Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

To delimit secured protected territory in Intellect software package , the “Region” Region object is in useused. Secured Protected territory delimiting helps to monitor and control objects of the security system more efficiently.

Monitoring function is performed by giving information about the Region – relative —relative area of event source-object location. If any event comes from alarm object (camera, sensor and so on), this event will contain information on the region where this object is. Information on object’s belonging to one or another Regionis displayed in the “Alarm Alarm notification window” window (see Alarm notification window section) and "Events log" (see Events log sectionviewer).

The Mapis used for Region operation in Intellect software package. Markings of the “Region” Region object on the Map are given below.

  1. Security mode is deactivated in the region
  2. Security mode is activated in the region
  3. Alarm in the region. Alarming event from one or several objects that belong to this region is detected

...

Commands of the feature menu of the “Region” object Region object are described in the table.

Command Description
Control objects

Sets states to the objects of Region.

Info
titleNote 1

To start the “Control objects” Control objects command in the feature menu of the “Region” Region object, add a plug-in.


Info
titleNote 2

This command is available in Macros (see Intellect™ Software Package.Administrator's Guide).


Arm

Starts monitoring objects states of the Region. Region becomes alarmed when it gets corresponding events from objects.
Accept alarmAccepts Region alarm.
DisarmStops monitoring objects states of the Region.
Show in Access ManagerThe command can be used if ACFA - Intellect software is installed and the Access Manager window is displayed on the same display as the Map. The command displays the region and the users in it on the Regions and areas tab of the Access Manager. See also Access Manager Module Settings and Operation Guide.