7. Disable Auto-Login on SmartPSS:
Those using SmartPSS to view their system and on a computer that is used by multiple people should
disable auto-login. This adds a layer of security to prevent users without the appropriate credentials from
accessing the system.
8. Use a Different Username and Password for SmartPSS:
In the event that your social media, bank, email, etc. account is compromised, you would not want
someone collecting those passwords and trying them out on your video surveillance system. Using a
different username and password for your security system will make it more difficult for someone to
guess their way into your system.
9. Limit Features of Guest Accounts:
If your system is set up for multiple users, ensure that each user only has rights to features and functions
they need to use to perform their job.
10. UPnP:
● UPnP will automatically try to forward ports in your router or modem. Normally this would be a good
thing. However, if your system automatically forwards the ports and you leave the credentials defaulted,
you may end up with unwanted visitors.
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be
turned off regardless. Disabling UPnP is recommended when the function is not used in real applications.
11. SNMP:
Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for
tracing and testing purposes only.
12. Multicast:
Multicast is used to share video streams between two recorders. Currently there are no known issues
involving Multicast, but if you are not using this feature, deactivation can enhance your network security.
13. Check the Log:
If you suspect that someone has gained unauthorized access to your system, you can check the system
log. The system log will show you which IP addresses were used to login to your system and what was
accessed.
14. Physically Lock Down the Device:
Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve
this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.
15. Connect IP Cameras to the PoE Ports on the Back of an NVR:
Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and
cannot be accessed directly.
16. Isolate NVR and IP Camera Network
The network your NVR and IP camera resides on should not be the same network as your
public computer network. This will prevent any visitors or unwanted guests from getting access to
the same
network the security system needs in order to function properly.
Содержание ELITE Network IP Series
Страница 1: ...64 Channel 4K Hot Swap NVR NVR ELHS 64 4K DH...
Страница 43: ...Figure 3 14 Step 2 Click Add new holiday button and device displays the following interface See Figure 3 15...
Страница 108: ...Figure 3 92 Figure 3 93...
Страница 131: ...Figure 3 111 Figure 3 112 Figure 3 113...
Страница 144: ...Figure 3 126 Figure 3 127...
Страница 146: ...Figure 3 129 Click draw button to draw the zone See Figure 3 130 Figure 3 130...
Страница 149: ...Figure 3 133 Click Draw button to draw a zone See Figure 3 134 Figure 3 134...
Страница 154: ...Figure 3 139 Click draw button to draw the zone See Figure 3 140...
Страница 165: ...Figure 3 151 Step 2 Add surveillance scene 1 Click Add The Add interface is displayed See Figure 3 152...
Страница 172: ...Figure 3 157 Figure 3 158...
Страница 173: ...Figure 3 159 Figure 3 160...
Страница 176: ...Figure 3 164 Figure 3 165...
Страница 211: ...Figure 3 199...
Страница 218: ...Figure 3 206 Step 2 Click Add user button in Figure 3 206 The interface is shown as in Figure 3 207 Figure 3 207...
Страница 234: ...Figure 3 227 Step 2 Click Add group Enter add group interface See Figure 3 228 Figure 3 228...
Страница 298: ...Figure 4 56 Figure 4 57...
Страница 304: ...Figure 4 62 Figure 4 63...
Страница 305: ...Figure 4 64 Figure 4 65...
Страница 330: ...Figure 4 101 Figure 4 102...
Страница 339: ...Figure 4 115 Figure 4 116...
Страница 359: ...Figure 4 144 Note For admin you can change the email information See Figure 4 145...