XProtect Access (configuration)

Add access monitors to views

You start by defining a view item for access control:

  1. In setup mode, select the view you want to use for access monitoring.
  2. In the System overview pane, click Access monitor and drag it to a view item.
  3. In the Access monitor settings (see Access monitor settings) dialog box that appears, specify the settings. Once you have selected a door, you can keep the default settings or change them if needed.
  4. Click OK and the access monitor is added to the view.

    When an access control incident occurs that triggers an eventClosedA predefined incident occurring on the surveillance system; used by the surveillance system for triggering actions. Depending on surveillance system configuration, events may be caused by input from external sensors, by detected motion, by data received from other applications, or manually through user input. The occurrence of an event could, for example, be used for making a camera record with a particular frame rate, for activating outputs, for sending e-mails, or for a combination thereof., it appears in the right side of the view item.

Access monitor settings

Specify the following settings for access monitors:

Name

Description

Door

Select the door you want to view access control events from. When you select a door, the remaining settings in the dialog box appear with their current values.

Sources

Select the type of access control sources that you want to receive events from. The list can contain, for example, doors or specific access points for a door. An access point is a point of entry, including its associated physical devices such as card readers, keypads, sensors, or buttons. A door has typically two access points that control entry and exit through the door respectively.

The list of sources is configured by your system administrator.

Camera

Select the camera from which you want to show video related to this door. By default, the system lists the cameras that your system administrator has associated with the selected door, but you can also select another camera in your system.

Events

Select the type of eventsClosedA predefined incident occurring on the surveillance system; used by the surveillance system for triggering actions. Depending on surveillance system configuration, events may be caused by input from external sensors, by detected motion, by data received from other applications, or manually through user input. The occurrence of an event could, for example, be used for making a camera record with a particular frame rate, for activating outputs, for sending e-mails, or for a combination thereof. you want to receive. You can select events from the event categories defined by your XProtect system administrator or from the list of events defined in your access control system.

Commands

Select the command buttons that you want to have available in the access monitor, for example, lock and unlock doors. The list of commands depends on your system configuration.

Order

Select if you want new events to appear in the top or at the bottom of the event list.

Modify access monitor settings

In live mode, you can change the settings of your access monitor:

  1. Click Setup and select the view item you want to modify.
  2. In the Properties pane, click the Access monitor settings button.
  3. In the Access monitor settings (see Access monitor settings) dialog box that appears, specify the settings.
  4. Click OK to close the dialog box and then Setup to return to live viewing.

Customize your view

With overlay buttonsClosedA button appearing as a layer on top of the video when you move your mouse cursor over individual view items with cameras when in live mode. Use overlay buttons to activate speakers, events, output, move PTZ cameras, start recording, clear signals from cameras. you can customize your interface. You can add overlay command buttons for access control to a view item from a list of commands configured for the doors or access points.

Examples of usage:

  • Have direct access to command buttons in view items other than access monitors
  • Place the command buttons directly by a door in the view item
  • Add other command buttons than those specified in Access monitor settings

Steps:

  1. In live mode, select Setup and select the view item you want to modify.
  2. In the Overlay buttons pane, click Access control.
  3. Locate the command you want to add and drag it to your view item.
  4. Click Setup to return to live viewing.

    The overlay button appears when you drag the mouse over the view item.

Manage cardholder information

If your access control system is set up for it, you can go directly to a web page representation of a cardholder record and do, for example, user administration or get further information about the cardholder.

Provided that the plug-in supports deep link, the following prerequisites exist for the access control system:

  • Must include a web client
  • Must support deep links

To manage cardholder information:

  1. On the Access control tab, select Cardholders list.
  2. Search for a cardholder and select the person from the list.
  3. On the right-hand side, below the cardholder information, you can click a link to, for example, a webpage. Depending on the plug-in, more links may be supported and you may be asked for additional login credentials.
  4. You can edit several functionalities, including cardholder information and access permissions.
  5. Close, in this example, the webpage and return to XProtect Smart Client.

Turn access request notifications on or off

You can turn off access request handling, for example in cases where only one person should handle access requests.

  1. On the global toolbar, select Settings and more and then Settings to open the Settings window.

  2. Select Access control and turn off access request notifications.

If you later need to handle access requests again, turn on access request notifications. You can also change the options for access control, by clicking the Settings icon from within an access request notification.

If the Follow Server field is selected, your system administrator controls the setting of Show access request notifications.