3
CONTENTS
Data protection notice
.............................................................. 2
1. About this guide ................................................................ 4
1.1
Explanation of symbols
.................................................... 4
1.2 Warranty
....................................................................... 4
1.3 Handling log-in details for your Secoris System
...................... 5
1.4 Important Safety Information
............................................ 6
1.5 Declaration of conformity
................................................. 6
2. About Secoris alarm systems .................................................. 7
3. Operational features ........................................................... 8
3.1 Comprehensive set/unset flexibility
..................................... 8
3.2 Alarm communication
...................................................... 8
3.3 User options
................................................................... 8
3.4 Users and user types
........................................................ 8
3.5 HUA / panic alarms
........................................................... 9
3.6 Full logging
.................................................................... 9
3.7 Test options
................................................................... 9
3.8 Installer remote access
..................................................... 9
3.9 Jamming and tamper monitoring
........................................ 9
4. Using the system ............................................................... 10
4.1 Keypad keys
.................................................................. 10
4.2 About the standby screen
................................................. 11
4.3 Setting the system
.......................................................... 11
4.4 Unsetting the system
...................................................... 12
4.5 Managing alarms
............................................................ 12
4.6 Managing alerts
............................................................. 13
4.7 Accessing the User menu
.................................................. 13
4.8 Managing users
............................................................. 14
4.9 Omitting zones
.............................................................. 18
4.10 Using shunt groups
......................................................... 19
4.11 Viewing the Log
............................................................. 20
4.12 Testing the system
.......................................................... 21
4.13 System configuration
...................................................... 25
5. Terms and definitions ......................................................... 36
6. Declarations of compliance ................................................... 38
Appendix A – User Types .......................................................... 39
Appendix B – User Menu Map .................................................... 41
Appendix C – Entering Text ....................................................... 43
7. Notes .............................................................................. 44