User's Manual
277
Figure 8-62 Tampering
Step 4
Click
to enable tampering alarm.
Step 5
Click Deployment Time to select schedule from the drop-down list.
After setting deployment period, system triggers corresponding operations when there is
a motion detection alarm in the specified period.
●
Click View Schedule to view detailed schedule settings.
●
If the schedule is not added or the added schedule does not meet actual needs, click
Add Schedule. See "8.8.4 Schedule" for detailed information.
Step 6
Click Actions to set alarm actions. See "8.4.1 Alarm Actions" for detailed information.
Step 7
Click Save.
8.4.3.2 Offline Alarm
When the remote device and the IVSS are disconnected, system can trigger an alarm.
Step 1
Click
, or click
on the configuration page, and then select EVENT.
Step 2
Select a remote device in the device tree on the left.
Step 3
Select Device Offline > Device Offline.
Figure 8-63 IPC offline
Step 4
Click
to enable offline alarm.
The device offline alarm is enabled by default. You can skip this step.
Step 5
Click Deployment Time to select schedule from the drop-down list.
After setting deployment period, system triggers corresponding operations when there is
Содержание DHI-IVSS7008
Страница 1: ...IVSS User s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V5 0 0 ...
Страница 50: ...User s Manual 30 common grounded with the Device ...
Страница 142: ...User s Manual 122 Figure 6 82 Search result Other Operations Click one displayed panel and the icons are displayed ...
Страница 158: ...User s Manual 138 Figure 6 103 Human Figure 6 104 Vehicle Figure 6 105 Non motor vehicle ...
Страница 335: ...User s Manual 315 Figure 8 106 Enter email address Figure 8 107 Scan QR code Step 4 Reset the password ...
Страница 368: ...User s Manual 348 Figure 11 2 Unlock the client ...
Страница 381: ...User s Manual ...