User's Manual
Table Of Contents
- Software Installation on page 10
- Overview
- VIVOTEK’s FE9380 and FE9382 are two H.265 fisheye fixed dome network cameras, both featuring a detailed 5-Megapixel CMOS sensor that produces superb image clarity. By employing H.265 compression technology and VIVOTEK’s Smart Stream III technology, these
- The cameras are both equipped with a removable IR-cut filter and WDR Pro technology, empowering the cameras to maintain optimal image quality around the clock and unparalleled visibility in high-contrast lighting environments. Moreover, the cameras are de
- * Depending on scene being monitored.
- Revision History
- Read Before Use
- Package Contents
- Symbols and Statements in this Document
- Physical Description
- LED Definition
- Hardware Installation
- Software Installation
- Network Deployment
- Accessing the Network Camera
- Using RTSP Players
- Using 3GPP-compatible Mobile Devices
- Using VIVOTEK Recording Software
- Main Page
- Client Settings
- Configuration
- System > General settings
- System > Homepage layout
- System > Logs
- System > Parameters
- System > Maintenance
- Media > Image
- Media > Video
- Media > Audio
- Media profiles
- Network > General settings
- Network > Streaming protocols
- Network > QoS (Quality of Service)
- Network > SNMP (Simple Network Management Protocol)
- Network > FTP
- Bonjour
- Security > User accounts
- Security > HTTPS (Hypertext Transfer Protocol over SSL)
- Security > Access List
- Security > IEEE 802.1x
- PTZ > PTZ settings
- Event > Event settings
- Applications > Motion detection
- Applications > Smart VCA
- Applications > DI and DO
- Applications > Tampering detection
- Applications > Audio detection
- Applications > Shock detection
- Applications > Package management - a.k.a., VADP (VIVOTEK Application Development Platform)
- Recording > Recording settings
- Storage
- Storage > SD card management
- Storage > NAS management
- Storage > Content management
- Appendix
VIVOTEK
78 - User's Manual
Privacy mask
Click Privacy Mask to open the conguration page. On this page, you can block out certain sensitive
zones to address privacy concerns.
■ To congure the privacy mask windows, follow the steps below:
1. Click New to add a new window. A text box will appear allowing you to enter a name for the mask.
2. Use four mouse clicks to mark a square area, which is recommended to be at least twice the size of
the object (height and width) you want to cover.
3. Enter a Window Name and click Save to enable the setting.
4. Check Enable privacy mask to enable this function.
►
Up to 5 privacy mask windows can be congured on the same screen.
►
To delete a mask, use the red cross button and then click on the Save button.
4x
NOTE: