19
To delete a user
, select the user's ID from the
User Name
drop-down list and click the
Delete
button.
To update a user's permissions or change a password
, select the user's ID from the
User Name
drop-down list, make
the change, and click the
Update
button.
Security Features
The
System4
Server configuration software offers several methods to prevent users from exploring other areas of the
system. For example, the
Users
tab contains the following options:
•
Enable Kiosk Mode
refers to accessing the Windows
®
Desktop and task bar during system operation. When used
with
Restrict Explorer Functionality
, access to the desktop and task bar is completely eliminated while the server
is running. If you choose to keep
Enable Kiosk Mode
selected, you have access to the following option:
On
System4
Server Exit
lets you choose to have your system continue in Windows, shut down, or restart
when you exit the
System4
Server software. If you choose
Continue
in Windows, you can access other parts of
the system after the software is shut down.
•
Restrict Explorer Functionality
disables the Windows task bar and/or the Desktop icons while the software is
running. To view specific restriction options, select this check box and click
Restrictions
.
Each of these security options has individual benefits. However, you can guarantee that users will not access other
parts of the system only if you choose the highest level of security.
The
highest level of security
requires the following configuration:
•
Kiosk Mode
enabled
•
Shutdown
or
Restart
enabled in the
On
System4
Server Software Exit
drop-down list
•
Restrict Explorer Functionality
enabled with all restrictions activated
•
Configuration software title placed in the
Startup
folder (it is already there by default)
•
Automatically Run This Schedule On Startup
selected on the
Schedule
page
NOTE:
With this level of security, only an operator logged in with
Administrator
permissions can access other areas
of the system.
The top left corner where the Philips logo is located is actually a button to access a version information screen which
also contains a
Log-on
button. If the software is currently restricted based on the user who is currently logged in, an
Administrator can press this button to log on and gain full access to the software.
Setup Tab #5: Configuring Motion Detection
There are two important steps in configuring motion detection. First, you can set up a
motion mask
to cause the
configuration software to ignore areas of an image where motion events do not need to be recorded. Then, you can
adjust how much motion must occur (i.e.
motion sensitivity
) for the system to begin recording a motion event.
Understanding Motion Detection
You can configure the system to recognize various levels and types of motion by going to the
Setup
page and clicking
the
Motion
tab. For example, you can adjust the camera's sensitivity to motion, configure the system to ignore subtle
changes in light level, or create a motion mask to identify areas of the video display in which motion should not
trigger recording. The following sections explain how motion detection works in NTSC (the PAL video standard uses
slightly different numbers, as described later in this section).
The Motion Detection Image
Each time the system captures and compresses an image, a smaller black-and-white version of the image is created.
This smaller image is used only for motion detection, then discarded; it is not stored separately from the
compressed data. All motion detection is done using this smaller image.
Reference Frame
When recording begins from a camera with motion detection active, the first image of video captured becomes the
camera's reference frame to which following images are compared. The reference frame is replaced periodically to
prevent gradual and inevitable changes, such as light levels during sunrise or sunset, from being detected as motion.
Summary of Contents for System4 Seriver
Page 1: ...Server Philips Communication Security Imaging Installation Instructions Eng ...
Page 2: ...2 ...
Page 47: ...47 ...