified settings can be checked immediately after they are applied. To do this use
the Event table located in the lower left corner of the settings window (see Figure 218). To check the
correctness of the detector settings do the following:
1. Specify and apply all required detector's parameters, controlled zones and detection lines.
Note. It is more convenient to use static frame to draw controlled zones and detection lines. To pause video,
click the button then specify required zones and detection lines. Click the button to play video.
2. Viewing video from the Camera, the operator visually detects a situation which in accordance with
the settings needs to be processed by the detector (e.g., the object crossed the border of the forbidden
zone).
3. If a new entry is added into the Event table each time when such an event occurs, then detectors
settings are considered correct. Otherwise detector settings are considered incorrect and must be
changed.
www.issivs.com
SecurOS 339 Administration Guide
Computer Vision
Warning! Detector operation is affected both by the detector's own settings and the plugin common settings
(see Configuring Tracking Kit III Plugin). If detector's own settings do not allow to achieve the correct
results, then common plugin settings must be changed.
To provide detector operation in system the following controlled zones are used:
Object tracking zone (further Tracking zone) — within this zone only tracking of an object is being
performed. Given zone is shared between all video analytics detectors and can be set in Tracking
Kit III plugin settings on Scene tab.
Event detection zone (further Detection zone) — within this zone analysis of detector activation
conditions is being performed. Given zone is set independently for each detector in its own
settings.
Controlled zone may be formed using rectangles or polygons. In a frame one can define one united
zone composed from number of rectangles and/or their combinations, and not more than 9
independent zones, formed with polygons.
Notes:
1. In plugin settings not more than 9 polygonal zones can be defined.
2. In detector settings not more than 9 polygonal zones or 1 rectangular zone can be defined.
3. When switching mode in detector settings, prior created zones are being deleted.
www.issivs.com
SecurOS 340 Administration Guide
Computer Vision
To decrease zone size press and hold left mouse button and draw one or several rectangles (or their
combinations) within the frame (see figure 220).
www.issivs.com
SecurOS 341 Administration Guide
Computer Vision
Rectangles may overlap each other or stay separated. Number of simple and complex figures is not
limited.
Warning! All rectangles defined in the frame work as a single controlled zone, regardless of their number and
combination.
www.issivs.com
SecurOS 342 Administration Guide
Computer Vision
Notes:
1. In detector settings one can switch drawing mode (Rectangle/Polygon) using the options
In Stretching polygon creating mode place the mouse pointer over any side or node of the original
rectangle (see figure 222).
Move the point to required direction. Form the required shape of the figure, consistently picking points
at figure nodes or sides (ie, see figure 223).
In By clicking point polygon creating mode mouse pointer takes shape like it is shown on figure 224.
www.issivs.com
SecurOS 343 Administration Guide
Computer Vision
Move mouse pointer to required direction and press left mouse button. The first polygon node will be
marked on the frame. To create zone of required shape, consistently repeat mentioned operation several
times (see figure 225).
www.issivs.com
SecurOS 344 Administration Guide
Computer Vision
To finish working with zone double click left mouse button at last created node.
Warning! In a frame up to 9 polygons can be created, and every of them will be counted as individual zone.
Zones will be numbered automatically for more convenience.
Using the context menu, each polygonal zone can be assigned a priority (see Figure 226). Specified
priority will be added to the event comment (see Representation of video analytics detector operation
results). Further event processing can be performed in accordance with event priority and/or zone
priority. A zone with priority 1 is highlighted in green. A zone with priority 10 is highlighted in red.
Other zones are highlighted in intermediate colors according to their priority.
www.issivs.com
SecurOS 345 Administration Guide
Computer Vision
If a person moves in a controlled area with a speed, that exceeds a specified threshold, they are
considered running. The current speed is calculated using the average size of a person in a given point
of a frame, taking into account perspective. The controlled area and speed threshold are the
configurable parameters of the detector.
It is necessary to specify the boundary sizes of objects. To reach the best detector operation quality it is
recommended to use "angle view" camera setting. To minimize false positives, the visual separability of
the moving objects within the frame is required (persons should not overlap each other or move in
heavy traffic).
This detector works only with Human class of objects, that is specified automatically and cannot be
disabled.
www.issivs.com
SecurOS 346 Administration Guide
Computer Vision
Parameter Description
www.issivs.com
SecurOS 347 Administration Guide
Computer Vision
Parameter Description
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Additional neural filter of Note. To provide filter working it is necessary to install the
people OpenVINOServer. For more information contact Intelligent Security
Systems Technical Support Team.
Warning! The Perspective must be configured to use this detector (see Scene Tab).
The detector is intended to identify object left in camera's field of view or removed from it. An item is
considered left behind if it has been separated from another tracked moving object and stayed
motionless within the controlled zone. A removed object is an object that has disappeared from the
camera's field of view. At the same time, to be detected as removed this subject must be considered the
background of the controlled area until the moment of disappearance. Controlled area and operation
mode are configurable parameters of the detector.
Note. An object is considered to be within the controlled zone if the area of the object and controlled zone
crossing is not less than 50% of calculated area of detected object.
Linear sizes of the left behind/removed object should not be less than 5% of frame size. For best
performance of the detector, the overlapping of the objects should be minimal (moving objects should
not overlap object left behind). Thus, the "top view" camera angle is optimal. Perspective view (angle
view) is allowed only when the camera mounting height is sufficient and the camera's optical axis is
directed down with sufficiently sharp angle. At the same time, detection of the left behind/removed
objects is most reliable if the detected object is located near the camera. Objects located far from the
camera can significantly overlap each other.
An essential condition for the reliable operation of the detector is stable and good lighting, which can
be reached, if the camera is installed indoors. If the camera is installed in the street, the number of false
positives can increase.
Lef t behind and Removed object detector settings window is represented in Figure 228.
www.issivs.com
SecurOS 348 Administration Guide
Computer Vision
Figure 228. Left behind and Removed object detector settings window
Parameter Description
www.issivs.com
SecurOS 349 Administration Guide
Computer Vision
Parameter Description
for the left behind objects — the time the object was in the
controlled area from the moment it appeared. In this case, the
object must remain motionless during specified time period;
Minimum object detection
time for the removed objects — the time elapsed after the
disappearance of the object from the controlled area. At the same
time, it is believed that until the moment of disappearance, the
object was a part of the controlled area background.
Warning! If specified parameter value exceeds specified value of the Stop
tracking stationary objects after (see Tracker Tab) an object will not be
detected as left behind.
Loitering is when an object stays within a controlled area for a specified time period. Controlled area
and duration are configurable parameters of the detector. Objects that meet the detection conditions
will be marked with a red frame.
It is also necessary to set the object's minimum and maximum sizes and ensure that there are no objects
in the control zone that can obscure the detected objects. For the best detector performance especially in
complex scenes where the simultaneous presence of a large number of objects is expected it is necessary
to use "top view" camera position. If the number of objects within the scene is known to be not great, it
is also allowable to use perspective camera view (angle view), but only when camera mounting height
is sufficient and camera's optical axis is directed down with sufficiently sharp angle.
www.issivs.com
SecurOS 350 Administration Guide
Computer Vision
Parameter Description
Choose from the list a class of the detected object. Possible values:
www.issivs.com
SecurOS 351 Administration Guide
Computer Vision
Parameter Description
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Intrusion into an controlled area is considered as a movement (traveling or passing) of a tracked object
from outside into the controlled area. The controlled area and type of the object that cause an alarm
(person, vehicle or animal) are adjustable parameters of the detector.
The best performance of the detector is reached if the camera is installed above the controlled area
(camera's angle is "top view") or at an angle to the controlled area ("angle view"). An angle view is
allowed only when the camera mounting height is sufficient and camera's optical axis is directed down
with sufficiently sharp angle. In other words, the camera angle view has to be such that the foreground
objects will not obscure the controlled area.
The number of false positives can be high when there are strong (and, especially, lengthy) shadows as
well as a presence of light reflections (e.g. from car headlights) in the dark.
www.issivs.com
SecurOS 352 Administration Guide
Computer Vision
Parameter Description
www.issivs.com
SecurOS 353 Administration Guide
Computer Vision
Parameter Description
Choose from the list a class of the detected object. Possible values:
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
www.issivs.com
SecurOS 354 Administration Guide
Computer Vision
Parameter Description
In video analytics, a crowd refers to a number of people that are simultaneously located in a controlled
area during a specified time interval. The shape of the controlled area, the number of people and the
time interval are configurable parameters of the detector.
Vehicle traffic within the controlled area is highly undesirable. For best performance of the detector, the
camera should be installed above the controlled area (camera's angle is "top view"). A perspective view
(angle view) is allowed only when the camera install height is sufficient and the camera's optical axis is
directed down with sufficiently sharp angle.
www.issivs.com
SecurOS 355 Administration Guide
Computer Vision
Parameter Description
Warning! The Perspective must be configured to use this detector (see Scene Tab).
www.issivs.com
SecurOS 356 Administration Guide
Computer Vision
This detector is designed to count objects that cross the control line. Counting is performed separately
for the objects that cross the control line in opposite directions. Working with several control lines is
supported. In this case, the counting is performed both separately, for each control line, and in total, for
all detector's control lines.
The best detection quality is reached when using "top view" camera angle. Perspective view (angle
view) is allowed only when camera mounting height is sufficient and camera's optical axis is directed
down with sufficiently sharp angle. The number of objects will be counted correctly only if moving
objects can be visually separated within the frame. In other words, objects should not overlap each
other or be moving in heavy traffic.
Parameter Description
www.issivs.com
SecurOS 357 Administration Guide
Computer Vision
Parameter Description
Choose from the list a class of the detected object. Possible values:
Select this check box if the objects in the frame cannot be visually
Treat a large object as a separated. If this check box is selected, the algorithm for dividing a
group of objects large object into the separate objects will be applied when
calculating the number of objects.
Parameters described below are enabled if the Treat a large object as a group of objects check box
is selected.
Click the button to specify character sizes of the object on the frame.
Character sizes allow to separate "large" objects and all other
detected objects within the frame. If the size of the object in the
frame exceeds the upper limit of the specified range of sizes, such an
Set typical size of the object object will be considered “large”. Character sizes of the object are
specified in the same way as the sizes of the detected object in the
frame are specified (see Scene Tab, the Object size limits
parameter). The range of character sizes of an object should lie
within the range of sizes of detected objects.
When configuring object counter it is necessary to draw one or several Control lines. All objects of the
specified class, that cross a specified Control line, which sizes are within range specified in the global
plugin (see Scene Tab) settings will be detected and counted.
To draw a Control line on the frame image, move mouse pointer to the required point on the frame and
click the left mouse button. Holding mouse button pressed, draw a line in the required direction. A line
will be added onto the frame. Incoming direction will be labeled with directed arrows. Objects that
cross the line in the given direction will be considered "incoming" and "outgoing” in reverse direction.
"Incoming" and "outgoing" objects are counted separately. Number of counted objects of each type will
be displayed in the Comment field of the Event Viewer.
Note. Direction of arrows on the control line depends on how the line is drawn (left-to-right or right-to-left).
www.issivs.com
SecurOS 358 Administration Guide
Computer Vision
To remove a line right click it and select the Remove line command in the context menu.
Note. The last line remaining in the frame can not be deleted.
This detector is designed to count objects that cross the control line. The total number of line crossings
is calculated regardless of the direction of the object movement. Working with several control lines is
supported. In this case, the counting is performed both separately, for each control line, and in total, for
all detector's control lines.
The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.
www.issivs.com
SecurOS 359 Administration Guide
Computer Vision
Parameter Description
Choose from the list a class of the detected object. Possible values:
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
When configuring object counter it is necessary to draw one or several Control lines. All objects of the
specified class, that cross a specified Control line, which sizes are within range specified in the global
plugin (see Scene Tab) settings will be detected and counted.
www.issivs.com
SecurOS 360 Administration Guide
Computer Vision
To draw a Control line on the frame image, move mouse pointer to the required point on the frame and
click the left mouse button. Holding mouse button pressed, draw a line in the required direction. A line
will be added onto the frame. The total number of objects will be displayed in the Comment field of
the Event Viewer.
To remove a line right click it and select the Remove line command in the context menu.
Note. The last line remaining in the frame can not be deleted.
This detector is designed to collect statistics about long/short-term stay of people in a particular place.
Controlled area and threshold of the long/short term staying in the zone are configurable parameters
of the detector. Working with one rectangular or several polygonal zones is supported (for the details
see Configuring Controlled Zone).
The object must be continuously recognized throughout its stay in the zone.
Also the object's minimum and maximum sizes must be specified or it is necessary to ensure that there
are no stopped vehicles within the controlled area. For best detector performance especially in complex
scenes where the simultaneous presence of a large number of people are expected it is necessary to use
"top view" camera position. The number of false positives can be high when there are strong (and,
especially, lengthy) shadows as well as a presence of light reflections (e.g. from car headlights) in the
dark.
The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.
www.issivs.com
SecurOS 361 Administration Guide
Computer Vision
www.issivs.com
SecurOS 362 Administration Guide
Computer Vision
Parameter Description
Set the duration of the object's stay in the zone (in seconds). If this
Short Dwell Duration value is exceeded the object's stay in the zone will be considered
Short-term.
Set the duration of the object's stay in the zone (in seconds). If this
Long Dwell Duration value is exceeded the object's stay in the zone will be considered
Long-term.
When configuring the detector it is necessary to draw one or several Control zones. It is not
recommended to choose large areas. If there are several zones specified then object counting will be
performed independently for each zone.
For successful detector triggering, an accurate determination of the object's trajectory is necessary. The
object must be continuously recognized over a certain time period.
The highest counting accuracy is achieved when contrast between the object and the background is
good enough. When weather is bad and there is water on the asphalt local interference may occur that
interfere with the detection of objects as a result of which the detector may not trigger.
www.issivs.com
SecurOS 363 Administration Guide
Computer Vision
Parameter Description
Specify the deviation sector (in degrees) from the specified vector of
Allowed direction deviation the wrong direction, within which it will be assumed that the object
also moves in the wrong direction.
www.issivs.com
SecurOS 364 Administration Guide
Computer Vision
Parameter Description
Choose from the list a class of the detected object. Possible values:
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Select this checkbox to use additional neural filter. The use of a filter
reduces the number of false alarms of the detector, but increases the
computational load.
Parameters below are enabled only when the Advanced (crowd) Algorithm is used
www.issivs.com
SecurOS 365 Administration Guide
Computer Vision
Parameter Description
When configuring the detector it is necessary to set the vector of the wrong direction of movement and
the angle of deviation within which the direction of movement will also be considered wrong. This
angle deviation is displayed automatically depending on specified value of the Allowed direction
deviation parameter (see Figure 235).
To draw a vector of wrong direction move mouse pointer to the required point on the frame and click
the left mouse button. Holding mouse button pressed, draw a line in the required direction. The line
with arrow, indication the wrong direction, and the deviation sector will be drawn on the frame.
Information about objects moving in wrong direction will be displayed in the Comment field of the
Event Viewer.
This section describes the settings and features of the configuration procedure of the video analytics
detectors, that are independent of Tracking Kit III plugin:
Smoke Detector.
People with no Helmet Detector.
This detector is designed to detect smoke. Controlled area and sensitivity are configurable parameters
of the detector.
In SecurOS a separate instance of Smoke detector corresponds to each Camera. Each detector is configured
independently of the Tracking Kit III plugin and its detectors. To configure detector select the Smoke
detector checkbox in the list of the child objects of the camera is being configured. System will display
detector settings window (see Figure 236).
www.issivs.com
SecurOS 366 Administration Guide
Computer Vision
Parameter Description
Detection area can be limited. Procedure for detection area configuration is described in Configuring
Controlled Zone.
www.issivs.com
SecurOS 367 Administration Guide
Computer Vision
1. Minimum allowed frame resolution is 640x480 pixels. Maximum resolution is not limited in a
whole.
2. Minimum FPS value: 5 fps. FPS of the video stream must be stable otherwise correct working of the
detectors is not guaranteed.
3. Linear sizes of the smoked area should not be less than 10% of frame size.
For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
Working with one rectangular zone is supported (for the details see Configuring Controlled Zone). For
successful detector triggering an object must be continuously recognized throughout its stay in the
Detection zone.
Warning! The detector requires a discrete NVIDIA graphics card. Otherwise, the detector will not work.
In SecurOS a separate instance of People with no helmet detector corresponds to each Camera. Each
detector is configured independently of the Tracking Kit III plugin and its detectors. To configure
detector select the People with no helmet detector checkbox in the list of the child objects of the camera
is being configured. System will display detector settings window (see Figure 237).
www.issivs.com
SecurOS 368 Administration Guide
Computer Vision
Parameter Description
Select from the list the GPU that will be used to determine the
Use GPU
absence of helmets using neural network algorithms.
High speed.
www.issivs.com
SecurOS 369 Administration Guide
Computer Vision
Parameter Description
Specify the duration of the period for the helmet presence / absence
analysis. Based on the result of the analysis of this period, an alarm
decision will be made (see the description of the Alarm threshold
parameter).
Detection period
Note. In fact, the algorithm will consider that number of frames that
correspond to a given time interval.
Detection area can be limited. Procedure for detection area configuration is described in Configuring
Controlled Zone. It is also necessary to set the Minimum and Maximum sizes of people in the
Detection zone. The larger the range of values, and the smaller the Minimum size, the more
computational resources are required for the detector.
1. Minimum allowed frame resolution is 1920x1080 pixels. Maximum resolution is not limited.
2. Minimum FPS value: 12 fps. FPS of the video stream must be stable otherwise correct working of
the detectors is not guaranteed.
3. Camera inclination angle: 30 — 70°.
www.issivs.com
SecurOS 370 Administration Guide
Computer Vision
4. The minimum size of a person must be at least 10% in height from the frame size.
For other recommendations on setting up and positioning cameras, see General Recommendations on
Camera Configuration and Location.
Note. If not set, then default value that matches the detector name is used.
If necessary, operator can react to detection event. For example, one can switch from Event Viewer
window to Media Client or send an Emergency ticket to Emergency service (see SecurOS Quick User
Guide).
www.issivs.com
SecurOS 371 Administration Guide
Monitoring & Control Center
On Linux platform (available only for SecurOS Enterprise edition) the functionality is limited.
SecurOS MCC Edition allows to build a common regional Monitoring & Control Center that can work
with several territorially separated security systems.
Note. Further the SecurOS Monitoring & Control Center will be referred as a Monitoring Center.
There are three types of the Monitoring Center, that differ by the method of the connection to the Remote
system:
SecurOS MCC Direct Connect — direct connection.
SecurOS MCC VC Connect — connection via Video Concentrator (further will be referred to as VC-
connection).
SecurOS MCC VR Connect — connection via Video Repeater (further will be referred to as VR-
connection).
Warning! Correct work of the SecurOS MCC is guaranteed if version number of SecurOS, installed in the
Remote system, is equal or less than SecurOS MCC version number. At the same time, version compatibility is
limited. For more information contact Intelligent Security Systems Technical Support Team.
VC-connection must be used when both no integration with SecurOS Auto is required and one of the
following is required:
interaction with the Remote system, where version of the installed SecurOS software is below 9.1.
video gate feature is desirable.
Note. When video gate feature is used, then each video stream queried from the Remote system is transmitted
to the Monitoring Center only once, regardless of how many users of that video stream are in the Monitoring
Center.
VR-connection must be used when no integration with SecurOS Auto is required and video stream from
cameras of the Remote system must be recorded locally in the Monitoring Center.
Direct connection must be used in all other cases, including video gate feature.
Working with remote objects is only possible when the Remote system configurations are downloaded
into the SecurOS MCC. Features of the configuration downloading procedure are described in the
Direct Connection and VC/ VR-connection sections.
Different types of connection can be used in the same SecurOS MCC server both separately and
simultaneously, complementing each other in the last case. Features of the Monitoring Center for
different connection types are described in Table 91.
www.issivs.com
SecurOS 372 Administration Guide
Monitoring & Control Center
Table 91. Features of the SecurOS MCC for different connection types
Connection type
SecurOS MCC Features
Direct VC VR
SecurOS Xpress
SecurOS Professional
SecurOS Premium
SecurOS Enterprise
below 9.1
SecurOS Auto
Working with Remote System Cameras with the Help of Media Client
Multi-Streaming Support
Video Gate
www.issivs.com
SecurOS 373 Administration Guide
Monitoring & Control Center
Digital Zoom
Wiper Control
Exporting Frames
PTZ Control
Searching Bookmark
Searching Alarms
Smart Search
Working with Remote System Microphones with the Help of Media Client
www.issivs.com
SecurOS 374 Administration Guide
Monitoring & Control Center
Working with Remote System Events with the Help of Emergency Service
Working with Remote System Events with the Help of Event Viewer
Monitoring Events
Filtering Events
Working with Remote System Objects with the Help of Other Interface Subsystem Objects
www.issivs.com
SecurOS 375 Administration Guide
Monitoring & Control Center
14.1.1 Limitations
There are a few limitations that ensure correct operation of the Monitoring Center when direct
connection is used:
1. Versions of the SecurOS MCC and SecurOS installed in the Remote systems should not be lower, than
9.1.
2. Regional settings, specified in the operation system parameters, should be the same on the
SecurOS MCC's servers and Remote systems SecurOS's servers.
3. Intelligent Modules installed in the Remote system must also be installed in the SecurOS MCC.
Note. Setting up procedure can be performed on any computer where SecurOS MCC is installed.
1. In the configuration of the Remote system open the System object settings window. Select the Allow
access checkbox and specify access password to this Remote system from the Monitoring Center.
2. In the configuration of the SecurOS MCC in the Object Tree select the Video Server, then create and
configure the MCC DC Gateway child object.
3. In the configuration of the SecurOS MCC in the Object Tree create and configure the Remote system
object, including access password to connect to the Remote system.
Warning!
1. Only SecurOS MCC's superuser (see SecurOS Users) can create and configure the Remote system
object.
2. If it is necessary to limit number of messages transmitted to the Monitoring Center from the Remote
system, choose the preliminary created Event Filter in the object settings.
4. In the User Rights object settings specify the required access rights to the Cameras of the Remote
www.issivs.com
SecurOS 376 Administration Guide
Monitoring & Control Center
Note. By default, after downloading the configuration to the Monitoring Center, operator does not have access
to the Remote system object and all children objects.
When configuration is downloaded, the separate Objects Visibility Tree for each connected Remote system
is created in the Monitoring Center's server. This tree is located on the same hierarchy level as the
Monitoring Center's System object (see Figure 238). Only the following objects of the Remote system are
displayed in the Objects Visibility Tree:
1. Databases;
2. Computers;
3. Cameras;
4. Microphones;
5. Zones;
6. Sensors;
7. Relays;
8. Archivers;
9. Emergency services;
10.SIP Devices.
Note. "Visibility" of the Remote system's objects in the SecurOS MCC means the possibility of direct interaction
with these objects. In this case, the operator's access to the settings and other operations with these objects in
the Object Tree (Disable/Rename/Delete) is prohibited.
www.issivs.com
SecurOS 377 Administration Guide
Monitoring & Control Center
Figure 238. Configuration of the Remote system displayed in the Monitoring Center's Object Tree
www.issivs.com
SecurOS 378 Administration Guide
Monitoring & Control Center
The object is intended for assigning several SecurOS Video Servers the role of the Remote system
gateways. When using the video gate feature only one video stream will be requested from the Remote
system regardless of the number of the consumers of this stream in the SecurOS MCC. Thus, the use of
the video gate feature allows significantly reduce the network traffic. Use of several Video Servers as
gateways allows to dynamically distribute the load between dedicated servers when transmitting data
sent by the remote system to SecurOS.
Parameter Description
Tree of Computers with the Video Server role that exist within the
SecurOS network. All Video Servers existing in the system are
grouped in relation to the Security Zones.
To add a Video Server into the list of the gateways select the
Object Tree appropriate checkbox to the left of the Video Server object.
Note. The Video Server that is the parent of the configured MCC DC
Gateway object is marked in the list in gray. Such Video Server cannot be
deleted from the gateways list.
www.issivs.com
SecurOS 379 Administration Guide
Monitoring & Control Center
To distribute the load, the module requests the current load from each of the specified Video Servers.
Then, based on the information received, it connects the client that requests the video to the least
loaded Video Server.
Object provides connection of the Monitoring Center to the Remote SecurOS security system. In addition,
the object provides the video gate feature for the live video stream and the translation of the IP
addresses of objects of the Remote system.
www.issivs.com
SecurOS 380 Administration Guide
Monitoring & Control Center
Parameter Description
Configuration Server Specify the IP address of the Conf iguration Server of the SecurOS
address Remote system.
www.issivs.com
SecurOS 381 Administration Guide
Monitoring & Control Center
Parameter Description
Select from the list the EdgeStorage Gate that will be used to view
the archives of Remote Systems stored on external devices.
EdgeStorage Gate to work EdgeStorage Gate is used in cases when there is no direct access from
with archives from external the SecurOS Operator's Workstations to those Video Servers of the
system Remote Systems whose archives are stored on external devices.
Warning! On Linux platform (available only for SecurOS Enterprise edition)
the functionality is not supported.
When working with SecurOS Auto operator of the Monitoring Center can get access to the results of the
license plate recognition, that is performed in the Remote system. For this, configure Monitoring Center as
follows (see Figure 241):
Note. On the figure in the SecurOS MCC Object Tree some Object groups are removed.
www.issivs.com
SecurOS 382 Administration Guide
Monitoring & Control Center
Figure 241. Monitoring Center Object Tree to work with remote SecurOS Auto
www.issivs.com
SecurOS 383 Administration Guide
Monitoring & Control Center
3. Check a possibility to connect to the SecurOS Auto database in the Remote system: network routing
rules and PostgreSQL RDBMS configuration files postgresql.conf and pg_hba.conf
(see SecurOS Auto User Guide).
4. In case, if local IP address of the SecurOS Auto remote database server differs from the public one,
specify public IP address of the server in the Remote system object settings (see Figure 243). In
example below this is the REMOTEAUTO: auto and REMOTEAUTO:ext databases.
www.issivs.com
SecurOS 384 Administration Guide
Monitoring & Control Center
14.2 VC/VR-connection
When using VC/VR-connection then the intermediary object created in the SecurOS — Concentrator or
Repeater is used to work with Remote system's Cameras. In this case Monitoring Center can work both with
remote and local archives.
When using VC-connection of the Monitoring Center then video stream from Remote system's Camera is
available only in viewing mode. Monitoring Centrer can access archive recorded on the Remote system's
server.
When using VR-connection of the Monitoring Center then video stream from Remote system's Camera is
available both in viewing an recording mode. Archive of the Remote system's Camera can be recorded
locally on the Monitoring Center's server. Access to the video archive created directly on the remote
system's Camera is denied.
In other words, when VR-connection is used a Monitoring Center allows the operator to control video
streams, coming from the remote server's Cameras in the same way as if they were set within the local
SecurOS security network.
For the VR-connection the main requirement is the availability of the TCP/IP channel with large
carrying capacity. When VC-connection is used a performance of the Monitoring Center mainly depends
on the hardware of the server on which it is deployed (see Video Server System Requirements).
Setting up the SecurOS MCC for each case is described in appropriate section:
Setting Up VC-connection of the Monitoring Center to Work with Remote Archives.
Setting Up VR-connection of the Monitoring Center to Work with Local Archives.
Warning! To update configuration, it is necessary that the Server IP address parameter was set in the each
Video Server of the Remote system. Otherwise an error message is displayed.
The following objects will be created in the Object tree of the SecurOS MCC after configuration is
downloaded (see Figure 244):
1. Proxy-computers - "copies" of all of the Computer objects existing within the remote security system.
These objects are children to the Remote system object. Names of these objects will be in the
following format: <Remote system Name>:<Computer Name>.
2. Video Capture Devices with ISS Video Concentrator device type (see Video Capture Device),
related to remote Video Servers. IP address parameter of the Video Capture Device will possess the IP
address of the appropriate remote server. All created objects are children of the Monitoring Center's
Video Server and have names of the following format: <Remote system Name>:<Remote
Computer Name>.
3. Cameras, which will correspond to the Cameras existing on the remote server. Cameras have names of
www.issivs.com
SecurOS 385 Administration Guide
Monitoring & Control Center
Note. No Motion Detection Zones are created for the Cameras downloaded from the Remote system.
Figure 244. Configuration of the Remote system displayed in the Monitoring Center's Object Tree
Note. On the figure in the SecurOS MCC Object Tree some Object groups are removed.
www.issivs.com
SecurOS 386 Administration Guide
Monitoring & Control Center
After Video Capture Device type is changed it allows the operator to work with Cameras of the remote
servers in the same way as if they were set within the local SecurOS network.
In any type of connection the operator of the Monitoring Center will have the opportunity to monitor the
events generated by remote Camera or Computer with the help of the Map Window, Media Client and
Event Viewer.
Parameter Description
Integration settings
www.issivs.com
SecurOS 387 Administration Guide
Monitoring & Control Center
Parameter Description
Select this checkbox to import Cameras and keep the IDs, assigned to
Use remote Camera IDs
the objects in remote system.
Monitoring center agent is used to connect Monitoring Center to the Remote system.
www.issivs.com
SecurOS 388 Administration Guide
Monitoring & Control Center
Parameter Description
Connection settings
Allow connections from the Check this box to allow only Computers with listed IP addresses to
following IP addresses only connect to security system. Optional parameter.
www.issivs.com
SecurOS 389 Administration Guide
Redundancy
15 Redundancy
This sections describes methods to provide SecurOS servers redundancy. There are two such methods:
Failover Cluster.
Redundant Servers Cluster.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
In order to provide additional reliability of SecurOS security network and to simplify hardware
upgrade process, Video Servers could be integrated into failover cluster. Failover cluster represents the
group of computers that is able to sustain servers malfunction with help of backup servers.
Note. Independent Video Server represents physical computer with fixed IP address and SecurOS software
installed but it is not a member of cluster and can be found in Object Tree. SecurOS configuration may include
both independent Video Servers and Nodes at the same time.
Warning! When cluster is implemented SecurOS Conf iguration Server role is assigned to one of cluster Hosts.
www.issivs.com
SecurOS 390 Administration Guide
Redundancy
If the failed Host restores at the moment when all Nodes are already allocated, it switches itself to
backup state. Conf iguration Server role can also be automatically assigned to other Host if needed. Such
behavior can be changed with help of service mode (see Service mode).
Conf iguration Server role can be assigned both the active and backup hosts.
Cluster keeps working while its Hosts (both operating and backup ones) maintain the quorum state.
Quorum state exists while more than the half of all Hosts are online.
Quorum loss
The loss of the quorum within the cluster causes the following consequences:
All Hosts, including those that have remained operational, will not be able to function. Whole
cluster will stop operating and will be waiting for quorum state restoration (see Resolving
Common Issues). This situation will not affect those Video Servers in SecurOS configuration that are
not members of the cluster.
Note. Such behavior is typical for most cluster structures and is not a feature of SecurOS.
www.issivs.com
SecurOS 391 Administration Guide
Redundancy
Example
In following configurations the quorum state loss will happen if:
Cluster of 2 Hosts. Quorum will be lost, if one Host will failed (see Redundant Servers Cluster
section that describes how to create effective cluster consisting of two Hosts).
Cluster of 3 Hosts. Quorum state will be lost if 2 Hosts fail.
Cluster of 4 Hosts. Quorum state will be lost if 2 Hosts fail.
Cluster of 5 Hosts. Quorum state will be lost if 3 Hosts fail.
Behavior of the system in states of quorum loss and restoration is provided on figure 248.
Fig. 248. Quorum loss and restoration for configuration of three Hosts
15.1.1.3 Recommendations
It is recommended to use isolated network interface for server communication (see Changing Network
Interface for Virtual IP Addresses).
It is recommended to use centralized data storage. To store video data one may use shared folders
(access by CIFS (SMB) protocol) or iSCSI drive. For other data one may use iSCSI storage (see iSCSI
Drive).
Warning! To provide interaction of the Host within cluster it is necessary to ensure the availability of the
network ports (see Appendix E. Network Ports Used in SecurOS).
For working with cluster it is recommended to use the Server Manager utility. It has a user-friendly
graphical interface that allows to perform all necessary operations with the cluster and monitor its
work in real time.
To configure and control the cluster alternatively one can use clustercli.exe console utility, that is
located in SecurOS root directory.
www.issivs.com
SecurOS 392 Administration Guide
Redundancy
Operations of creating and configuring cluster from the command prompt are described in following
sections:
Creating Cluster;
Creating Cluster in Existing SecurOS Configuration;
Creating Cluster and SecurOS Configuration From the Scratch;
Getting Current Cluster Configuration;
Creating Security Zone;
Adding Host;
Removing Host;
Switching to Video Server Mode;
Adding Node;
Removing Node;
Getting Node List;
Setting Preferred Host for the Node;
Moving Node to the Host Manually;
Recreating Cluster;
Restoring SecurOS Configuration from File;
Setting Configuration Server;
Converting Independent Video Server to Cluster Node;
Service Mode;
Changing Network Interface for Virtual IP Addresses;
Setting Up Time Intervals.
where:
heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;
Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).
config_server_virt_ip – virtual IP address, which the Conf iguration Server will be available at.
www.issivs.com
SecurOS 393 Administration Guide
Redundancy
This address must be unique in local area network and will be assigned to the network interface on
a Host that will play role of Conf iguration Server. In case of such Host failure this IP address may
migrate to other Hosts.
After successful command execution the cluster will be ready to start operation. It will consist from one
Host, that is also a Conf iguration Server.
Warning! If the command was executed not on current SecurOS Conf iguration Server, then at this moment
there are two competing configurations. The elimination of this problem is described in details in the Creating
Cluster in Existing SecurOS Configuration. Example.
Depending on whether there is an existed SecurOS configuration on computers being added to cluster,
next steps differ. See details in following section:
Creating Cluster in Existing SecurOS Configuration;
Creating Cluster and SecurOS Configuration From the Scratch.
Detailed process of how to create cluster when there is no configuration yet is described in section
Creating and setting up cluster example.
Clustercli.exe state
www.issivs.com
SecurOS 394 Administration Guide
Redundancy
Note. Configuration revision is a number that matches the count of changes made in this configuration.
Warning! In case of quorum loss state (see Cluster Operation. Quorum) it is unable to check cluster state.
www.issivs.com
SecurOS 395 Administration Guide
Redundancy
where:
zone_id – Security Zone ID.
where:
heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;
Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).
Warning! Entering wrong or not available IP address as this_real_ip parameter may cause quorum loss
(see Resolving Common Issues).
After executing command SecurOS service will restart and after that it will be working in cluster Host
mode.
Warning! If the computer that is being added to the cluster stores any SecurOS configuration it will be
overwritten.
where:
host_to_remove_ip – IP address of the Host, that must be removed from cluster;
other_host_ip – IP address of one of cluster Hosts.
www.issivs.com
SecurOS 396 Administration Guide
Redundancy
Note. To return computer to regular mode it is not enough only to remove it from cluster. It must be also
switched to Video Server mode (see Switching to Video Server mode).
where:
[-f] – optional parameter for forced execution.
In case if first step can not be executed, for example, due to quorum loss (see Cluster Operation.
Quorum), the second step will not be executed. If it is needed to switch computer to Video Server mode
anyway, skip the first step. To do this use -f parameter, that allows to perform forced command
execution.
where:
node_name – name and ID of the Node to be created;
node_virt_ip – virtual IP address, which the Node will be available at. This address must be
vacant in local area network and unique;
zone_id – ID of Security Zone, which is parent to the Node.
Note. Unlike independent Video Servers, ID of a Node does not have to match computer's domain name, that it
will be running on.
A new Nodes also can be added via SecurOS Object Tree. To do this perform the following steps:
1. Connect to the working Node using client application (see Connecting Operator Workstations to the
Cluster Servers).
2. In the configuration create Computer object that has Video Server role.
3. In settings of this Computer object tick the Enable failover of the Video server and add to the cluster
checkbox.
4. Enter virtual IP address of the Node into the IP address field.
Virtual IP address is now assigned to the Node and it will be available at this address despite of what
Host it is running on.
www.issivs.com
SecurOS 397 Administration Guide
Redundancy
where:
node_name – ID of the Node to be deleted.
Warning! Removing the Node results into deleting all Cameras and other child objects as well.
List of all Nodes with ID and virtual IP address for each will be displayed.
where:
node_name – name of the Node, which the preferred Host is being set for;
host_name – name of the Host, that will become preferred for specified Node.
Note. To cancel Host's priority for the Node, execute command with empty pref_host parameter value. For
example, Clustercli.exe node set Node_1 pref_host=.
Nodes that have preferred Hosts fall under the following rules:
1. Node will be trying to take its preferred Host at the earliest opportunity.
2. If any Host is set to be preferred for several Nodes at one moment, the one that will take it will be
selected automatically. Thus it can not be displaced from this Host automatically.
3. When setting up preferred Host for a Node it will immediately replace the Node currently running on
the Host (if current Node is not running on preferred Host). The displaced Node will take first vacant
Host if there are any.
www.issivs.com
SecurOS 398 Administration Guide
Redundancy
where:
node_name – ID of the Node to be moved;
host_name – name of the Host that will run specified Node;
Process of manual moving the Node to a Host falls under the following rules:
1. If there is another Node running on specified Host already, it will be displaced.
2. If the displaced Node was the one, for which that Host is set to be preferred, further behavior will be
determined by rules for Nodes with preferences.
Note. It is not recommended to use manual Node transfering to configure cluster. Proper setup of Nodes
preferences allow to achieve better results (see Setting Preferred Host for the Node).
where:
heartbeat_nic – given computer's IP address, at which it will be available for data exchange
with other Hosts;
virtual_ip_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;
Note. If computer has only one network adapter, you must duplicate the value of the heartbeat_nic
parameter. This address can be changed further with the help of separate command (see Changing Network
Interface for Virtual IP Addresses).
config_server_virt_ip – virtual IP address, which the Conf iguration Server will be available at.
This address must be unique in local area network and will be assigned to the network interface on
a Host that will play role of Conf iguration Server. In case of such Host failure this IP address may
migrate to other Hosts.
After executing this command cluster will contain only one Host. Other hosts must be added to cluster
again (see Adding Host).
Note. Recreating cluster is a way to solve the quorum loss problem (see Resolving Common Issues).
www.issivs.com
SecurOS 399 Administration Guide
Redundancy
where:
path_to_file – absolute or relative path to file with saved configuration.
Note. When executing this command cluster Hosts list is not restored. If necessary, hosts must be added to the
cluster manually (see Adding Host).
Warning!
1. For restoring it is recommended to use the copy of the configuration file that corresponds to the
currently installed version of SecurOS. When restoring configuration from files of other versions,
correct operation of SecurOS is not guaranteed.
2. Configuration backup file is stored on the Host that was in Conf iguration Server role at the moment of
command execution.
3. The current password of the superuser (see SecurOS Users) will not be changed after restoring the
configuration.
where:
new_cs_host – name of the Host that will be set as new Conf iguration Server.
Notes:
1. In case when Host set to be a Conf iguration Server fails, new Conf iguration Server will be assigned
automatically. Such behavior can be changed with help of service mode (see Service Mode).
2. Conf iguration Server role can be assigned only to cluster member.
where:
videoserver_id – ID of the Video Server in SecurOS Object tree that required to be converted into
a Node;
www.issivs.com
SecurOS 400 Administration Guide
Redundancy
Note. Same command may be used for changing virtual IP address of existed Node.
where:
service_mode_name – type of service mode:
fixed_cs – fixed Conf iguration Server;
fixed_all – full fixation.
This command removes current service mode value so Nodes and Conf iguration Server role will start to
transfer automatically again.
To change network interface, to which you want to assign virtual IP addresses, execute the following
command:
where:
ip_address – IP address of network interface on this computer, which virtual IP addresses will be
assigned to.
www.issivs.com
SecurOS 401 Administration Guide
Redundancy
Warning!
1. The following fine tuning commands can be performed only after agreement with the Intelligent
Security Systems Technical Support Team. Otherwise, Intelligent Security Systems is not responsible
for the correct functioning of the cluster.
2. It is strongly not recommended to use these commands if cluster operates normally.
This section describes the following commands for fine tuning the cluster:
set quorum_timeout — setting the interval for pinging with other Hosts in the cluster.
set heartbeat_interval election_timeout — setting the interval for checking the heartbit of the
cluster leader and the period for electing a new cluster leader if the current one is unavailable.
Note. The current values of all of the following parameters can be obtained using the state command.
set quorum_timeout
The check of the connection between the Host of the cluster and other Hosts within the cluster is
performed automatically at a specified interval. By default, this interval is 5 seconds.
where:
<time> – required ping interval (in seconds). Range of values: [5; 300].
where:
<time1> – required heartbit period (in milliseconds). Range of values: [10; 100]. The default
value is 50 ms.
<time2> – heartbit timeout (in milliseconds). Also sets the time allotted for one round of election
of a new cluster leader. Range of values: [100; 1000]. The default value is 500 ms.
Warning! Executing this command will restart SecurOS on all Hosts of the cluster! This command should only
be run when all the Hosts of the cluster are online. Otherwise, problems may arise in the functioning of the
cluster.
www.issivs.com
SecurOS 402 Administration Guide
Redundancy
Operator Workstations can connect to the SecurOS servers, that work within cluster. To connect to such
server specify virtual IP address of one of the Nodes in authorization window. If Host fails, the client
application will automatically reconnect to the same Node after it is launched on the new Host.
Note. If there is no Node in cluster yet, use IP address of one of the Hosts to configure SecurOS.
While working with cluster, special attention should be given to video archive and databases storage
organization.
Warning!
1. Versions of Windows OS installed on all Hosts that use iSCSI drives must match.
2. For proper iSCSI drive connection on Windows 10, update your operation system to build 1709 or
above.
3. Each iSCSI drive must contain one partition formatted in NTFS.
4. Simultaneous recording on iSCSI drive may lead to data corruption. To provide additional data
safety it is recommended to use storages with support of iSCSI target connection exclusivity control.
Besides storing video archive iSCSI drives may be used for storing databases. For example,
databases of Event viewer, recognition modules, etc (see Movable PostgreSQL).
Local drives allow to store video archive directly on the cluster's Hosts. Records stored on all Hosts
are available to operator as transparent archive. In case of Host failure, the corresponding part of
the archive will be temporarily unavailable.
Note. Local drives for archive recording can be set on the Host where the Node works (see Advanced Cluster
Host Settings). In this case the archive will be first written on these drives, even if there are other directories
for archive recording specified in the Node own settings.
This type of storage is recommended to use in Redundant Servers Cluster due to its restrictions.
Details of the configuration procedure are described in the Storing Video Archive on the Host's
Local Drives.
www.issivs.com
SecurOS 403 Administration Guide
Redundancy
Warning! Before using iSCSI drive make sure that all Hosts in the cluster are running Windows service
named Microsoft iSCSI Initiator Service and type of run is set to Automatically.
This object is a mediator between SecurOS and Windows iSCSI initiator, that provides credentials to
establish connection. To add iSCSI drive to SecurOS configuration create iSCSI drive object, child of the
Computer object (Node).
Note. To record video archive on the Node one can use only those iSCSI drives, that are child to this Node.
Parameter Description
Get IQN list (button) Press the button to get list of IQN available on the portal.
Use authentication Select this checkbox if there is authentication required on the portal.
www.issivs.com
SecurOS 404 Administration Guide
Redundancy
Parameter Description
Press the button to make sure that connection with selected IQN
works properly. In case if all settings are correct, the Connection
Test connection (button)
established message will appear next to the button. Otherwise the
Connection refused message will appear.
Warning! Using Save space mode when archive recording can negatively affect the data safety on the iSCSI
storage. It is recommended to use Optimal performance mode (see Select archive recording mode).
To record archive on iSCSI drive, one must set it up first (see iSCSI Drive). After that it can be selected
in settings of Computer object. To perform that do the following:
1. Open Computer object settings.
2. Press the Add directory button at the Archive section.
3. Select iSCSI drive option and find required iSCSI drive in the drop-down list.
4. Click the Add button.
Note. Setting up Archiver for storing long-term archive on iSCSI drive can be performed in the same way (see
Archiver).
Parameter Description
www.issivs.com
SecurOS 405 Administration Guide
Redundancy
2. At object settings enter the port at which the database will be available.
One must configure access from outer IP addresses on selected PostgreSQL server.
Notes:
1. postgresql.conf and pg_hba.conf files can be found in %ProgramData%/ISS/
iscsi_drives/[iscsi_drive_id]/pg_data directory.
2. To check remote DB accessibility at Operator Workstation one can use the Test connection button in
the Database object settings window or pgAdmin utility.
3. Connect to the movable database using PGAdmin utility. For connection specify virtual IP address of
the Node, which are parent for the Movable PostgreSQL.
4. Use PGAdmin to create new database.
5. Markup created database with the help of Database Update Utility.
6. Create Database object child to Security Zone object (see Database).
7. Configure the Database object. To do this enter iSCSI drive's parent Node virtual IP address as Host,
and Movable PostgreSQL port value as Port.
Now this Database can be selected in settings of the object it is intended for.
Warning! It is strongly recommended to configure the cluster in that way, so that the preferred Host is
selected for each Node (see Setting Preferred Host for the Node).
To configure Host's local drive to store video archive use the clustercli.exe utility
(see Configuring Cluster). This utility provides the following commands to work with the drives:
Adding Drive;
Removing Drive;
Getting Drive List.
Adding Drive
Note. Writing to the drives that have been added in such way is performed with higher priority than to the
iSCSI drive/network folder specified in the Computer object settings.
To add a Host's drive as a video archive storage execute the following command on the appropriate
Host:
www.issivs.com
SecurOS 406 Administration Guide
Redundancy
where:
drive_letter – drive letter. The following formats are allowed: C:, D:\, E:/.
min_free_space – minimum allowable amount of free disk space in percent. When the amount
of free space is reduced to the specified value, the recording in the "ring" mode will start. Possible
values: [1; 20].
read_write – drive access level. Possible values:
rw – read and write;
r – read only. In the last case one can view an archive existed on this drive, but a new files will
not be recorded.
Note. If the drive marked with specified letter has been already added its settings will be re-written.
As a result of the command execution will be a message about successful or failure drive adding.
Removing Drive
To remove previously added Host's drive execute the following command on the appropriate Host:
where:
drive_letter – drive letter. The following formats are allowed: C:, D:\, E:/.
As a result of the command execution will be a message about successful or failure drive removing.
As a result of the command execution will be a list of drives and their settings.
This section describes main operations for cluster creating and configuring:
Creating Cluster and SecurOS Configuration From the Scratch. Example.
Creating Cluster in Existing SecurOS Configuration. Example.
15.1.5.1 Creating Cluster and SecurOS Configuration From the Scratch. Example
This section describes steps required to create new SecurOS configuration based on cluster.
www.issivs.com
SecurOS 407 Administration Guide
Redundancy
15.1.5.1.1 Task
The task is to create a new SecurOS configuration and cluster. Cluster would consist of three Hosts and
one Operator Workstation for monitoring needs (see Cluster structure). Two Hosts will run Nodes and
one Host would serve as backup one.
15.1.5.1.2 Requirements
To create cluster described above one will need 3 computers with SecurOS installed with Video Server
role, and 1 computer to be an Operator Workstation.
As recommended (see Recommendations), computers that considered to be Hosts must have two
different network interfaces for Hosts communication (connection name, for example, NIC_CLUSTER)
and for Operator Workstation connection (connection name, for example, NIC_VIDEO). Connection
names may differ from specified ones.
For computer that is selected to be an Operator Workstation, one network interface will be enough.
Note. All commands described below must be executed from the command line with Windows administrator
rights.
www.issivs.com
SecurOS 408 Administration Guide
Redundancy
15.1.5.1.4 Steps
Cluster creation procedure consists of the following steps:
1. Creating cluster, Security Zone and Nodes.
2. Adding the second Host.
3. Adding the third Host.
4. Connecting Operator Workstation and further configuration of the SecurOS.
To create cluster do the following with the help of clustercli.exe utility (see Configuring Cluster):
1. Switch to Computer 1 (first Host).
1.1. Create Cluster by executing following command
clustercli.exe create 192.168.0.101 172.16.1.101 172.16.20.1
Cluster will be created. There will be one Host in cluster configuration, that also will be
Conf iguration Server which virtual IP will be 172.16.20.1.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.101) network
interface. Operator Workstations will receive video through that interface.
1.2. Create Security Zone by executing command
clustercli.exe node createzone 1
This Security Zone will have ID 1.
1.3. Create Node by executing following command
clustercli.exe node create node1 172.16.20.101 1
It will start running on the recently created Host. Node will look like Computer object with Video
Server role and ID node1, child to Security Zone with ID 1. Now Computer 1 is a Conf iguration Server
with virtual IP address 172.16.20.1, and it has Node with virtual IP address 172.16.20.101
running on it.
1.4. Create second Node by executing following command
clustercli.exe node create node2 172.16.20.102 1
Second Node is not running right now and is waiting for new Hosts.
2. Switch to Computer 2 (second Host).
2.1. Add Computer 2 to the cluster by executing following command
clustercli.exe join 192.168.0.102 172.16.1.102 192.168.0.101
Now Hosts are connected through NIC_CLUSTER network interface. As soon as this Host added to
the cluster the Node with ID node2 will start running on it.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.102) network
interface.
3. Switch to Computer 3 (third, backup Host).
3.1. Add Computer 3 to the cluster by executing following command
clustercli.exe join 192.168.0.103 172.16.1.103 192.168.0.101
Last Host has joined the cluster. It will serve as backup Host.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.103) network
interface.
3.2. Check cluster state by executing following command on any of cluster members
clustercli.exe state
Cluster state will show that there are three Hosts with two running Nodes.
www.issivs.com
SecurOS 409 Administration Guide
Redundancy
15.1.5.2.1 Task
Transform an existed SecurOS configuration to work in cluster. Current configurations contains two
Video Servers and one Operator Workstation that is used for monitoring. It is planned to use an additional
computer that will be a backup server.
15.1.5.2.2 Requirements
In accordance to recommendations (see Recommendations), each of Video Servers and proposed backup
server must be provided with two network interfaces. One of them will be used to provide interaction
with cluster Hosts (connection name, for example, NIC_CLUSTER), the second one will be used to
connect Operator Workstations (connection name, for example, NIC_VIDEO). Connection names may
differ from specified ones.
For computer that is selected to be an Operator Workstation, one network interface will be enough.
Note. All commands described below must be executed from the command line with Windows administrator
rights.
www.issivs.com
SecurOS 410 Administration Guide
Redundancy
Operator Workstation
Domain name: Operator.
Network interface NIC_VIDEO: 172.16.1.104.
15.1.5.2.4 Steps
Updating SecurOS configuration to work in cluster consists of the following steps:
1. Creating cluster on the Conf iguration Server.
2. Adding the second Video Server to the cluster.
3. Updating old configuration to work in cluster.
4. Adding backup server to the cluster.
5. Connecting Operator Workstation and confirmation of the operation ability.
6. Switch to the use of centralized storage.
Do the following with the help of clustercli.exe utility (see Configuring Cluster):
1. Switch to the Video Server 1 (Configuration Server).
1.1. Create Cluster by executing following command
clustercli.exe create 192.168.0.101 172.16.1.101 172.16.20.1
Cluster will be created. There will be one Host within cluster configuration, that will continue to be
Conf iguration Server. 172.16.20.1 virtual IP address will be used as IP-address of this
Conf iguration Server. SecurOS configuration is saved unchanged.
At this stage the peripheral server will continue to work, having lost the connection with its old
Conf iguration Server. Actually, it will work with its current SecurOS configuration until it is added to
the cluster.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.101) network
interface. Operator Workstations will receive video through that interface.
2. Switch to the Video Server 2 (old Peripheral Server).
2.1. Add Video Server 2 to the cluster by executing following command
clustercli.exe join 192.168.0.102 172.16.1.102 192.168.0.101
This Video Server also became cluster Host. Now Hosts are connected through NIC_CLUSTER
network interface. SecurOS configuration is synchronized.
Virtual IP addresses of this Host will be assigned to the NIC_VIDEO (172.16.1.102) network
interface.
3. Transform Computer objects to cluster Nodes by executing the following commands:
clustercli.exe node update Server1 172.16.20.101
clustercli.exe node update Server2 172.16.20.102
If commands terminates successfully, then Computer objects are the cluster Nodes for now. Each of
commands cab be executed on any of two Hosts. Nodes will have the 172.16.20.101 and
172.16.20.102 virtual IP addresses, respectively.
www.issivs.com
SecurOS 411 Administration Guide
Redundancy
As far as cluster configuration cannot be changed without quorum, adding new Hosts is impossible and
will not solve the problem. There are two ways to restore quorum state:
1. Restore failed Hosts.
2. Recreate cluster with only working Hosts in it (see Recreating Cluster).
Second way allows to partially restore system's functionality and also opens ability to add new Hosts.
www.issivs.com
SecurOS 412 Administration Guide
Redundancy
procedure (see Recreating Cluster) before restoring from backup. Follow these steps:
1. Execute cluster recreation command on one of live Hosts.
2. Restore failed Hosts operating systems from backup.
3. Add all Hosts back to cluster.
1. Update procedure must be started on computers that are the members of cluster. Switch cluster to
the fixed_cs service mode (see Service mode). This mode will not allow other Host to get the
Conf iguration Server role during system updating procedure. Otherwise system configuration can be
corrupted.
2. Find out which of the cluster Hosts is the Conf iguration Server (see Getting Current Cluster
Configuration). If it is necessary, assign the Conf iguration Server role to the Host that is more
convenient for updating (see Setting Configuration Server).
3. Execute all required software/hardware update operations on the Conf iguration Server.
4. Update backup Hosts on which no Nodes are currently running.
5. Consistently update the Hosts on which the Nodes are currently running. To upgrade software on the
Hosts do the following:
Stop the SecurOS Control Service and disable its automatic start on the Host being updated.
Make sure the Node has started running on the backup Host.
Update software.
Start the SecurOS Control Service and enable its automatic start.
6. Turn service mode off.
7. Update computers that are not members of the cluster.
15.1.7 Limitations
www.issivs.com
SecurOS 413 Administration Guide
Redundancy
By default, cluster operation is only possible if all the IP addresses used by the cluster are in the
same subnet. To provide cluster operation in case the IP addresses are in a different subnets, it is
necessary to ensure the availability of cluster IP addresses from the other subnets, that may require
additional configuration of the network equipment.
Conf iguration Server role can be assigned only to cluster member.
One Host can run only one Node at the same time.
System time on all Hosts must be synchronized;
The following Modules will not work on the cluster's Hosts:
o POS;
o WebView;
o SNMP;
o SecurOS UVSS.
Use of Archiver on cluster Hosts in Continuous and Scheduled modes (see Archiver) is not
supported. To provide continuous access to the created Long-term archive it is recommended to use
Network f olders or iSCSI drive.
Detailed Mobile Server configuration is described in SecurOS Mobile Quick Start Guide.
Detailed ActiveMedia Kit configuration is described in SecurOS ActiveMedia Kit Guide.
SecurOS objects, concerning with computer settings or files, located on this computer, must be
duplicated on all Hosts of the cluster.
This approach is based on the ability of the cluster to act as a redundant group for non-cluster servers.
Number of such servers can significantly exceed the number of cluster members. Thus, most of the
time Nodes are working outside the cluster. The most common scenarios for using a redundant servers
cluster are the following:
1. The configuration consists of two computers (1+1) and one of them is redundant (see example in the
Creating "1+1" Cluster from Existing SecurOS Configuration. Example).
2. Distributed configuration where SecurOS is working on the computers that do not have stable
connection with the cluster.
Warning! Redundant servers cluster does not support working with the centralized data storage. Use
computer's local hard drives to store archive and databases.
www.issivs.com
SecurOS 414 Administration Guide
Redundancy
To organize redundancy based on a redundant servers cluster perform the following steps:
1. Determine which of the servers will be redundant.
2. Create cluster (see Creating cluster) and integrate these redundant servers in it (see Adding Host).
3. Use operator interface and create required number of Nodes (see Connecting Operator Workstations
to the Cluster Servers). Number of Nodes must match the number of computers that you plan to
connect to the redundant servers cluster.
4. Add to the cluster the computers on which the Nodes will run in the normal mode (see Adding
Computer to the Redundant Servers Cluster).
5. For each Node specify preferred Host from the list of the computers added to the cluster (see Setting
Preferred Host for the Node).
After completing these steps, the system is operational, and the cluster provides redundancy.
To add computer to the redundant servers cluster execute the following command on this computer:
where:
ip_address_nic – IP address of network interface on this computer, which virtual IP addresses
will be assigned to;
hosts_list – list of the IP addresses of the Hosts of the redundant servers cluster, separated by
space. It is recommended to specify IP addresses of all Hosts.
Warning! If the computer that is being added to the cluster stores any SecurOS configuration it will be
overwritten.
Immediately after adding computer to the cluster it must be set as preferred for one of the Nodes (see
Setting Preferred Host for the Node).
Such a server cannot be disconnected from the cluster using the remove command. Execute leave
command (see Switching to Video Server Mode) on this computer to stop cluster from taking it into
account when distributing Nodes.
This section describes steps required to organize redundant system in SecurOS configuration
containing only one Video Server.
www.issivs.com
SecurOS 415 Administration Guide
Redundancy
15.2.3.1 Task
Transform an existed SecurOS configuration to work in "1+1" cluster. Current configuration includes
one Video Server. It is planned to use additional computer to provide redundancy.
15.2.3.3 Steps
Updating SecurOS configuration to work in cluster consists of the following steps:
1. Creating redundant servers cluster on the base of the existing Video Server.
2. Adding the second computer to the redundant servers cluster.
3. Updating old configuration to work in cluster.
4. Selecting new server as preferred to work with SecurOS;
5. Performance verification.
Do the following with the help of clustercli.exe utility (see Configuring cluster):
1. Jump to the Server1 (Video Server, where SecurOS is now working).
Create Cluster by executing following command:
clustercli.exe create 192.168.0.101 192.168.0.101 172.16.20.1
The cluster will be created. There will be one Host within the cluster configuration, that will
continue to be the Conf iguration Server. 172.16.20.1 virtual IP address will be used as IP-address
of this Conf iguration Server. SecurOS configuration is saved unchanged.
Virtual IP addresses of this Host will be assigned to the network interface that has the
192.168.0.101 address – the same interface, that is selected to provide connection with the other
Hosts.
2. Jump to the Server2 (new computer).
Attach Server2 to the cluster by executing the following command:
clustercli.exe attach 192.168.0.102 192.168.0.101
Now this computer is attached to the cluster. SecurOS configuration is synchronized.
Virtual IP addresses of this Host will be assigned to the network interface that has the
192.168.0.102 IP address.
3. Transform Computer objects to cluster Node by executing the following commands:
clustercli.exe node update Server1 172.16.20.101
www.issivs.com
SecurOS 416 Administration Guide
Redundancy
If commands terminates successfully, then Computer object is the cluster Node for now. It will has
the 172.16.20.101 virtual IP address.
4. Make attached server preferred for the Node by executing the following command:
clustercli.exe node set Server1 pref_host=Server2
After that SecurOS will start working on the server connected to the cluster. If Server2 fails the it
work will be continued on the Server1.
5. Make sure that the system is working.
5.1 Start operator interface on any computer and specify 172.16.20.101 (Node virtual IP address)
as IP address to connect.
5.2 Authorize.
www.issivs.com
SecurOS 417 Administration Guide
Interaction with External Systems
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
Using SecurOS security system one can inform external Emergency service about incident or
emergency situation. Message is sent as Emergency ticket that contains detailed information about event.
Further message processing is performed by Emergency service operator.
Emergency ticket can be created with the help of Event Viewer or Media Client.
The following object must be configured in SecurOS to create and send the Emergency ticket:
Emergency service — this object prepare data that can be transferred in Emergency ticket:
HTTP address of Emergency service.
list of cameras for which it is possible to create Emergency ticket and addresses of their physical
location.
parameters for creation links to the video related to the incident. Using created link an
Emergency service can download video. Both live and archive video can be downloaded. RTSP
Server or WebView module are used to download video (see SecurOS WebView User Guide).
incident types list. Create and download to the SecurOS incident types list, that is required to
send Emergency ticket (see Incident Types List. File Format).
Note. Emergency ticket can be sent both from the local system and from the Monitoring Center (see Monitoring
& Control Center) when processing events of the Remote system. In the latter case, the physical address of the
Camera location specified in the settings of the Emergency service object of the Remote system is transmitted in
the emergency ticket. All other incident parameters and links to access the incident video are set in the
settings of the Emergency service object of the Monitoring Center.
Event Viewer — possibility to create and send the Emergency ticket (Send Ticket to Emergency
Service parameter) is configured. Using protocol entries relevant to the Camera object operator can
watch live or archive video of the event in the Media Client and/or create and send Emergency ticket.
Media Client — possibility to create and send the Emergency ticket (Send Ticket to Emergency
Service parameter) is configured.
www.issivs.com
SecurOS 418 Administration Guide
Interaction with External Systems
2. If appropriate entry is added to the Event Viewer operator watches the video and makes a decision if
a message must be sent to external Emergency service. When working with video using a Media
Client operator controls the situation visually.
3. If decision is made operator creates and sends Emergency ticket. Emergency ticket can be created and
sent both with the help of Event Viewer and Media Client (see SecurOS Quick User Guide).
Emergency ticket contains two part of data: the first part is displayed in the interface window and is
visible to the operator (see Table 98), and the second part is not (see Table 99). Data are sent to the
Emergency service in JSON format.
Table 98. Parameters of the message that are displayed in the Emergency ticket
Parameter Description
www.issivs.com
SecurOS 419 Administration Guide
Interaction with External Systems
Table 99. Parameters of the message that are not displayed in the emergency ticket
Parameter Description
www.issivs.com
SecurOS 420 Administration Guide
Light Integration
17 Light Integration
This section describes light integration of SecurOS with the external FAAC (Fire Alarm/Access
Control) and radiation monitoring systems.
Note. The list of the external system events supported by SecurOS is specified within the program code of the
Bolid and FortNet internal module of integration.
Processing of the events generated by the external system can result in the changing state of the
external system object placed on Map, displaying SecurOS form that requires an operator's action (for
example, displaying short message window to call police) or sending a control action to the external
system modules (only for which this possibility is specified in external system).
Program interface with the external system is provided by SecurOS internal executor, that corresponds
to Bolid and FortNet integration.
The root <integration_name> integration object is used to describe and control the external system from
inside SecurOS. The integration object tree (external system modules tree) is built automatically on the
base of the file, that describes external system configuration (see Integration Point).
After object tree is built any of its entries can be placed on Map. Further operation with objects of the
external system placed on Map is similar to operations with typical SecurOS objects placed on the Map.
One of the following methods can be used to transfer control actions to the external module:
using Macro (see Macro);
executing VB/ JScript program (see VB/ JScript program);
as a result of operation executed with the object placed on Map (see Map).
Logging of interactions between SecurOS and the external system and operations with the integration
object tree is performed separately - events generated by the external system are stored in the SecurOS
log, while operations with the external system object tree are stored in an independent log-file.
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
www.issivs.com
SecurOS 421 Administration Guide
Light Integration
This object is designed to integrate external custom application into SecurOS. This is an API that
implements the description of an external system in SecurOS and interacts with it using messages that
use SecurOS Events and Commands.
Parameter Description
Update configuration Click this button to build configuration of the external system in the
(button) SecurOS Object Tree as hierarchical structure of objects.
Refer to UinP User Guide for a detailed explanation of how to configure system and use the Integration
point object.
Note. UinP User Guide is not included into common documentation package and is provided by request.
www.issivs.com
SecurOS 422 Administration Guide
Light Integration
Intelligent Security Systems ensures stable operation of the integration for the following versions of the
external system software:
Bolid — ORION Pro version 1.11, release 2, build 1908;
FortNet — АРМ 1.4.2.15.
17.3.1 Bolid
Bolid integration object is used to provide integration with the FAAC (Fire Alarm/Access Control) Bolid
system.
Parameter Description
www.issivs.com
SecurOS 423 Administration Guide
Light Integration
Additional information
Modules of the external system can be controlled with the help of Macros, VB/ JScript Programs and Map object
control commands. Map or Event Viewer objects are used to monitor object states.
17.3.2 FortNet
On Linux platform (available only for SecurOS Enterprise edition) the functionality is not supported.
FortNet integration object is used to provide integration with the AC (Access Control) FortNet system.
www.issivs.com
SecurOS 424 Administration Guide
Light Integration
Parameter Description
Additional information
Modules of the external system can be controlled with the help of Macros, VB/ JScript Programs and Map object
control commands. Map or Event Viewer objects are used to monitor object states.
www.issivs.com
SecurOS 425 Administration Guide
Keyboard Shortcuts
18 Keyboard Shortcuts
This section describes shortcuts used to perform actions on different SecurOS objects.
Shortcut Description
Displaying the menu for objects creation or for all Group children
Ctrl+N
objects creation
Open all children branches for the selected object (plus additional
*
level on each key button pressed)
+ (Num Pad) Open a child branch for the selected object (one level)
Enter Look for the next object with the search parameters.
www.issivs.com
SecurOS 426 Administration Guide
Appendixes
19 Appendixes
This section contains a description of system utilities and other additional information useful to
configure and operate the system.
www.issivs.com
SecurOS 427 Administration Guide
Appendixes
Select Remove option to uninstall the software, click Next button to continue.
In the Start Windows menu choose the following menu options All Programs SecurOS
Uninstall SecurOS.
SecurOS software will be uninstalled automatically.
Aside from uninstalling the software, you may want to delete all video and audio archives as well as
the configuration database, all of which are not deleted automatically by the InstallShield Wizard.
Thus, this step should be done manually: to delete archives, delete any \Video and \Audio folders
located in the root directory of your logical drive(s) (C:\Video, C:\Audio, D:\Video, D:\Audio
etc.).
After uninstalling the software, delete the archives and/or database manually, if necessary.
www.issivs.com
SecurOS 428 Administration Guide
Appendixes
If you previously ran the Server part as an application, pay special attention to the following:
1. By default, Server part is running as Local System system user. This can cause the network folders
mounted as network drives and previously selected for archive recording in the Computer object
settings will be unavailable. To record an archive to shared network resource use network folders
instead of mounted drives in the Computer object settings.
2. Notification about Server part crashes with the help of OS information messages displayed in separate
windows is discontinued. Information about such crashes one can find in the OS log (Event Viewer
Applications and Services Logs SecurOS). Information about Server part starting failures is
saved into the securos_svc.log file, located in the %ProgramData%\ISS\logs folder.
Note. Servers to connect list for each transformed Operator Workstation will be empty. This means that
Operator Workstation can connect to any Video Server within network. For the connection details refer to
Servers to Connect Tab section.
2. Components of all SecurOS Intelligent Modules that are used within the system must be installed on
each Video Server and Operator Workstation (see User Guide for the corresponding Module for the
details).
3. Versions of the SecurOS and SecurOS Intelligent Modules must be the same on all Computers within
network (see SecurOS Updade Order).
Archive recording
The archive is recorded into files of specified size, which allows to reduce their fragmentation and, as a
consequence, to increase the disk writing speed. Efficiency of this mechanism depends of free disk
space.
www.issivs.com
SecurOS 429 Administration Guide
Appendixes
Note. Intelligent Security Systems recommends to use 10%. This value is also recommended by Microsoft
Corporation for NTFS partitions. One can change this value in the Computer object settings.
When working with SecurOS 9.4 pay special attention to the following:
1. When updating to version 9.4 free disk space will be automatically recalculated for each disk.
Calculated value will be offered by default. This value can be changed with Archive recording slider
(see Archive).
2. After updating the Save space mode is set automatically (see Archive).
Connecting Operator Workstations to Video Servers without additional settings. Access limitation
Starting from Release 10.0 Client part can be launched on any computer, even it is not represented in the
SecurOS Object Tree.
Settings for limit access of Operator Workstation to the Video Servers are located in the Security Zone object
settings window now. Servers to Connect Tab allows to limit connections to specific servers
(see Servers to Connect Tab) to provide automatic load balancing and automatic reconnection.
Connection Restrictions Tab allows to create white list of the computers, that can connect to the Video
Servers within the system (see Connection Restrictions Tab).
In Release 10.2 the cluster was powered with the extended capability for storing video archive on the
local drives of the Hosts. At the same time, the procedure for configuring disks has been changed. If
local drives have been used to store video archive in cluster they must be reconfigured (see Storing
Video Archive on the Host's Local Drives).
www.issivs.com
SecurOS 430 Administration Guide
Appendixes
Events redirection functionality has been updated. When updating SecurOS up to the version 10.3 it is
necessary to redefine rules for events redirection between the computers that have been set for the
version 10.2 or below (see Servers to Connect Tab).
Note. To playing back in SecurOS MCC the archive with soundtrack recorded in the Remote systems no
conversion of such archives in the Remote Systems is required.
When playing back an archive recorded with the soundtrack the case when frames are played back
with no sound is possible. When deleting files “in a ring” mode in case of expiration of their storage
period, the lower time boundary of the oldest remaining files may differ. This feature is specific
only for the first hour of the entire time period of the archive.
New format of the audio files is not supported by the Media Export Utility.
SoundMixer Audio Capture Device is no longer supported. When upgrading to the version 10.4 the
Type field in the settings of all existing devices of such type will be cleared.
www.issivs.com
SecurOS 431 Administration Guide
Appendixes
For this reason, immediately after updating the Remote System SecurOS software to the version 10.7,
access to it from the SecurOS MCC will be temporarily blocked. To restore an access do the following:
1. In the configuration of the Remote system open the System object settings window. Select the Allow
access checkbox and specify access password.
2. In the configuration of the SecurOS MCC specify correspondent access passwords to the Remote
systems in the Remote System objects settings.
Note. User passwords do not need to be updated, but in this case work with some modules (for example,
RTSP Server) is not guaranteed.
Objects whose settings require updating are called "problem". To indicate and search for such objects,
the Health Monitor module (see the System section) and the SecurOS Administration Center (see the
Objects Requiring Configuration section) have been improved.
A direct description of the object settings problem and recommendations for the administrator are
given in the problem object settings window (see the Objects Requiring Configuration section).
www.issivs.com
SecurOS 432 Administration Guide
Appendixes
the old PostgreSQL 9.X database to the new one using one of the following methods or reconfigure
SecurOS to work with currently installed and supported version of PostgreSQL 12.
If it required to save data of current PostgreSQL version (e.g. 9.1) when moving to the newer version,
the migration procedure must be executed. Migration procedure may be executed with one of the
following methods:
Using physical data copy — this method is simple to use, but requires a significant time to
physically copy the data and to stop SecurOS servers for the whole copying period. SecurOS servers
become unavailable until data coping is finished.
Using logical data replication — this is the preferred method due to short (a few minutes) SecurOS
server stops for executing some brief operations. Compared to the first method this one requires
more detailed configuration.
Warning!
1. Save current SecurOS configuration (see System) in case of unexpected errors during the data
migration procedure.
2. Before using any method make sure that user that executes the migration procedure has read and
write rights for the directories where all involved PostgreSQL versions are installed.
3. Configuration files of an old PostgreSQL version is not copied during the migration.
Warning! If paths to the old and to the new versions of PostgreSQL do not differ from default values
(C:\Program Files (x86)\PostgreSQL\9.1 and C:\Program Files\PostgreSQL\12),
there is no need to edit pgupgrade.bat file.
4. Replace the following lines with paths to the old and the new versions of PostgreSQL:
PG_OLD — variables with paths to folders that correspond to the old PostgreSQLversion;
PG_NEW — variables with paths to folders that correspond to the new PostgreSQLversion.
www.issivs.com
SecurOS 433 Administration Guide
Appendixes
Warning! During the update process all data from the PGNEW_DATA folder will be deleted. PostgreSQL
user rights will be moved from PGOLD_DATA folder to PGNEW_DATA folder.
Warning! Before starting the pgupgrade.bat with this parameter it is recommended to create Windows
restore point.
For example,
> cd c:\upgrade
> pgupgrade.bat link
9. If there are no error messages in the cmd console the migration is considered to be successfully
finished.
10.Start SecurOS server and PostgreSQL 12.3 service.
Note. By default the script is located in the <SecurOS_root_folder> after installing SecurOS.
Warning! For proper data replication the server that is being updated must have Microsoft Visual Studio C++
2010 Redistributable package installed.
2. Create the SLONY_SHARE_DIR environment variable. Set the path to the share folder located in the
PostgreSQL 12 folder (e.g. D:\PostgreSQL12\share) as its value.
3. To start and work the pgtool.exe migration utility correctly the user must have a read/write rights
to the utility installation folder (<SecurOS_root_folder>).
4. Run the cmd command line as administrator. To start and work the pgtool.exe migration utility
correctly, in the cmd console specify full path to the folder where the utility is installed.
5. Create the script set to prepare new database of 12.X version. In the script parameters define the
following:
full paths to the old and to the new versions of PostgreSQL (by default C:\Program Files
(x86)\PostgreSQL\9.1 and C:\Program Files\PostgreSQL\12). Full read/write rights
must also be set for the specified folders.
hosts and ports numbers for connection (by default 5432).
www.issivs.com
SecurOS 434 Administration Guide
Appendixes
Note. If the current values of all parameters mentioned above do not differ from the default values used by
SecurOS, it is not required to define them.
For example:
Note. If the database is being replicated for the first time, the > pgtool --port 5432 --path "%
pgold%" --slony clean -o replica_clean.sql command is optional.
6. Make sure that all tables of the database that is going to be replicated have the primary key. Copy the
database scheme. For these operation the default PostgreSQL tools psql and pg_dump_all are
used.
7. After that the old database will become prepared for data replication. Start the replication procedure:
8. In system services the slony-VVV_XXX services will start running, where VVV — PostgreSQL
version for the old and for the new databases, and XXX — PostgreSQL build type (x64 or x86).
Services write log files of the replication procedure to the C:\ProgramData\ISS\logs folder. If all
logs contain records with SYNC prefix it means that both databases have the same data. For the new
database it is required to change the number of port that will be used for connection. To do this do
the following:
manually edit the %pgnew%\data\postgresql.conf file.
run the command
> pgtool --path "%pgnew%\data\postgresql.conf" --set port=5432.
9. Stop SecurOS server.
www.issivs.com
SecurOS 435 Administration Guide
Appendixes
10.Clean temporary copy of the database that was used during the replication:
11.Stop the postgresql-9.1 system service (if you updating from this specific version) and forbid its
autostart.
12.Restart the postgresql-x64-12 system service.
13.Start the SecurOS server.
For some of commands mentioned above it is required to be connected to both databases at the same
time (e.g. for data replication). To redefine the second database connection parameter it is required to
define both parameters (even if for the first database it matches the default value):
> pgtool --port 5432 --port 50001 --host localhost --host 192.168.235.209 ...
To make sure that the data replication is done properly run the databases scheme comparison
(connection to both databases is required). For example:
Executing this command starts the comparison of two databases starting from names of databases,
schemes, tables, columns and ending with checking the primary keys and table restrictions. If there are
no differences, there will be no respond.
By default, the system object tree consists of the following objects after SecurOS installation and starting
with empty database: System, SecurOS, Computer, Desktop, Media Client.
Note. It is not recommended to select system drive with Operating System installed for read/write settings.
2. Create the Video Capture Device object(s). This object represents the device the video signal is coming
from (IP camera, IP encoder, etc.). Configure the Video Capture Device parameters:
Type — select device type corresponding to the device where video is coming from:
If video is coming from an IP camera/encoder, select the corresponding manufacturer of the IP
camera/encoder.
For use of IP devices using standards protocols, the ONVIF, or Generic RTSP options can be
used. The Device must support these Protocols.
To play pre-recorded videos (for demo or testing purposes) the Virtual or Player AVI options
www.issivs.com
SecurOS 436 Administration Guide
Appendixes
can be used.
IP Address, User, Password — if using IP devices set these parameters accordingly.
3. Create the Camera object (child object of the Video Capture Device object). This object represents a
single video stream. Specify the camera identifier in the ID field (you can begin with 1 and keep
incrementing by 1), then specify its Name (e. g. Office, Street, Home etc.). You may also use
default ID/Name.
Notes:
1. For single lens IP cameras, one Video Capture Device object will have one Camera child object.
2. For cameras with more than one lens, one Camera object will be created for each lens. The Camera
objects will be child objects of the same Video Capture Device.
3. For cameras connected to IP encoders, one Video Capture Device object will have as many Camera child
objects as cameras connected to the encoder.
www.issivs.com
SecurOS 437 Administration Guide
Appendixes
ISS SecurOS Registration Files Editor (DDI.exe) edits SecurOS object types database (not the
actual database itself) (see ISS SecurOS Registration Files Editor).
Video archive index repair utility (MediaIndexRepairer.exe) is used to work with the SecurOS
video archive index files (see Video Archive Index Repair Utility).
Audio archive converter utility (AudioArchiveConverter.exe) is used to convert SecurOS
audio archive of an outdated format to the new one (see Outdated Audio Archive Updater Utility).
Certificate Generator utility (CertificateGenerator.exe) is intended for creating trial SSL
certificates (see Certificate Generator Utility).
AuditClient utility (audit_client.exe) is intended for obtaining SecurOS audit data
(see AuditClient Utility).
This utility is intended for centralized monitoring and controlling SecurOS server (hosts) states. Using
it one can perform all operations for cluster creating and configuring (see Redundancy). One can
manage multiple configurations at once.
Warning!
1. The utility interacts with the SecurOS Control Service on the remote hosts. If service on the host is
stopped it won't be available for management.
2. To provide module working it is necessary to open TCP ports in the firewall settings (see Appendix
E. Network Ports Used in SecurOS).
3. The utility supports working with servers that running Microsoft Windows operating system only.
Warning! To create cluster nodes and change their parameters one should use SecurOS Object Tree
(see Adding Node).
Location:
<SecurOS root folder>\ServerManager.exe
www.issivs.com
SecurOS 438 Administration Guide
Appendixes
At the top of the utility window a control panel consisting of buttons and a search bar is located
(see Control Toolbar).
Below the toolbar the hosts table is located. This table displays states of all hosts added to the utility list
and grouped by Conf iguration Server (see Hosts Table).
www.issivs.com
SecurOS 439 Administration Guide
Appendixes
In the Administrator field must be specified user of the operation system, which has an administrator
rights on the computer to be added.
Creating Cluster
Select in the list the host on which the cluster must be created and click the Create new cluster button.
Fill in the fields of the window that appears.
Specify available and not used IP address in the Configuration Server virtual IP address field.
www.issivs.com
SecurOS 440 Administration Guide
Appendixes
Note. If the host that already is a member of the cluster is selected, then existing cluster will be recreated.
To connect selected host to the redundant servers cluster (see Redundant Servers Cluster) select the
Non-cluster host in the Host type field.
Therefore, when removing host from the cluster, three scenario are possible:
1. Host that is being removed is available and there is a quorum within the cluster. In this case both
steps will be executed successfully and host will be completely removed from the cluster.
2. Host that is being removed is available and there is no quorum within the cluster. In this case cluster
will not be able to remove the host from its members list. Herewith the host itself will switch to the
Video Server working mode. Further it is necessary to execute the host removing procedure again
after quorum is restored.
3. Host that is being removed is unavailable and there is a quorum within the cluster. In this case
cluster will remove the host from its members list. Herewith the host will not be able to switch to the
Video Server working mode. Further it is necessary to execute the host removing procedure again
after connection is restored.
www.issivs.com
SecurOS 441 Administration Guide
Appendixes
Note. The current password of the superuser (see SecurOS Users) will not be changed after restoring the
configuration.
Moving Node
Select from the list the host on which the node that must be moved is working. Click the Node transfer
button and select the Move node. In the window that appears select the cluster host to which the node
has to be moved.
www.issivs.com
SecurOS 442 Administration Guide
Appendixes
Select from the list the host on which the node for which the preferred host must be assigned is
working. Click the Node transfer button and select the Set preferred host command. In the window
that appears choose cluster host that must be preferred for the node. If Preferred host parameter is set
this means that selected host already is a preferred for this node.
For more information about preferred hosts see Setting Preferred Host for the Node.
www.issivs.com
SecurOS 443 Administration Guide
Appendixes
Note. Writing to the drives selected in this window is performed with higher priority than to the iSCSI drive/
network folder specified in the Computer object settings.
Warning! Do not leave search string filled for a long time, otherwise one can miss failures in other hosts
working.
www.issivs.com
SecurOS 444 Administration Guide
Appendixes
Note. This string is a grouping. To execute operations with the Conf iguration Server add it to the utility and
select string corresponding to it at the second level of the table.
2. Configuration members level. At this level the hosts involved into configuration are located.
Including the Conf iguration Server.
3. Cluster members level. At this level the members of the cluster created in the given configuration
are located. For the cluster hosts the table displays the nodes that currently correspond to these hosts.
4. Host with issues. Hosts that failed to connect. They are listed at the end of the list with a problem
description.
To mark roles and states the following icons are used in the table:
— root item of the configuration.
— host state is unknown. For example, this icon is assigned when SecurOS Server part is being
started or stopped.
— host that is not connected. In this case the reason for the lack of communication is added to
the host name.
— crash host. Place mouse pointer over the Emergency stop string to display the crash reason.
www.issivs.com
SecurOS 445 Administration Guide
Appendixes
Location:
<SecurOS root folder>\Tools\HardwareReportUtility.exe
Utility is used to detect all Guardant keys installed on given computer (see figure 269). The report is
used to generate the system license key file key.iss by the Intelligent Security Systems Technical
Support Team.
This utility can also be used to check the correct installation of the above hardware devices and
associated drivers: if the hardware identifier is missing, this means that device drivers were not
installed properly.
www.issivs.com
SecurOS 446 Administration Guide
Appendixes
Location:
<SecurOS root folder>\Tools\SystemInfo.exe
This utility is intended for collecting technical information about the SecurOS installation, your
computer and network (see figure 270). This information is necessary to resolve problems and will
always be requested by the Technical Support Team. Collected information will be saved in the
SystemInfo report.
To create a report
Utility Parameters
Include full crash dumps — tick this checkbox if SecurOS Server or Client crash information must
be included in the report. To free up space on your hard drive after you exit the utility, tick the
Remove crash dumps when the information collection is complete checkbox.
Note. In case of SecurOS Client application or its child process crash, the appropriate OS informational message
is displayed (for example, see Figure 271). In case of SecurOS Server part or its child process crash, Health
Monitor self-diagnostic module's message is displayed. Full dumps are required only to analyze such system
crashes and not required for all any problems.
www.issivs.com
SecurOS 447 Administration Guide
Appendixes
Collect additional databases — select this checkbox to collect additional information about
SecurOS and installed intelligent Modules. All additional databases that are being used on this
computer will be collected (see DSAdmin Utility).
Note. Additional information must be collected only by request of the Intelligent Security Systems Technical
Support Team. In all other cases it is not required.
Report structure
The report contains the following folders and files:
crashlogs folder — contains log-files of the crashes of the SecurOS or it components;
cur folder — contains files with settings of the modules logging, program and scripts, xml-files of
the integrated Cameras and Video Servers libraries, and also license key file key.iss;
cur\securos.sqlite file — contains the copy of the SecurOS configuration, used by client;
devices folder — contains binary log-file for the found problems of interaction with cameras;
dumps folder — contains full or minimal dumps of the crashes of the SecurOS and/or its
components;
installer folder — contains SecurOS installer log-files;
logs folder — contains SecurOS log-files;
Note. SecurOS' Modules log-files are stored in the ISS\Logs folder, path to which is specified in the %
ProgramData% Environment Variable.
www.issivs.com
SecurOS 448 Administration Guide
Appendixes
(see DSAdmin Utility) other sql-files with appropriate names are included in the report;
DxDiagInfo.txt file — contains information about system devices of the computer, where
SecurOS is installed and utility was started;
cluster.json file — contains information about configuration of the cluster, which given
computer belongs to;
integrators.txt file — contains list of the installed integrators and their versions that are stored
in the C:\Program Files (x86)\ISS\Integrators folder;
ISS_Config.reg file — contains information about the HKLM\SOFTWARE\ISS registry key;
modules.txt file — contains list of the dll- and exe-files with their versions from the SecurOS
folder;
netstat.txt file — contains information about active connections of this computer at the
moment you run the utility;
SystemInfo.nfo file — contains general system information about computer where SecurOS is
installed and given utility was started.
Location:
<SecurOS root folder>\Backup.exe
This utility (see figure 272) is used to playback and also export video and audio archives from ISS
Native to AVI/ASF format, export a frame to BMP format and also export separate audio files, recorded
with the help of a standalone (not linked to a camera) microphone.
Warning! This utility can only be used to export video/audio archives locally from video servers.
www.issivs.com
SecurOS 449 Administration Guide
Appendixes
To export video:
1. Select the Camera in the archive source list and specify the ID of the Camera object.
2. Define the Search start and Search end for the archive search.
3. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
4. Click the Rescan archive button to scan for media that fits the specified time range for the specified
Camera.
5. When it is necessary to view archive, use the Play/Stop buttons to start and stop playback. Use the
slider or the Rewind/Forward buttons to navigate through the selected time range.
6. If needed, change your selection by repeating steps 1— 5.
7. Define export settings (video/audio codec, output directory etc.) in the Export Settings dialog.
8. Click the Export button to start the procedure. The process may take some time depending on the
length of the video and export settings.
9. While exporting is in progress, you can click the Stop button to stop the export at this point. The part
that has already been exported will be saved as an AVI or ASF file.
Note. While playing or navigating through the archive, click the Save frame to BMP button to export a single
video frame in BMP format. Files will be saved to the directory specified in the Export Settings dialog.
Warning! To playback “quick converted” video it is recommended to use VLC media player.
www.issivs.com
SecurOS 450 Administration Guide
Appendixes
2. Define the Search start and Search end for the archive search.
3. Click the Path to archive button and select the archive for export. To scan all logical drives leave the
field blank.
4. Click the Rescan archive button to scan for media that fits the specified time range for the specified
Microphone.
5. Define export settings (audio codec, output directory, password etc.) in the Export Settings dialog.
6. Click the Export button to start the procedure. The process may take some time depending on the
length of the audio and export settings.
7. While exporting is in progress, you can click the Stop button to stop the export at this point. The part
that has already been exported will be saved as an AVI or ASF file.
Parameter Description
Common
www.issivs.com
SecurOS 451 Administration Guide
Appendixes
Parameter Description
Use this option to split large output files to several smaller ones
Max. file size, MB with the specified size in megabytes. Default value is 650 MB.
Warning! Some media players do not support AVI-files greater than 2 GB.
File type Select option corresponding to output file format (AVI or ASF).
Export
Video only Select the checkbox to export video only (without audio).
Notes:
Quick video export
1. Video codec, Video quality, FPS Divider, File and Position
parameters will be ignored in the Quick video export mode.
2. If Quick video export is selected, but the conversion is not
possible for some reason, then the parameters specified above
will be used.
FPS divider Warning! Option works correctly only for video produced with no delta-
frame algorithm. For example, MJPEG for IP cameras. In other cases, using
this option can cause frame twitching and skipping.
Logo
www.issivs.com
SecurOS 452 Administration Guide
Appendixes
Media Export Utility command-line syntax (example contains only frequently used parameters):
Search parameters
Search directory
Warning! If --archive-folder or --archive-path parameters are not set then only the primary
archive will be searched.
Export parameters
--out <full filename> Output filename include absolute path. For example,
C:\export\out.avi.
www.issivs.com
SecurOS 453 Administration Guide
Appendixes
Example 1:
Description: export video archive of camera 1 for the defined period spanning to fragments up to 2 Mb.
Example 2:
Description: export video archive for the defined period spanning to fragments up to CD disk size
(650 MB).
Note. Camera number and other settings are taken from the utility configuration.
This utility is intended to store/change database connection strings for the following databases:
SecurOS settings database. This database stores system object settings. Database name is specified
when installing database. By default the securos name is used.
SecurOS events database. This database stores information about events, that occurred within
system. This database is created automatically when system installing with the name of protocol.
SecurOS video archive database. This database stores information about registered alarms and
specified archive bookmarks. This database is created automatically when system installing with
the name of fsindex.
Any other additionally installed database.
Location:
<SecurOS root folder>\dsadmin.exe
www.issivs.com
SecurOS 454 Administration Guide
Appendixes
Parameter Description
Databases
Connection settings
www.issivs.com
SecurOS 455 Administration Guide
Appendixes
Parameter Description
SQL Server.
Common parameters
Check connection settings Deselect this option if checking connection with all specified
before update databases before update is not required.
Update settings (button) Click this button to apply all changes and exit.
Cancel (button) Click this button to discard all changes and exit.
www.issivs.com
SecurOS 456 Administration Guide
Appendixes
2. A new entry will appear in the Databases list (see Figure 275).
This utility is intended for setting up and updating the SecurOS database, where SecurOS object
settings are stored (securos database). Modification is performed with the help of the securos.dbi
file, where description of the actual database structure is stored.
Location:
<SecurOS root folder>\idb.exe
www.issivs.com
SecurOS 457 Administration Guide
Appendixes
Parameter Description
Connection settings
SQL Server;
Type SQLite.
www.issivs.com
SecurOS 458 Administration Guide
Appendixes
Parameter Description
Click the button to choose folder, where custom .dbi file is located.
Select (button)
Specify path to the file in the standard file manager window.
Struct update (drop Select this checkbox to delete obsolete database tables completely.
redundant tables)
This utility is used to describe SecurOS object types — their properties, characteristics and behavior
within the system.
Additional Information
Type of the object within SecurOS means unique char identifier of the object class that is used within program code.
SecurOS object type can not be changed.
Each property, characteristic or object type behavior rule within SecurOS is specified with the help of
appropriate component of the object type description. Components of the object type description are
used to represent object within appropriate interfaces, for example, within operator's interface of the
Media Client, in the Event Viewer's log-files, on the Map, etc.
By default, descriptions of the object types existing within SecurOS are created in accordance to the
rules defined by software developer. When adding a new object types, for example, during SecurOS
integration with the third-party systems or equipment, their own object type descriptions can be
created for newly added objects with the help of this utility.
www.issivs.com
SecurOS 459 Administration Guide
Appendixes
Location:
<SecurOS root folder>\ddi.exe
To start working with object type descriptions one should load and open appropriate
securos_XX.ddi file, located in the SecurOS root folder, where XX — ID of the description language,
for example, fr (french).
Appearance of the main utility window when description file is opened is represented on figure 277.
List of registered object types is displayed on the right area of the window as a table:
Type name — name of the object type (char). This name is used to represent object in the Object
Tree, on the Map, in the Media Client and Event Viewer user interfaces, etc. Variable parameter;
Object type — unique type of the object. Is used to represent object class instance. Variable
parameter;
Note. It is necessary to change object type only if it changed inside software source code. Otherwise changes
will not be applied to the system, but at the same time will be saved in the description file.
Group name — name of the grouping object in the SecurOS Object Tree. Variable parameter.
www.issivs.com
SecurOS 460 Administration Guide
Appendixes
In the left area of the main window the following information concerning selected object type will be
displayed (by default all available information is displayed):
Events window — contains a table of system events that can be generated by selected object type;
Commands window — contains a table of commands that can be used to control selected object
type;
Markers window — contains a table that is intended for object icon file name definition. Object
icons displayed in the Map Window are specified in the object source code. Appropriate .png
graphic files are located in the skins\_common folder of the SecurOS root directory;
States window — contains a table of all possible states for selected object type.;
State transition rules — contains a table of transmission rules from one state of the object to
another. Transmission rules control initial and final states that selected object has upon certain
event coming. Initial event, initial state and final state are in the table;
Phrases — contains names that are used as object captions displayed in all interfaces (in the Object
Tree, in the Map Window, in the Media Client and Event Viewer interfaces, etc. Also contains phrases
used in information messages displayed in the own interface windows of the objects (for example,
in the Archiver window).
Mentioned above windows can be displayed or hidden with the help of Windows menu in the main
utility window.
To change field value within any window double-click this field, then select required value or type it
manually.
Other components of the Menu bar and Toolbar in the main utility window are intuitively
understandable and not considered within this manual.
Events Window
In this window the following parameters of the object type Events are specified:
Name — name of the event that will be displayed in the Event Viewer interface;
Type — unique event ID.
Note. It is necessary to change object type only if it changed inside software source code. Otherwise changes
will not be applied to the system, but at the same time will be saved in the description file.
Severity — severity of the event. Defines how this event will affect the system and need of operator
intervention when it occurs. Possible values:
www.issivs.com
SecurOS 461 Administration Guide
Appendixes
normal — event that does not require operator attention. Such event is highlighted in Event
Viewer in blue;
informational — event that requires additional operator attention. Such event is highlighted
in Event Viewer in white;
alarm — event that requires intervention of operator or technical support expert. Such event is
highlighted in Event Viewer in red.
Has sound — event attribute that indicates necessity to play sound when events occurs. It makes
sense only if sound is defined in the source code of the object;
Loggable — indicates necessity to save record relevant to occurred event into the protocol
database (system events protocol). Possible values:
yes — message about local events will be saved into the database;
no — message about local events will not be saved into the database.
Blocking — indicates necessity to transfer message about local event to all computers within
network. Possible values:
yes — message about local events will be transferred into the network;
no — message about local events will not be transferred into the network.
Commands Window
Markers Window
In this window the following parameters of the object Icons that are displayed in the Map Window are
specified:
Warning! Parameters of the icons make sense only for Sensor and Relay objects.
File name — value that is used within script to create the final name of the image file;
www.issivs.com
SecurOS 462 Administration Guide
Appendixes
Name — possible value from the list of values of appropriate parameter in the Sensor or Relay object
settings window.
States Window
In this window the following parameters of the object type States are specified:
Name — name of the state. This name is displayed, for example, in the Map Window;
State — unique state ID;
Description — state text description;
Short name — value that is used within script to create the final name of the image file. This image
will be used in the Map Window to indicate appropriate object state;
Blink — additional mark of the state. Controls object icon blinking in the Map Window when object
gets a given state. Possible values:
yes — icon is blinking;
no — icon is not blinking.
Warning! If leave blank then transition will be done from any state.
Phrases Window
www.issivs.com
SecurOS 463 Administration Guide
Appendixes
In this window are specified the Phrases that are used as an object captions and used in information
messages displayed in the own object interface windows. Contains the following fields:
Phrase — a phrase that will be used to describe an object within main SecurOS interface elements
(Object Tree, Map Window, Event Viewer etc.) or phrase for information message used in the own
object interface window;
Context — phrase usage context;
Origin — source of the phrase (i.e. Object type).
Note. Changing the Phrase will cause automatic changing of the Origin field and the Object type field in the
right window.
Warning! Once file was changed one should save the chages and restart SecurOS, otherwise changes will not
be applied.
This functionality is available in the following editions: SecurOS Monitoring & Control Center,
SecurOS Enterprise, SecurOS Premium, SecurOS Prof essional.
The utility is intended to reassign one of the SecurOS Peripheral Servers as Conf iguration Server when
current Conf iguration Server can not be used anymore.
Location:
<SecurOS root folder>\ServerRoleManager.exe
Warning! The Guardant hardware key must be moved from current Conf iguration Server to that Peripheral
Server, which will serve as a new Conf iguration Server (see Guardant Key Installation). Otherwise, system
can't be started on the new Conf iguration Server.
1. Launch utility on that Peripheral Server, which will serve as Conf iguration Server.
2. In the utility window select the Configure the computer as a Configuration Server (see Figure 284).
www.issivs.com
SecurOS 464 Administration Guide
Appendixes
Note. The current Configuration server string displays name of the computer, which is being reassigned.
Note. The current configuration string displays name of the computer, which is being reassigned.
In the text box fill in the name of the computer, which is assigned a new Conf iguration Server.
Note. If the name of new Conf iguration Server is specified correctly and computer is available within SecurOS
network, the mark will be displayed on the right of the text box. Otherwise the mark will be displayed.
www.issivs.com
SecurOS 465 Administration Guide
Appendixes
Location:
<SecurOS root folder>\ServerControlAgent.exe
Utility is launched automatically when OS is started. After utility is started its icon is displayed in the
system tray (see Figure 286).
Note. If utility has been shut down one can launch it from Start menu (Programs SecurOS Server
Control Agent).
— server is started;
— server is stopped;
— server is crashed.
When mouse pointer is placed over the icon, then the hint that shows server current state, SecurOS
edition and version number is displayed.
Control is performed with the help of utility context menu (see Figure 287), that contains the following
commands:
www.issivs.com
SecurOS 466 Administration Guide
Appendixes
Launch the operator interface — launch SecurOS Client part on given computer;
Start Server — start SecurOS Server part;
Stop Server — stop SecurOS Server part;
Error. Read more... — display detailed information about Server part launching error;
Manage service — change the state of the SecurOS Control Service:
Start service;
Stop service.
Launch the SystemInfo — launch SystemInfo utility;
Exit Server Control Agent — shut down utility.
This utility is designed to recover damaged or create missing index files of the SecurOS video archive
including the archive from cameras with an associated microphone.
Location:
<SecurOS root folder>\MediaIndexRepairer.exe
Utility is implemented as console application, to call which the following syntax of command prompt is
used:
--path <arg> — recreate index files located in the specified folder. Required parameter. Possible
arguments:
—<Full_path_to_the_archive_root_folder> — recreate index files for the whole archive,
or
—<"Full_path_to_the_archive_folder_for_an_hour"> — recreate index file for the
www.issivs.com
SecurOS 467 Administration Guide
Appendixes
Warning!
1. Folder name in the command prompt is case sensitive.
2. When specifying path to the folder that contains archive for an one hour, it is necessary to use the ""
characters to screen space included in the file name (see example below).
3. A network folder can be specified. To provide an access to the network folder it is necessary to
specify the user name and password (see below).
--camID <arg> — recreate all index files for the archive that was created by camera with
specified ID. Optional parameter. If not specified, then index files for archives created by cameras
with any ID will be recreated.
This parameter is not used without --path <arg>;
--type <arg> — type of the files for index repair. Possible values:
—all — re-indexing video- and audio archives. Default value;
—video — re-indexing video archive only;
—audio — re-indexing audio archive only;
--user <arg> — user and domain name (if exists) to provide an access to the network folder.
Optional parameter;
--pass <arg> — user password to provide access to the network folder. Optional parameter;
--help — display help information for the command.
Examples:
MediaIndexRepairer.exe --path D:\VIDEO — recreate all index files of the video and audio
archive that was created by all cameras and saved in the D:\VIDEO folder;
MediaIndexRepairer.exe --path "D:\VIDEO\24-08-15 08" --camId 15 — recreate
index file of the archive that was created on August 24 2015 in 08:00 a.m. till 09:00 a.m. time
interval by camera with ID 15 and saved in the D:\VIDEO\24-08-15 08 folder;
MediaIndexRepairer.exe --path \\server\VIDEO --user OFFICE\admin --pass
password — recreate all index file of the archive created by all cameras and saved in the \
\server\VIDEO network folder.
To simultaneously process archive with different parameters use several instances of the application. In
this case archives specified in the parameters of each instance will not intersect by date/time and/or
camera ID.
Warning!
1. Re-indexing of the large volume archives can take considerable time (hours).
2. To work with appropriate archives it is necessary to restart SecurOS once index files are recreated.
www.issivs.com
SecurOS 468 Administration Guide
Appendixes
To automatically delete old SecurOS audio archive and create the index file when the conversion
process is finished.
Warning!
1. Conversion of the large volume archives may take considerable time (hours).
2. It is required to restart SecurOS to work with the new audio archive.
Location:
<SecurOS root folder>\AudioArchiveConverter.exe
Utility is implemented as console application, to call which the following syntax of command prompt is
used:
AudioArchiveConverter.exe [--path <arg>] [--user <arg>] [--pass <arg>] or
AudioArchiveConverter.exe [--help], where:
--path <arg> — convert the audio archive located in the specified folder. Required parameter.
Possible arguments:
<Full_path_to_the_archive_root_folder> — convert audio files for the whole archive, or
<Full_path_to_the_archive_folder_for_an_hour> — convert audio files for the archive created for
one hour, or
<Full_path_to_the_archive_file> — convert only the specified file.
Warning!
1. Folder name in the command prompt is case sensitive.
2. When specifying path to the folder that contains archive for an one hour, it is necessary to use the ""
characters to screen space included in the file name (see example below).
3. A network folder can be specified. To provide an access to the network folder it is necessary to
specify the user name and password (see below).
--user <arg> — user and domain name (if exists) to provide an access to the network folder.
Optional parameter;
--pass <arg> — user password to provide access to the network folder. Optional parameter;
--help — display help information for the command.
Examples:
AudioArchiveConverter.exe --path D:\VIDEO — convert all audio files of archive that
was created by all cameras and saved in the D:\VIDEO folder;
AudioArchiveConverter.exe --path \\server\VIDEO --user OFFICE\admin --
pass password — convert all audio files of the archive created by all cameras and saved in the \
\server\VIDEO network folder.
AudioArchiveConverter.exe --path "D:\VIDEO\12-04-19 12" — convert all audio files
of the archive that was created on August 12 2019 in 12:00 PM a.m. till 1:00 PM a.m. time interval by
camera with ID 15 and saved in the D:\VIDEO\12-04-19 12 folder;
AudioArchiveConverter.exe --path "D:\VIDEO\12-04-19 12\4009641.w05" —
convert the audio file of the archive that was created on August 12 2019 at 12:40:09.641 PM by
camera with ID 5 and saved in the D:\VIDEO\12-04-19 12 folder;
www.issivs.com
SecurOS 469 Administration Guide
Appendixes
To simultaneously process audio archive with different parameters use several instances of the
application. In this case audio files specified in the parameters of each instance will not intersect by
date/time and/or camera ID.
Conversion results:
When converting a folder, all the old audio files are removed. They will replaced with audio files of
a new format, and the index file will be created.
When converting a single file, the audio file of a new format will be created. The original file will
not be removed. The index file for the new audio archive will not be created.
The utility is intended for creation trial self-signed SSL certificates. Such certificates can be used to
check and demonstrate capabilities of the digital signature (see Digital Signature) and to work via
secured HTTPS protocol for such modules as Mobile Application Server (see SecurOS Mobile Quick
Start Guide), AutoMobile Server (see SecurOS AutoMobile User Guide), Rest API, etc.
Warning! Certificates created with the help of the utility are intended solely for demonstration and
commissioning purposes.
Location:
<SecurOS root folder>\CertificateGenerator.exe
www.issivs.com
SecurOS 470 Administration Guide
Appendixes
Warning! The options for choosing a place to install or save a certificate are available only when running the
utility as administrator.
4. Select the Show log checkbox to view detailed information about certificate creation process.
5. Click Create certificate button to create certificate with specified parameters.
The utility is intended to obtain the SecurOS user actions audit data. This data is stored in special audit
databases located on each SecurOS Video Server and complement each other. Queries are addressed
only to the database of the currently connected Video Server. Audit data from several Video Servers can
be obtained when connecting to each of them sequentially. If the system is configured with the help of
the dsAdmin utility (see DSAdmin Utility) so the audit data from all Video Servers of the network is
saved into the single database, then aggregated audit data can be obtained in one utility session.
Warning! By default audit data is not being recorded. To start recording audit data to the database select the
Record system audit data checkbox in the System object settings.
www.issivs.com
SecurOS 471 Administration Guide
Appendixes
Audit data is retrieved accordingly to the query parameters specified by the user in the utility settings.
Query can be executed both with the standard and custom parameters. In the latter case the query can
be saved as a search template.
Location:
<SecurOS root folder>\audit_client.exe
To connect to the audit server when starting the utility, one must log in to SecurOS (see Figure 289).
Warning! Only SecurOS User with the Allow to audit system checkbox selected in the User Rights object
settings can authorize and connect to the audit server (see User Rights). Otherwise, connection to the audit
server is not possible.
In case of successful authorization and connection to the audit server, the main utility window will be
available (see Figure 290).
www.issivs.com
SecurOS 472 Administration Guide
Appendixes
At the top of the window the Search parameter setting form is located. It contains the following
controls:
Connection established with Server — information field where IP address or DNS name of the
connected audit server is displayed;
Connect to other Server (button) — click this button to connect to other audit server;
Search mode— select search mode:
User activity — is used to request all user actions, for which an audit is provided;
Configuration & object's mode changes — is used to request user actions related to
changing object settings, changing the object’s operating mode and archive recording mode;
Access to video — is used to request user actions related to viewing live or archive video;
PTZ Control — is used to request user actions related to PTZ control;
Video export — is used to request user actions related to video export;
Work with Auto Module — is used to request user actions performed when working with
SecurOS Auto;
Advanced search — is used to create complex queries if none of the above query modes is
suitable for obtaining the required data;
Search mode template — this mode is available if at least one search template is saved in the
system. In this case, the name of the saved search template is displayed in the list of search
modes. For the details see Working with Search Templates.
Search parameters (block of parameters depending on selected search mode):
From — date and time of the beginning of the search period, in date and time format of the OS;
To — date and time of the end of the search period, in date and time format of the OS;
User — select SecurOS User to analyze his actions in the system. This list contains only those
users whose actions are saved in the audit database at the moment of connection to the audit
server;
www.issivs.com
SecurOS 473 Administration Guide
Appendixes
At the bottom of the window the search results table is located (see Figure 291). Structure of this table
also depends on the selected search mode.
Warning! Data in the search results table is not dynamically updated. That means only audit data that
matches the specified query time interval is displayed, even if new user actions are being registered in the
system. To update displayed data one must execute a new request taking into account the changed time
interval.
www.issivs.com
SecurOS 474 Administration Guide
Appendixes
Depending on the selected Search mode the result table may contain the following columns:
Time — action time, in OS date and time format, including milliseconds;
User — name of the SecurOS user who performed an action;
Computer — name of the Computer within SecurOS network where an action has been performed;
Action — performed action;
Object — object under which an action has been performed, in <Object_name> <Object_ID>
format;
Interval — interval that matches specified Audit interval (see System), in OS date and time format,
including milliseconds. Is used to register the prolonged actions (viewing live/archive video, PTZ
control). For the details of intervals see the User Actions Analysis Example section;
Name — name and identifier of the Tour, Preset or name of the Watchlist that have been changed by
the user;
LP number — license plate number with which any operations have been performed when
working with SecurOS Auto Module or search string value;
old LP number — previous license plate number with which any operations have been performed
when working with SecurOS Auto Module;
Comment — comment created automatically by the system for some events.
Advanced search
If the Advanced checkbox is selected user can create his own search template (filter) of any complexity,
not provided by one of the specified standard search modes. This query can also be saved for future use
(see below). The following entities can be used as the query parameters:
1. events.id — event ID in the audit database;
2. events.server_host — name of the Computer on which the audit server works;
3. events.server_node — name of the Node on which the audit server works (when working in
cluster). When working not in cluster configuration coincides with the events.server_host
value;
4. events.event_time — event time, in YYYY-MM-DD HH:MM:SS.FFF format;
5. events.event_action — performed action ID;
6. events.user_domain — domain where the User which actions must be analyzed is registered;
7. events.user_host — name of the Computer on which the actions have been performed;
8. events.user_name — name of the User which actions must be analyzed;
9. events.comment — system comment to the event;
10.intervals.event_id — event ID;
11.intervals.time_from — the beginning of the interval (for prolonged actions), in YYYY-MM-DD
HH:MM:SS.FFF format;
12.intervals.time_to — the end of the interval (for prolonged actions), in YYYY-MM-DD
HH:MM:SS.FFF format;
13.objects.event_id — event ID;
14.objects.obj_type — type of the object under which an actions have been performed;
15.objects.obj_id — ID of the object under which an actions have been performed;
16.objects.obj_name — name of the object under which an actions have been performed;
17.params.param_type — type of the parameter under which an actions have been performed (when
configuring PTZ or working with SecurOS Auto);
www.issivs.com
SecurOS 475 Administration Guide
Appendixes
18.params.param_value — parameter value (when configuring PTZ or working with SecurOS Auto).
To save search template set required values in the form's fields and click the Save as Template button.
In the Creating template window (see Figure 292) specify template name and click the OK button.
www.issivs.com
SecurOS 476 Administration Guide
Appendixes
Search template will be saved in the Search mode list. To apply saved search template select it in the
list and click the Search button.
Exporting Results
Audit data can be exported to the .CSV format file into the user specified directory. To export data click
the Export button, then in the Create report window (see Figure 293) set the directory and the file
name. Click the Create report button.
Warning! The ";" character (semicolon) is used as a data fields separator in the created .csv file.
Each operator can customize the Result table appearance. The following components can be adjusted in
the window:
Number of the displayed table columns;
Order of the table columns;
Width of the table columns.
To change the number of the displayed columns right click table header, then in the list of columns
deselect those columns that must not be displayed in the table (see Figure 294). To display hidden
columns click the ones that are not selected.
www.issivs.com
SecurOS 477 Administration Guide
Appendixes
To change the columns order click the required column and holding mouse button down move it to
the required position.
To change the columns width place mouse pointer over the columns separator. Mouse pointer will be
as presented in Figure 295.
Press the mouse button, and while holding it down, move the cursor in the required direction.
The data of the request for user actions when working with archived video is shown in Figure
296. Audit interval (see System) is set to 5 minutes.
www.issivs.com
SecurOS 478 Administration Guide
Appendixes
Figure 296. Audit of the user actions when viewing archive video
In the audit Result table the following entries correspond to these actions (in order of listing):
1. At 14:08:08.144 user switched camera to view the Primary archive (type of operated archive is
displayed in the Comment column). When switching to the archive mode archive pointer has been
set to the last frame of the archive. In archive used for example the time stamp of the last archive
frame is 11:18:32. For the given Audit interval (5 minutes) this position of the archive pointer
corresponds to the 11:15:00.000 - 11:19:59.999 Interval that is displayed in the table. After
that during 18 minutes, from 14:08:08.144 to 14:26:53.042, user did not access another
fragment of the archive. User actions are not analyzed in more detail (for example, he could view
fragments continuously or frame by frame within the current Interval that matches Audit interval).
2. At 14:26:53.042 user set the archive pointer to the 09:11:17 time stamp that is beyond the
boundaries of the previous Audit interval and corresponds to the 09:10:00.000 -
09:14:59.999 Interval (by archive time) and began viewing the archive.
3. At 14:30:35 user accessed archive fragment in the 09:15:00.000 - 09:19:59.999 Interval
(by archive time).
4. At 14:35:34 user accessed archive fragment in the 09:20:00.000 - 09:24:59.999 Interval
(by archive time).
5. At 14:40:34 user accessed archive fragment in the 09:25:00.000 - 09:29:59.999 Interval
(by archive time). By the condition of the example, the user finished viewing the archive at
14:41:12 and switched to live video mode. At this moment the archive pointer has been set at the
09:25:34 time stamp that does not cross the boundaries of the current 09:25:00.000 -
09:29:59.999 Interval.
Warning! Third-party applications should not use the ports that are used in the SecurOS software.
www.issivs.com
SecurOS 479 Administration Guide
Appendixes
You should check your firewall settings and open the following ports in both directions for SecurOS
executable files *.exe located in SecurOS program directory.
TCP ports.
UDP ports.
Core
Databases 5432
Archiver 20901
Auxiliary components
www.issivs.com
SecurOS 480 Administration Guide
Appendixes
3D Map 26889
Integrations
IIDK 21030
SIP 20913
Intelligent Modules
Core
www.issivs.com
SecurOS 481 Administration Guide
Appendixes
Windows Server 2012 is completely a server operating system. There are no multimedia components
and services installed when you perform initial OS install. However, these system components are
necessary for proper SecurOS operation including, particularly, Video Capture Device with Player AVI
type, and must be installed manually. To install the Media Foundation component do the following:
Note. All actions must be performed under local or domain administrator account.
On the computer with Mail service installed open Control Panel and choose Add or Remove Programs,
then Add/ Remove Windows Components.
Choose Internet Information Services (IIS) from the list and click the Details button (see figure 297).
Enable SMTP Service in the list (see figure 298). Click OK and Next buttons.
www.issivs.com
SecurOS 482 Administration Guide
Appendixes
To configure SMTP server for message delivery, after SMTP service installation:
1. Open Control Panel Administrative Tools Internet Information Services.
2. On the left side of the new window (see figure 299) right-click Default SMTP Virtual server (or
another name, given by default) and choose Properties.
www.issivs.com
SecurOS 483 Administration Guide
Appendixes
7. Click OK to close SMTP server properties window and save all changes.
www.issivs.com
SecurOS 484 Administration Guide
Appendixes
It is recommended to disable system warnings on full disk for operator workstations / video servers.
Message Recommendations
Your key.iss file has expired. Contact Technical Support Team for
"Key file expired"
a new key (see Getting Technical Support).
www.issivs.com
SecurOS 485 Administration Guide
Appendixes
Message Recommendations
contact the local ISS Technical Support Team. Attach the system
information obtained from the SystemInfo utility.
During the SecurOS installation you specified interface language
that is not allowed in your license key. You should either re-install
"Language is not supported" SecurOS software on this machine and choose valid interface
language in Setup Wizard, or provide new key.iss file that
permits using this language.
Current section contains service information that is necessary on addressing to Intelligent Security
Systems Technical Support.
Note. Collected data have to be send to the Intelligent Security Systems Technical Support Team (see Getting
Technical Support).
www.issivs.com
SecurOS 486 Administration Guide
Appendixes
Note. Equipment Dallas code can be found by the Hardware Report Utility (see Hardware Report Utility for
detailed information about utility).
(*) name and version of the installed Intelligent Security Systems company software.
total number of video servers and monitoring (operator) workstations in the system;
operating system (name and service pack version).
9. Another useful information, if possible. For example:
computer equipment configuration.
central processors load.
main and virtual memory used volumes.
network load.
network and network neighborhood configuration.
www.issivs.com
SecurOS 487 Administration Guide
Index
A Advanced, parameter,
HTML5 FrontEnd, 171
Accept insecure connections, parameter, Alarm condition, parameter,
System, 121 Sensor, 286
Accept TLS connections only, parameter, Alarm threshold, parameter,
System, 121 People with no helmet detector, 369
access level, Alarming, property, 222
Configure, 135 Algorithm, parameter,
Control, 135 Wrong direction detector, 364
Full access, 135 Aling on display center, paramter,
Inherited rights, 135 HTML Dialog, 297
No access, 134 Allow access, parameter,
View, 134 System, 118
Access password, parameter, Allow auto logon for User(s), parameter,
Remote System, 380 Computer, 137
Access to Long-term archive, parameter, Allow connections from the following IP addresses only,
Media Client, 250 parameter,
account, Monitoring center agent, 388
postgres, 64 Allow to audit system, parameter, 133
ACS and Fire Alarm System Database, parameter, Allow to configure system, property, 133
Computer, 138 Allow to edit FaceX watchlists, parameter, 133
Action, parameter, 317 Allow to hold PTZ control, parameter, 133
Activate Camera or Microphone by double clicking, Allow to request PTZ control, parameter, 133
parameter, Allowed direction deviation, parameter,
Media Client, 248 Wrong direction detector, 363
Activate Desktop, parameter, 137 Always on top, paramter,
Active Directory / LDAP object description, 129 HTML Dialog, 297
Add directory, button, Analyze reduced FPS stream, max FPS parameter, 223
Archiver, 236 Application window (optional), parameter,
Add footer, parameter, External Window, 167
Media Client, 249 Application, parameter,
Add SecurOS Evidence Manager, parameter, External application, 149
Archive Converter, 228 External Window, 167
Additional information, property, 129 Archive Converter object description, 225
Additional neural filter of people, parameter, Archive export profile object description, 234
Intrusion detector, 353 Archive recording, 183
Line crossing detector, 359 archive recording to the files of specified length,
Loitering detector, 351 139
Running detector, 347 frames number, 184
Wrong direction detector, 364 frames queue, 185
Additional neural filter of vehicle, parameter, free disk space, 184
Intrusion detector, 353
www.issivs.com
SecurOS 488 Administration Guide
Index
www.issivs.com
SecurOS 489 Administration Guide
Index
Computers that are allowed to connect to the network, Detection period, parameter,
parameter, People with no helmet detector, 369
IIDK Interface, 322 Device control IP address, parameter,
configuration, Camera, 208
quick steps, 435 Device tree,
configuration examples, 266 Map, 159
domain for LDAP provider, 95 Device, parameter, 301
domain for Windows NT provider, 95 Digital zoom, parameter,
standalone configuration, 266 Media Client, 249
Video Server and Operator Workstation, 267 Directory, parameter,
Configuration Server address, parameter, Archiver, 236
Remote System, 380 Disable if Event Viewer exists, parameter, 303
Confirm new password, parameter, Disable NAT hole punching, parameter,
System, 118 Generic RTSP Video Capture Device, 210
Connect, radio-button, Disable saving data into local Protocol DB, parameter,
Database, 126 138
Contact, parameter, Disable shared PTZ control property,
SIP Device, 310 Camera, 204
SIP Subsystem, 309 Display area,
Contrast property, Map, 159
Camera, 203 Display, parameter,
Contrast, property, External Window, 167
Zone, Motion detection, 222 HTML form, 168
Coordinates, parameter, HTML5 FrontEnd, 170
Camera, 192 Map Window, 164
Create DB and User, button, Media Client, 248
Database, 128 SIP: GUI, 311
Create new level, button, Display, property,
Map, 159 Event Viewer, 166
Create new, radio-button, Do not adjust frame timestamp for fast forward
Database, 126 playback, parameter,
Crowd detector object description, 354 Camera, 200
Custom ringtone, parameter, Do not recover last, min, parameter,
SIP: GUI, 312 Camera, 201
Do not show the notification window when there are
D new problems, parameter,
Health Monitor, 99
Database name/User/Password, parameters,
Download speed relative to FPS, parameter,
Database, 127
Camera, 201
Database object description, 126 DSAdmin utility (dsadmin.exe), 453
Database Update Utility (idb.exe), 456 Duration of post-recording, parameter,
Databases, parameter,
Camera, 199
Databases Replicator, 150 Duration of pre-recording, parameter,
Day/Night shift level, parameter,
Camera, 199
Camera, 208 Duration, parameter,
Defocus detector, 217
Crowd detector, 355
Delete with primary archive, parameter, 138
Loitering detector, 351
Department object description, 128 Dwell time detector object description, 360
Description, parameter,
SIP Device, 311
Desktop object description, 151
E
Detection area, parameter, Edge device response timeout, parameter,
Defocus detector, 216 EdgeStorage Gate, 244
www.issivs.com
SecurOS 490 Administration Guide
Index
www.issivs.com
SecurOS 491 Administration Guide
Index
G I
Gain, parameter, 211, 283 Icons, parameter,
ONVIF type, 207 Map, 158
Gateway for video, parameter, ID, 74
Remote System, 381 ID, parameter,
Get IQN list (button), Macro (Actions), 317
iSCSI drive, 403 Macro (Event), 317
Grid, parameter, Identifier (Presets) property,
Layout, 219 Camera, 205
Guardant key, 445 Identifier (Tours), parameter,
installation, 23 Camera, 205
Ignore qop (Quality of protection) parameter with auth
H value when using digest authentication parameter,
Camera, 211
Hardware acceleration, parameter,
Ignore RTP SSRC, parameter,
Media Client, 249
Generic RTSP Video Capture Device, 210
Hardware property, 287
IIDK Interface object description, 321
Hardware Report Utility, utility, 445
Illumination mode, parameter,
Hardware, parameter,
Camera, 208
Sensor, 286
Image Processor object description, 240
HDR processing, parameter,
Import Cameras with IDs, parameter,
Camera, 212
Remote system, 387
Health Monitor object description, 98
Incident Types List parameter,
Helmets detection threshold, parameter,
Emergency service, 305
People with no helmet detector, 369
Information about configured window block,
Hidden, parameter, 316
Desktop, 152
High resolution, parameter,
Inner zone property, 225
Camera, 195
Integration point object description, 421
Media Client, 252
Integration with 3rd Party Systems, 321
Holidays, parameter,
Intersection of object and zone, parameter,
Schedule, 315
Dwell time detector, 362
Holidays, property,
Intrusion detector, 353
Security Zone, 123
Loitering detector, 351
Host property,
Intrusion detector object description, 351
FortNet integration, 424
IP address, parameter,
Host, parameter,
SIP Subsystem, 309
Bolid integration, 422
IP address, property, 189
Database, 127
IP-Device Manager object description, 79
Remote system, 386
IQN, parameter,
Host/Port, parameters,
iSCSI drive, 403
Emergency service (RTSP server), 305
IR filter mode, parameter,
Emergency service (WebView), 305
ONVIF type, 208
HTML Dialog object description, 296
Iris, parameter,
HTML Form object description, 168
ONVIF type, 207
www.issivs.com
SecurOS 492 Administration Guide
Index
www.issivs.com
SecurOS 493 Administration Guide
Index
www.issivs.com
SecurOS 494 Administration Guide
Index
R S
Samplerate, parameter, 281
Record system audit data, parameter,
Saturation, parameter,
System, 120
Recording control, parameter, ONVIF type, 207
Save button,
Media Client, 249
Recording mode, parameter, System, 119
Save movement coordinates (enables Smart Search),
Camera, 199
property, 222
Recover archive from the local storage of Camera (Edge
Save to file, button,
Storage), parameter,
Emergency service, 306
Camera, 200
Scale, parameter,
Reduce frame rate, parameter, 231
Reduce max FPS to, parameter, Map, 159
Scene Tab,
Camera, 199
Relay number, parameter, 287 Tracking Kit III plugin, 330
Schedule property,
Relay, object, description, 287
Remote debugger attaching, parameter, Archiver, 236
Schedule, object, description, 313
Node.js Script, 320
Schedule, parameter,
Remote system object description, 379, 386
Remove after property, VB/JScript program, 319
Script execution result window (Console), parameter,
Camera, 200
www.issivs.com
SecurOS 495 Administration Guide
Index
Script execution result window (Console), parameter, Smoke detector object description, 365
Node.js Script, 321 SMTP Server, parameter, 299
Script window, parameter, SNMP agent object description, 146
Node.js Script, 321 Sound card, parameter,
Search, box, Audible Notification Service, 303
Map, 159 Speaker property,
Security Zone object description, 121 Camera, 202
SecurOS Logging, 96 Specific date, parameter,
Select zone, parameter, Schedule, 315
Wrong direction detector, 365 Speed (person width per second), parameter,
Select, button, Running detector, 346
Archive Converter, 232 Split into files up to property, 228
External Window, 167 Standard layouts, parameter,
Send Ticket to Emergency Service, parameter, Media Client, 252
Event Viewer, 166 Standby mode, property,
Media Client, 250 Camera, 212
Sensitivity property, Stop execution (editor mode), parameter,
Light Detector, 225 Node.js Script, 320
Sensitivity, parameter, Store at least, parameter,
Smoke detector, 366 Camera, 199
Wrong direction detector, 365 Store, parameter, 138
Sensor, object, description, 285 Stream 1, parameter,
Serial port number parameter, Camera, 195
Camera, 205 Stream 2, parameter,
Server IP address, parameter, Camera, 195
Computer, 137 Stream 3, parameter,
Server Manager utility, 437 Camera, 195
Server, parameter, Subject, parameter, 300
Active Directory / LDAP, 130 superuser, 89
Set typical size of the object, button, System object description, 117
Object counter, 357 SystemInfo, utility, 446
Sharpness, parameter,
ONVIF type, 207 T
Short Dwell Duration, parameter,
TCP port, parameter,
Dwell time detector, 362
SIP Subsystem, 309
Short Message object description, 301
technical support,
Short Message Service object description, 301
gathering system information utility, 436
Short/Middle/Long range illumination, parameter,
how to get, 12
Camera, 208
how to prepare service information, 485
Show alarmed levels, parameter,
Test connection (button),
Map Window, 165
iSCSI drive, 404
Show all zones, property, 223
Test connection, button,
Show Camera ID, parameter,
Database, 127
Media Client, 249
Microphone, 283
Show level tree, parameter,
Text color,
Map Window, 165
Map, 158
Single-cell zoom with stream switching, parameter,
Time of acknowledgment of alarm event by the
Media Client, 249 operator, property, 166
Size property, Time to display Camera after alarm ends, parameter,
Camera, 203 Media Client, 247
Size, property, Title (Presets) property,
Zone, 223 Camera, 205
www.issivs.com
SecurOS 496 Administration Guide
Index
www.issivs.com
SecurOS 497 Administration Guide
Index
Viewing, parameter,
Camera, 193 X
Views list, parameter,
X, Y, parameter,
Media Client, 254
HTML Dialog, 297
Visual settings area,
X, Y, parameters,
Desktop, 152
Media Client, 248
Volume, parameter,
X, Y, W, H, parameter,
Audible Notification Service, 303
External Window, 167
www.issivs.com