Avigilon-Acc7-Client-User Guide.
Avigilon-Acc7-Client-User Guide.
Avigilon-Acc7-Client-User Guide.
This document has been compiled and published using product descriptions and specifications available at
the time of publication. The contents of this document and the specifications of the products discussed
herein are subject to change without notice. Avigilon Corporation reserves the right to make any such
changes without notice. Neither Avigilon Corporation nor any of its affiliated companies: (1) guarantees the
completeness or accuracy of the information contained in this document; or (2) is responsible for your use
of, or reliance on, the information. Avigilon Corporation shall not be responsible for any losses or damages
(including consequential damages) caused by reliance on the information presented herein.
Avigilon Corporation
avigilon.com
PDF-CLIENT7-G
Revision: 2 - EN
20201203
ii
Table of Contents
What Is the Avigilon Control Center Client Software? 1
System Requirements 1
Avigilon Certified Solution 1
ACC™ Client Software Requirements 1
Getting Help 2
Updating the Help Files 2
For More Information 3
Getting Started 4
Initial System Setup 4
Starting Up and Shutting Down 4
Discovering Sites 4
Sharing Discovered Sites 5
Disabling Automatic Site Discovery 5
Logging In and Out 6
Logging In 6
Logging Out 6
Changing Your Password 6
Activating a Trial License 7
Navigating the Software 8
Application Window Features 8
System Explorer Icons 9
System Management 10
Licensing the Site 10
Activating a License 10
Online Activation 10
Offline Activation 10
Changing Site Edition 11
Deactivating a License 12
Reactivating a License 13
Sites 13
Naming a Site or Server 13
Configuring FIPS Compliance 14
Server Communication 14
Client Communication 14
iii
Avigilon Certificates 15
Site Settings 15
Client Settings 15
Trusted Device Certificates 15
Encrypting Video 16
Encrypting Video from All Sites 16
Encrypting Video from Specific Sites 16
Multiple Server Sites 16
Connecting Servers to a Site 16
Disconnecting Servers from a Site 18
Site Health 18
Exporting a Report 19
Filtering Site Information 19
Viewing Site Logs 25
Exporting Site Log Results 26
Event Details 26
Site Log Descriptions 26
Server Events 26
Device Events 28
User Events 29
Access Events 31
Site Log Examples 32
User Group Added 32
Access Granted to a Device 32
User Accessed Footage from Multiple Cameras 33
User Group Privileges Update 33
User Information Update 34
User Performed Appearance Search 35
User Login Failed 35
Upgrading Your Site Remotely 35
Removing an Upgrade Installer 37
Backing Up Site Settings 37
Restoring Site Settings 37
Servers and Storage 39
Identity Data Retention 39
Recording and Bandwidth 39
Video Retention 39
iv
Data Aging 40
Configuring Data Aging 40
Continuous Archive 41
Enabling Storage Management 41
Enabling Continuous Archive 42
Resetting Continuous Archive 43
Manual Recording Setup 43
Setting Up a Weekly Recording Schedule 43
Recording Schedule Templates 44
Adding a Template 44
Editing and Deleting a Template 45
Failover Connections 45
Editing Failover Connections 45
Failover Examples 46
Recovering Video from Profile G Cameras 47
Server Management 48
Devices 48
Discovering a Device 48
Connecting a Device 49
Encrypting Avigilon Devices 51
Device Network Settings 51
Disconnecting a Device 52
Replacing a Device 52
Rebooting a Device 54
Upgrading Camera Firmware 54
Changing from LAN to WAN 54
Device Configuration 55
Setting a Device's Identity 55
Changing the Camera Operating Priority 55
Compression and Image Rate 56
Manually Adjusting Video Streams for Recording 57
Enabling HDSM SmartCodec™ Technology 59
Enabling Idle Scene Mode 60
Image and Display Settings 60
Image Dimensions 63
Privacy Zones 63
Adding a Privacy Zone 63
v
Editing Privacy Zones 64
Configuring PTZ 64
Configuring Digital Inputs 65
Configuring Digital Outputs 65
Configuring the Device Microphone 66
Configuring the Device Speakers 67
Video Intercom 67
Adding Rule to Answer Calls 67
Recording Video during a Call 68
Avigilon Presence Detector™ Sensors 69
Analytics 69
Enabling Analytics 69
Configuring Data Retention 70
Configuring Camera Analytics 70
Analytic Settings 70
Configuring Skin Temperature Thresholds 72
Toggling Degrees Celsius and Fahrenheit 73
Unusual Motion and Unusual Activity 73
Video Analytics Mode 73
Self-Learning 74
Self Learning Progress Bar 74
Resetting the Learning Progress 75
Teach By Example 75
Assigning Teach Markers 75
Editing and Removing Teach Markers 76
Applying Teach Markers 76
Teach Marker Status 77
Disabling Tampering Detection 77
Configuring Rialto Video Analytics Appliances 77
Users, Groups, and Permissions 78
Best Practices for Large Organizations 78
Best Practices 79
Importing Active Directory Users 79
Enabling the Active Directory 80
Nested Groups 81
Importing Groups 81
Importing Users 81
vi
Adding a User 81
Editing and Deleting a User 83
Adding Groups 83
Editing and Deleting a Group 84
Emergency Privilege Override 85
Group Privileges 85
Resetting a Password 88
Managing User Connections 89
Corporate Hierarchy 89
Setting Up a Corporate Hierarchy 89
Ranks 90
Unranked Groups 91
Deleted Ranks 91
Ranked Site Families 91
Site Families 92
Connecting Site Families 92
Disconnecting Site Families 92
Avigilon Cloud Services 93
Connecting to the Cloud 93
Before Connecting Your ACC Site 93
Registering Your Organization 93
Adding a Site to Your Organization 94
Adding Users to Avigilon Cloud Services 94
Signing In to Avigilon Cloud Services 95
Giving Users Additional Privileges 95
* Avigilon Cloud Services Regions 95
Disconnecting from the Cloud 95
ACM™ Appliances 95
Before Adding an ACM Appliance 96
Connecting an ACM Appliance to an ACC Site 98
Importing ACM Roles 98
Linking Doors to Cameras 99
Adding a Link 100
Editing and Deleting a Link 100
Adding Rules for ACM Appliance Events 100
vii
Changing the Application Theme 102
Editing the System Explorer 102
Changing the Video Display Settings 103
Video Overlays 103
Configuring Standby Mode 104
Changing Day/Night Mode 105
Using Digital Defog 106
Dewarping Fisheye Displays 106
Zooming and Focusing the Camera Lens 107
Measuring Pixels in the Field of View 108
Configuring Infrared LEDs 109
Displaying Video Analytics Activity 109
Displaying System Messages 110
Events and Rules 110
Analytic Events 110
Adding an Analytic Event 110
Editing and Deleting Video Analytics Events 112
Analytic Event Descriptions 112
Activities In Regions of Interest 112
Temperature Detection Activities 114
Motion Detection Events 115
Setting Up Classified Object Motion Detection 115
Setting Up Pixel Motion Detection 116
Adding a Rule 117
Scheduling Rules 118
Editing and Deleting Rules 119
Rule Events and Actions 119
Rule Events 119
Rule Actions 126
Rule Conditions 128
Notifications and Alarms 128
Alarms 129
Adding an Alarm 129
Editing and Deleting Alarms 130
Adding an Analytics Alarm 130
Email Notifications 130
Configuring the Email Server 130
viii
Adding Recipients 131
Editing Email Notifications 131
Email Notification Triggers 131
Central Station Monitoring 133
Face Recognition 133
Face Watch Lists 133
Editing a Watch List 134
Adding a Watch List 134
Deleting a Watch List 134
Configuring Data Retention 134
Exporting a Watch List to Another Site 135
Adding Watch List Profiles 135
Adding a Profile from Recorded Video 136
Profile Status and Quality 136
Editing a Profile 136
Changing Profile Expiry 137
Moving a Profile 137
Deleting a Profile 137
Searching from a Face Watch List Profile 137
License Plate Recognition 138
Setting Up License Plate Recognition 138
Configuring LPR Data Retention 139
Displaying the LPR Overlay 139
LPR Watch Lists 139
Adding a Watch List 139
Exporting a Watch List 139
Editing or Deleting a Watch List 140
Supported License Plates 140
POS Transactions 141
Adding a POS Transaction Source 141
Adding Data Formats 141
Adding Transaction Exceptions 142
Editing Transaction Sources 142
Joystick Settings 143
Configuring an Avigilon USB Professional Joystick Keyboard for Left-Hand Use 143
Configuring a Standard USB Joystick 143
Virtual Matrix 144
ix
Adding a Virtual Matrix 144
Adding Sites 144
Changing Primary Sites 144
Deleting a Virtual Matrix 144
Maps 145
Adding a Map 145
Adding Cameras to a Map 145
Editing and Deleting Maps 145
Web Pages 146
Adding a Web Page 146
Editing and Deleting Web Pages 146
x
Managing Alarms 159
Reviewing Alarms 159
Acknowledging Alarms 159
Arming Image Panels 159
Reviewing Alarms 159
Identity Verification 160
Monitoring License Plates 161
Enabling License Plate Overlays 161
Reviewing LPR Watch List Matches 161
Monitoring POS Transactions 161
Displaying Cameras Linked to POS Sources 162
Browsing the ACM Appliance in the ACC Client 162
Using a Map 162
Opening a Web Page 163
Paused Video 164
Using Linked Devices 164
Granting Door Access 164
Using Video Intercom 165
Using Audio 165
Configuring Two-Way Audio 165
Listening to Audio 165
Broadcasting Audio in a View 165
Triggering Digital Outputs 166
Managing Views 166
Cycling Cameras 166
Cycling Cameras across Sites 166
Adding and Removing Views 167
Cycling Views 167
View Layouts 167
Saving Views 168
Saving a View 168
Editing a Saved View 168
Renaming a View 168
Deleting a Saved View 168
Shared Views 168
Sharing a View 169
Leaving a Shared View 169
xi
Searching 169
Avigilon Appearance Search™ Feature 169
Searching by Description 170
Searching Recorded Video 170
Searching by Uploaded Photo 171
Avigilon Appearance Search Results 171
Refining Results 171
Saving Results 172
Identity Search 172
Identity Search Results 173
Refining Results 173
Saving Results 173
Searching Alarms 173
Searching Events 173
Searching Motion 174
Classified Object Motion 174
Pixel Motion 175
Searching License Plates 175
Searching Text Source Transactions 175
Searching Thumbnails 176
Searching by Drawing Box Around Object of Interest 176
Reviewing Search Results 177
Reviewing Results 177
Saving Results 177
Exporting 177
Adding Content to Export 177
Combining Export Files 178
Exporting Video History 178
Exporting Files 179
Export Options 179
Bookmarking Recorded Video 180
Adding a Bookmark 180
Managing Bookmarks 181
Archiving Recorded Video 181
Enabling Emergency Privilege Override 182
xii
Anonymous Data Collection 183
Keyboard Commands 183
Image Panel & Camera Commands 184
View Tab Commands 186
View Layout Commands 187
Playback Commands 187
PTZ Commands (Digital and Mechanical) 189
Joystick Controls 190
xiii
What Is the Avigilon Control Center Client
Software?
The Avigilon Control Center (ACC) Client software works with the ACC Server software to give you access
and control of your surveillance system.
The ACC Client software allows you to view live and recorded video, monitor events, and control user
access to the ACC system. The ACC Client software also gives you the ability to configure your surveillance
system.
The ACC Client software can run on the same computer as the ACC Server software, or run on a remote
computer that connects to the site through a local area network (LAN) or a wide area network (WAN).
What you can do in the ACC Client software depends on the site edition license. There are three editions
available: Core, Standard and Enterprise. Visit the Avigilon website at avigilon.com for an overview of the
features available in each edition.
System Requirements
Avigilon Certified Solution
l 2 Monitor or 4 Monitor Professional High Performance Remote Monitoring Workstation
o Preloaded with ACC Client software.
o Supports high resolution monitors.
o Includes the adapters and accessories for quick deployment.
o Includes Avigilon warranty and support.
CPU Intel® dual-core CPU (2.0 GHz) 8th Generation Intel Celeron® CPU or
higher
Video card PCI Express®, DirectX 10.0 compliant NVIDIA® Quadro® K620
with 256 MB RAM
Getting Help
If you want to learn more about a feature or how to accomplish a task, visit help.avigilon.com/acc or see our
in-product help. You must be logged in to a site to view the help.
The help files for the ACC Client software and Virtual Matrix software are stored with the ACC Server
application.
If one of these components is updated before the others, the help files may be out of date or describe
features that are not currently supported by your system.
l If the help files describe a new feature that is not currently supported by your copy of the software,
upgrade to the latest version of the software.
l If the help files are out of date, download the latest help files from avigilon.com. Once downloaded,
run the help installer on the server.
The help file installers are divided into the following regional language packs:
o Americas
l English
l French
l Spanish
o Asia
l Japanese
o Western Europe
l Dutch
l French
Getting Help 2
l German
l Italian
l Spanish
o Middle East
l Arabic
Technical Support
Contact Avigilon Technical Support at avigilon.com/contact.
2. Click Yes.
Discovering Sites
If your computer is on the same network (subnet) as a site, that site is automatically discovered and
displayed in the System Explorer.
If your site is not listed, it is because the site is on a different subnet and must be manually discovered.
By default, when a server is first connected to the system, it is added to a site with the same name. To locate
a new server, you need to search for its site.
Tip: After you discover and log in to a parent site, all child sites are automatically discovered.
Getting Started 4
1. In the Site Login tab, click Find Site.
2. Enter the IP Address/Hostname: and the Base Port: of the server in the site you want to discover.
The base port is 38880 by default. You can change the base port number in the ACC Admin Tool. For
more information, see The ACC Server User Guide.
3. Click OK.
If the site is not found, check the following before trying again:
Discovered sites are not shared with other computers or workstations on the network.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Site Networking tab, click Share Sites.
3. In the following dialog box, click Continue to confirm.
4. If prompted, click Yes again to let the ACC software make changes to the computer.
Discovered sites are now shared with all users on the computer.
Note: Using an older version of the ACC Client software may result in issues with shared
discovered sites. For best results, use the latest version.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Security tab, select the Disable automatic site discovery checkbox.
3. Click OK.
If you don't see your site, click Find Site… to manually search your network. For more information, see
Discovering Sites on page 4.
3. Enter your credentials, or select Use current Windows credentials and click Log In….
Tip:
l If Two-Factor Authentication is required, use a Time-based One-Time Password (TOTP)
authenticator app like the Google Authenticator™ mobile app to log in.
l If you can't log in using your Windows credentials, your system may use Kerberos as a
network authentication protocol. Contact your network administrator for help.
Logging Out
When you are finished using the ACC Client, log out.
1. In the top-right corner of the ACC Client, select > Log Out.
2. Click Yes.
If you have forgotten your password, contact your administrator to reset it. For more information, see
Resetting a Password on page 88.
Important: If you forget the administrator password, resetting it requires assistance from Avigilon
Technical Support and will impact every server in the site. Create at least one other administrator-
level user as a backup.
The password must meet the minimum strength requirements, defined by how easy it is for an
unauthorized user to guess.
Tip: Try entering a series of words that is easy for you to remember but difficult for others to
guess.
2. Click OK.
Tip: Finish organizing your multi-server site before activating a license to avoid reactivating the site
license each time a new server is added.
1 System Explorer Displays all servers, devices, and views associated with your site.
Use the search bar to find devices by name, location, Logical ID, IP
address, or serial number.
2 View Where you can monitor video and organize image panels. You can
customize the number of image panels and cameras displayed.
3 Image panel Displays live or recorded video. Access video controls by moving
your mouse over the panel.
5 Tabs Displays all views and tasks that are currently open.
New Task Menu Access system settings and features, depending on your
permissions.
l Red — Error
l Yellow — Warning
l Green — Information
Site — All connected devices and linked features are nested beneath a site.
Virtual folder — Used to group and organize items under a View tab.
Fixed camera.
Access Control Manager (ACM) appliance — For ACM appliances connected to a site.
ACM input.
A saved View.
A map.
A web page.
If you modify your system architecture by joining or removing servers from a site, reactivate your licenses to
confirm the system changes.
Activating a License
Once your license is activated, you can immediately use the new licensed features.
Tip: Finish organizing your multi-server site before activating a new license to avoid reactivating the
site license each time a new server is added.
Online Activation
If you have internet access, use online activation. However, if your site is large and contains hundreds of
licenses, the server may time out. See Offline Activation below instead.
If you copy and paste more than one comma-separated product key, the system will format it
automatically.
Offline Activation
Offline licensing involves transferring files between a computer running the ACC Client software and a
computer with internet access.
System Management 10
In the ACC Client:
If you copy and paste more than one comma-separated product key, the system will format it
automatically.
1. Go to activate.avigilon.com.
2. Click Choose File and select the .key file.
3. Click Upload. A capabilityResponse.bin file should download automatically.
4. Complete the product registration page to receive product updates from Avigilon.
5. Copy the .bin file to a computer running the ACC Client software.
In the ACC Client:
For example, if you had a 5-channel Enterprise edition license and later added a 15-channel Standard
edition license, you could change your site from Enterprise to Standard edition and use all 20 channels as
Standard edition licenses instead of 5 Enterprise edition channels.
Note: A license can be deactivated a limited number of times. If you encounter an error while
activating a previously deactivated license, this may be the issue. Contact Avigilon Technical
Support for help.
You can deactivate individual licenses and activate them on a different site. For example if you are
upgrading your server hardware, you can deactivate the license on the older server then activate the same
license on the new server.
Note: You will need a licensing.avigilon.com account. Contact your organization's Technical
Contact for access.
4. Complete the product registration page to receive product updates from Avigilon.
5. Copy the .bin file to a computer running the ACC Client software.
Deactivating a License 12
Reactivating a License
FOR ENTERPRISE EDITION
When servers are added to or removed from a site, the site licenses become inactive and must be
reactivated to confirm system changes.
If you do not reactivate the affected licenses, the site will stop normal operations.
4. Complete the product registration page to receive product updates from Avigilon.
5. Copy the .bin file to a computer running the ACC Client software.
4. In the License Management dialog box, click Apply….
5. Select the .bin file and click Open.
6. Click OK to confirm your changes.
Sites
Discover and manage sites, monitor site health and logs, and backup and restore site settings.
Reactivating a License 13
Configuring FIPS Compliance
You can select the level of compliance with the Federal Information Processing Standard (FIPS) 140-2
Security Requirements for Cryptographic Modules for server and client communication.
Server Communication
Define the level of compliance for cryptographic modules used for server communication.
Servers added to a multi-server site will use the same setting as the site.
Client Communication
Define the level of compliance for cryptographic modules used when the client logs in to sites.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Security tab, select the FIPS 140-2 Mode:
l Off — Allows log in using the default Secure Remote Password protocol (SRP).
l Relaxed — Allows log in using FIPS 140-2-compliant cryptographic modules and fallback
modules. SRP will not be used.
l Strict — Allows log in using only FIPS 140-2-compliant cryptographic modules.
3. Click OK.
Tip: The client setting does not need to match the site setting. The client can log in to sites that use
a different FIPS mode.
If your system is configured to use other trusted certificates, you can disable trusting the Avigilon certificate
authority.
Important: Make sure that you have set up trusted certificates on your ACC Servers and Clients
before disabling trust for the Avigilon certificate authority. For more information, see the Avigilon
System Hardening Guide or the ACC Server User Guide.
Site Settings
Client Settings
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Security tab, select the Require trusted server certificates checkbox.
3. Click OK.
Important:
Make sure that you have set up trusted certificates on your devices before disabling trust for the
Avigilon certificate authority. If any connected devices do not have trusted certificates properly
setup, you will receive an error message and won't be able to select this checkbox.
Click Device certificate report to generate a report of all devices that do not meet the certificate
requirements.
For more information on setting up device certificates, see the Avigilon H4 and H5 Camera Web
Interface Guide or the Camera Configuration Tool User Guide.
Avigilon Certificates 15
1. In the New Task menu , click Site Setup.
Encrypting Video
To improve the security of your ACC system you have the option of encrypting live video that your ACC
Client receives from sites. Recorded video is always encrypted. You can encrypt video from all sites, or
choose specific sites that will use encrypted video.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Security tab, select the Encrypt video from all sites checkbox.
3. Click OK.
This setting will enforce encrypted video for any new video streams on your ACC Client. Any previously
established connections will continue using their configured settings.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Site Networking tab, find and select a site that will use encrypted video from the list.
Repeat this step for any other sites that should use encrypted video.
4. Click OK.
A site can contain multiple servers that share settings and tasks. For example, users and groups that are
added to the site will automatically have access to all linked servers.
Tip: Plan how your system should be configured before connecting servers to sites to avoid
reconfiguring settings each time a server is added.
Encrypting Video 16
When servers are installed a significant distance apart, they may only share users and group information.
These sites can be joined into families. For more information, see Site Families on page 92.
Note:
l If you're using the Avigilon Artificial Intelligence (AI) Appliance, connect the appliance to an
NVR before connecting that NVR to your site.
l Servers must have the same version of the ACC software to be connected.
l Servers should be on the same broadcast domain or broadcast network because the servers
will exchange data.
l Ensure ports 38880 to 38884 TCP/UDP are open across the network.
l Ensure servers have unique hostnames.
l When a server joins a site, its site license must be reactivated. For more information, see
Reactivating a License on page 13.
2. Click .
The Site Management tab lists all accessible and connected sites and servers. If you can't find your
site, you'll need to search for it. For more information, see Discovering Sites on page 4.
Sites without any servers are automatically removed from the list.
After the server is connected to the site, settings are merged and the following rules are applied:
Note: Disconnect the server from a site before making any of the following changes:
Disconnected servers retain all settings from the site it was previously connected to.
2. Click .The Site Management tab lists all the sites that you can access and all the servers that are
connected to each site.
3. Select a server from the site and click Disconnect from Site….
4. After the server is disconnected, you'll need to reactivate the site licenses. For more information, see
Reactivating a License on page 13.
You can purchase new licenses for a disconnected server or you can deactivate the required licenses from
the previous site. Deactivated licenses can be activated for other sites. For more information, see
Deactivating a License on page 12.
Site Health
The Site Health tab provides an overview of your site.
For site families, if you are logged in to the parent site you can see the status of all child sites. If you are only
logged in to a child site, the parent site status is displayed as unknown.
Exporting a Report
You can export the site health information as a CSV or PDF file. The CSV file includes additional information
about device IDs and connection status.
Device information.
Site Information:
At the top of the tab are details about the site. This information is not displayed if the ACC ES HD Recorder
or ACC ES Analytics Appliance is functioning as an independent site.
Name Description
License Id: The site identifier used in the Avigilon licensing server.
Exporting a Report 19
Name Description
Site License Usage: The number of camera, FIPS camera, analytics, License Plate Recognition
(LPR), Face, and point of sale (POS) channels used over the total number of
channels available for the site.
Note: Channels from ACC ES appliances are not included in this count
and can be found in the Server License Usage: area.
Avigilon Cloud Services: The status of the connection to the Avigilon Cloud Services platform.
Server Name
At the top of each pane is the name of the individual server in the site. Beside the name is the server status.
General Information:
Name Description
Model Name: The server's model name. Only available if the server's SNMP service is
enabled.
System Name: The server's user-configurable name. Only available if the server's
SNMP service is enabled.
Service Tag: The server's service tag. Only available if the server's SNMP service is
enabled.
CPU Load: The percentage of server processing power that is used by the ACC Server
software.
Memory usage: The amount of memory used by the ACC Server software.
Up Time: The amount of time the server has been running since it was last rebooted.
Site License Usage: The number of site licenses used for camera, FIPS camera, analytics, LPR,
Face, and POS channels on the server.
Devices that do not generate video streams do not use camera channels.
Server License Usage: The number of factory-installed camera and analytics channels. These
channels are used before channels from the site licenses.
Peak Load (Last 3 Days): The highest percent usage of the analytics service over the last 3 days.
Cloud Service:
Name Description
Representing Site In a multi-server site, one ACC Server is Active and represents the site while
the other ACC Servers are on Standby for automatic activation.
Web Endpoint Status The operational status of the ACC Web Endpoint Service.
The ACC Server communicates with the ACS platform only when the ACC Web
Endpoint Service is up and the ACS platform is connected.
Cloud Connection Status The status of the ACC Server's connection to the ACS platform over the
internet of things (IoT) network.
Displays only when the ACC Server is connected to the ACS platform.
Last Connected The date and timestamp of the ACC Server's last connection to the ACS
platform.
Network Adapters:
Tip: For servers with multiple network adapters, use one for the camera network and another for the
coroporate network. You can do this by putting the network adapters in different IP subnets.
Adapter Name The name of the network adapter that is connected to the server.
Link Speed The maximum speed supported by the network adapter based on its network
connectivity. Ensure this is at least 1 Gbps for the camera network.
IP The IP address of the network adapter. Appears empty for network adapters
that are disconnected.
Outgoing The bandwidth usage of outgoing data. This includes video streaming to the
ACC Client software, ACC Virtual Matrix software, and ACC Mobile 3
application.
Hard Drives:
Only available if the server's SNMP service is enabled.
Name Description
Rollup Status The overall (worst) state of the hard disk. Statuses include:
l Other
l Unknown
l OK
l Non-critical
l Critical
l Non-recoverable
l Absent
SMART Alert If there is a Self-Monitoring, Analysis, and Reporting Technology (SMART) Alert
for the disk reliability or imminent failure, it will appear in this column.
Power Supplies:
Only available if the server's SNMP service is enabled.
Sensor State Additional information about the power supply provided by the sensor.
Cooling Devices:
Only available if the server's SNMP service is enabled.
Name Description
Temperature Probes:
Only available if the server's SNMP service is enabled.
Name Description
Name Description
Management URL The URL to access the storage controller web interface.
Last Updated Shows when the storage controller status was last updated. If the date is more
than 10 minutes in the past, the controller may be offline.
Devices:
Name Description
General The name, model number, location, and Logical ID of the device.
Compression The video compression rate, resolution, quality and images per second (ips) of
video streamed from the device.
Retention The age of the oldest recorded video that is not a protected bookmark, and
the age of the oldest archived video if available.
Device ID CSV export only. The device identifier. This contains information about the
camera, server, and site and can be used for third-party integrations.
Analytics The Avigilon Appearance Search, Face Recognition, or Face Mask Detection
feature is enabled, disabled, or unsupported.
Camera ID String CSV export only. The camera identifier. This can be used in third-party
integrations.
Connected CSV export only. Whether the device is connected to the server or not.
Visible CSV export only. Whether the device has been discovered by the ACC system
or not.
Error Flags CSV export only. A description of any authorization, network, or connection
errors that occurred.
Tip: Entire event details are viewed at the bottom of the Site Logs screen and are not saved to the
file. For some examples, see Site Log Examples on page 32.
Event Details
The following table describes the event details for a search result.
Property Description
Server: The name of the ACC Server that the event occurred on.
Client: The name of the machine and its IP address that the ACC Client runs on. For
User events only.
The following table describes the events of ACC server operation and failure in site logs.
Event Description
Server Events 27
Event Description
User Sync Occurs periodically to synchronize any connected Active Directory groups and
users information.
Device Events
Event Description
Device Events 28
Event Description
User Events
The following table describes the events of user and group administration updates.
Event Description
Any of:
User Events 29
Event Description
User Events 30
Event Description
Site View A user has updated the way cameras are organized in the System Explorer.
Central Station A user has sent a test message, known also as a heartbeat notification, to the
central monitoring station.
Any of:
Metadata Retention An operator has changed the settings for Metadata Retention.
Access Events
The following table describes the events of a user or group accessing the ACC system, and live and
recorded video.
Event Description
Access Events 31
Event Description
The following message shows an event about a user group that was added.
The following message shows a user group that was granted access to a device by the administrator user.
The following message shows an event about a user who has accessed video footage from multiple
cameras.
Message: Live video viewed for camera 'camera_B' from time 2019-10-01
01:23:12.123 PM to 2019-10-01 01:33:12.123 PM by 'username_A'
Message: Live video viewed for camera 'camera_A' from time 2019-10-01
01:12:12.123 PM to 2019-10-01 01:22.12.123 PM by 'username_A'
The following message shows the details of a user group privileges update.
Message: Site setting (user group 'groupname') - access right to site view,
'sitename', was added by administrator.
The following message shows an event about an Appearance Search performed by a user on an uploaded
photo, including the reason in Details and the photo, if available.
l Download and install the latest version of the ACC Client software first.
l NVR servers must run ACC Server version 5.10.24.1 or later.
l ACC ES Recorders must run ACC Server version 5.10.24.1 or later.
l Avigilon video analytics appliances must run ACC Server version 6.0 or later.
If your site is connected to ONVIF® Profile G cameras with SD cards that are recording video, the ACC
Server can recover video that is missed during the upgrade when the server comes back online. For
more information, see Recovering Video from Profile G Cameras on page 47.
ONVIF is a trademark of Onvif, Inc.
Tip: Between each step during Site Upgrade, you can close the dialog box and continue regular
operations.
1. Download the latest version of the ACC component installer from avigilon.com.
2. Install and run the latest version of the ACC Client software.
3. In the ACC Client software, log in to your site.
The installer will be uploaded to one server and then distributed to other servers in the site. This
process may take several moments.
When the installer has been distributed throughout the system, the Status column will display an
Upgrade button.
If the component was a service, plugin, or firmware upgrade, the server will not reboot. You may
need to open and close the Site Upgrade dialog to verify the ACC component version updated.
If the component was a server upgrade, the server will reboot. During the reboot, the server will
disappear from the list until it reconnects with the system. You may need to log back in to the site to
see the progress.
10. Repeat steps 6 and 7 for each component you want to upgrade.
Note: Backup files can only be restored on sites that are running the same or later version of the
ACC Server software.
Back up site and server configuration settings to apply them to a second site, or restore them in the event of
an unexpected system failure.
2. Click .
3. Select the server that you want to back up. Site settings are automatically included in the backup file.
4. Select the Encrypt the backup file. checkbox. Enter and confirm a password.
If this encryption password is lost, the file will not restore any system settings.
5. Click OK.
6. Name and save the file.
Note:
l You cannot restore settings from your 5.2.2 or earlier version server through this version of
the ACC Client software.
l Make sure the new site is licensed to run the same features as the previous site.
When you restore settings, existing settings are overwritten. When site settings are restored, the settings are
merged with previous settings.
2. Click .
3. Select the .avs file that you want to restore.
4. If the backup file is encrypted, enter the password.
5. Select the settings you want to restore.
l Restore site and server settings — Restores all settings in the site and the selected server.
Note: Do not select this option if the server is part of a multi-server site. The site
settings are maintained by the other connected servers.
Some custom settings have dependencies that may cause unexpected issues if they are not
supported by the server.
Only select servers from the Recommended Servers list. Servers in this list do not have any existing
device connections. Restoring settings to a server not listed may overwrite existing device
connections or cause the system to exceed its license and processing limits.
7. Click OK.
For example, a map from the import file is already used in the site. Currently, the map is stored
at the top of the site View. But in the import file, the map is kept at the bottom. After the import
settings are merged with the current site settings, the map is moved to the bottom.
Note: These settings override protected bookmarks and video retention settings.
Depending on your privacy policy or regional regulations, you may only be able to retain identifying data for
a specific amount of time.
Video Retention
The Total Record Time is estimated based on continuous recording and may not reflect the actual video
retention.
The actual video retention is determined by the Max. Record Time setting and the average camera data
rate. The actual retention time may exceed the Max. Record Time setting by 5 minutes.
To increase the amount of video stored when the Tier 1 storage is full, update the Data Aging setting to
discard a percent of the high-resolution video. The system will discard the oldest high-resolution video and
only store the low-resolution video to maximize storage. The oldest video stored will be low-resolution.
The extent of data aging that is available depends on the cameras connected.
l For JPEG2000 or JPEG compression cameras, data aging is available at three rates:
l High Bandwidth — Records at original quality.
l Half Image Rate — Records half of the data to make room for new recordings.
l Quarter Image Rate — Records a quarter of the original data, allowing you to still view older
video.
l H.265 and H.264 cameras that support data aging, are available at two rates:
l High Bandwidth — Keep the original high quality video and a secondary low resolution
stream.
l Low Bandwidth — Only keep the secondary stream of low resolution video.
Note: Data aging only occurs when the secondary stream is enabled.
l For H.265 and H.264 cameras that do not support data aging, only the High Bandwidth video is kept.
Note: When using Data Aging with the Continuous Archive feature, make a note of the lowest data
aging setting. The Continuous Archive settings should archive video at least one day less than the
data aging setting to ensure video is archived before it is deleted. For more information, see
Continuous Archive on the next page.
The Data Aging column shows an estimate of the recording time that is available at each image rate,
given the amount of space on the recording device.
Data Aging 40
3. In the Data Aging column, move the sliders to adjust the amount of video that is stored at each image
rate.
l To change the data aging settings for all linked cameras, move the slider for one linked
camera and all linked cameras will be updated.
l To change the data aging setting for one camera, break the camera's link to other cameras by
clicking the icon to the left of its name, then make your changes.
4. In the Max. Record Time column, manually enter a maximum record time or select one of the options
from the drop-down list for each camera.
Note: If the time estimated in Total Record Time is significantly shorter than the Max. Record
Time, the camera's actual recording time will be closer to the Total Record Time estimate.
The total recording time assumes continuous recording, and will increase with a Recording
Schedule.
5. Click OK.
Continuous Archive
FOR ENTERPRISE EDITION
The Continuous Archive feature automatically saves video to the archive directory in hourly blocks using the
server's local time.
Archived video can be accessed as recorded video. For more information, see Playing Recorded Video
with the Timeline on page 148.
4. Select the protocol and enter the path to the preferred archive location. Enter the network
location credentials if required.
Continuous Archive 41
l CIFS — Common Internet file system. The network path is typically in this format:
//<hostname or IP> / <path>
l NFS — Network file system. The network path is typically in this format: <hostname or
IP> : <path>
5. Click Apply.
Note: Set the Archive video older than: parameter to at least one day less than the Data Aging
setting. This ensures that you always have high quality video of important events. For more
information about Data Aging, see Recording and Bandwidth on page 39.
If you want archiving operations to occur 24 hours each day (including retries), specify the time
frame to be 00:00 to 23:59.
l Archive video older than: — The minimum number of days before recorded video is archived.
Ensure this value is less than the number of days specified in Recording and Bandwidth for
deleting High Bandwidth video on your local server. One fewer day is enough to account for
network restricted retries.
Tip: Recorded video remains in the site until it is removed by data aging. For more
information, see Recording and Bandwidth on page 39.
l Delete archived video older than: — Automatically deletes recorded video older than the
number of days specified. The maximum setting is 3650 days (10 years).
If this setting is smaller than the Archive video older than: setting, video will be deleted
immediately after it is archived.
6. Click OK.
The Status area displays information about the last, current, and queued archive jobs.
Each video archive is saved in a subfolder within the configured archive directory and is named after the
archive start date and time.
If an error or network issue occurs during the archiving process, the ACC system will automatically retry
archiving.
The next archive job will start at the beginning of the next hour, if permitted.
Click Apply to Devices… to apply the same settings to other cameras of the same model.
3. Click OK.
To learn how to start recording, see Manually Recording Video on page 148.
5. Click OK.
Adding a Template
l Select the Record a reference image every: checkbox and set the time between each
reference image.
1. In the Setup tab, select the server you want to edit and click .
2. Select a template from the Templates: pane and do one of the following:
l To edit a template, modify the schedule.
l To rename a template, click Rename Template and enter a new name.
l To delete a template, click Delete Template.
3. Click OK.
Failover Connections
FOR ENTERPRISE EDITION
When connecting devices, you have the option to assign a failover connection to a backup server. This
connection allows a device to continue recording if connection to the primary server fails.
Note: Failover connections can only be made between servers within the same site. When a
failover connection is made, a single failover license is required for each camera.
Each device can be connected to multiple servers. The Connection Type: determines when the device will
connect.
l Primary: — Devices automatically connect to this server when on the same network.
l Secondary: — When the Primary server is not available, the device will connect to this server.
l Tertiary: — When the Secondary server also fails, the device will connect to this server.
The License Priority: sets the order that devices will connect to a server — 1 is highest and 5 is lowest. If the
server does not have enough camera failover licenses, low priority devices may not connect.
6. Click OK.
Failover Examples
Cameras A, B, C, D, E and F have failover connections set to two different servers. For this example, the site
has 6 camera channel licenses with 4 failover licenses, and the license priority is set to 1 for each
connection.
When NVR 1 fails, cameras A and B from NVR 1 automatically connect to their Secondary server, NVR 2.
Failover Examples 46
When NVR 3 fails, cameras E and F automatically connect to their Tertiary server, NVR 2.
Note: The camera's time must be synchronized with the ACC system time to avoid losing video.
After a network connection or server issue is resolved, the system can recover the video from an ONVIF
Profile G camera that has an SD card recording video.
Server Management
View the operational status and configuration of your Avigilon Hardened OS appliance, which is pre-
installed with the ACC Server.
3. View the operational status in the web interface for your appliance. Depending on your appliance,
this may include the ACC Server name and license, System information, Storage disk, Network uplink
ports, and PoE ports. For more information, see the Avigilon appliance documentation.
Devices
Discover, connect, and manage devices.
Discovering a Device
Avigilon and ONVIF-compliant devices that connect to the same network as the ACC Server will be
automatically detected and added to the Discovered Devices list.
If a device is not automatically discovered, it may be on a different subnet or is a third-party camera that
must be manually discovered.
l Update the ONVIF-compliant firmware. Some firmware versions may require an update to
your ACC Server software.
l Configure the date and time details in the device's web interface.
l After the date and time details are entered, synchronize the device to an NTP server. The
ACC Server has a built-in NTP server using IP port 38884 UDP.
Server Management 48
1. In the site Setup tab, click .
2. In the top-left corner, click Find Device….
3. Fill the following fields to find a device:
l Search From Server: — Selects a server to connect to.
l Search Type:
l IP Address — Discover the device by IP address or hostname. The device and server’s
gateway IP must be set correctly for the device to be found.
l IP Address Range — Discover the device by searching within an IP address range.
l Device Type: — Select the device brand.
l Control Port: — Enter the device control port. The default port number is 55080.
l Apply credentials to all uninitialized devices. checkbox — Enter the password for the
administrator username, or create a username and set a new password.
Note: If you forget the login credentials for an added device, refer to factory reset
instructions in the device manual and repeat these steps to reset its password.
4. Click OK.
Added devices automatically appear in the Discovered Devices list. You can now connect the device to a
server.
Connecting a Device
Note: Some features are only available if the site has the required license, and if you have the
required user permissions.
To access a device, it must be connected to a server within your site. After a device has been discovered
on the network, it can be connected to the server. If you can't see your device, see Discovering a Device on
the previous page.
2. Click .
3. To display only devices in uninitialized state, select the Uninitialized devices checkbox. The devices
are displayed in the Discovered Devices area.
Connecting a Device 49
4. In the Discovered Devices area, select the devices and click Connect….
Tip: You can also drag devices to a server in the Connected Devices area.
Note: To connect multiple devices, all cameras must use the same connection settings. To
ensure you can enter login credentials for uninitialized devices, do not select a mix of non-
factory default devices and factory default devices.
For more information about Secondary or Tertiary connection types, see Failover Connections on
page 45.
8. In the License Priority: drop-down list, select the license priority — 1 is highest and 5 is lowest.
This defines the order that devices will connect to the server. If the server does not have enough
camera channel licenses, low priority devices may not be connected. Camera channel licenses are
only used when the device connects to the server.
9. If the camera supports a secure connection, the Device Control: drop-down list is displayed. Select
one of the following options:
l Secure — This default protects and secures the camera configuration and login details.
l Unsecure — The camera configuration and login details may be accessible to users with
unauthorized access.
10. In the Network Type: drop-down list, select LAN (local area network) or WAN (wide area network).
Select the WAN network type to connect cameras on your local network if the Internet Control
Message Protocol (ICMP) is blocked or disabled.
11. To connect the devices to the ACC Server, enter the password for the administrator username,
or create a username and set a new password.
Note: If you forget the login credentials for a device, refer to factory reset instructions in the
device manual and repeat these steps to reset its password.
Connecting a Device 50
12. In the Site View Editor, choose where to display your device in the System Explorer. If it is not
displayed, click .
l If your site includes folders, select a location for the device in the left pane.
l In the right pane, drag devices to set where they are displayed.
l If you are connecting multiple devices at the same time, the devices must be assigned to the
same location.
Tip: If your preferred site is not listed, temporarily connect the device to a different server
that is connected to the site you want.
FIPS 140-2 (Level 1) encryption requires that you have the feature licensed for your site and installed on the
server.
4. Click OK.
Note: If the device has a Zeroconf IP address of 169.254.x.x with subnet mask of 255.255.0.0,
change its IP address to a unique static private IP address in the same IP subnet as the server
network interface card (NIC).
For example:
The device will attempt to obtain an address from a DHCP server. If this fails, the device will
obtain an address through Zero Configuration Networking (Zeroconf) and select an address in
the 169.254.0.0/16 subnet.
l Use the following IP address: — Manually assign a static IP address to the device.
Enter the IP Address:, Subnet Mask:, and Gateway: you want the device to use.
4. Select the Control Port: for connecting to the device. This port is also used for manually discovering
the device on the network.
5. For cameras, select the Enable Multicast checkbox to enable multicast streaming from the device.
This is required to set up redundant recording to multiple servers.
Use the default generated IP Address:, TTL:, and Base Port:, or enter your own values.
6. Click OK.
7. For Rialto Video analytics appliances, allow the system to restart the device.
Disconnecting a Device
1. In the site Setup tab, click .
2. Select the device you want to disconnect from the Connected Devices list, then do one of the
following:
l Click Disconnect. The device will be disconnected from the server and moved to the
Discovered Devices list.
l Drag the device into the Discovered Devices list.
Replacing a Device
Disconnecting a Device 52
Note: For regularly scheduled maintenance, instead of replacing the device, disconnect it and
connect a temporary replacement. For more information, see Disconnecting a Device on the
previous page and Connecting a Device on page 49.
You can replace a device with a similar one and transfer its recorded video in the ACC system.
If the credentials are different, you may be locked out of the device.
For example, if a fisheye camera malfunctioned, you could install a new fisheye camera in its place.
After installation, the replacement device will automatically sync with the original device's recorded
video. However, if a video analytics camera is replaced with a fisheye camera, previously recorded
video will appear warped.
The replacement device will take the place of the original device for the following features:
You may need to reconfigure the device's image rate and compression settings or update its motion
detection area. If the replacement device has self-learning video analytics, is linked to ACM doors, or is
used for point of sale (POS) transactions or License Plate Recognition (LPR), reconfigure those settings.
The replacement device syncs with the original device's recorded video and settings.
Replacing a Device 53
Note: For devices with failover connections, the replacement device must replace the
original device on each failover server. For example, if you have a device with 3 failover
connections, you will have to replace that device 3 times. Failover level and license priority
are maintained.
Always uninstall the original device before replacing it in the ACC system. If you replace a device but did
not disconnect the original device from the network, you may receive a connection error if the original
device comes online. If this happens:
1. Disconnect both the replacement and original devices from the ACC system.
2. Perform a factory reset on each device.
3. Connect each device to the ACC system as described in Connecting a Device on page 49.
Rebooting a Device
You can restart all Avigilon devices through the device's General settings. This feature is not available for
third-party devices.
The device will disconnect from the Avigilon Control Center system and shut down. When the device starts
up again, the device will automatically reconnect with the server.
While a camera is being upgraded, is displayed beside the camera name. During the upgrade, video will
not display.
After the upgrade is complete, the System Explorer will display again and video from the camera will
resume.
Change the camera's network type to wide area network (WAN) mode before disabling ICMP to keep
cameras connected to the server.
Rebooting a Device 54
1. In the site Setup tab, click .
2. Select the device connections you want to edit from the Connected Devices list.
3. Click Edit….
4. In the Network Type: drop-down list, select WAN.
5. Click OK.
Device Configuration
Update compression and display settings, add privacy zones, and configure linked devices.
Tip: If Display Logical IDs is enabled in ACC Client Settings, the device's Logical ID will
appear beside the device's name in the System Explorer.
6. To disable the LEDs on a camera, select the Disable device status LEDs checkbox. This may be
required if the camera is installed in a covert location.
7. Click OK.
Device Configuration 55
Depending on the scene, you may want the camera to maintain a specific frame rate rather than use all
available features.
The camera will stream at the configured image rate even if it is unable to use other features
supported by the camera. Depending on the camera model, disabled features may include
self-learning video analytics, Unusual Motion Detection, Wide Dynamic Range (WDR), and
edge storage.
l Full Feature — the camera will maintain the function of all supported features as the priority.
The camera will dedicate more processing power towards maintaining the function of its key
features, and use an optimized image rate. Depending on the camera feature, the image rate
may be capped down to less than half the configured image rate.
3. Click OK.
For more compression and image rate options, see Enabling HDSM SmartCodec™ Technology on page 59,
Enabling Idle Scene Mode on page 60, and Manually Adjusting Video Streams for Recording on the next
page.
Total Camera Bandwidth: gives an estimate of the bandwidth used by the camera with the current
settings.
Note: For cameras capable of maintaining multiple streams, these settings only affect the
primary stream.
For H.265 and H.264 cameras and encoders, the image rate must be divisible by the maximum image
rate. If you set the slider between two image rate settings, the application will round to the closest
whole number.
6. In the Image Quality: drop-down list, select an image quality setting. An image quality setting of 1 will
produce the highest quality video, require the most bandwidth, and use more storage. The default
setting is 6.
7. In the Max Bit Rate: field, select the maximum bandwidth the camera can use in kilobits per second
(kbps).
8. In the Resolution: drop-down list, select the preferred image resolution.
For thermal cameras, use the default resolution for enhanced video quality.
9. In the Keyframe Interval: drop-down list, enter the preferred number of frames between each
keyframe.
It is recommended to have at least one keyframe per second. For example, if the Image Rate is 20
images per second (ips), set the Keyframe Interval: to 20. This results in 1 keyframe per second.
To help you determine how frequently keyframes are recorded, the Keyframe Period: area tells you
the amount of time that passes between each recorded keyframe.
10. If your camera supports multiple video streams, select the Enable Low Bandwidth Stream checkbox.
Depending on your version of the software, the checkbox may also be called "Enable secondary
stream".
When enabled, the lower resolution video stream is used by the HDSM™ technology feature to
enhance bandwidth and storage efficiencies.
11. Click Apply to Devices… to apply the same settings to other cameras of the same model.
For the following cameras, you can manually adjust the primary and secondary video stream or allow the
system to use HDSM technology to automatically adjust video bandwidth to meet your requirements:
Note: If a camera is connected to multiple servers (including failover), the following settings must be
the same at each server connection. Otherwise, settings may overwrite each other, and the camera
will not record with the correct stream settings.
Adjust the High Bandwidth Stream settings first. These settings are used to optimize the Low
Bandwidth Stream settings, so some of the settings may change depending on the settings for the
High Bandwidth Stream.
If you prefer to record higher resolution video, clear the Enable Low Bandwidth Stream checkbox
and adjust the High Bandwidth Stream settings.
7. Click Apply to Devices… to apply the same settings to other cameras of the same model.
8. Click OK.
The changes immediately take effect. The ACC Client software will continue to use HDSM technology to
manage the display of live video, but recorded video will only display the configured video stream.
HDSM SmartCodec technology operates by separating foreground objects from the background image,
then reduces bandwidth by increasing compression to the background image. Higher quality image is
retained for non-static objects of interest in the foreground while reducing bandwidth for static objects in the
background. When there is no motion in the scene, the HDSM SmartCodec feature switches the camera into
idle scene mode to increase bandwidth savings.
The HDSM SmartCodec feature uses the camera's motion detection area to help define when it should
switch to idle scene mode. You can configure the motion detection area from the Motion Detection dialog
box. For more information, see Motion Detection Events on page 115.
If the scene background does not provide any valuable information, for example a white hallway,
choose High to enhance bandwidth savings. If the scene background involves more movement, for
example a traffic intersection, choose Low. This setting provides you with some bandwidth savings,
while maintaining enough background clarity to see events in full context.
6. In the On Motion: section, choose the preferred Background Image Quality: option.
An image quality setting of 1 will produce the highest quality background image but require the most
bandwidth.
When motion activity is detected, the foreground areas of the video are streamed and recorded
using the High Bandwidth Stream settings while the background areas use the Background Image
Quality: setting.
7. In the On Idle Scene: section, enter the Post-Motion Delay: setting in seconds. This field defines how
long the scene must be idle before it switches to idle scene mode.
8. In the following Image Rate: bar, move the slider to select the number of images per second (ips) you
want the camera to stream while the scene is idle.
9. In the Image Quality: drop-down list, select the video image quality when the camera is in idle scene
mode. This setting is applied to the foreground and background image.
10. In the Max Bit Rate: field, select the maximum bandwidth the camera can use in this mode.
To help you determine how frequently keyframes are recorded, the Keyframe Period: area tells you
the amount of time that passes between each recorded keyframe.
Idle scene mode records video at a different frame rate and quality if there are no motion events detected
in the scene. This lowers the bandwidth and storage used when the scene is idle. When motion events are
detected, the camera automatically switches back to standard streaming mode.
To help you determine how frequently keyframes are recorded, the Keyframe Period: area tells you
the amount of time that passes between each recorded keyframe.
4. Click to toggle the Auto Contrast Adjustment. This change does not affect recorded video or
video displayed in other views. By default, Auto Contrast Adjustment is off.
5. If the camera supports day/night control, select one of the following options from the Day/Night
Mode: drop-down list:
l Automatic — The camera controls the infrared (IR) cut filter based on the amount of light in the
scene.
If available, move the Day/Night Threshold: slider to set the exposure value (EV) when the
camera changes from day to night mode.
l Day Mode — The camera will only stream in color and the IR cut filter is disabled.
l Night Mode — The camera will only stream in monochrome and the IR cut filter is enabled.
6. Adjust the camera's image settings to best capture the scene. A preview of your changes are
displayed in the image panel and the histogram.
Tip: Maximum Exposure:, Maximum Gain:, and Priority: control low light behavior.
Option Description
Synchronize Image Apply the same image settings to all camera heads.
Settings with All
Heads Zoom and focus settings must be set individually.
Exposure: Let the camera control the exposure by selecting Automatic, or set a
specific exposure rate.
Increasing the manual exposure time may affect the image rate.
Iris: Let the camera control the iris by selecting Automatic, or manually set it
to Open or Closed.
Maximum Exposure: Limit the automatic exposure setting by selecting a Maximum Exposure:
level.
By setting a Maximum Exposure: level for low light situations, you can
control the camera's exposure time to let in the maximum amount of light
Maximum Gain: Limit the automatic gain setting by selecting a Maximum Gain: level.
By setting a Maximum Gain: level for low light situations, you can
maximize the detail of an image without creating excessive noise in the
images.
Color Palette: Change how information captured from thermal cameras is represented
by selecting a Color Palette:.
When set to Image Rate, the camera maintains the set image rate as the
priority and will not adjust the exposure beyond what can be recorded for
the set image rate.
When set to Exposure, the camera maintains the exposure setting as the
priority and overrides the set image rate to achieve the best image
possible.
Flicker Control: If your video image flickers because of the fluorescent lights around the
camera, reduce the effects by setting the Flicker Control: to the same
frequency as your lights. Generally, Europe is 50 Hz and North America is
60 Hz.
Backlight If your scene has areas of intense light that cause the overall image to be
Compensation: too dark, move the Backlight Compensation: slider until you achieve a
well exposed image.
Enable Wide Dynamic Select this checkbox to enable automatic color adjustments through
Range Wide Dynamic Range (WDR). This allows the camera to adjust the video
image to accommodate scenes where bright light and dark shadow are
clearly visible.
Saturation: Move the slider to adjust the video's color intensity until the video image
meets your requirements.
Sharpening: Move the slider to adjust the video sharpness to make the edges of
objects more visible.
Image Rotation: Change the rotation of captured video by 90, 180, or 270 degrees
clockwise.
White Balance Control white balance settings to adjust for differences in light.
To let the camera control the white balance, select Automatic White
Balance, or select Custom White Balance to manually set the Red: and
Blue: settings.
Click Apply to Devices… to apply the same settings to other cameras of the same model.
7. Click OK.
Image Dimensions
Use the Image Dimensions dialog box to set the image dimensions for the camera. You can crop the video
image to help reduce bandwidth and increase the maximum image rate.
3. Click OK.
Privacy Zones
You can block the camera's field of view to protect privacy and personal information in live and recorded
video. A privacy zone is like blind spot for a camera. The area covered in the privacy zone cannot be used
for viewing, recording, motion detection, and analytics.
Image Dimensions 63
Editing Privacy Zones
Configuring PTZ
Use the camera General settings to enable and configure the motorized Pan, Tilt, Zoom (PTZ) for Avigilon
cameras. PTZ devices are connected to Avigilon cameras through RS-485 inputs.
Third-party PTZ camera controls cannot be configured through the Avigilon Control Center software.
Note: If the features described in the following steps are not displayed, the camera only has
a motorized zoom and focus lens. You will be able to control the zoom and focus settings
through the PTZ Controls pane but other PTZ controls will not be available.
3. In the Protocol: drop-down list, select the appropriate PTZ protocol. The available protocols include:
l AD Sensormatic
l AXSYS
l AXSYS DCU
l Ernitec ERNA
l Honeywell Diamond
l Kalatel ASCII
l Pelco D
l Pelco P
l TEB Ligne
l Videotec MACRO
l Vicon extended
l Vicon normal
l JVC JCBP
4. Enter the Dip Switch Address:, Baud Rate:, and Parity: for the PTZ device.
5. Click OK.
Once PTZ has been configured, you can use the camera's PTZ Controls while you watch the camera's live
video stream. For more information, see Controlling PTZ Cameras on page 153.
If the Recording Schedule is configured to record digital inputs, the cameras selected in the Link to
Camera(s): area are used to record the events triggered by this digital input.
8. Click OK.
Once a digital output is configured, you can manually trigger the digital output in an image panel. For more
information, see Triggering Digital Outputs on page 166.
By default, the system automatically selects the camera that this digital output is connected to.
8. Click OK.
Use the Microphone settings for any microphone connected to a camera or Avigilon video analytics
appliance. You can also link the audio to other cameras.
You must have speakers connected to the computer to hear the audio.
Use the Speaker settings for speakers connected to a device or Avigilon video analytics appliance. You can
also link the audio output to other devices.
Speakers must be connected to the device and a microphone must be connected to your local ACC Client.
Video Intercom
FOR STANDARD AND ENTERPRISE EDITION
Before an Avigilon Video Intercom device can start a call session, you need to enable the microphone and
speaker on the device in the ACC Client software, see Configuring the Device Microphone on the previous
page and Configuring the Device Speakers above.
Note: Push notifications are available for ACC Mobile 3 users using ACC Server version 7.6 or later.
If you upgraded from a previous version of the ACC Server software, remove and then re-add users
or groups in your Video Intercom rule to enable push notifications.
Tip: To have a call open up in one large image panel, create a Saved View with one image panel.
Select this View when specifying the rule actions.
To authorize ACC operators to receive calls from a Video Intercom, create a rule.
Note: If the device uses the Session Initiation Protocol (SIP) to send calls directly to a phone,
do not select the Video intercom call checkbox.
8. Click the blue text to specify the Saved View, linked cameras, and users.
9. Click OK, then click Next.
For instructions on how to add and edit rules, see Adding a Rule on page 117.
For information on answering calls, see Using Video Intercom on page 165.
If you experience voice echoing during calls, configure the intercom in the device's Web Interface to ignore
the operator's voice. We recommend having operators use a headset.
For more information, see Setting Up a Weekly Recording Schedule on page 43.
The APD sensor does not use a camera channel when connecting to an ACC site.
The APD sensor works by detecting a person in range and sending a Presence Detected notification.
Presence is indicated in the event timeline, and the system starts counting down the preconfigured Dwell
Time. If the person moves out of range, a Presence Ended event is recorded. If the person lingers in range
too long, a Presence Dwell Time Exceeded notification is triggered. Once they finally move, the Presence
Dwell Ended and Presence Ended event notifications are sent. To review these presence events, see
Searching Events on page 173.
Note: The APD sensor only detects the presence of moving objects within its range. It cannot
identify or count any objects detected.
2. Move the Range: slider to define the range within which motion can be detected. Enter the distance
from the sensor to the furthest edge of the floor or space. Accurately setting range is critical to avoid
detecting motion on the other side of walls or barriers, or detecting a specific distance in a lobby or
large space.
3. Set the Dwell Time: for define how long the APD sensor must detect motion before a Presence Dwell
Time Exceeded event is generated. Longer dwell times are best for detecting loitering, so that
normal activities in range do not generate events. Shorter dwell times are best for detecting activity
in restricted areas.
4. Move the Sensitivity: slider to define how sensitive the APD sensor is to fine movement, such as
breathing. Lowering the sensitivity helps prevent false detections.
Analytics
Configure and optimize video analytics settings for cameras and Avigilon video analytics appliances.
Enabling Analytics
You can enable and disable server-based analytics on cameras throughout your site to manage the server's
analytics load.
Only cameras that you have access to that have the prerequisite analytics enabled are displayed in
each tab.
The bars at the bottom display the server's capacity based on the number of cameras with analytics
features enabled. The percent usage of each analytics feature is displayed using the color of the
analytics feature tab.
4. Click Close.
Tip: You can configure these settings for multiple cameras using the Camera Configuration Tool
available on avigilon.com/support.
Next, you can enable self-learning and configure analytics events. For more information, see Self-Learning
on page 74 or Analytic Events on page 110.
Analytic Settings
Setting Description
Camera Type: Select the type of camera that has been connected.
l Day and Night — select this option if the camera can stream video in
color or black and white. This type of camera typically displays color
video during the day and black and white video at night to capture as
Analytics Scene Mode: Select the location that best describes where the camera is installed.
Enable Noise Filter Select the checkbox if the camera is too sensitive and falsely detects motion
as classified objects.
Display Classified Select the checkbox to display bounding boxes around classified objects in
Objects recorded video.
Enable Tampering Select the checkbox to enable tampering detection. If cleared, the device will
Detection no longer send tampering events.
Sensitivity: Enter a value between 1-10 to select how sensitive a camera is to tampering
events.
Analytic Settings 71
Setting Description
in the scene, like moving shadows, cause tampering events. If the camera is
installed indoors and the scene is unlikely to change, you can increase the
setting to capture more unusual events.
Trigger Delay: Enter a value between 2-30 to define how many seconds the camera will wait
before sending tampering events. The default value is 8.
If the tampering ends before the trigger delay time has elapsed, no tampering
events will be sent. If the time elapses but the tampering has not stopped, the
events will be sent by the camera.
Enable Self Learning Select the checkbox to enable self-learning. If you clear this checkbox, more
classified objects may be falsely detected.
Note: The following button is supported only for the Avigilon H4 Thermal Elevated Temperature
Detection camera.
If an elevated temperature at or above the threshold is detected, and a red bounding box
are displayed over the face in the live video.
l Lower Temperature Threshold (°C) or (°F): The threshold below which a person may need
further screening. Default is the calibrated value from the thermal camera.
If a lower temperature at or below the threshold is detected, and a white bounding box are
displayed over the face in the live video.
Any temperature detection that falls between the specified thresholds is considered within the
acceptable range. If a temperature is detected, and a green bounding box are displayed over the
face in the live video.
4. Click Restore Defaults to restore the calibrated value from the camera, if needed.
5. Click OK to apply the settings and exit, or click Apply to apply the settings without exiting.
Next, you can configure analytics events. For more information, see Analytic Events on page 110.
Supported on: Cameras with Unusual Motion Detection Cameras with Next-Generation Video
Analytics
Available in: Timeline, Focus of Attention interface, Timeline, Focus of Attention interface,
Event search, Rule triggers Event search, Rule triggers
Initial Learning 2 weeks, but events are reported while 1 week, but events are reported while
Period: the device is learning the device is learning
Tip: If your device is connected to a server that provides Classified Object Detection, you can
enable both analytics modes simultaneously. In the device Setup tab enable Unusual Motion mode.
In the server Setup tab enable server-based analytics. See Enabling Analytics on page 69.
Self-Learning
Self-learning is the ability of an Avigilon video analytics appliance or camera to perform self-adjustment of
the scene. The video analytics device adjusts itself to the activity in its field of view. This can significantly
improve the accuracy of classified object detection.
Self-learning can be enabled and disabled. Enable self-learning for all video analytic devices, except if:
For information on enabling self-learning, see Configuring Camera Analytics on page 70.
Learning progress depends on the amount of activity in the scene. Approximately 200 high-confidence
detections are required for optimal self-learning calibration. If the camera is moved or adjusted, reset it's
learning progress. For more information, see Resetting the Learning Progress on the next page.
Self-learning requires full-body detections. The learning progress may never reach 100% if only partial
bodies are detected in the device field of view. However, if the upper half of the body moves as expected,
Classified Object Detection will not be affected.
Self-Learning 74
Teach By Example can be used, even if the Self Learning progress bar is not at 100%.
Note: Always reset the learning progress for Self Learning, Unusual Activity Detection and Unusual
Motion Detection after a camera is physically moved or adjusted, or if the focus or zoom level is
changed. Any change in the camera's field of view affects the video analytic results.
Cameras with Avigilon self-learning video analytics, Unusual Activity Detection, or Unusual Motion Detection
learn the scene.
When the learning progress is reset, all learning data is cleared and the device to re-learns the scene. This
prevents missed and false detections based on old data.
Tip: If you reset the Self Learning progress, you do not need to reset the Unusual Activity or Unusual
Motion learning progress. If you disable the Self Learning feature, we recommend resetting the
Unusual Activity or Unusual Motion progress.
Teach By Example
Teach By Example helps Avigilon video analytics cameras learn the scene to improve classified object
detection accuracy.
Teach By Example collects feedback by applying assigned Teach Markers in recorded video. While any
user can assign the markers, administrators decide which markers are most useful considering the
environment, lighting, and field of view for each camera. Teach By Example is not required for video
analytics cameras, but will help reduce the number of false alarms after self-learning is complete or
disabled.
When motion is detected, a bounding box will appear around the detected motion.
6. Click inside the bounding box and mark the motion as either a True or False person or vehicle. Teach
markers do not differentiate vehicle types.
7. Repeat until at least 30 true and 30 false markers have been assigned.
Tip:
l Include True and False examples from scenes with different lighting.
l To find False markers, search for events longer than 2 seconds with a confidence
level greater than 20%.
Note: Always restore factory default settings after a camera is moved or adjusted, or
if the zoom or focus have changed.
The assigned markers list is empty because the markers have been applied to the device. You can verify
that the device was updated by checking the Teach Marker status.
Note: For cameras connected to a Rialto video analytics appliance, the Teach Markers
Applied: field will display Unknown.
If you are configuring an analog video analytics appliance, ensure the cameras are physically connected to
each camera channel before connecting the appliance to the system.
If you are configuring an IP video analytics appliance, any camera on the network can be digitally connected
to the appliance camera channels. Before you complete this procedure, connect the required cameras first.
Note: Rialto video analytics appliances do not support the Avigilon Appearance Search feature.
Note: If the camera you link to has a resolution higher than 2.0 MP, the video analytics
appliance will use the camera's secondary video stream. This does not affect the
resolution of recorded video.
After you select the camera, the dialog box expands to display the video analytic event
settings.
4. Configure the available analytics settings. For more information, see Configuring Camera Analytics
on page 70.
5. Click Apply to save your settings.
6. If you are prompted, allow the device to reboot.
For more information, see Self-Learning on page 74 or Analytic Events on page 110.
Tip: Changes to users, groups, and permissions can be viewed in the Site Logs.
When you have a large organization, you need detailed access permissions to manage system use.
The Avigilon Control Center software has several ways to manage large organizations.
l Active Directory Support — Synchronize with Windows Active Directory to quickly import users. For
more information, see Importing Active Directory Users on the next page.
l Group Privileges: — Users are added to at least one group to define their access to features and
devices within the system. Users with the Setup user and group settings permission can create and
edit groups. For more information, see Adding Groups on page 83.
Best Practices
We recommend the following practices for maintaining a secure system:
l Use a strong administrator password to protect your site from unwanted access.
l Add a secondary ACC Administrator user with identical privileges as a backup. A secondary, well
guarded user can maintain access if the primary account's password is forgotten or the site is
compromised. Create a secondary Administrator user on your Windows server as well.
l Assign all groups a rank. Any groups that are Unranked will have access over all other groups. The
default administrators group is Unranked automatically, but you are free to create a group for admins.
For more information, see Corporate Hierarchy on page 89.
l Limit the number of users in the default Administrator group. The Administrator group should be used
only for system maintenance.
l Consult your Information Security office or IT administrator for password strength and expiry
recommendations.
l Confirm that device access permissions are correct after a child site has been connected to a parent
site. Ranked groups from the parent site whose rank is above or equal to the child site retain their
permissions on the child site.
l Check group access permissions after a new server has merged into the site.
l If groups have the same name, the previous site settings are used and users from both the site
and server are added to the group.
l New groups to the site and server automatically receive access to all connected devices.
l Always check access permissions after new users and groups settings are imported into the site.
l Groups with the same name with share import settings, adding users from both the import file
and the current site are added to the same group.
l Groups added from the import file automatically gain access to all new devices that were
added since the settings were exported.
Importing Active Directory groups and users allows users to log in with their existing credentials. Members of
an imported Active Directory group are automatically added as users to the site.
Changes to users in the Active Directory are synchronized with accounts in the ACC software.
Best Practices 79
Note: User information, including credentials, is maintained by the Active Directory. You can only
disable an imported user, assign the user to a group, or configure the user's Login Timeout in the
ACC software.
Important: If your site is connected to an ACM appliance, enabling Active Directory will disable
previously imported ACM roles. To use Active Directory, an ACM administrator must configure
remote authentication from external domains in the ACM appliance first. For more information, see
the ACM help files.
Note: The default IP port is 389 UDP. Ensure that this IP port is open between each ACC Server and
all Active Directory servers used for ACC authentication.
The ACC service account is either the Local System account or the account specified in
Windows Service under the Avigilon Control Center Service Properties in the Log On tab on
the computer running the ACC Server software.
l Avigilon Hardened OS appliances only sites: Enter your domain, username (for example,
[email protected]), password, and domain controller URL (for example,
ldap:\\dc-server.domain.com).
l Mixed Windows and Avigilon Hardened OS appliance sites:
l In the Windows server settings, enter your username (for example,
[email protected]) and password. Clear the Use ACC service account and
Enable nested groups checkboxes.
l The Avigilon Hardened OS appliance Active Directory settings can be left blank. After
the Avigilon Hardened OS appliance is added to the site, it will inherit the site settings.
Nested Groups
FOR WINDOWS SERVERS ONLY
With ACC version 7.8 or later, nested Active Directory groups are imported by default if the Windows user is
part of the parent group.
However, some Active Directory group configurations are very complicated and even recursive. If you
experience long log in times or nightly directory sync errors, you may need to disable nested group support.
l In the External Directory tab, clear the Enable nested groups checkbox.
Importing Groups
After Active Directory is enabled, you can import groups and nested groups from trusted domains within the
same forest. All users in the group are automatically imported, and will belong to the permissions group.
Importing Users
After Active Directory is enabled, you can import users from trusted domains within the same forest.
Adding a User
Add users to monitor and manage your site.
Nested Groups 81
You can also add users through Active Directory. Ensure all user accounts are unique. For more information,
see Importing Active Directory Users on page 79.
Tip: Click an access group to display the group's privileges and access rights.
The password must meet the minimum strength requirements, defined by how easy it is for an
unauthorized user to guess.
Tip: Try entering a series of words that is easy for you to remember but difficult for
others to guess.
l Require password change on next login — The user must replace the password after the first
login.
l Password Expiry (Days): — The number of days before the password must be changed.
l Password never expires — The password will never need to be changed.
9. To enable access to Avigilon Cloud Services, ensure the correct email address is entered and select
the Connect checkbox.
The user will receive an email invitation after the site is connected to the Avigilon Cloud Services.
Adding a User 82
Editing and Deleting a User
Edit and delete users as needed. If a user has access to more than one site, the changes to the user need to
be made on each site.
Note: You cannot edit or delete users that are above, or in the same ranked group as you. You
cannot edit your own user account unless you belong to an Unranked group.
You can only change the Login Timeout, assign a group, or disable users imported from an External
Directory. All other settings are maintained by the External Directory.
Adding Groups
Groups define which features users can access. You can further define privileges by assigning each group a
rank, and setting rules on what a group can access. For more information, see Corporate Hierarchy on
page 89.
Users will need an authenticator app on their mobile device to scan a QR code before they
can log into a site.
Ensure your servers sync to a real-time source. If the time on the user's device does not match,
they will not be able to log in. Verification codes are only valid within 5 minutes.
Important: Users with Two-Factor Authentication enabled will not be able to use the
ACC Mobile 3 app or the ACC Virtual Matrix software.
e. To enable Emergency Privilege Override, select the Enabled checkbox. For more information,
see Emergency Privilege Override on the next page.
f. Select the required Group Privileges: and Access Rights: for the group. For more information,
see Group Privileges on the next page.
6. Click Enable Dual Authorization to configure Dual Authorization settings. When enabled, users
cannot review recorded video without permission from the authorizing group.
a. Click the toggle to enable Dual Authorization. Click again to disable Dual Authorization.
b. Select which groups can authorize users.
c. Click OK.
7. In the Members tab, add users to the group.
If a user is added to the group through Add/Edit User, the user is automatically added to the group's
Members list.
Create a new group to manage who has Emergency Privilege Override permissions.
Users assigned to groups with this privilege can enable Emergency Privilege Override. For more
information, see Enabling Emergency Privilege Override on page 182.
Group Privileges
To learn how to add a group, see Adding Groups on page 83.
View images recorded before login Allows users to view images recorded before
their current login session.
Licensed search for identifying features Allows users to perform the following searches, if
configured:
l Appearances
l Identity
l LPR
l Text Source Transactions
Manage saved views Allows users to add and edit saved Views.
Manage maps Allows users to add and edit maps and Maps
(Beta) if applicable.
Manage web pages Allows users to add and edit web pages.
Manage virtual matrix monitors Allows users to add and edit Virtual Matrix
monitors.
Manage user sessions Allows users to log other users out of the site.
Setup network settings Allows users to edit the Network dialog box.
Setup image and display settings Allows users to edit the Image and Display dialog
box.
Group Privileges 86
Group Privileges Description
Setup compression and image rate settings Allows users to edit the Compression and Image
Rate dialog box.
Setup dewarping settings Allows users to edit the Dewarping dialog box.
Setup image dimension settings Allows users to edit the Image Dimensions dialog
box.
Setup motion detection settings Allows users to edit the Motion Detection dialog
box.
Setup privacy zone settings Allows users to edit the Privacy Zones dialog
box.
Setup manual recording settings Allows users to edit the Manual Recording dialog
box.
Setup digital input & output settings Allows users to edit the Digital Inputs and Outputs
dialog box.
Setup analytics settings Allows users to edit the Analytic Events dialog
box.
Setup PTZ settings Allows users to edit PTZ presets and tours.
Setup user and group settings Allows users to edit the Users and Groups dialog
box.
Setup corporate hierarchy Allows users to edit the Edit Corporate Hierarchy
dialog box.
Group Privileges 87
Group Privileges Description
Setup alarm management settings Allows users to edit the Alarms dialog box.
Setup POS transaction settings Allows users to edit the POS Transactions dialog
box.
Setup LPR watch lists Allows users to edit license plate watch lists.
Setup external notification settings Allows users to edit the External Notifications
dialog box.
Setup rule engine settings Allows users to edit the Rules dialog box.
Connect and disconnect devices Allows users to connect and disconnect cameras
and other devices to servers.
Setup recording and bandwidth settings Allows users to edit the camera Recording and
Bandwidth settings.
Resetting a Password
Only administrators can reset a user's password.
Note: To maintain strict security, administrator passwords can only be reset by Avigilon Technical
Support.
Resetting a Password 88
1. In the New Task menu , click Site Setup.
Tip: Select the Require password change on next login to let the user update their
credentials after they log in.
6. Click OK.
Corporate Hierarchy
You can set up a Corporate Hierarchy in the system to reflect your organization's structure.
Rank groups to help define what group members have access to. Users cannot see groups of equal or
higher rank than the group they belong to. If users belong to multiple groups of different ranks, they will be
able to view all ranks below the highest rank they belong to. For more information, see Ranks on the next
page.
Sites can also be connected together, into families, and given ranks in the Corporate Hierarchy. This further
defines what devices and events users can control. For more information, see Site Families on page 92.
Ranks are also assigned to sites when organized into families. For more information, see Site Families on
page 92.
If you have not yet created a Corporate Hierarchy, you will be prompted to create one. Click Yes.
The default and highest rank is Global. It can be renamed, but not deleted.
5. Select a rank, then click Add to add a subordinate rank below it in the hierarchy.
6. To rename a rank, double-click the name and enter the new one. Clicking outside the text field will
save the change.
7. To delete a rank, select it and click Delete. Any subordinate ranks will be deleted.
8. Click OK to save your changes.
You can now assign ranks to groups. For more information, see Adding Groups on page 83.
Ranks
Ranks within Corporate Hierarchy represent the permission levels of your organization. For more
information, see Corporate Hierarchy on the previous page.
Global is the default, and also highest rank in the Corporate Hierarchy.
To further explain ranks, we'll use this example. Canada is the highest, Global rank while West Coast and
East Coast are equal rank, below Canada. Users in East Coast cannot edit ranks below West Coast.
Ranks 90
Unranked Groups
The Unranked groups are outside the Corporate Hierarchy and cannot be deleted or edited. Users
belonging to Unranked groups are able to create and edit any ranked or Unranked groups and users.
The default groups Administrators, Power Users, Restricted Users, and Standard Users are Unranked.
Deleted Ranks
If a rank is deleted, groups in this rank are removed from the hierarchy and assigned the lowest rank
possible. Those users are only visible to Unranked and Global users.
Unranked and Global users can reassign group ranks at any time. Members of the orphaned rank have no
Setup user and group settings privileges but will retain basic privileges.
Deleting a rank will delete all subordinate ranks. Remotely synchronized users and groups may become
inaccessible.
Unranked Groups 91
The Corporate Hierarchy is configured through the parent site and tied to the Global. For more information,
see Site Families below.
Site Families
FOR ENTERPRISE EDITION
Independent sites can be connected to create a site family. User, rank, and group information is centrally
managed by the parent site while the child sites can define local users and groups.
Tip: To connect a single server to a different site, click the server , then click Connect to
Site….
Note: Network issues may require revoking access from the parent site.
Site Families 92
Avigilon Cloud Services
Avigilon Cloud Services enables a modern cloud-connected user experience, accessible from a web
browser or the ACC Mobile 3 app.
For more information about using the Avigilon Cloud Services platform, see help.avigilon.com/cloud.
l Ensure each server has the correct time zone, date, time, and daylight saving time settings. For a
multi-server site, ensure the servers are synchronized to a network time protocol (NTP) server.
b. Create a password. This password is unique to Avigilon Cloud Services and does not need to
match your ACC password.
If you are a federated user, you are not prompted to set a new password. Avigilon Cloud
Services will use your identity provider credential, such as a Microsoft account.
c. Select your Preferred communication language. This sets the language for emails from
Avigilon Cloud Services.
d. Click Submit, then click Sign in and enter your credentials.
The system should connect shortly. If the system takes more than 15-20 minutes to finalize the
connection, disconnect your site and try again.
The user will receive an email invitation with a registration link that expires within 24 hours.
5. Click Close.
You can confirm the status of your connection on the Site Health page. For more information, see Site
Health on page 18.
ACM™ Appliances
FOR STANDARD AND ENTERPRISE EDITION
A site can connect to a single Access Control Manager (ACM) appliance. Once connected, you can import
ACM roles, link cameras to doors, and add rules for ACM events.
Before an ACM appliance can be added to your ACC site, there are several configuration steps required in
the ACM appliance.
For more information about any of the following settings, see the ACM help files.
Note: If you are using an ACM appliance version 5.10.10 SR1 or later, an ACC Administrator
delegation and role have already been created. Double-check that the delegation has all rights
listed in step 1 below, and that the role is set up as described in step 3.
1. Create a delegation for integrating with the ACC software. This delegation must have the following
rights:
l Appliance Listing
l Delegations Listing
l Doors Grant
l Doors Listing
l Identities Listing
l Identities Login - Remote
l Identities Photo Render
l Inputs Listing
l Panels Listing
l Partitions List
l Roles Listing
l Subpanels Listing
l System Summary Listing
2. Create a routing group to define events sent from the ACM appliance to the ACC software.
a. Specify the following for the group:
l Schedule: 24 Hours Active
l Schedule Qualifier: Appliance
l The Installed box must be checked
b. Add the following event types to the routing group:
l Door held open
l Forced Door
l Intrusion
l Invalid Credential
l Maintenance
3. Create a role that allows the ACC software to communicate with the ACM appliance:
a. Keep the default Parent value (none).
b. Keep the default Start Date value (the current date).
c. In the Stop Date box, enter an appropriate date for this role to expire. By default, the role will
stop working 1 year from its creation date.
d. Select the Installed checkbox and click Save.
e. In the role's Delegate tab, assign only the delegation that was created in the preceding steps.
f. In the Routing tab, assign only the routing group that was created in the preceding steps.
4. If you plan to import Active Directory identities to the ACM appliance or the ACC software, configure
a Lightweight Directory Access Protocol (LDAP) Collaboration. For Active Directory Remote
Authentication, configure remote authentication from external domains.
Note: To protect the security of the connection between the ACM appliance and the ACC
software, the dedicated identity should have only the permissions outlined in this procedure.
Operators should not have access to this account.
The password strength is defined by how easy it is for an unauthorized user to guess. It is
highly recommended that you select a password that uses a series of words that is easy for
you to remember but difficult for others to guess.
l Under the identity's Roles tab, assign only the role that was created in the preceding step.
6. If your ACM appliance uses partitions, add the identity as a member of the partitions they will need to
access from the ACC Client.
7. Configure the ACM appliance to use the same NTP Time Server as the ACC Server.
For Windows systems, the ACC Server gets its time from the operating system. For Avigilon
Hardened OS appliances, the NTP Time Server can be configured through the device's web
interface.
a. In the top-right corner, click the gear icon to open the Setup & Settings menu and select
Appliance.
b. In the Time Server box, enter the Time Server IP address.
Once these settings are applied, you can connect to the ACM appliance from the ACC Client.
Connect an ACM appliance to your ACC site and you can link doors controlled by the appliance to cameras
controlled by the ACC software. After doors and cameras are linked, you can configure rules that are
triggered by doors in the ACC software.
Note:
Make sure you have the following before you begin.
2. Click .
3. Enter the required credentials.
4. Click OK.
Confirm that the listed SHA-256 fingerprint ID is the same. Fingerprint information is typically listed on
the Appliance:Edit page, under the SSL Certificate tab.
The ACM appliance is now listed under the site as Hostname in the Setup tab.
Important: Usernames in the ACC software and ACM appliance must be unique. Duplicate names
will not be imported.
Note:
l Importing ACM Roles to a site will disable all Active Directory users in the ACC software. To
continue using Active Directory with ACM Roles, configure remote authentication from
Import Roles from the ACM appliance to give users access to cameras and doors. When you import a role,
you also import the identities that are assigned to the role. Only identities with a username and password in
the ACM appliance will be imported.
Once imported, the roles are added to the External Directory list and the Groups list. All identities assigned
to the role are imported into the Users list.
Imported roles can be edited for ranks, feature privileges, and device access rights to the imported role.
You cannot assign ACC users to an ACM role from the ACC Client software.
Imported identities can be added to existing groups in addition to the role they were imported with.
Imported identity information, including login credentials, is maintained by the ACM appliance.
Note: To use this feature, your ACM identity must be imported into the ACC software and have the
appropriate ACM permissions. Contact your ACM administrator to update your permissions.
Doors that are installed and connected to installed panels or subpanels can be linked to any number of
cameras in your site. Once a link is created, authorized users can monitor doors, identities, and configure
rules in the ACC software.
Contact your ACM administrator to configure the doors you want to link.
Note: The available doors depend on your permissions in the ACM appliance. Contact your
ACM administrator to update your permissions.
5. In the Select one or more cameras drop-down list, select the checkbox beside all the cameras that
you want to link to the door.
6. Click OK.
Note: To use this feature, your ACM identity must be imported into the ACC software and have the
appropriate ACM permissions. Contact your ACM administrator to update your permissions.
You can create rules in the ACC software that are triggered by ACM appliance events. These events can
include attempts at door access and badge readers, and can trigger live video that immediately displays on
all user's screens.
For a complete list of rules, actions, and conditions for access control events, see Rule Events and Actions
on page 119.
If there is blue underlined text in the rule description, click on the text to further define the event.
4. Select all the actions that will occur in response to the triggers.
If there is blue underlined text in the rule description, click on the text to further define the action.
5. Select one or more conditions that will cause the rule to run. To always run the rule, clear all
conditions.
If there is blue underlined text in the rule description, click on the text to further define the condition.
6. Enter a Rule Name:, Rule Description:, and assign a Schedule:. For more information, see Scheduling
Rules on page 118.
Display Settings
You can select a theme for the ACC Client software, update the Site View to change the order of the
System Explorer, and configure how the ACC Client software displays video.
Use a dark theme to reduce eye strain when using the software in a dark room.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Display tab, select a theme.
3. Click OK to save your changes.
Note: These settings only affect the System Explorer in the View tab.
l To add a folder, click . Folders are only visible in the View tab.
l To delete a folder, select the folder and click . The elements inside the folder will move to
the bottom of the layout.
l Expanded or collapsed folders will appear that way when users log in to the site. Users can still
collapse or expand folders in the System Explorer.
4. Click OK to save your changes.
When you open a new View tab, the System Explorer displays your latest changes.
Tip: You can adjust these settings per image panel by right-clicking and selecting
Display Adjustments….
3. Click OK to save.
Video Overlays
Overlays display additional contextual information over video.
Note: Record Indicator must be displayed to enable manual recording. For more
information, see Manually Recording Video on page 148.
When set to Off or Motion Only, overlays will still appear when hovering over detected
objects in live video.
If a person does not agree to be under surveillance due to privacy concerns, you can put a device on
Standby. When on Standby, the device does not stream or record video and operators will see that video
has been Paused.
Create rules to enable and disable Standby mode. For example, you could set up a rule to trigger Standby
when motion is detected and a digital input is activated.
2. Click .
3. Click and select the events that will trigger the rule. Click .
4. Select Pause device. Click .
5. Select one or more conditions that will cause the rule to run. To always run the rule, clear all
conditions. Click .
6. Enter a descriptive Rule Name: and Rule Description:.
2. Click .
3. Click and select the events that will trigger the rule. Click .
4. Select Resume device. Click .
5. Select one or more conditions that will cause the rule to run. To always run the rule, clear all
conditions. Click .
6. Enter a descriptive Rule Name: and Rule Description:.
Day/night mode uses a camera's built-in infrared (IR) cut filter to help capture high quality images based on
the amount of light in the scene. Most cameras provide you with the ability to set day/night mode from the
Image and Display dialog box, but only some give you the ability to change this setting from the image
panel.
The image panel setting is applied to all user views and will be seen in recorded video.
In the lower-right corner of the image panel, click the Set Day/Night Mode button and select one of the
following:
l Day Mode — The camera will only stream in color and the IR cut filter is disabled.
l Night Mode — The camera will only stream in black and white, and the IR cut filter is enabled to
capture near infrared light.
The digital defog levels in the image panel are applied to all user views and will be seen in recorded video.
l In the lower-right corner of the image panel, click to enable digital defog.
l To change the digital defog level, move the slider.
If the connected device supports discrete levels, the slider will snap to the nearest level.
l If the connected device supports automatic adjustments, click the digital defog button until is
displayed to enable automatic digital defog.
l To disable digital defog, click the digital defog button until is displayed.
Note: Images from Avigilon fisheye cameras are automatically dewarped. The following setting is
for third-party cameras.
If your camera uses a fisheye or panomorph lens, you can dewarp the image from the ACC Client software.
After the settings are applied, we recommend creating a View with different portions of the dewarped
image.
Save this View. For Enterprise and Standard Editions, see Saving Views on page 168. For Core Edition,
select > Client Settings > Save/restore window layout.
For example, use a layout with 6 panels to display different directions from the same fisheye camera. Use
the zoom and pan tools to display the appropriate portion of the video. For more information, see Zooming
and Panning on page 152.
Tip: For Avigilon HD Pro Cameras, the lens must be set to auto-focus (AF) mode on the
camera. If the camera does not detect the lens, the Focus: buttons are not displayed.
a. Use the Zoom: buttons to zoom in to the distance you want to focus.
4. In the Iris: drop-down list, select Open. When the iris is fully open, the camera's depth of field is the
shortest.
Infinity.
Click Apply to Devices… to apply the same settings to other cameras of the same model.
6. Click OK.
For cameras that have video analytics or LPR enabled, you can measure the number of pixels in a target
area.
Tip: For pixel guidelines, refer to Designing a Site with Avigilon Video Analytics and H3 LPC
Camera Kit and ACC 6 License Plate Reader Engine Site Design on avigilon.com.
Note: Fisheye cameras and cameras connected to a video analytics appliance are not supported.
To measure pixels:
A purple overlay appears over the camera's field of view. The live video is paused so you can
measure the number of pixels an object of interest covers within the field of view.
The number of pixels used for video analytics, LPR, or both applications is displayed. The number of
pixels may differ for each application depending on the camera resolution.
Note: While using the pixel measuring tool, you cannot edit other Image and Display settings.
5. Click to hide the pixel measuring overlay and continue streaming live video.
When adding Avigilon self-learning video analytics cameras, you can choose to display the bounding boxes
that highlight video analytics activity. By default, this setting is enabled, and bounding boxes will appear
around detected objects and in AVI video export. When disabled, cameras will still detect events, but will
not display the boxes outside of searches.
2. Select the Display Classified Objects checkbox to enable bounding boxes. Clear the box to disable
the display.
3. Click OK.
You can specify whether the client should show or hide the system messages.
Analytic Events
You can define analytic events on each Avigilon video analytics device.
Note: Analytic events are only triggered if the bottom center of the detected object's
bounding box is in the region of interest or crosses the beam.
c. Add an exclusion area if needed. This exclusion area applies only to this video analytics event
configuration. Video analytics events are not detected in an exclusion area. It does not apply
to other analytic events, Classified Object Motion detection, Motion Search, and the Avigilon
Appearance Search feature.
d. Configure the event settings:
l Occupancy Area: — The name of a physical space in which the number of objects are
counted. Use the same name to link different Enter and Exit events to the same
occupancy area.
l Sensitivity: — The likeliness of an object to trigger the event. The greater the
sensitivity, the more likely an event will be triggered for objects detected with low
confidence. The default is 8.
l Number of Objects: — The number of objects required to trigger the event.
l Threshold Time: — The minimum duration of the event before the system triggers an
event. The default is 0-30 seconds depending on the activity.
l Timeout: — The maximum duration of the event. Events that are still active after this
time will trigger a new event. The default value is 60 minutes.
l Prohibited Direction: — The arrow in the circle defines the direction that objects should
not be traveling.
8. For Temperature Detection Activities on page 114:
a. Ignore the Sensitivity:, Number of Objects:, and Threshold Time: settings.
b. In Timeout, select the recording duration for the event. The default is 8 seconds. The range is
2-15 seconds.
c. Configure the event settings:
l If Object with lower temperature is selected, configure Lower Temperature Threshold
(°C) or (°F): The threshold below which a person may need further screening. Default is
the calibrated value from the thermal camera.
l If Object with elevated temperature is selected, configure Elevated Temperature
Threshold (°C) or (°F): The threshold above which a person may need further screening.
Default is the calibrated value from the thermal camera.
l If Object with expected temperature is selected, configure both of the above
threshold events. Any temperature detection that falls between the specified
thresholds is considered within the acceptable range.
Note: If you change the name of the event, any rules or alarms linked to the event
may no longer work.
Note: The region of interest is like a rug or tripwire. Events are only triggered if the bottom center of
the detected object's bounding box is in the region of interest or crosses the beam.
Activity: Description
Objects in area The event is triggered when the selected number of objects are present in the
region of interest for longer than the threshold time. The object can appear
from within the region of interest or enter from outside.
Only one Objects in area event is activated when the specified number of
objects are detected in the area. Additional objects in the area will not trigger
additional events.
Compare this with Object appears or enters area and Objects enter area
below.
Object loitering The event is triggered for each object that stays within the region of interest
longer than the threshold time. Each object triggers a separate event.
The event resets when the object leaves the region of interest or the event
times out.
Objects crossing beam The event is triggered when the specified number of objects have crossed the
beam in the specified direction within the threshold time.
If the number of objects is 1, the event is triggered after the threshold time
elapses.
Object appears or The event is triggered once for each object that is present in the region of
enters area interest for longer than the threshold time. The object can appear from within
the region of interest or enter from outside the region of interest.
This video analytic event causes many alarms. For example, if 20 objects are
detected within the region of interest, 20 events are triggered – one for each
object.
Object not present in The event is triggered when no objects are present in the region of interest for
area longer than the threshold time.
Objects enter area The event is activated when the first object enters the region of interest and
then is triggered if the specified number of objects also enter the region of
interest within the threshold time.
If the number of objects is 1, the event is triggered after the threshold time
elapses.
The region of interest must be smaller than the camera field of view to detect
the object before it enters the region of interest. Objects that appear from
within the region of interest will not trigger an event.
Only one event is activated when the specified number of objects are
detected in the area. Additional objects in the area will not trigger additional
events.
Objects leave area The event is activated when the first object leaves the region of interest and
then is triggered if the specified number of objects also leave the region of
interest within the threshold time.
If the number of objects is 1, the event is triggered after the threshold time
elapses.
The region of interest must be smaller than the field of view of the camera.
Object stops in area The event is triggered if a classified object is detected moving within the
region of interest then stops moving for longer than the threshold time. One
event is activated for each object that stops. An object can only be tracked for
up to 15 minutes.
Direction violated The event is triggered for each object that moves within 22 degrees of the
prohibited direction for longer than the threshold time. One event is activated
for each classified object that moves in the prohibited direction.
Enter occupancy area The event is triggered for each object that enters an occupancy area. One
event is activated for each classified object that enters an area in the specified
direction.
To define an occupancy area, create Enter and Exit occupancy area events. To
ensure accurate counts, be sure to create events for each camera with an
entrance to the occupancy area.
Exit occupancy area The event is triggered for each object that exits an occupancy area. One event
is activated for each classified object that exits an area in the specified
direction.
To define an occupancy area, create Enter and Exit occupancy area events. To
ensure accurate counts, be sure to create events for each camera with an exit
from the occupancy area.
Objects too close The event is triggered when two detected people are closer than the
specified distance for longer than the threshold time. If there is a group of
people, an event will be triggered for each pair that is too close.
Activity: Description
Object with lower This event is triggered when a lower temperature at or below the threshold is
temperature detected by a camera. Default is the calibrated value from the thermal camera.
For example, if the default is 35.0 °C and 34.9 °C is detected, an event triggers
the camera to record.
Object with elevated This event is triggered when an elevated temperature at or above the
temperature threshold is detected by a camera. Default is the calibrated value from the
thermal camera.
For example, if the default is 37.5 °C and 37.5 °C is detected, an event triggers
the camera to record.
Object with expected This event is triggered when a temperature within the acceptable range is
temperature detected by a camera.
Using the same examples above, if 37.5 °C is the Object with elevated
temperature and 35.0 °C is the Object with lower temperature, and a
temperature is detected within the 35 °C to 37.5° C range, an event triggers the
camera to record.
You can also configure the system to generate motion events that can be used when searching video or to
trigger notifications and rules.
l Classified Object Motion Detection analyzes the video and only reports the motion of vehicles or
persons. This option is only available to Avigilon self-learning video analytics devices.
l Pixel Motion Detection observes the video stream as a whole and considers any change in pixel as
motion in the scene. This option is available to most cameras that are connected to the system.
Note: Motion events are only triggered if the bottom center of the detected object's
bounding box is in the region of interest.
l To change the shape or size of the overlay, click and drag the markers on the border. Extra
markers are automatically added to help you fine tune the shape of the overlay.
l To move the overlay, click and drag.
l To add an exclusion area, click . The red exclusion area is added inside the overlay.
Classified object motion is not detected in exclusion areas. This exclusion area is only for
Classified Object Motion detection. It does not apply to other analytics features like Analytic
Events, Motion Search, and the Avigilon Appearance Search feature.
l Move and resize the exclusion area as required then click anywhere on the green
overlay.
l To edit an exclusion area, double-click the exclusion area then modify as required.
If you set the slider to the left, the device will generate fewer motion events for objects
detected with higher confidence. Use this setting for scenes with a high level of activity.
If you set the slider to the right, the device will generate more motion events for objects
detected with lower confidence. Use this setting for scenes with little activity.
If the slider is set too low, the system may miss classified object motion. If the slider is set too
high, the system may generate a higher number of false detections.
l Threshold Time: — enter how long an object must move before a motion event is generated.
l Pre-Motion Record Time: and Post-Motion Record Time: — enter how long video is recorded
before and after a motion event.
5. Click Apply to save your settings.
Tip: The motion detection area should avoid areas prone to continuous pixel motion — like
TVs, computer monitors, trees and moving shadows. These areas tend to trigger motion
recording even though the motion activity may be insignificant.
l — click and drag to add a new pixel motion detection area. You can draw multiple
overlays to define the pixel motion detection area.
l — click and drag to exclude areas from the pixel motion detection area.
l Sensitivity: — adjust how much each pixel must change before it is considered in motion.
When the sensitivity is High, small movements like dust floating immediately before the
camera lens are detected.
l Threshold: — adjust how many pixels must change before the image is considered to have
pixel motion.
When the threshold is High, only large movements like a truck driving across the scene are
detected.
Tip: The Motion indicator above the Threshold: slider indicates how much motion is
occurring in the current scene. The camera will only detect pixel motion if the Motion
indicator moves to the right of the Threshold: marker.
l Pre-Motion Record Time: and Post-Motion Record Time: — specify how long video is
recorded before and after the pixel motion event.
5. Click OK to save your settings.
Adding a Rule
FOR STANDARD AND ENTERPRISE EDITION
Rules tell the system what to do when an event occurs. For a complete list of events and actions, see Rule
Events and Actions on page 119.
Tip: Events, Actions, and Conditions can be further defined if they appear as blue text after
being selected.
7. Add a Rule Name: and Rule Description:. The name should be unique throughout the ACC site.
8. Assign a schedule. For more information, see Scheduling Rules on the next page.
9. Click Finish.
When you configure a rule based on an event that affects the entire site, you can assign the rule a schedule.
Schedules control when rules are triggered — at specific times during a day, or only on specific days.
The Schedule option is displayed on the last step of adding or editing a rule.
l To use a preconfigured schedule, select an option from the drop-down list. The default option is
Always, which allows the event to run constantly.
l To change a schedule, select the schedule then click > .
l To delete a schedule, select the schedule then click > . In the following confirmation dialog
box, click OK.
l To create a schedule, click then select . Complete the following steps:
1. Give the new schedule a name. This should be unique throughout the ACC site.
2. Give the first recurrence a unique name.
You can add multiple recurrences to create a detailed schedule. For example, you could
create one recurrence to cover every weekend, plus extra recurrences to cover public
holidays.
Note: If you enter an End: time that is earlier than the Start: time, the event will span
two days. For example, if the schedule is set to start at 12:00 pm and end at 11:59 am,
the event is automatically enabled from 12:00 pm on day 1 and will end at 11:59 am on
day 2.
4. In the Start Date: field, enter when the recurrence should begin.
Daily The event is enabled during the same time every day.
Weekly The event is enabled during the same day and time every week.
l Select the day(s) of the week, then select the number of weeks
between each schedule recurrence.
Monthly The event is enabled during the same day and time every month.
Yearly The event is enabled during the same day and time every year.
l Select the specific day or weekday and month, then select the
number of years between each schedule recurrence.
6. Add and complete any other recurrences that need to be part of the schedule.
7. Click OK to save the new schedule.
The following tables describe the trigger events, actions, and conditions that are available when you set up
a rule. For more information about setting up a rule, see Adding a Rule on page 117 or Adding Rules for ACM
Appliance Events on page 100.
Rule Events
Rule events are the events that trigger a rule.
Server Events
Event Description
Data volume size reduced Server data volume size was reduced.
Analytics server queue full Video analytics service cannot process all the objects
Analytics server connection lost Server is unable to communicate with the video analytics
service to perform Avigilon Appearance Search queries.
Device Events
Event Description
Connection created to standby server A camera or device was connected to a standby server.
Connection removed from standby server A camera or device was disconnected from a standby
server.
Network packet loss acceptable A camera or device network packet loss is acceptable.
Unusual Motion event started A video analytics camera or device detected unusual
pixel motion.
Unusual Activity event started A video analytics camera or device detected a classified
object behaving unusually.
Presence dwell time exceeded The Avigilon Presence Detector sensor detected a
continuous presence for longer than the configured
dwell time.
Face watch list match started A camera detected an appearance of a profile from a
watch list.
Face watch list match stopped The camera no longer detects the appearance of a
watch list profile.
Person without a mask detected A camera detected a person without a face mask.
Person without a mask no longer detected The camera no longer detects a person without a face
mask.
User Events
Event Description
Virtual matrix monitor opened A user opened a Virtual Matrix monitor in the View.
Site View updated A user updated the organization of cameras and folders
in the System Explorer.
Alarm Events
Event Description
License plate watch list match A license plate on an LPR Watch List was detected.
l Unknown card
l Expired card attempt
l Valid card at an unauthorized reader
l Deactivated card attempt
l Invalid card schedule
l Invalid PIN code has been entered
l Invalid facility code
l Valid card with an incorrect issue level
l Antipassback error
l Deny count exceeded
l Invalid forward card read
l Invalid reverse card read
l Attempt to open locked door
l Two card control violation - second card not
presented
l Access denied - occupancy limit reached
l Access denied - area disabled
l Invalid card - before activation
l Invalid facility code ext
l Invalid card format
l Invalid PIN only request
l Door mode does not allow card
l Door mode does not allow unique PIN
l Local grant
l Opened unlocked door
l Local grant - APB error - not used
l Local Grant - APB error - used
l Facility code grant - not used
l Local grant - not used
l Facility code grant
l Local grant use pending
Input fault detected An error was detected for an installed ACM panel or
subpanel input. Tampering may have occurred.
Input fault cleared An error detected for an installed ACM panel or subpanel
input has ended.
Rule Actions
Rule actions are the response to an event.
Send notification to Central Monitoring Station A notification is sent to the central monitoring station.
Monitoring Actions
Action Description
Start live streaming The associated live video displays when the event
occurs.
Video intercom call The video intercom call opens in a new image panel with
a ring tone.
Focus of Attention The event video displays in the Focus of Attention tab if
it is open.
Start live streaming on a virtual matrix monitor The live video from the selected camera automatically
displays on the selected Virtual Matrix monitor.
Open a map on a virtual matrix monitor The selected map automatically displays on the selected
Virtual Matrix monitor.
Open a web page on a virtual matrix monitor The selected web page automatically displays on the
selected Virtual Matrix monitor.
Device Actions
Action Description
Reboot device The camera or device reboots when the event occurs.
Pause device The camera or device goes on standby when the event
occurs. Streaming and recording are paused.
Activate digital output A digital output is triggered when the event occurs.
Deactivate digital output A digital output is deactivated when the event occurs.
PTZ Actions
Action Description
Go to Home Preset The selected PTZ camera moves to the home position
when the event occurs.
Run a Pattern The selected PTZ camera runs a selected pattern when
the event occurs.
Set Auxiliary The selected PTZ camera starts the selected auxiliary
command when the event occurs.
Clear Auxiliary The selected PTZ camera ends the selected auxiliary
command when the event occurs.
Alarm Actions
Alarm Description
Rule Conditions
Rule conditions are the scenarios that must be met before the rule is triggered.
Device Events
Condition Description
Digital input is active The rule is triggered if the connected digital input is
active when the event occurs.
Digital input is not active The rule is triggered if the connected digital input is
inactive when the event occurs.
Adding an Alarm
2. Click Alarms .
3. Click Add.
4. Choose the trigger source for your alarm.
l Motion Detection — Motion is detected across the camera's field of view.
l Video Analytics Event — A custom event has been triggered on a video analytics-enabled
camera.
Note: All video analytic events linked to the camera will trigger this alarm. To trigger
alarms for specific analytic events, see Adding an Analytics Alarm on the next page.
l Digital Input Activation — A signal was detected from an active device on the site.
l License Plate Watch list Match — A camera has detected a registered license plate.
l POS Transaction Exception — A point of sale (POS) source has detected an exception to the
transaction rules.
l Device Error — A device has lost connection, failed to complete a task, or is at risk of
tampering.
l System Error — The server has unexpectedly disconnected, storage has encountered a
problem, or your licenses have expired.
l External Software Event — An event from a custom integration has been triggered.
l Face Watch List Match — A camera has detected a profile from a Face Watch List. Each
profile triggers a separate alarm. You can update which watch lists are linked to this alarm from
the Face Watch Lists tab. See Face Watch Lists on page 133.
5. Select which devices will be involved in the alarm. Click Next.
6. Enter a Pre-Alarm Record Time: for how long to record before an alarm is triggered, and the
Recording Duration:. Select the devices to link to the alarm. Click Next.
7. Add the users and groups that will receive notifications about the alarm. Click Next.
Alarms 129
8. Select which actions should be taken when acknowledging the alarm. Click Next.
9. Name the alarm, assign a priority, and add a schedule.
10. Click Finish.
For more information, see Reviewing Alarms on page 159 and Searching Alarms on page 173.
1. Add an alarm using External Software Event as the alarm trigger. Give the alarm a specific name and
note it for the following steps. For more information, see Alarms on the previous page.
2. Add a rule based on the Video analytics event started trigger.
3. Select the video analytics events you want to trigger the rule for.
4. Select the Trigger an alarm rule action and select the alarm created above.
Tip: If analytics events on different cameras have the same analytics event name, selecting
that analytics event will trigger the rule for all cameras.
Email Notifications
You can automatically email individuals and groups when events occur.
Tip: After the Email Server is configured, you can add Rules that send email notifications to
selected recipients. See Adding a Rule on page 117.
Adding Recipients
1. In the Email Notifications tab, click Add.
2. Configure the following.
l Email Group Name: — Enter a name for the email group.
l Add Email — Manually add a single email.
l Add User/Group — Include a user or group's email.
3. Select the Email Trigger and customize which cameras, devices, or transactions will be included. For
more information, see Email Notification Triggers below.
4. To attach camera images to the email notifications, select the Attach images from device(s) linked to
the event checkbox.
5. Select an Email Schedule and enter a limit on email frequency.
6. Click OK.
System event Email notifications are sent when one of the following rule
events occurs:
Motion detected on _ An email notification is sent when camera motion detection has
started. You can select the camera.
Digital input activated on _ An email notification is sent when a digital input has been
activated. You can select the digital input.
POS transaction exception on _ An email notification is sent when a POS transaction exception
occurs. You can select the transaction source.
Notifications are supported as XML over SMTP or SIA over IP. Check with your monitoring service for their
preferred method.
Tip: Click Send Test Message to make sure that you've correctly entered all contact
information.
After Central Station Monitoring is configured, you can create a rule to automatically send email notifications
with video or image attachments. For more information, see Adding a Rule on page 117.
Face Recognition
FOR ENTERPRISE EDITION
With Face Recognition, administrators can create watch lists of people of interest for operators to search
and monitor.
This setting only affects the expiry date for new profiles. Existing profiles will continue to use
their previously set expiry date.
l Alarms — Toggle whether profiles in this watch list trigger a Face Watch List Match alarm. To
add a new alarm, see Alarms on page 129.
* Individual profiles can have their own custom settings. For more information, see Editing a Profile on
page 136.
Note: Both sites should use the same version of the ACC Server software. Existing watch lists will be
overwritten.
2. Click the site with the watch list you want to copy, then click Backup Settings .
3. Enter a password, then click OK. Select where to save the AVS file.
4. Click the name of the site you want to copy the watch list to.
Tip: A good profile is like a passport photo — a high-resolution, front-facing image of a person's
face that includes the shoulders and some distance above top of head.
The upload progress is displayed. If any errors occur during the upload process, they will appear in an
exportable list.
6. Click Close.
1. In a View tab or in an Avigilon Appearance Search result, find the person of interest. A front-facing
image works best.
l — Pending. If processing takes longer than a couple of minutes, the ACC Server or ACC Analytics
Service may be unavailable.
l — Rejected. The server cannot reach the ACC Analytics Service, is a dfferent version, or the
image failed to upload. This may also occur if the system could not detect a face, multiple faces were
detected, or the image resolution is poor.
l — The status is unknown.
After they are processed, profiles of Good, Average, or Poor quality will be used to detect matches
throughout the site. The profile quality impacts the match performance, so replace poor quality profiles if
possible.
Editing a Profile
1. In the New Task menu , click Site Setup.
1. Click Change….
2. Select a new expiry date or click Remove Expiration to keep the profile from expiring.
Moving a Profile
If you have multiple watch lists, you can move a profile from one watch list to another. The profile will use
the new watch list's default expiry date.
1. Click Move….
2. Select a watch list, then click OK.
3. Click Yes to confirm.
Deleting a Profile
1. In the New Task menu , click Site Setup.
For more information, see Avigilon Appearance Search Results on page 171.
License Plate Recognition (LPR) reads and stores vehicle license plates from any video streamed through
the ACC software.
A red overlay means the detection area is too large and cannot be used.
LPR is now configured for your site and you can add Watch Lists to your site. For more information, see LPR
Watch Lists below.
Note: Monitor the server CPU and memory usage after enabling LPR. Ensure the server has enough
resources.
1. In the top-right corner of the ACC Client window, select > Client Settings > Display.
2. In the Image Overlays: area, select the License Plate checkbox.
3. Click OK.
2. Click the site name, then click License Plate Watch List .
3. Click Add.
l To import a watch list, click Import and select a CSV file to upload.
l To add a single license plate, click Add and enter the license plate.
Note: Your file must include a column including Minimum Confidence to determine
the likelihood of a match before an LPR event is registered.
l Argentina l Japan
l Australia l Malaysia
l Brazil l Mexico
l Canada l Middle East2
l China l New Zealand
l Europe l Russia3
l Egypt l Singapore
1
l Gulf Cooperation Council l South Africa
l India l South Korea
l Indonesia l Thailand
l Iran l United Kingdom
l Iraq l United States
l Israel
1 Includes Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates.
2 Includes Lebanon, Jordan, and Yemen.
3 Includes Armenia, Azerbaijan, Georgia, Kazakhstan, Kyrgyzstan, and Uzbekistan.
The Point of Sale (POS) Transaction Engine is a licensed feature that records raw data from POS transaction
sources. You can link cameras to specific POS transaction sources, and set up the system to make note of
transaction exceptions.
Now that you have a transaction source, you can format the data. For more information, see Adding Data
Formats below.
1. In the Set Transaction Source Data Format area, click Add or select a previous format and click Edit.
2. Edit the properties of your new format.
l Name: — The name displayed under your list of formats.
l Description: — A short explanation of the data and device.
l Transaction Start Text: — The received text that signals the start of each transaction.
l Transaction End Text: — Text that signals the end of a transaction.
l Encoding: — The encoding used by the source device.
1. From the Set Transaction Exceptions section of the Setup Wizard, click Add or select a previous
exception and click Edit.
2. Add a name for the exception.
3. Select which type of exception the system will search for.
l Match Text — Enter the text expected to appear from the device.
l Match Value — Enter the value and its expected relationship, whether equal to, less or more
than, or between. You can also add any text that will appear before or after.
4. Click OK.
By default, the keyboard is installed in right-hand mode. Change the Joystick settings to configure it for left-
hand mode.
2. In the top-right corner of the ACC Client, select > Client Settings > Joystick.
If the keyboard is not automatically detected, an error message is displayed. Click Scan for
Joysticks….
For more information about the Avigilon USB Professional Joystick Keyboard, see the installation guide that
is included with the device.
2. In the top-right corner of the ACC Client, select > Client Settings > Joystick.
3. If the joystick is not automatically detected, an error message will appear. Click Scan for Joysticks….
4. Choose an action for each button on the joystick:
a. Press a button on the joystick to highlight its label in the dialog box.
b. Select an action for the button from the drop-down list.
Options include ways to control recorded video, Views, image panels, instant replay, audio,
snapshots and PTZ.
The Virtual Matrix feature allows you to control the View displayed on multiple monitors or a video wall, from
any instance of the application. To use this feature, the Virtual Matrix software must be installed on the
system that all the displays are connected to, and users must have the Manage virtual matrix monitors
group permission.
3. In the ACC Client software, double-click the Virtual Matrix monitor in the System Explorer.
4. Edit the layout, add cameras, and cycle views.
Changes in the ACC Client software automatically appear in the Virtual Matrix.
Adding Sites
The Virtual Matrix can be used to view video from multiple cameras from multiple sites.
1. Move your mouse to activate the monitor settings and click Add Site.
2. Find your site in the drop-down list or click Find Site to enter the IP address.
3. Enter your credentials and click Log In.
You can create and manage maps that can be monitored in the View tab. Operators can interact with video
or alarms from cameras on the map.
Adding a Map
You can add a JPEG, BMP, PNG, or GIF as a layout of your site.
1. In the System Explorer, right-click on your site and select New Map.
2. Add a name and click Change Image… to upload your map.
3. Select the location of the map in your site hierarchy.
4. Click OK.
After a map has been added, you can add camera locations and their view.
Maps 145
Web Pages
FOR STANDARD AND ENTERPRISE EDITION
1. In the System Explorer, right-click a site or site folder and select New Web Page….
2. Enter a web page Name: and URL:.
3. Select a Zoom level: to view the web page inside an image panel.
4. If it is not displayed, click to display the Site View Editor and choose where the web page
appears in the System Explorer. By default, the web page is added to the site you initially selected.
l In the site directory, drag the web page up and down the right pane to set where it is
displayed.
l If your site includes folders, select a location for the web page in the left pane. The
right pane updates to show what is stored in that directory.
5. Click OK.
Once you've added cameras to the View tab, you can do the following:
l To switch all of the image panels in the View between live and recorded video, click either Live
or Recorded on the toolbar.
l To switch individual image panels between live and recorded video, right-click the image panel and
select either Live or Recorded.
Tip: If you cannot see either Live or Recorded on the toolbar, you may need Dual
Authorization. For more information, see Requesting Dual Authorization on the next page.
l Click and drag a camera from the System Explorer to an empty image panel in the View tab.
Tip: You can view the same camera in multiple image panels to maintain different zoom
levels.
l To remove the camera, in the top-right corner of the image panel click .
1. In the System Explorer, right-click the site then select Dual Authorization Log In.
2. The second user must enter their username and password.
3. Click Log In.
From the moment that you notice unusual behavior or an event, you can begin recording.
1. In the image panel you want to record, click in the top left corner to start recording. The blue
icon indicates recording has started.
The colored bars on the Timeline show the camera's recording history:
You can view and play through archived video, but you cannot skip between recorded events or
search archived video.
If you are missing recorded video due to a network connection or server issue, the system can
recover the video from an ONVIF Profile G camera that has an SD card recording video.
l The camera can appear in multiple locations in the System Explorer. Contact your system
administrator to configure your privileges to view the camera under each failover connection.
l To view recorded video, select any instance of the camera in the System Explorer.
Tip: To see how many days of recorded video are available, zoom out of the Timeline. To
configure these settings, see Recording and Bandwidth on page 39
To... Do this...
Select a playback time l Click the date and select a specific date and time.
l Click a point on the Timeline. The marker appears on
your selection.
Start playback
Click .
Stop playback
Click .
Jump forward or backward Click or to jump forward or backward by a day, minute, or by camera
event.
You can zoom in to a quarter of a second, and zoom out to see years if
recorded video exists.
Pan the Timeline l Move the horizontal scroll bar under the Timeline.
Center the Timeline Right-click the Timeline, and select Center on Marker.
Synchronized recorded video playback is disabled by default. Once it is enabled, it will remain enabled until
it is manually disabled.
Note: Tabs can only be synchronized to one time. You cannot synchronize groups of tabs to
separate times.
l To enable synchronized video playback in all new View tabs, select > Client Settings > General
> Synchronize recorded video playback.
The Timelines in new View tabs are automatically centered on the current time.
Enabling synchronized recorded video playback in the Client Settings dialog box will not synchronize
the Timelines of previously opened tabs, it will only synchronize new tabs that are opened after
enabling synchronized recorded video playback. Previously opened tabs need to be synchronized
individually.
The Timeline will synchronize with the first tab you selected.
l To disable synchronized video playback in individual tabs, click at the bottom of the Timeline.
The icon changes to to show that synchronized playback is disabled.
The Timeline will continue to display the same time but will no longer be synchronized with other
Timelines.
l Right-click the image panel and select one of the instant replay options:
l Replay - 30 Seconds
l Replay - 60 Seconds
l Replay - 90 Seconds
1. In the top-left corner of the Timeline, select the Unusual Activity or Unusual Motion checkbox.
2. Select the Skip Play checkbox to skip to the next event when playing video.
3. Select which Anomaly Type to display:
l All — All unusual events.
l Speed — Events with unusual speed.
l Direction — Events with unusual direction.
l Location — Events in areas where activity does not typically occur.
4. Move the Rarity slider to set how rare an event must be. Keep the slider towards the right to reduce
noise.
5. Enter a Minimum Duration between 0-59 seconds to set how long an event must last. The default
value is 2 seconds.
6. Use the Timeline controls to view the event video.
Unusual Activity is highlighted in yellow bounding boxes. Unusual Motion is highlighted in teal
bounding boxes. Image panels without unusual events are dimmed.
You can bookmark and export unusual events like other video analytics events. For more information, see
Bookmarking Recorded Video on page 180 and Exporting on page 177.
Tip: Fisheye and panomorph video automatically dewarps when you zoom and pan.
Zooming
l Scroll the mouse wheel inside an image panel.
Panning
l Right-click and drag inside an image panel.
You can also use the Zoom and Pan icons on the right side of the toolbar.
For other ways to use the PTZ Controls, see Keyboard Commands on page 183.
Note: For video analytics devices, classified object detection only works when the camera is in its
Home position.
1. In the toolbar, click . PTZ controls are now enabled in image panels that are displaying PTZ video.
The PTZ Controls are displayed in a floating pane immediately beside the image panel.
The controls may appear differently depending on the options that the camera supports.
l In the image panel, drag your mouse from the center to move the camera in that direction. The
farther the cursor is from the center of the image panel, the faster the camera will move.
l If the camera supports Click to Center, click anywhere on the image panel to center the
camera to that point.
To... Do this...
Zoom
l Click to zoom in.
Program a PTZ preset, pattern, or tour For more information, see PTZ Presets, Patterns, and
Tours on the next page.
Return to the Home preset position If the PTZ camera supports a Home preset position, click
to return the camera to its Home position.
Activate a PTZ pattern In the PTZ Controls pane, select a pattern number and
click .
Activate a PTZ tour In the PTZ Controls pane, select a tour number and click
.
Other users will be unable to use the PTZ controls for this
camera until you unlock the controls or log out.
Some tools and features may not be displayed if they are not supported by your camera.
Note: For video analytics devices, classified object detection and analytic events only work when
the camera is in its Home position.
l Sequential: the PTZ camera will go to each preset in the set order.
6. Select the Set as default tour checkbox if you want this tour to run automatically.
l The Default Tour Idle Start Time: field is now enabled. Enter the amount of time the PTZ
camera must be idle before this tour automatically starts.
b. In the Move Speed column, enter how fast you want the PTZ camera to move to this preset.
The higher the %, the faster the camera moves.
c. In the View Time column, enter the amount of time you want the PTZ camera to stay at this
preset position. The view time is 10 seconds by default.
d. Repeat this step until all the presets for the tour have been added.
Live Monitoring
Use configured features to monitor your site effectively.
Note: Some features are only available if the site has the required license, and if you have the
required user permissions.
Focus of Attention
FOR ENTERPRISE EDITION
The Focus of Attention tab gives you a high-level overview of all sites and cameras you have access to.
If selected in the settings, active alarms are displayed and cameras are highlighted in red until the
alarm is acknowledged.
As new alarms and events occur, the video appears in the Recent Events list and the corresponding
camera changes color in the Overview.
The Overview
The Overview provides an abstract view of your System Explorer. Each hexagon represents a camera
grouped by sites and folders. The cameras follow the order of the System Explorer from left to right and
change color in response to events.
l Red — Alarms
l Yellow — Face Watch List Matches, People Without Masks, License Plate Matches or Unusual Activity
Detection
l Teal — Video Analytic Detection or Unusual Motion Detection
l Blue — Motion Detection
l Green — Highlights the camera displayed in the Recent Events list
l Gray — No event
l Colorless — Camera offline
Tip: Drag the Overview to a separate monitor to view Featured Event video and the Overview at
the same time.
To edit these settings later, in the top-right corner of the Recent Events list, click .
Monitoring Events
To view video:
The following options are available when you hover over an image panel.
Icon Description
Active alarms appear at the top of your Recent Events list and the corresponding camera will be red in the
Overview.
You can view the alarm video, acknowledge the alarm, or view video from linked cameras.
If another user acknowledges, assigns, or purges the alarm, the alarm will no longer appear active.
Reviewing Alarms
FOR ENTERPRISE EDITION
After an event triggers an alarm, users are shown the camera or source of the alarm trigger. They will be
asked to acknowledge and review the alarm, before choosing whether or not to clear it.
Acknowledging Alarms
1. Once notified, click Acknowledge.
2. If notes are enabled, enter any relevant details.
Note: Devices and appliances can be connected to alarms and may require custom
responses like a digital output.
In the event there are multiple alarms at once, linked videos will play in order, but will otherwise play in order
of priority.
Reviewing Alarms
Identity Verification
FOR STANDARD AND ENTERPRISE EDITION
Note: To use this feature, your ACM identity must be imported into the ACC software and have the
appropriate ACM permissions. Contact your ACM administrator to update your permissions.
If your camera is linked to a door in the ACM appliance, you can monitor authorized and unauthorized door
activity in an adjacent image panel.
l In the top-right corner of an image panel, click and select the door you want to monitor.
An identity verification image panel is displayed. The most recent activity is displayed at the top.
Tip: You can resize the badge photo using the slider at the top of the identity verification
image panel.
When someone swipes an ACM badge, the identity verification image panel displays a card with the
following information if available:
l Badge photo
l First and last name
l Date and time
l ACM door event
Compare the video to the badge photo to verify the person's identity and prevent unauthorized access.
Note: The identity verification image panel does not update while viewing recorded video or
another tab.
While you monitor video in an image panel, you can also monitor license plates as they are detected by the
system.
1. In the top-right corner of the ACC Client window, select > Client Settings > Display.
2. In the Image Overlays: area, select the License Plate checkbox.
3. Click OK.
When you view live video for a camera that is configured for license plate recognition, the detected license
plates are displayed.
Select one of the license plate matches and do any of the following:
l Click View this Event or double-click the selected license plate to open a snapshot of the detected
license plate in a new View.
l Click Clear All to empty the current match list. The list will be repopulated as new license plates are
detected.
If a camera is linked to a point of sale (POS) transaction source, you can monitor transactions while watching
video from the linked camera. Each transaction is separated by date and time, with the most recent
transaction highlighted in blue.
Tip: Review previous transactions by hovering on the transaction image panel and scrolling up.
If a web page for an ACM appliance was configured, ACC operators can access it in the ACC Client
software.
l ACC operators logged in with their ACM credentials will automatically be logged in to the ACM
appliance.
l ACC operators without ACM credentials may see a certificate warning when they first open the web
page. Click Trust to continue to the log in page.
Note:
If the ACM session times out, operators will need to log in again.
l ACC operators logged in with their ACM credentials will automatically be logged in again
when they close the dialog box.
l Administrators can change an operator's timeout settings in the ACM appliance.
Using a Map
FOR STANDARD AND ENTERPRISE EDITION
You can open a map in any image panel, then view video or alarms by interacting with the map.
Review an alarm When a camera flashes red, an alarm linked to the camera has been
triggered.
Display a preview of the video l Hover over a camera in the System Explorer or on the map.
from a camera
You can use the Forward and Back buttons to move between maps.
If your System Explorer contains web pages for quick access to your ACM appliance or related to your
surveillance system configured, you can access them in the View tab.
An image panel will stop recording and streaming video and display Paused if:
l A device is in Standby mode. For more information, see Configuring Standby Mode on page 104.
l A device connection is lost and it is in failover state. For more information, see Failover Connections
on page 45.
l An encoder without any camera sources is viewed.
Note: Some features are only available if the site has the required license, and if you have the
required user permissions.
Note: To use this feature, your ACM identity must be imported into the ACC software and have the
appropriate ACM permissions. Contact your ACM administrator to update your permissions.
If your site is connected to an ACM appliance, you may be able to grant door access from any camera that is
linked to a door.
Note: If the camera is not linked to a door, the icon is not displayed.
If there is more than one door linked to the camera, you will be prompted to select one.
Video Intercom allows you to verify the identity of visitors before allowing access to secure areas by
answering calls from a device.
Tip: Multiple ACC operators can answer or join a call, and you can record the conversation to
be reviewed later.
Using Audio
FOR STANDARD AND ENTERPRISE EDITION
The camera's microphone and speakers must be enabled before you can listen to or broadcast audio.
1. In the top-right corner of the ACC Client, select > Client Settings.
2. In the Client Duplex Audio Setting: area, select Full-duplex or Half-duplex.
3. Click OK.
Listening to Audio
When an audio input device is linked to a camera, the button is displayed in the image panel of the
camera's video. By default, the audio is muted.
l In the lower-right corner of the image panel, click to mute or activate the audio.
l Move the slider to change the volume.
When speakers are linked to a camera, the button is displayed in the image panel of the camera's
video. This button allows you to broadcast audio from the camera through your computer's microphone, like
a Public Address (PA) system.
While you monitor live video in an image panel, you can manually trigger any digital output that is connected
to the camera.
Managing Views
Operators can monitor live and recorded video in a View tab. The View tab contains a layout of image
panels that lets you organize how video is displayed.
Cycling Cameras
Note: You can only cycle through cameras with a Logical ID.
When there are many cameras across your site, cycle through those cameras to preview video before
opening them in a new image panel.
To cycle through cameras from all sites that you are logged in to, update your Client Settings.
For more information, see Adding and Removing Cameras on page 147.
Maximizing Views
In the toolbar, click to maximize the View. Click to return to the previous size.
Cycling Views
If you have multiple View tabs open, you can cycle through them by displaying each one a few seconds at a
time.
4. In your View tab, click to enable cycling. Clicking again will disable cycling.
View Layouts
Customize the number and shape of image panels in your View by editing the View Layout.
Tip: Click on the dotted or red borders to increase or decrease the size of an image panel.
Up to 64 cameras can fit in a View.
4. Click OK to save.
After you've customized a View, you can save and share it with users across your site. Saved Views appear
in the System Explorer.
Saving a View
1. In the toolbar, click > Save As New View.
2. Select the site you'll add the view to, assign a name, and then add a unique number as the Logical ID
to mark the view in your site.
Tip: Click to choose where to display the View in the System Explorer.
Renaming a View
Shared Views
FOR ENTERPRISE EDITION
If you want to show another user an incident or need help investigating an event, you can share your current
View with another user. You will both be able to control the View and show each other your findings.
The users are listed by username and computer name. The computer name is used to help you
identify a specific user if the username is shared by several people. Only users who are currently
logged in to the site are displayed.
a. The user you select will see a pop-up message with your invitation to collaborate and may
choose to accept or decline.
b. You will receive a pop-up message with the user's response to your invitation.
If they say Yes, the View you are looking at is automatically opened as a new tab in your
collaborator's window.
While you are collaborating, any changes made to the current View by a collaborator are shared with the
other collaborators. Anything that you can do in a standard View can be done in a shared View.
Searching
You can quickly search through a camera's recorded history for video of an event.
l In Recorded mode, click in the image overlay and draw a box around the object of interest to
perform Appearance Search on the object, or click in the toolbar and then select a Search
option.
l While viewing recorded video, click in the image panel and then select a Search option. This
search will only be performed on the selected camera video.
Note: Some features are only available if the site has the required license, and if you have the
required user permissions.
If you have video analytics cameras with the Avigilon Appearance Search feature enabled, you can search
your site for persons or vehicles of interest.
You can select as many or few search criteria as you want. The system ranks results that match all
descriptions higher.
Note: When searching for video in both day and night scenes, avoid using color as a search criteria.
For example, the color red may appear gray at night.
Only the first 15 minutes of search results are displayed, regardless of the Date Range selected.
Move the Search Results Graph window to view more results.
For more information, see Avigilon Appearance Search Results on the next page.
1. Complete a Motion, Thumbnails, Alarm or Identity search, or use the Timeline to find the person or
vehicle of interest.
2. Click the bounding box around the person or vehicle and select one option:
l Find Appearances After This — Search for instances of the person or vehicle after this
event.
l Find Appearances Before This — Search for instances of the person or vehicle before this
event.
l Additional Search Options — Select cameras and a time range before performing the
search.
Only the first or last 15 minutes of search results are displayed, regardless of the Date Range
selected. Move the Search Results Graph window to view more results.
For more information, see Avigilon Appearance Search Results on the next page.
The photo is automatically cropped, and if searched, is retained for a specific amount of
time.For more information, see Identity Data Retention on page 39.
Note: Only the first 15 minutes of search results are displayed, regardless of the Date Range
selected. Move the Search Results Graph window to view more results.
Refining Results
1. Use the Search Results Graph or Timeline to view additional results. Click to edit the date range.
2. In the top-left area, click Change Cameras to add or remove cameras from the search.
3. For description searches, update the search criteria in the Appearance Description area.
4. If a search result matches the person or vehicle of interest, hover over a thumbnail and click . This
improves the system's accuracy.
Saving Results
When you have verified search results, you can either bookmark or export them.
For Native video exports, select the Password Protection: and Include Identity Data: checkboxes to
enable LPR, Appearance, or Face Recognition data in the Avigilon Player.
For AVI video exports, select the Blur background checkbox to obscure everything except the
detected person or vehicle.
Tip: Hover over a thumbnail and select the checkbox of all results you want to star,
bookmark, export, or remove.
Identity Search
FOR STANDARD AND ENTERPRISE EDITION
Note: To use this feature, your ACM identity must be imported into the ACC software and have the
appropriate ACM permissions. Contact your ACM administrator to update your permissions.
You can search for an individual by their name or badge ID. This search displays door events using the
person's badge, as well as video from linked cameras.
Up to 50 of the person of interest's most recent door events are displayed. Thumbnails of video from
linked cameras are displayed under each door event. For more information, see Identity Search
Results on the next page.
Refining Results
1. In the Identity Details area, select what types of door events to show.
2. In the top-left area, click Change Doors to add or remove doors from the search. Click to edit
the date range.
3. Click a thumbnail to view associated video in the image panel. Click to zoom in on the image
from the video.
4. If you have cameras with the Avigilon Appearance Search feature enabled and linked to doors,
select Appearances Only.
Tip: Hover over the thumbnail and click to start an Avigilon Appearance Search query.
Saving Results
l Hover over a thumbnail and select the checkbox of all results you want to bookmark or export.
l Click Bookmark to save the event for quick access.
l Click Export to download a copy of the event.
For AVI video exports, select the Blur background checkbox to obscure everything except
the detected person.
Searching Alarms
FOR ENTERPRISE EDITION
All alarms that are triggered across your site can be searched.
Your search results are displayed. For more information, see Reviewing Search Results on page 177.
Searching Events
Search for configured events in recorded video.
Your search results are displayed. For more information, see Reviewing Search Results on page 177.
Searching Motion
Search for motion events from cameras configured for Classified Object Motion or Pixel Motion detection
events.
Your search results are displayed. For more information, see Reviewing Search Results on page 177.
Your search results are displayed. For more information, see Reviewing Search Results on page 177.
With License Plate Recognition (LPR) configured, you can search your site for a specific license plate.
The Match percent is how similar the detected plates must be to the search query to be displayed as
a result. A higher percent will result in fewer false positives while a lower percent will result in more
events.
If no license plate number is entered, the system will search for all detected license plates over the
selected search period.
5. Click Search.
Your search results are displayed. For more information, see Reviewing Search Results on page 177.
The Confidence column displays how confident the algorithm is that the detected plate number is
the actual plate number.
Search for specific transactions recorded by a point of sale (POS) transaction source.
Tip: Leaving the text field blank will search for all transactions.
5. Click Search.
Your search results are displayed. For more information, see Reviewing Search Results on the next
page.
Searching Thumbnails
When examining video for changes, use the Thumbnail search to display a series of comparison images
over time.
2. Draw a box around the person or vehicle of interest. A photo is automatically uploaded.
3. In the Appearance Search Options window:
a. Click Date Range to set the date and time of your search.
b. Click Cameras to select the cameras you want to include in the search. By default, all cameras
For more information, see Avigilon Appearance Search Results on page 171.
Reviewing Results
l Use the Timeline to watch and review the event video.
l Click Add to new View to display the results in a View tab.
l Click Perform a motion search on this event to further refine your search.
Saving Results
l Click Export this event to download a copy of the event as a video, image, or audio. For more
information, see Exporting below.
l Click Export results to a file to download a CSV or text file of search results.
l Click Bookmark this event to save the event for quick access. For more information, see
Bookmarking Recorded Video on page 180.
Exporting
You can export content in multiple video and image formats. You can export bookmarks, search results, and
video from the Timeline. You can also export snapshots of an image panel as you monitor video.
Continue working or click the link in the notification to open the Export tab. Each export file is
displayed in the order it was added.
Note: Only snapshots of recorded video are added to the Export tab. Snapshots of live
video are exported individually in Live Snapshot tabs.
For Native video exports, select the Password Protection: and Include Identity Data:
checkboxes to enable LPR, Appearance, or Face Recognition data in the Avigilon Player.
l To combine files, drag and drop. Expand and collapse the file to show and hide its clips.
A Native AVE file is added to your Export list. Expand the file to view and edit the selected clips.
A warning is displayed if your files may contain identity data but the Password Protection: and Include
Identity Data: checkboxes were not selected.
3. Select a folder and then click Select Folder to start the export.
While the export is in progress, you can Pause , Resume , or Cancel the export.
Tip: To export a video to a disc, place a writable disc in the drive and click Burn to Disc.
Export Options
The following table displays the options available for different export formats.
Native AVE video l Image Rate: Select a high image rate to maintain quality or a low one to
reduce the file size.
l Maximum file size: The export file will not exceed this size.
l Include Identity Data: The export file will contain LPR, Appearance, or
Face Recognition data. The export must be password-protected to
enable this.
l Password Protection: Select to add a password.
l Export Avigilon Player: Select to include a copy of the Avigilon Player
with the export file.
Adding a Bookmark
Tip: You can add a bookmark any time the Timeline is displayed.
1. Drag the time marker to where you want to start the bookmark, then right-click the Timeline and
select Add Bookmark.
2. Enter a name for the New Bookmark.
3. In the Cameras: pane, select all the cameras that need to be attached to this bookmark.
You can only bookmark multiple cameras from the same site.
4. Enter a Time Range to Bookmark: or move the black time range markers on the Timeline.
5. In the Description: field, enter any extra information that you want to include with the bookmark.
6. To protect the bookmark video from being deleted, select the Protect bookmark data checkbox.
Note: Protected bookmarks are never deleted. These videos take up space and can
become the oldest video on the server.
7. To make the bookmark private, select the Bookmark is private checkbox. Private bookmarks are
only visible to the user who marked the bookmark as private, and the system administrator. No one
else will have access to the bookmark.
8. Click OK.
l — Prevents the video from being deleted. These videos take up space and can become
the oldest video on the server.
l — Removes protection.
Storage Management must be enabled in the Avigilon Control Center Admin Tool or ES device web
interface before you can archive video.
You can archive video from any number of cameras in your system for an extended time range.
Files are always archived in Avigilon Backup (AVK) format and playable using the Avigilon Player.
Note: Both on-demand and continuous archives may be overwritten — even if the Delete
oldest archives when disk full setting is disabled in the Server Storage Management
Continuous Archive settings.
Each video archive is saved in a subfolder that is named after the archive time range.
1. In the System Explorer, right-click a site and select Enable Emergency Override.
2. Click Yes in the following dialog box.
Emergency privilege override will be disabled once you log out or if you right-click the site and select
Disable Emergency Override.
Note: If you are part of a group with emergency override privileges but do not see the Enable
Emergency Override option, you may already have access to all emergency privileges.
Reporting Issues
If an error occurs in the ACC software, you can contact Avigilon Technical Support using this form or call
+1.888.281.5182 option 1.
To help diagnose your problem, the Avigilon Technical Support team may ask you to provide a System Bug
Report. The System Bug Report is a zip file generated by the Avigilon Control Center Client software that
contains the system log and error reports for each of the servers that you can access.
Keyboard Commands
Use any of the keyboard commands below to help you navigate the Avigilon Control Center Client
software.
The Key Combination column shows the commands used on a standard keyboard, while the Keypad
Combination column shows the commands used on an Avigilon USB Professional Joystick Keyboard.
Note: Some features are only available if the site has the required license, and if you have the
required user permissions.
+0+
Broadcast audio S
command
Note: Customized View layouts are linked to their position in the Layouts list. For example, if your
custom layout is placed at the top of the Layouts list, you can use the keyboard command for layout
1 to select the custom layout.
Playback Commands
Command Key Combination Keypad Combination (Timeline
buttons)
Zoom in +
Zoom out –
Pan left ←
Pan right →
Tilt up ↑
Tilt down ↓
PTZ menu up ↑
+ <Aux #> +
+ <Aux #> +
Joystick Controls
The ACC Client software supports two types of joysticks, the Avigilon USB Professional Joystick Keyboard
and standard USB joysticks. After your joystick has been configured, you can use it to pan, tilt, zoom, and
more.
Zoom In +
Zoom Out –
Pan Left ←
Pan Right →
Tilt Up ↑
Tilt Down ↓
Move Menu Up ↑
+ <Aux #> +
+ <Aux #> +