Instruction Manual

Milestone Husky M30/M50
Administrator's Manual
www.milestonesys.com
179
Advanced configuration
Alarms
About alarms
The Alarms feature is a Milestone Integration Platform (MIP) (see "About MIP plug-ins" on page 186)-
based feature that uses functionality handled by the Event server. It provides central overview and
control of alarms in any number of system installations throughout your organization.
You can configure alarms to be generated based on either:
Internal events (system-related): for example motion, server responding/not responding,
archiving problems, lack of disk space, and so on.
External events (integrated): for example events from access control systems or license
plate recognition.
The Alarms feature also handles general alarms settings and alarm logging.
About configuring alarms
Alarm configuration includes among other things:
Dynamic setup of alarm handling (see "Add an alarm" on page 181) based on users access
rights
Central overview of all components: servers, cameras, and external units
Setup of central logging of all incoming alarms and system information
Handling of plug-ins, allowing customized integration of other systems, for example external
access control or VCA-based systems.
About viewing alarms
The following can play a role with regards to alarms and who can view/control/manage them and to
what degree. This is because alarms are controlled by the visibility of the object causing the alarm.
Source/device visibility: if the device causing the alarm is not set to be visible to the user, the
user cannot see the alarm in the alarm list in the XProtect Smart Client. See Configure User
Access wizard (see "Manage user access wizard" on page 55).
Right to trigger manually defined events: if manually defined events (see "Add a manual event"
on page 112) are available in your Milestone Husky product system, these can determine if the
user can trigger selected manually defined events in the XProtect Smart Client. See Configure
User Access wizard (see "Manage user access wizard" on page 55).
External plug-ins: if any external plug-ins are set up in your system, these might control user's
rights to handle alarms.
General access rights: can determine whether the user is allowed to (only) view or also to
manage alarms. See Configure User Access wizard (see "Manage user access wizard" on
page 55).